Sample records for upper hack bridge

  1. 76 FR 13288 - Drawbridge Operation Regulations; Hackensack River, Secaucus, NJ

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-11

    ... deviation from the regulation governing the operation of the Upper Hack Bridge at mile 6.9, across the...: The Upper Hack Bridge, across the Hackensack River at mile 6.9 has a vertical clearance in the closed... rehabilitation at the bridge. Under this temporary deviation the Upper Hack Bridge, mile 6.9, across the...

  2. 75 FR 68704 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-09

    ... temporary deviation from the regulation governing the operation of the Upper Hack Bridge at mile 6.9, across.... SUPPLEMENTARY INFORMATION: The Upper Hack Bridge, across the Hackensack River at mile 6.9 has a vertical.... Under this temporary deviation the Upper Hack Bridge, mile 6.9, across the Hackensack River may remain...

  3. 76 FR 4818 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-27

    ... temporary deviation from the regulation governing the operation of the Upper Hack Bridge across the...-9826. SUPPLEMENTARY INFORMATION: The Upper Hack Bridge, across the Hackensack River at mile 6.9 has a... temporary deviation the Upper Hack Bridge, mile 6.9, across the Hackensack River may remain in the closed...

  4. 78 FR 76195 - Drawbridge Operation Regulations; Hackensack River, New Jersey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-17

    ... Upper Hack and HX Bridges, miles 6.9 and 7.7, respectively, all across the Hackensack River, NJ to... Upper Hack Bridge, mile 6.9, has a vertical clearance of 8 feet at mean high water, and 13 feet at mean... so at all times. Under this temporary deviation the PATH, Portal, Upper Hack and HX bridges may...

  5. 33 CFR 117.723 - Hackensack River.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... be split with one drawtender stationed at Upper Hack and the other drawtender at the HX drawbridge... section, the draw of the NJTRO Lower Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New...

  6. 33 CFR 117.723 - Hackensack River.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... stationed at Upper Hack and the other drawtender at the HX drawbridge. Adequate security measures shall be... Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New Jersey. In the event the HX...

  7. 33 CFR 117.723 - Hackensack River.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... be split with one drawtender stationed at Upper Hack and the other drawtender at the HX drawbridge... section, the draw of the NJTRO Lower Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New...

  8. 33 CFR 117.723 - Hackensack River.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... be split with one drawtender stationed at Upper Hack and the other drawtender at the HX drawbridge... section, the draw of the NJTRO Lower Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New...

  9. 33 CFR 117.723 - Hackensack River.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... be split with one drawtender stationed at Upper Hack and the other drawtender at the HX drawbridge... section, the draw of the NJTRO Lower Hack Bridge, mile 3.4 at Jersey City shall open on signal if at least one hour advance notice is given to the drawtender at the Upper Hack bridge, mile 6.9 at Secaucus, New...

  10. 33 CFR 117.739 - Passaic River.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge, mile 3.4 on the Hackensack River, at Jersey City...

  11. 33 CFR 117.739 - Passaic River.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge, mile 3.4 on the Hackensack River, at Jersey City...

  12. 33 CFR 117.739 - Passaic River.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge, mile 3.4 on the Hackensack River, at Jersey City...

  13. 33 CFR 117.739 - Passaic River.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... signal if at least one hour advance notice is given to the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge...

  14. 33 CFR 117.739 - Passaic River.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... signal if at least one hour advance notice is given to the drawtender at Upper Hack Bridge mile 6.9, across the Hackensack River at Secaucus, N.J. In the event the HX drawtender is at the Lower Hack Bridge...

  15. 76 FR 50123 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-12

    ... temporary deviation from the regulation governing the operation of the Hack Freight Bridge, mile 3.1, across...-9826. SUPPLEMENTARY INFORMATION: The Hack Freight Bridge, across the Hackensack River at mile 3.1 has a... to provide openings. Under this temporary deviation the Hack Freight Bridge, mile 3.1, across the...

  16. Plans: Poop Deck, Boat Deck, Housetop, Bridge Deck, Upper Bridge ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Plans: Poop Deck, Boat Deck, Housetop, Bridge Deck, Upper Bridge Deck, Navigating Bridge, Forecastle Deck, Upper Deck, Second Deck and Hold - Saugatuck, James River Reserve Fleet, Newport News, Newport News, VA

  17. 76 FR 29665 - Migratory Bird Permits; Changes in the Regulations Governing Raptor Propagation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-23

    ... hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under your propagation permit. Check with... you hack must have two attached functioning radio transmitters during hacking. (3) You may not hack a...

  18. The extent and consequences of p-hacking in science.

    PubMed

    Head, Megan L; Holman, Luke; Lanfear, Rob; Kahn, Andrew T; Jennions, Michael D

    2015-03-01

    A focus on novel, confirmatory, and statistically significant results leads to substantial bias in the scientific literature. One type of bias, known as "p-hacking," occurs when researchers collect or select data or statistical analyses until nonsignificant results become significant. Here, we use text-mining to demonstrate that p-hacking is widespread throughout science. We then illustrate how one can test for p-hacking when performing a meta-analysis and show that, while p-hacking is probably common, its effect seems to be weak relative to the real effect sizes being measured. This result suggests that p-hacking probably does not drastically alter scientific consensuses drawn from meta-analyses.

  19. Implicit Knowledge of General Upper Secondary School in a Bridge-Building Project

    ERIC Educational Resources Information Center

    Rasmussen, Annette; Andreasen, Karen

    2016-01-01

    Bridge-building activities are practiced widely in the education systems of Europe. They are meant to bridge transitions between lower and upper secondary school and form a mandatory part of the youth guidance system in Denmark. By giving pupils the opportunity to experience the different educational context of upper secondary school,…

  20. Aquatic macrophyte diversity of the Pantanal wetland and upper basin.

    PubMed

    Pott, V J; Pott, A; Lima, L C P; Moreira, S N; Oliveira, A K M

    2011-04-01

    This is a short review of the state of the art concerning diversity of aquatic macrophytes and the main aquatic vegetation types in the Brazilian Pantanal wetland and upper watershed. There are ca. 280 species of aquatic macrophytes on the Pantanal floodplain, with scarce endemism. On the upper watershed, Cerrado wetlands (veredas) and limestone springs have a distinct flora from the Pantanal, with twice the species richness. As a representative case of aquatic habitats influenced by river flood, some primary data are presented for the Pantanal Matogrossense National Park and associated Acurizal Preserve, analysing the floristic similarity among aquatic vegetation types. We comment on problems of conservation and observe that Panicum elephantipes Nees is one of the few natives to compete with the invasive Urochloa arrecta (Hack. ex T. Durand & Schinz) Morrone & Zuloaga.

  1. 50 CFR 21.30 - Raptor propagation permits.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... method to condition raptors. You may hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under... hacking is allowed. (2) Any hybrid you hack must have two attached functioning radio transmitters during...

  2. 50 CFR 21.30 - Raptor propagation permits.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... method to condition raptors. You may hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under... hacking is allowed. (2) Any hybrid you hack must have two attached functioning radio transmitters during...

  3. 50 CFR 21.30 - Raptor propagation permits.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... method to condition raptors. You may hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under... hacking is allowed. (2) Any hybrid you hack must have two attached functioning radio transmitters during...

  4. 50 CFR 21.30 - Raptor propagation permits.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... method to condition raptors. You may hack a raptor that you produce under your propagation permit. (1) You may need permission from your State or tribal wildlife agency to hack a raptor you possess under... hacking is allowed. (2) Any hybrid you hack must have two attached functioning radio transmitters during...

  5. The Extent and Consequences of P-Hacking in Science

    PubMed Central

    Head, Megan L.; Holman, Luke; Lanfear, Rob; Kahn, Andrew T.; Jennions, Michael D.

    2015-01-01

    A focus on novel, confirmatory, and statistically significant results leads to substantial bias in the scientific literature. One type of bias, known as “p-hacking,” occurs when researchers collect or select data or statistical analyses until nonsignificant results become significant. Here, we use text-mining to demonstrate that p-hacking is widespread throughout science. We then illustrate how one can test for p-hacking when performing a meta-analysis and show that, while p-hacking is probably common, its effect seems to be weak relative to the real effect sizes being measured. This result suggests that p-hacking probably does not drastically alter scientific consensuses drawn from meta-analyses. PMID:25768323

  6. Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times.

    PubMed

    Delgado, Ana; Callén, Blanca

    2017-02-01

    In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, 'hacking' is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey's experimental approach to politics, we analyse hacks as 'inquiry' to see how they serve to articulate public and political action. We argue that do-it-yourself and makers' hacks are technical and political demonstrations. What do-it-yourself and makers' hacks ultimately demonstrate is that things can be done otherwise and that 'you' can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration.

  7. P-Hacking in Orthopaedic Literature: A Twist to the Tail.

    PubMed

    Bin Abd Razak, Hamid Rahmatullah; Ang, Jin-Guang Ernest; Attal, Hersh; Howe, Tet-Sen; Allen, John Carson

    2016-10-19

    "P-hacking" occurs when researchers preferentially select data or statistical analyses until nonsignificant results become significant. We wanted to evaluate if the phenomenon of p-hacking was evident in orthopaedic literature. We text-mined through all articles published in three top orthopaedic journals in 2015. For anonymity, we cipher-coded the three journals. We included all studies that reported a single p value to answer their main hypothesis. These p values were then charted and frequency graphs were generated to illustrate any evidence of p-hacking. Binomial tests were employed to look for evidence of evidential value and significance of p-hacking. Frequency plots for all three journals revealed evidence of p-hacking. Binomial tests for all three journals were significant for evidence of evidential value (p < 0.0001 for all). However, the binomial test for p-hacking was significant only for one journal (p = 0.0092). P-hacking is an evolving phenomenon that threatens to jeopardize the evidence-based practice of medicine. Although our results show that there is good evidential value for orthopaedic literature published in our top journals, there is some evidence of p-hacking of which authors and readers should be wary. Copyright © 2016 by The Journal of Bone and Joint Surgery, Incorporated.

  8. 78 FR 29615 - Establishment of Area Navigation (RNAV) Routes; Washington, DC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-21

    ...). Q-72 extends between the HACKS, WV, intersection and the RAMAY, VA, WP. It provides an alternate route for jet route J-149 via a direct routing to the HACKS intersection, thus reducing miles flown for...]12'20'' W.) Q72 HACKS, WV to RAMAY, VA [New] HACKS, WV FIX (Lat. 39[deg]07'46'' N., long. 081[deg]05...

  9. Plans: Aft Gun Platform, Quarters for 16 Gunmen, Poop Deck, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Plans: Aft Gun Platform, Quarters for 16 Gunmen, Poop Deck, Boat Deck, House Top, Bridge Deck, Upper Bridge Deck, Navigating Bridge, Forecastle Deck, Gun Platform, Upper Deck, Second Deck and Hold Plan - Mission Santa Ynez, Suisun Bay Reserve Fleet, Benicia, Solano County, CA

  10. Problems in using p-curve analysis and text-mining to detect rate of p-hacking and evidential value.

    PubMed

    Bishop, Dorothy V M; Thompson, Paul A

    2016-01-01

    Background. The p-curve is a plot of the distribution of p-values reported in a set of scientific studies. Comparisons between ranges of p-values have been used to evaluate fields of research in terms of the extent to which studies have genuine evidential value, and the extent to which they suffer from bias in the selection of variables and analyses for publication, p-hacking. Methods. p-hacking can take various forms. Here we used R code to simulate the use of ghost variables, where an experimenter gathers data on several dependent variables but reports only those with statistically significant effects. We also examined a text-mined dataset used by Head et al. (2015) and assessed its suitability for investigating p-hacking. Results. We show that when there is ghost p-hacking, the shape of the p-curve depends on whether dependent variables are intercorrelated. For uncorrelated variables, simulated p-hacked data do not give the "p-hacking bump" just below .05 that is regarded as evidence of p-hacking, though there is a negative skew when simulated variables are inter-correlated. The way p-curves vary according to features of underlying data poses problems when automated text mining is used to detect p-values in heterogeneous sets of published papers. Conclusions. The absence of a bump in the p-curve is not indicative of lack of p-hacking. Furthermore, while studies with evidential value will usually generate a right-skewed p-curve, we cannot treat a right-skewed p-curve as an indicator of the extent of evidential value, unless we have a model specific to the type of p-values entered into the analysis. We conclude that it is not feasible to use the p-curve to estimate the extent of p-hacking and evidential value unless there is considerable control over the type of data entered into the analysis. In particular, p-hacking with ghost variables is likely to be missed.

  11. Plans: 3'/50 Cal. Gun Platform, Boat Deck House Top & ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Plans: 3'/50 Cal. Gun Platform, Boat Deck House Top & Fidley Top, Boat Deck, Radar Platform Lower, Pilot House Top, Navigation Bridge, Upper Bridge Deck, Poop Deck, Cargo Deck, Motor Boat Platform, Bridge Deck, Forecastle Deck, Upper Deck - Taluga, Suisun Bay Reserve Fleet, Benicia, Solano County, CA

  12. Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times

    PubMed Central

    Delgado, Ana; Callén, Blanca

    2016-01-01

    In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, ‘hacking’ is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey’s experimental approach to politics, we analyse hacks as ‘inquiry’ to see how they serve to articulate public and political action. We argue that do-it-yourself and makers’ hacks are technical and political demonstrations. What do-it-yourself and makers’ hacks ultimately demonstrate is that things can be done otherwise and that ‘you’ can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration. PMID:27233296

  13. 77 FR 28255 - Safety Zone; Upper Mississippi River, Mile 183.0 to 183.5

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-14

    ...-AA00 Safety Zone; Upper Mississippi River, Mile 183.0 to 183.5 AGENCY: Coast Guard, DHS. ACTION... Upper Mississippi River, from mile 183.0 to mile 183.5, in the vicinity of the Merchants Bridge and... Merchants Bridge in the vicinity of mile 183.0 to 183.5 on the Upper Mississippi River. After initial...

  14. 1. IRONWOOD BLUFFS BRIDGE Tombigbee R. MISSISSIPPI, ITAWAMBA CO. One ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    1. IRONWOOD BLUFFS BRIDGE Tombigbee R. MISSISSIPPI, ITAWAMBA CO. One mile W of Ms. 25 on dirt road 2.5 mi. N of Bull Mtn. Cr. Detail of upper panel point, showing components of members. Sarcone Photography, Columbus, Ms. September 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  15. P-Hacking: A Wake-Up Call for the Scientific Community.

    PubMed

    Raj, A Thirumal; Patil, Shankargouda; Sarode, Sachin; Salameh, Ziad

    2017-10-25

    P-hacking or data dredging involves manipulation of the research data in order to obtain a statistically significant result. The reasons behind P-hacking and the consequences of the same are discussed in the present manuscript.

  16. Problems in using p-curve analysis and text-mining to detect rate of p-hacking and evidential value

    PubMed Central

    Thompson, Paul A.

    2016-01-01

    Background. The p-curve is a plot of the distribution of p-values reported in a set of scientific studies. Comparisons between ranges of p-values have been used to evaluate fields of research in terms of the extent to which studies have genuine evidential value, and the extent to which they suffer from bias in the selection of variables and analyses for publication, p-hacking. Methods. p-hacking can take various forms. Here we used R code to simulate the use of ghost variables, where an experimenter gathers data on several dependent variables but reports only those with statistically significant effects. We also examined a text-mined dataset used by Head et al. (2015) and assessed its suitability for investigating p-hacking. Results. We show that when there is ghost p-hacking, the shape of the p-curve depends on whether dependent variables are intercorrelated. For uncorrelated variables, simulated p-hacked data do not give the “p-hacking bump” just below .05 that is regarded as evidence of p-hacking, though there is a negative skew when simulated variables are inter-correlated. The way p-curves vary according to features of underlying data poses problems when automated text mining is used to detect p-values in heterogeneous sets of published papers. Conclusions. The absence of a bump in the p-curve is not indicative of lack of p-hacking. Furthermore, while studies with evidential value will usually generate a right-skewed p-curve, we cannot treat a right-skewed p-curve as an indicator of the extent of evidential value, unless we have a model specific to the type of p-values entered into the analysis. We conclude that it is not feasible to use the p-curve to estimate the extent of p-hacking and evidential value unless there is considerable control over the type of data entered into the analysis. In particular, p-hacking with ghost variables is likely to be missed. PMID:26925335

  17. The medial temporal lobe-conduit of parallel connectivity: a model for attention, memory, and perception.

    PubMed

    Mozaffari, Brian

    2014-01-01

    Based on the notion that the brain is equipped with a hierarchical organization, which embodies environmental contingencies across many time scales, this paper suggests that the medial temporal lobe (MTL)-located deep in the hierarchy-serves as a bridge connecting supra- to infra-MTL levels. Bridging the upper and lower regions of the hierarchy provides a parallel architecture that optimizes information flow between upper and lower regions to aid attention, encoding, and processing of quick complex visual phenomenon. Bypassing intermediate hierarchy levels, information conveyed through the MTL "bridge" allows upper levels to make educated predictions about the prevailing context and accordingly select lower representations to increase the efficiency of predictive coding throughout the hierarchy. This selection or activation/deactivation is associated with endogenous attention. In the event that these "bridge" predictions are inaccurate, this architecture enables the rapid encoding of novel contingencies. A review of hierarchical models in relation to memory is provided along with a new theory, Medial-temporal-lobe Conduit for Parallel Connectivity (MCPC). In this scheme, consolidation is considered as a secondary process, occurring after a MTL-bridged connection, which eventually allows upper and lower levels to access each other directly. With repeated reactivations, as contingencies become consolidated, less MTL activity is predicted. Finally, MTL bridging may aid processing transient but structured perceptual events, by allowing communication between upper and lower levels without calling on intermediate levels of representation.

  18. Students "Hacking" School Computer Systems

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…

  19. 28. BRIDGE NO. 9 APRON AND BRIDGE HINGE JOINT AND ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    28. BRIDGE NO. 9 APRON AND BRIDGE HINGE JOINT AND BRIDGE SUSPENSION SYSTEM SHOWING EYEBAR AND CABLE CONNECTIONS. LOOKING WEST. - Greenville Yard, Transfer Bridge System, Port of New York/New Jersey, Upper New York Bay, Jersey City, Hudson County, NJ

  20. 29. BRIDGE NO. 13 APRON AND BRIDGE HINGE JOINT AND ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    29. BRIDGE NO. 13 APRON AND BRIDGE HINGE JOINT AND BRIDGE SUSPENSION SYSTEM (OLDER STYLE) SHOWING EYEBAR AND CABLE CONNECTIONS. LOOKING WEST. - Greenville Yard, Transfer Bridge System, Port of New York/New Jersey, Upper New York Bay, Jersey City, Hudson County, NJ

  1. 31. DETAIL VIEW OF MOVABLE SPAN, UPPER TRUSS GUSSET PLATE, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    31. DETAIL VIEW OF MOVABLE SPAN, UPPER TRUSS GUSSET PLATE, CONNECTION OF VERTICAL AND HORIZONTAL MEMBERS AT BRIDGE TENDER'S MOUSE (taken in December 1983) - Sharptown Bridge, Spanning Nanticoke River, State Route 313, Sharptown, Wicomico County, MD

  2. 31. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    31. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. S of MS. 50 Detail: Turn machinery. DWG S-3-325. Contr. #7236. Upper left quarter of sheet: plan and longitudinal elevation of Wedges. July 1914. Credit: Columbus and Greenville RR, Columbus, Ms. Sarcone Photography, Columbus, Ms. Sep 1978 - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  3. Transformative Rendering of Internet Resources

    DTIC Science & Technology

    2012-10-01

    4 Securing WiFi Connections...comes from legitimate web sites that have themselves been hacked . There is no way of anticipating which of these sites have been hacked and therefore...pose a security threat to visitors. The purpose of most of this web page hacking is to plant malicious code on the web site that will attack any

  4. 5. DETAIL VIEW OF UPPER CHORD MEMBER, SHOWING MAKER'S PLATE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    5. DETAIL VIEW OF UPPER CHORD MEMBER, SHOWING MAKER'S PLATE STATING 'KING IRON BRIDGE & MFG. CO., K & F & Z KING PATENT, CLEVELAND, O.' - Smith Road Bowstring Arch Bridge, Spanning Sycamore Creek at Smith Road (TR 62), Lykens, Crawford County, OH

  5. Free-space QKD system hacking by wavelength control using an external laser.

    PubMed

    Lee, Min Soo; Woo, Min Ki; Jung, Jisung; Kim, Yong-Su; Han, Sang-Wook; Moon, Sung

    2017-05-15

    We develop a way to hack free-space quantum key distribution (QKD) systems by changing the wavelength of the quantum signal laser using an external laser. Most free-space QKD systems use four distinct lasers for each polarization, thereby making the characteristics of each laser indistinguishable. We also discover a side-channel that can distinguish the lasers by using an external laser. Our hacking scheme identifies the lasers by automatically applying the external laser to each signal laser at different intensities and detecting the wavelength variation according to the amount of incident external laser power. We conduct a proof-of-principle experiment to verify the proposed hacking structure and confirm that the wavelength varies by several gigahertzes to several nanometers, depending on the intensity of the external laser. The risk of hacking is successfully proven through the experimental results. Methods for prevention are also suggested.

  6. 4. VIEW OF SILVER BRIDGE (ST. MARY'S BRIDGE), CARRYING COUNTY ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    4. VIEW OF SILVER BRIDGE (ST. MARY'S BRIDGE), CARRYING COUNTY ROAD OVER SOURIS RIVER NEAR SOUTH END OF REFUGE, LOOKING NORTHEAST - Upper Souris National Wildlife Refuge Dams, Souris River Basin, Foxholm, Surrey (England), ND

  7. 78 FR 10562 - Proposed Establishment of Area Navigation (RNAV) Routes; Washington, DC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-14

    ... (VORTAC) aid and the OTTTO, VA, waypoint (WP). Q-72 would extend between the HACKS, WV, intersection and... HACKS intersection, thus reducing miles flown for RNAV-equipped aircraft. Q-80 would extend between the...., long. 078[deg]22'27'' W.) OTTTO, VA WP (Lat. 38[deg]51'16'' N., long. 078[deg]12'20'' W.) Q72 HACKS, WV...

  8. 8. CAR FLOAT AND TUG DOCKED AT BRIDGE NO. 11 ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    8. CAR FLOAT AND TUG DOCKED AT BRIDGE NO. 11 FROM BRIDGE NO. 9 APRON. LOOKING SOUTHEAST. - Greenville Yard, Transfer Bridge System, Port of New York/New Jersey, Upper New York Bay, Jersey City, Hudson County, NJ

  9. 50. INTERIOR OF BRIDGE SUSPENSION STRUCTURE ABOVE BRIDGE NOS. 10 ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    50. INTERIOR OF BRIDGE SUSPENSION STRUCTURE ABOVE BRIDGE NOS. 10 AND 9 SHOWING CABLE COUNTERWEIGHT SYSTEM AND SCREW-TYPE VERTICAL ADJUSTMENT MACHINERY (LIFTING SCREWS). LOOKING NORTH. - Greenville Yard, Transfer Bridge System, Port of New York/New Jersey, Upper New York Bay, Jersey City, Hudson County, NJ

  10. Research in Computer Forensics

    DTIC Science & Technology

    2002-06-01

    systems and how they can aid in the recovery of digital evidence in a forensic analysis. Exposures to hacking techniques and tools in CS3675—Internet...cryptography, access control, authentication, biometrics, actions to be taken during an attack and case studies of hacking and information warfare. 11...chat, surfing, instant messaging and hacking with powerful access control and filter capabilities. The monitor can operates in a Prevention mode to

  11. Changing the Lines in the Coloring Book

    DTIC Science & Technology

    2004-05-18

    multitude of SCADA programmers creates a multitude of idiosyncratic programs, making it very difficult to know how to hack into large numbers of them...an observed pattern of hacking that would alert authorities seems not to have been discussed.) However, some SCADAs are not physically connected to the...normal hacking . Simultaneously, it would identify software vulnerabilities in other products and design viruses and worms for attacking them. (The

  12. Bioinformatics Challenge Days

    DTIC Science & Technology

    2013-12-30

    MIT Lincoln Laboratory in cooperation with Edgewood Chemical Biological Center (ECBC). These events explored the utility of a short-term “ hack day...conceived as an experiment applying a short “ hack day” format to bioinformatics problems of interest to DTRA. Participants of diverse technical...organizers took note of different types of previous hack day formats that had been very open-ended (i.e., gave participants a collection of hardware or

  13. Hacking Social Networks: Examining the Viability of Using Computer Network Attack Against Social Networks

    DTIC Science & Technology

    2007-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited. HACKING SOCIAL NETWORKS : EXAMINING THE...VIABILITY OF USING COMPUTER NETWORK ATTACK AGAINST SOCIAL NETWORKS by Russell G. Schuhart II March 2007 Thesis Advisor: David Tucker Second Reader...Master’s Thesis 4. TITLE AND SUBTITLE: Hacking Social Networks : Examining the Viability of Using Computer Network Attack Against Social Networks 6. AUTHOR

  14. A Framework for Programming and Budgeting for Cybersecurity

    DTIC Science & Technology

    2016-01-01

    environment in which hackers operate and extends beyond the confines of a single organization. Reducing the incen- tive for hacking and availability of...convey- ing to hackers that going after their organization entails a great deal of frustration (deterrence by denial) or risk (e.g., via hack -backs...components in the network: Systems are hacked because they have vulnerabilities (although a vulnerability-free system may be encounter risks from protocol

  15. Suspension Bridge Structural Systems: Cable Suspension & Anchorage; Warren Stiffening ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Suspension Bridge Structural Systems: Cable Suspension & Anchorage; Warren Stiffening Truss; Upper & Lower Decks; Assembled System - San Francisco Oakland Bay Bridge, Spanning San Francisco Bay, San Francisco, San Francisco County, CA

  16. 14. RAILROAD BRIDGE MISSISSIPPI, MONROE CO., ABERDEEN Reach by foot ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    14. RAILROAD BRIDGE MISSISSIPPI, MONROE CO., ABERDEEN Reach by foot from E end of Vine St. St. Louis and San Francisco RR bridge. Bridge built 1887, replaced, 1969. Credit: Evans Memorial Library, Aberdeen, Ms. No date. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  17. 8. DETAIL OF COLUMBIA BRIDGE WORKS, DAYTON, OH SIGN IN ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    8. DETAIL OF COLUMBIA BRIDGE WORKS, DAYTON, OH SIGN IN WROUGHT IRON ON PORTAL. - Peevy Road Bridge, Peevy Road spanning Perkiomen Creek in Upper Hanover Township, East Greenville, Montgomery County, PA

  18. 40. DETAIL OF BRIDGE NO. 9 ROCKER BEARING AND SOCKET, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    40. DETAIL OF BRIDGE NO. 9 ROCKER BEARING AND SOCKET, SEPARATED. LOOKING NORTH. - Greenville Yard, Transfer Bridge System, Port of New York/New Jersey, Upper New York Bay, Jersey City, Hudson County, NJ

  19. 15. OLD ROAD BRIDGE MISSISSIPPI, MONROE CO., ABERDEEN (EAST ABERDEEN) ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. OLD ROAD BRIDGE MISSISSIPPI, MONROE CO., ABERDEEN (EAST ABERDEEN) One mile E of Aberdeen, 1000 ft. N of (1978) U.S. 45 bridge. Oblique view of bridge, in early 1900s. Credit: Evans Memorial Library, Aberdeen, MS. No date. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  20. 13. RAILROAD BRIDGE MISSISSIPPI, MONROE CO., ABERDEEN 1.5 mi. NW ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    13. RAILROAD BRIDGE MISSISSIPPI, MONROE CO., ABERDEEN 1.5 mi. NW of Amory. St. Louis and San Francisco RR bridge. Steam locomotive and coal train cross bridge on 10 August 1921. Credit: Owned by Jack Donnell, Columbus, Ms., photographer. Copied by Sarcone Photography, Columbus, Ms. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  1. Department of Defense Information Network (DODIN): A Study of Current Cyber Threats and Best Practices for Network Security

    DTIC Science & Technology

    2016-06-10

    DODIN) is being threatened by state actors, non-state actors, and continuous hacking and cyber-attacks. These threats against the network come in a...variety of forms; physical attacks from radio jamming, logical cyber threats from hacking , or a combination of both physical and logical attacks. Each...year the number of hacking attacks is increasing. Corporations like Symantec publish annual reports on cyber threats and provide tips for best

  2. 10. RAILROAD BRIDGE MISSISSIPPI, MONROE CO., AMORY Onehalf mile S ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    10. RAILROAD BRIDGE MISSISSIPPI, MONROE CO., AMORY One-half mile S of MS. 6, 1.5. mi. NW of Amory. Aerial view from SE, of St. Louis and San Francisco Railroad bridge. David Kaminsky, Architectural Photography, Atlanta Ga. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  3. 56. MISSISSIPPI, NOXUBEE CO. MACON HIGHWAY BRIDGE Ms. 14, 6 ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    56. MISSISSIPPI, NOXUBEE CO. MACON HIGHWAY BRIDGE Ms. 14, 6 miles E to McLeod, 4.5 miles S on McLeod-Shuqualak road. Mahorner's bridge (1884). View from E approach. Sarcone Photography, Atlanta, Ga. Aug. 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  4. STARTING EXCAVATION PIER 2. This view is roughly northeast, with ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    STARTING EXCAVATION PIER 2. This view is roughly northeast, with Pier 2 on the Trinity County end of the bridge. The old suspension bridge, at upper right, was upstream of new bridge - South Fork Trinity River Bridge, State Highway 299 spanning South Fork Trinity River, Salyer, Trinity County, CA

  5. 75. MISSISSIPPI, MONROE COUNTY, ARMORY COTTON GIN PORT BRIDGE Dirt ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    75. MISSISSIPPI, MONROE COUNTY, ARMORY COTTON GIN PORT BRIDGE Dirt road SW from Amory to River Cotton Gin Port road bridge. Copy of photo taken in 1932 by Jack Donnell, Columbus Mississippi. Sarcone Photography, Columbus, MS., Sept. 1978 - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  6. DETAIL VIEW OF SINGLE PANEL POINTS TAKEN FROM BRIDGE DECK, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    DETAIL VIEW OF SINGLE PANEL POINTS TAKEN FROM BRIDGE DECK, SHOWING CONNECTION BETWEEN VERTICAL AND UPPER CHORD MEMBER - White Bowstring Arch Truss Bridge, Spanning Yellow Creek at Cemetery Drive (Riverside Drive), Poland, Mahoning County, OH

  7. PERSPECTIVE NORTHEAST. NOTE TYPICAL NEW HAMPSHIRE COVERED BRIDGE HOUSING, WITH ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    PERSPECTIVE NORTHEAST. NOTE TYPICAL NEW HAMPSHIRE COVERED BRIDGE HOUSING, WITH UPPER PORTION OF TRUSSES LEFT EXPOSED AND VERTICAL PLANK SIDING COVERING THE LOWER PORTION. - Mechanic Street Bridge, Spanning Israel River, Lancaster, Coos County, NH

  8. The hacker ethic

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Granger, S.

    The hacker ethic can be a peculiar concept to those unfamiliar with hacking and what really is. In fact, the entire definition of hacking is somewhat obscure. Hacking originated as a challenge between programmers. Programmers at MIT are known for coining the term. Individuals would hack at code meaning that they would work at programming problems until they could maniuplate their computers into doing exactly what they wanted. The MIT hackers began with simple programs and moved on to fidding with UNIX machines, especially those on the Arpanet. Hackers started freely distributing their code to their friends and eventually tomore » their friends across the network. This gave rise to a notion that software should be free. Eventually this was taken to the extreme information and network access should also be free.« less

  9. 6. DETAIL VIEW OF SINGLE PANEL POINTS TAKEN FROM BRIDGE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. DETAIL VIEW OF SINGLE PANEL POINTS TAKEN FROM BRIDGE DECK, SHOWING CONNECTION BETWEEN VERTICAL AND UPPER CHORD MEMBER. - White Bowstring Arch Truss Bridge, Spanning Yellow Creek at Cemetery Drive (Riverside Drive), Poland, Mahoning County, OH

  10. 46. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    46. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st St. S., Columbus, Ms. Overall view, from S. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  11. 45. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    45. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st St. S., Columbus, Ms. Turn span from SE. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  12. 11. RAILROAD BRIDGE MISSISSIPPI, MONROE CO., AMORY Onehalf mi. S ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    11. RAILROAD BRIDGE MISSISSIPPI, MONROE CO., AMORY One-half mi. S of MS. 6, 1.5 mi. NW of Amory. Aerial view, close-up, from SE of St. Louis and San Francisco RR bridge. David Kaminsky, Architectural Photography, photographer, August 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  13. 50. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of St. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    50. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of St. S., Columbus, Ms. Side view of fixed truss span, from S. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  14. The Need for Specific Penalties for Hacking in Criminal Law

    PubMed Central

    Oh, Sangkyo; Lee, Kyungho

    2014-01-01

    In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA). Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. In this study, we analyze the definitions and the penalties for hacking for each country and compare them with the national law and then make suggestions through more specific legislation. We expect it will reduce legal controversy and prevent excessive punishment. PMID:25032236

  15. The need for specific penalties for hacking in criminal law.

    PubMed

    Oh, Sangkyo; Lee, Kyungho

    2014-01-01

    In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA). Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. In this study, we analyze the definitions and the penalties for hacking for each country and compare them with the national law and then make suggestions through more specific legislation. We expect it will reduce legal controversy and prevent excessive punishment.

  16. A Systems Approach to Healthcare Innovation Using the MIT Hacking Medicine Model.

    PubMed

    Gubin, Tatyana A; Iyer, Hari P; Liew, Shirlene N; Sarma, Aartik; Revelos, Alex; Ribas, João; Movassaghi, Babak; Chu, Zen M; Khalid, Ayesha N; Majmudar, Maulik D; Lee, Christopher Xiang

    2017-07-26

    MIT Hacking Medicine is a student, academic, and community-led organization that uses systems-oriented "healthcare hacking" to address challenges around innovation in healthcare. The group has organized more than 80 events around the world that attract participants with diverse backgrounds. These participants are trained to address clinical needs from the perspective of multiple stakeholders and emphasize utility and implementation viability of proposed solutions. We describe the MIT Hacking Medicine model as a potential method to integrate collaboration and training in rapid innovation techniques into academic medical centers. Built upon a systems approach to healthcare innovation, the time-compressed but expertly guided nature of the events could enable more widely accessible preliminary training in systems-level innovation methodology, as well as creating a structured opportunity for interdisciplinary congregation and collaboration. Copyright © 2017 Elsevier Inc. All rights reserved.

  17. [Natural or interactive kinds? The transient mental disorders in Ian Hacking's lectures at the Collège de France (2000-2006)].

    PubMed

    Delille, Emmanuel; Kirsch, Marc

    2016-12-01

    The concepts developed by Ian Hacking during his lectures at the Collège de France (2000-2006) have provided an important contribution to the debates within the field of philosophy of psychiatry. Professor at the Chair of Philosophy and History of Scientific Concepts after Michel Foucault, Hacking is the author of a reflection on the classification of mental disorders, which arises from the problem of the natural kinds. In order to explain the case studies developed in Hacking's Paris lectures, we first go back to the definition of a series of concepts, then we discuss the status of his scientific metaphors. Finally we analyze the relationship between the notions, respectively, of "transient mental illness" and "culture-bound syndrome". We emphasize that the latter derives from the Canadian transcultural psychiatry.

  18. 62. MISSISSIPPI, NOXUBEE CO. MACON Luxapalila Cr. ELEWETT'S BRIDGE On ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    62. MISSISSIPPI, NOXUBEE CO. MACON Luxapalila Cr. ELEWETT'S BRIDGE On Pickensville Rd., S of Columbus 4.5 miles S on McLeod-Shuqalak road. Copy of snapshot in Lowndes Co. Public Library. Dated Aug 1926, when bridge was completed. End of truss bridge from side of approach. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  19. 20. BLUEPRINT, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY L.% MI. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. BLUEPRINT, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY L.% MI. S of MS. 50 Proposed bridge, by Phoenis Bridge Co., Phoenixville, Pa. 218-foot turn span, with load bearing. 21 May 1914. Act. size: 16X35 in. Credit: Columbus and Greenville RR, Columbus, Ms. Sarcone Photography, Columbus, Ms. Sept 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  20. Reanalyzing Head et al. (2015): investigating the robustness of widespread p-hacking.

    PubMed

    Hartgerink, Chris H J

    2017-01-01

    Head et al. (2015) provided a large collection of p -values that, from their perspective, indicates widespread statistical significance seeking (i.e., p -hacking). This paper inspects this result for robustness. Theoretically, the p -value distribution should be a smooth, decreasing function, but the distribution of reported p -values shows systematically more reported p -values for .01, .02, .03, .04, and .05 than p -values reported to three decimal places, due to apparent tendencies to round p -values to two decimal places. Head et al. (2015) correctly argue that an aggregate p -value distribution could show a bump below .05 when left-skew p -hacking occurs frequently. Moreover, the elimination of p  = .045 and p  = .05, as done in the original paper, is debatable. Given that eliminating p  = .045 is a result of the need for symmetric bins and systematically more p -values are reported to two decimal places than to three decimal places, I did not exclude p  = .045 and p  = .05. I conducted Fisher's method .04 <  p  < .05 and reanalyzed the data by adjusting the bin selection to .03875 <  p  ≤ .04 versus .04875 <  p  ≤ .05. Results of the reanalysis indicate that no evidence for left-skew p -hacking remains when we look at the entire range between .04 <  p  < .05 or when we inspect the second-decimal. Taking into account reporting tendencies when selecting the bins to compare is especially important because this dataset does not allow for the recalculation of the p -values. Moreover, inspecting the bins that include two-decimal reported p -values potentially increases sensitivity if strategic rounding down of p -values as a form of p -hacking is widespread. Given the far-reaching implications of supposed widespread p -hacking throughout the sciences Head et al. (2015), it is important that these findings are robust to data analysis choices if the conclusion is to be considered unequivocal. Although no evidence of widespread left-skew p -hacking is found in this reanalysis, this does not mean that there is no p -hacking at all. These results nuance the conclusion by Head et al. (2015), indicating that the results are not robust and that the evidence for widespread left-skew p -hacking is ambiguous at best.

  1. Reanalyzing Head et al. (2015): investigating the robustness of widespread p-hacking

    PubMed Central

    2017-01-01

    Head et al. (2015) provided a large collection of p-values that, from their perspective, indicates widespread statistical significance seeking (i.e., p-hacking). This paper inspects this result for robustness. Theoretically, the p-value distribution should be a smooth, decreasing function, but the distribution of reported p-values shows systematically more reported p-values for .01, .02, .03, .04, and .05 than p-values reported to three decimal places, due to apparent tendencies to round p-values to two decimal places. Head et al. (2015) correctly argue that an aggregate p-value distribution could show a bump below .05 when left-skew p-hacking occurs frequently. Moreover, the elimination of p = .045 and p = .05, as done in the original paper, is debatable. Given that eliminating p = .045 is a result of the need for symmetric bins and systematically more p-values are reported to two decimal places than to three decimal places, I did not exclude p = .045 and p = .05. I conducted Fisher’s method .04 < p < .05 and reanalyzed the data by adjusting the bin selection to .03875 < p ≤ .04 versus .04875 < p ≤ .05. Results of the reanalysis indicate that no evidence for left-skew p-hacking remains when we look at the entire range between .04 < p < .05 or when we inspect the second-decimal. Taking into account reporting tendencies when selecting the bins to compare is especially important because this dataset does not allow for the recalculation of the p-values. Moreover, inspecting the bins that include two-decimal reported p-values potentially increases sensitivity if strategic rounding down of p-values as a form of p-hacking is widespread. Given the far-reaching implications of supposed widespread p-hacking throughout the sciences Head et al. (2015), it is important that these findings are robust to data analysis choices if the conclusion is to be considered unequivocal. Although no evidence of widespread left-skew p-hacking is found in this reanalysis, this does not mean that there is no p-hacking at all. These results nuance the conclusion by Head et al. (2015), indicating that the results are not robust and that the evidence for widespread left-skew p-hacking is ambiguous at best. PMID:28265523

  2. 35. BRIDGE, CONSTRUCTION MISSISSIPPI, LOWNDES CO. COLUMBUS End of Main ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    35. BRIDGE, CONSTRUCTION MISSISSIPPI, LOWNDES CO. COLUMBUS End of Main St., Columbus Bridge under construction, 1925-27. Photo from S side of W approach. Credit: Shenks Photography, Columbus, Ms, owner. O. Pruitt, photographer, ca. 1927. Copied by Sarcone Photography, columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  3. 61. MISSISSIPPI, NOXUBEE CO. MACON MAHORNER'S BRIDGE Ms. 14, 6 ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    61. MISSISSIPPI, NOXUBEE CO. MACON MAHORNER'S BRIDGE Ms. 14, 6 miles E to McLeod, 4.5 miles S on McLeod-Shuqualak road. Overall view of bridge, looking E along N side, from below deck level. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  4. 40. MISSISSIPPI, LOWNDES CO. COLUMBUS OLD ROAD BRIDGE End of ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    40. MISSISSIPPI, LOWNDES CO. COLUMBUS OLD ROAD BRIDGE End of Main St., Columbus 'Aerial' view of 1878 bridge during flood. Taken from water tower in Columbus. Credit: Shenks Photography, Columbus, Ms, owner. O. Pruitt, photographer, Apr 1892. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  5. 34. BRIDGE, CONSTRUCTION MISSISSIPPI, LOWNDES CO. COLUMBUS End of Main ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    34. BRIDGE, CONSTRUCTION MISSISSIPPI, LOWNDES CO. COLUMBUS End of Main St., Columbus Date: 1925-27. Old bridge in background. Photo taken from such (probably east) bank. Credit: Shenks Photography, Columbus, Ms, owner. O. Pruitt, photographer, ca. 1927. Copied by Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  6. 64. MISSISSIPPI, LOWNDES CO. COLUMBUS BLEWETT'S BRIDGE On Pickensville Rd., ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    64. MISSISSIPPI, LOWNDES CO. COLUMBUS BLEWETT'S BRIDGE On Pickensville Rd., S of Columbus 4.5 miles S on McLeod-Shuqualak road. Copy of snapshot in Lowndes Co. Public Library. Date Aug 1926, when bridge was completed. View of underside. Sarcone Photography, Columbus, MS. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  7. 39. MISSISSIPPI, LOWNDES CO. COLUMBUS OLD ROAD BRIDGE End of ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    39. MISSISSIPPI, LOWNDES CO. COLUMBUS OLD ROAD BRIDGE End of Main St., Columbus Both spans of 1878 bridge during flood. Taken from top of the E approach. Credit: Shenks Photography, Columbus, Ms, owner. O. Pruitt, photographer, Apr. 8 1882. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  8. Brief communication: Possible explanation of the values of Hack's drainage basin, river length scaling exponent

    NASA Astrophysics Data System (ADS)

    Hunt, Allen G.

