WorldWideScience

Sample records for perimeter security advisor

  1. Perimeter security for Minnesota correctional facilities

    Energy Technology Data Exchange (ETDEWEB)

    Crist, D. [Minnesota Department of Corrections, St. Paul, MN (United States); Spencer, D.D. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.

  2. Fiber-optic perimeter security system based on WDM technology

    Science.gov (United States)

    Polyakov, Alexandre V.

    2017-10-01

    Intelligent underground fiber optic perimeter security system is presented. Their structure, operation, software and hardware with neural networks elements are described. System allows not only to establish the fact of violation of the perimeter, but also to locate violations. This is achieved through the use of WDM-technology division spectral information channels. As used quasi-distributed optoelectronic recirculation system as a discrete sensor. The principle of operation is based on registration of the recirculation period change in the closed optoelectronic circuit at different wavelengths under microstrain exposed optical fiber. As a result microstrain fiber having additional power loss in a fiber optical propagating pulse, which causes a time delay as a result of switching moments of the threshold device. To separate the signals generated by intruder noise and interference, the signal analyzer is used, based on the principle of a neural network. The system detects walking, running or crawling intruder, as well as undermining attempts to register under the perimeter line. These alarm systems can be used to protect the perimeters of facilities such as airports, nuclear reactors, power plants, warehouses, and other extended territory.

  3. Fiber optic perimeter system for security in smart city

    Science.gov (United States)

    Cubik, Jakub; Kepak, Stanislav; Nedoma, Jan; Fajkus, Marcel; Zboril, Ondrej; Novak, Martin; Jargus, Jan; Vasinek, Vladimir

    2017-10-01

    Protection of persons and assets is the key challenge of Smart City safeguards technologies. Conventional security technologies are often outdated and easy to breach. Therefore, new technologies that could complement existing systems or replace them are developed. The use of optical fibers and their subsequent application in sensing is a trend of recent years. This article discusses the use of fiber-optic sensors in perimeter protection. The sensor consists of optical fibers and couplers only and being constructed without wires and metal parts bring many advantages. These include an absence of interference with electromagnetic waves, system presence can be difficult to detect as well as affect its operation. Testing installation of perimeter system was carried out under reinforced concrete structure. Subjects walked over the bridge at different speeds and over the different routes. The task for the system was an absolute detection of all subjects. The proposed system should find application mainly in areas with the presence of volatile substances, strong electromagnetic fields, or in explosive areas.

  4. Airport Perimeter Security Advisor, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The aviation system of the United States of America is one of our national treasures. Very few elements of our culture capture the America spirit like aviation. Air...

  5. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  6. 17 CFR 4.14 - Exemption from registration as a commodity trading advisor.

    Science.gov (United States)

    2010-04-01

    ... a commodity trading advisor. 4.14 Section 4.14 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION COMMODITY POOL OPERATORS AND COMMODITY TRADING ADVISORS General Provisions, Definitions and Exemptions § 4.14 Exemption from registration as a commodity trading advisor. This section is...

  7. Hardware implementation of adaptive filtering using charge-coupled devices. [For perimeter security sensors

    Energy Technology Data Exchange (ETDEWEB)

    Donohoe, G.W.

    1977-01-01

    Sandia Laboratories' Digital Systems Division/1734, as part of its work on the Base and Installation Security Systems (BISS) program has been making use of adaptive digital filters to improve the signal-to-noise ratio of perimeter sensor signals. In particular, the Widrow-Hoff least-mean-squares algorithm has been used extensively. This non-recursive linear predictor has been successful in extracting aperiodic signals from periodic noise. The adaptive filter generates a predictor signal which is subtracted from the input signal to produce an error signal. The value of this error is fed back to the filter to improve the quality of the next prediction. Implementation of the Widrow adaptive filter using a Charge-Coupled Device tapped analog delay line, analog voltage multipliers and operational amplifiers is described. The resulting filter adapts to signals with frequency components as high as several megahertz.

  8. 78 FR 27444 - Forum Investment Advisors, LLC, et al.;

    Science.gov (United States)

    2013-05-10

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30507; 812-13915] Forum Investment Advisors, LLC, et al.; Notice of Application May 6, 2013. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application for an order under section 6(c) of the...

  9. Nuclear power plant security systems - The need for upgrades

    International Nuclear Information System (INIS)

    Murskyj, M.P.; Furlow, C.H.

    1989-01-01

    Most perimeter security systems for nuclear power plants were designed and installed in the late 1970s or early 1980s. This paper explores the need to regularly evaluate and possibly upgrade a security system in the area of perimeter intrusion detection and surveillance. this paper discusses US Nuclear Regulatory Commission audits and regulatory effectiveness reviews (RERs), which have raised issues regarding the performance of perimeter security systems. The audits and RERs identified various degrees of vulnerability in certain aspects of existing perimeter security systems. In addition to reviewing the regulatory concerns, this paper discusses other reasons to evaluate and/or upgrade a perimeter security system

  10. 76 FR 18383 - Extension of Sunset Date for Attorney Advisor Program

    Science.gov (United States)

    2011-04-04

    ... Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: Electronic Version The... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2009-0048] RIN 0960-AH05 Extension of Sunset Date for Attorney Advisor Program AGENCY: Social Security Administration. ACTION: Final...

  11. Design and evaluation of the ReKon : an integrated detection and assessment perimeter system.

    Energy Technology Data Exchange (ETDEWEB)

    Dabling, Jeffrey Glenn; Andersen, Jason Jann; McLaughlin, James O. [Stonewater Control Systems, Inc., Kannapolis, NC

    2013-02-01

    Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia to jointly develop and evaluate an integrated perimeter security system solution, one that couples access delay with detection and assessment. This novel perimeter solution was designed to be configurable for use at facilities ranging from high-security military sites to commercial power plants, to petro/chemical facilities of various kinds. A prototype section of the perimeter has been produced and installed at the Sandia Test and Evaluation Center in Albuquerque, NM. This prototype system integrated fiber optic break sensors, active infrared sensors, fence disturbance sensors, video motion detection, and ground sensors. This report documents the design, testing, and performance evaluation of the developed ReKon system. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system is characterized, as well as the Nuisance Alarm Rate.

  12. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  13. 78 FR 46381 - Calamos Advisors LLC and Calamos ETF Trust; Notice of Application

    Science.gov (United States)

    2013-07-31

    ... Advisors LLC and Calamos ETF Trust; Notice of Application July 24, 2013. AGENCY: Securities and Exchange... sections 12(d)(1)(A) and (B) of the Act. Applicants: Calamos Advisors LLC (``Adviser'') and Calamos ETF... series of the Trust will be the Calamos Focus Growth ETF (the ``Initial Fund''), the investment objective...

  14. Integrated multisensor perimeter detection systems

    Science.gov (United States)

    Kent, P. J.; Fretwell, P.; Barrett, D. J.; Faulkner, D. A.

    2007-10-01

    The report describes the results of a multi-year programme of research aimed at the development of an integrated multi-sensor perimeter detection system capable of being deployed at an operational site. The research was driven by end user requirements in protective security, particularly in threat detection and assessment, where effective capability was either not available or prohibitively expensive. Novel video analytics have been designed to provide robust detection of pedestrians in clutter while new radar detection and tracking algorithms provide wide area day/night surveillance. A modular integrated architecture based on commercially available components has been developed. A graphical user interface allows intuitive interaction and visualisation with the sensors. The fusion of video, radar and other sensor data provides the basis of a threat detection capability for real life conditions. The system was designed to be modular and extendable in order to accommodate future and legacy surveillance sensors. The current sensor mix includes stereoscopic video cameras, mmWave ground movement radar, CCTV and a commercially available perimeter detection cable. The paper outlines the development of the system and describes the lessons learnt after deployment in a pilot trial.

  15. 75 FR 33857 - DWS Advisor Funds, et al.; Notice of Application

    Science.gov (United States)

    2010-06-15

    ...''). Applicants state that the DWS Funds of Funds will offer investors a range of investment objectives generally... investment objectives and policies of the Unaffiliated Fund; (b) how the performance of securities purchased... Advisor Funds, et al.; Notice of Application June 9, 2010. AGENCY: Securities and Exchange Commission...

  16. Network perimeter security building defense in-depth

    CERN Document Server

    Riggs, Cliff

    2003-01-01

    PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit

  17. Team of Advisors: The Social Science of Advice in Homeland and National Security

    Science.gov (United States)

    2017-03-01

    choice they have to make.”19 While these biases are subconscious and unavoidable, they cannot serve as a crutch to explain away quick, uninformed or...eradicate the influence of biases and heuristics as described by Kahneman, leaders can take steps to reduce the risk of these subconscious influences...hidden bias . Advisors play a role in identifying, recognizing and mitigating the risks inherent to subconsciously relying on heuristics. Third, advisors

  18. The Advisor Quality Survey: Good College Advisors Are Available, Knowledgeable, and Autonomy Supportive

    Science.gov (United States)

    Sheldon, Kennon M.; Garton, Bryan; Orr, Rachael; Smith, Amy

    2015-01-01

    Most US institutions of higher education do not assess advisor quality. We report a scale development effort informed by the developmental prescriptions of self-determination theory (Deci & Ryan, 1985, 2000). The 15-item Missouri Advisor Quality Survey assesses advisor knowledge, advisor availability, and advisor autonomy supportiveness.…

  19. 77 FR 5585 - Northwestern Mutual Series Fund, Inc. and Mason Street Advisors, LLC; Notice of Application

    Science.gov (United States)

    2012-02-03

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29939; File No. 812-13982] Northwestern Mutual Series Fund, Inc. and Mason Street Advisors, LLC; Notice of Application January 30, 2012... instruments. Applicants: Northwestern Mutual Series Fund, Inc. (``Company'') and Mason Street Advisors, LLC...