    2016-04-01

    Percolation theory can be used to find water flow paths of least resistance. Application of percolation theory to drainage networks allows identification of the range of exponent values that describe the tortuosity of rivers in real river networks, which is then used to generate the observed scaling between drainage basin area and channel length, a relationship known as Hack's law. Such a theoretical basis for Hack's law may allow interpretation of the range of exponent values based on an assessment of the heterogeneity of the substrate.

  9. Explanation of the values of Hack's drainage basin, river length scaling exponent

    NASA Astrophysics Data System (ADS)

    Hunt, A. G.

    2015-08-01

    Percolation theory can be used to find water flow paths of least resistance. The application of percolation theory to drainage networks allows identification of the range of exponent values that describe the tortuosity of rivers in real river networks, which is then used to generate the observed scaling between drainage basin area and channel length, a relationship known as Hack's law. Such a theoretical basis for Hack's law allows interpretation of the range of exponent values based on an assessment of the heterogeneity of the substrate.

  10. Simulations of Fluvial Landscapes

    NASA Astrophysics Data System (ADS)

    Cattan, D.; Birnir, B.

    2013-12-01

    The Smith-Bretherton-Birnir (SBB) model for fluvial landsurfaces consists of a pair of partial differential equations, one governing water flow and one governing the sediment flow. Numerical solutions of these equations have been shown to provide realistic models in the evolution of fluvial landscapes. Further analysis of these equations shows that they possess scaling laws (Hack's Law) that are known to exist in nature. However, the simulations are highly dependent on the numerical methods used; with implicit methods exhibiting the correct scaling laws, but the explicit methods fail to do so. These equations, and the resulting models, help to bridge the gap between the deterministic and the stochastic theories of landscape evolution. Slight modifications of the SBB equations make the results of the model more realistic. By modifying the sediment flow equation, the model obtains more pronounced meandering rivers. Typical landsurface with rivers.

  11. 47. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    47. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st St. S., Columbus, Ms. Latching mechanism, E end of turn span, viewed from W. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  12. 48. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    48. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st St. S., Columbus, Ms Latching mechanism, E end of turn span, view from N. Sarcone Photography, Columbus, MS. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  13. 41. MISSISSIPPI, LOWNDES CO. COLUMBUS OLD ROAD BRIDGE End of ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    41. MISSISSIPPI, LOWNDES CO. COLUMBUS OLD ROAD BRIDGE End of Main St., Columbus View of iron truss bridge, 1878-1928, from NW bank. Shows details of web members, and piers. Credit: Shenks Photography, Columbus, Ms, owner. O. Pruitt, photographer, early 1900s. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  14. 21. RAILROAD, RR. BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    21. RAILROAD, RR. BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. S of Ms. 50 Proposed 218-foot turn span, design #2339 of Virginia Bridge and Iron Co., Roanoke, Va. 13 May 1914. Act. size: 16x11 in. Credit: Columbus & Greenville RR, Columbus, Ms. Sarcone Photography, Columbus, Ms. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  15. 18. BLUEPRINT, RR BRIDGE Tombigbee R. MISSISSIPPI, CLAY CO., WAVERLY ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. BLUEPRINT, RR BRIDGE Tombigbee R. MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. S of MS 50 Detail: 'Georgia Pacific Rwy. -- Tombigbee River Bridge Elevation' with river profile, May 16, 1888. Credit: Columbus and Greenville Rr, Columbus, Ms. DWG = S-3-342. Sarcone Photography, Columbus, Ms Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  16. 63. MISSISSIPPI, LOWNDES CO. COLUMBUS BLEWETT'S BRIDGE On Pickensville Rd., ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    63. MISSISSIPPI, LOWNDES CO. COLUMBUS BLEWETT'S BRIDGE On Pickensville Rd., S of Columbus 4.5 miles S on McLeod-Shuqualak road. Copy of snapshot in Lowndes Co. Public Library. Dated Aug 1926, when bridge was completed. View is lengthwise, through the truss. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  17. 49. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    49. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st St. S., Columbus, Ms. Top of pier and underside of w end of turn span. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  18. 60. MISSISSIPPI, NOXUBEE CO. MACON MAHORNER' S BRIDGE, 1884, 4.5 ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    60. MISSISSIPPI, NOXUBEE CO. MACON MAHORNER' S BRIDGE, 1884, 4.5 miles S on McLeod-Shuqualak road. Bottom of swing span and top of center pier. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  19. 78 FR 79312 - Drawbridge Operation Regulation; Upper Mississippi River, Rock Island, IL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-30

    ...The Coast Guard has issued a temporary deviation from the operating schedule that governs the Rock Island Railroad and Highway Drawbridge across the Upper Mississippi River, mile 482.9, at Rock Island, Illinois. The deviation is necessary to allow the St. Patrick's Day Road Race to cross the bridge. This deviation allows the bridge to be maintained in the closed-to-navigation position for two hours.

  20. 44. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    44. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st St. S., Columbus, Ms. Detail from Camille Drie's map: A Bird's Eye View of Columbus, Mississippi ca. 1875-76. Shows M&O RR bridge before the Phoenix Bridge Co. erected iron truss spans in 1878. Credit: Photostat of map in Lowndes Co. Public Library Sarcone Photography, Columbus, Ms. 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  1. 58. MISSISSIPPI, NOXUBEE CO. MACON MAHORNER'S BRIDGE, 1884, Ms. 14, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    58. MISSISSIPPI, NOXUBEE CO. MACON MAHORNER'S BRIDGE, 1884, Ms. 14, E 6.5 mi. to McLeod, 4.5 miles S on McLeod-Shuqualak road. Mahorner's bridge (1884). Lower panel point, west span. View is at right-angles to the bridge and from below deck level. show pin connection, floor beams, and stringers. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  2. Flood-plain study of the Upper Iowa River in the vicinity of Decorah, Iowa

    USGS Publications Warehouse

    Christiansen, Daniel E.; Eash, David A.

    2008-01-01

    The city of Decorah, Iowa, has experienced severe flooding from the Upper Iowa River resulting in property damage to homes and businesses. Streamflow data from two U.S. Geological Survey (USGS) streamflow-gaging stations, the Upper Iowa River at Decorah, Iowa (station number 05387500), located upstream from the College Drive bridge; and the Upper Iowa River near Decorah, Iowa (station number 05388000), at the Clay Hill Road bridge (locally known as the Freeport bridge) were used in the study. The three largest floods on the Upper Iowa River at Decorah occurred in 1941, 1961, and 1993, for which the estimated peak discharges were 27,200 cubic feet per second (ft3/s), 20,200 ft3/s, and 20,500 ft3/s, respectively. Flood-discharge information can be obtained from the World Wide Web at URL (uniform resource locator) http://waterdata.usgs.gov/nwis/. In response to the need to provide the City of Decorah and other flood-plain managers with an assessment of the risks of flooding to properties and facilities along an 8.5-mile (mi) reach of the Upper Iowa River, the USGS, in cooperation with the City of Decorah, initiated a study to map 100- and 500-year flood-prone areas.

  3. Hacking Around.

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    1999-01-01

    Discusses a complicated appellate-court case upholding a Milwaukee high-school junior's expulsion for advocating computer hacking in a student newspaper. The decision is noteworthy for signaling a growing technology-related litigation trend, conflating the advocacy/incitement issue, and showing courts' decreasing tolerance for perceived threats to…

  4. The medial temporal lobe—conduit of parallel connectivity: a model for attention, memory, and perception

    PubMed Central

    Mozaffari, Brian

    2014-01-01

    Based on the notion that the brain is equipped with a hierarchical organization, which embodies environmental contingencies across many time scales, this paper suggests that the medial temporal lobe (MTL)—located deep in the hierarchy—serves as a bridge connecting supra- to infra—MTL levels. Bridging the upper and lower regions of the hierarchy provides a parallel architecture that optimizes information flow between upper and lower regions to aid attention, encoding, and processing of quick complex visual phenomenon. Bypassing intermediate hierarchy levels, information conveyed through the MTL “bridge” allows upper levels to make educated predictions about the prevailing context and accordingly select lower representations to increase the efficiency of predictive coding throughout the hierarchy. This selection or activation/deactivation is associated with endogenous attention. In the event that these “bridge” predictions are inaccurate, this architecture enables the rapid encoding of novel contingencies. A review of hierarchical models in relation to memory is provided along with a new theory, Medial-temporal-lobe Conduit for Parallel Connectivity (MCPC). In this scheme, consolidation is considered as a secondary process, occurring after a MTL-bridged connection, which eventually allows upper and lower levels to access each other directly. With repeated reactivations, as contingencies become consolidated, less MTL activity is predicted. Finally, MTL bridging may aid processing transient but structured perceptual events, by allowing communication between upper and lower levels without calling on intermediate levels of representation. PMID:25426036

  5. 2. IRONWOOD BLUFFS BRIDGE MISSISSIPPI, ITAWAMBA CO. One mile W ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    2. IRONWOOD BLUFFS BRIDGE MISSISSIPPI, ITAWAMBA CO. One mile W of Ms. 25 on dirt road 2.5 mi. N of Bull Mtn. Cr. Oblique view of N truss from E end. Sarcone Photography, Columbus, Ms. September 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  6. 3. IRONWOOD BLUFFS BRIDGE MISSISSIPPI, ITAWAMBA CO. One mile W ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    3. IRONWOOD BLUFFS BRIDGE MISSISSIPPI, ITAWAMBA CO. One mile W of Ms. 25 on dirt road 2.5 mi. N of Bull Mtn. Cr. View from S side of E approach. Sarcone Photography, Columbus, Ms. September 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  7. 4. IRONWOOD BLUFFS BRIDGE MISSISSIPPI, ITAWAMBA CO. One mile W ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    4. IRONWOOD BLUFFS BRIDGE MISSISSIPPI, ITAWAMBA CO. One mile W of Ms. 25 on dirt road 2.5 mi. N of Bull Mtn. Cr. View from N, wide angle. Sarcone Photography, Columbus, Ms. September 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  8. 42. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    42. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st St. S., Columbus, Ms. Copy of postcard ca. 1900. Copy owned and made by Jack Donnell, Columbus, Ms. Shows two-span steel truss, built by Phoenix Bridge Co. in 1878. Negative copied by: Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  9. 23. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    23. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. S of MS. 50 Southern R'wy Co. in Ms. Repairs to Tombigbee River Bridge' gears and turn machinery. DWG # S. 30303. Scale: 1-1/2' = l'. July 21, 1913. Credit: Columbus & Greenville RR, Columbus, Ms. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  10. 22. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    22. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. S of MS. 50 Proposed 218-foot turn span, submitted by the Wisconsin Bridge & Iron Co., Milwaukee, Wisconsin 8 May 1914. Act size: approx. 23x34 in. Credit: Columbus & Greenville RR, Columbus, Ms. Sarcone Photography, Columbus, MS. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  11. 27. RAILROAD, RR. BRIDGE MISSISSIPPI, CLAY CO. WAVERLY 1.5 mi. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    27. RAILROAD, RR. BRIDGE MISSISSIPPI, CLAY CO. WAVERLY 1.5 mi. S of MS. 50 Stress Sheet of 1888 Bridge: Conroy & Sinks, Consulting Engineers, Chicago. July 21, 1910. DWG #978. Act. size around border: 18x11 in. Credit: Columbus and Greenville RR, Columbus, Ms. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  12. SFU Hacking for Non-Hackers v. 1.005

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carter, David James

    The program provides a limited virtual environment for exploring some concepts of computer hacking. It simulates a simple computer system with intentional vulnerabilities, allowing the user to issue commands and observe their results. It does not affect the computer on which it runs.

  13. Ethical Hacking in Information Security Curricula

    ERIC Educational Resources Information Center

    Trabelsi, Zouheir; McCoey, Margaret

    2016-01-01

    Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…

  14. 5. IRONWOOD BLUFFS BRIDGE MISSISSIPPI, ITAWAMBA CO. One mile W ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    5. IRONWOOD BLUFFS BRIDGE MISSISSIPPI, ITAWAMBA CO. One mile W of Ms. 25 on dirt road 2.5 mi. N of Bull Mtn. Cr. View of underside from NE shore, showing lower panel point, lateral bracing. Sarcone Photography, Columbus, Ms. September 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  15. 26. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    26. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. S of MS. 50 Proposed 218-foot deck, plate-girder turn span, submitted by the Wisconsin Bridge and Iron Co., Milwaukee, Wisc. May 15 1914. Act size: approx. 23x34 in. Credit: columbus and Greenville RR, Columbus, Ms. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  16. 25. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    25. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. S of MS. 50 Proposed 218-foot turn span, submitted by the American Bridge Co., Pittsburg, Pa., 15 May 1914. Inquiry # P-19242. Act. size: approx: 23x24 in. Credit: Columbus and Greenville RR, columbus, MS. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  17. 38. MISSISSIPPI, LOWNDES CO. COLUMBUS OLD ROAD BRIDGE End of ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    38. MISSISSIPPI, LOWNDES CO. COLUMBUS OLD ROAD BRIDGE End of Main St., Columbus Show/fabrication details of patented arch truss of Wrought Iron Bridge Co., Canton, Ohio. Taken from middle of swing span looking W toward arch span. Credit: Shenks Photography, Columbus, Ms, owner. O. Pruitt, photographer, ca. 1927-28. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  18. Quantifying uranium transport rates and storage of fluvially eroded mine tailings from a historic mine site in the Grand Canyon Region

    NASA Astrophysics Data System (ADS)

    Skalak, K.; Benthem, A. J.; Walton-Day, K. E.; Jolly, G.

    2015-12-01

    The Grand Canyon region contains a large number of breccia pipes with economically viable uranium, copper, and silver concentrations. Mining in this region has occurred since the late 19th century and has produced ore and waste rock having elevated levels of uranium and other contaminants. Fluvial transport of these contaminants from mine sites is a possibility, as this arid region is susceptible to violent storms and flash flooding which might erode and mobilize ore or waste rock. In order to assess and manage the risks associated with uranium mining, it is important to understand the transport and storage rates of sediment and uranium within the ephemeral streams of this region. We are developing a 1-dimensional sediment transportation model to examine uranium transport and storage through a typical canyon system in this region. Our study site is Hack Canyon Mine, a uranium and copper mine site, which operated in the 1980's and is currently experiencing fluvial erosion of its waste rock repository. The mine is located approximately 40km upstream from the Colorado River and is in a deep, narrow canyon with a small watershed. The stream is ephemeral for the upper half of its length and sediment is primarily mobilized during flash flood events. We collected sediment samples at 110 locations longitudinally through the river system to examine the distribution of uranium in the stream. Samples were sieved to the sand size and below fraction (<2mm) and uranium was measured by gamma-ray spectroscopy. Sediment storage zones were also examined in the upper 8km of the system to determine where uranium is preferentially stored in canyon systems. This information will quantify the downstream transport of constituents associated with the Hack Canyon waste rock and contribute to understanding the risks associated with fluvial mobilization of uranium mine waste.

  19. 24. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    24. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. S of MS. 50 Southern R'wy; Co., in Ms. Present and proposed draw bridge over Tombigbee River.' Elevations and Plan, with falsework. Wisconsin Bridge and Iron Co., Milwaukee, Wisc., DWG #S. 3-303. Last Revision, Jan. 11 1915. Act. size: 23x34 in. Credit: Columbus and Greenville Rr, Columbus, Ms. Sarcone Photography, Columbus, MS. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  20. The first SPIE software Hack Day

    NASA Astrophysics Data System (ADS)

    Kendrew, S.; Deen, C.; Radziwill, N.; Crawford, S.; Gilbert, J.; Gully-Santiago, M.; Kubánek, P.

    2014-07-01

    We report here on the software Hack Day organised at the 2014 SPIE conference on Astronomical Telescopes and Instrumentation in Montréal. The first ever Hack Day to take place at an SPIE event, the aim of the day was to bring together developers to collaborate on innovative solutions to problems of their choice. Such events have proliferated in the technology community, providing opportunities to showcase, share and learn skills. In academic environments, these events are often also instrumental in building community beyond the limits of national borders, institutions and projects. We show examples of projects the participants worked on, and provide some lessons learned for future events.

  1. Hack's relation and optimal channel networks: The elongation of river basins as a consequence of energy minimization

    NASA Astrophysics Data System (ADS)

    Ijjasz-Vasquez, Ede J.; Bras, Rafael L.; Rodriguez-Iturbe, Ignacio

    1993-08-01

    As pointed by Hack (1957), river basins tend to become longer and narrower as their size increases. This work shows that this property may be partially regarded as the consequence of competition and minimization of energy expenditure in river basins.

  2. SafeSlinger: An Easy-to-use and Secure Approach for Human Trust Establishment

    DTIC Science & Technology

    2012-03-12

    communication modalities (Bluetooth, WiFi , 4G), camera, and sensors. Unfortunately, smartphone platforms suffer from many risks. Vulnerabilities exist in...December 2010. [31] Dave Neal. Defcon hackers get hacked over 4G. http://www.theinquirer.net/inquirer/news/ 16 2100989/defcon-hackers- hacked -4g

  3. Internet Attack Traceback: Cross-Validation and Pebble-Trace

    DTIC Science & Technology

    2013-02-28

    stolen-cyber-attack. [3] Hacked: Data breach costly for Ohio State, victims of compromised info http://www.thelantern.com/campus/hacked- data ... breach -costly-for-ohio-state-victims-of-compromised-info-1.1831311. [4] S. C. Lee and C. Shields, “Tracing the Source of Network Attack: A Technical

  4. 19. BLUEPRINT, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. BLUEPRINT, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. S of Ms. 50 Map of Tombigbee River at Waverly, 'Proposed Crossing.' 12 May 1888. Credt: Columbus & Greenville, RR, Columbus, Ms. DWG S-3-343. Sarcone Photography, ColumbuS, Ms. Sept 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  5. 37. MISSISSIPPI, LOWNDES CO. COLUMBUS BRIDGE, CONSTRUCTION End of Main ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    37. MISSISSIPPI, LOWNDES CO. COLUMBUS BRIDGE, CONSTRUCTION End of Main St., Columbus Overhead view of round, swing pier, showing steel reinforcing rods, workmen. During construction, 1925-27. Credit: Shenks Photography, Columbus, Ms, owner. O. Pruitt, photographer, ca. 1926. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  6. 33. BRIDGE, CONSTRUCTION MISSISSIPPI, LOWNDES CO. COLUMBUS End of Main ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    33. BRIDGE, CONSTRUCTION MISSISSIPPI, LOWNDES CO. COLUMBUS End of Main St., Columbus Center and east pier, with framing, makes panorama with preceding photo. Date: 1925-27. Credit: Shenks Photographi, Columbus, Ms. owner. O. Pruitt, photographer, ca. 1926 Copied by Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  7. 36. MISSISSIPPI, LOWNDES CO. COLUMBUS Tombigbee R. NEW & OLD ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    36. MISSISSIPPI, LOWNDES CO. COLUMBUS Tombigbee R. NEW & OLD HIGHWAY BRIDGES End of Main St., Columbus Photo, 1927-28, after new bridge (foreground) was completed. From SW bank. Credit: Shenks Photography, Columbus, Ms. owner. O. Pruitt, photographer, ca. 1928. Copied by Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  8. 8. OLD AMORYBIGBEE BRIDGE MISSISSIPPI, MONROE CO., AMORY MS. 6, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    8. OLD AMORY-BIGBEE BRIDGE MISSISSIPPI, MONROE CO., AMORY MS. 6, 1.5 mi. NW of Amory. Road 2.5 mi. N of Bull Mtn. Cr. Copy of 8x10 photo taken at completion of work, 1899. Swing bridge is fully open. View from S. Credit to Evans Memorial Library, Aberdeen, Ms. Sarcone Photography, Columbus, Ms. September 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  9. 74. MISSISSIPPI, NOXUBEE CO., MACON MAHORNER' S BRIDGE E on ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    74. MISSISSIPPI, NOXUBEE CO., MACON MAHORNER' S BRIDGE E on Ms. 14 6.5 mi. to McLeod. S 4.5 miles S on McLeod-Shuqualak road. Mahorner's bridge (1884). Lower panel point, S side of W end of turn span. View looks W. shows pin connection at right angles to pin. Sarcone Photography, Columbus, Ms., Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  10. 6. OLD AMORYBIGBEE BRIDGE Tombigbee R. MISSISSIPPI, MONROE CO., AMORY ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. OLD AMORY-BIGBEE BRIDGE Tombigbee R. MISSISSIPPI, MONROE CO., AMORY MS. 6, 1.5 mi. NW of Amory. Road 2.5 mi. N of Bull Mtn. Cr. Copy of 8x10 photo taken at completion of work, 1899. Swing bridge is fully open. View from S. Credit to Evans Memorial Library, Aberdeen, Ms. Sarcone Photography, Columbus, Ms. September 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  11. 7. OLD AMORYBIGBEE BRIDGE MISSISSIPPI, MONROE CO., AMORY MS. 6, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    7. OLD AMORY-BIGBEE BRIDGE MISSISSIPPI, MONROE CO., AMORY MS. 6, 1.5 mi. NW of Amory. Road 2.5 mi. N of Bull Mtn. Cr. Copy of 8x10 photo taken at completion of work, 1899. Swing bridge is fully open. View from S. Credit to Evans Memorial Library, Aberdeen, Ms. Sarcone Photography, Columbus, Ms. September 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  12. 33 CFR 117.671 - Upper Mississippi River.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Upper Mississippi River. 117.671 Section 117.671 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Minnesota § 117.671 Upper Mississippi River. (a) The...

  13. 33 CFR 117.671 - Upper Mississippi River.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Upper Mississippi River. 117.671 Section 117.671 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Minnesota § 117.671 Upper Mississippi River. (a) The...

  14. 33 CFR 117.671 - Upper Mississippi River.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Upper Mississippi River. 117.671 Section 117.671 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Minnesota § 117.671 Upper Mississippi River. (a) The...

  15. 33 CFR 117.1103 - Upper Mississippi River.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Upper Mississippi River. 117.1103 Section 117.1103 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Wisconsin § 117.1103 Upper Mississippi River. See...

  16. 33 CFR 117.1103 - Upper Mississippi River.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Upper Mississippi River. 117.1103 Section 117.1103 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Wisconsin § 117.1103 Upper Mississippi River. See...

  17. 33 CFR 117.1103 - Upper Mississippi River.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Upper Mississippi River. 117.1103 Section 117.1103 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Wisconsin § 117.1103 Upper Mississippi River. See...

  18. 33 CFR 117.1103 - Upper Mississippi River.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Upper Mississippi River. 117.1103 Section 117.1103 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Wisconsin § 117.1103 Upper Mississippi River. See...

  19. 33 CFR 117.1103 - Upper Mississippi River.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Upper Mississippi River. 117.1103 Section 117.1103 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Wisconsin § 117.1103 Upper Mississippi River. See...

  20. 14. UPPER SHOES, FIXED SHOES, ROLLER SHOES, CENTER WEB, AND ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    14. UPPER SHOES, FIXED SHOES, ROLLER SHOES, CENTER WEB, AND ROLLER BED PLATES. (Also includes a sheet index and a schedule of parts). American Bridge Company, Ambridge Plant No. 5, sheet no. 4, dated April 7, 1928, order no. F5073. For U.S. Steel Products Company, Pacific Coast Depot, order no. SF578. For Southern Pacific Company, order no. 8873-P-28746. various scales. - Napa River Railroad Bridge, Spanning Napa River, east of Soscol Avenue, Napa, Napa County, CA

  1. 78 FR 28139 - Drawbridge Operation Regulation; Tuckahoe River, Between Corbin City and Upper Township, NJ

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-14

    ... Operation Regulation; Tuckahoe River, Between Corbin City and Upper Township, NJ AGENCY: Coast Guard, DHS... River, mile 8.0, between Corbin City and Upper Township, NJ. The deviation is necessary to facilitate... operating schedule, the State Highway Bridge, mile 8.0, between Corbin City and Upper Township, NJ shall...

  2. Connected Learning in the Library as a Product of Hacking, Making, Social Diversity and Messiness

    ERIC Educational Resources Information Center

    Bilandzic, Mark

    2016-01-01

    Learning is most effective when intrinsically motivated through personal interest, and situated in a supportive socio-cultural context. This paper reports on findings from a study that explored implications for design of interactive learning environments through 18 months of ethnographic observations of people's interactions at "Hack The…

  3. Ian Hacking, Learner Categories and Human Taxonomies

    ERIC Educational Resources Information Center

    Davis, Andrew

    2008-01-01

    I use Ian Hacking's views to explore ways of classifying people, exploiting his distinction between indifferent kinds and interactive kinds, and his accounts of how we "make up" people. The natural kind/essentialist approach to indifferent kinds is explored in some depth. I relate this to debates in psychiatry about the existence of mental…

  4. A Hands-On Approach for Teaching Denial of Service Attacks: A Case Study

    ERIC Educational Resources Information Center

    Trabelsi, Zouheir; Ibrahim, Walid

    2013-01-01

    Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…

  5. Second generation bioethanol production from Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.

    Treesearch

    Danilo Scordia; Salvatore L. Consentino; Thomas W. Jeffries

    2010-01-01

    Saccharum (Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.), is a rapidly growing, wide ranging high-yield perennial, suitable for second generation bioethanol production. This study evaluated oxalic acid as a pretreatment for bioconversion. Overall sugar yields, sugar degradation products, enzymatic glucan hydrolysis and ethanol production were studied as...

  6. p-Curve and p-Hacking in Observational Research.

    PubMed

    Bruns, Stephan B; Ioannidis, John P A

    2016-01-01

    The p-curve, the distribution of statistically significant p-values of published studies, has been used to make inferences on the proportion of true effects and on the presence of p-hacking in the published literature. We analyze the p-curve for observational research in the presence of p-hacking. We show by means of simulations that even with minimal omitted-variable bias (e.g., unaccounted confounding) p-curves based on true effects and p-curves based on null-effects with p-hacking cannot be reliably distinguished. We also demonstrate this problem using as practical example the evaluation of the effect of malaria prevalence on economic growth between 1960 and 1996. These findings call recent studies into question that use the p-curve to infer that most published research findings are based on true effects in the medical literature and in a wide range of disciplines. p-values in observational research may need to be empirically calibrated to be interpretable with respect to the commonly used significance threshold of 0.05. Violations of randomization in experimental studies may also result in situations where the use of p-curves is similarly unreliable.

  7. 35. DETAIL OF COMPLETE APRONTOFLOAT LOCKING MECHANISM AND RAILS ON ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    35. DETAIL OF COMPLETE APRON-TO-FLOAT LOCKING MECHANISM AND RAILS ON BRIDGE NO. 11. LOOKING NORTH. - Greenville Yard, Transfer Bridge System, Port of New York/New Jersey, Upper New York Bay, Jersey City, Hudson County, NJ

  8. 9. LOADED CAR FLOAT AND TUG IN THE PROCESS OF ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    9. LOADED CAR FLOAT AND TUG IN THE PROCESS OF DOCKING AT BRIDGE NO. 11. LOOKING EAST. - Greenville Yard, Transfer Bridge System, Port of New York/New Jersey, Upper New York Bay, Jersey City, Hudson County, NJ

  9. 6. VIEW FROM SOUTHERN FOOT BRIDGE ABOVE INTAKE STRUCTURE EASTERLY ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. VIEW FROM SOUTHERN FOOT BRIDGE ABOVE INTAKE STRUCTURE EASTERLY TOWARD UPSTREAM SIDE OF SPILLWAY - Upper Doughty Dam, 200 feet west of Garden State Parkway, 1.7 miles west of Absecon, Egg Harbor City, Atlantic County, NJ

  10. 43. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    43. MISSISSIPPI, LOWNDES CO. COLUMBUS RAILROAD BRIDGE End of 1st St. S., Columbus, Ms. Copy of photo 1900. Shows 1878 M&O RR bridge. The steamboat, 'Gopher,' in foreground, was an archeological survey vessel from the Franklin Institute in Philadelphia. Published in Art in Mississippi (1901). Credit: Copied from print in Lowndes Co. Public Library by Sarcone Photography, Columbus, Ms. 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  11. 30. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    30. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5 mi. S of MS. 50 Detail: Turn machinery. DWG S-3-325. Contr. #7236. Lower right quarter of sheet: Lateral elevation of turn table. July 1914. Credit: Columbus and Greenville RR, Columbus, MS. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  12. 29. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5. mi. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    29. RAILROAD, RR BRIDGE MISSISSIPPI, CLAY CO., WAVERLY 1.5. mi. S of MS. 50 Detail: Turn machinery. DWG S-3-325. Contr. #7236. Lower right quarter of sheet: Lateral elevation of turn table. July 1914. Credit: Columbus and Greenville RR, Columbus, Ms. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  13. 9. RAILROAD BRIDGE Tombigbee R. MISSISSIPPI, MONROW CO., AMORY Onehalf ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    9. RAILROAD BRIDGE Tombigbee R. MISSISSIPPI, MONROW CO., AMORY One-half mile S of MS. 6, 1.5 mi. NW of Amory. Copy of 8x10 aerial photo, about 1960, from S. Credit to St. Louis and San Francisco Railroad. Sarcone Photography, Columbus, Ms. September 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  14. 33 CFR 117.897 - Willamette River.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...)(i) Broadway Bridge, mile 11.7, from 8 a.m. to 5 p.m. Monday through Friday, one hour's notice shall.... (ii) Steel Bridge (upper deck only), Portland, mile 12.1. From 8 a.m. to 5 p.m. Monday through Friday.... (iii) Burnside Bridge, mile 12.4, from 8 a.m. to 5 p.m. Monday through Friday, one hour's notice shall...

  15. 30. BEARING SHOE / VERTICAL / DIAGONAL / UPPER AND ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    30. BEARING SHOE / VERTICAL / DIAGONAL / UPPER AND LOWER CHORD DETAIL OF DECK TRUSS. VIEW TO NORTHEAST. - Abraham Lincoln Memorial Bridge, Spanning Missouri River on Highway 30 between Nebraska & Iowa, Blair, Washington County, NE

  16. 20. DETaIL VIEW OF UPPER EAST WALL CONTROL STATION, SHOWING ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. DETaIL VIEW OF UPPER EAST WALL CONTROL STATION, SHOWING EMERGENCY BULKHEAD STIFFLEG DERRICK, MAIN LOCK PEDESTRIAN BRIDGE, RECESSES FOR MAIN LOCK LIFT GATE, AND TILE GAUGES, LOOKING SOUTHEAST - Upper Mississippi River 9-Foot Channel Project, Lock & Dam 27, Granite City, Madison County, IL

  17. 78 FR 64887 - Drawbridge Operation Regulation; Upper Mississippi River, Hannibal, MO

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-30

    ... Operation Regulation; Upper Mississippi River, Hannibal, MO AGENCY: Coast Guard, DHS. ACTION: Notice of... operating schedule that governs the Hannibal Railroad Drawbridge across the Upper Mississippi River, mile 309.9, at Hannibal, Missouri. The deviation is necessary to allow the bridge owner time to replace...

  18. 34. DETAIL OF APRONTOFLOAT LOCKING PIN SOCKETS AND SUSPENSION CABLES ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    34. DETAIL OF APRON-TO-FLOAT LOCKING PIN SOCKETS AND SUSPENSION CABLES ON BRIDGE NO. 9. LOOKING NORTH. - Greenville Yard, Transfer Bridge System, Port of New York/New Jersey, Upper New York Bay, Jersey City, Hudson County, NJ

  19. 14. DETAIL VIEW OF SERVICE BRIDGE, SHOWING TRAVELLING CRANE AND ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    14. DETAIL VIEW OF SERVICE BRIDGE, SHOWING TRAVELLING CRANE AND TAINTER GATE PIER WITH RECESSES FOR EMERGENCY BULKHEADS AND BULKHEAD DOGGING DEVICES, LOOKING NORTHEAST - Upper Mississippi River 9-Foot Channel Project, Lock & Dam 26R, Alton, Madison County, IL

  20. Maintenance and design of steel abutment piles in Iowa bridges.

    DOT National Transportation Integrated Search

    2014-09-01

    Soil consolidation and erosion caused by roadway runoff have exposed the upper portions of steel piles at the abutments of : numerous bridges, leaving them susceptible to accelerated corrosion rates due to the abundance of moisture, oxygen, and : chl...

  1. 75 FR 22228 - Drawbridge Operation Regulations; Upper Mississippi River, Rock Island, IL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-28

    ... necessary to allow the Quad Cities Marathon to cross the bridge. This deviation allows the bridge to be... for a four hour period while a marathon is held between the cities of Davenport, IA and Rock Island...

  2. Can a biologist fix a smartphone?-Just hack it!

    PubMed

    Kamoun, Sophien

    2017-05-08

    Biological systems integrate multiscale processes and networks and are, therefore, viewed as difficult to dissect. However, because of the clear-cut separation between the software code (the information encoded in the genome sequence) and hardware (organism), genome editors can operate as software engineers to hack biological systems without any particularly deep understanding of the complexity of the systems.

  3. Employing Two Factor Authentication Mechanisms: A Case Study

    ERIC Educational Resources Information Center

    Lawrence, Cameron; Fulton, Eric; Evans, Gerald; Firth, David

    2014-01-01

    This case study examines the life of a digital native who has her online accounts hacked, passwords reset, and is locked out of important online resources including her university email account and Facebook. Part one of the case study examines how the hack was perpetrated and the fallout of losing control of one's digital identity. Part two of the…

  4. 32. BRIDGE, CONSTRUCTION Tombigbee R. MISSISSIPPI, LOWNDES CO. COLUMBUS End ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    32. BRIDGE, CONSTRUCTION Tombigbee R. MISSISSIPPI, LOWNDES CO. COLUMBUS End of Main St., Columbus Center and east pier, with framing, during construction, 1925-27. Makes panorama with next photo. Note steam crane on framing. Credit: Shenks Photography, Columbus, MS, owner. O. Pruitt, photographer. Copied by Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  5. 68. MISSISSIPPI, LOWNDES CO. COLUMBUS MAP OF COLUMBUS ca. 1875 ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    68. MISSISSIPPI, LOWNDES CO. COLUMBUS MAP OF COLUMBUS ca. 1875 BIRD'S EYE VIEW OF COLUMBUS MISSISSIPPI by Camille Drie ca. 1875. Copy of snapshot in Lowndes Co. Public Library, Columbus, Ms. Snow status in early 1870s: includes M&O RR bridge, but no highway bridge. Sarcone Photography, Columbus, Ms., Sept 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  6. 8. VIEW FROM NORTHERN FOOT BRIDGE ABOVE INTAKE STRUCTURE EAST ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    8. VIEW FROM NORTHERN FOOT BRIDGE ABOVE INTAKE STRUCTURE EAST TOWARD UPSTREAM BANK OF NORTH SIDE OF DAM - Upper Doughty Dam, 200 feet west of Garden State Parkway, 1.7 miles west of Absecon, Egg Harbor City, Atlantic County, NJ

  7. 7. VIEW FROM SOUTHERN FOOT BRIDGE ABOVE INTAKE STRUCTURE EAST ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    7. VIEW FROM SOUTHERN FOOT BRIDGE ABOVE INTAKE STRUCTURE EAST TOWARD UPSTREAM BANK OF SOUTH SIDE OF DAM - Upper Doughty Dam, 200 feet west of Garden State Parkway, 1.7 miles west of Absecon, Egg Harbor City, Atlantic County, NJ

  8. 76 FR 9223 - Drawbridge Operation Regulation; Upper Mississippi River, Rock Island, IL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-17

    ... is necessary to allow the Quad City Marathon to cross the bridge. This deviation allows the bridge to...:30 a.m. to 11:30 a.m., September 25, 2011, while a marathon is held between the cities of Davenport...

  9. 77 FR 5398 - Drawbridge Operation Regulation; Upper Mississippi River, Rock Island, IL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-03

    ... is necessary to allow the Quad City Marathon to cross the bridge. This deviation allows the bridge to...:30 a.m. to 11:30 a.m., September 23, 2012, while a marathon is held between the cities of Davenport...

  10. Assessment of bridge scour in the lower, middle, and upper Yangtze River estuary with riverbed sonar profiling techniques.

    PubMed

    Zheng, Shuwei; Xu, Y Jun; Cheng, Heqin; Wang, Bo; Lu, Xuejun

    2017-12-12

    Riverbed scour of bridge piers can cause rapid loss in foundation strength, leading to sudden bridge collapse. This study used multi-beam echo sounders (Seabat 7125) to map riverbed surrounding the foundations of four major bridges in the lower, middle, and upper reaches of the 700-km Yangtze River Estuary (YRE) during June 2015 and September 2016. The high-resolution data were utilized to analyze the morphology of the bridge scour and the deformation of the wide-area riverbed (i.e., 5-18 km long and 1.3-8.3 km wide). In addition, previous bathymetric measurements collected in 1998, 2009, and 2013 were used to determine riverbed erosion and deposition at the bridge reaches. Our study shows that the scour depth surrounding the bridge foundations progressed up to 4.4-19.0 m in the YRE. Over the past 5-15 years, the total channel erosion in some river reaches was up to 15-17 m, possessing a threat to the bridge safety in the YRE. Tide cycles seemed to have resulted in significant variation in the scour morphology in the lower and middle YRE. In the lower YRE, the riverbed morphology displayed one long erosional ditch on both sides of the bridge foundations and a long-strip siltation area distributed upstream and downstream of the bridge foundations; in the middle YRE, the riverbed morphology only showed erosional morphology surrounding the bridge foundations. Large dunes caused deep cuts and steeper contours in the bridge scour. Furthermore, this study demonstrates that the high-resolution grid model formed by point cloud data of multi-beam echo sounders can clearly display the morphology of the bridge scour in terms of wide areas and that the sonar technique is a very useful tool in the assessment of bridge scours.

  11. 78 FR 69995 - Drawbridge Operation Regulation; Upper Mississippi River, Rock Island, IL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-22

    ... Operation Regulation; Upper Mississippi River, Rock Island, IL AGENCY: Coast Guard, DHS. ACTION: Notice of... operating schedule that governs the Rock Island Railroad and Highway Drawbridge across the Upper Mississippi River, mile 482.9, at Rock Island, Illinois. The deviation is necessary to allow the bridge owner time...

  12. 287. Dennis Hill, Photographer July 1998 DETAIL VIEW OF UPPER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    287. Dennis Hill, Photographer July 1998 DETAIL VIEW OF UPPER CHORD OF THROUGH TRUSS AT PANEL POINT, FACING NORTHWEST. - San Francisco Oakland Bay Bridge, Spanning San Francisco Bay, San Francisco, San Francisco County, CA

  13. 19. DETAIL OF SOUTH CANTILEVER ANCHOR ARM UPPER CHORD AND ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. DETAIL OF SOUTH CANTILEVER ANCHOR ARM UPPER CHORD AND ENDPOST CONNECTION U-19, LOOKING SOUTHWEST - Jackson's Ferry Bridge, Route 52 over New River, 6.3 miles south of Route 94, Austinville, Wythe County, VA

  14. p-Curve and p-Hacking in Observational Research

    PubMed Central

    Bruns, Stephan B.; Ioannidis, John P. A.

    2016-01-01

    The p-curve, the distribution of statistically significant p-values of published studies, has been used to make inferences on the proportion of true effects and on the presence of p-hacking in the published literature. We analyze the p-curve for observational research in the presence of p-hacking. We show by means of simulations that even with minimal omitted-variable bias (e.g., unaccounted confounding) p-curves based on true effects and p-curves based on null-effects with p-hacking cannot be reliably distinguished. We also demonstrate this problem using as practical example the evaluation of the effect of malaria prevalence on economic growth between 1960 and 1996. These findings call recent studies into question that use the p-curve to infer that most published research findings are based on true effects in the medical literature and in a wide range of disciplines. p-values in observational research may need to be empirically calibrated to be interpretable with respect to the commonly used significance threshold of 0.05. Violations of randomization in experimental studies may also result in situations where the use of p-curves is similarly unreliable. PMID:26886098

  15. 54. INTERIOR OF APRON SUSPENSION STRUCTURE SHOWING APRON COUNTERWEIGHT SYSTEM ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    54. INTERIOR OF APRON SUSPENSION STRUCTURE SHOWING APRON COUNTERWEIGHT SYSTEM OF CABLES AND PULLEYS ABOVE BRIDGE NOS. 12 AND 11. LOOKING NORTH. - Greenville Yard, Transfer Bridge System, Port of New York/New Jersey, Upper New York Bay, Jersey City, Hudson County, NJ

  16. Assessment of impact of mass movements on the upper Tayyah valley's bridge along Shear escarpment highway, Asir region (Saudi Arabia) using remote sensing data and field investigation

    NASA Astrophysics Data System (ADS)

    Youssef, A. M.; Al-Kathery, M.; Pradhan, B.

    2015-01-01

    Escarpment highways, roads and mountainous areas in Saudi Arabia are facing landslide hazards that are frequently occurring from time to time causing considerable damage to these areas. Shear escarpment highway is located in the north of the Abha city. It is the most important escarpment highway in the area, where all the light and heavy trucks and vehicle used it as the only corridor that connects the coastal areas in the western part of the Saudi Arabia with the Asir and Najran Regions. More than 10 000 heavy trucks and vehicles use this highway every day. In the upper portion of Tayyah valley of Shear escarpment highway, there are several landslide and erosion potential zones that affect the bridges between tunnel 7 and 8 along the Shear escarpment Highway. In this study, different types of landslides and erosion problems were considered to access their impacts on the upper Tayyah valley's bridge along Shear escarpment highway using remote sensing data and field investigation. These landslides and erosion problems have a negative impact on this section of the highway. Results indicate that the areas above the highway and bridge level between bridge 7 and 8 have different landslides including planar, circular, rockfall failures and debris flows. In addition, running water through the gullies cause different erosional (scour) features between and surrounding the bridge piles and culverts. A detailed landslides and erosion features map was created based on intensive field investigation (geological, geomorphological, and structural analysis), and interpretation of Landsat image 15 m and high resolution satellite image (QuickBird 0.61 m), shuttle radar topography mission (SRTM 90 m), geological and topographic maps. The landslides and erosion problems could exhibit serious problems that affect the stability of the bridge. Different mitigation and remediation strategies have been suggested to these critical sites to minimize and/or avoid these problems in the future.

  17. Scandalous: Christian identification, sex guilt, and the mediated demonization of the participants in the AshleyMadison scandal.

    PubMed

    Ashdown, Brien K; Hackathorn, Jana M; Daniels, Jordan

    2018-04-06

    In 2015, AshleyMadison.com (AshleyMadison) was hacked, leading to the release of site members' personal information. The exposed members faced public scrutiny, judgment, and other negative outcomes. In this study, we examined predictors of the demonization of the AshleyMadison participants (i.e., AshleyMadison members, owners, hackers) to help explain victim derogation. We attempted to discern the role religiosity and sexual guilt played in the demonization of the AshleyMadison hacking participants. We predicted sexual guilt would mediate between religiosity and demonization of the AshleyMadison hacking participants. Our findings indicate that religiosity alone does not predict demonization. Instead, sex guilt was a necessary part of the equation and mediated between participants' religiosity and the amount they demonized the different groups.

  18. 3. VIEW OF MAKERS PLATE ATTACHED TO UPPER CHORD MEMBER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    3. VIEW OF MAKERS PLATE ATTACHED TO UPPER CHORD MEMBER WHICH STATES 'HUSTON AND CLEVELAND CONTRACTORS, COLUMBUS, OHIO, 1904.' - Main Street Parker Pony Truss Bridge, Main Street (Route 170) spanning Yellow Creek, Poland, Mahoning County, OH

  19. 20. DETAIL OF SOUTH CANTILEVER ANCHOR ARM UPPER CHORD, POST, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. DETAIL OF SOUTH CANTILEVER ANCHOR ARM UPPER CHORD, POST, AND DIAGONAL CONNECTION U-17, LOOKING NORTHWEST - Jackson's Ferry Bridge, Route 52 over New River, 6.3 miles south of Route 94, Austinville, Wythe County, VA

  20. 10. LOOKING DOWN ON TUG AND CAR FLOAT BEING UNLOADED ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    10. LOOKING DOWN ON TUG AND CAR FLOAT BEING UNLOADED AT BRIDGE NO. 11 SHOWING TRACK, LOCKING MECHANISMS, AND MOORING WINCH IN FOREGROUND. LOOKING EAST. - Greenville Yard, Transfer Bridge System, Port of New York/New Jersey, Upper New York Bay, Jersey City, Hudson County, NJ

  1. The key quality control technology of main cable erection in long-span suspension bridge construction

    NASA Astrophysics Data System (ADS)

    Chen, Yongrui; Wei, Wei; Dai, Jie

    2017-04-01

    Main cable is one of the most important structure of suspension Bridges, which bear all the dead and live load from upper structure. Cable erection is one of the most critical process in suspension bridge construction. Key points about strand erection are studied in this paper, including strand traction, lateral movement, section adjustment, placing into saddle, anchoring, line shape adjustment and keeping, and tension control. The technology has helped a long-span suspension bridge in Yunnan Province, China get a ideal finished state.

  2. 78 FR 9588 - Drawbridge Operation Regulation; Mile 535.0, Upper Mississippi River, Sabula, IA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-11

    ... Operation Regulation; Mile 535.0, Upper Mississippi River, Sabula, IA AGENCY: Coast Guard, DHS. ACTION... River, mile 535.0, at Sabula, Iowa. The deviation is necessary to allow the bridge owner time to perform... Upper Mississippi River, mile 535.0, at Sabula, Iowa to remain in the closed-to-navigation position...

  3. "Hacking at Our Very Roots": Rearticulating White Racial Identity within the Context of Teacher Education

    ERIC Educational Resources Information Center

    Aveling, Nado

    2006-01-01

    When teaching about race and racism and how we as "Whites" are implicated in the discursive practices that sustain racism, we are indeed "hacking at the very roots" of the ways in which students have conceptualized their identity in terms of being non-racialized and at the same time non-racist. In this paper I focus on the challenges and…

  4. Forming a Cyber Coalition

    DTIC Science & Technology

    2012-04-06

    Estonia 6 :  98% of Estonian‟s territory was covered with Internet access: fixed line, broadband, WiMax, WiFi , and CDMA21 mobile wireless Internet...The hacked homepage displayed a prominent image of Bashar al-Assad, the President of Syria, with a text proclaiming “Syrian Electronic Army Were...update and harmonize their criminal laws against hacking , infringements on copyrights, computer facilitated fraud, child pornography, and other illicit

  5. Side-to-Side Tracheobronchoplasty to Reconstruct Complex Congenital Tracheobronchial Stenosis.

    PubMed

    Ragalie, William S; Chun, Robert H; Martin, Timothy; Ghanayem, Nancy S; Berens, Richard J; Beste, David J; Mitchell, Michael E

    2017-08-01

    Long segment tracheobronchial stenosis is a rare congenital anomaly that can also occur in combination with abnormal bronchial arborization. Long segment tracheal reconstruction in the setting of a supernumerary bridging bronchus has been reported; however, these repairs can be particularly complex. We present our experience using the bridging bronchus to augment long segment tracheal stenosis with a side-to-side tracheobronchoplasty. Four patients with complex long segment tracheobronchial stenosis involving a bronchus suis (right upper lobe bronchus) and a bridging bronchus presented with refractory respiratory distress requiring urgent tracheal reconstruction. Patient 1 was initially managed with modified slide tracheoplasty and tracheostomy. Patients 2, 3, and 4 were managed with single-stage procedures. All patients underwent definitive long segment tracheobronchoplasty consisting of a side-to-side anastomosis between the bridging bronchus and the right upper lobe bronchus. Age at surgery was 569, 69, 24, and 142 days, respectively. Weight at surgery was 9.3, 4.3, 2.7, and 5.9 kg. All patients were weaned from mechanical ventilation at 84, 13, 47, and 8 days after side-to-side tracheobronchoplasty. All patients were alive and free from tracheostomy at follow-up of 6.7, 3.8, 2.7, and 0.5 years. Side-to-side tracheal reconstruction is feasible in severe cases of long segment tracheal stenosis with a right upper lobe bronchus and a bridging bronchus. This technique can be successfully applied in high-risk patients and in the neonatal period and can provide excellent midterm results. Copyright © 2017 The Society of Thoracic Surgeons. Published by Elsevier Inc. All rights reserved.

  6. 20. (4"X5" image enlarged from 2 1/4" negative) Sam Fowler, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. (4"X5" image enlarged from 2 1/4" negative) Sam Fowler, Photographer, February 1998 VIEW OF GEORGIA DOT BRIDGE NO. 051-00025D-01986N (JAMES P. HOULIHAN BRIDGE). DETAIL OF FENDER SYSTEM FOR TURN-SPAN PIVOT PIER. OPERATOR'S HOUSE LOCATED ON UPPER SECTION OF TRUSS - Georgia DOT Bridge No. 051-00025D-01986N, US 17 & State Route 25 Spanning Savannah River, Port Wentworth, Chatham County, GA

  7. Machine Shop (Bldg. 163) north bay, east end interior, with ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Machine Shop (Bldg. 163) north bay, east end interior, with a 250-ton Shaw bridge crane on the upper rails and two smaller P&H bridge cranes on the lower rails - Atchison, Topeka, Santa Fe Railroad, Albuquerque Shops, Boiler Shop, 908 Second Street, Southwest, Albuquerque, Bernalillo County, NM

  8. 32. Another type of upper superstructure assembly found on the ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    32. Another type of upper superstructure assembly found on the 1st and 4th spans. View is of north side of 4th span. - Cleves Bridge, Spanning Great Miami River on U.S. Highway 50, Cleves, Hamilton County, OH

  9. Should We Turn the Robots Loose?

    DTIC Science & Technology

    2010-05-02

    interference. Potential sources of electromagnetic interference include everyday signals such as cell phones and Wifi , intentional friendly jamming of IED...might even attempt to hack or hijack our robotic warriors. Our current enemies have proven to be very adaptable and have developed simple counters to our...demonstrates the ease with which robot command and control might be hacked . It is reasonable to suspect that a future threat with a more robust

  10. Continuous-Tone Electrostatic Electrography

    DTIC Science & Technology

    1948-09-15

    selected as "being of greatest impor- tance: (l) exposure speed equivalent to 50 Westen» (2) high- quality continuous-tone reproduction, and...the developing or ’the fixing techniques» (10) Uniformity of Quality of Plates or Pilm from 3atch to Batch This cannot be considered until...directly to tho electrically cöhductivo hacking of the plato. This hacking is groundod aftor tho plate surfaco lias hoon chargod under corona

  11. Hacking medical devices a review - biomed 2013.

    PubMed

    Frenger, Paul

    2013-01-01

    Programmable, implantable and external biomedical devices (such as pacemakers, defibrillators, insulin pumps, pain management pumps, vagus nerve stimulators and others) may be vulnerable to unauthorized access, commonly referred to as “hacking”. This intrusion may lead to compromise of confidential patient data or loss of control of the device itself, which may be deadly. Risks to health from unauthorized access is in addition to hazards from faulty (“buggy”) software or circuitry. Historically, this aspect of medical device design has been underemphasized by both manufacturers and regulatory bodies until recently. However, an insulin pump was employed as a murder weapon in 2001 and successful hacking of an implantable defibrillator was demonstrated in 2008. To remedy these problems, professional groups have announced a variety of design standards and the governmental agencies of several countries have enacted device regulations. In turn, manufacturers have developed new software products and hardware circuits to assist biomedical engineering firms to improve their commercial offerings. In this paper the author discusses these issues, reviewing known problems and zero-day threats, with potential solutions. He outlines his approach to secure software and hardware challenges using the Forth language. A plausible scenario is described in which hacking of an implantable defibrillator by terrorists results in a severe national security threat to the United States.

  12. Science Hack Day: an opportunity for public engagement, art/science mash-ups, and inspiration

    NASA Astrophysics Data System (ADS)

    Bellis, Matthew

    2013-04-01

    The idea of a Science Hack Day (http://sciencehackday.com/) is to put non-scientists (designers, web developers, artists, interested enthusiasts) in a room with scientists and some good ideas, and see what science-themed project they can create in a weekend (about 24 hours of real hacking). The motto of the organizers is ``Get Excited and Make Things with Science!'' I have participated in several of these events including the first one held in the United State in Palo Alto in 2010 and as a remote advisor to participants in Nairobi, Kenya. To these events I have brought particle physics data from both the BaBar and the CMS (Compact Muon Solenoid) experiments, data from the CoGeNT dark matter direct-detection experiment, and my expertise and enthusiasm. The experience has been transformative for me as both a scientist and a science advocate. This talk will recount my experiences with Science Hack Day events in general and detail some projects that have come out of these days, including the Particle Physics Wind Chime (http://www.mattbellis.com/windchime/) and the Standard Model of Cocktail Physics (http://www.physicsdavid.net/2012/11/standard-model-of-cocktail-physics/). Opportunities for other scientists to take part in similar events will be discussed.

  13. IPACS Electronics: Comments on the Original Design and Current Efforts at Langley Research Center

    NASA Technical Reports Server (NTRS)

    Gowdey, J. C.

    1983-01-01

    The development of the integrated power altitude control system (IPACS) is described. The power bridge was fabricated, and all major parts are in hand. The bridge was tested with a 1/4 HP motor for another program. The PWM, Control Logic, and upper bridge driver power supply are breadboarded and are debugged prior to starting testing on a passive load. The Hall sensor circuit for detecting rotor position is in design.

  14. Walking on a moving surface: energy-optimal walking motions on a shaky bridge and a shaking treadmill can reduce energy costs below normal.

    PubMed

    Joshi, Varun; Srinivasan, Manoj

    2015-02-08

    Understanding how humans walk on a surface that can move might provide insights into, for instance, whether walking humans prioritize energy use or stability. Here, motivated by the famous human-driven oscillations observed in the London Millennium Bridge, we introduce a minimal mathematical model of a biped, walking on a platform (bridge or treadmill) capable of lateral movement. This biped model consists of a point-mass upper body with legs that can exert force and perform mechanical work on the upper body. Using numerical optimization, we obtain energy-optimal walking motions for this biped, deriving the periodic body and platform motions that minimize a simple metabolic energy cost. When the platform has an externally imposed sinusoidal displacement of appropriate frequency and amplitude, we predict that body motion entrained to platform motion consumes less energy than walking on a fixed surface. When the platform has finite inertia, a mass- spring-damper with similar parameters to the Millennium Bridge, we show that the optimal biped walking motion sustains a large lateral platform oscillation when sufficiently many people walk on the bridge. Here, the biped model reduces walking metabolic cost by storing and recovering energy from the platform, demonstrating energy benefits for two features observed for walking on the Millennium Bridge: crowd synchrony and large lateral oscillations.

  15. Walking on a moving surface: energy-optimal walking motions on a shaky bridge and a shaking treadmill can reduce energy costs below normal

    PubMed Central

    Joshi, Varun; Srinivasan, Manoj

    2015-01-01

    Understanding how humans walk on a surface that can move might provide insights into, for instance, whether walking humans prioritize energy use or stability. Here, motivated by the famous human-driven oscillations observed in the London Millennium Bridge, we introduce a minimal mathematical model of a biped, walking on a platform (bridge or treadmill) capable of lateral movement. This biped model consists of a point-mass upper body with legs that can exert force and perform mechanical work on the upper body. Using numerical optimization, we obtain energy-optimal walking motions for this biped, deriving the periodic body and platform motions that minimize a simple metabolic energy cost. When the platform has an externally imposed sinusoidal displacement of appropriate frequency and amplitude, we predict that body motion entrained to platform motion consumes less energy than walking on a fixed surface. When the platform has finite inertia, a mass- spring-damper with similar parameters to the Millennium Bridge, we show that the optimal biped walking motion sustains a large lateral platform oscillation when sufficiently many people walk on the bridge. Here, the biped model reduces walking metabolic cost by storing and recovering energy from the platform, demonstrating energy benefits for two features observed for walking on the Millennium Bridge: crowd synchrony and large lateral oscillations. PMID:25663810

  16. Incidence of bark- and wood-boring insects in firewood: a survey at Michigan's Mackinac Bridge

    Treesearch

    Robert A. Haack; Toby R. Petrice; Alex C. Wiedenhoeft

    2010-01-01

    Firewood is a major pathway for the inadvertent movement of bark- and wood-infesting insects. After discovery of Agrilus planipennis Fairmaire (Coleoptera: Buprestidae) in southeastern Michigan in 2002, quarantines were enacted including prohibition of transporting firewood across the Mackinac Bridge between Michigan's Lower and Upper peninsulas...

  17. The MAGTF’s Reliance on the Global Positioning System: A Critical Vulnerability

    DTIC Science & Technology

    2013-05-02

    Reference&ItemId=+++1 499015&Pubabbrev=JC4IJ 45 “AURA Mobile Communications GPS/ WiFi Jammer”, Jane’s Police and Homeland Security Equipment, last...securityaffairs.co/wordpress/2845/ hacking /gps-spoofing- old-threat-and-new-problems.html 52“GPS Spoofing, Old Threat and New Problems”, Pierluigi...Paganini, Security Affairs, last modified February 23, 2012, http://securityaffairs.co/wordpress/2845/ hacking /gps-spoofing- old-threat-and-new

  18. Cybersecurity for Cardiac Implantable Electronic Devices: What Should You Know?

    PubMed

    Baranchuk, Adrian; Refaat, Marwan M; Patton, Kristen K; Chung, Mina K; Krishnan, Kousik; Kutyifa, Valentina; Upadhyay, Gaurav; Fisher, John D; Lakkireddy, Dhanunjaya R

    2018-03-20

    Medical devices have been targets of hacking for over a decade, and this cybersecurity issue has affected many types of medical devices. Lately, the potential for hacking of cardiac devices (pacemakers and defibrillators) claimed the attention of the media, patients, and health care providers. This is a burgeoning problem that our newly electronically connected world faces. In this paper from the Electrophysiology Section Council, we briefly discuss various aspects of this relatively new threat in light of recent incidents involving the potential for hacking of cardiac devices. We explore the possible risks for the patients and the effect of device reconfiguration in an attempt to thwart cybersecurity threats. We provide an outline of what can be done to improve cybersecurity from the standpoint of the manufacturer, government, professional societies, physician, and patient. Copyright © 2018 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  19. Deconvolution of subcellular protrusion heterogeneity and the underlying actin regulator dynamics from live cell imaging.

    PubMed

    Wang, Chuangqi; Choi, Hee June; Kim, Sung-Jin; Desai, Aesha; Lee, Namgyu; Kim, Dohoon; Bae, Yongho; Lee, Kwonmoo

    2018-04-27

    Cell protrusion is morphodynamically heterogeneous at the subcellular level. However, the mechanism of cell protrusion has been understood based on the ensemble average of actin regulator dynamics. Here, we establish a computational framework called HACKS (deconvolution of heterogeneous activity in coordination of cytoskeleton at the subcellular level) to deconvolve the subcellular heterogeneity of lamellipodial protrusion from live cell imaging. HACKS identifies distinct subcellular protrusion phenotypes based on machine-learning algorithms and reveals their underlying actin regulator dynamics at the leading edge. Using our method, we discover "accelerating protrusion", which is driven by the temporally ordered coordination of Arp2/3 and VASP activities. We validate our finding by pharmacological perturbations and further identify the fine regulation of Arp2/3 and VASP recruitment associated with accelerating protrusion. Our study suggests HACKS can identify specific subcellular protrusion phenotypes susceptible to pharmacological perturbation and reveal how actin regulator dynamics are changed by the perturbation.

  20. Little River revisited - thirty-five years after Hack and Goodlett

    USGS Publications Warehouse

    Osterkamp, W.R.; Hupp, C.R.; Schening, M.R.

    1995-01-01

    In possibly the first detailed study to relate geomorphology, vegetation, and hydrology at a watershed scale, Hack and Goodlett (1960) documented variation in the eastern forest with topographic positions of cove, side slope, and nose. The study also described effects on landforms and vegetation of a catastrophic flood that occurred in June, 1949. Field investigations, conducted nearly four decades later, review selected parts of the study by Hack and Goodlett (1960). Replicate data provide a basis to evaluate their interpretations, to document geomorphic change since the 1949 flood, and to identify vegetation change in uplands and bottomlands. Results suggest that change to hillslope landforms has been minor since 1949, but that changes have occurred, seemingly during flow events of 1952, 1955 and 1985. Change in areal extent of forest types was not detected. Change in the relative abundances of dominant species may have resulted from 20th century fire suppression. -from Authors

  1. Seven Deadliest Network Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, findmore » out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.« less

  2. Concepts, Diagnosis and the History of Medicine: Historicising Ian Hacking and Munchausen Syndrome.

    PubMed

    Millard, Chris

    2017-08-01

    Concepts used by historians are as historical as the diagnoses or categories that are studied. The example of Munchausen syndrome (deceptive presentation of illness in order to adopt the 'sick role') is used to explore this. Like most psychiatric diagnoses, Munchausen syndrome is not thought applicable across time by social historians of medicine. It is historically specific, drawing upon twentieth-century anthropology and sociology to explain motivation through desire for the 'sick role'. Ian Hacking's concepts of 'making up people' and 'looping effects' are regularly utilised outside of the context in which they are formed. However, this context is precisely the same anthropological and sociological insight used to explain Munchausen syndrome. It remains correct to resist the projection of Munchausen syndrome into the past. However, it seems inconsistent to use Hacking's concepts to describe identity formation before the twentieth century as they are given meaning by an identical context.

  3. Metal contamination of sediments and soils of Bayou Saint John: a potential health impact to local fishermen?

    PubMed

    Welt, Marc; Mielke, Howard W; Gonzales, Chris; Cooper, Kora M; Batiste, Corey G; Cresswell, Lawrence H; Mielke, Paul W

    2003-12-01

    This research examines the pattern of sediment contamination of an urban bayou of New Orleans (formerly a natural waterway) and the potential for human exposure from consumption of fish caught in the bayou. Sediments and soils of Bayou Saint John were evaluated for lead (Pb), zinc (Zn), and cadmium (Cd). Sediment cores were collected at bridges (n = 130) and sites between the bridges (n = 303) of the bayou. In addition, soil samples (n = 66) were collected along the banks of the bayou. Sediments below the bridges contain significantly more (p-value approximately 10(-7)) Pb and Zn (medians of 241 and 230 mg kg(-1), respectively) than bayou sediments located between bridges (medians of 64 and 77 mg kg(-1), respectively). Sediments below bridges of the upper reaches of the bayou contain significantly larger amounts of metals (p < 10(-14) for Pb and Zn and p approximately 10(-8) for Cd) (medians of 329, 383 and 1.5, respectively) than sediments below bridges in the lower reaches of the bayou (medians of 43, 31 and 0.5 for Pb, Zn and Cd, respectively). Likewise, medians for sediments located between bridges contain significantly (p < 10(-14)) higher quantities of Pb, Zn and Cd (170, 203 and 1.8 mg kg(-1), respectively) in the upper bayou than Pb, Zn, and Cd (48, 32, and 0.8 mg kg(-1), respectively) in the lower reaches of the bayou. The potential risk for human exposure may be magnified by the fact that fishing generally occurs from the numerous bridges that cross the bayou. Poor and minority people do most of the fishing. Most people (87%) indicated they ate fish they caught from the Bayou.

  4. 75. Photocopy of photograph (original print in the Minnesota Historical ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    75. Photocopy of photograph (original print in the Minnesota Historical Society, St. Paul, Minnesota, ca. 1870s. #22006. Photographer: Illingworth.) VIEW TO SOUTHEAST, SHOWING THE UPPER LEVEE AND BLUSS (on left) TO WHICH THE HIGH BRIDGE WAS BUILT - Smith Avenue High Bridge, Smith Avenue between Cherokee Avenue & Cliff Street, Saint Paul, Ramsey County, MN

  5. Machine Shop (Bldg. 163) north bay, east end interior looking ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Machine Shop (Bldg. 163) north bay, east end interior looking northeast. Note the 250-ton Shaw bridge crane on the upper rails and two smaller P&H bridge cranes on the lower rails. Three cranes shared the lower rails - Atchison, Topeka, Santa Fe Railroad, Albuquerque Shops, Machine Shop, 908 Second Street, Southwest, Albuquerque, Bernalillo County, NM

  6. Georgia’s Cyber Left Hook

    DTIC Science & Technology

    2009-01-01

    Relations for the Joint Task Force- Global Network Operations (JTF-GNO/ J5 ). He assists in development of cyber policy and strategy for operations and...History (Manchester, U.K: Manchester Univ. Press, 2000), 1. 10. See The Steamship Appam, 243 U.S. 124 (1917). 11. Jeffrey T. G. Kelsey, “ Hacking into...Arrest for Computer Hacking ,” news release, 1 October 2007, http://www.cybercrime.gov/kingIndict.pdf. 39. Grant Gross, “FBI: Several Nations Eyeing U.S

  7. Hydrodynamic Influence Dabanhu River Bridge Holes Widening Based on Two-Dimensional Finite Element Numerical Model

    NASA Astrophysics Data System (ADS)

    Li, Dong Feng; Bai, Fu Qing; Nie, Hui

    2018-06-01

    In order to analyze the influence of bridge holes widening on hydrodynamic such as water level, a two-dimensional mathematical model was used to calculate the hydrodynamic factors, river network flow velocity vector distribution is given, water level and difference of bridge widening before and after is calculated and charted, water surface gradient in seven different river sections near the upper reaches of bridges is counted and revealed. The results of hydrodynamic calculation indicate that The Maximum and the minimum deducing numerical value of the water level after bridge widening is 0.028m, and 0.018m respective. the seven sections water surface gradient becomes smaller until it becomes negative, the influence of bridge widening on the upstream is basically over, the range of influence is about 450m from the bridge to the upstream. reach

  8. Does 'hacking' surface type affect equine forelimb foot placement, movement symmetry or hoof impact deceleration during ridden walk and trot exercise?

    PubMed

    Barstow, A; Bailey, J; Campbell, J; Harris, C; Weller, R; Pfau, T

    2018-04-17

    Both pleasure and competition horses regularly exercise on surfaces such as tarmac, gravel and turf during 'hacking'. Despite this, there is limited evidence relating to the effect of these surfaces upon foot-surface interaction. To investigate forelimb foot placement, hoof vibration and movement symmetry in pleasure horses on three commonly encountered hacking surfaces. Quantitative gait study in a convenience sample. Six horses regularly partaking in hacking exercise were ridden in walk and trot on all surfaces. Horses were equipped with one hoof-mounted, accelerometer and four body-mounted inertial measurement units (IMUs) to measure foot impact and movement symmetry. High-speed (400 FPS) video footage of foot-placement was acquired (dorsal, palmar, lateral views). Foot-impact and movement symmetry were analysed with a mixed effects model and Bowker symmetry tests for foot-placement analysis. Vibration power and frequency parameters increase as perceived surface firmness increases from grass, to gravel, to tarmac (P≤0.001). Vibration power parameters were consistently greater at trot compared with walk (P≤0.001), but the same was not true for vibration frequency (P≥0.2). Greatest movement asymmetry was recorded during grass surface trotting. No significant difference in foot-placement was detected between the three surfaces. This was a field study using three commonly encountered hacking surfaces. Surface properties change easily with water content and temperature fluctuations so care must be taken when considering other similar surfaces, especially at different times of the year. Six leisure horses were used so the results may not be representative of horses of all types. Vibration parameters generally increase as perceived surface firmness increases. Increasing speed alters vibration power but not frequency. Further investigations are required to determine the role that this may play in the development of musculoskeletal disease in horses. © 2018 EVJ Ltd.

  9. Efficacy of ‘hack and squirt’ application of imazapyr, triclopyr, and glyphosate to control the invasive tree species Chinese tallowtree

    Treesearch

    Charles A. Gresham

    2010-01-01

    In May 2005, 12 plots approximately 21 by 27 m each were established on the exterior bank of a dredge spoil area in Georgetown, SC. The tree cover was primarily Chinese tallowtree, but there were also live oak trees in each plot. Also in May 2005, Chinese tallowtree s (d.b.h. > 2.4 cm) in three randomly selected plots received a ‘hack and squirt’ application of...

  10. Machine Shop (Bldg. 163) north bay interior looking east, with ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Machine Shop (Bldg. 163) north bay interior looking east, with a 250-ton Shaw bridge crane on the upper rails and two smaller P&H bridge cranes on the lower rails. This high-bay, north portion of the building served as the erecting shop - Atchison, Topeka, Santa Fe Railroad, Albuquerque Shops, Machine Shop, 908 Second Street, Southwest, Albuquerque, Bernalillo County, NM

  11. PBF detail of metal pedestrian bridge over exposed control cables, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    PBF detail of metal pedestrian bridge over exposed control cables, which run between Control (PER-619) and Reactor Buildings (PER-620). Camera facing northwest. Southwest corner of PER-620 at upper right of view. Date: May 2004. INEEL negative no. HD-41-6-3 - Idaho National Engineering Laboratory, SPERT-I & Power Burst Facility Area, Scoville, Butte County, ID

  12. BRIDGE - Behavioural reaching interfaces during daily antigravity activities through upper limb exoskeleton: Preliminary results.

    PubMed

    Gandolla, Marta; Costa, Andrea; Aquilante, Lorenzo; Gfoehler, Margit; Puchinger, Markus; Braghin, Francesco; Pedrocchi, Alessandra

    2017-07-01

    People with neuromuscular diseases such as muscular dystrophy experience a distributed and evolutive weakness in the whole body. Recent technological developments have changed the daily life of disabled people strongly improving the perceived quality of life, mostly concentrating on powered wheelchairs, so to assure autonomous mobility and respiratory assistance, essential for survival. The key concept of the BRIDGE project is to contrast the everyday experience of losing functions by providing them of a system able to exploit the best their own residual capabilities in arm movements so to keep them functional and autonomous as much as possible. BRIDGE is composed by a light, wearable and powered five degrees of freedom upper limb exoskeleton under the direct control of the user through a joystick or gaze control. An inverse kinematic model allows to determine joints position so to track patient desired hand position. BRIDGE prototype has been successfully tested in simulation environment, and by a small group of healthy volunteers. Preliminary results show a good tracking performance of the implemented control scheme. The interaction procedure was easy to understand, and the interaction with the system was successful.

  13. Geology of the Carnegie museum dinosaur quarry site of Diplodocus carnegii, Sheep Creek, Wyoming

    USGS Publications Warehouse

    Brezinski, D.K.; Kollar, A.D.

    2008-01-01

    The holotype of Diplodocus carnegii Hatcher, 1901, consists of a partial skeleton (CM 84) that was recovered, along with a second partial skeleton of the same species (CM 94), from the upper 10 m of the Talking Rock facies of the Brushy Basin Member of the Morrison Formation exposed along Bone Quarry Draw, a tributary of Sheep Creek in Albany County, Wyoming. A composite measured section of the stratigraphic interval exposed adjacent to the quarry indicates that the Brushy Basin Member in this area is a stacked succession of lithofacies consisting of hackly, greenish gray, calcareous mudstone and greenish brown, dense, fine-grained limestone. The more erosion resistant limestone layers can be traced over many hundreds of meters. Thus, these strata do not appear to represent a highly localized deposit such as a stream channel, oxbow lake, or backwater pond. The Sheep Creek succession is interpreted as representing a clastic-dominated lake where high turbidity and sediment influx produced deposition of calcareous mudstone. During drier periods the lake's turbidity decreased and limestone and dolomite precipitation replaced mud deposition. Microkarsting at the top of some limestone/ dolomite layers suggests subaerial deposition may have prevailed during these dry episodes. The quarry of D. carnegii was excavated within the top strata of one of the numerous intervals of hackly, greenish gray, calcareous mudstone that represent an ephemeral freshwater lake. The quarry strata are directly overlain by 0.3 m of dolomite-capped limestone that was deposited shortly after interment of D. carnegii in the lake mudstones. The close vertical proximity of the overlying limestone to the skeleton's stratigraphic: level suggests that the animal's carcass may have been buried beneath the drying lake deposits during a period of decreased rainfall.

  14. Increasing Lean Mass and Strength: A Comparison of High Frequency Strength Training to Lower Frequency Strength Training.

    PubMed

    Thomas, Michael H; Burns, Steve P

    The purpose of this study was to determine the effect strength training frequency has on improvements in lean mass and strength. Participants were 7 women and 12 men, age ( χ̄ = 34.64 years ± 6.91 years), with strength training experience, training age ( χ̄ = 51.16 months ± 39.02 months). Participants were assigned to one of two groups to equal baseline group demographics. High frequency training group (HFT) trained each muscle group as the agonist, 3 times per week, exercising with 3 sets per muscle group per session (3 total body workouts). Low frequency training group (LFT) trained each muscle group as the agonist one time per week, completing all 9 sets during that one workout. LFT consisted of a routine split over three days: 1) pectoralis, deltoids, and triceps; 2) upper back and biceps; 3) quadriceps, hamstrings, calves, and abdominals. Following eight weeks of training, HFT increased lean mass by 1.06 kg ± 1.78 kg, (1.9%), and LFT increased lean mass by .99 kg ± 1.31 kg, (2.0%). HFT strength improvements on the chest press was 9.07 kg ± 6.33 kg, (11%), and hack squat 20.16 kg ± 11.59 kg, (21%). LFT strength improvements on chest press was 5.80kg ± 4.26 kg, (7.0%), and hack squat 21.83 kg ± 11.17 kg, (24 %). No mean differences between groups were significant. These results suggest that HFT and LFT of equal set totals result in similar improvements in lean mass and strength, following 8 weeks of strength training.

  15. Display area, looking north towards the classified storage rooms, D.M. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Display area, looking north towards the classified storage rooms, D.M. Logistics and D.O. Offices in northwest corner. Viewing bridge is at upper left, and alert status display at upper right - March Air Force Base, Strategic Air Command, Combat Operations Center, 5220 Riverside Drive, Moreno Valley, Riverside County, CA

  16. Bridge Frost Prediction by Heat and Mass Transfer Methods

    NASA Astrophysics Data System (ADS)

    Greenfield, Tina M.; Takle, Eugene S.

    2006-03-01

    Frost on roadways and bridges can present hazardous conditions to motorists, particularly when it occurs in patches or on bridges when adjacent roadways are clear of frost. To minimize materials costs, vehicle corrosion, and negative environmental impacts, frost-suppression chemicals should be applied only when, where, and in the appropriate amounts needed to maintain roadways in a safe condition for motorists. Accurate forecasts of frost onset times, frost intensity, and frost disappearance (e.g., melting or sublimation) are needed to help roadway maintenance personnel decide when, where, and how much frost-suppression chemical to use. A finite-difference algorithm (BridgeT) has been developed that simulates vertical heat transfer in a bridge based on evolving meteorological conditions at its top and bottom as supplied by a weather forecast model. BridgeT simulates bridge temperatures at numerous points within the bridge (including its upper and lower surface) at each time step of the weather forecast model and calculates volume per unit area (i.e., depth) of deposited, melted, or sublimed frost. This model produces forecasts of bridge surface temperature, frost depth, and bridge condition (i.e., dry, wet, icy/snowy). Bridge frost predictions and bridge surface temperature are compared with observed and measured values to assess BridgeT's skill in forecasting bridge frost and associated conditions.

  17. 26. Photograph of a photograph in possession of Rock Island ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    26. Photograph of a photograph in possession of Rock Island Arsenal Historical Office. SERIES OF VIEWS BEFORE CONSTRUCTION OF LOCK AND DAM, SHOWING RAIL BED ON UPPER DECK (UPPER LEFT), SWING SPAN IN ROTATION (UPPER RIGHT), EAST ELEVATION OF SWING SPAN AND BALTIMORE TRUSSES (CENTER), VEHICULAR ROADWAY ON LOWER DECK (LOWER LEFT), AND DRAW PIER. ORIGINALLY PUBLISHED 1898. - Rock Island Arsenal, Rock Island Bridge, Fort Armstrong Avenue, Rock Island, Rock Island County, IL

  18. Comparison of macroscopic and microscopic (stereomicroscopy and scanning electron microscopy) features of bone lesions due to hatchet hacking trauma.

    PubMed

    Nogueira, Luísa; Quatrehomme, Gérald; Bertrand, Marie-France; Rallon, Christophe; Ceinos, Romain; du Jardin, Philippe; Adalian, Pascal; Alunni, Véronique

    2017-03-01

    This experimental study examined the lesions produced by a hatchet on human bones (tibiae). A total of 30 lesions were produced and examined macroscopically (naked eye) and by stereomicroscopy. 13 of them were also analyzed using scanning electron microscopy. The general shape of the lesion, both edges, both walls, the kerf floor and the extremities were described. The length and maximum width of the lesions were also recorded. The microscopic analysis of the lesions led to the description of a sharp-blunt mechanism. Specific criteria were identified (lateral pushing back, fragmentation of the upraising, fossa dug laterally to the edge and vertical striae) enabling the forensic expert to conclude that a hacking instrument was used. These criteria are easily identifiable using scanning electron microscopy, but can also be observed with stereomicroscopy. Overall, lateral pushing back and vertical striae visible using stereomicroscopy and scanning electron microscopy signal the use of a hacking tool.

  19. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.

    PubMed

    Yin, H-L; Cao, W-F; Fu, Y; Tang, Y-L; Liu, Y; Chen, T-Y; Chen, Z-B

    2014-09-15

    Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.

  20. Systemizers Are Better Code-Breakers: Self-Reported Systemizing Predicts Code-Breaking Performance in Expert Hackers and Naïve Participants

    PubMed Central

    Harvey, India; Bolgan, Samuela; Mosca, Daniel; McLean, Colin; Rusconi, Elena

    2016-01-01

    Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders—attention to detail and systemizing—may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings. PMID:27242491

  1. Systemizers Are Better Code-Breakers: Self-Reported Systemizing Predicts Code-Breaking Performance in Expert Hackers and Naïve Participants.

    PubMed

    Harvey, India; Bolgan, Samuela; Mosca, Daniel; McLean, Colin; Rusconi, Elena

    2016-01-01

    Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders-attention to detail and systemizing-may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings.

  2. Information-theoretical noninvasive damage detection in bridge structures

    NASA Astrophysics Data System (ADS)

    Sudu Ambegedara, Amila; Sun, Jie; Janoyan, Kerop; Bollt, Erik

    2016-11-01

    Damage detection of mechanical structures such as bridges is an important research problem in civil engineering. Using spatially distributed sensor time series data collected from a recent experiment on a local bridge in Upper State New York, we study noninvasive damage detection using information-theoretical methods. Several findings are in order. First, the time series data, which represent accelerations measured at the sensors, more closely follow Laplace distribution than normal distribution, allowing us to develop parameter estimators for various information-theoretic measures such as entropy and mutual information. Second, as damage is introduced by the removal of bolts of the first diaphragm connection, the interaction between spatially nearby sensors as measured by mutual information becomes weaker, suggesting that the bridge is "loosened." Finally, using a proposed optimal mutual information interaction procedure to prune away indirect interactions, we found that the primary direction of interaction or influence aligns with the traffic direction on the bridge even after damaging the bridge.

  3. 33 CFR 117.671 - Upper Mississippi River.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... draws of all bridges between Lock and Dam No. 10, mile 615.1, and Lock and Dam No. 2, mile 815.2, shall... signal if at least 24 hours notice is given. (b) The draws of all bridges between Lock and Dam No. 2, mile 815.2, and Lock and Dam No. 1, mile 847.6, shall open on signal; except that, from December 15...

  4. 33 CFR 117.671 - Upper Mississippi River.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... draws of all bridges between Lock and Dam No. 10, mile 615.1, and Lock and Dam No. 2, mile 815.2, shall... signal if at least 24 hours notice is given. (b) The draws of all bridges between Lock and Dam No. 2, mile 815.2, and Lock and Dam No. 1, mile 847.6, shall open on signal; except that, from December 15...

  5. 96. (Credit BLV) View locking West at Cross Lake dam ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    96. (Credit BLV) View locking West at Cross Lake dam and spillway constructed immediately west of Kansas City Southern railroad bridge. Booster station located at left. Note cribbing at bridge abutment in upper left which straddles gravity flow canduit installed in 1924-1926 and supports extra suction line (installed in 1930) on top. - McNeil Street Pumping Station, McNeil Street & Cross Bayou, Shreveport, Caddo Parish, LA

  6. Investigation of Thermocapillary Convection of High Prandtl Number Fluid Under Microgravity

    NASA Technical Reports Server (NTRS)

    Liang, Ruquan; Duan, Guangdong

    2012-01-01

    Thermocapillary convection in a liquid bridge, which is suspended between two coaxial disks under zero gravity, has been investigated numerically. The Navier-Stokes equations coupled with the energy conservation equation are solved on a staggered grid, and the level set approach is used to capture the free surface deformation of the liquid bridge. The velocity and temperature distributions inside the liquid bridge are analyzed. It is shown from this work that as the development of the thermocapillary convection, the center of the vortex inside the liquid bridge moves down and reaches an equilibrium position gradually. The temperature gradients in the regions near the upper center axis and the bottom cold corner are higher than those in the other regions.

  7. Is there a role for upper-extremity intra-aortic balloon counterpulsation as a bridge-to-recovery or a bridge-to-transplant in the treatment of end-stage heart failure?

    PubMed

    Nwaejike, Nnamdi; Son, Andre Y; Milano, Carmelo A; Daneshmand, Mani A

    2017-10-01

    A best evidence topic in cardiac surgery was written according to a structured protocol. The question addressed was: Is there a role for upper-extremity intra-aortic balloon pump counterpulsation (UE-IABP) in the treatment of end-stage heart failure? Altogether 230 papers were found using the reported search, of which 6 papers represented the best evidence to answer the clinical question. The authors, journal, date and country of publication, patient group studied, study type, relevant outcomes and results of these papers are tabulated. Of the 163 bridge-to-transplantation (BTT) patients, 141 (86.5%) were successfully transplanted and of the 9 bridge-to-recovery (BTR) patients, 6 (66.7%) were successfully weaned from the device. Length of support ranged from 3 to 152 days, and the most frequent complications were device malfunction or migration necessitating exchange or repositioning, occurring at a collective rate of 37.3%. UE-IABP is a minimally invasive and cost-effective strategy that provides haemodynamic support while preserving both the mediastinum and the functional status in BTR and BTT patients who may not tolerate more invasive modes of mechanical circulatory support. We conclude that UE-IABP can be used as a bridge-to-recovery (BTR) or transplant (BTT) in patients with end-stage heart failure. © The Author 2017. Published by Oxford University Press on behalf of the European Association for Cardio-Thoracic Surgery. All rights reserved.

  8. Technology and Tasks for Bridging the Language-Content Gap: Teacher-Researcher Collaboration in a Third-Year Spanish Writing Course

    ERIC Educational Resources Information Center

    Gleason, Jesse

    2013-01-01

    Many scholars have noted the disjunction between language instruction at the lower- and upper levels of FL study (Byrnes, 2002; Kraemer, 2008; Lord, 2014; Maxim, 2005; Schultz, 2000; Swaffar & Arens, 2005). Whereas lower-division courses tend to focus primarily on learning grammatical patterns and the "four skills," upper-level…

  9. Upper Secondary Chemistry Students in a Pharmacochemistry Research Community

    NASA Astrophysics Data System (ADS)

    van Rens, Lisette; van Muijlwijk, Jacqueline; Beishuizen, Jos; van der Schee, Joop

    2013-04-01

    This study deals with the participation of 10 upper secondary chemistry students, aged 16-17, and their chemistry teacher in a pharmacochemistry research community on anti-allergy medicines at VU University, Amsterdam, The Netherlands. Participation of students in scientific research raises the question of how to bridge the gap between an upper secondary school inquiry practice and a scientific research practice. To bridge this gap, a design based on 6 principles derived from an educational model of a community of learners was proposed. The study first aimed at revealing whether the proposed principles were necessary according to the students, their teacher and three pharmacochemistry researchers for successful participation of the students in the research community. Second, the study examined whether the students' understanding of discipline-specific content knowledge, interest in scientific research and knowledge about the nature of science changed during the course of the study. Data were obtained from questionnaires, interviews and video tapes. The results indicated that according to the teacher all 6 principles were necessary to bridge the gap, whereas according to the students 1 principle and according to the pharmacochemistry researchers 2 principles were necessary but difficult to achieve. Furthermore, all students gained discipline-specific content knowledge. Their interest in scientific research exhibited a positive change and their knowledge about the nature of science increased. The implications for further research and practice are discussed.

  10. Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices

    NASA Astrophysics Data System (ADS)

    Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan

    2014-10-01

    In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].

  11. Less noise, more hacking: how to deploy principles from MIT's hacking medicine to accelerate health care.

    PubMed

    DePasse, Jacqueline W; Carroll, Ryan; Ippolito, Andrea; Yost, Allison; Santorino, Data; Chu, Zen; Olson, Kristian R

    2014-07-01

    Medical technology offers enormous potential for scalable medicine--to improve the quality and access in health care while simultaneously reducing cost. However, current medical device innovation within companies often only offers incremental advances on existing products, or originates from engineers with limited knowledge of the clinical complexities. We describe how the Hacking Medicine Initiative, based at Massachusetts Institute of Technology has developed an innovative "healthcare hackathon" approach, bringing diverse teams together to rapidly validate clinical needs and develop solutions. Hackathons are based on three core principles; emphasis on a problem-based approach, cross-pollination of disciplines, and "pivoting" on or rapidly iterating on ideas. Hackathons also offer enormous potential for innovation in global health by focusing on local needs and resources as well as addressing feasibility and cultural contextualization. Although relatively new, the success of this approach is clear, as evidenced by the development of successful startup companies, pioneering product design, and the incorporation of creative people from outside traditional life science backgrounds who are working with clinicians and other scientists to create transformative innovation in health care.

  12. Upconversion-based receivers for quantum hacking-resistant quantum key distribution

    NASA Astrophysics Data System (ADS)

    Jain, Nitin; Kanter, Gregory S.