  20. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    Science.gov (United States)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2012-01-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  1. Fire Perimeters

    Data.gov (United States)

    California Natural Resource Agency — The Fire Perimeters data consists of CDF fires 300 acres and greater in size and USFS fires 10 acres and greater throughout California from 1950 to 2003. Some fires...

  2. 77 FR 58593 - Factor Advisors, LLC, et al.; Notice of Application

    Science.gov (United States)

    2012-09-21

    ... Factor Advisors (each, an ``Adviser''), and (b) seek investment returns that correspond to the price and... ``ETF,'' an ``investment company,'' a ``fund,'' or a ``trust.'' All marketing materials that describe... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30204; File No. 812-13934...

  3. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security

    National Research Council Canada - National Science Library

    Ganger, Gregory

    2000-01-01

    This report contains the technical content of a recent funding proposal. In it, we propose a new approach to network security in which each individual device erects its own security perimeter and defends its own critical resources...

  4. Obsessive-Compulsive Homeland Security: Insights from the Neurobiological Security Motivation System

    Science.gov (United States)

    2018-03-01

    HOMELAND SECURITY: INSIGHTS FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM by Marissa D. Madrigal March 2018 Thesis Advisor...FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM 5. FUNDING NUMBERS 6. AUTHOR(S) Marissa D. Madrigal 7. PERFORMING ORGANIZATION NAME(S) AND...how activation of the neurobiological security- motivation system can lead to securitization in response to a security speech act. It explores the model

  5. 24 CFR 3285.307 - Perimeter support piers.

    Science.gov (United States)

    2010-04-01

    ... URBAN DEVELOPMENT MODEL MANUFACTURED HOME INSTALLATION STANDARDS Foundations § 3285.307 Perimeter support piers. (a) Piers required at mate-line supports, perimeter piers, and piers at exterior wall...

  6. Toward a New Trilateral Strategic Security Relationship: United States, Canada, and Mexico

    Directory of Open Access Journals (Sweden)

    Richard J. Kilroy, Jr.

    2010-01-01

    Full Text Available The term "perimeter defense" has come back into vogue recently, with regard to security strategies for North America. The United States' concern primarily with the terrorist threat to its homeland subsequent to September 11, 2001 (9/11 is generating this discussion with its immediate neighbors of Mexico and Canada (and to some extent some Caribbean nations—the "third border". The concept is simply that by pushing defenses out to the "perimeter" nations, then security will be enhanced, since the United States visions itself as more vulnerable to international terrorism than its neighbors. However, Canada and Mexico have not been very happy about the perimeter defined by Washington since 9/11. These nations have sought to define the trilateral relationship beyond just discussions of terrorism to include natural disasters and international organized crime as a component of a broader trilateral agenda. Eight years later these three nations continue to look for some convergence of security interests, although there remains a degree of tension and hesitancy towards achieving a "common security agenda" in the Western Hemisphere.This article examines the concept of "perimeter defense" within the context of the new security challenges that the United States, Mexico, and Canada face today. Questions to be addressed in the article include: Do all these nations share the same "threat" perception? Where exactly is the "perimeter?" What security arrangements have been tried in the past? What are the prospects for the future for increased security cooperation? The main focus of this article is at the sub-regional level in North America and whether a new "trilateral" strategic security relationship between the United States, Canada, and Mexico can emerge in North America.

  7. Divergence-Measure Fields, Sets of Finite Perimeter, and Conservation Laws

    Science.gov (United States)

    Chen, Gui-Qiang; Torres, Monica

    2005-02-01

    Divergence-measure fields in L∞ over sets of finite perimeter are analyzed. A notion of normal traces over boundaries of sets of finite perimeter is introduced, and the Gauss-Green formula over sets of finite perimeter is established for divergence-measure fields in L∞. The normal trace introduced here over a class of surfaces of finite perimeter is shown to be the weak-star limit of the normal traces introduced in Chen & Frid [6] over the Lipschitz deformation surfaces, which implies their consistency. As a corollary, an extension theorem of divergence-measure fields in L∞ over sets of finite perimeter is also established. Then we apply the theory to the initial-boundary value problem of nonlinear hyperbolic conservation laws over sets of finite perimeter.