    2016-07-01

    We propose a novel upconversion (sum frequency generation)-based quantum-optical system design that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  13. Machine Tool Software

    NASA Technical Reports Server (NTRS)

    1988-01-01

    A NASA-developed software package has played a part in technical education of students who major in Mechanical Engineering Technology at William Rainey Harper College. Professor Hack has been using (APT) Automatically Programmed Tool Software since 1969 in his CAD/CAM Computer Aided Design and Manufacturing curriculum. Professor Hack teaches the use of APT programming languages for control of metal cutting machines. Machine tool instructions are geometry definitions written in APT Language to constitute a "part program." The part program is processed by the machine tool. CAD/CAM students go from writing a program to cutting steel in the course of a semester.

  14. Progress on white papers from the Demographic Hack Session at WiA IV

    NASA Astrophysics Data System (ADS)

    Norman, Dara J.; WiA IV Demographics Hack Session Attendees.

    2018-06-01

    At the Women in Astronomy IV meeting in June 2017, a number of white papers were started as part of the Demographic Hack session. Several of these white papers are intended for submission to the Decadal Survey on topics including, ‘Providing a Timely Review of Input Demographics to Advisory Committees’, and ‘Tying Research Funding to Progress in Inclusion’. In my talk, I will review the content of these white papers and the progress that has been made in writing them. Interested session attendees are encouraged ‘endorse’ the papers by becoming signatories.

  15. Earth Observations taken by the Expedition Seven crew

    NASA Image and Video Library

    2003-06-25

    ISS007-E-08251 (25 June 2003) --- This photo featuring the San Francisco Bay area in California was photographed from the International Space Station (ISS) by astronaut Edward T. Lu, Expedition 7 NASA ISS science officer and flight engineer. The San Francisco Bay Bridge, Alcatraz Island, Golden Gate Bridge, and Golden Gate Park are visible at upper right. Stanford University and red salt ponds on the bay near Fremont at lower left.

  16. Genetics Home Reference: Baraitser-Winter syndrome

    MedlinePlus

    ... eyes ( hypertelorism ), large eyelid openings, droopy eyelids ( ptosis ), high-arched eyebrows , a broad nasal bridge and tip of the nose , a long space between the nose and upper lip ( philtrum ), full ...

  17. Environmental Investigation and Risk Assessment. Phase 1 Report Tacony Warehouse, Philadelphia, Pennsylvania

    DTIC Science & Technology

    1993-08-24

    Sayreville sand, the middle clay, the Old Bridge sand, and the upper clay. The Raritan is overlain in adjacent parts of New Jersey by the Magothy ...Formation, but the Magothy Formation has not been identified in the Philadelphia area. The sediments that overlie the Raritan are Pleistocene deposits...Qc,Pleistocene -.-- Unconjormity ... so Pensauken formation , Qp (Illinoian) Unconformitg . . . Magothy formation Kn 10 ... Uncontormity .... Upper

  18. Noise Exposure on a Warship during Firing of a Heavy Machine Gun.

    PubMed

    Paddan, Gurmail S

    2015-11-01

    Sound pressure levels were measured on a military ship during firing of a Heavy Machine Gun (HMG). Measurements were made at three locations on the ship's bridge (the wheelhouse) and one location on the starboard bridge wing. The highest peak sound pressure levels measured on the bridge wing and on the bridge were 160.7 dB(C) (2170 Pa) and 122.7 dB(C) (27.3 Pa), respectively. The highest sound exposure levels measured on the bridge wing and on the bridge corresponding to one round being fired were 127.8 dB(A) and 88.9 dB(A), respectively. The ship's structure provided about 40 dB attenuation in the transmitted noise. The operator of the weapon would be required to wear some form of hearing protection. Based on the measured peak noise levels, there would be no requirement for bridge crew to wear any hearing protection during firing of a HMG. However, crew exposure to noise on the bridge is likely to exceed the upper exposure action value corresponding to 85 dB(A) after about 11 750 rounds. © The Author 2015. Published by Oxford University Press on behalf of the British Occupational Hygiene Society.

  19. Salinity Processes in the Upper Ocean Regional Study (SPURS)

    NASA Image and Video Library

    2012-09-04

    The Bridge of the Woods Hole Oceanographic Institution's research vessel Knorr is seen on Tuesday, Sept. 4, 2012, in Woods Hole, Mass. Knorr is scheduled to depart on Sept. 6 to take part in the Salinity Processes in the Upper Ocean Regional Study (SPURS). The NASA-sponsored expedition will sail to the North Atlantic's saltiest spot to get a detailed, 3-D picture of how salt content fluctuates in the ocean's upper layers and how these variations are related to shifts in rainfall patterns around the planet. Photo Credit: (NASA/Bill Ingalls)

  20. Stabilization of axisymmetric liquid bridges through vibration-induced pressure fields.

    PubMed

    Haynes, M; Vega, E J; Herrada, M A; Benilov, E S; Montanero, J M

    2018-03-01

    Previous theoretical studies have indicated that liquid bridges close to the Plateau-Rayleigh instability limit can be stabilized when the upper supporting disk vibrates at a very high frequency and with a very small amplitude. The major effect of the vibration-induced pressure field is to straighten the liquid bridge free surface to compensate for the deformation caused by gravity. As a consequence, the apparent Bond number decreases and the maximum liquid bridge length increases. In this paper, we show experimentally that this procedure can be used to stabilize millimeter liquid bridges in air under normal gravity conditions. The breakup of vibrated liquid bridges is examined experimentally and compared with that produced in absence of vibration. In addition, we analyze numerically the dynamics of axisymmetric liquid bridges far from the Plateau-Rayleigh instability limit by solving the Navier-Stokes equations. We calculate the eigenfrequencies characterizing the linear oscillation modes of vibrated liquid bridges, and determine their stability limits. The breakup process of a vibrated liquid bridge at that stability limit is simulated too. We find qualitative agreement between the numerical predictions for both the stability limits and the breakup process and their experimental counterparts. Finally, we show the applicability of our technique to control the amount of liquid transferred between two solid surfaces. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Alternate approach slab reinforcement.

    DOT National Transportation Integrated Search

    2010-06-01

    The upper mat of reinforcing steel, in exposed concrete bridge approach slabs, is prone to corrosion damage. Chlorides applied to the highways : for winter maintenance can penetrate this concrete layer. Eventually chlorides reach the steel and begin ...

  2. p-hacking by post hoc selection with multiple opportunities: Detectability by skewness test?: Comment on Simonsohn, Nelson, and Simmons (2014).

    PubMed

    Ulrich, Rolf; Miller, Jeff

    2015-12-01

    Simonsohn, Nelson, and Simmons (2014) have suggested a novel test to detect p-hacking in research, that is, when researchers report excessive rates of "significant effects" that are truly false positives. Although this test is very useful for identifying true effects in some cases, it fails to identify false positives in several situations when researchers conduct multiple statistical tests (e.g., reporting the most significant result). In these cases, p-curves are right-skewed, thereby mimicking the existence of real effects even if no effect is actually present. (c) 2015 APA, all rights reserved).

  3. Optimised quantum hacking of superconducting nanowire single-photon detectors

    NASA Astrophysics Data System (ADS)

    Tanner, Michael G.; Makarov, Vadim; Hadfield, Robert H.

    2014-03-01

    We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.

  4. Macroscopic and stereomicroscopic comparison of hacking trauma of bones before and after carbonization.

    PubMed

    Alunni, Véronique; Nogueira, Luísa; Quatrehomme, Gérald

    2018-03-01

    This experimental study examined lesions produced by a hatchet on pig femurs before and after carbonization. A total of 30 lesions were produced and analyzed using stereomicroscopy and then reexamined after carbonization. Not only was the sharp-blunt mechanism of the hacking trauma (V-shape, regularity of one edge, irregularity of the other edge, upraising, lateral pushing back, fossae dug laterally to the edge) still recognizable after carbonization; in some instances, the carbonization actually enhanced the features observed. Carbonization also did not significantly alter the measurements of the lesions. Carbonization tends to alter the structure of the bone especially in areas weakened by the blunt trauma.

  5. Optimised quantum hacking of superconducting nanowire single-photon detectors.

    PubMed

    Tanner, Michael G; Makarov, Vadim; Hadfield, Robert H

    2014-03-24

    We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.

  6. A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?

    PubMed

    Bodford, Jessica E; Kwan, Virginia S Y

    2018-02-01

    The current study examines hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) through a general game theoretic framework-that is, as a product of costs and benefits. Given the inherent risk of carrying out a hacktivist attack (e.g., legal action, imprisonment), it would be rational for the user to weigh these risks against perceived benefits of carrying out the attack. As such, we examined computer science students' estimations of risks, payoffs, and attack likelihood through a game theoretic design. Furthermore, this study aims at constructing a descriptive profile of potential hacktivists, exploring two predicted covariates of attack decision making, namely, peer prevalence of hacking and sex differences. Contrary to expectations, results suggest that participants' estimations of attack likelihood stemmed solely from expected payoffs, rather than subjective risks. Peer prevalence significantly predicted increased payoffs and attack likelihood, suggesting an underlying descriptive norm in social networks. Notably, we observed no sex differences in the decision to attack, nor in the factors predicting attack likelihood. Implications for policymakers and the understanding and prevention of hacktivism are discussed, as are the possible ramifications of widely communicated payoffs over potential risks in hacking communities.

  7. Editing Transgenic DNA Components by Inducible Gene Replacement in Drosophila melanogaster

    PubMed Central

    Lin, Chun-Chieh; Potter, Christopher J.

    2016-01-01

    Gene conversions occur when genomic double-strand DNA breaks (DSBs) trigger unidirectional transfer of genetic material from a homologous template sequence. Exogenous or mutated sequence can be introduced through this homology-directed repair (HDR). We leveraged gene conversion to develop a method for genomic editing of existing transgenic insertions in Drosophila melanogaster. The clustered regularly-interspaced palindromic repeats (CRISPR)/Cas9 system is used in the homology assisted CRISPR knock-in (HACK) method to induce DSBs in a GAL4 transgene, which is repaired by a single-genomic transgenic construct containing GAL4 homologous sequences flanking a T2A-QF2 cassette. With two crosses, this technique converts existing GAL4 lines, including enhancer traps, into functional QF2 expressing lines. We used HACK to convert the most commonly-used GAL4 lines (labeling tissues such as neurons, fat, glia, muscle, and hemocytes) to QF2 lines. We also identified regions of the genome that exhibited differential efficiencies of HDR. The HACK technique is robust and readily adaptable for targeting and replacement of other genomic sequences, and could be a useful approach to repurpose existing transgenes as new genetic reagents become available. PMID:27334272

  8. A consistent framework for Horton regression statistics that leads to a modified Hack's law

    USGS Publications Warehouse

    Furey, P.R.; Troutman, B.M.

    2008-01-01

    A statistical framework is introduced that resolves important problems with the interpretation and use of traditional Horton regression statistics. The framework is based on a univariate regression model that leads to an alternative expression for Horton ratio, connects Horton regression statistics to distributional simple scaling, and improves the accuracy in estimating Horton plot parameters. The model is used to examine data for drainage area A and mainstream length L from two groups of basins located in different physiographic settings. Results show that confidence intervals for the Horton plot regression statistics are quite wide. Nonetheless, an analysis of covariance shows that regression intercepts, but not regression slopes, can be used to distinguish between basin groups. The univariate model is generalized to include n > 1 dependent variables. For the case where the dependent variables represent ln A and ln L, the generalized model performs somewhat better at distinguishing between basin groups than two separate univariate models. The generalized model leads to a modification of Hack's law where L depends on both A and Strahler order ??. Data show that ?? plays a statistically significant role in the modified Hack's law expression. ?? 2008 Elsevier B.V.

  9. Development of a turn-key cloud chamber in collaboration with non-academic science enthusiasts

    NASA Astrophysics Data System (ADS)

    Muenkel, Jessica; Harrington, Meghan; Bellis, Matthew; Waldman, Ariel; Bergey, Nathan; Cooper, Ivan; Bombosch, Juliane

    2014-03-01

    Science Hack Day is an event that brings together scientists and science enthusiasts for 24 hours to ``hack'' a science project. These events serve two purposes. The first and most obvious is to provide a structured environment for science outreach. Academics and researchers have the opportunity for ``boots-on-the-ground'' interactions with the general public. The second purpose, though more challenging, is to enable science enthusiasts to donate their skills so that they are able to push back to educators and researchers in a fashion that that benefits their work. We discuss our experiences at the 2013 San Francisco Science Hack Day at the California Academy of Sciences. We worked with attendees of the conference to create a cloud chamber that worked with Peltier thermocoolers, rather than dry ice. In this fashion, we educated attendees about radiation and particle physics, while also benefitting from the experience and knowledge of the attendees in constructing the device. This ``turn-key'' cloud chamber is now in use at Siena College as an outreach and educational device. The properties of this device and the story of its construction will be presented. Representing CMS.

  10. Quantum key distribution with hacking countermeasures and long term field trial.

    PubMed

    Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J

    2017-05-16

    Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.

  11. The Role of Technologies, Behaviors, Gender, and Gender Stereotype Traits in Adolescents' Cyber Aggression.

    PubMed

    Wright, Michelle F

    2017-03-01

    The present study focused on the impact of gender and gender stereotype traits (i.e., masculinity, femininity) on cyber aggression perpetration utilizing different technologies (i.e., social-networking sites, gaming consoles, mobile phones) and behaviors (i.e., cyber relational aggression, cyber verbal aggression, hacking). Participants included 233 eighth graders (108 female; M age = 13.26, SD = 0.36) from two middle schools in the Midwestern United States. Adolescents completed questionnaires on their endorsement of masculinity and femininity traits as well as how often they engaged in cyber aggression perpetration (i.e., cyber relational aggression, cyber verbal aggression, hacking) through mobile phones, social-networking sites, and gaming consoles. Findings indicated that boys and girls with more feminine traits engaged in more cyber relational aggression through social-networking sites and mobile phones, while boys and girls who endorsed more masculine traits perpetrated this behavior and cyber verbal aggression more often through online gaming. In addition, these boys and girls engaged in more hacking through all technologies when compared with girls and boys who reported more feminine traits. Results of this study indicate the importance of delineating gender stereotype traits, behaviors, and technologies when examining cyber aggression perpetration.

  12. Hackathons as A Capacity Building Tool for Environmental Applications

    NASA Astrophysics Data System (ADS)

    Bye, B. L.; Mildorf, T.; Charvat, K.; Berre, A. J.

    2017-12-01

    Today's society requires easy, reliable and quick access to environmental information published by various organizations and initiatives. The environment questions require many activities that produce various sorts of data; by authorities through operation of instruments such as satellites, and through informal local and community activities producing videos, photos or oral stories. The collected information can contribute to up-to-date data. Volunteered geographic information (VGI) is the harnessing of tools to create, assemble, and disseminate geographic data provided voluntarily by individuals. Under the INSPIRE (Infrastructure for spatial information in Europe) umbrella, a number of EU projects co-organize hackathons - the INSPIRE Hack. The INSPIRE Hack focuses on methods where citizens are able to contribute to different environmental and societal issues through smart phones and other sensors. The INSPIRE Hack supports creativity, innovation, technical capabilities and knowledge sharing by combining open data, VGI, and data from citizens observatories or other citizen science activities. This presentation offer a capacity building perspective on the INSPIRE hackathons, the co-design aspects and the argility with respect to the accelerating technological and social innovations, and effective up-take in societal use. Starting in Europe, the concept can be broadened to encompass all continents.

  13. Use and selection of bridges as day roosts by Rafinesque's Big Eared Bats.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bennett, Frances, M.; Loeb, Susan, C.; Bunch, Mary, S.

    ABSTRACT.—Rafinesque’s big-eared bats (Corynorhinus rafinesquii) use bridges as day roosts in parts of their range, but information on bridge use across their range is lacking. From May to Aug. 2002 we surveyed 1129 bridges (12.5%) within all 46 counties of South Carolina to determine use and selection of bridges as day roosts by big-eared bats and to document their distribution across the state. During summer 2003, we visited 235 bridges in previously occupied areas of the state to evaluate short-term fidelity to bridge roosts. We found colonies and solitary big-eared bats beneath 38 bridges in 2002 and 54 bridges inmore » 2003. Construction type and size of bridges strongly influenced use in both years; bats selected large, concrete girder bridges and avoided flat-bottomed slab bridges. The majority of occupied bridges (94.7%) were in the Upper and Lower Coastal Plains, but a few bridges (5.3%) were located in the Piedmont. Rafinesque’s big-eared bats were absent beneath bridges in the Blue Ridge Mountains. We established new records of occurrence for 10 counties. In the Coastal Plains, big-eared bats exhibited a high degree of short-term fidelity to roosts in highway bridges. For bridges that were occupied at least once, mean frequency of use was 65.9%. Probability of finding bats under a bridge ranged from 0.46 to 0.73 depending on whether the bridge was occupied in the previous year. Thus, bridges should be inspected three to five times in a given year to determine whether they are being used. Regional bridge roost surveys may be a good method for determining the distribution of C. rafinesquii, particularly in the Coastal Plains, and protection of suitable bridges may be a viable conservation strategy where natural roost sites are limited.« less

  14. Fuel transfer system

    DOEpatents

    Townsend, Harold E.; Barbanti, Giancarlo

    1994-01-01

    A nuclear fuel bundle fuel transfer system includes a transfer pool containing water at a level above a reactor core. A fuel transfer machine therein includes a carriage disposed in the transfer pool and under the water for transporting fuel bundles. The carriage is selectively movable through the water in the transfer pool and individual fuel bundles are carried vertically in the carriage. In a preferred embodiment, a first movable bridge is disposed over an upper pool containing the reactor core, and a second movable bridge is disposed over a fuel storage pool, with the transfer pool being disposed therebetween. A fuel bundle may be moved by the first bridge from the reactor core and loaded into the carriage which transports the fuel bundle to the second bridge which picks up the fuel bundle and carries it to the fuel storage pool.

  15. Fuel transfer system

    DOEpatents

    Townsend, H.E.; Barbanti, G.

    1994-03-01

    A nuclear fuel bundle fuel transfer system includes a transfer pool containing water at a level above a reactor core. A fuel transfer machine therein includes a carriage disposed in the transfer pool and under the water for transporting fuel bundles. The carriage is selectively movable through the water in the transfer pool and individual fuel bundles are carried vertically in the carriage. In a preferred embodiment, a first movable bridge is disposed over an upper pool containing the reactor core, and a second movable bridge is disposed over a fuel storage pool, with the transfer pool being disposed therebetween. A fuel bundle may be moved by the first bridge from the reactor core and loaded into the carriage which transports the fuel bundle to the second bridge which picks up the fuel bundle and carries it to the fuel storage pool. 6 figures.

  16. How bacteria hack the matrix and dodge the bullets of immunity.

    PubMed

    Paulsson, Magnus; Riesbeck, Kristian

    2018-06-30

    Haemophilus influenzae , Moraxella catarrhalis and Pseudomonas aeruginosa are common Gram-negative pathogens associated with an array of pulmonary diseases. All three species have multiple adhesins in their outer membrane, i.e. surface structures that confer the ability to bind to surrounding cells, proteins or tissues. This mini-review focuses on proteins with high affinity for the components of the extracellular matrix such as collagen, laminin, fibronectin and vitronectin. Adhesins are not structurally related and may be lipoproteins, transmembrane porins or large protruding trimeric auto-transporters. They enable bacteria to avoid being cleared together with mucus by attaching to patches of exposed extracellular matrix, or indirectly adhering to epithelial cells using matrix proteins as bridging molecules. As more adhesins are being unravelled, it is apparent that bacterial adhesion is a highly conserved mechanism, and that most adhesins target the same regions on the proteins of the extracellular matrix. The surface exposed adhesins are prime targets for new vaccines and the interactions between proteins are often possible to inhibit with interfering molecules, e.g heparin. In conclusion, this highly interesting research field of microbiology has unravelled host-pathogen interactions with high therapeutic potential. Copyright ©ERS 2018.

  17. 22. View showing main anchor arm, as viewed from main ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    22. View showing main anchor arm, as viewed from main cantilever arm looking south. Note upper chord eyebar arrangement. - Williamstown-Marietta Bridge, Spanning Ohio River between Williamstown & Marietta, Williamstown, Wood County, WV

  18. Upper Extremity Proprioception After Stroke: Bridging the Gap Between Neuroscience and Rehabilitation.

    PubMed

    Findlater, Sonja E; Dukelow, Sean P

    2017-01-01

    Proprioception is an important aspect of function that is often impaired in the upper extremity following stroke. Unfortunately, neurorehabilitation has few evidence based treatment options for those with proprioceptive deficits. The authors consider potential reasons for this disparity. In doing so, typical assessments and proprioceptive intervention studies are discussed. Relevant evidence from the field of neuroscience is examined. Such evidence may be used to guide the development of targeted interventions for upper extremity proprioceptive deficits after stroke. As researchers become more aware of the impact of proprioceptive deficits on upper extremity motor performance after stroke, it is imperative to find successful rehabilitation interventions to target these deficits and ultimately improve daily function.

  19. Space Radar Image of Calcutta, West Bengal, India

    NASA Technical Reports Server (NTRS)

    1994-01-01

    This radar image of Calcutta, India, illustrates different urban land use patterns. Calcutta, the largest city in India, is located on the banks of the Hugli River, shown as the thick, dark line in the upper portion of the image. The surrounding area is a flat swampy region with a subtropical climate. As a result of this marshy environment, Calcutta is a compact city, concentrated along the fringes of the river. The average elevation is approximately 9 meters (30 feet) above sea level. Calcutta is located 154 kilometers (96 miles) upstream from the Bay of Bengal. Central Calcutta is the light blue and orange area below the river in the center of the image. The bridge spanning the river at the city center is the Howrah Bridge which links central Calcutta to Howrah. The dark region just below the river and to the left of the city center is Maidan, a large city park housing numerous cultural and recreational facilities. The international airport is in the lower right of the image. The bridge in the upper right is the Bally Bridge which links the suburbs of Bally and Baranagar. This image is 30 kilometers by 10 kilometers (19 miles by 6 miles)and is centered at 22.3 degrees north latitude, 88.2 degrees east longitude. North is toward the upper right. The colors are assigned to different radar frequencies and polarizations as follows: red is L-band, horizontally transmitted and received; green is L-band, horizontally transmitted and vertically received; and blue is C-band, horizontally transmitted and vertically received. The image was acquired by the Spaceborne Imaging Radar-C/X-band Synthetic Aperture Radar (SIR-C/X-SAR) on October 5, 1994, onboard the Space Shuttle Endeavour. SIR-C/X SAR, a joint mission of the German, Italian and United States space agencies, is part of NASA's Mission to Planet Earth program.

  20. Salinity Processes in the Upper Ocean Regional Study (SPURS)

    NASA Image and Video Library

    2012-09-04

    The bow of the Woods Hole Oceanographic Institution's research vessel Knorr is seen from the bridge on Tuesday, Sept. 4, 2012, in Woods Hole, Mass. Knorr is scheduled to depart on Sept. 6 to take part in the Salinity Processes in the Upper Ocean Regional Study (SPURS). The NASA-sponsored expedition will sail to the North Atlantic's saltiest spot to get a detailed, 3-D picture of how salt content fluctuates in the ocean's upper layers and how these variations are related to shifts in rainfall patterns around the planet. Photo Credit: (NASA/Bill Ingalls)

  1. Salinity Processes in the Upper Ocean Regional Study (SPURS)

    NASA Image and Video Library

    2012-09-04

    International maritime signal flags are seen on the bridge of the Woods Hole Oceanographic Institution's research vessel Knorr on Tuesday, Sept. 4, 2012, in Woods Hole, Mass. Knorr is scheduled to depart on Sept. 6 to take part in the Salinity Processes in the Upper Ocean Regional Study (SPURS). The NASA-sponsored expedition will sail to the North Atlantic's saltiest spot to get a detailed, 3-D picture of how salt content fluctuates in the ocean's upper layers and how these variations are related to shifts in rainfall patterns around the planet. Photo Credit: (NASA/Bill Ingalls)

  2. 6. BUILDER'S PLATE ON WEST TRUSS: 'MOSELEY IRON BUILDING WORKS, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. BUILDER'S PLATE ON WEST TRUSS: 'MOSELEY IRON BUILDING WORKS, BOSTON 1888, PATENTED 1881 TO T.W.E. MOSELEY' - Upper Pacific Mills Bridge, Moved to Merrimack College, North Andover, MA, Lawrence, Essex County, MA

  3. 5. DETAIL VIEW OF TWO PANEL POINTS OF TRUSS, SHOWING ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    5. DETAIL VIEW OF TWO PANEL POINTS OF TRUSS, SHOWING OVAL, TUBULAR UPPER CHORD MEMBER, VERTICALS, DIAGONALS, AND LOWER CHORD. - White Bowstring Arch Truss Bridge, Spanning Yellow Creek at Cemetery Drive (Riverside Drive), Poland, Mahoning County, OH

  4. 77 FR 29897 - Drawbridge Operation Regulation; Willamette River, Portland, OR

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-21

    ... traffic associated with the Rose Parade in Portland, Oregon. This deviation allows the upper deck of the... with the Rose Parade. The Steel Bridge crosses the Willamette River at mile 12.1 and is a double-deck...

  5. 1. VIEW NORTH OF OLD POWERHOUSE (FOREGROUND) AND NEW POWERHOUSE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    1. VIEW NORTH OF OLD POWERHOUSE (FOREGROUND) AND NEW POWERHOUSE (RIGHT BACKGROUND). RETAINING WALL WITH TAILRACE OUTLETS BELOW POWERHOUSES. TRANSFORMER YARD UPPER LEFT. ELEVATOR/STAIR TOWER OF NEW POWERHOUSE, WITH BRIDGE TO TOP OF GORGE, AT UPPER RIGHT CENTER, IN FRONT OF 1965 SURGE TANK. - Trenton Falls Hydroelectric Station, Powerhouse & Substation, On west bank of West Canada Creek, along Trenton Falls Road, 1.25 miles north of New York Route 28, Trenton Falls, Oneida County, NY

  6. Profile of capillary bridges between two vertically stacked cylindrical fibers under gravitational effect

    NASA Astrophysics Data System (ADS)

    Sun, Xiaohang; Lee, Hoon Joo; Michielsen, Stephen; Wilusz, Eugene

    2018-05-01

    Although profiles of axisymmetric capillary bridges between two cylindrical fibers have been extensively studied, little research has been reported on capillary bridges under external forces such as the gravitational force. This is because external forces add significant complications to the Laplace-Young equation, making it difficult to predict drop profiles based on analytical approaches. In this paper, simulations of capillary bridges between two vertically stacked cylindrical fibers with gravitational effect taken into consideration are studied. The asymmetrical structure of capillary bridges that are hard to predict based on analytical approaches was studied via a numerical approach based on Surface Evolver (SE). The axial and the circumferential spreading of liquids on two identical fibers in the presence of gravitational effects are predicted to determine when the gravitational effects are significant or can be neglected. The effect of liquid volume, equilibrium contact angle, the distance between two fibers and fiber radii. The simulation results were verified by comparing them with experimental measurements. Based on SE simulations, curves representing the spreading of capillary bridges along the two cylindrical fibers were obtained. The gravitational effect was scaled based on the difference of the spreading on upper and lower fibers.

  7. 76. Photocopy of photograph (original print in the Minnesota Historical ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    76. Photocopy of photograph (original print in the Minnesota Historical Society, St. Paul, Minnesota, 1860. #22358.) UPPER LEVEE FROM CHESTNUT STREET, 1860 - Smith Avenue High Bridge, Smith Avenue between Cherokee Avenue & Cliff Street, Saint Paul, Ramsey County, MN

  8. 2. OVERALL VIEW OF LOWWATER DAM, LOOKING UPSTREAM. CHAIN OF ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    2. OVERALL VIEW OF LOW-WATER DAM, LOOKING UPSTREAM. CHAIN OF ROCKS BRIDGE AND ST. LOUIS WATER DEPARTMENT INTAKE IN BACKGROUND, LOOKING NORTHWEST - Upper Mississippi River 9-Foot Channel Project, Lock & Dam 27, Granite City, Madison County, IL

  9. DETAIL OF VERTICAL AT PANEL OVER PIER C, SHOWING DECK, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    DETAIL OF VERTICAL AT PANEL OVER PIER C, SHOWING DECK, GUARDRAIL, VERTICAL AND UPPER CHORD, VIEW TO NORTHEAST. - Blue Water Bridge, Spanning St. Clair River at I-69, I-94, & Canadian Route 402, Port Huron, St. Clair County, MI

  10. 75 FR 76279 - Drawbridge Operation Regulation; Upper Mississippi River, Burlington, IA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... bridge owner time to replace the swing span with a lift span and to construct the right descending tower... the Truman-Hobbs alteration. The new lift span will be set in place and the right descending tower...

  11. Hacked E-mail

    MedlinePlus

    ... Money & Credit Homes & Mortgages Health & Fitness Jobs & Making Money Privacy, Identity & Online Security Limiting Unwanted Calls and Emails Online Security "Free" Security Scans Computer Security Disposing of Old Computers ...

  12. Hack the Planet: What we Talk About When we Talk About Geoengineering

    NASA Astrophysics Data System (ADS)

    Kintisch, E.

    2010-12-01

    Hack the Planet (Wiley, 2010) explores how an idea once basically anathema to meetings like AGU has, in the space of a few years, become part of the geoscience mainstream. Through chapters involving researchers like David Battisti, Stephen Salter, Edward Teller and Brent Constanz the book documents the roots of this shift and how scientists are breaking new ground in the controversial field. And it shows how trying to engineer the planet's climate or manage its carbon poses novel scientific, geopolitical and moral risks and rewards. This session will cover how the topic of climate engineering has moved from something geoscientists don't talk about to something geoscientists can talk about, to something, in my view, that geoscientists must talk about.

  13. Mechanical Evolution and Dynamics of Decollement Slip in Contractional Systems: Correlating Macro- and Micro-Scale Processes in Particle Dynamics Simulation

    NASA Astrophysics Data System (ADS)

    Morgan, J. K.

    2014-12-01

    Particle-based numerical simulations allow detailed investigations of small-scale processes and mechanisms associated with fault initiation and slip, which emerge naturally in such models. This study investigates the evolving mechanical conditions and associated micro-mechanisms during transient slip on a weak decollement propagating beneath a growing contractional wedge (e.g., accretionary prism, fold and thrust belt). The models serve as analogs of the seismic cycle, although lacking full earthquake dynamics. Nonetheless, the mechanical evolution of both decollement and upper plate can be monitored, and correlated with the particle-scale physical and contact properties, providing insights into changes that accompany such stick-slip behavior. In this study, particle assemblages consolidated under gravity and bonded to impart cohesion, are pushed at a constant velocity above a weak, unbonded decollement surface. Forward propagation of decollement slip occurs in discrete pulses, modulated by heterogeneous stress conditions (e.g., roughness, contact bridging) along the fault. Passage of decollement slip resets the stress along this horizon, producing distinct patterns: shear stress is enhanced in front of the slipped decollement due to local contact bridging and fault locking; shear stress minima occur immediately above the tip, denoting local stress release and contact reorganization following slip; more mature portions of the fault exhibit intermediate shear stress, reflecting more stable contact force distributions and magnitudes. This pattern of shear stress pre-conditions the decollement for future slip events, which must overcome the high stresses at the fault tip. Long-term slip along the basal decollement induces upper plate contraction. When upper plate stresses reach critical strength conditions, new thrust faults break through the upper plate, relieving stresses and accommodating horizontal shortening. Decollement activity retreats back to the newly formed thrust fault. The cessation of upper plate fault slip causes gradual increases in upper plate stresses, rebuilding shear stresses along the decollement and enabling renewed pulses of decollement slip. Thus, upper plate deformation occurs out of phase with decollement propagation.

  14. The Online Underworld.

    ERIC Educational Resources Information Center

    Scrogan, Len

    1988-01-01

    Discusses some of the misuses of telecommunicating using school computers, including online piracy, hacking, phreaking, online crime, and destruction boards. Suggests ways that schools can deal with these problems. (TW)

  15. 4. VIEW FROM NORTH SIDE OF SPILLWAY LOOKING WESTERLY AT ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    4. VIEW FROM NORTH SIDE OF SPILLWAY LOOKING WESTERLY AT THE TWO WATER INTAKE STRUCTURES AND FOOT BRIDGES - Upper Doughty Dam, 200 feet west of Garden State Parkway, 1.7 miles west of Absecon, Egg Harbor City, Atlantic County, NJ

  16. 15. DETAIL OF WORKS PROGRESS ADMINISTRATION (WPA) MONUMENT LOCATED ON ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. DETAIL OF WORKS PROGRESS ADMINISTRATION (WPA) MONUMENT LOCATED ON TOP OF BANK JUST SOUTH OF NORTH FOOT BRIDGE - Upper Doughty Dam, 200 feet west of Garden State Parkway, 1.7 miles west of Absecon, Egg Harbor City, Atlantic County, NJ

  17. 4. DETAIL VIEW OF ROCKFILL SECTION OF LOWWATER DAM, LOOKING ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    4. DETAIL VIEW OF ROCKFILL SECTION OF LOW-WATER DAM, LOOKING NORTHEAST (UPSTREAM). CHAIN OF ROCKS BRIDGE AND ST. LOUIS WATER DEPARTMENT INTAKES IN BACKGROUND - Upper Mississippi River 9-Foot Channel Project, Lock & Dam 27, Granite City, Madison County, IL

  18. 33 CFR 161.25 - Vessel Traffic Service New York Area.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Raritan Bay to the Raritan River Rail Road Bridge; and then north including the waters of the Arthur Kill... waters of the Kill Van Kull and Upper New York Bay north to a line drawn east-west from the Holland...

  19. 33 CFR 161.25 - Vessel Traffic Service New York Area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Raritan Bay to the Raritan River Rail Road Bridge; and then north including the waters of the Arthur Kill... waters of the Kill Van Kull and Upper New York Bay north to a line drawn east-west from the Holland...

  20. 33 CFR 161.25 - Vessel Traffic Service New York Area.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Raritan Bay to the Raritan River Rail Road Bridge; and then north including the waters of the Arthur Kill... waters of the Kill Van Kull and Upper New York Bay north to a line drawn east-west from the Holland...

  1. 33 CFR 161.25 - Vessel Traffic Service New York Area.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Raritan Bay to the Raritan River Rail Road Bridge; and then north including the waters of the Arthur Kill... waters of the Kill Van Kull and Upper New York Bay north to a line drawn east-west from the Holland...

  2. Geomorphic characterization of hilly relief in the north alpine foreland basin: The Hausruck- and Kobernaußerwald region

    NASA Astrophysics Data System (ADS)

    Baumann, Sebastian; Robl, Jörg; Keil, Melanie; Salcher, Bernhard

    2014-05-01

    The area of the Hausruck and Kobernaußerwald represents the highest relief of the Molasse Basin in Upper Austria. The region is characterized by a dissected landscape with elevation differences of 400 m and peaks reaching up to 800 m. The latest marine influence of this realm is dated to 11 Ma before present and constrains the onset of the inversion of the peripheral alpine foreland basin. Since that time the relief evolution is controlled by surface uplift and fluvial erosion. The Hausruck-Kobernaußerwald region forms a local watershed and is drained by three drainage systems that are tributaries of the Inn River, the Traun River and the Trattnach River. The Danube River represents the base level for all these streams. In contrary to the nearby Eastern Alps the study area shows no evidence for local deformation or glacial overprint. Therefore, the Hausruck- Kobernaußerwald region represents a perfect testing ground to explore the evolution of relief in a setting of regional uplift and relative base level lowering. This is done by characterizing the fluvial and hillslope system and exploring the effect of contrasting lithology and different base levels. We further give constraints on the geomorphological state of equilibrium and provide a discussion about the spatial position of the highest relief within the Molasse Basin in Upper Austria. Therefore, we have performed a series of morphometric analyses on a high resolution LiDAR digital elevation model. This includes longitudinal channel profiles, the best fit concavity index, the steepness and the normalized steepness index, the slope-area relationship, the slope elevation distribution and hypsometric curves of all individual catchments. All longitudinal channel profiles are graded and show a concave form without any natural knickpoints with best fit concavity indices in the range of 0.35 and 0.55. All observed knick points in the channel profiles could be traced back to an anthropogenic impact like bridges or culverts. Interestingly, the transition from one lithological unit to another does not influence the channel slopes in the profiles suggesting that the erodibility of different rock types is in the same order of magnitude. The contributing drainage area and channel slope for all catchments of the study area follow a power law relationship as proposed by Hack. The transition from hillslope- to fluvial processes is observed in channel slope-drainage area plots and is consistently identified in longitudinal channel profiles at very small drainage areas (A < 0.05 km²). Hypsometric curves commonly show a S-shaped form with hypsometric integrals close to 0.5 suggesting a topographic steady-state of the study area.

  3. Occupational Noise Exposure on a Royal Navy Warship During Weapon Fire

    PubMed Central

    Paddan, Gurmail Singh

    2016-01-01

    Introduction: Measurements were made of the sound pressure levels on a military ship HMS Grimsby during firing of a Heavy Machine Gun (HMG) mounted on the starboard bridge wing. The measurement positions comprised three locations on the ship's bridge (the wheelhouse) and one location on the starboard bridge wing. Equipment and Procedure: The three locations on the bridge were the starboard door, centre and port door. A total of 255 burst firings were measured during the survey comprising 850 rounds with each burst encompassing from 1 to 10 rounds. Analysis: The data have been assessed and interpreted in accordance with the Control of Noise at Work Regulations 2005. Results: The highest peak sound pressure levels measured on the bridge wing and on the bridge were 160.7 dB(C) (2170 Pa) and 122.7 dB(C) (27.3 Pa), respectively. The highest sound exposure levels measured on the bridge wing and on the bridge corresponding to one round being fired were 127.8 dB(A) and 88.9 dB(A), respectively. The ship's structure provided about 40 dB attenuation in the transmitted noise. Discussion: The operator of the weapon would be required to wear some form of hearing protection. On the basis of the measured peak noise levels, there would be no requirement for bridge crew to wear any hearing protection during firing of a HMG. However, crew exposure to noise on the bridge is likely to exceed the upper exposure action value corresponding to 85 dB(A) after about 11,750 rounds. Conclusions: Measurements made on the bridge wings are likely to be affected by reflections from the ship's structure. PMID:27762256

  4. Occupational noise exposure on a Royal Navy warship during weapon fire.

    PubMed

    Paddan, Gurmail Singh

    2016-01-01

    Measurements were made of the sound pressure levels on a military ship HMS Grimsby during firing of a Heavy Machine Gun (HMG) mounted on the starboard bridge wing. The measurement positions comprised three locations on the ship's bridge (the wheelhouse) and one location on the starboard bridge wing. Equipment and Procedure: The three locations on the bridge were the starboard door, centre and port door. A total of 255 burst firings were measured during the survey comprising 850 rounds with each burst encompassing from 1 to 10 rounds. The data have been assessed and interpreted in accordance with the Control of Noise at Work Regulations 2005. The highest peak sound pressure levels measured on the bridge wing and on the bridge were 160.7 dB(C) (2170 Pa) and 122.7 dB(C) (27.3 Pa), respectively. The highest sound exposure levels measured on the bridge wing and on the bridge corresponding to one round being fired were 127.8 dB(A) and 88.9 dB(A), respectively. The ship's structure provided about 40 dB attenuation in the transmitted noise. The operator of the weapon would be required to wear some form of hearing protection. On the basis of the measured peak noise levels, there would be no requirement for bridge crew to wear any hearing protection during firing of a HMG. However, crew exposure to noise on the bridge is likely to exceed the upper exposure action value corresponding to 85 dB(A) after about 11,750 rounds. Measurements made on the bridge wings are likely to be affected by reflections from the ship's structure.

  5. Channel stability of Turkey Creek, Nebraska

    USGS Publications Warehouse

    Rus, David L.; Soenksen, Philip J.

    1998-01-01

    Channelization on Turkey Creek and its receiving stream, the South Fork Big Nemaha River, has disturbed the equilibrium of Turkey Creek and has led to channel-stability problems, such as degradation and channel widening, which pose a threat to bridges and land adjacent to the stream. As part of a multiagency study, the U.S. Geological Survey assessed channel stability at two bridge sites on upper and middle portions of Turkey Creek by analyzing streambed-elevation data for gradation changes, comparing recent cross-section surveys and historic accounts, identifying bank-failure blocks, and analyzing tree-ring samples. These results were compared to gradation data and trend results for a U.S. Geological Survey streamflow-gaging station near the mouth of Turkey Creek from a previous study. Examination of data on streambed elevations reveals that degradation has occurred. The streambed elevation declined 0.5 m at the upper site from 1967-97. The streambed elevation declined by 3.2 m at the middle site from 1948-97 and exposed 2 m of the pilings of the Nebraska Highway 8 bridge. Channel widening could not be verified at the two sites from 1967-97, but a historic account indicates widening at the middle site to be two to three times that of the 1949 channel width. Small bank failures were evident at the upper site and a 4-m-wide bank failure occurred at the middle site in 1987 according to tree ring analyses. Examination of streambed-elevation data from a previous study at the lower site reveals a statistically significant aggrading trend from 1958-93. Further examination of these data suggests minor degradation occurred until 1975, followed by aggradation.

  6. Hacked off.

    PubMed

    1988-05-28

    The new book on occupational health for nurses called Nurses At Risk written by [illegible word] Salvage, former Nursing Standard journalist and Rosemary Rogers, currently our Clinical News Editor, received widespread press coverage.

  7. On the security of semi-device-independent QKD protocols

    NASA Astrophysics Data System (ADS)

    Chaturvedi, Anubhav; Ray, Maharshi; Veynar, Ryszard; Pawłowski, Marcin

    2018-06-01

    While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.