  8. Fire Perimeters - Southern California, Fall 2007 [ds385

    Data.gov (United States)

    California Natural Resource Agency — Southern Callifornia fire perimeters for the Fall 2007 wildfires. The perimeters were assembled from various sources by California Department of Fish and Game (DFG)...

  9. 78 FR 77175 - Catalyst Capital Advisors LLC and Mutual Fund Series Trust; Notice of Application

    Science.gov (United States)

    2013-12-20

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30832; 812-14101] Catalyst... shareholder approval. APPLICANTS: Catalyst Capital Advisors LLC (``CCA'' or the ``Adviser'') and Mutual Fund Series Trust (formerly Catalyst Funds) (the ``Trust''). DATES: Filing Dates: The application was filed on...

  10. Ethical Decision-Making for Homeland Security

    Science.gov (United States)

    2013-09-01

    PhD Thesis Co-Advisor Anders Strindberg, PhD Thesis Co-Advisor Mohammed Hafez, PhD Chair, Department of National Security Affairs...expectations may be deleterious in the long-term, emotionally, psychologically , spiritually , and socially (what we label as moral injury)” (Litz 2009). They...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited ETHICAL DECISION

  11. 77 FR 66651 - Salient Advisors, L.P. and MarketShares ETF Trust; Notice of Application

    Science.gov (United States)

    2012-11-06

    ... Advisors, L.P. and MarketShares ETF Trust; Notice of Application October 31, 2012 AGENCY: Securities and... ETF Trust (the ``Trust''). Summary of Application: Applicants request an order that permits: (a... statutory trust. The Trust will initially offer one series, the Salient MLP and Energy Infrastructure ETF...

  12. Saudi Arabia’s Counterterrorism Methods: A Case Study on Homeland Security

    Science.gov (United States)

    2017-06-01

    Approved for public release. Distribution is unlimited. SAUDI ARABIA’S COUNTERTERRORISM METHODS: A CASE STUDY ON HOMELAND SECURITY Majed M...examined in the previous chapter with examples from the case studies related to terrorist attacks and Saudi Arabia’s responses. Furthermore, the...COUNTERTERRORISM METHODS: A CASE STUDY ON HOMELAND SECURITY by Majed M. Bin Madhian June 2017 Thesis Advisor: James Russell Co-Advisor

  13. 78 FR 69155 - Altegris Advisors, L.L.C., et al.; Notice of Application

    Science.gov (United States)

    2013-11-18

    ... Advisors, L.L.C., et al.; Notice of Application November 12, 2013. AGENCY: Securities and Exchange..., under sections 6(c) and 17(b) of the Act for an exemption from sections 17(a)(1) and (2) of the Act, and under section 6(c) of the Act for an exemption from rule 12d1- 2(a) under the Act. Summary of...

  14. 78 FR 29399 - ERNY Financial ETF Trust and ERNY Financial Advisors, LLC; Notice of Application

    Science.gov (United States)

    2013-05-20

    ... Financial ETF Trust and ERNY Financial Advisors, LLC; Notice of Application May 13, 2013. AGENCY: Securities... for an exemption from sections 12(d)(1)(A) and (B) of the Act. Applicants: ERNY Financial ETF Trust... ETF (the ``Initial Fund''), the investment objective of which will be to seek long-term capital...

  15. Residual heat removal system diagnostic advisor

    International Nuclear Information System (INIS)

    Tripp, L.

    1991-01-01

    This paper reports on the Residual Heat Removal System (RHRS) Diagnostic Advisor which is an expert system designed to alert the operators to abnormal conditions that exits in the RHRS and offer advice about the cause of the abnormal conditions. The Advisor uses a combination of rule-based and model-based diagnostic techniques to perform its functions. This diagnostic approach leads to a deeper understanding of the RHRS by the Advisor and consequently makes it more robust to unexpected conditions. The main window of the interactive graphic display is a schematic diagram of the RHRS piping system. When a conclusion about a failed component can be reached, the operator can bring up windows that describe the failure mode of the component and a brief explanation about how the Advisor arrived at its conclusion

  16. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  17. 77 FR 49839 - IndexIQ Advisors LLC and IndexIQ Active ETF Trust; Notice of Application

    Science.gov (United States)

    2012-08-17

    ... Advisors LLC and IndexIQ Active ETF Trust; Notice of Application August 13, 2012. AGENCY: Securities and... IndexIQ Active ETF Trust (the ``Trust''). SUMMARY OF APPLICATION: Applicants request an order that... series, IQ Global Equity Active ETF (``Global Equity ETF''), IQ Global Fixed Income Active ETF (``Global...