  8. 5. VIEW FROM TOP OF DAM ABOVE SPILLWAY LOOKING WESTERLY ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    5. VIEW FROM TOP OF DAM ABOVE SPILLWAY LOOKING WESTERLY TO NORTHWESTERLY ACROSS RESERVOIR. TWO WATER INTAKE STRUCTURES AND FOOT BRIDGES IN FOREGROUND - Upper Doughty Dam, 200 feet west of Garden State Parkway, 1.7 miles west of Absecon, Egg Harbor City, Atlantic County, NJ

  9. Examining publication bias—a simulation-based evaluation of statistical tests on publication bias

    PubMed Central

    2017-01-01

    Background Publication bias is a form of scientific misconduct. It threatens the validity of research results and the credibility of science. Although several tests on publication bias exist, no in-depth evaluations are available that examine which test performs best for different research settings. Methods Four tests on publication bias, Egger’s test (FAT), p-uniform, the test of excess significance (TES), as well as the caliper test, were evaluated in a Monte Carlo simulation. Two different types of publication bias and its degree (0%, 50%, 100%) were simulated. The type of publication bias was defined either as file-drawer, meaning the repeated analysis of new datasets, or p-hacking, meaning the inclusion of covariates in order to obtain a significant result. In addition, the underlying effect (β = 0, 0.5, 1, 1.5), effect heterogeneity, the number of observations in the simulated primary studies (N = 100, 500), and the number of observations for the publication bias tests (K = 100, 1,000) were varied. Results All tests evaluated were able to identify publication bias both in the file-drawer and p-hacking condition. The false positive rates were, with the exception of the 15%- and 20%-caliper test, unbiased. The FAT had the largest statistical power in the file-drawer conditions, whereas under p-hacking the TES was, except under effect heterogeneity, slightly better. The CTs were, however, inferior to the other tests under effect homogeneity and had a decent statistical power only in conditions with 1,000 primary studies. Discussion The FAT is recommended as a test for publication bias in standard meta-analyses with no or only small effect heterogeneity. If two-sided publication bias is suspected as well as under p-hacking the TES is the first alternative to the FAT. The 5%-caliper test is recommended under conditions of effect heterogeneity and a large number of primary studies, which may be found if publication bias is examined in a discipline-wide setting when primary studies cover different research problems. PMID:29204324

  10. Progressive upper limb prosthetics.

    PubMed

    Lake, Chris; Dodson, Robert

    2006-02-01

    The field of upper extremity prosthetics is a constantly changing arena as researchers and prosthetists strive to bridge the gap between prosthetic reality and upper limb physiology. With the further development of implantable neurologic sensing devices and targeted muscle innervation (discussed elsewhere in this issue), the challenge of limited input to control vast outputs promises to become a historical footnote in the future annals of upper limb prosthetics. Soon multidextrous terminal devices, such as that found in the iLimb system(Touch EMAS, Inc., Edinburgh, UK), will be a clinical reality (Fig. 22). Successful prosthetic care depends on good communication and cooperation among the surgeon, the amputee, the rehabilitation team, and the scientists harnessing the power of technology to solve real-life challenges. If the progress to date is any indication, amputees of the future will find their dreams limited only by their imagination.

  11. High-fidelity numerical modeling of the Upper Mississippi River under extreme flood condition

    NASA Astrophysics Data System (ADS)

    Khosronejad, Ali; Le, Trung; DeWall, Petra; Bartelt, Nicole; Woldeamlak, Solomon; Yang, Xiaolei; Sotiropoulos, Fotis

    2016-12-01

    We present data-driven numerical simulations of extreme flooding in a large-scale river coupling coherent-structure resolving hydrodynamics with bed morphodynamics under live-bed conditions. The study area is a ∼ 3.2 km long and ∼ 300 m wide reach of the Upper Mississippi River, near Minneapolis MN, which contains several natural islands and man-made hydraulic structures. We employ the large-eddy simulation (LES) and bed-morphodynamic modules of the Virtual Flow Simulator (VFS-Rivers) model, a recently developed in-house code, to investigate the flow and bed evolution of the river during a 100-year flood event. The coupling of the two modules is carried out via a fluid-structure interaction approach using a nested domain approach to enhance the resolution of bridge scour predictions. We integrate data from airborne Light Detection and Ranging (LiDAR), sub-aqueous sonar apparatus on-board a boat and in-situ laser scanners to construct a digital elevation model of the river bathymetry and surrounding flood plain, including islands and bridge piers. A field campaign under base-flow condition is also carried out to collect mean flow measurements via Acoustic Doppler Current Profiler (ADCP) to validate the hydrodynamic module of the VFS-Rivers model. Our simulation results for the bed evolution of the river under the 100-year flood reveal complex sediment transport dynamics near the bridge piers consisting of both scour and refilling events due to the continuous passage of sand dunes. We find that the scour depth near the bridge piers can reach to a maximum of ∼ 9 m. The data-driven simulation strategy we present in this work exemplifies a practical simulation-based-engineering-approach to investigate the resilience of infrastructures to extreme flood events in intricate field-scale riverine systems.

  12. Genomics Education in Practice: Evaluation of a Mobile Lab Design

    ERIC Educational Resources Information Center

    Van Mil, Marc H. W.; Boerwinkel, Dirk Jan; Buizer-Voskamp, Jacobine E.; Speksnijder, Annelies; Waarlo, Arend Jan

    2010-01-01

    Dutch genomics research centers have developed the "DNA labs on the road" to bridge the gap between modern genomics research practice and secondary-school curriculum in the Netherlands. These mobile DNA labs offer upper-secondary students the opportunity to experience genomics research through experiments with laboratory equipment that…

  13. Bridging the Transition from Primary to Secondary School

    ERIC Educational Resources Information Center

    Howe, Alan, Ed.; Richards, Val, Ed.

    2011-01-01

    The transition from primary to secondary school can often be a difficult time for children, and managing the transition smoothly has posed a problem for teachers at both upper primary and lower secondary level. At a time when "childhood" recedes and "adulthood" beckons, the inequalities between individual children can widen,…

  14. 2. PHOTOGRAPH LOOKING SOUTHEAST, OF THE SOUTH BANK OF THE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    2. PHOTOGRAPH LOOKING SOUTHEAST, OF THE SOUTH BANK OF THE RIVER, SHOWING THE SOUTH ABUTMENTS, AND THE IMMEDIATE ENVIRONMENT. THE SOUTH BANK RISES STEEPLY AND RESIDENCES ARE LOCATED ON THE UPPER ESCARPMENT. - Wabash County Bridge No. 509, Spanning Wabash River at Carroll & Smith Streets, Wabash, Wabash County, IN

  15. 74. East elevation of elevated Mainline structure (Section F6) looking ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    74. East elevation of elevated Mainline structure (Section F-6) looking West - along the Arborway toward the masonry bridge carrying the former New Haven R.R. tracks over the Arborway. Arborway overpass is at upper right. - Boston Elevated Railway, Elevated Mainline, Washington Street, Boston, Suffolk County, MA

  16. Salt bridge interactions within the β2 integrin α7 helix mediate force-induced binding and shear resistance ability.

    PubMed

    Zhang, Xiao; Li, Linda; Li, Ning; Shu, Xinyu; Zhou, Lüwen; Lü, Shouqin; Chen, Shenbao; Mao, Debin; Long, Mian

    2018-01-01

    The functional performance of the αI domain α 7 helix in β 2 integrin activation depends on the allostery of the α 7 helix, which axially slides down; therefore, it is critical to elucidate what factors regulate the allostery. In this study, we determined that there were two conservative salt bridge interaction pairs that constrain both the upper and bottom ends of the α 7 helix. Molecular dynamics (MD) simulations for three β 2 integrin members, lymphocyte function-associated antigen-1 (LFA-1; α L β 2 ), macrophage-1 antigen (Mac-1; α M β 2 ) and α x β 2 , indicated that the magnitude of the salt bridge interaction is related to the stability of the αI domain and the strength of the corresponding force-induced allostery. The disruption of the salt bridge interaction, especially with double mutations in both salt bridges, significantly reduced the force-induced allostery time for all three members. The effects of salt bridge interactions of the αI domain α 7 helix on β 2 integrin conformational stability and allostery were experimentally validated using Mac-1 constructs. The results demonstrated that salt bridge mutations did not alter the conformational state of Mac-1, but they did increase the force-induced ligand binding and shear resistance ability, which was consistent with MD simulations. This study offers new insight into the importance of salt bridge interaction constraints of the αI domain α 7 helix and external force for β 2 integrin function. © 2017 Federation of European Biochemical Societies.

  17. Applications of ground penetrating radar (GPR) in bridge deck monitoring and assessment

    NASA Astrophysics Data System (ADS)

    Alani, Amir M.; Aboutalebi, Morteza; Kilic, Gokhan

    2013-10-01

    This paper presents the essence of two case studies by the authors on two major bridges in the UK. The first case study reports on the applications of GPR and associated work carried out on the Forth Road Bridge near Edinburgh, Scotland, with the main objective of identifying possible structural defects including damaged rebar and moisture ingress at specific locations of the bridge deck. The second case study focuses on a full assessment of the Pentagon Road Bridge, in Chatham, Kent, England with particular emphasis on the identification of possible defects including structural cracks within the deck structure and establishing the layout of the upper and lower rebar positions throughout the bridge. These studies present interesting results in terms of locations of rebar and an accurate estimate of concrete cover condition as well as reporting on a remarkable similarity in the processed data concerning areas affected by ingress of moisture within the deck structures of the two bridges under investigation. It is believed that this paper will be of particular interest to bridge engineers and structural engineering practitioners with enthusiasm for adopting non-destructive testing methods such as GPR in the health monitoring and assessment of bridge structures. The observed similarities in the processed data between the two reported case studies present an interesting concept within the general context of the interpretation of GPR data, with the potential for use in many other forthcoming cases. The paper also reports on the adopted method for the GPR survey with emphasis on difficulties and challenges encountered during the actual survey. The presented results benefit from advanced processing and presentation techniques.

  18. Learning about Alpha-1 Antitrypsin Deficiency (AATD)

    MedlinePlus

    ... Tests Genomics and Health Disparities Genetic Discrimination Human Subjects Research Informed Consent for Genomics Research Intellectual Property ... the lungs are damaged. Symptoms of emphysema include difficulty breathing, a hacking cough and a barrel-shaped ...

  19. Hacking on decoy-state quantum key distribution system with partial phase randomization

    NASA Astrophysics Data System (ADS)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  20. Better P-curves: Making P-curve analysis more robust to errors, fraud, and ambitious P-hacking, a Reply to Ulrich and Miller (2015).

    PubMed

    Simonsohn, Uri; Simmons, Joseph P; Nelson, Leif D

    2015-12-01

    When studies examine true effects, they generate right-skewed p-curves, distributions of statistically significant results with more low (.01 s) than high (.04 s) p values. What else can cause a right-skewed p-curve? First, we consider the possibility that researchers report only the smallest significant p value (as conjectured by Ulrich & Miller, 2015), concluding that it is a very uncommon problem. We then consider more common problems, including (a) p-curvers selecting the wrong p values, (b) fake data, (c) honest errors, and (d) ambitiously p-hacked (beyond p < .05) results. We evaluate the impact of these common problems on the validity of p-curve analysis, and provide practical solutions that substantially increase its robustness. (c) 2015 APA, all rights reserved).

  1. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    PubMed

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  2. Metal accumulation in the greentail prawn, Metapenaeus bennettae, in Sydney and Port Hacking estuaries, Australia.

    PubMed

    Lewtas, K L M; Birch, G F; Foster-Thorpe, C

    2014-01-01

    Metal concentrations of the inshore greentail prawn, Metapenaeus bennettae, and surface sediments from locations within Sydney estuary and Port Hacking (Australia) were assessed for bioaccumulation and contamination. The current study aimed to assess metal concentrations in prawn tissue (tail muscle, exoskeleton, hepatopancreas and gills), relate whole body prawn tissue metal concentrations to sediment metal concentrations and animal size, as well as assess prawn consumption as a risk to human health. Metal concentrations were highest in sediment and prawns from contaminated locations (Iron Cove, Hen and Chicken Bay and Lane Cove) in Sydney estuary compared with the reference estuary (Port Hacking). Concentrations in sediments varied considerably between sites and between metals (As, Cd, Cr, Cu, Ni, Pb and Zn), and although concentrations exceeded Interim Sediment Quality Guideline-Low values, metals (As, Cd, Cr, Cu, Ni, Pb and Zn) were below Australian National Health and Medical Research Council human consumption guidelines in prawn tail muscle tissue. Metal concentrations in prawn tail muscle tissue were significantly different (p ≤ 0.05) amongst locations for Pb, Zn and Cd, and metal concentrations were generally highest in gills tissue, followed by the hepatopancreas, exoskeleton and tail muscle. The exoskeleton contained the highest Sr concentration; the hepatopancreas contained the highest As, Cu and Mo concentrations; and the gills contained the highest Al, Cr, Fe and Pb concentrations. Concentrations of Pb, As and Sr were significantly different (p ≤ 0.05) between size groups amongst locations.

  3. Mechanical Properties of Respiratory Muscles

    PubMed Central

    Sieck, Gary C.; Ferreira, Leonardo F.; Reid, Michael B.; Mantilla, Carlos B.

    2014-01-01

    Striated respiratory muscles are necessary for lung ventilation and to maintain the patency of the upper airway. The basic structural and functional properties of respiratory muscles are similar to those of other striated muscles (both skeletal and cardiac). The sarcomere is the fundamental organizational unit of striated muscles and sarcomeric proteins underlie the passive and active mechanical properties of muscle fibers. In this respect, the functional categorization of different fiber types provides a conceptual framework to understand the physiological properties of respiratory muscles. Within the sarcomere, the interaction between the thick and thin filaments at the level of cross-bridges provides the elementary unit of force generation and contraction. Key to an understanding of the unique functional differences across muscle fiber types are differences in cross-bridge recruitment and cycling that relate to the expression of different myosin heavy chain isoforms in the thick filament. The active mechanical properties of muscle fibers are characterized by the relationship between myoplasmic Ca2+ and cross-bridge recruitment, force generation and sarcomere length (also cross-bridge recruitment), external load and shortening velocity (cross-bridge cycling rate), and cross-bridge cycling rate and ATP consumption. Passive mechanical properties are also important reflecting viscoelastic elements within sarcomeres as well as the extracellular matrix. Conditions that affect respiratory muscle performance may have a range of underlying pathophysiological causes, but their manifestations will depend on their impact on these basic elemental structures. PMID:24265238

  4. Leading Critically: A Grounded Theory of Applied Critical Thinking in Leadership Studies

    ERIC Educational Resources Information Center

    Jekins, Daniel M.; Cutchens, Amanda B.

    2011-01-01

    This study describes the development of a grounded theory of applied critical thinking in leadership studies and examines how student-centered experiential learning in leadership education bridged critical thinking with action. Over three semester undergraduate students in an upper level leadership studies course at a large four-year public…

  5. Financial Aid: A Broken Bridge to College Access?

    ERIC Educational Resources Information Center

    Long, Bridget Terry; Riley, Erin

    2007-01-01

    In this article, Bridget Terry Long and Erin Riley argue that in recent years, U.S. financial aid policy has shifted its emphasis from expanding college access for low-income students toward defraying the costs for middle- and upper-income families. They explain how loans, merit-based aid, and education tax breaks are increasingly replacing…

  6. Hacking the quantum revolution: 1925-1975

    NASA Astrophysics Data System (ADS)

    Schweber, Silvan S.

    2015-01-01

    I argue that the quantum revolution should be seen as an Ian Hacking type of scientific revolution: a profound, longue durée, multidisciplinary process of transforming our understanding of physical nature, with deep-rooted social components from the start. The "revolution" exhibits a characteristic style of reasoning - the hierarchization of physical nature - and developed and uses a specific language - quantum field theory (QFT). It is by virtue of that language that the quantum theory has achieved some of its deepest insights into the description of the dynamics of the physical world. However, the meaning of what a quantum field theory is and what it describes has deeply altered, and one now speaks of "effective" quantum field theories. Interpreting all present day quantum field theories as but "effective" field theories sheds additional light on Phillip Anderson's assertion that "More is different". This important element is addressed in the last part of the paper.

  7. Hacking for astronomy: can 3D printers and open-hardware enable low-cost sub-/millimeter instrumentation?

    NASA Astrophysics Data System (ADS)

    Ferkinhoff, Carl

    2014-07-01

    There have been several exciting developments in the technologies commonly used n in the hardware hacking community. Advances in low cost additive-manufacturing processes (i.e. 3D-printers) and the development of openhardware projects, which have produced inexpensive and easily programmable micro-controllers and micro-computers (i.e. Arduino and Raspberry Pi) have opened a new door for individuals seeking to make their own devices. Here we describe the potential for these technologies to reduce costs in construction and development of submillimeter/millimeter astronomical instrumentation. Specifically we have begun a program to measure the optical properties of the custom plastics used in 3D-printers as well as the printer accuracy and resolution to assess the feasibility of directly printing sub- /millimeter transmissive optics. We will also discuss low cost designs for cryogenic temperature measurement and control utilizing Arduino and Raspberry Pi.

  8. NPF MECHANICAL CELL NaK DISPOSAL AND FUME ABATEMENT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rey, G.

    Some of the fuels originally scheduled for processing in the nonproduction fuel (NPF) processing program incorporated sodium or sodium- potassium alloy (NaK) as the bonding material between stainless-steel cladding and the uranium or uranium-molybdenum alloy core. Because of the special hazards involved in handling NaK, studies were made to determine safe methods for processing NaK-containing fuels. An underwater NaK dispensing system was installed, and tests were made to determine the characteristics of the NaK-water reaction. The equipment consisted of a dispenser, reaction pan, and off-gas scrubber. After initinl studies, a prototype test was made wherein U-Mo canned slugs containing NaKmore » reservoirs were hack sawed underwater. The studies demonstrated that the NaK reservoirs can be safely deactivated by hack sawing under a submerged hood in a shallow water bath. (W.L.H.)« less

  9. Non-Invasive Seismic Methods for Earthquake Site Classification Applied to Ontario Bridge Sites

    NASA Astrophysics Data System (ADS)

    Bilson Darko, A.; Molnar, S.; Sadrekarimi, A.

    2017-12-01

    How a site responds to earthquake shaking and its corresponding damage is largely influenced by the underlying ground conditions through which it propagates. The effects of site conditions on propagating seismic waves can be predicted from measurements of the shear wave velocity (Vs) of the soil layer(s) and the impedance ratio between bedrock and soil. Currently the seismic design of new buildings and bridges (2015 Canadian building and bridge codes) requires determination of the time-averaged shear-wave velocity of the upper 30 metres (Vs30) of a given site. In this study, two in situ Vs profiling methods; Multichannel Analysis of Surface Waves (MASW) and Ambient Vibration Array (AVA) methods are used to determine Vs30 at chosen bridge sites in Ontario, Canada. Both active-source (MASW) and passive-source (AVA) surface wave methods are used at each bridge site to obtain Rayleigh-wave phase velocities over a wide frequency bandwidth. The dispersion curve is jointly inverted with each site's amplification function (microtremor horizontal-to-vertical spectral ratio) to obtain shear-wave velocity profile(s). We apply our non-invasive testing at three major infrastructure projects, e.g., five bridge sites along the Rt. Hon. Herb Gray Parkway in Windsor, Ontario. Our non-invasive testing is co-located with previous invasive testing, including Standard Penetration Test (SPT), Cone Penetration Test and downhole Vs data. Correlations between SPT blowcount and Vs are developed for the different soil types sampled at our Ontario bridge sites. A robust earthquake site classification procedure (reliable Vs30 estimates) for bridge sites across Ontario is evaluated from available combinations of invasive and non-invasive site characterization methods.

  10. Radio Hazard Safety Assessment for Marine Ship Transmitters: Measurements Using a New Data Collection Method and Comparison with ICNIRP and ARPANSA Limits

    PubMed Central

    Halgamuge, Malka N.

    2015-01-01

    We investigated the levels of radio frequency electromagnetic fields (RF EMFs) emitted from marine ship transmitters. In this study, we recorded the radio frequency (RF) electric field (EF) levels emitted from transmitters from a marine vessel focusing on the areas normally occupied by crew members and passengers. Previous studies considered radiation hazard safety assessment for marine vessels with a limited number of transmitters, such as very high-frequency (VHF) transceivers, radar and communication transmitters. In our investigation, EF levels from seven radio transmitters were measured, including: VHF, medium frequency/high frequency (MF/HF), satellite communication (Sat-Com C), AISnavigation, radar X-band and radar S-band. Measurements were carried out in a 40 m-long, three-level ship (upper deck, bridge deck and bridge roof) at 12 different locations. We developed a new data-collection protocol and performed it under 11 different scenarios to observe and measure the radiation emissions from all of the transmitters. In total, 528 EF field measurements were collected and averaged over all three levels of the marine ship with RF transmitters: the measured electric fields were the lowest on the upper deck (0.82–0.86 V/m), the highest on the bridge roof (2.15–3.70 V/m) and in between on the bridge deck (0.47–1.15 V/m). The measured EF levels were then assessed for compliance with the occupational and general public reference levels of the International Commission on Non-Ionizing Radiation Protection (ICNIRP) guidelines and the Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) standards. The ICNIRP and the ARPANSA limits for the general public were exceeded on the bridge roof; nevertheless, the occupational limits were respected everywhere. The measured EF levels, hence, complied with the ICNIRP guidelines and the ARPANSA standards. In this paper, we provide a new data collection model for future surveys, which could be conducted with larger samples to verify our observations. Furthermore, this new method could be useful as a reference for researchers and industry professionals without direct access to the necessary equipment. PMID:25996887

  11. Informocracy.

    ERIC Educational Resources Information Center

    Hauptman, Robert

    2001-01-01

    Considers problems that have arisen with the vast quantities of information available as a result of the popularity of computers. Topics include inequity; capitalism, commodification, and privatization; hacking, privacy, and fraud; censorship; monitoring and surveillance; cyberethics; and integrity in an age of electronic communication. (LRW)

  12. Pulmonary Fibrosis

    MedlinePlus

    ... and your blood may not get enough oxygen. Causes of pulmonary fibrosis include environmental pollutants, some medicines, some connective tissue ... or scar the lungs. In most cases, the cause cannot be found. This is called ... fibrosis. Symptoms include Shortness of breath A dry, hacking ...

  13. Geochemical characterization of groundwater discharging from springs north of the Grand Canyon, Arizona, 2009–2016

    USGS Publications Warehouse

    Beisner, Kimberly R.; Tillman, Fred D.; Anderson, Jessica R.; Antweiler, Ronald C.; Bills, Donald J.

    2017-08-01

    A geochemical study was conducted on 37 springs discharging from the Toroweap Formation, Coconino Sandstone, Hermit Formation, Supai Group, and Redwall Limestone north of the Grand Canyon near areas of breccia-pipe uranium mining. Baseline concentrations were established for the elements As, B, Li, Se, SiO2, Sr, Tl, U, and V. Three springs exceeded U.S. Environmental Protection Agency drinking water standards: Fence Spring for arsenic, Pigeon Spring for selenium and uranium, and Willow (Hack) Spring for selenium. The majority of the spring sites had uranium values of less than 10 micrograms per liter (μg/L), but six springs discharging from all of the geologic units studied that are located stratigraphically above the Redwall Limestone had uranium values greater than 10 μg/L (Cottonwood [Tuckup], Grama, Pigeon, Rock, and Willow [Hack and Snake Gulch] Springs). The geochemical characteristics of these six springs with elevated uranium include Ca-Mg-SO4 water type, circumneutral pH, high specific conductance, correlation and multivariate associations between U, Mo, Sr, Se, Li, and Zn, low 87Sr/86Sr, low 234U/238U activity ratios (1.34–2.31), detectable tritium, and carbon isotopic interpretation indicating they may be a mixture of modern and pre-modern waters. Similar geochemical compositions of spring waters having elevated uranium concentrations are observed at sites located both near and away from sites of uranium-mining activities in the present study. Therefore, mining does not appear to explain the presence of elevated uranium concentrations in groundwater at the six springs noted above. The elevated uranium at the six previously mentioned springs may be influenced by iron mineralization associated with mineralized breccia pipe deposits. Six springs discharging from the Coconino Sandstone (Upper Jumpup, Little, Horse, and Slide Springs) and Redwall Limestone (Kanab and Side Canyon Springs) contained water with corrected radiocarbon ages as much as 9,300 years old. Of the springs discharging water with radiocarbon age, Kanab and Side Canyon Springs contain tritium of more than 1.3 picocuries per liter (pCi/L), indicating they may contain a component of modern water recharged after 1952. Springs containing high values of tritium (greater than 5.1 pCi/L), which may suggest a significant component of modern water, include Willow (Hack), Saddle Horse, Cottonwood (Tuckup), Hotel, Bitter, Unknown, Hole in the Wall, and Hanging Springs. Fence and Rider Springs, located on the eastern end of the study area near the Colorado River, have distinctly different geochemical compositions compared to the other springs of the study. Additionally, water from Fence Spring has the highest 87Sr/86Sr for samples analyzed from this study with a value greater than those known in sedimentary rocks from the region. Strontium isotope data likely indicate that water discharging at Fence Spring has interacted with Precambrian basement rocks. Rider Spring had the most depleted values of stable O and H isotopes indicating that recharge, if recent, occurred at higher elevations or was recharged during earlier, cooler-climate conditions.

  14. A Cornerstone Course in Sociology: Providing Students with Theory, Methods, and Career Preparation Early in the Major

    ERIC Educational Resources Information Center

    Holtzman, Mellisa

    2018-01-01

    Cornerstone courses bridge introductory content from lower-level survey courses with the more advanced theoretical and methodological content of upper-level, major-only courses. Cornerstones are implemented with the goal of better preparing students for advanced coursework and/or assisting them with understanding their major and its associated…

  15. Python in Astronomy 2016 Unproceedings

    NASA Astrophysics Data System (ADS)

    Robitaille, Thomas; Cruz, Kelle; Greenfield, Perry; Jeschke, Eric; Juric, Mario; Mumford, Stuart; Prescod-Weinstein, Chanda; Sosey, Megan; Tollerud, Erik; VanderPlas, Jake; Ford, Jes; Foreman-Mackey, Dan; Jenness, Tim; Aldcroft, Tom; Alexandersen, Mike; Bannister, Michele; Barbary, Kyle; Barentsen, Geert; Bennett, Samuel; Boquien, Médéric; Campos Rozo, Jose Ivan; Christe, Steven; Corrales, Lia; Craig, Matthew; Deil, Christoph; Dencheva, Nadia; Donath, Axel; Douglas, Stephanie; Ferreira, Leonardo; Ginsburg, Adam; Goldbaum, Nathan; Gordon, Karl; Hearin, Andrew; Hummels, Cameron; Huppenkothen, Daniela; Jennings, Elise; King, Johannes; Lawler, Samantha; Leonard, Andrew; Lim, Pey Lian; McBride, Lisa; Morris, Brett; Nunez, Carolina; Owen, Russell; Parejko, John; Patel, Ekta; Price-Whelan, Adrian; Ruggiero, Rafael; Sipocz, Brigitta; Stevens, Abigail; Turner, James; Tuttle, Sarah; Yanchulova Merica-Jones, Petia; Yoachim, Peter

    2016-03-01

    This document provides proceedings for unconference sessions as well as hacks/sprints which took place at the Python in Astronomy 2016 workshop, which was held at the University of Washington eScience Institute in Seattle from March 21st to 25th 2016.

  16. Intelligence, Information Technology, and Information Warfare.

    ERIC Educational Resources Information Center

    Davies, Philip H. J.

    2002-01-01

    Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…

  17. Registration of 'hammock' centipedegrass.

    USDA-ARS?s Scientific Manuscript database

    ‘Hammock’ (Reg. No. ________, PI 652949) centipedegrass [Eremochloa ophiuroides (Munro) Hack] was developed at the Everglades Research and Education Center, IFAS, University of Florida, Belle Glade, FL and initially approved for release in 2006. A plant patent was filed in 2008 with Plant Patent PP...

  18. Police close unsolved 'climategate' investigation

    NASA Astrophysics Data System (ADS)

    Lavender, Gemma

    2012-09-01

    Police in Norfolk in the UK have closed an investigation into the hacking of e-mails at the University of East Anglia's Climate Research Unit (CRU) after admitting that they will not be able to find the hackers who broke into CRU computer servers.

  19. Oscillations in a Sunspot with Light Bridges

    NASA Astrophysics Data System (ADS)

    Yuan, Ding; Nakariakov, Valery M.; Huang, Zhenghua; Li, Bo; Su, Jiangtao; Yan, Yihua; Tan, Baolin

    2014-09-01

    The Solar Optical Telescope on board Hinode observed a sunspot (AR 11836) with two light bridges (LBs) on 2013 August 31. We analyzed a two-hour Ca II H emission intensity data set and detected strong five-minute oscillation power on both LBs and in the inner penumbra. The time-distance plot reveals that the five-minute oscillation phase does not vary significantly along the thin bridge, indicating that the oscillations are likely to originate from underneath it. The slit taken along the central axis of the wide LB exhibits a standing wave feature. However, at the center of the wide bridge, the five-minute oscillation power is found to be stronger than at its sides. Moreover, the time-distance plot across the wide bridge exhibits a herringbone pattern that indicates a counter-stream of two running waves, which originated at the bridge's sides. Thus, the five-minute oscillations on the wide bridge also resemble the properties of running penumbral waves. The five-minute oscillations are suppressed in the umbra, while the three-minute oscillations occupy all three cores of the sunspot's umbra, separated by the LBs. The three-minute oscillations were found to be in phase at both sides of the LBs. This may indicate that either LBs do not affect umbral oscillations, or that umbral oscillations at different umbral cores share the same source. It also indicates that LBs are rather shallow objects situated in the upper part of the umbra. We found that umbral flashes (UFs) follow the life cycles of umbral oscillations with much larger amplitudes. They cannot propagate across LBs. UFs dominate the three-minute oscillation power within each core; however, they do not disrupt the phase of umbral oscillation.

  20. How Did the Spider Cross the River? Behavioral Adaptations for River-Bridging Webs in Caerostris darwini (Araneae: Araneidae)

    PubMed Central

    Gregorič, Matjaž; Agnarsson, Ingi; Blackledge, Todd A.; Kuntner, Matjaž

    2011-01-01

    Background Interspecific coevolution is well described, but we know significantly less about how multiple traits coevolve within a species, particularly between behavioral traits and biomechanical properties of animals' “extended phenotypes”. In orb weaving spiders, coevolution of spider behavior with ecological and physical traits of their webs is expected. Darwin's bark spider (Caerostris darwini) bridges large water bodies, building the largest known orb webs utilizing the toughest known silk. Here, we examine C. darwini web building behaviors to establish how bridge lines are formed over water. We also test the prediction that this spider's unique web ecology and architecture coevolved with new web building behaviors. Methodology We observed C. darwini in its natural habitat and filmed web building. We observed 90 web building events, and compared web building behaviors to other species of orb web spiders. Conclusions Caerostris darwini uses a unique set of behaviors, some unknown in other spiders, to construct its enormous webs. First, the spiders release unusually large amounts of bridging silk into the air, which is then carried downwind, across the water body, establishing bridge lines. Second, the spiders perform almost no web site exploration. Third, they construct the orb capture area below the initial bridge line. In contrast to all known orb-weavers, the web hub is therefore not part of the initial bridge line but is instead built de novo. Fourth, the orb contains two types of radial threads, with those in the upper half of the web doubled. These unique behaviors result in a giant, yet rather simplified web. Our results continue to build evidence for the coevolution of behavioral (web building), ecological (web microhabitat) and biomaterial (silk biomechanics) traits that combined allow C. darwini to occupy a unique niche among spiders. PMID:22046378

  1. Oscillations in a sunspot with light bridges

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yuan, Ding; Su, Jiangtao; Yan, Yihua

    2014-09-01

    The Solar Optical Telescope on board Hinode observed a sunspot (AR 11836) with two light bridges (LBs) on 2013 August 31. We analyzed a two-hour Ca II H emission intensity data set and detected strong five-minute oscillation power on both LBs and in the inner penumbra. The time-distance plot reveals that the five-minute oscillation phase does not vary significantly along the thin bridge, indicating that the oscillations are likely to originate from underneath it. The slit taken along the central axis of the wide LB exhibits a standing wave feature. However, at the center of the wide bridge, the five-minutemore » oscillation power is found to be stronger than at its sides. Moreover, the time-distance plot across the wide bridge exhibits a herringbone pattern that indicates a counter-stream of two running waves, which originated at the bridge's sides. Thus, the five-minute oscillations on the wide bridge also resemble the properties of running penumbral waves. The five-minute oscillations are suppressed in the umbra, while the three-minute oscillations occupy all three cores of the sunspot's umbra, separated by the LBs. The three-minute oscillations were found to be in phase at both sides of the LBs. This may indicate that either LBs do not affect umbral oscillations, or that umbral oscillations at different umbral cores share the same source. It also indicates that LBs are rather shallow objects situated in the upper part of the umbra. We found that umbral flashes (UFs) follow the life cycles of umbral oscillations with much larger amplitudes. They cannot propagate across LBs. UFs dominate the three-minute oscillation power within each core; however, they do not disrupt the phase of umbral oscillation.« less

  2. The bridge technique for pectus bar fixation: a method to make the bar un-rotatable.

    PubMed

    Park, Hyung Joo; Kim, Kyung Soo; Moon, Young Kyu; Lee, Sungsoo

    2015-08-01

    Pectus bar rotation is a major challenge in pectus repair. However, to date, no satisfactory technique to completely eliminate bar displacement has been introduced. Here, we propose a bar fixation technique using a bridge that makes the bar unmovable. The purpose of this study was to determine the efficacy of this bridge technique. A total of 80 patients underwent pectus bar repair of pectus excavatum with the bridge technique from July 2013 to July 2014. The technique involved connecting 2 parallel bars using plate-screws at the ends of the bars. To determine bar position change, the angles between the sternum and pectus bars were measured on postoperative day 5 (POD5) and 4 months (POM4) and compared. The mean patient age was 17.5 years (range, 6-38 years). The mean difference between POD5 and POM4 were 0.23° (P=.602) and 0.35° (P=.338) for the upper and lower bars, respectively. Bar position was virtually unchanged during the follow-up, and there was no bar dislocation or reoperation. A "bridge technique" designed to connect 2 parallel bars using plates and screws was demonstrated as a method to avoid pectus bar displacement. This approach was easy to implement without using sutures or invasive devices. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. The Cybersecurity Challenge in Acquisition

    DTIC Science & Technology

    2016-04-30

    problems. Scarier yet, another group took control of a car’s computers through a cellular telephone and Bluetooth connections and could access...did more extensive work, hacking their way into a 2009 midsize car through its cellular, Bluetooth , and other wireless connections. Stefan Savage, a

  4. Hacking Facebook Privacy and Security

    DTIC Science & Technology

    2012-08-28

    that their information is somehow protected. However, practically this is not always the case and privacy on social networking sites has received...fraudsters target Facebook and other social networking sites to harvest information about you. Here’s how we recommend you set your Facebook privacy

  5. 72. MISSISSIPPI, MONROE CO. MAP OF MONROE COUNTY, ca. 1925 ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    72. MISSISSIPPI, MONROE CO. MAP OF MONROE COUNTY, ca. 1925 Broad side of map of Monroe Co., 'Compliments of Home Mortgage & Realty Co., Amory, Miss.' Orig. scale: ca. 1 in. to 2 mi. No date. Property of Helen (Mrs. Sam L.) Crawford, Hamilton, Ms. Sarcone Photography, Columbus, Ms., Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  6. From Apprenticeships to Higher Vocational Education in Denmark--Building Bridges While the Gap Is Widening

    ERIC Educational Resources Information Center

    Jørgensen, Christian Helms

    2017-01-01

    Upper secondary vocational education in Denmark is based on the apprenticeship model, which is recognised as a valuable route to employment for young people, who are not aiming for higher education. However, the apprenticeship model has a major weakness: it does not provide eligibility for higher education. The purpose of this article is to…

  7. 77 FR 28488 - Drawbridge Operation Regulation; Upper Mississippi River, Hannibal, MO

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-15

    ... lifting cables that operate the lift span. This deviation allows the bridge to remain in the closed position while the lift cables are replaced. DATES: This deviation is effective from 9 a.m. to 3 p.m. on or... wire rope lifting cables that operate the lift span are replaced. The closure period will be from 9 a.m...

  8. Character Education as a Bridge from Elementary to Middle School: A Case Study of Effective Practices and Processes

    ERIC Educational Resources Information Center

    Khoury, Ruba

    2017-01-01

    This qualitative single-case study illuminates the significance of effective character education implementation during elementary school years as students transition into middle school. The researcher conducted the study in an American school that consisted of two divisions: K-6 lower division and 7-12 upper division. The lower-school division was…

  9. Inter-relationship between scaling exponents for describing self-similar river networks

    NASA Astrophysics Data System (ADS)

    Yang, Soohyun; Paik, Kyungrock

    2015-04-01

    Natural river networks show well-known self-similar characteristics. Such characteristics are represented by various power-law relationships, e.g., between upstream length and drainage area (exponent h) (Hack, 1957), and in the exceedance probability distribution of upstream area (exponent ɛ) (Rodriguez-Iturbe et al., 1992). It is empirically revealed that these power-law exponents are within narrow ranges. Power-law is also found in the relationship between drainage density (the total stream length divided by the total basin area) and specified source area (the minimum drainage area to form a stream head) (exponent η) (Moussa and Bocquillon, 1996). Considering that above three scaling relationships all refer to fundamental measures of 'length' and 'area' of a given drainage basin, it is natural to hypothesize plausible inter-relationship between these three scaling exponents. Indeed, Rigon et al. (1996) demonstrated the relationship between ɛ and h. In this study, we expand this to a more general ɛ-η-h relationship. We approach ɛ-η relationship in an analytical manner while η-h relationship is demonstrated for six study basins in Korea. Detailed analysis and implications will be presented. References Hack, J. T. (1957). Studies of longitudinal river profiles in Virginia and Maryland. US, Geological Survey Professional Paper, 294. Moussa, R., & Bocquillon, C. (1996). Fractal analyses of tree-like channel networks from digital elevation model data. Journal of Hydrology, 187(1), 157-172. Rigon, R., Rodriguez-Iturbe, I., Maritan, A., Giacometti. A., Tarboton, D. G., & Rinaldo, A. (1996). On Hack's Law. Water Resources Research, 32(11), 3367-3374. Rodríguez-Iturbe, I., Ijjasz-Vasquez, E. J., Bras, R. L., & Tarboton, D. G. (1992). Power law distributions of discharge mass and energy in river basins. Water Resources Research, 28(4), 1089-1093.

  10. Inadvertent P-hacking among trials and systematic reviews of the effect of progestogens in pregnancy? A systematic review and meta-analysis.

    PubMed

    Prior, M; Hibberd, R; Asemota, N; Thornton, J G

    2017-06-01

    Progestogens have been evaluated in numerous trials and meta-analyses, many of which concluded they were effective. However, two large trials PROMISE and OPPTIMUM have recently concluded that progesterone was ineffective. This raises the possibility that earlier studies and reviews had been biased by either selective publication or selective choice of outcomes, so called "P-hacking". To compare the findings all progestogen trials and systematic reviews with those of trials with pre-registered primary outcomes which avoided selective outcome reporting. Search of PubMed, the Cochrane Library and trial registries. Registration PROSPERO CRD42016035303. Systematic reviews of randomised trials comparing progestogen with placebo in pregnancy and the individual trials included in those reviews. The subset of trials reporting a pre-registered primary outcome were compared with the totality of trials and reviews. For reviews all outcomes were included. For individual trials all outcomes reported in the systematic reviews were included. For the comparison group we recorded the registered primary outcome from trials that were either registered before they started, or registered during the recruitment phase and also double blind. Nineteen of twenty-nine meta-analyses concluded that progestogens were effective. Twenty-two trials reported their pre-registered primary outcomes. There was no effect of progesterone on primary registered dichotomous outcome RR 1.00 (95% CI 0.94-1.07). Only one of the 22 showed a nominally statistically significant benefit. When evaluated in registered double-blind trials with analysis restricted to predefined primary outcomes, progestational agents in pregnancy are ineffective. Progestogens to prevent pregnancy loss, an example of P-hacking. © 2017 Royal College of Obstetricians and Gynaecologists.

  11. Meta-analyses and p-curves support robust cycle shifts in women's mate preferences: reply to Wood and Carden (2014) and Harris, Pashler, and Mickes (2014).

    PubMed

    Gildersleeve, Kelly; Haselton, Martie G; Fales, Melissa R

    2014-09-01

    Two meta-analyses evaluated shifts across the ovulatory cycle in women's mate preferences but reported very different findings. In this journal, we reported robust evidence for the pattern of cycle shifts predicted by the ovulatory shift hypothesis (Gildersleeve, Haselton, & Fales, 2014). However, Wood, Kressel, Joshi, and Louie (2014) claimed an absence of compelling support for this hypothesis and asserted that the few significant cycle shifts they observed were false positives resulting from publication bias, p-hacking, or other research artifacts. How could 2 meta-analyses of the same literature reach such different conclusions? We reanalyzed the data compiled by Wood et al. These analyses revealed problems in Wood et al.'s meta-analysis-some of which are reproduced in Wood and Carden's (2014) comment in the current issue of this journal-that led them to overlook clear evidence for the ovulatory shift hypothesis in their own set of effects. In addition, we present right-skewed p-curves that directly contradict speculations by Wood et al.; Wood and Carden; and Harris, Pashler, and Mickes (2014) that supportive findings in the cycle shift literature are false positives. Therefore, evidence from both of the meta-analyses and the p-curves strongly supports genuine, robust effects consistent with the ovulatory shift hypothesis and contradicts claims that these effects merely reflect publication bias, p-hacking, or other research artifacts. Unfounded speculations about p-hacking distort the research record and risk unfairly damaging researchers' reputations; they should therefore be made only on the basis of firm evidence. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  12. Participatory design of healthcare technology with children.

    PubMed

    Sims, Tara

    2018-02-12

    Purpose There are many frameworks and methods for involving children in design research. Human-Computer Interaction provides rich methods for involving children when designing technologies. The paper aims to discuss these issues. Design/methodology/approach This paper examines various approaches to involving children in design, considering whether users view children as study objects or active participants. Findings The BRIDGE method is a sociocultural approach to product design that views children as active participants, enabling them to contribute to the design process as competent and resourceful partners. An example is provided, in which BRIDGE was successfully applied to developing upper limb prostheses with children. Originality/value Approaching design in this way can provide children with opportunities to develop social, academic and design skills and to develop autonomy.

  13. Practice of One Health approaches: bridges and barriers in Tanzania.

    PubMed

    Kayunze, Kim A; Kiwara, Angwara; Lyamuya, Eligius; Kambarage, Dominic M; Rushton, Jonathan; Coker, Richard; Kock, Richard

    2014-04-23

    The practice of one health approaches in human and animal health programmes is influenced by type and scope of bridges and barriers for partnerships. It was thus essential to evaluate the nature and scope of collaborative arrangements among human, animal, and wildlife health experts in dealing with health challenges which demand inter-sectoral partnership. The nature of collaborative arrangement was assessed, and the respective bridges and barriers over a period of 12 months (July 20011 to June 2012) were identified. The specific objectives were to: (1) determine the proportion of health experts who had collaborated with other experts of disciplines different from theirs, (2) rank the general bridges for and barriers against collaboration according to the views of the health experts, and (3) find the actual bridges for and barriers against collaboration among the health experts interviewed. It was found that 27.0% of animal health officers interviewed had collaborated with medical officers while 12.4% of the medical officers interviewed had collaborated with animal health experts. Only 6.7% of the wildlife officers had collaborated with animal health experts. The main bridges for collaboration were instruction by upper level leaders, zoonotic diseases of serious impacts, and availability of funding. The main barriers for collaboration were lack of knowledge about animal/human health issues, lack of networks for collaboration, and lack of plans to collaborate. This thus calls for the need to curb barriers in order to enhance inter-sectoral collaboration for more effective management of risks attributable to infectious diseases of humans and animals.

  14. Hacking DNA copy number for circuit engineering.

    PubMed

    Wu, Feilun; You, Lingchong

    2017-07-27

    DNA copy number represents an essential parameter in the dynamics of synthetic gene circuits but typically is not explicitly considered. A new study demonstrates how dynamic control of DNA copy number can serve as an effective strategy to program robust oscillations in gene expression circuits.

  15. Computer Abuse: Vandalizing the Information Society.

    ERIC Educational Resources Information Center

    Furnell, Steven M.; Warren, Matthew J.

    1997-01-01

    Computing and telecommunications, key to an information-based society, are increasingly targets for criminals and mischief makers. This article examines the effects of malicious computer abuse: hacking and viruses, highlights the apparent increase in incidents, and examines their effect on public perceptions of technology. Presents broad…

  16. Future Operating Concept - Joint Computer Network Operations

    DTIC Science & Technology

    2010-02-17

    into the system‖ at a later date by circumventing the need for access privileges 3. Cyberwarfare Tools 67 • Social Engineering • Hacking ...Forces Command, Joint Operating Environment 2008, November 2008https://us.jfcom.mil/sites/ J5 /j59/default.aspx VIII Appendix V

  17. Potential highwall use by raptors in coal mine reclamation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Waage, B.

    In 1982, Western Energy Company`s Rosebud Mine, located in southeastern Montana, received legal exception, {open_quotes}a first{close_quotes} in Montana to leave a standing mine highwall extending a native bluff. This bluff extension stands 110 feet high and 900 feet long. Normally, all highwalls by law are reduced to a 5:1 slope. This legal exception was accomplished with the support of several governmental agencies and was justified on the highwalls potential value for raptors. Enhancement measures undertaken on the highwall included the construction of three artificial eryies and the release of young prairie falcons (Falco mexicanus) employing hacking methods of the Peregrinemore » Fund. The hack is now in its fourth year with a total of 46 young falcons having been released. Opportunities exist for creating a more diverse habitat for raptors and other cliff obligate species on reclaimed mine lands in the west. It is believed that this practical approach should be explored.« less

  18. Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A.

    PubMed

    King, Cason R; Zhang, Ali; Tessier, Tanner M; Gameiro, Steven F; Mymryk, Joe S

    2018-05-01

    As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected "hub" proteins to "hack" the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. Copyright © 2018 King et al.

  19. Molecular Mechanistic Reasoning: Toward Bridging the Gap between the Molecular and Cellular Levels in Life Science Education

    ERIC Educational Resources Information Center

    van Mil, Marc H. W.; Postma, Paulien A.; Boerwinkel, Dirk Jan; Klaassen, Kees; Waarlo, Arend Jan

    2016-01-01

    Although learning about DNA, RNA, and proteins is part of the upper secondary biology curriculum in most countries, many studies report that students fail to connect molecular knowledge to phenomena at the higher level of cells, organs, and organisms. As a result, many students use memorization and rote learning as a coping strategy when presented…

  20. The Period of 2167 Erin

    NASA Astrophysics Data System (ADS)

    Montigiana, N.; Benedetti, W.; Mannucci, M.; Riccetti, S.

    2008-09-01

    Analysis of data taken in March and April 2007 by groups from Osservatorio Astronomico Margherita Hack and the University of Wisconsin-Eau Claire indicates a likely period of 5.7186 ± 0.0001 h for 2167 Erin. The amplitude of the lightcurve was 0.53 ± 0.02 mag.

  1. Radio Frequency Based Programmable Logic Controller Anomaly Detection

    DTIC Science & Technology

    2013-09-01

    include wireless radios, IEEE 802.15 Blue- tooth devices, cellular phones, and IEEE 802.11 WiFi networking devices. While wireless communication...MacKenzie, H. Shamoon Malware and SCADA Security What are the Im- pacts? . Technical Report, Tofino Security, Sep 2012. 61. Mateti,P. Hacking Techniques

  2. Toward Realistic Acquisition Schedule Estimates

    DTIC Science & Technology

    2016-04-30

    Harrier successor. NASA and the UK both participated in this effort. It was merged by Congress with JAST in mid-1994.  CALF (Common Affordable...5th Generation revolution in military aviation. Space Daily. Sternstein, A. (2015, April 27). Here’s how you hack a military drone. Next Gov

  3. Teachers as Hackers: Implications for 21st Century Teacher Education

    ERIC Educational Resources Information Center

    Wizel, Maya

    2017-01-01

    This qualitative study introduces a new framework for describing teachers who act innovatively in public schools--teachers as "hackers." It examines the characteristics and conditions under which teachers "hack" their classroom pedagogy to create disruptive innovation in the public education system and identify implications for…

  4. Bit by Bit: Using Design-Based Research to Improve the Health Literacy of Adolescents

    PubMed Central

    St. Jean, Beth; Taylor, Natalie Greene; Kodama, Christie; Follman, Rebecca; Casciotti, Dana

    2015-01-01

    Background Although a low health literacy level has been found to be among the most powerful predictors of poor health outcomes, there is very little research focused on assessing and improving the health literacy skills of adolescents, particularly those from socioeconomically disadvantaged backgrounds. The vast majority of existing research focuses solely on reading comprehension, despite the fact that health literacy is actually a multifaceted concept, which entails many different types of skills. Objective The aim of this paper is to first mine existing literature to identify the many different skills that have been posited to constitute health literacy, and then, using this collection of skills as an overarching structure, to highlight the challenges that disadvantaged youth participating in our HackHealth after-school program encounter as they identify and articulate their health-related information needs, search for health-related information online, assess the relevance and credibility of this information, and manage and make use of it. Methods We utilized the design-based research method to design, implement, and revise our HackHealth program. To collect data regarding HackHealth participants’ health literacy skills and associated challenges, we used a variety of methods, including participant observation, surveys, interviews, focus groups, and logging of Web browser activities. We also collected data through specialized instructional activities and data collection forms that we developed for this purpose. Quantitative and qualitative techniques were used to analyze this data, as well as all of the artifacts that each student produced, including their final projects. Results We identified the various challenges that the 30 HackHealth participants faced in completing various health-related information activities during the course of the program. Based on these findings, we describe important implications for working with youth from socioeconomically disadvantaged backgrounds, how to assess and improve their health literacy skills, and offer specific recommendations for health literacy instruction aimed at this population. Conclusions With an increased societal focus on health and a shift from viewing patients as passive recipients of medical care to viewing them as active arbiters of their own health, today’s youth need to possess an array of health literacy skills to ensure that they can live long and healthy lives. Working with adolescents to help them develop and practice these skills will also help to break the cycle between poor health literacy and poor health outcomes, thereby reducing health disparities and improving the long-term outlook for the health of our nation. PMID:26025101

  5. Asymptotics of the evolution semigroup associated with a scalar field in the presence of a non-linear electromagnetic field

    NASA Astrophysics Data System (ADS)

    Albeverio, Sergio; Tamura, Hiroshi

    2018-04-01

    We consider a model describing the coupling of a vector-valued and a scalar homogeneous Markovian random field over R4, interpreted as expressing the interaction between a charged scalar quantum field coupled with a nonlinear quantized electromagnetic field. Expectations of functionals of the random fields are expressed by Brownian bridges. Using this, together with Feynman-Kac-Itô type formulae and estimates on the small time and large time behaviour of Brownian functionals, we prove asymptotic upper and lower bounds on the kernel of the transition semigroup for our model. The upper bound gives faster than exponential decay for large distances of the corresponding resolvent (propagator).

  6. Assessment of bridge abutment scour and sediment transport under various flow conditions

    NASA Astrophysics Data System (ADS)

    Gilja, Gordon; Valyrakis, Manousos; Michalis, Panagiotis; Bekić, Damir; Kuspilić, Neven; McKeogh, Eamon

    2017-04-01

    Safety of bridges over watercourses can be compromised by flow characteristics and bridge hydraulics. Scour process around bridge foundations can develop rapidly during low-recurrence interval floods when structural elements are exposed to increased flows. Variations in riverbed geometry, as a result of sediment removal and deposition processes, can increase flood-induced hazard at bridge sites with catastrophic failures and destructive consequences for civil infrastructure. The quantification of flood induced hazard on bridge safety generally involves coupled hydrodynamic and sediment transport models (i.e. 2D numerical or physical models) for a range of hydrological events covering both high and low flows. Modelled boundary conditions are usually estimated for their probability of occurrence using frequency analysis of long-term recordings at gauging stations. At smaller rivers gauging station records are scarce, especially in upper courses of rivers where weirs, drops and rapids are common elements of river bathymetry. As a result, boundary conditions that accurately represent flow patterns on modelled river reach cannot be often reliably acquired. Sediment transport process is also more complicated to describe due to its complexity and dependence to local flow field making scour hazard assessment a particularly challenging issue. This study investigates the influence of flow characteristics to the development of scour and sedimentation processes around bridge abutments of a single span masonry arch bridge in south Ireland. The impact of downstream weirs on bridge hydraulics through variation of downstream model domain type is also considered in this study. The numerical model is established based on detailed bathymetry data surveyed along a rectangular grid of 50cm spacing. Acquired data also consist of riverbed morphology and water level variations which are monitored continuously on bridge site. The obtained data are then used to compare and calibrate numerical models for several flood scenarios. The determination of the boundary conditions is followed by physical modelling to investigate the development of scour around bridge elements. The comparison of surveyed data with the obtained numerical and physical modelling results provide an insight of various flow patterns and their influence on riverbed morphology. This can deliver important information needed for assessment of structural risk associated with flood events. Acknowledgement: The authors wish to acknowledge the financial support of the European Commission, through the Marie Curie action Industry-Academia Partnership and Pathways Network BRIDGE SMS (Intelligent Bridge Assessment Maintenance and Management System) - FP7-People-2013-IAPP- 612517.

  7. Hacking Hackathons: Preparing the next generation for the multidisciplinary world of healthcare technology.

    PubMed

    Lyndon, Mataroria P; Cassidy, Michael P; Celi, Leo Anthony; Hendrik, Luk; Kim, Yoon Jeon; Gomez, Nicholas; Baum, Nathaniel; Bulgarelli, Lucas; Paik, Kenneth E; Dagan, Alon

    2018-04-01

    Machine learning in healthcare, and innovative healthcare technology in general, require complex interactions within multidisciplinary teams. Healthcare hackathons are being increasingly used as a model for cross-disciplinary collaboration and learning. The aim of this study is to explore high school student learning experiences during a healthcare hackathon. By optimizing their learning experiences, we hope to prepare a future workforce that can bridge technical and health fields and work seamlessly across disciplines. A qualitative exploratory study utilizing focus group interviews was conducted. Eight high school students from the hackathon were invited to participate in this study through convenience sampling Participating students (n = 8) were allocated into three focus groups. Semi structured interviews were completed, and transcripts evaluated using inductive thematic analysis. Through the structured analysis of focus group transcripts three major themes emerged from the data: (1) Collaboration, (2) Transferable knowledge and skills, and (3) Expectations about hackathons. These themes highlight strengths and potential barriers when bringing this multidisciplinary approach to high school students and the healthcare community. This study found that students were empowered by the interdisciplinary experience during a hackathon and felt that the knowledge and skills gained could be applied in real world settings. However, addressing student expectations of hackathons prior to the event is an area for improvement. These findings have implications for future hackathons and can spur further research into using the hackathon model as an educational experience for learners of all ages. Copyright © 2018 Elsevier B.V. All rights reserved.

  8. Peter Hacke | NREL

    Science.gov Websites

    photovoltaic (PV) modules, inspections for root cause of module failures in the field, and accelerated lifetime delamination. His research interests are in modeling of degradation processes of PV modules, module integrated analysis of PV degradation data. He also explores accelerated multi-stress and combined stress testing to

  9. Hack City Summer: Computer Camps Can Bring a Vacation of Keyboard Delights.

    ERIC Educational Resources Information Center

    Shell, Ellen Ruppel

    1983-01-01

    Activities at a summer computer camp (Camp Atari held at East Stroudsburg State College PA) are described. The curriculum, using logic, systematic analysis, and other fundamental programing skills, teaches students to interact effectively and creatively with computers. Sources for finding a computer camp are included. (JN)

  10. Breach to Nowhere

    ERIC Educational Resources Information Center

    Schaffhauser, Dian

    2009-01-01

    Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…

  11. THE INFORMATION BATTLESPACE: A LEVEL PLAYING FIELD FOR THE ASYMMETRIC FOE

    DTIC Science & Technology

    2016-02-01

    America” to carry out attacks on those listed.7 Despite ISIS claims that the list had been obtained via hacking by an advanced, tech-savvy division... Facebook , YouTube and Twitter. Many general officers maintain personal social media accounts that they personally use to communicate with multiple

  12. Hacking Say and Reviving ELIZA: Lessons from Virtual Environments

    ERIC Educational Resources Information Center

    Mazar, Rochelle; Nolan, Jason

    2009-01-01

    As text-based predecessors to Second Life, MOOs can offer educators important insights on managing virtual communities to create rich, meaningful learning experiences. Rochelle Mazar and Jason Nolan outline two instructional experiments in MOOs that have implications for current educational practice in Second Life. One involves modifying and…

  13. The Classroom, Board Room, Chat Room, and Court Room: School Computers at the Crossroads.

    ERIC Educational Resources Information Center

    Stewart, Michael

    2000-01-01

    In schools' efforts to maximize technology's benefits, ethical considerations have often taken a back seat. Computer misuse is growing exponentially and assuming many forms: unauthorized data access, hacking, piracy, information theft, fraud, virus creation, harassment, defamation, and discrimination. Integrated-learning activities will help…

  14. Right and Wrong Online. Teaching Your Children Ethics in Cyberspace.

    ERIC Educational Resources Information Center

    Our Children, 1998

    1998-01-01

    Parents must describe and reinforce the importance of truthfulness, responsibility, and respect when their children use the Internet. The paper presents potential situations that could arise and discusses issues related to the law online, copyrighted materials, copying or distributing software, privacy, hacking, and obscenity. A sidebar offers…

  15. Using Bloom's and Webb's Taxonomies to Integrate Emerging Cybersecurity Topics into a Computing Curriculum

    ERIC Educational Resources Information Center

    Harris, Mark A.; Patten, Karen P.

    2015-01-01

    Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs…

  16. Hacked Landscapes: Tensions, Borders, and Positionality in Spatial Literacy

    ERIC Educational Resources Information Center

    Schmidt, Sandra J.

    2017-01-01

    By focusing on critical geographies, landscape, and spatial literacy, this article evaluates a semester-long spatial justice project conducted in a preservice teacher education program. The analysis recognizes the limitations of reading the products literally as a means of comprehending spatial representation. It expands the analysis by hacking…

  17. Workshop Report: The Future of ROK Navy-US Navy Cooperation

    DTIC Science & Technology

    2007-10-01

    vulnerability also increases. Cyber attacks to paralyze information and communication systems through hacking , virus attacks on computers, and jamming...Pacific Fleet (N5) 250 Makalpa Dr. Pearl Harbor, HI 96860-7000 Ms. Ariane L. Whitemore Chief of Staff, Strategic Planning and Policy HQ USPACOM/ J5 COS

  18. Care and the Construction of Hacker Identities, Communities, and Society

    ERIC Educational Resources Information Center

    Toombs, Austin Lewis

    2016-01-01

    Recent scholarship in Human-Computer Interaction, science and technology studies, and design research has focused on hacker communities as sites of innovation and entrepreneurship, novel forms of education, and the democratization of technological production. However, hacking practices are more than new technical practices; they are also…

  19. Monitoring and Risk Identification Caused by High Water, Floods and Erosion Processes in Urban Part of Sava Riverbed

    NASA Astrophysics Data System (ADS)

    Oskoruš, D.; Miković, N.; Ljevar, I.

    2012-04-01

    Riverbed erosion and bottom deepening are part of natural fluvial processes in the upper stream of Sava River. The increasing gradient of those changes is interconnected with the level of human influence in the river basin and riverbed as well. In time period of last forty years the consequences of riverbed erosion are become serious as well as dangerous and they threaten the stability of hydro technical structures. The increasing value of flow velocity in riverbed in urban part of river section during high water level, mud and debris flow during the floods as well, is especially dangerous for old bridges. This paper contains result of velocity measurements during high waters taken by Hydrological Service of Republic Croatia, load transport monitoring during such events and cross sections in some vulnerable location. In this paper is given one example of Jakuševac railway bridge in Zagreb, heavily destroyed during high water event on the 30 March 2009., recently reconstructed by "Croatian Railways" company. Keywords: Riverbed erosion, flow velocity, mud and debris flow, risk identification, stability of bridges

  20. Hybridization and cytonuclear associations among native westslope cutthroat trout, introduced rainbow trout, and their hybrids within the Stehekin River drainage, North Cascades National Park

    USGS Publications Warehouse

    Ostberg, C.O.; Rodriguez, R.J.

    2006-01-01

    Historic introductions of nonnative rainbow trout Oncorhynchus mykiss into the native habitats of cutthroat trout O. clarkii have impacted cutthroat trout populations through introgressive hybridization, creating challenges and concerns for cutthroat trout conservation. We examined the effects of rainbow trout introductions on the native westslope cutthroat trout O. c. lewisii within the Stehekin River drainage, North Cascades National Park, Washington, by analyzing 1,763 salmonid DNA samples from 18 locations with nine diagnostic nuclear DNA markers and one diagnostic mitochondrial DNA (mtDNA) marker. Pure westslope cutthroat trout populations only occurred above upstream migration barriers in the Stehekin River and Park Creek. Two categories of rainbow trout admixture were observed: (1) less than 10% within the Stehekin River drainage above the Bridge Creek confluence and the middle and upper Bridge Creek drainage and (2) greater than 30% within the Stehekin River below the Bridge Creek confluence and in lower Bridge Creek. Hybrid indices and multilocus genotypes revealed an absence of rainbow trout and reduced hybrid diversity within the Stehekin River above the Bridge Creek confluence relative to hybrid diversity in the Stehekin River below the confluence and within lower Bridge Creek. Cytonuclear disequilibrium statistics revealed assortative mating between westslope cutthroat and rainbow trout but not among hybrids within the same locations. This suggests that a randomly mating hybrid swarm does not currently exist. However, continual migration of parental genotypes into the study location could also create significant cytonuclear disequilibria. The Stehekin River represents a novel and unique example of a dynamic hybridization zone where the invasion of rainbow trout alleles into the Stehekin River westslope cutthroat trout population above the Bridge Creek confluence appears to be impeded, suggesting that divergent ecological or evolutionary mechanisms promote the population structure within the Stehekin River drainage, depending upon location.

  1. Enhanced Cyberspace Defense through Covert Publish-Subscribe Broker Pattern Communications

    DTIC Science & Technology

    2008-06-01

    http://www.cnn.com/TECH/computing/9902/26/t_t/internet.time/, accessed June 2008. [3] C. V. Clausewitz, On War, 1st ed.. London, England: Kegan ...34 2003. [17] T. Greene . (2008 , Apr.) Network World. [Online]. http://www.networkworld.com/news/2008/040908-rsa-hack-power-grid.html, accessed

  2. Always Wanted to Hack the Pentagon? DoD Says Bring It

    Science.gov Websites

    test and find vulnerabilities in the department's applications, websites and networks, he added Resolve/Foal Eagle 2010, a joint U.S. and South Korean command-post exercise with computer-based command-post exercise with computer-based simulations and field exercises. Cook said other networks

  3. Hacking Your Ride: Is Web 2.0 Creating Vulnerabilities To Surface Transportation

    DTIC Science & Technology

    2016-09-01

    SMSN’s vulnerabilities, and uncovers terrorists’ malign use of social media for intelligence gathering. Academic researchers have already discovered...of social media for intelligence gathering. Academic researchers have already discovered threats in social navigation platforms such as Waze and...51 4. Social Navigation as Intelligence ................................................52 C. FUTURE CONCERNS

  4. Diagnostic ultrasound exposure in man.

    PubMed

    Gramiak, R

    1975-09-01

    In his review of the AAPM statement on ultrasound, the author feels that allowing "some" research or demonstration on normal persons in the face of cautionary statements on as yet unknown side effects is an inconsistent position. The use of videotapes and the development of simulators hacked by data banks are offered in place of tissue phantoms.

  5. Developing a Pedagogy of "Making" through Collaborative Self-Study

    ERIC Educational Resources Information Center

    Bullock, Shawn M.; Sator, Andrea

    2018-01-01

    We believe that the ideas associated with the Maker Movement have profound implications for teacher education. We have isolated the pedagogical principles of hack, adapt, design, and create as central to exploring how they work with teacher candidate participants in a maker pedagogy lab. We frame these ideas as Maker Pedagogy, which is the…

  6. "Hack" Is Not A Dirty Word--The Tenth Anniversary of Patron Access Microcomputer Centers in Libraries.

    ERIC Educational Resources Information Center

    Dewey, Patrick R.

    1986-01-01

    The history of patron access microcomputers in libraries is described as carrying on a tradition that information and computer power should be shared. Questions that all types of libraries need to ask in planning microcomputer centers are considered and several model centers are described. (EM)

  7. Misconceived Relationships between Logical Positivism and Quantitative Research: An Analysis in the Framework of Ian Hacking.

    ERIC Educational Resources Information Center

    Yu, Chong Ho

    Although quantitative research methodology is widely applied by psychological researchers, there is a common misconception that quantitative research is based on logical positivism. This paper examines the relationship between quantitative research and eight major notions of logical positivism: (1) verification; (2) pro-observation; (3)…

  8. Hacking Culture.

    ERIC Educational Resources Information Center

    Vigh, Pia

    The paper presents the model behind net2art, a joint Nordic project of creating a platform for Nordic net art. The projects background and scope, organization, impact and experiences, funding structures, and copyright issues are covered. The paper argues that museums do not have a natural role in the distribution of net art (i.e., art that is made…

  9. 01010000 01001100 01000001 01011001: Play Elements in Computer Programming

    ERIC Educational Resources Information Center

    Breslin, Samantha

    2013-01-01

    This article explores the role of play in human interaction with computers in the context of computer programming. The author considers many facets of programming including the literary practice of coding, the abstract design of programs, and more mundane activities such as testing, debugging, and hacking. She discusses how these incorporate the…

  10. Suggested Approaches to the Measurement of Computer Anxiety.

    ERIC Educational Resources Information Center

    Toris, Carol

    Psychologists can gain insight into human behavior by examining what people feel about, know about, and do with, computers. Two extreme reactions to computers are computer phobia, or anxiety, and computer addiction, or "hacking". A four-part questionnaire was developed to measure computer anxiety. The first part is a projective technique which…

  11. Hacking an Algal Transcription Factor for Lipid Biosynthesis.

    PubMed

    Chen, Xiulai; Hu, Guipeng; Liu, Liming

    2018-03-01

    Transcriptional engineering is a viable means for engineering microalgae to produce lipid, but it often results in a trade-off between production and growth. A recent study shows that engineering a single transcriptional regulator enables efficient carbon partitioning to lipid biosynthesis with high biomass productivity. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Examining the Relationship of Business Operations and the Information Security Culture in the United States

    ERIC Educational Resources Information Center

    Wynn, Cynthia L.

    2017-01-01

    An increase in information technology has caused and increased in threats towards information security. Threats are malware, viruses, sabotage from employees, and hacking into computer systems. Organizations have to find new ways to combat vulnerabilities and threats of internal and external threats to protect their information security and…

  13. 28 CFR 541.13 - Prohibited acts and disciplinary severity scale.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... personal safety; e.g., hack-saw blade) A. Recommend parole date rescission or retardation.B. Forfeit earned... disrupts or interferes with the security or orderly running of the institution or the Bureau of Prisons... interferes with the security or orderly running of the institution or the Bureau of Prisons. (Conduct must be...

  14. 28 CFR 541.3 - Prohibited acts and available sanctions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... which disrupts or interferes with the security or orderly running of the institution or the Bureau of... running of the institution or the Bureau of Prisons most like another High severity prohibited act. This...

  15. 28 CFR 541.3 - Prohibited acts and available sanctions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... which disrupts or interferes with the security or orderly running of the institution or the Bureau of... running of the institution or the Bureau of Prisons most like another High severity prohibited act. This...

  16. 28 CFR 541.3 - Prohibited acts and available sanctions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... which disrupts or interferes with the security or orderly running of the institution or the Bureau of... running of the institution or the Bureau of Prisons most like another High severity prohibited act. This...

  17. 28 CFR 541.3 - Prohibited acts and available sanctions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... which disrupts or interferes with the security or orderly running of the institution or the Bureau of... running of the institution or the Bureau of Prisons most like another High severity prohibited act. This...

  18. Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry 2008

    DTIC Science & Technology

    2009-01-16

    involving attempts to intrude or “ hack ” into the defense industrial base’s computer systems or networks originated from East Asia and the Pacifi c...easily mask IP addresses, utilize freely available anonymous proxies, or launch attacks from any of the open WiFi hotspots across the globe. These

  19. Wireless Sensor Node Data Gathering and Location Mapping

    DTIC Science & Technology

    2012-03-01

    adaptive two-phase approach to WiFi location sensing,” 4 th Int. Conf. on Pervasive Computing and Communications Workshops, Pisa, Italy, 2006, pp. 452...wrt.v24_micro_generic.bin, March 2010. [11] P. Asadoorian and L. Pesce, Linksys WRT54G Ultimate Hacking , Burlington, MA: Syngress, 2007, pp. 25. 32

  20. All About PID - Testing and Avoidance in the Field

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hacke, Peter; Johnston, Steve

    2016-09-01

    Potential-induced degradation can cause significant power loss in modules if the appropriate precautions are not taken. In the first part of a new series in PV Tech Power on module failure, Peter Hacke and Steve Johnston assess the current state-of-the-art in detecting, avoiding and mitigating the worst effects of PID.

  1. Lemongrass productivity oil content and composition as a function of nitrogen sulfur and harvest time

    USDA-ARS?s Scientific Manuscript database

    Lemongrass [Cymbopogon flexuosus (Steud.) Wats, (syn. Andropogon nardus var. flexuosus Hack; A. flexuosus Nees)] is one of the most widely grown essential oil plants in the world. Field experiments were conducted at Verona and Poplarville, Mississippi, to evaluate the effects of N (0, 40, 80, and 16...

  2. Deterring Iran’s Use of Offensive Cyber: A Case Study

    DTIC Science & Technology

    2014-10-01

    departments, such as Sharif University of Technology, began to hold hacking competitions to identify potential recruits.26 Dr . Hassan Abbasi, as well-known...that discovered it—to use social networking sites such as LinkedIn and Facebook to target hundreds of U.S. officials and their connections in order

  3. Intelligence Sharing, Fusion Centers, and Homeland Security

    DTIC Science & Technology

    2008-06-01

    particular area. For example, “J3” focuses on current operations, planning “ J5 ” focuses on future planning and “J2” focuses on intelligence. USNORTHCOM...rights of the suspected attacker, taking days or months to complete the investigation. For example, in February 1998, three teenagers hacked into 11

  4. A Framework for Event Prioritization in Cyber Network Defense

    DTIC Science & Technology

    2014-07-15

    U.S.," Reuters (US online Edition), pp. http://www.reuters.com/article/2013/11/06/net-us-usa-china- hacking - idUSBRE9A51AN20131106, 6 Nov 2013. [2...expressed individually, or as a single vector by using the magnitude of these three factors (cell J5 in Table 5

  5. The Benefits, and Fear, of Cookie Technology

    ERIC Educational Resources Information Center

    Goldsborough, Reid

    2004-01-01

    "Cookies" are tiny Web browser helpers and are an example of how the useful can get tossed in with the dangerous through the near hysteria brought about by the real threats of computer viruses, hacking, spyware, spam and phishing. This article briefly discusses antispyware legislation by Congress and the pros and cons of past and future…

  6. Teaching Hackers: School Computing Culture and the Future of Cyber-Rights.

    ERIC Educational Resources Information Center

    Van Buren, Cassandra

    2001-01-01

    Discussion of the need for ethical computing strategies and policies at the K-12 level to acculturate computer hackers away from malicious network hacking focuses on a three-year participant observation ethnographic study conducted at the New Technology High School (California) that examined the school's attempts to socialize its hackers to act…

  7. New results of the spectral observations of CP stars

    NASA Astrophysics Data System (ADS)

    Polosukhina, N. S.; Shavrina, A. V.; Drake, N. A.; Kudryavtsev, D. O.; Smirnova, M. A.

    2010-04-01

    The lithium problem in Ap-CP stars has been, for a long time, a subject of debate. Individual characteristics of CP stars, such as high abundance of the rare-earth elements presence of magnetic fields, complicate structure of the surface distribution of chemical elements, rapid oscillations of some CP-stars, make the detection of the lithium lines and the determination of the lithium abundance, a difficult task. During the International Meeting in Slovakia in 1996, the lithium problem in Ap-CP stars was discussed. The results of the Li study carried out in CrAO Polosukhina (1973-1976), the works of Hack & Faraggiana (1963), Wallerstein & Hack (1964), Faraggiana et al. (1992-1996) formed the basis of the International project ‘Lithium in the cool CP-stars with magnetic fields’. The main goal of the project was, using systematical observations of Ap-CP stars with phase rotation in the spectral regions of the resonance doublet Li I 6708 Å and subordinate 6104 Å lithium lines with different telescopes, to create a database, which will permit to explain the physical origin of anomalous Li abundance in the atmospheres of these stars.

  8. What is your #geosciencehack?

    NASA Astrophysics Data System (ADS)

    Stoof, Cathelijne; Hut, Rolf

    2016-04-01

    There's a secret MacGyver in every researcher, whether they realize it or not. It's always a challenge to get setups working, transport material, or create a solution that works in the exact environment that you have. We have our own tricks to deal with this, and know you have them too. Do you use a kitchen bowl and spatula to evenly mix water and sand, sanitary pads (super absorbent) to stop leaking flow experiments), nylons to line piezometers, duct tape for everything? No matter how obvious or simple your own geoscience hacks are to you, we'd like to hear about them! On this blank poster and on Twitter (#geosciencehack), we invite you to share the tricks that make your field and lab research work. We will collect all ideas and communicate them through Twitter (@geosciencehack), a blog (www.rolfhut.nl), and if we have sufficient material we plan to submit a joint paper to the upcoming MacGyver special issue in Frontiers, so leave your contact details along with your geoscience hack if you'd like to be a co-author.

  9. Reproductive hacking. A male seminal protein acts through intact reproductive pathways in female Drosophila.

    PubMed

    Rubinstein, C Dustin; Wolfner, Mariana F

    2014-01-01

    Seminal proteins are critical for reproductive success in all animals that have been studied. Although seminal proteins have been identified in many taxa, and female reproductive responses to receipt of these proteins have been documented in several, little is understood about the mechanisms by which seminal proteins affect female reproductive physiology. To explore this topic, we investigated how a Drosophila seminal protein, ovulin, increases ovulation rate in mated females. Ovulation is a relatively simple physiological process, with known female regulators: previous studies have shown that ovulation rate is promoted by the neuromodulator octopamine (OA) in D. melanogaster and other insects. We found that ovulin stimulates ovulation by increasing OA signaling in the female. This finding supports a model in which a male seminal protein acts through "hacking" a well-conserved, regulatory system females use to adjust reproductive output, rather than acting downstream of female mechanisms of control or in parallel pathways altogether. We also discuss similarities between 2 forms of intersexual control of behavior through chemical communication: seminal proteins and pheromones.

  10. After the data breach: Managing the crisis and mitigating the impact.

    PubMed

    Brown, Hart S

    2016-01-01

    Historically, the unauthorised access and theft of information was a tactic used between countries as part of espionage campaigns, during times of conflict as well as for personal and criminal purposes. The consumers of the information were relatively isolated and specific. As information became stored and digitised in larger quantities in the 1980s the ability to access mass amounts of records at one time became possible. The expertise needed to remotely access and exfiltrate the data was not readily available and the number of markets to monetise the data was limited. Over the past ten years, shadow networks have been used by criminals to collaborate on hacking techniques, exchange hacking advice anonymously and commercialise data on the black market. The intersection of these networks along with the unintentional losses of information have resulted in 5,810 data breaches made public since 2005 (comprising some 847,807,830 records) and the velocity of these events is increasing. Organisations must be prepared for a potential breach event to maintain cyber resiliency. Proper management of a breach response can reduce response costs and can serve to mitigate potential reputational losses.

  11. What caused the breach? An examination of use of information technology and health data breaches.

    PubMed

    Wikina, Suanu Bliss

    2014-01-01

    Data breaches arising from theft, loss, unauthorized access/disclosure, improper disclosure, or hacking incidents involving personal health information continue to increase every year. As of September 2013, reported breaches affecting individuals reached close to 27 million since 2009, when compilation of records on breaches began. These breaches, which involved 674 covered entities and 153 business associates, involved computer systems and networks, desktop computers, laptops, paper, e-mail, electronic health records, and removable/portable devices (CDs, USBs, x-ray films, backup tapes, etc.). Even with the increased use of health information technology by health institutions and allied businesses, theft and loss (not hacking) constitute the major types of data breaches encountered. Removable/portable devices, desktop computers, and laptops were the top sources or locations of the breached information, while the top six states-Virginia, Illinois, California, Florida, New York, and Tennessee-in terms of the number of reported breaches accounted for nearly 75 percent of the total individual breaches, 33 percent of breaches in covered entities, and about 30 percent of the total breaches involving business associates.

  12. What Caused the Breach? An Examination of Use of Information Technology and Health Data Breaches

    PubMed Central

    Wikina, Suanu Bliss

    2014-01-01

    Data breaches arising from theft, loss, unauthorized access/disclosure, improper disclosure, or hacking incidents involving personal health information continue to increase every year. As of September 2013, reported breaches affecting individuals reached close to 27 million since 2009, when compilation of records on breaches began. These breaches, which involved 674 covered entities and 153 business associates, involved computer systems and networks, desktop computers, laptops, paper, e-mail, electronic health records, and removable/portable devices (CDs, USBs, x-ray films, backup tapes, etc.). Even with the increased use of health information technology by health institutions and allied businesses, theft and loss (not hacking) constitute the major types of data breaches encountered. Removable/portable devices, desktop computers, and laptops were the top sources or locations of the breached information, while the top six states—Virginia, Illinois, California, Florida, New York, and Tennessee—in terms of the number of reported breaches accounted for nearly 75 percent of the total individual breaches, 33 percent of breaches in covered entities, and about 30 percent of the total breaches involving business associates. PMID:25593574

  13. Space Radar Image of Florence, Italy

    NASA Image and Video Library

    1999-04-15

    This radar image shows land use patterns in and around the city of Florence, Italy, shown here in the center of the image. Florence is situated on a plain in the Chianti Hill region of Central Italy. The Arno River flows through town and is visible as the dark line running from the upper right to the bottom center of the image. The city is home to some of the world's most famous art museums. The bridges seen crossing the Arno, shown as faint red lines in the upper right portion of the image, were all sacked during World War II with the exception of the Ponte Vecchio, which remains as Florence's only covered bridge. The large, black V-shaped feature near the center of the image is the Florence Railroad Station. This image was acquired by the Spaceborne Imaging Radar-C/X-band Synthetic Aperture Radar (SIR-C/X-SAR) onboard the Space Shuttle Endeavour on April 14, 1994. SIR-C/X-SAR, a joint mission of the German, Italian, and United States space agencies, is part of NASA's Mission to Planet Earth. This image is centered at 43.7 degrees north latitude and 11.15 degrees east longitude with North toward the upper left of the image. The area shown measures 20 kilometers by 17 kilometers (12.4 miles by 10.6 miles). The colors in the image are assigned to different frequencies and polarizations of the radar as follows: red is L-band horizontally transmitted, horizontally received; green is L-band horizontally transmitted, vertically received; blue is C-band horizontally transmitted, vertically received. http://photojournal.jpl.nasa.gov/catalog/PIA01795

  14. 59. MISSISSIPPI, NOXUBEE CO. MACON Ms. 14 E to McLeod, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    59. MISSISSIPPI, NOXUBEE CO. MACON Ms. 14 E to McLeod, 6.5 Mi S 4.5 miles S on McLeod-Shuqualak road. Lower chord of turn span, SW side looking W. Shows two different ways of joining the channel beams of chord: lattice, and bolts in 'dumbell' -shaped sleeves or spacers. Sarcone Photography, Columbus, Ms. Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  15. Single-Site Cannulation Venovenous Extracorporeal CO2 Removal as Bridge to Lung Volume Reduction Surgery in End-Stage Lung Emphysema.

    PubMed

    Redwan, Bassam; Ziegeler, Stephan; Semik, Michael; Fichter, Joachim; Dickgreber, Nicolas; Vieth, Volker; Ernst, Erik Christian; Fischer, Stefan

    Lung volume reduction surgery (LVRS) is an important treatment option for end-stage lung emphysema in carefully selected patients. Here, we first describe the application of low-flow venovenous extracorporeal CO2 removal (LFVV-ECCO2R) as bridge to LVRS in patients with end-stage lung emphysema experiencing severe hypercapnia caused by acute failure of the breathing pump. Between March and October 2015, n = 4 patients received single-site LFVV-ECCO2R as bridge to LVRS. Indication for extracorporeal lung support was severe hypercapnia with respiratory acidosis and acute breathing pump failure. Two patients required continuous mechanical ventilation over a temporary tracheostomy and were bed ridden. The other two patients were nearly immobile because of severe dyspnea at rest. Length of preoperative ECCO2R was 14 (1-42) days. All patients underwent unilateral LVRS. Anatomical resection of the right (n = 3) or left (n = 1) upper lobe was performed. Postoperatively, both patients with previous mechanical ventilatory support were successfully weaned. ECCO2R in patients with end-stage lung emphysema experiencing severe hypercapnia caused by acute breathing pump failure is a safe and effective bridging tool to LVRS. In such patients, radical surgery leads to a significant improvement of the performance status and furthermore facilitates respiratory weaning from mechanical ventilation.

  16. Evaluation of high temperature superconductive thermal bridges for space borne cryogenic detectors

    NASA Technical Reports Server (NTRS)

    Scott, Elaine P.

    1996-01-01

    Infrared sensor satellites are used to monitor the conditions in the earth's upper atmosphere. In these systems, the electronic links connecting the cryogenically cooled infrared detectors to the significantly warmer amplification electronics act as thermal bridges and, consequently, the mission lifetimes of the satellites are limited due to cryogenic evaporation. High-temperature superconductor (HTS) materials have been proposed by researchers at the National Aeronautics and Space Administration Langley's Research Center (NASA-LaRC) as an alternative to the currently used manganin wires for electrical connection. The potential for using HTS films as thermal bridges has provided the motivation for the design and the analysis of a spaceflight experiment to evaluate the performance of this superconductive technology in the space environment. The initial efforts were focused on the preliminary design of the experimental system which allows for the quantitative comparison of superconductive leads with manganin leads, and on the thermal conduction modeling of the proposed system. Most of the HTS materials were indicated to be potential replacements for the manganin wires. In the continuation of this multi-year research, the objectives of this study were to evaluate the sources of heat transfer on the thermal bridges that have been neglected in the preliminary conductive model and then to develop a methodology for the estimation of the thermal conductivities of the HTS thermal bridges in space. The Joule heating created by the electrical current through the manganin wires was incorporated as a volumetric heat source into the manganin conductive model. The radiative heat source on the HTS thermal bridges was determined by performing a separate radiant interchange analysis within a high-T(sub c) superconductor housing area. Both heat sources indicated no significant contribution on the cryogenic heat load, which validates the results obtained in the preliminary conduction model. A methodology was presented for the estimation of the thermal conductivities of the individual HTS thermal bridge materials and the effective thermal conductivities of the composite HTS thermal bridges as functions of temperature. This methodology included a sensitivity analysis and the demonstration of the estimation procedure using simulated data with added random errors. The thermal conductivities could not be estimated as functions of temperature; thus the effective thermal conductivities of the HTS thermal bridges were analyzed as constants.

  17. Prime Suspect, Second Row Center

    ERIC Educational Resources Information Center

    Laird, Ellen A.

    2011-01-01

    His father had been hacked to death in his own bed with an ax the previous November. His mother was similarly brutalized and left for dead with her husband but survived. On the last Monday of that August, after several months and many investigative twists, turns, and fumbles, there sat the son--the prime suspect--in Ellen Laird's literature class,…

  18. Michael Woodhouse | NREL

    Science.gov Websites

    , physics and chemistry. (1998-2002) Featured Publications Fu, R., T.L. James, M. Woodhouse. "Economic /10.1039/C3EE40701B. Goodrich, A., P. Hacke, Q. Wang, B. Sopori, R. Margolis, T.L. James, and Woodhouse, M InformationMicrosoft Excel. Woodhouse, M., A. Goodrich, R. Margolis, T.L. James, M. Lokanc, and R. Eggert. "

  19. Five Ways to Hack and Cheat with Bring-Your-Own-Device Electronic Examinations

    ERIC Educational Resources Information Center

    Dawson, Phillip

    2016-01-01

    Bring-your-own-device electronic examinations (BYOD e-exams) are a relatively new type of assessment where students sit an in-person exam under invigilated conditions with their own laptop. Special software restricts student access to prohibited computer functions and files, and provides access to any resources or software the examiner approves.…

  20. Religion and Rationality: Quaker Women and Science Education 1790-1850

    ERIC Educational Resources Information Center

    Leach, Camilla

    2006-01-01

    This article examines the work of two Quaker women, Priscilla Wakefield (1750-1832) and Maria Hack (1777-1844) as popularizers of science and in the context of the development of scientific literacy. Both women were writers who specialized in scientific educational texts for children and young adults. As Quakers their community and culture played…

  1. Creative Nonfiction in the Classroom: Extending the Boundaries of Literary Study.

    ERIC Educational Resources Information Center

    Skrebels, Paul

    The net effect of the early experiences of writing "compositions" which involved either describing the circumstances of a student's life or recounting the kinds of events encapsulated in that proverbially hack title, "What I Did on My Summer Vacation," has been a tendency for older teachers to devalue nonfiction as an object of…

  2. The Impact of Premature Birth: A Correlational Study Assessing the Need for Children to Access Educational Support Services

    ERIC Educational Resources Information Center

    Jensen, Laura M.; Miller, Rebecca

    2009-01-01

    Accumulating evidence suggests children born premature are at increased risk of lower cognitive abilities, poor academic performance, low social competence and behavioral problems, compared with individuals born full-term (e.g., Whitside-Mansell, Barrett, Bradley & Gargus, 2006; Litt, Taylor, Klein, & Hack, 2005). The goal of the current…

  3. Flow Visualization Studies in the Novacor Left Ventricular Assist System CRADA PC91-002, Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Borovetz, H.S.; Shaffer, F.; Schaub, R.

    This paper discusses a series of experiments to visualize and measure flow fields in the Novacor left ventricular assist system (LVAS). The experiments utilize a multiple exposure, optical imaging technique called fluorescent image tracking velocimetry (FITV) to hack the motion of small, neutrally-buoyant particles in a flowing fluid.