  18. Secure Audit Logging with Tamper-Resistant Hardware

    NARCIS (Netherlands)

    Chong, C.N.; Peng, Z.; Peng, Z.; Hartel, Pieter H.; Gritzalis, D.; De Capitani di Vimercati, S.; Katsikas, S.K.; Samarati, P.

    Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user's actions on content and enables detection of some forms of tampering with

  19. Global Health Security

    Centers for Disease Control (CDC) Podcasts

    2017-09-21

    Dr. Jordan Tappero, a CDC senior advisor on global health, discusses the state of global health security.  Created: 9/21/2017 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID), Center for Global Health (CGH).   Date Released: 9/21/2017.

  20. 33 CFR 1.05-5 - Marine Safety and Security Council.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine Safety and Security Council, composed of senior Coast Guard officials, acts as policy advisor to the...

  1. Russia’s Security Relations with Finland, Norway, and Sweden

    Science.gov (United States)

    2017-09-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. RUSSIA’S SECURITY... RELATIONS WITH FINLAND, NORWAY, AND SWEDEN by Rory J. Hayden September 2017 Thesis Advisor: Mikhail Tsypkin Co-Advisor: David S. Yost...THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of

  2. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  3. Determinants of physical activity promotion by smoking cessation advisors.

    Science.gov (United States)

    Mas, Sébastien; Bernard, Paquito; Gourlan, Mathieu

    2018-05-17

    To investigate the cross-sectional association between personal physical activity (PA) level, Theory of Planned Behavior (TPB) constructs toward PA promotion, and PA promotion behavior among smoking cessation advisors. 149 smoking cessation advisors were invited to complete online questionnaires. Hypotheses were tested using Bayesian path analysis. Attitudes and perceived behavioral control (PBC) of smoking cessation advisors were related to PA promotion intentions; intentions were in turn related to PA promotion behaviors. Advisors' personal PA level was indirectly associated with PA promotion behaviors through PBC and PA promotion intentions. The TPB is a relevant theoretical framework with which to explore determinants of PA promotion behavior among smoking cessation advisors. The PA level of health care professionals may be linked to PA promotion behavior through some TPB constructs. Smoking cessation advisor training should include education on attitude development (e.g., PA benefits on smoking cessation), PBC (e.g., modality of PA prescription) and PA promotion intentions (e.g., goal setting). Smoking cessation advisors should also be encouraged to regularly practice PA in order to improve their PA promotion behaviors. Copyright © 2018 Elsevier B.V. All rights reserved.

  4. Fragmentation of percolation cluster perimeters

    Science.gov (United States)

    Debierre, Jean-Marc; Bradley, R. Mark

    1996-05-01

    We introduce a model for the fragmentation of porous random solids under the action of an external agent. In our model, the solid is represented by a bond percolation cluster on the square lattice and bonds are removed only at the external perimeter (or `hull') of the cluster. This model is shown to be related to the self-avoiding walk on the Manhattan lattice and to the disconnection events at a diffusion front. These correspondences are used to predict the leading and the first correction-to-scaling exponents for several quantities defined for hull fragmentation. Our numerical results support these predictions. In addition, the algorithm used to construct the perimeters reveals itself to be a very efficient tool for detecting subtle correlations in the pseudo-random number generator used. We present a quantitative test of two generators which supports recent results reported in more systematic studies.

  5. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  6. Comparison of the students’ satisfaction about the performance of academic advisors before and after the advisor project in Shahrekord University of Medical Sciences

    Directory of Open Access Journals (Sweden)

    MASOUMEH DELARAM

    2014-01-01

    Full Text Available Introduction: Inappropriate advice interferes with the students’ achievement of educational and professional goals and they may fail to use proper resources for their educational needs. The present study was carried out to compare the students’ satisfaction about the performance of academic advisors before and after the advisor project in Shahrekord University of Medical Sciences. Methods: This longitudinal study was carried out using census report on 244 students in different courses at Shahrekord University of Medical Sciences in two stages at the first semester of 2010-2011 and first semester of 2011-2012. To collect the data, we used a self-designed questionnaire including individual and educational information and 10 multiple-choice questions with Likert scale to assess the students’ satisfaction about the advisors’ performance. Data were analyzed in SPSS 14 using paired t-test, qui-square test. P<0.05 was considered significant. Results: Of the ten items of satisfaction, there was only a significant difference in “accessibility to an advisor before and after the advisor project in students of nursing and midwifery school” (p=0.010, and the difference was not significant in other items in these students. No significant difference was found in ten items of satisfaction in students at other schools before and after the advisor project (p=0.010. Conclusion: It seems that the implementation of advisor project could not provide a satisfactory position for students. Adequate supervision of university officials on proper implementation of the advisor project, supporting faculty advisors and strengthening their position can help to improve the process.