  4. Listening to Students: How I Came to Love My Low-Residency Program

    ERIC Educational Resources Information Center

    Atwood, Megan

    2009-01-01

    Finding an academic program that caters to children's literature is hard. Many people consider children's literature no more sophisticated than its audience--an arena for those who cannot hack it either as writers or as teachers of adult literature. This author, however, found a new program--a "low residency program"--at Hamline…

  5. (DEPSCOR FY 09) Obfuscation and Deobfuscation of Intent of Computer Programs

    DTIC Science & Technology

    2012-12-21

    increased as the malware distribution mechanism has moved to the web through infected sites. In this use a site is hacked so as to distribute malware to...Simpósio Brasileiro em Segurança da Informaçao e de Sistemas Computacionais (2009). (Chen et al., 2012) Jundong Chen, Matthias R. Brust, Vir V. Phoha

  6. Google and the "Twisted Cyber Spy" Affair: US-Chinese Communication in an Age of Globalization

    ERIC Educational Resources Information Center

    Hartnett, Stephen John

    2011-01-01

    The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…

  7. An Epistemological Approach to Modeling: Cases Studies and Implications for Science Teaching

    ERIC Educational Resources Information Center

    Sensevy, Gerard; Tiberghien, Andree; Santini, Jerome; Laube, Sylvain; Griggs, Peter

    2008-01-01

    Models and modeling are a major issue in science studies and in science education. In addressing such an issue, we first propose an epistemological discussion based on the works of Cartwright (1983, 1999), Fleck (1935/1979), and Hacking (1983). This leads us to emphasize the transitions between the abstract and the concrete in the modeling…

  8. Hacking the Matrix.

    PubMed

    Czerwinski, Michael; Spence, Jason R

    2017-01-05

    Recently in Nature, Gjorevski et al. (2016) describe a fully defined synthetic hydrogel that mimics the extracellular matrix to support in vitro growth of intestinal stem cells and organoids. The hydrogel allows exquisite control over the chemical and physical in vitro niche and enables identification of regulatory properties of the matrix. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. P-hacking.

    PubMed

    Raj, A Thirumal; Patil, Shankargouda; Sarode, Sachin; Sarode, Gargi

    2017-08-01

    Due to increasing rate of research articles getting published in recent times, medical science is evolving very fast. Open access policies of the journals make information easily available to the stakeholders for building future research proposal. Blindly having faith in whatever is published in the literature is detrimental for science; however, it is hard to find out the correctness of the data analysis.

  10. Policy-Aware Sender Anonymity in Location-Based Services

    ERIC Educational Resources Information Center

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  11. 75 FR 76263 - Inmate Discipline Program/Special Housing Units: Subpart Revision and Clarification

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... security or orderly running of the institution or the Bureau of Prisons most like another prohibited act in... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... Conduct which disrupts or interferes with the security or orderly running of the institution or the Bureau...

  12. Learning Management System Calendar Reminders and Effects on Time Management and Academic Performance

    ERIC Educational Resources Information Center

    Mei, Jianyang

    2016-01-01

    This research project uses a large research university in the Midwest as a research site to explore the time management skills of international students and analyzes how using the Course Hack, an online Learning Management System (LMS) calendar tool, improves participants' time management skills and positively impacts their academic performance,…

  13. Recurrent selection for increased seed germination in sand bluestem (Andropogon hallii)

    USDA-ARS?s Scientific Manuscript database

    Water is essential for plant growth and under field conditions is often inadequate for satisfactory seed germination and seedling growth. The objective of this research was to improve the seed germination of sand bluestem (Andropogon hallii Hack.) lines ‘AB-medium Syn-0’ and ‘CD-tall Syn-0’ at low ...

  14. Picture of the Week: Hacking the bio-nano interface for better biofuels

    Science.gov Websites

    ) influence electron transfer between the enzyme and the electrode to determine the best placement of enzymes compounds) influence electron transfer between the enzyme and the electrode to determine the best placement studied how three quinones (a class of organic compounds) influence electron transfer between the enzyme

  15. Security Meets Real-World Computing. Building Digital Libraries

    ERIC Educational Resources Information Center

    Huwe, Terence K.

    2005-01-01

    The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…

  16. Should There Be an Expectation of Privacy in the Library? Online Treasures

    ERIC Educational Resources Information Center

    Balas, Janet L.

    2005-01-01

    Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…

  17. The Social Organization of the Computer Underground

    DTIC Science & Technology

    1989-08-01

    colleagues, with only small groups approaching peer relationships. 14 . SUBJECT TERMS HACK, Computer Underground 15. NUMBER OF PAGES 16. PRICE CODE 17...between individuals involved in a common activity (pp. 13- 14 ). Assessing the degree and manner in which the...criminalized over the past several years . Hackers, and the "danger" that they present in our computer dependent

  18. Hacking Blackboard: Customizing Access to Library Resources through the Blackboard Course Management System

    ERIC Educational Resources Information Center

    Kellam, Lynda M.; Cox, Richard; Winkler, Hannah

    2009-01-01

    Academic libraries have long been trying to gain access to users through their favorite online spaces, such as social networking sites. In this article a project of the University of North Carolina at Greensboro's University Libraries, which integrated library resources with the campus course management system, Blackboard, is detailed. The main…

  19. Joint Interagency Coordination Group - Cyber: Empowering the Combatant Commanders against the no-borders threat

    DTIC Science & Technology

    2009-05-04

    inconvenience and denial of Internet service, CNAs pose a threat to national security, if the right computer is hacked , to every day operations, if baking...expert J3: Current Operations Rep Private Sector/Civilian: cyber/CNA SME J5 Future Operations Rep Private Sector/Civilian: cyber/CND SME Table 2

  20. Cyber-Security Concerns Mount as Student Hacking Hits Schools: Districts Straining to Safeguard Online Networks

    ERIC Educational Resources Information Center

    Borja, Rhea R.

    2006-01-01

    While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…

  1. Simulations of a hypothetical temperature control structure at Detroit Dam on the North Santiam River, northwestern Oregon

    USGS Publications Warehouse

    Buccola, Norman L.; Stonewall, Adam J.; Rounds, Stewart A.

    2015-01-01

    Estimated egg-emergence days for endangered Upper Willamette River Chinook salmon (Oncorhynchus tshawytscha) and Upper Willamette River winter steelhead (Oncorhynchus mykiss) were assessed for all scenarios. Estimated spring Chinook fry emergence under SlidingWeir scenarios was 9 days later immediately downstream of Big Cliff Dam, and 4 days later at Greens Bridge compared with existing structural scenarios at Detroit Dam. Despite the inclusion of a hypothetical sliding weir at Detroit Dam, temperatures exceeded without-dams temperatures during November and December. These late-autumn exceedances likely represent the residual thermal effect of Detroit Lake operated to meet minimum dry-season release rates (supporting instream habitat and irrigation requirements) and lake levels specified by the current (2014) operating rules (supporting recreation and flood mitigation).

  2. 70. MISSISSIPPI, LOWNDES CO., NORTHWEST CORNER MAP OF LOWNDES COUNTY, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    70. MISSISSIPPI, LOWNDES CO., NORTHWEST CORNER MAP OF LOWNDES COUNTY, 1931 Detail of ROAD OF LOWNDES COUNTY, MISSISSIPPI, 1931 by C. L. wood, county engineer. Detail of section NW of Columbus (12 mi. N, 9 mi. W), including Plymouth, Waverly, Barton, Buttahatchie R. Orig. scale: 1 in. to 1 mi. Property of Helen (Mrs. Sam L.) Crawford, Hamilton, Ms. Sarcone Photography, Columbus, Ms., Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  3. 69. MISSISSIPPI, LOWNDES CO. COLUMBUS MAP OF LOWNDES COUNTY, 1931 ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    69. MISSISSIPPI, LOWNDES CO. COLUMBUS MAP OF LOWNDES COUNTY, 1931 ROAD MAP OF LOWNDES COUNTY, MISSISSIPPI, 1931 by C.L. Wood, the county engineer. Updated through the mid-1930s to show new federal aid-state roads. Compares modern system with older county system. Original scale: 1 in. to 1 mi. Property of Helen (Mrs. Sam L.) Crawford, Hamilton, Ms. Sarcone Photography, Columbus, Ms., Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  4. 71. MISSISSIPPI, LOWNDES CO. COLUMBUSSTEENS MAP OF LOWNDES COUNTY, 1931 ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    71. MISSISSIPPI, LOWNDES CO. COLUMBUS-STEENS MAP OF LOWNDES COUNTY, 1931 Detail of ROAD MAP OF LOWNDES COUNTY, MISSISSIPPI, 1931 by C. L. wood, county engineer. Orig. scale: I in. to I mi. Includes Columbus and area NE to steens. Extent: 12 mi. East-West, 9 mi. North-South. Property of Helen (Mrs. Sam L.) Crawford, Hamilton, Ms. Sarcone Photography, Columbus, Ms., Sep 1978. - Bridges of the Upper Tombigbee River Valley, Columbus, Lowndes County, MS

  5. 12. Photocopy of drawing dated May 26, 1902, on file, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. Photocopy of drawing dated May 26, 1902, on file, City of New York Department of Ports, International Trade, and Commerce. ERECTION DIAGRAM/44TH ST. PIER - S. BROOKLYN - N.Y./WATER FRONT IMPROVEMENTS FOR THE BUSH COMPANY LT'D. American Bridge Company, Brooklyn Plant, Drawing No. 1431, Order No. A1343, Sheet No. 5. - Bush Terminal Company, Pier 5, Opposite end of Forty-first Street on Upper New York Bay, Brooklyn, Kings County, NY

  6. Feasibility Report for Hydropower, St. Anthony Falls Locks and Dams, Mississippi River, Minneapolis, Minnesota.

    DTIC Science & Technology

    1984-02-01

    Added Generators and Breakers 116 * ix I~ Table of Contents (cont.) Item Pace Excitation System 117 Connection to Load 117 Bridge Crane 117 Lower St...118 Added Generator and Breaker 119 Excitation System 120 Connection to Load 120 Mobile Crane 120 Civil Features - Upper Falls 120 Powerhouse 121...intermediate plants fully integrated with the base loaded thermal plants in the area. Gavins Point is generally base- loaded to provide steady flows for

  7. PARTICIPATORY DESIGN OF PEDIATRIC UPPER LIMB PROSTHESES: QUALITATIVE METHODS AND PROTOTYPING.

    PubMed

    Sims, Tara; Cranny, Andy; Metcalf, Cheryl; Chappell, Paul; Donovan-Hall, Maggie

    2017-01-01

    The study aims to develop an understanding of the views of children and adolescents, parents, and professionals on upper limb prosthetic devices to develop and improve device design. Previous research has found that children are dissatisfied with prostheses but has relied heavily on parent proxy reports and quantitative measures (such as questionnaires) to explore their views. Thirty-four participants (eight children aged 8-15 years with upper limb difference, nine parents, eight prosthetists, and nine occupational therapists) contributed to the development of new devices through the BRIDGE methodology of participatory design, using focus groups and interviews. The study identified areas for improving prostheses from the perspective of children and adolescents, developed prototypes based on these and gained feedback on the prototypes from the children and other stakeholders (parents and professionals) of paediatric upper limb prostheses. Future device development needs to focus on ease of use, versatility, appearance, and safety. This study has demonstrated that children and adolescents can and should be involved as equal partners in the development of daily living equipment and that rapid prototyping (three-dimensional printing or additive manufacturing), used within a participatory design framework, can be a useful tool for facilitating this.

  8. Physical stratigraphy, paleontology, and magnetostratigraphy of the USGS-Santee Coastal Reserve core (CHN-803), Charleston County, South Carolina

    USGS Publications Warehouse

    Edwards, Lucy E.; Gohn, G.S.; ,; Prowell, D.C.; Bybell, L.M.; Bardot, L.P.; Firth, J.V.; Huber, B.T.; Frederiksen, N.O.; MacLeod, K.G.

    1999-01-01

    The Santee Coastal Reserve core, a 545-ft-deep corehole in northeastern Charleston County, South Carolina, recovered sediments of Late Cretaceous, Paleocene, Eocene, and Quaternary age. The deepest sediments, the Donoho Creek Formation (545-475.7 ft), consist of 69.3 ft of muddy calcareous sand of marine origin. This formation is placed within the upper Campanian calcareous nannofossil Subzone CC 22c. The overlying Peedee Formation (475.7-367.1 ft) in the core consists of 108.6 ft of silty clay of marine origin. It is placed in upper Maastrichtian calcareous nannofossil Subzones CC 25b, CC 26a, and CC 26b. Combined fossil and paleomagnetic information indicates nearly continuous deposition. Foraminifers indicate an outer neritic paleobathymetric setting. The Rhems Formation sensu stricto (367.1-267.3 ft) consists of 99.8 ft of silty clay, muddy sand, and minor calcite-cemented, shelly sand of marine origin. It is apparently the product of rapid sediment accumulation during a short period of time in the early Paleocene (calcareous nannofossil Zone NP 1). The upper part of the Rhems Formation sensu Bybell and others (1998) (267.3-237.4 ft) consists of 29.9 ft of calcite-cemented muddy sand and burrowed fine sand of marine origin. It is placed in calcareous nannofossil Zone NP 4 and, because it shows normal polarity, likely represents the upper part of the lower Paleocene. This unit may be correlative with the lower part of the Lower Bridge Member of the Williamsburg Formation in its type area. The Lower Bridge Member of the Williamsburg Formation (237.4-125.0 ft) has an unconformable contact at 205.0 ft that divides the member into lower muddy sand beds and upper calcareous clay beds. Both are placed in the upper Paleocene calcareous nannofossil Zone NP 5. The Chicora Member of the Williamsburg Formation (125-51.5 ft) consists of 73.5 ft of muddy, shelly sand of marine origin. It is poorly dated but includes late Paleocene nannofossils (Zones NP 5 and NP 6). A mollusk-bryozoan limestone (51.5-42.0 ft) above the Chicora Member of the Williamsburg yields early Eocene calcareous nannofossils representing both Zone NP 9/10 and Zone NP 12, together with pollen and dinocysts that are younger. Sediments of middle and late Eocene, Oligocene, Miocene, and Pliocene ages were not recovered in the Santee Coastal Reserve core. The upper 42.0 ft of sediments represent Quaternary deposits and are included in the Wando Formation (42.0-28.0 ft) and the informal Silver Bluff beds (28.0-0 ft).

  9. Chemical composition, stratigraphy, and depositional environments of the Black River Group (Middle Ordovician), southwestern Ohio.

    USGS Publications Warehouse

    Stith, David A.

    1981-01-01

    The chemical composition and stratigraphy of the Black River Group in southwestern Ohio were studied. Chemical analyses were done on two cores of the Black River from Adams and Brown Counties, Ohio. These studies show that substantial reserves of high-carbonate rock are present in the Black River at depths of less than 800 ft, in proximity to Cincinnati and the Ohio River. Stratigraphic studies show that the Black River Group has eight marker beds in its middle and upper portions and three distinct lithologic units in its lower portion; these marker beds and units are present throughout southwestern Ohio. The Black River Group correlates well with the High Bridge Group of Kentucky. Depositional environments of the Black River are similar to those of the High Bridge and to present-day tidal flats in the Bahamas.-Author

  10. The oldest Mahonia (Berberidaceae) fossil from East Asia and its biogeographic implications.

    PubMed

    Huang, Jian; Su, Tao; Lebereton-Anberrée, Julie; Zhang, Shi-Tao; Zhou, Zhe-Kun

    2016-03-01

    Interpretation of the biogeography of the genus Mahonia (Berberidaceae) is limited by the lack of fossil records in East Asia. Compressed fossil foliage, described here as Mahonia mioasiatica sp. nov., were collected from the Upper Miocene Xiaolongtan Formation in Wenshan, Yunnan, southwest China. These specimens represent the oldest reliable fossil record of Mahonia in East Asia. This new fossil species shows a general similarity to Group Orientales and is most similar to the extant eastern Asian Mahonia conferta. Considering other fossil evidence of Mahonia, we propose a migration route of this genus to Asia over the North Atlantic Land Bridge rather than the Bering Land Bridge. Our results also suggest that North America, Europe and East Asia have been successive centers of diversity for the genus, as a consequence of diversification in Group Orientales potentially related to historical climate change.

  11. Flame Retardant: Cyberbullies Torment Their Victims 24/7: Here's How to Stop the Abuse

    ERIC Educational Resources Information Center

    Willard, Nancy

    2006-01-01

    Cyberbullying is the use of electronic information such as e-mail and other digital age tools to bully or harass individuals. Cyberbullies post angry and vulgar messages in online "flaming" wars or hack into a peer's e-mail account to wreak havoc, assaulting the reputations and already fragile egos of their young victims. The devastating effects…

  12. Fire effects on flaked stone, ground stone, and other stone artifacts [Chapter 4

    Treesearch

    Krista Deal

    2012-01-01

    Lithic artifacts can be divided into two broad classes, flaked stone and ground stone, that overlap depending on the defining criteria. For this discussion, flaked stone is used to describe objects that cut, scrape, pierce, saw, hack, etch, drill, or perforate, and the debris (debitage) created when these items are manufactured. Objects made of flaked stone include...

  13. Efficacy of stem injection treatments on striped maple in central West Virginia

    Treesearch

    Jeffrey D. Kochenderfer; James N. Kochenderfer

    2008-01-01

    Hack-and-squirt injection treatments were applied to individual striped maple (Acer pennsylvanicum L.) stems and to the largest stem in sprout clumps in a 25-year-old clearcut in central West Virginia to evaluate seasonal efficacy of imazapyr as Arsenal (28.7%) and glyphosate as Glypro Plus (41.0%) in water carriers. Complete control of injected...

  14. Trouble on My Mind: Toward a Framework of Humanizing Critical Sociocultural Knowledge for Teaching and Teacher Education

    ERIC Educational Resources Information Center

    Brown, Keffrelyn D.

    2013-01-01

    Drawing from the work of philosophers Sylvia Wynter and Ian Hacking, in this conceptual article I argue why a humanizing critical approach to sociocultural knowledge is needed for teacher education, particularly in preparing teachers to work effectively with black students. In light of enduring concerns in teacher education with improving the…

  15. Science and Theatre Education: A Cross-Disciplinary Approach of Scientific Ideas Addressed to Student Teachers of Early Childhood Education

    ERIC Educational Resources Information Center

    Tselfes, Vasilis; Paroussi, Antigoni

    2009-01-01

    There is, in Greece, an ongoing attempt to breach the boundaries established between the different teaching-learning subjects of compulsory education. In this context, we are interested in exploring to what degree the teaching and learning of ideas from the sciences' "internal life" (Hacking, in: Pickering (ed) "Science as practice…

  16. Historical Reflections on the Ascendancy of ADHD in North America, c. 1980 - c. 2005

    ERIC Educational Resources Information Center

    Neufeld, Paul; Foy, Michael

    2006-01-01

    An ecological niche framework (Hacking, 1998) is utilised to examine the growth of ADHD in North America. The analysis suggests ADHD flourishes, at least in part, due to a complex and historically situated interaction of factors that created a niche within which a particular kind of explanation and treatment for the troubling behaviours of…

  17. The New Taylorism: Hacking at the Philosophy of the University's End

    ERIC Educational Resources Information Center

    Goodman, Robin Truth

    2012-01-01

    This article looks at the critical writings of Mark C. Taylor. It suggests that Mark C. Taylor is rewriting a global imaginary devoid of the kind of citizenship that Henry Giroux claims as the basis for public education. Instead, Taylor wants to see the university take shape as profit-generating. According to Taylor, in lieu of learning to take…

  18. Measuring Cyber Operations Effectiveness

    DTIC Science & Technology

    2014-11-01

    are advanced firewalls capable of taking limited action to block malicious traffic or hacking attempts. Their capabilities vary widely and must be...using many automated tools, included in the defense hardware and software itself. These devices include hardware and software firewalls , Network...DoD networks are probed millions of times per day…the Air Force blocks roughly two billion threats and denies two million emails each week

  19. Radiation Effects in 3D Integrated SOl SRAM Circuits

    DTIC Science & Technology

    2011-08-23

    Because of the front-to- hack capacitive coupling, significant device parametric shifts can be observed unless the BOX has been engineered to...8. - l.E-12 .,..--------------, .. J5 ;::.. 5 63-MeV Protons · Tier1 • ner2 ner3 -c a • ’i 1.E-13 ----·· -----·-- ~ . = . i§ • • g • f L_

  20. Translating Climate Projections for Bridge Engineering

    NASA Astrophysics Data System (ADS)

    Anderson, C.; Takle, E. S.; Krajewski, W.; Mantilla, R.; Quintero, F.

    2015-12-01

    A bridge vulnerability pilot study was conducted by Iowa Department of Transportation (IADOT) as one of nineteen pilots supported by the Federal Highway Administration Climate Change Resilience Pilots. Our pilot study team consisted of the IADOT senior bridge engineer who is the preliminary design section leader as well as climate and hydrological scientists. The pilot project culminated in a visual graphic designed by the bridge engineer (Figure 1), and an evaluation framework for bridge engineering design. The framework has four stages. The first two stages evaluate the spatial and temporal resolution needed in climate projection data in order to be suitable for input to a hydrology model. The framework separates streamflow simulation error into errors from the streamflow model and from the coarseness of input weather data series. In the final two stages, the framework evaluates credibility of climate projection streamflow simulations. Using an empirically downscaled data set, projection streamflow is generated. Error is computed in two time frames: the training period of the empirical downscaling methodology, and an out-of-sample period. If large errors in projection streamflow were observed during the training period, it would indicate low accuracy and, therefore, low credibility. If large errors in streamflow were observed during the out-of-sample period, it would mean the approach may not include some causes of change and, therefore, the climate projections would have limited credibility for setting expectations for changes. We address uncertainty with confidence intervals on quantiles of streamflow discharge. The results show the 95% confidence intervals have significant overlap. Nevertheless, the use of confidence intervals enabled engineering judgement. In our discussions, we noted the consistency in direction of change across basins, though the flood mechanism was different across basins, and the high bound of bridge lifetime period quantiles exceeded that of the historical period. This suggested the change was not isolated, and it systemically altered the risk profile. One suggestion to incorporate engineering judgement was to consider degrees of vulnerability using the median discharge of the historical period and the upper bound discharge for the bridge lifetime period.

  1. New Results of Spectral Observations of CP Stars in the Li I 6708 Å Spectral Region with the 6-m BTA Telescope

    NASA Astrophysics Data System (ADS)

    Polosukhina, N.; Shavrina, A.; Drake, N.; Kudryavtsev, D.; Smirnova, M.

    The lithium problem in Ap-CP stars has for a long time been a subject of debates. Individual characteristics of CP stars, such as a high abundance of rare-earth elements, the presence of magnetic fields, complex structures of the surface distribution of chemical elements, rapid oscillations of some CP stars, make the detection of lithium lines, and determination of lithium abundance a challenging task. The lithium problem in Ap-CP stars was discussed during the meeting in Slovakia in 1996. The results of the Li study, carried out in CrAO (Polosukhina, 1973 - 1976), the works of Faraggiana & Hack (1963), Wallerstein & Hack (1964), Faraggiana et al. (1992 - 1996) formed the basis of the international project, called Lithium in the Cool CP Stars with Magnetic Fields. The main goal of the project was, using systematical observations of Ap-CP stars with phase rotation in the spectral regions of the resonance doublet Li I 6708 Å and subordinate 6104 Å lithium lines with different telescopes, to create a database, which will permit to explain the physical origin of the anomalous Li abundance in the atmospheres of these stars.

  2. Mind Invasion: Situated Affectivity and the Corporate Life Hack.

    PubMed

    Slaby, Jan

    2016-01-01

    In view of the philosophical problems that vex the debate on situated affectivity, it can seem wise to focus on simple cases. Accordingly, theorists often single out scenarios in which an individual employs a device in order to enhance their emotional experience, or to achieve new kinds of experience altogether, such as playing an instrument, going to the movies, or sporting a fancy handbag. I argue that this narrow focus on cases that fit a "user/resource model" tends to channel attention away from more complex and also more problematic instances of situated affectivity. Among these are scenarios in which a social domain draws individuals into certain modes of affective interaction, often by way of attunement and habituation to affective styles and interaction patterns that are normative in the domain in question. This can lead to a phenomenon that is not so much "mind extension" than "mind invasion": affectivity is dynamically framed and modulated from without, often contrary to the prior orientations of the individuals in question. As an example, I discuss affective patterns prevalent in today's corporate workplace. I claim that workplace affect sometimes contributes to what is effectively a "hack" of employees' subjectivity.

  3. Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy

    NASA Astrophysics Data System (ADS)

    Pleban, Johann-Sebastian; Band, Ricardo; Creutzburg, Reiner

    2014-02-01

    In this article we describe the security problems of the Parrot AR.Drone 2.0 quadcopter. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which makes it a target for harmful attacks. In addition, the videostream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we will perform a security threat analysis on this particular drone. We will set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We will show how the drone can be hacked in order to hijack the AR.Drone 2.0. Our aim is to sensitize the end-user of AR.Drones by describing the security vulnerabilities and to show how the AR.Drone 2.0 could be secured from unauthorized access. We will provide instructions to secure the drones Wi-Fi connection and its operation with the official Smartphone App and third party PC software.

  4. Distribution and geochemistry of selected trace elements in the Sacramento River near Keswick Reservoir

    USGS Publications Warehouse

    Antweiler, Ronald C.; Taylor, Howard E.; Alpers, Charles N.

    2012-01-01

    The effect of heavy metals from the Iron Mountain Mines (IMM) Superfund site on the upper Sacramento River is examined using data from water and bed sediment samples collected during 1996-97. Relative to surrounding waters, aluminum, cadmium, cobalt, copper, iron, lead, manganese, thallium, zinc and the rare-earth elements (REE) were all present in high concentrations in effluent from Spring Creek Reservoir (SCR), which enters into the Sacramento River in the Spring Creek Arm of Keswick Reservoir. SCR was constructed in part to regulate the flow of acidic, metal-rich waters draining the IMM Superfund site. Although virtually all of these metals exist in SCR in the dissolved form, upon entering Keswick Reservoir they at least partially converted via precipitation and/or adsorption to the particulate phase. In spite of this, few of the metals settled out; instead the vast majority was transported colloidally down the Sacramento River at least to Bend Bridge, 67. km from Keswick Dam.The geochemical influence of IMM on the upper Sacramento River was variable, chiefly dependent on the flow of Spring Creek. Although the average flow of the Sacramento River at Keswick Dam is 250m 3/s (cubic meters per second), even flows as low as 0.3m 3/s from Spring Creek were sufficient to account for more than 15% of the metals loading at Bend Bridge, and these proportions increased with increasing Spring Creek flow.The dissolved proportion of the total bioavailable load was dependent on the element but steadily decreased for all metals, from near 100% in Spring Creek to values (for some elements) of less than 1% at Bend Bridge; failure to account for the suspended sediment load in assessments of the effect of metals transport in the Sacramento River can result in estimates which are low by as much as a factor of 100. ?? 2012.

  5. Distribution and geochemistry of selected trace elements in the Sacramento River near Keswick Reservoir

    USGS Publications Warehouse

    Antweiler, Ronald C.; Taylor, Howard E.; Alpers, Charles N.

    2012-01-01

    The effect of heavy metals from the Iron Mountain Mines (IMM) Superfund site on the upper Sacramento River is examined using data from water and bed sediment samples collected during 1996-97. Relative to surrounding waters, aluminum, cadmium, cobalt, copper, iron, lead, manganese, thallium, zinc and the rare-earth elements (REE) were all present in high concentrations in effluent from Spring Creek Reservoir (SCR), which enters into the Sacramento River in the Spring Creek Arm of Keswick Reservoir. SCR was constructed in part to regulate the flow of acidic, metal-rich waters draining the IMM Superfund site. Although virtually all of these metals exist in SCR in the dissolved form, upon entering Keswick Reservoir they at least partially converted via precipitation and/or adsorption to the particulate phase. In spite of this, few of the metals settled out; instead the vast majority was transported colloidally down the Sacramento River at least to Bend Bridge, 67 km from Keswick Dam. The geochemical influence of IMM on the upper Sacramento River was variable, chiefly dependent on the flow of Spring Creek. Although the average flow of the Sacramento River at Keswick Dam is 250 m3/s (cubic meters per second), even flows as low as 0.3 m3/s from Spring Creek were sufficient to account for more than 15% of the metals loading at Bend Bridge, and these proportions increased with increasing Spring Creek flow. The dissolved proportion of the total bioavailable load was dependent on the element but steadily decreased for all metals, from near 100% in Spring Creek to values (for some elements) of less than 1% at Bend Bridge; failure to account for the suspended sediment load in assessments of the effect of metals transport in the Sacramento River can result in estimates which are low by as much as a factor of 100.

  6. Experimental design for the evaluation of high-T(sub c) superconductive thermal bridges in a sensor satellite

    NASA Technical Reports Server (NTRS)

    Scott, Elaine P.; Lee, Kasey M.

    1994-01-01

    Infrared sensor satellites, which consist of cryogenic infrared sensor detectors, electrical instrumentation, and data acquisition systems, are used to monitor the conditions of the earth's upper atmosphere in order to evaluate its present and future changes. Currently, the electrical connections (instrumentation), which act as thermal bridges between the cryogenic infrared sensor and the significantly warmer data acquisition unit of the sensor satellite system, constitute a significant portion of the heat load on the cryogen. As a part of extending the mission life of the sensor satellite system, the researchers at the National Aeronautics and Space Administration's Langley Research Center (NASA-LaRC) are evaluating the effectiveness of replacing the currently used manganin wires with high-temperature superconductive (HTS) materials as the electrical connections (thermal bridges). In conjunction with the study being conducted at NASA-LaRC, the proposed research is to design a space experiment to determine the thermal savings on a cryogenic subsystem when manganin leads are replaced by HTS leads printed onto a substrate with a low thermal conductivity, and to determine the thermal conductivities of HTS materials. The experiment is designed to compare manganin wires with two different types of superconductors on substrates by determining the heat loss by the thermal bridges and providing temperature measurements for the estimation of thermal conductivity. A conductive mathematical model has been developed and used as a key tool in the design process and subsequent analysis.

  7. Space Radar Image of San Francisco, California

    NASA Image and Video Library

    1999-04-15

    This image of San Francisco, California shows how the radar distinguishes between densely populated urban areas and nearby areas that are relatively unsettled. Downtown San Francisco is at the center and the city of Oakland is at the right across the San Francisco Bay. Some city areas, such as the South of Market, called the SOMA district in San Francisco, appear bright red due to the alignment of streets and buildings to the incoming radar beam. Various bridges in the area are also visible including the Golden Gate Bridge (left center) at the opening of San Francisco Bay, the Bay Bridge (right center) connecting San Francisco and Oakland, and the San Mateo Bridge (bottom center). All the dark areas on the image are relatively smooth water: the Pacific Ocean to the left, San Francisco Bay in the center, and various reservoirs. Two major faults bounding the San Francisco-Oakland urban areas are visible on this image. The San Andreas fault, on the San Francisco peninsula, is seen in the lower left of the image. The fault trace is the straight feature filled with linear reservoirs which appear dark. The Hayward fault is the straight feature on the right side of the image between the urban areas and the hillier terrain to the east. The image is about 42 kilometers by 58 kilometers (26 miles by 36 miles) with north toward the upper right. This area is centered at 37.83 degrees north latitude, 122.38 degrees east longitude. http://photojournal.jpl.nasa.gov/catalog/PIA01791

  8. Evidence for Milankovitch periodicities in Cenomanian-Turonian lithologic and geochemical cycles, western interior U.S.A.

    USGS Publications Warehouse

    Sageman, B.B.; Rich, J.; Arthur, M.A.; Birchfield, G.E.; Dean, W.E.

    1997-01-01

    The limestone/marlstone bedding couplets of the Bridge Creek Limestone Member, Cenomanian-Turonian Greenhorn Formation, were analyzed by applying spectral techniques to high-resolution lithologic and geochemical data from a core. The results suggest that the Bridge Creek contains a complex record of orbital cyclicity. The dominant signal appears to be obliquity, but signals corresponding to precession and eccentricity were also observed. The development of the bedding couplets is interpreted to have resulted from a combination of factors, including insolation-controlled changes in higher-latitude precipitation leading to dilution/redox cycles, and in lower-latitude evaporation, leading to changes in surface water conditions and productivity cycles in the calcareous plankton. The data interpreted to reflect redox cycles appear to be more strongly influenced by obliquity, and show a weak precessional signal. In contrast, trends in the carbonate record show the opposite response. The complex bedding pattern observed in the Bridge Creek Limestone is interpreted to result from the competing influences of different orbital cycles expressed through different pathways of the depositional system, and was also affected by changes in sedimentation rates related to relative sea level fluctuations, aperiodic dilution by volcanic ash, and changes in organic-matter production and redox conditions related to a global "oceanic anoxic event". These factors complicate cycle analysis in the lower part of the member but leave a relatively undisturbed record in the upper Bridge Creek Limestone. Copyright ?? 1997, SEPM (Society for Sedimentary Geology).

  9. Membrane-Soil Composite Layers in the Design, Construction, and Performance of an Expedient Bridge and Approach.

    DTIC Science & Technology

    1982-09-01

    Engineering News-Record 1977). The concept is that of a composite soil-membrane system with tensile and flexural strengths greater than soil alone can...uniformity 2 Mean diameter 0.5 mm Sandbags 31. Sandbags used in this project were 14 x 26 in. in size and were made of jute or kenaf burlap...support 4. Converted airfield index penetrometer readings for the upper 6 in. of foundation soil indicated similar relative strengths at the base of

  10. [Plastic bonding material as the origin of mucosal disorders].

    PubMed

    Kühl, W

    1979-10-01

    A case reported in which the patient complained of sensations in the musoca over a period of one year. Various other specialists were consulted, but the cause of these sensations could not be established. When the plastic facing on the upper anterior crowns was removed, the sensations disappeared. A metal-ceramic bridge was inserted, and the patient was fitted with a removable dental prosthesis containing teeth made of mineral substance and a base of injection moulding (Copodon). The patient is still free of complaints.

  11. Are anthropometric, flexibility, muscular strength, and endurance variables related to clubhead velocity in low- and high-handicap golfers?

    PubMed

    Keogh, Justin W L; Marnewick, Michel C; Maulder, Peter S; Nortje, Jacques P; Hume, Patria A; Bradshaw, Elizabeth J

    2009-09-01

    The present study assessed the anthropometric profile (International Society for the Advancement of Kinanthropometry protocol), flexibility, muscular strength, and endurance of 20 male golfers. These data were collected in order to determine: a) the relationship between these kinanthropometric measures and clubhead velocity; and b) if these measures could distinguish low-handicap (LHG) and high-handicap (HHG) golfers. Ten LHG (handicap of 0.3 +/- 0.5) and 10 HHG (handicap of 20.3 +/- 2.4) performed 10 swings for maximum velocity and accuracy with their own 5-iron golf club at a wall-mounted target. LHG hit the target significantly more (115%) and had a 12% faster clubhead velocity than HHG (p < 0.01). The LHG also had significantly (28%) greater golf swing-specific cable woodchop (GSCWC) strength (p < 0.01) and tendencies for greater (30%) bench press strength and longer (5%) upper am and total arm (4%) length and less (24%) right hip internal rotation than HHG (0.01 < p < 0.05). GSCWC strength was significantly correlated to clubhead velocity (p < 0.01), with bench press and hack squat strength as well as upper arm and total arm length also approaching significance (0.01 < p < 0.05). Golfers with high GSCWC strength and perhaps greater bench press strength and longer arms may therefore be at a competitive advantage, as these characteristics allow the production of greater clubhead velocity and resulting ball displacement. Such results have implications for golf talent identification programs and for the prescription and monitoring of golf conditioning programs. While golf conditioning programs may have many aims, specific trunk rotation exercises need to be included if increased clubhead velocity is the goal. Muscular hypertrophy development may not need to be emphasized as it could reduce golf performance by limiting range of motion and/or increasing moment of inertia.

  12. Stress Analysis for the Critical Metal Structure of Bridge Crane

    NASA Astrophysics Data System (ADS)

    Ling, Zhangwei; Wang, Min; Xia, Junfang; Wang, Songhua; Guo, Xiaolian

    2018-01-01

    Based on the type of connection between the main girder and end beam of electrical single beam crane, the finite element analysis model of a full portal crane was established. The stress distribution of the critical structure under different loading conditions was analyzed. The results shown that the maximum Mises stress and deflection of the main girder were within the allowable range. And the connecting location between end beam web and main girder had higher stress than other region, especially at the lower edge and upper edge of the end beam web and the area near the bolt hole of upper wing panel. Therefore it is important to inspect the connection status, the stress condition and the crack situation nearing connection location during the regular inspection process to ensure the safety of the connection between the main girder and end beam.

  13. Materials based on carbon-filled porous layers of PVC cyclam derivatives cross-linked with the surfaces of asbestos fabric fibers

    NASA Astrophysics Data System (ADS)

    Tzivadze, A. Yu.; Fridman, A. Ya.; Morozova, E. M.; Sokolova, N. P.; Voloshchuk, A. M.; Petukhova, G. A.; Bardishev, I. I.; Gorbunov, A. M.; Novikov, A. K.; Polyakova, I. Ya.; Titova, V. N.; Yavich, A. A.; Petrova, N. V.

    2016-08-01

    The synthesis of bilayer materials with porous upper layers composed of PVC hydroxyethylcyclam derivatives filled with carbon and a layer consisting of hydroxyethylcyclam, cross-linked via Si-O-C groups with the silica chains of a developed surface of asbestos fabric, is described. The aza-crown groups in these materials are bound with aqua complexes of H2SO4 or NaOH. The structure of the materials is examined, their adsorption characteristics are determined, and the rate of motion of H+ or OH- ions in electrochemical bridges is measured, while the formation of H2 and O2 in their cathodic and anodic polarization is determined as a function of voltage. It is shown that the upper layer of these materials is adsorption-active and electronand H+- or OH-- conductive, while the bottom layer is only H+- or OH-- conductive; through it, the upper layer is supplied with the H+ or OH- ions needed for the regeneration of the aqua complexes broken down to H2 and O2 on carbon particles.

  14. Morphology and Sediment Dynamics of the East Friesian Tidal Inlets, West Germany.

    DTIC Science & Technology

    1982-01-01

    by three major environmental factors: (1) the tide range, (2) the nearshore wave energy, and (3) the geometry of the hack -barrier hav. Both...ASg .147 Ebb a A~ ps4 . 0.1 Fig. 15(a) and (b). For legend see opposite. 18 t7 7d 7’AI 3LI EBBTIALDELA ARI- HNE Juy1 .17 EBBW TIDAL DELTA MARINCHNL j

  15. Lawful Hacking: Toward a Middle-Ground Solution to the Going Dark Problem

    DTIC Science & Technology

    2017-03-01

    14 2. 9/11 Terrorist Attacks..................................................................17 3. The Rise of Encryption Post -Snowden’s...taking pictures, posting pictures, shopping, conducting business, and searching the web. To investigate these 100,000 [the number of criminal cases his...non-U.S. person who does not have strong ties to the United States, FISA is the de facto Fourth Amendment limitation on government’s domestic

  16. Making an Adjustable C-Clamp. Kit No. 603. Instructor's Manual [and] Student Learning Activity Manual. [Revised.] T & I--Metalwork.

    ERIC Educational Resources Information Center

    White, Jim; Alexander, Larry

    This student activity kit consists of a programmed, self-instructional learning guide and an accompanying instructor's manual for use in teaching trade and industrial education students how to make an adjustable C-clamp. The student guide contains step-by-step instructions in the following areas: basic layout principles; use of a hack saw, file,…

  17. A comparison of two stem injection treatments applied to American beech in central West Virginia

    Treesearch

    Jeffrey D. Kochenderfer; Gary W. Miller; James N. Kochenderfer

    2012-01-01

    Efficacies for two herbicide stem injection treatments on American beech (Fagus grandifolia Ehrh.) and impacts to nontarget residual trees were evaluated in central West Virginia. The treatments consisted of hack-and-squirt injection of all beech stems ≥1.0 in. to 9.9 in. diameter at breast height (d.b.h.) with either imazapyr as Arsenal...

  18. Can Welfare Mothers Hack It in College? A Comparison of Achievement between TANF Recipients and General Population Community College Students

    ERIC Educational Resources Information Center

    Fenster, Judy

    2004-01-01

    The achievement of a group of undergraduate students enrolled in a pilot program for welfare recipients in the form of TANF (Temporary Aid to Needy Families) was compared with the achievement of general population students at an urban community college. Grades attained in a basic level, introductory Psychology course were used to measure academic…

  19. Herbicide hardwood crop tree release in central West Virginia

    Treesearch

    Jeffrey D. Kochenderfer; Shepard M. Zedaker; James E. Johnson; David W. Smith; Gary W. Miller

    2001-01-01

    Chemical crop tree release treatments were applied to young hardwood stands at three sites in central West Virginia to evaluate the effectiveness of glyphosate as Accord (41.5% SL), imazapyr as Arsenal AC (53.1% SL) and Chopper (27.6% EC), and triclopyr as Garlon 3A (44.4% triethylamine salt SL), and Garlon 4 (61.6% butoxyethyl ester EC) using hack-and-squirt injection...

  20. Language and Theory of Mind in Autism Spectrum Disorder: The Relationship between Complement Syntax and False Belief Task Performance

    ERIC Educational Resources Information Center

    Lind, Sophie E.; Bowler, Dermot M.

    2009-01-01

    This study aimed to test the hypothesis that children with autism spectrum disorder (ASD) use their knowledge of complement syntax as a means of "hacking out" solutions to false belief tasks, despite lacking a representational theory of mind (ToM). Participants completed a "memory for complements" task, a measure of receptive vocabulary, and…

  1. Hacking the Silos: Eliminating Information Barriers Between Public Health and Law Enforcement

    DTIC Science & Technology

    2018-03-01

    ELIMINATING INFORMATION BARRIERS BETWEEN PUBLIC HEALTH AND LAW ENFORCEMENT by Cody L. Minks March 2018 Thesis Advisor: Anke Richter...burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching...existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information . Send comments regarding this

  2. Organizing the Army for Information Warfare

    DTIC Science & Technology

    2013-03-01

    US’s reputation in the global community, but by pilfering intellectual property, foiling industrial controls, and ‘ hacking ’ into secured networks...human factors can be exploited to discern passwords and circumvent other physical safeguards that secure cyber infrastructure.48 The increasing...Ranking of America’s Largest Corporations.” 7 David F. Carr, Information Week, January 25, 2012, “ Facebook : The Database Of Wealth And Power,” http

  3. From "Hack to Hallé"--Making a Robot Orchestra for the Hallé Orchestra

    ERIC Educational Resources Information Center

    Moseley, Ainsley; White, Stephanie; Knowles, Mike

    2017-01-01

    As part of the celebration of Manchester being the European City of Science 2016, schools across the City were invited to take part in a Citizen-Engineering project, which set out a quest to make a recycled robot orchestra. It is a unique project, which is an experiment itself--to bring people together to create, collaborate and care for the…

  4. Integrated mobile robot control

    NASA Astrophysics Data System (ADS)

    Amidi, Omead; Thorpe, Chuck E.

    1991-03-01

    This paper describes the strucwre implementation and operation of a real-time mobile robot controller which integrates capabilities such as: position estimation path specification and hacking human interfaces fast communication and multiple client support The benefits of such high-level capabilities in a low-level controller was shown by its implementation for the Naviab autonomous vehicle. In addition performance results from positioning and tracking systems are reported and analyzed.

  5. DoD Involvement with The Rendon Group

    DTIC Science & Technology

    2007-03-06

    34ilC:r.dix E for ;he ~"port cist:-ibL;.~;or.. Th:• team mcnbC’"’- ~r.: listed insHic ":le hack C()\\’CV. _ 5~y~ Shelton R. Young Deput\\" lnspcc:u...Net Assessment; the Defense Intelligence Agency; the Joint Staff, J39; the U.S. Central Command (J2, 13, J5 , and Public Affairs); Multi-National Force

  6. Students at the University of Abertay Dundee Learn Computer Hacking to Defend Networks

    ERIC Educational Resources Information Center

    Vance, Erik

    2007-01-01

    In this article, the author describes a new cybersecurity course at the University of Abertay Dundee in Scotland. Geoffrey R. Lund, leader of the software-applications program at Abertay, says the course prepares students for a rapidly growing job market by teaching that the best defense is a good offense. Professors set up a network of 20 or so…

  7. Eclipsing and density effects on the spectral behavior of Beta Lyrae binary system in the UV

    NASA Astrophysics Data System (ADS)

    Sanad, M. R.

    2010-01-01

    We analyze both long and short high resolution ultraviolet spectrum of Beta Lyrae eclipsing binary system observed with the International Ultraviolet Explorer (IUE) between 1980 and 1989. The main spectral features are P Cygni profiles originating from different environments of Beta Lyrae. A set of 23 Mg II k&h spectral lines at 2800 Å, originating from the extended envelope [Hack, M., 1980. IAUS, 88, 271H], have been identified and measured to determine their fluxes and widths. We found that there is spectral variability for these physical parameters with phase, similar to that found for the light curve [Kondo, Y., McCluskey, G.E., Jeffery, M.M.S., Ronald, S.P., Carolina, P.S. McCluskey, Joel, A.E., 1994. ApJ, 421, 787], which we attribute to the eclipse effects [Ak, H., Chadima, P., Harmanec, P., Demircan, O., Yang, S., Koubský, P., Škoda, P., Šlechta, M., Wolf, M., Božić, H., 2007. A&A, 463, 233], in addition to the changes of density and temperature of the region from which these lines are coming, as a result of the variability of mass loss from the primary star to the secondary [Hoffman, J.L., Nordsieck, K.H., Fox, G.K., 1998. AJ, 115, 1576; Linnell, A.P., Hubeny, I., Harmanec, P., 1998. ApJ, 509, 379]. Also we present a study of Fe II spectral line at 2600 Å, originating from the atmosphere of the primary star [Hack, M., 1980. IAUS, 88, 271H]. We found spectral variability of line fluxes and line widths with phase similar to that found for Mg II k&h lines. Finally we present a study of Si IV spectral line at 1394 Å, originating from the extended envelope [Hack, M., 1980. IAUS, 88, 271H]. A set of 52 Si IV spectral line at 1394 Å have been identified and measured to determine their fluxes and widths. Also we found spectral variability of these physical parameters with phase similar to that found for Mg II k&h and Fe II spectral lines.

  8. Earth Observations taken by the Expedition 10 crew

    NASA Image and Video Library

    2004-10-25

    ISS010-E-05070 (25 October 2004) --- Corrientes, Argentina, and the Parana River are featured in this image photographed by an Expedition 10 crewmember on the International Space Station (ISS). Corrientes, Argentina sits on the east bank of the Parana River, South America’s third largest river (after the Negro and Amazon Rivers). From its headwaters in southeastern Brazil, the river flows southwestward around southern Paraguay, and then into Argentina. Corrientes is located just inside Argentina, across the river from the southwestern tip of Paraguay. The bridge over the Parana, built in the 1970s, connects Corrientes to its sister city, Resistencia, (beyond the left edge of image) on the western bank of the river. Sun glint on the river gives it a silvery glow and emphasizes channel islands in the river, side channels, and meander scars on the floodplain opposite the city, and even reveals the pattern of disturbed flow downstream of the bridge pylons. The old part of the city appears as a zone of smaller, more densely clustered city blocks along the river to the north of a major highway, which runs through Corrientes from the General Belgrano Bridge to the northeast (upper right of image). Larger blocks of the younger cityscape, with more green space, surround these core neighborhoods.

  9. The Bridge of Mandolin County

    NASA Astrophysics Data System (ADS)

    Lantz, Juliette M.; Feindt, Jenny E.; Lewellyn, Eric P. B.; Walczak, Mary M.

    1999-12-01

    The Bridge of Mandolin County is a case designed to teach the general chemistry principles of molar mass, ions and aqueous reactions, solubility rules, and inorganic nomenclature. Through the instructor-facilitated class discussion, students consider the options before the Mandolin Town Council regarding deicing the newly constructed bridge connecting Mandolin with a large nearby city. The students must decipher contradictory claims made on behalf of sodium chloride, the traditional deicer, and calcium magnesium acetate, a new environmentally friendly deicer, to arrive at the most cost-effective and environmentally appropriate deicing product. As they work through the analysis they raise questions that can be addressed in a laboratory setting. Four optional role-playing experiments are included, which can be used by the students to gather information helpful to resolution of the case. The case is intended to be used over two class periods, with a laboratory period in between, though suggestions for other models are provided. Laboratory procedures include an EDTA titration for Ca2+ and Mg2+, a gravimetric analysis, a qualitative examination of ions and solubility, an introduction to freezing point depression and measurement, and an experimental design activity. This case can also successfully be used without alteration in non-majors chemistry or environmental chemistry courses, or upper-level analytical or environmental chemistry courses.

  10. Incidence of bark- and wood-boring insects in firewood: a survey at Michigan's Mackinac Bridge.

    PubMed

    Haack, Robert A; Petrice, Toby R; Wiedenhoeft, Alex C

    2010-10-01

    Firewood is a major pathway for the inadvertent movement of bark- and wood-infesting insects. After discovery of Agrilus planipennis Fairmaire (Coleoptera: Buprestidae) in southeastern Michigan in 2002, quarantines were enacted including prohibition of transporting firewood across the Mackinac Bridge between Michigan's Lower and Upper peninsulas. Drivers are required to surrender firewood before crossing the bridge. We surveyed recently surrendered firewood in April, July, and September 2008 and categorized it by genus, cross-sectional shape (whole, half, or quarter), approximate age (years since it was a live tree), presence of bark, and evidence of bark- and wood-boring insects. The 1045 pieces of firewood examined represented 21 tree genera: primarily Acer (30%), Quercus (18%), Fraxinus (15%), Ulmus (12%), Betula (5%), and Prunus (5%). Live borers (Bostrichoidea, Brentidae, Buprestidae, Cerambycidae, Cossidae, Curculionidae [Scolytinae and non-Scolytinae], and Siricidae) were found in 23% of the pieces and another 41% had evidence of previous borer infestation. Of the 152 Fraxinus firewood pieces, 13% had evidence of past A. planipennis infestation, but we found no live A. planipennis. We discuss national "don't move firewood" campaigns and U.S. imports of fuelwood. During 1996-2009, the United States imported fuelwood valued at > dollars U.S. 98 million from 34 countries.

  11. Measuring What Matters

    DTIC Science & Technology

    2014-11-18

    multiple platforms were forced to be reset and Forbes.com and its WordPress platform were taken offline several times over 2 days. Forbes has focused...does not enter h1s credentials on the subsequent login page Returning to his blog, WordPress prompts him to log in again. Almost immediately...again compromise the WordPress super-administrator account and deface six Forbes blog pages with the phrase "Hacked By The Syrian Electronic Army

  12. Secure quantum key distribution

    NASA Astrophysics Data System (ADS)

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  13. David Miller | NREL

    Science.gov Websites

    Publications D.C. Miller, E. Annigoni, A. Ballion, J.G. Bokria, L.S. Bruckman, D.M. Burns, X. Chen, L. Elliott , J. Feng, R.H. French, S. Fowler, C.C. Honeker, M.D. Kempe, H. Khonkar, M. Köhl, L.-E. Perret-Aebi , L. Elliott, L. Feng, R.H. French, S. Fowler, X. Gu, P.L. Hacke, C.C. Honeker, M.D. Kempe, H. Khonkar

  14. Air & Space Power Journal. Volume 27, Number 4, July-August 2013

    DTIC Science & Technology

    2013-08-01

    with old-fashioned radio communications . Meanwhile, our cyber warrior has successfully isolated the hack and goes on the counteroffensive with an...impostors is best solved with technological solutions. • Radio frequency identication • Biometrics • Embedded security markers Figure 4. Defectors...Museum, 26 July 1948, http://www.trumanlibrary.org/9981a.htm. 21. Jones, “ Community Defense in Afghanistan,” 11 . July–August 2013 Air & Space Power

  15. Consortia for Improving Medicine with Innovation and Technology

    DTIC Science & Technology

    2016-12-01

    2011 Out - 001585 11-484 Award Closed Hacking, Adam Non-invasive Fasciotomy to Treat Extremity Compartment Syndrome 2012 Out - 001706 12-1173 Award...592 Award Closed 7 Kaushal, Shalesh Low Energy Laser as a Therapeutic for Dry Age-related Macular Degeneration 2011 Out - 001607 11-397 Award Closed...Electrostatic dry powder inhaler for constant dose respiratory drug delivery 2010 Out - 000885 10-512 Award Closed McLaughlin, Bryan An implantable

  16. Plasma Cytokines Following Thermal Injury and Their Relationship with Patient Mortality, Burn Size, and Time Postburn,

    DTIC Science & Technology

    1993-09-01

    AND TIME POSTBURN Adriana C. Drost, MS, David G. Burleson, PhD, William G. Cioffi, Jr., MD, Bryan S. Jordan, RN, MS, Arthur D. Mason, Jr., MD, and...trauma. J 2, IL-6). Science 239-502,1i988 Surg Res 48:622, 1990 7. Garmnan RD, Jacobs KA , Clark SC, et al: B-cell-stimulatory factor 23. Hack CE, De Groot

  17. Genesis: A Framework for Achieving Software Component Diversity

    DTIC Science & Technology

    2007-01-01

    correctly—the initial filters develop to fix the Hotmail vulnerability could be circumvented by using alternate character encodings4. Hence, we focus on...Remotely Exploitable Cross-Site Scripting in Hotmail and Yahoo, (March 2004); http://www.greymagic.com/security/advisories/gm005-mc/. 4...EyeonSecurity, Microsoft Passport Account Hijack Attack: Hacking Hotmail and More, Hacker’s Digest. 5. Y.-W. Huang et al., Web Application Security Assessment by

  18. Surviving Hacker Attacks Proves That Every Cloud Has a Silver Lining

    ERIC Educational Resources Information Center

    Cheng, Kirby

    2005-01-01

    When I first realized I'd been hacked, I thought, 'Oh, my God, they really did it!" While trying to recover from the shock, I had to call the supervisors of the departments with services affected by the loss of the library's server. In a seemingly calm voice, I told them one by one, "Sorry to let you know, our server is down; it has been hacked…

  19. Re-engineering the Pancreas Tumor Microenvironment: A “Regenerative Program” Hacked

    PubMed Central

    Evan, Gerard I.; Hah, Nasun; Littlewood, Trevor D.; Sodir, Nicole M.; Vidal, Tania Campos; Downes, Michael; Evans, Ronald M.

    2017-01-01

    The “hallmarks” of pancreatic ductal adenocarcinoma (PDAC) include proliferative, invasive and metastatic tumor cells and an associated dense desmoplasia comprised of fibroblasts, pancreatic stellate cells, extracellular matrix and immune cells. The oncogenically-activated pancreatic epithelium and its associated stroma are obligatorily interdependent, with the resulting inflammatory and immune-suppressive microenvironment contributing greatly to the evolution and maintenance of PDAC. The peculiar pancreas-specific tumor phenotype is a consequence of oncogenes hacking the resident pancreas regenerative program, a tissue specific repair mechanism regulated by discrete super enhancer networks. Defined as genomic regions containing clusters of multiple enhancers, super enhancers play pivotal roles in cell/tissue specification, identity and maintenance. Hence, interfering with such super enhancer driven repair networks should exert a disproportionately disruptive effect on tumor versus normal pancreatic tissue. Novel drugs that directly or indirectly inhibit processes regulating epigenetic status and integrity, including those driven by histone deacetylases, histone methyltransferase and hydroxylases, DNA methyltransferases, various metabolic enzymes, and bromodomain and extra-terminal motif proteins (BETs) have shown the feasibility of disrupting super enhancer-dependent transcription in treating multiple tumor types, including PDAC. The idea that pancreatic adenocarcinomas rely on embedded super enhancer transcriptional mechanism suggests a vulnerability that can be potentially targeted as novel therapies for this intractable disease. PMID:28373363

  20. Integrating student feedback during "Dental Curriculum Hack-A-thon".

    PubMed

    Saffari, Shawheen S; Frederick Lambert, R; Dang, Lucy; Pagni, Sarah; Dragan, Irina F

    2018-05-02

    The future of dental education is at crossroads. This study used the parameter of the 2016 Dental Curriculum Hack-a-Thon to assess intra- and inter-institutional agreement between student and faculty views regarding dental curriculums to determine if there is an impact in student perceptions towards dental education from before and after the event. This exploratory, cross-sectional study involved two surveys, with Survey 1 being distributed among four faculty-student pairs of the four participating dental schools answering 14 questions. Survey 2 assessed the views of 20 participating dental students through 26 questions in a pre- and post- event survey design. Descriptive statistics were used to explore differences in perceptions towards dental education across both instrument surveys. The results revealed valuable student insights regarding intra- and inter-institutional agreement relevant for the change in dental curriculum that needs to occur. Survey 2 revealed that mandatory attendance in didactic courses, electronic based examination preferences, and the preference of preclinical courses being held in the first and second years of a four-year dental curriculum were of particular importance to student participants. The results of this study indicate that exposure and participation in subjects pertaining to dental education can be influential on student preferences and opinions on how dental education should be delivered in a four-year curriculum.

  1. Quantum key distribution: vulnerable if imperfectly implemented

    NASA Astrophysics Data System (ADS)

    Leuchs, G.

    2013-10-01

    We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs. Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.

  2. Using hacked point and shoot cameras for time-lapse snow cover monitoring in an Alpine valley

    NASA Astrophysics Data System (ADS)

    Weijs, S. V.; Diebold, M.; Mutzner, R.; Golay, J. R.; Parlange, M. B.

    2012-04-01

    In Alpine environments, monitoring snow cover is essential get insight in the hydrological processes and water balance. Although measurement techniques based on LIDAR are available, their cost is often a restricting factor. In this research, an experiment was done using a distributed array of cheap consumer cameras to get insight in the spatio-temporal evolution of snowpack. Two experiments are planned. The first involves the measurement of eolic snow transport around a hill, to validate a snow saltation model. The second monitors the snowmelt during the melting season, which can then be combined with data from a wireless network of meteorological stations and discharge measurements at the outlet of the catchment. The poster describes the hardware and software setup, based on an external timer circuit and CHDK, the Canon Hack Development Kit. This latter is a flexible and developing software package, released under a GPL license. It was developed by hackers that reverse engineered the firmware of the camera and added extra functionality such as raw image output, more full control of the camera, external trigger and motion detection, and scripting. These features make it a great tool for geosciences. Possible other applications involve aerial stereo photography, monitoring vegetation response. We are interested in sharing experiences and brainstorming about new applications. Bring your camera!

  3. MSC

    NASA Image and Video Library

    1963-01-01

    S63-00950 (1963) --- An aerial view of Site 1, the Manned Spacecraft Center, in 1963 during early construction. The view faces the southwest. Highway 528 is at the top of the picture. Second Street runs basically north and south on the right side of the image, to the right or west and running parallel to that avenue is a drainage ditch. Winding through the site a Houston Lighting and Power Co. canal crosses over the drainage ditch near the top of the frame. Twin bridges over the canal are pictured at upper left which were constructed to allow traffic to enter and leave through MSC's secondary gateway. The unfinished red structure to the right of center and roughly 100 yards south of the elevated water storage tank is the Central Heating and Cooling Plant. In the upper left quadrant of the frame, construction appears very far along on the Central Data Office.

  4. Organic chemistry in Titan's upper atmosphere and its astrobiological consequences: I. Views towards Cassini plasma spectrometer (CAPS) and ion neutral mass spectrometer (INMS) experiments in space

    NASA Astrophysics Data System (ADS)

    Ali, A.; Sittler, E. C.; Chornay, D.; Rowe, B. R.; Puzzarini, C.

    2015-05-01

    The discovery of carbocations and carbanions by Ion Neutral Mass Spectrometer (INMS) and the Cassini Plasma Spectrometer (CAPS) instruments onboard the Cassini spacecraft in Titan's upper atmosphere is truly amazing for astrochemists and astrobiologists. In this paper we identify the reaction mechanisms for the growth of the complex macromolecules observed by the CAPS Ion Beam Spectrometer (IBS) and Electron Spectrometer (ELS). This identification is based on a recently published paper (Ali et al., 2013. Planet. Space Sci. 87, 96) which emphasizes the role of Olah's nonclassical carbonium ion chemistry in the synthesis of the organic molecules observed in Titan's thermosphere and ionosphere by INMS. The main conclusion of that work was the demonstration of the presence of the cyclopropenyl cation - the simplest Huckel's aromatic molecule - and its cyclic methyl derivatives in Titan's atmosphere at high altitudes. In this study, we present the transition from simple aromatic molecules to the complex ortho-bridged bi- and tri-cyclic hydrocarbons, e.g., CH2+ mono-substituted naphthalene and phenanthrene, as well as the ortho- and peri-bridged tri-cyclic aromatic ring, e.g., perinaphthenyl cation. These rings could further grow into tetra-cyclic and the higher order ring polymers in Titan's upper atmosphere. Contrary to the pre-Cassini observations, the nitrogen chemistry of Titan's upper atmosphere is found to be extremely rich. A variety of N-containing hydrocarbons including the N-heterocycles where a CH group in the polycyclic rings mentioned above is replaced by an N atom, e.g., CH2+ substituted derivative of quinoline (benzopyridine), are found to be dominant in Titan's upper atmosphere. The mechanisms for the formation of complex molecular anions are discussed as well. It is proposed that many closed-shell complex carbocations after their formation first, in Titan's upper atmosphere, undergo the kinetics of electron recombination to form open-shell neutral radicals. These radical species subsequently might form carbanions via radiative electron attachment at low temperatures with thermal electrons. The classic example is the perinaphthenyl anion in Titan's upper atmosphere. Therefore, future astronomical observations of selected carbocations and corresponding carbanions are required to settle the key issue of molecular anion chemistry on Titan. Other than earth, Titan is the only planetary body in our solar system that is known to have reservoirs of permanent liquids on its surface. The synthesis of complex biomolecules either by organic catalysis of precipitated solutes “on hydrocarbon solvent” on Titan or through the solvation process indeed started in its upper atmosphere. The most notable examples in Titan's prebiotic atmospheric chemistry are conjugated and aromatic polycyclic molecules, N-heterocycles including the presence of imino >Cdbnd N-H functional group in the carbonium chemistry. Our major conclusion in this paper is that the synthesis of organic compounds in Titan's upper atmosphere is a direct consequence of the chemistry of carbocations involving the ion-molecule reactions. The observations of complexity in the organic chemistry on Titan from the Cassini-Huygens mission clearly indicate that Titan is so far the only planetary object in our solar system that will most likely provide an answer to the question of the synthesis of complex biomolecules on the primitive earth and the origin of life.

  5. 14. Detail, end post/top chord connection point, west end of ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    14. Detail, end post/top chord connection point, west end of upstream truss, view to east, 210mm lens. The inclined end post is visible at right, with the top chord at left; the vertical member is a hanger. The latticed portal strut is partially visible at upper right, while paired diagonals approach the connection point from lower left, and a latticed top lateral member is visible above the top chord. - Southern Pacific Railroad Shasta Route, Bridge No. 310.58, Milepost 310.58, Sims, Shasta County, CA

  6. Alaskan Permafrost Analogs of Martian Small Valley Networks, Thermokarst, Terrain Softening, Terraces, and Volcanic Craters

    NASA Technical Reports Server (NTRS)

    Kargel, Jeffrey S.; Wessels, Rick; Beget, James E.; Eddy, Thomas; Lloyd, Sandra; Macaulay, Don; Proch, Mark; Skinner, Jim; Tanaka, Kenneth L.

    2004-01-01

    A geomorphic landscape analog in the Bering Land Bridge National Preserve (Alaska) offers a model for Mars where (1) fluvial and alluvial deposition, volcanism, and other processes first produced a layered ice-rich upper crust, and then (2) severe permafrost conditions (mild by today's Martian standards) and heterogeneous heat flow and volcanism have modified this terrain to produce a geomorphic areal mosaic that is alternately dominated by (a) geothermal meltwater and sublimation (bottom-up heat flow) and (b) surface-driven meltwater and sublimation (top-down heat flow).

  7. Circumferential skin folds in a child: a case of Michelin tire baby syndrome.

    PubMed

    Palit, Aparna; Inamadar, Arun C

    2007-01-01

    A six-month-old girl who presented with dermatitis was found to have multiple, symmetric, deep, gyrate skin folds involving her trunk and similar circumferential lesions on her extremities since birth. She had a characteristic round face with hypertelorism, depressed nasal bridge, thin, down-turned vermillion border of upper lip and short neck. Skin biopsy demonstrated increased smooth muscle fibers in the deeper dermis. A diagnosis of Michelin tire baby syndrome was made. Clinical features, histopathology, differential diagnosis and prognosis of this rare disorder have been discussed.

  8. Single-Event Effect Performance of a Conductive-Bridge Memory EEPROM

    NASA Technical Reports Server (NTRS)

    Chen, Dakai; Wilcox, Edward; Berg, Melanie; Kim, Hak; Phan, Anthony; Figueiredo, Marco; Seidleck, Christina; LaBel, Kenneth

    2015-01-01

    We investigated the heavy ion SEE characteristics of an EEPROM based on CBRAM technology. SEFI is the dominant type of SEE for each operating mode (standby, read-only, write/read). We also observed single bit upsets in the CBRAM cell, during write/read tests. the SEULET threshold is between 10 and 20 MeV * sq cm/mg, with an upper fluence limit of 3 × 10(exp 6) cm(exp -2) at 10 MeV * sq cm/mg. In the stand by mode, the CBRAM array appears immune to bit upsets.

  9. Travel times, streamflow velocities, and dispersion rates in the Missouri River upstream from Canyon Ferry Lake, Montana

    USGS Publications Warehouse

    Whiteman, Aroscott

    2012-01-01

    In 2010, the U.S. Geological Survey, in cooperation with the Montana Department of Environmental Quality, initiated a dye-tracer study to determine travel times, streamflow velocities, and longitudinal dispersion rates for the Missouri River upstream from Canyon Ferry Lake. For this study, rhodamine WT (RWT) dye was injected at two locations, Missouri River Headwaters State Park in early September and Broadwater-Missouri Dam (Broadwater Dam) in late August 2010. Dye concentrations were measured at three sites downstream from each dye-injection location. The study area was a 41.2-mile reach of the Missouri River from Trident, Montana, at the confluence of the Jefferson, Madison, and Gallatin Rivers (Missouri River Headwaters) at river mile 2,319.40 downstream to the U.S. Route 12 Bridge (Townsend Bridge), river mile 2,278.23, near Townsend, Montana. Streamflows were reasonably steady and ranged from 3,070 to 3,700 cubic feet per second. Mean velocities were calculated for each subreach between measurement sites for the leading edge, peak concentration, centroid, and trailing edge at 10 percent of the peak concentration of the dye plume. Calculated velocities for the centroid of the dye plume ranged from 0.80 to 3.02 feet per second within the study reach from Missouri River Headwaters to Townsend Bridge, near Townsend. The mean velocity of the dye plume for the entire study reach, excluding the subreach between the abandoned Milwaukee Railroad bridge at Lombard, Montana (Milwaukee Bridge) and Broadwater-Missouri Dam (Broadwater Dam), was 2.87 feet per second. The velocity of the centroid of the dye plume for the subreach between Milwaukee Bridge and Broadwater Dam (Toston Reservoir) was 0.80 feet per second. The residence time for Toston Reservoir was 8.2 hours during this study. Estimated longitudinal dispersion rates of the dye plume for this study ranged from 0.72 feet per second for the subreach from Milwaukee Bridge to Broadwater Dam to 2.26 feet per second for the subreach from the U.S. Route 287 Bypass Bridge over the Missouri River north of Toston, Montana to Yorks Islands. A relation was determined between travel time of the peak concentration and the time for the dye plume to pass a site (duration of the dye plume). This relation can be used to estimate when the decreasing concentration of a potential contaminant is reduced to 10 percent of its peak concentration for accidental (contaminant or chemical) spills into the upper Missouri River.

  10. Chinook salmon and green sturgeon migrate through San Francisco Estuary despite large distortions in the local magnetic field produced by bridges

    PubMed Central

    Wyman, Megan T.; Kavet, Robert

    2017-01-01

    Empirical evidence exists that some marine animals perceive and orient to local distortions in the earth’s main static geomagnetic field. The magnetic fields produced by undersea electric power cables that carry electricity from hydrokinetic energy sources to shore-based power stations may produce similar local distortions in the earth’s main field. Concerns exist that animals migrating along the continental shelves might orient to the magnetic field from the cables, and move either inshore or offshore away from their normal path. We have studied the effect of the Trans Bay Cable (TBC), an 85-km long, high voltage, direct current (DC) transmission line leading underwater from Pittsburg, CA to San Francisco, CA, on fishes migrating through the San Francisco Estuary. These included Chinook salmon smolts (Oncorhynchus tshawytscha) that migrate downstream through the San Francisco Estuary to the Pacific Ocean and adult green sturgeon (Acipenser medirostris), which migrate upstream from the ocean through the estuary to their spawning habitat in the upper Sacramento River and return to the ocean after spawning occurs. Based on a detailed gradiometer survey, we found that the distortions in the earth’s main field produced by bridges across the estuary were much greater than those from the Trans Bay Cable. The former anomalies exceeded the latter by an order of magnitude or more. Significant numbers of tagged Chinook salmon smolts migrated past bridges, which produced strong magnetic anomalies, to the Golden Gate Bridge, where they were recorded by dual arrays of acoustic tag-detecting monitors moored in lines across the mouth of the bay. In addition, adult green sturgeon successfully swam upstream and downstream through the estuary on the way to and from their spawning grounds. Hence, the large anomalies produced by the bridges do not appear to present a strong barrier to the natural seasonal movement patterns of salmonid smolts and adult green sturgeon. PMID:28575021

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    CRESSWELL,M.W.; ALLEN,R.A.; GHOSHTAGORE,R.N.

    This paper describes the fabrication and measurement of the linewidths of the reference segments of cross-bridge resistors patterned in (100) Bonded and Etched Back Silicon-on-Insulator (BESOI) material. The critical dimensions (CD) of the reference segments of a selection of the cross-bridge resistor test structures were measured both electrically and by Scanning-Electron Microscopy (SEM) cross-section imaging. The reference-segment features were aligned with <110> directions in the BESOI surface material and had drawn linewidths ranging from 0.35 to 3.0 {micro}m. They were defined by a silicon micro-machining process which results in their sidewalls being atomically-planar and smooth and inclined at 54.737{degree} tomore » the surface (100) plane of the substrate. This (100) implementation may usefully complement the attributes of the previously-reported vertical-sidewall one for selected reference-material applications. For example, the non-orthogonal intersection of the sidewalls and top-surface planes of the reference-segment features may alleviate difficulties encountered with atomic-force microscope measurements. In such applications it has been reported that it may be difficult to maintain probe-tip control at the sharp 90{degree} outside corner of the sidewalls and the upper surface. A second application is refining to-down image-processing algorithms and checking instrument performance. Novel aspects of the (100) SOI implementation that are reported here include the cross-bridge resistor test-structure architecture and details of its fabrication. The long-term goal is to develop a technique for the determination of the absolute dimensions of the trapezoidal cross-sections of the cross-bridge resistors' reference segments, as a prelude to developing them for dimensional reference applications. This is believed to be the first report of electrical CD measurements made on test structures of the cross-bridge resistor type that have been patterned in (100) SOI material. The electrical CD results are compared with cross-section SEM measurements made on the same features.« less

  12. Chinook salmon and green sturgeon migrate through San Francisco Estuary despite large distortions in the local magnetic field produced by bridges.

    PubMed

    Klimley, A Peter; Wyman, Megan T; Kavet, Robert

    2017-01-01

    Empirical evidence exists that some marine animals perceive and orient to local distortions in the earth's main static geomagnetic field. The magnetic fields produced by undersea electric power cables that carry electricity from hydrokinetic energy sources to shore-based power stations may produce similar local distortions in the earth's main field. Concerns exist that animals migrating along the continental shelves might orient to the magnetic field from the cables, and move either inshore or offshore away from their normal path. We have studied the effect of the Trans Bay Cable (TBC), an 85-km long, high voltage, direct current (DC) transmission line leading underwater from Pittsburg, CA to San Francisco, CA, on fishes migrating through the San Francisco Estuary. These included Chinook salmon smolts (Oncorhynchus tshawytscha) that migrate downstream through the San Francisco Estuary to the Pacific Ocean and adult green sturgeon (Acipenser medirostris), which migrate upstream from the ocean through the estuary to their spawning habitat in the upper Sacramento River and return to the ocean after spawning occurs. Based on a detailed gradiometer survey, we found that the distortions in the earth's main field produced by bridges across the estuary were much greater than those from the Trans Bay Cable. The former anomalies exceeded the latter by an order of magnitude or more. Significant numbers of tagged Chinook salmon smolts migrated past bridges, which produced strong magnetic anomalies, to the Golden Gate Bridge, where they were recorded by dual arrays of acoustic tag-detecting monitors moored in lines across the mouth of the bay. In addition, adult green sturgeon successfully swam upstream and downstream through the estuary on the way to and from their spawning grounds. Hence, the large anomalies produced by the bridges do not appear to present a strong barrier to the natural seasonal movement patterns of salmonid smolts and adult green sturgeon.

  13. Chinook salmon and green sturgeon migrate through San Francisco Estuary despite large distortions in the local magnetic field produced by bridges

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Klimley, A. Peter; Wyman, Megan T.; Kavet, Robert

    Empirical evidence exists that some marine animals perceive and orient to local distortions in the earth's main static geomagnetic field. The magnetic fields produced by undersea electric power cables that carry electricity from hydrokinetic energy sources to shore-based power stations may produce similar local distortions in the earth's main field. Concerns exist that animals migrating along the continental shelves might orient to the magnetic field from the cables, and move either inshore or offshore away from their normal path. We studied the effect of the Trans Bay Cable (TBC), an 85-km long, high voltage, direct current (DC) transmission line leadingmore » underwater from Pittsburg, CA to San Francisco, CA, on fishes migrating through the San Francisco Estuary. These included Chinook salmon smolts (Oncorhynchus tshawytscha) that migrate downstream through the San Francisco Estuary to the Pacific Ocean and adult green sturgeon (Acipenser medirostris), which migrate upstream from the ocean through the estuary to their spawning habitat in the upper Sacramento River and return to the ocean after spawning occurs. And based on a detailed gradiometer survey, we found that the distortions in the earth's main field produced by bridges across the estuary were much greater than those from the Trans Bay Cable. The former anomalies exceeded the latter by an order of magnitude or more. Significant numbers of tagged Chinook salmon smolts migrated past bridges, which produced strong magnetic anomalies, to the Golden Gate Bridge, where they were recorded by dual arrays of acoustic tag-detecting monitors moored in lines across the mouth of the bay. Additionally, adult green sturgeon successfully swam upstream and downstream through the estuary on the way to and from their spawning grounds. Hence, the large anomalies produced by the bridges do not appear to present a strong barrier to the natural seasonal movement patterns of salmonid smolts and adult green sturgeon.« less

  14. Chinook salmon and green sturgeon migrate through San Francisco Estuary despite large distortions in the local magnetic field produced by bridges

    DOE PAGES

    Klimley, A. Peter; Wyman, Megan T.; Kavet, Robert; ...

    2017-06-02

    Empirical evidence exists that some marine animals perceive and orient to local distortions in the earth's main static geomagnetic field. The magnetic fields produced by undersea electric power cables that carry electricity from hydrokinetic energy sources to shore-based power stations may produce similar local distortions in the earth's main field. Concerns exist that animals migrating along the continental shelves might orient to the magnetic field from the cables, and move either inshore or offshore away from their normal path. We studied the effect of the Trans Bay Cable (TBC), an 85-km long, high voltage, direct current (DC) transmission line leadingmore » underwater from Pittsburg, CA to San Francisco, CA, on fishes migrating through the San Francisco Estuary. These included Chinook salmon smolts (Oncorhynchus tshawytscha) that migrate downstream through the San Francisco Estuary to the Pacific Ocean and adult green sturgeon (Acipenser medirostris), which migrate upstream from the ocean through the estuary to their spawning habitat in the upper Sacramento River and return to the ocean after spawning occurs. And based on a detailed gradiometer survey, we found that the distortions in the earth's main field produced by bridges across the estuary were much greater than those from the Trans Bay Cable. The former anomalies exceeded the latter by an order of magnitude or more. Significant numbers of tagged Chinook salmon smolts migrated past bridges, which produced strong magnetic anomalies, to the Golden Gate Bridge, where they were recorded by dual arrays of acoustic tag-detecting monitors moored in lines across the mouth of the bay. Additionally, adult green sturgeon successfully swam upstream and downstream through the estuary on the way to and from their spawning grounds. Hence, the large anomalies produced by the bridges do not appear to present a strong barrier to the natural seasonal movement patterns of salmonid smolts and adult green sturgeon.« less

  15. Water-quality trends for selected sampling sites in the upper Clark Fork Basin, Montana, water years 1996-2010

    USGS Publications Warehouse

    Sando, Steven K.; Vecchia, Aldo V.; Lorenz, David L.; Barnhart, Elliott P.

    2014-01-01

    A large-scale trend analysis was done on specific conductance, selected trace elements (arsenic, cadmium, copper, iron, lead, manganese, and zinc), and suspended-sediment data for 22 sites in the upper Clark Fork Basin for water years 1996–2010. Trend analysis was conducted by using two parametric methods: a time-series model (TSM) and multiple linear regression on time, streamflow, and season (MLR). Trend results for 1996–2010 indicate moderate to large decreases in flow-adjusted concentrations (FACs) and loads of copper (and other metallic elements) and suspended sediment in Silver Bow Creek upstream from Warm Springs. Deposition of metallic elements and suspended sediment within Warm Springs Ponds substantially reduces the downstream transport of those constituents. However, mobilization of copper and suspended sediment from floodplain tailings and stream banks in the Clark Fork reach from Galen to Deer Lodge is a large source of metallic elements and suspended sediment, which also affects downstream transport of those constituents. Copper and suspended-sediment loads mobilized from within this reach accounted for about 40 and 20 percent, respectively, of the loads for Clark Fork at Turah Bridge (site 20); whereas, streamflow contributed from within this reach only accounted for about 8 percent of the streamflow at Turah Bridge. Minor changes in FACs and loads of copper and suspended sediment are indicated for this reach during 1996–2010. Clark Fork reaches downstream from Deer Lodge are relatively smaller sources of metallic elements than the reach from Galen to Deer Lodge. In general, small decreases in loads and FACs of copper and suspended sediment are indicated for Clark Fork sites downstream from Deer Lodge during 1996–2010. Thus, although large decreases in FACs and loads of copper and suspended sediment are indicated for Silver Bow Creek upstream from Warm Springs, those large decreases are not translated to the more downstream reaches largely because of temporal stationarity in constituent transport relations in the Clark Fork reach from Galen to Deer Lodge. Unlike metallic elements, arsenic (a metalloid element) in streams in the upper Clark Fork Basin typically is mostly in dissolved phase, has less variability in concentrations, and has weaker direct relations with suspended-sediment concentrations and streamflow. Arsenic trend results for 1996–2010 indicate generally moderate decreases in FACs and loads in Silver Bow Creek upstream from Opportunity. In general, small temporal changes in loads and FACs of arsenic are indicated for Silver Bow Creek and Clark Fork reaches downstream from Opportunity during 1996–2010. Contribution of arsenic (from Warm Springs Ponds, the Mill-Willow bypass, and groundwater sources) in the Silver Bow Creek reach from Opportunity to Warm Springs is a relatively large source of arsenic. Arsenic loads originating from within this reach accounted for about 11 percent of the load for Clark Fork at Turah Bridge; whereas, streamflow contributed from within this reach only accounted for about 2 percent of the streamflow at Turah Bridge.

  16. Bioaccumulation of polychlorinated biphenyls and organochlorine pesticides in young-of-the-year bluefish (Pomatomus saltatrix) in the vicinity of a Superfund Site in New Bedford Harbor, Massachusetts, and in the adjacent waters.

    PubMed

    Deshpande, Ashok D; Dockum, Bruce W; Cleary, Thomas; Farrington, Cameron; Wieczorek, Daniel

    2013-07-15

    Spatial gradients of polychlorinated biphenyls (PCBs) and organochlorine pesticides were examined in the young-of-the-year (YOY) bluefish (Pomatomus saltatrix) in the vicinity of a PCB Superfund Site in New Bedford Harbor, Massachusetts, and in the adjacent waters. PCB concentrations in bluefish varied between different locations, and also among fish from a given location. A generally decreasing gradient in PCB concentrations was evident as the bluefish were collected away from the Superfund Site. The average sum of PCB concentrations were highest for bluefish collected in the Upper Harbor between Interstate-195 Bridge and Coggeshall Street Bridge (Upper Harbor), followed by bluefish in Lower Harbor from north of Popes Island Bridge (Lower Harbor), and bluefish from Outer Harbor south of Hurricane Barrier (Outer Harbor). The levels of PCBs in bluefish from Clarks Cove and PCBs in bluefish from Buzzards Bay were similar and lowest among all bluefish specimens analyzed in the present study. Pesticide concentrations were about one order of magnitude or lower than the PCB concentrations, and the gradient of pesticide concentrations generally followed the gradient of PCB concentrations. Some of the commonly detected pesticides in the order of decreasing concentrations included DDTs and metabolites, heptachlor epoxide, endosulfan sulfate, and α-chlordane. Distribution of PCBs and organochlorine pesticides were examined in the tissues of YOY bluefish from Clarks Cove. PCBs and lipids in the brain samples of YOY bluefish were generally numerically greater than PCBs in the liver samples, but these differences were not statistically significant. PCBs and lipids in hypaxial muscle samples were numerically greater than PCBs in epaxial muscle samples, although these two groups of tissues were not statistically different. Despite the higher susceptibility of lighter PCB homologs to geophysical and biogeochemical weathering processes, the relative dominance of lighter homologs in the Upper Harbor and Lower Harbor samples suggested ongoing or recent sources of these lighter PCBs, particularly Aroclor 1242 and Aroclor 1016 in this area. The presence of heavier homologs in the Upper Harbor and Lower Harbor bluefish samples could be attributed to Aroclor 1252 and Aroclor 1254 that were being used in relatively smaller quantities in the manufacture of electrical components in addition to Aroclor 1242 and Aroclor 1016. The concentration of heavier PCB homologs appears to increase in YOY bluefish the further away from the PCB Superfund Site in the Acushnet Estuary the samples were collected. Principal component analyses of PCB 153 normalized concentrations of the individual PCB congeners resulted in two general groupings; a relatively tight group comprised of YOY bluefish from Upper Harbor, Lower Harbor, and Outer Harbor, and a rather loose and more dispersed group comprised of Buzzards Bay bluefish and the tissue samples of bluefish from Clarks Cove. Principal component analyses of major pesticides suggested close groupings of bluefish from Clarks Cove and bluefish from Buzzards Bay. Pesticides in bluefish from Upper Harbor, Lower Harbor, and Outer Harbor formed a loose group, with some bluefish from these locations populating close to Clarks Cove and Buzzards Bay bluefish. Although PCBs have been implicated in various behavioral and health effects in the experimental and field studies, the deleterious effects of chronic exposure to high concentrations of PCBs and the potential for recruitment of New Bedford Harbor YOY bluefish population to the adult stock remains obscure. Adaptive or evolutionary resistance to contaminants have been documented in resident species in some highly contaminated estuaries, however similar responses have not been investigated in the migratory species like bluefish. The results of the present study provide a reference baseline for YOY bluefish for "before-and-after" comparative studies and other toxicological studies for the New Bedford Harbor Superfund Site that is currently being remediated. Published by Elsevier Ltd.

  17. Speech Recognition: Acoustic, Phonetic and Lexical Knowledge

    DTIC Science & Technology

    1985-08-05

    J I ■ < < i* *’*"zz • sassss g SS««« SS7 «97 SSS«SS is m y^ e e 5 o « e S 2 .1 t 11 I e f Q ö i io • u ŗ...the words nock, hack , and mack li.xainplcs such as those shown in Figure 1 suggest that it is not possible to distinüuish nasaliyed and oral /owcls

  18. American Bald Eagle Restoration Plan for Dale Hollow Lake.

    DTIC Science & Technology

    1987-06-01

    Wildlife Resources Agency’s (TWRA) Reelfoot Lake site, Tennessee Valley Authority’s (TVA), Land Between the Lakes operation in Kentucky, and the Alabama...three active hacking sites were visited: (1) Reelfoot Lake (Tennessee), (2) Land Between the Lakes (Kentucky), and (3) Mud Creek (Alabama). These...somewhat differently. Some of the differences are hereby noted: (1) Reelfoot Lake -- The towers here are constructed in lIve cypress trees at a height

  19. Abuse of Customer Premise Equipment and Recommended Actions

    DTIC Science & Technology

    2014-08-07

    as reflectors. Descriptions of hacks and control of CPE are more difficult to provide, as such operations are more clandestine. DNS changer provides...connected to broadband Internet, as of July 2013. 7 In the United States, about 84% of those connections have a local home network, such as WiFi . 8...with 324 million WiFi -enabled consumer electronics devices shipped during 2013 in the United States alone. 10 Thus if there were a systematic

  20. Malware Pandemics

    DTIC Science & Technology

    2010-09-01

    in T-Mobile’s ,𔃽G IP range began expe- riencing extortion popup windows. The popup window notifies the victim that the phone has been hacked , and...range, 192.168.0.0/16. Such scanning may be of particular interest when the victim’s iPhone opportunistically connects to a WiFi LAN for Internet...connected to local WiFi networks should understand that the convenience of their Internet-tethered web, media, and email service, comes with a

Top