  7. 21 CFR 886.1605 - Perimeter.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Perimeter. 886.1605 Section 886.1605 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES... or manual device intended to determine the extent of the peripheral visual field of a patient. The...

  8. Numerical quantification and minimization of perimeter losses in high-efficiency silicon solar cells

    Energy Technology Data Exchange (ETDEWEB)

    Altermatt, P.P.; Heiser, Gernot; Green, M.A. [New South Wales Univ., Kensington, NSW (Australia)

    1996-09-01

    This paper presents a quantitative analysis of perimeter losses in high-efficiency silicon solar cells. A new method of numerical modelling is used, which provides the means to simulate a full-sized solar cell, including its perimeter region. We analyse the reduction in efficiency due to perimeter losses as a function of the distance between the active cell area and the cut edge. It is shown how the optimum distance depends on whether the cells in the panel are shingled or not. The simulations also indicate that passivating the cut-face with a thermal oxide does not increase cell efficiency substantially. Therefore, doping schemes for the perimeter domain are suggested in order to increase efficiency levels above present standards. Finally, perimeter effects in cells that remain embedded in the wafer during the efficiency measurement are outlined. (author)

  9. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    Science.gov (United States)

    2017-06-01

    confirmation of Lake’s concerns with the administration’s public relations failures, David Gergen, the president’s communications advisor, increased... Public Affairs: 389-395. 75 these positions, he did not openly object too them during the campaign. Additionally, as this case study shows, he...PEOPLE, PROCESS, AND POLICY: CASE STUDIES IN NATIONAL SECURITY ADVISING, THE NATIONAL SECURITY COUNCIL, AND PRESIDENTIAL DECISION MAKING

  10. The role of farm advisors in multifunctional landscapes

    DEFF Research Database (Denmark)

    Vesterager, Jens Peter; Lindegaard, Klaus

    2012-01-01

    This study investigates the influence of farm advisors on farmers decisions regarding Multifunctional landscape commons, a concept covering environmental and landscape values that benefit the public but which depend on farmers management practices. The influence of advisors is analysed by combining...

  11. ACADEMIC ADVISORS: VALUES EDUCATED LEADERS

    Directory of Open Access Journals (Sweden)

    Brizeida Mijares

    2008-07-01

    Full Text Available The purpose of this article is to study the academic advisors’ profile from the attitudes in the learning process view point, being the center of which the need that as an educator, the advisor has to be a leader educated in values. The research was documental, according to the theoretical contributions of Arana and Batista (2006,  Ortega and Minguez (2001 and Denis (2000, among others. It is concluded that an academic advisor in values allows individual and collective trasnformation and an education without values as its center, it is a hollow and useless education.

  12. Automated Advice: A Portfolio Management Perspective on Robo-Advisors

    OpenAIRE

    Vukovic, Ana; Bjerknes, Line

    2017-01-01

    In this paper we investigate the predominant robo-advisor model, uncovering that however novel this solution might be, it also relies religiously on imperative contributions to modern portfolio theory that have been made in the past half a century. Despite conforming by and large to passive investment, we find that the slight variations in the methodologies used by robo-advisors introduce significant variability in risk-adjusted returns across the robo-advisor spectrum. Nonetheless, our perfo...

  13. Historical Fire Perimeters - Southern California [ds384

    Data.gov (United States)

    California Natural Resource Agency — CDF, USDA Forest Service Region 5, BLM, NPS, Contract Counties and other agencies jointly maintain a comprehensive fire perimeter GIS layer for public and private...

  14. Wireless Sensor Buoys for Perimeter Security of Military Vessels and Seabases

    Science.gov (United States)

    2015-12-01

    two decades have demonstrated that attacks of this type are indeed possible, and that current security measures may not be sufficient to mitigate such...attack by small surface crafts. The past two decades have demonstrated that attacks of this type are indeed possible, and that current security measures ...xiii LIST OF ACRONYMS AND ABBREVIATIONS ADAPT AP ARA AT/FP COTS DARPA DOD DODINST EF-21 GPS GUI IEEE ISR LCS LiDAR LTE MAC MAGTF

  15. Security Considerations of Doing Business via the Internet: Cautions To Be Considered.

    Science.gov (United States)

    Aldridge, Alicia; White, Michele; Forcht, Karen

    1997-01-01

    Lack of security is perceived as a major roadblock to doing business online. This article examines system, user, and commercial transaction privacy on the World Wide Web and discusses methods of protection: operating systems security, file and data protection, user education, access restrictions, data authentication, perimeter and transaction…

  16. Real-time estimation of wildfire perimeters from curated crowdsourcing

    Science.gov (United States)

    Zhong, Xu; Duckham, Matt; Chong, Derek; Tolhurst, Kevin

    2016-04-01

    Real-time information about the spatial extents of evolving natural disasters, such as wildfire or flood perimeters, can assist both emergency responders and the general public during an emergency. However, authoritative information sources can suffer from bottlenecks and delays, while user-generated social media data usually lacks the necessary structure and trustworthiness for reliable automated processing. This paper describes and evaluates an automated technique for real-time tracking of wildfire perimeters based on publicly available “curated” crowdsourced data about telephone calls to the emergency services. Our technique is based on established data mining tools, and can be adjusted using a small number of intuitive parameters. Experiments using data from the devastating Black Saturday wildfires (2009) in Victoria, Australia, demonstrate the potential for the technique to detect and track wildfire perimeters automatically, in real time, and with moderate accuracy. Accuracy can be further increased through combination with other authoritative demographic and environmental information, such as population density and dynamic wind fields. These results are also independently validated against data from the more recent 2014 Mickleham-Dalrymple wildfires.

  17. Senior Enlisted Advisor to the CNGB - The National Guard

    Science.gov (United States)

    ARNG Readiness Home : Leadership : SEA Senior Enlisted Advisor to the CNGB Command Sergeant Major Christopher Kepner Command Sergeant Major Christopher Kepner currently serves as the Senior Enlisted Advisor include the United States Army Sergeants Major Academy, Senior Enlisted Joint Professional Military

  18. Computing nonsimple polygons of minimum perimeter

    NARCIS (Netherlands)

    Fekete, S.P.; Haas, A.; Hemmer, M.; Hoffmann, M.; Kostitsyna, I.; Krupke, D.; Maurer, F.; Mitchell, J.S.B.; Schmidt, A.; Schmidt, C.; Troegel, J.

    2018-01-01

    We consider the Minimum Perimeter Polygon Problem (MP3): for a given set V of points in the plane, find a polygon P with holes that has vertex set V , such that the total boundary length is smallest possible. The MP3 can be considered a natural geometric generalization of the Traveling Salesman

  19. Marketing advisors and their role for junior gas producers

    Energy Technology Data Exchange (ETDEWEB)

    Maffitt, D.W. [Phoenix Gas Marketing Consultants Inc., Calgary, AB (Canada)

    1997-05-01

    The role of marketing advisors in the new deregulated natural gas industry was discussed. These producer-oriented marketing consultants are specialists in providing affordable marketing services to junior gas producers on an `as-needed` basis. The most important service provided by marketing advisors is helping the client identify management problems, analyze such problems and recommend solutions. Accordingly, the marketing advisor should be independent and objective, with no conflict of interests. He/she should be prepared to invest a lot of time and effort in providing the junior producer with a customized diagnosis of its marketing problems. 5 refs., 3 figs.

  20. Marketing advisors and their role for junior gas producers

    International Nuclear Information System (INIS)

    Maffitt, D.W.

    1997-01-01

    The role of marketing advisors in the new deregulated natural gas industry was discussed. These producer-oriented marketing consultants are specialists in providing affordable marketing services to junior gas producers on an 'as-needed' basis. The most important service provided by marketing advisors is helping the client identify management problems, analyze such problems and recommend solutions. Accordingly, the marketing advisor should be independent and objective, with no conflict of interests. He/she should be prepared to invest a lot of time and effort in providing the junior producer with a customized diagnosis of its marketing problems. 5 refs., 3 figs

  1. landscaping for passive security and adaptation to climate in church

    African Journals Online (AJOL)

    user

    Man has 10-15 years left to put in place serious measures to start .... 1.2 Adaptation of Man to Climate Change. Adaptation .... 1.4 Physical Security Control Measures and Landscaping ... and enhance the appearance of perimeter fences and.

  2. ADVISOR Users Conference Proceedings 2000 - Final Electronic version

    Energy Technology Data Exchange (ETDEWEB)

    NREL

    2000-09-26

    This is a compilation of papers presented at the ADVISOR (ADvanced Vehicle SimulatOR) Users Conference held in Costa Mesa, California, August 24-25, 2000. Major topics of the conference included modeling and simulation; partnering with the auto industry; co-simulation: partnering with the software industry in optimization and thermal modeling and geometric and mechanical modeling; forward-looking simulations coupled with ADVISOR; new concepts from universities; validation, vehicle development and applications.

  3. Current Density Distribution on the Perimeter of Waveguide Exciter Cylindrical Vibrator Conductor

    OpenAIRE

    Zakharia, Yosyp

    2010-01-01

    On ground of electrodynamic analysis the surface current distribution nonuniformity on the perimeter of waveguide-exciter cylindrical conductor is found. Considerable influence of current distribution nonuniformity on exciter input reactance is established. It is also showed, that the current distribution on the vibrator perimeter, for conductor radius no greater then 0,07 of waveguide cross section breadth, approximately uniform is.

  4. Physical security workshop summary: entry control

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1982-01-01

    Entry control hardware has been used extensively in the past to assist security forces in separating the authorized from the unauthorized at the plant perimeter. As more attention is being focused on the insider threat, these entry control elements are being used to extend the security inspectors' presence into the plant by compartmentalizing access and monitoring vital components. This paper summarizes the experiences expressed by the participants at the March 16 to 19, 1982 INMM Physical Protection Workshop in utilizing access control and contraband detection hardware for plant wide entry control applications

  5. 78 FR 11702 - AdvisorShares Investments, LLC and AdvisorShares Trust; Notice of Application

    Science.gov (United States)

    2013-02-19

    ..., American Wealth Management, Trim Tabs Asset Management, LLC, Rockledge Advisors, LLC, Your Source Financial... of Investment Management, Office of Investment Company Regulation). SUPPLEMENTARY INFORMATION: The... organized as a Delaware statutory trust and is registered under the Act as an open-end management investment...

  6. Determination of a BNI perimeter. Guide nr 9, Release of the 2013/10/31

    International Nuclear Information System (INIS)

    2013-01-01

    This guide specifies modalities of definition of the perimeter of a BNI (basic nuclear installation), and elements of assessment of criteria for the inclusion of installations, works and equipment within this perimeter, in compliance with legal measures specified in the French Code of the Environment and in various decrees. It first proposes an overview of the concerned articles in these legal texts, and notices some articulation with other legal texts which do not address nuclear issues. It specifies the various criteria of definition of a BNI perimeter by distinguishing installations, works and equipment under the responsibility of the operator and needed for the BNI exploitation, and installations, works and equipment not needed for the BNI exploitation but under the responsibility of the operator and susceptible to modify risks or inconveniences of the BNI. It addresses some peculiar situations: effluent processing installations and plants, control piezometers, the dredging of water and release sampling works, underground or underwater installations, and some specific departments (medicine, laundry, and so on). It outlines some important aspects of the procedure of modification of a BNI perimeter. An appendix addresses the methodology related to the inclusion of installations, equipment or works within the perimeter

  7. System overview and applications of a panoramic imaging perimeter sensor

    International Nuclear Information System (INIS)

    Pritchard, D.A.

    1995-01-01

    This paper presents an overview of the design and potential applications of a 360-degree scanning, multi-spectral intrusion detection sensor. This moderate-resolution, true panoramic imaging sensor is intended for exterior use at ranges from 50 to 1,500 meters. This Advanced Exterior Sensor (AES) simultaneously uses three sensing technologies (infrared, visible, and radar) along with advanced data processing methods to provide low false-alarm intrusion detection, tracking, and immediate visual assessment. The images from the infrared and visible detector sets and the radar range data are updated as the sensors rotate once per second. The radar provides range data with one-meter resolution. This sensor has been designed for easy use and rapid deployment to cover wide areas beyond or in place of typical perimeters, and tactical applications around fixed or temporary high-value assets. AES prototypes are in development. Applications discussed in this paper include replacements, augmentations, or new installations at fixed sites where topological features, atmospheric conditions, environmental restrictions, ecological regulations, and archaeological features limit the use of conventional security components and systems

  8. Perceptions of Effectiveness and Job Satisfaction of Pre-Law Advisors

    Science.gov (United States)

    Knotts, H. Gibbs; Wofford, Claire B.

    2017-01-01

    Despite playing an important role, preprofessional advising has received little research attention. For this study, 313 U.S. preprofessional advisors were surveyed in 2015. Drawing on work adjustment and social cognitive career theories, we analyzed the job satisfaction and perceived effectiveness of pre-law advisors. The major findings reveal…

  9. Tooth angulation and dental arch perimeter-the effect of orthodontic bracket prescription.

    Science.gov (United States)

    Pontes, Luana F; Cecim, Rodolpho L; Machado, Sissy M; Normando, David

    2015-08-01

    The aim of this study was to evaluate the effects of upper incisors and canine angulations introduced by different bracket prescriptions on dental arch perimeter. Cone beam computerized tomography scans collected using I-Cat (Imaging Sciences International, Hatfield, PA, USA) were selected conveniently from a database of routine exams of a clinical radiology center. Crown and radicular measurements of upper incisors and canines were made and exported to the Autocad 2011 software to create a virtual dental model. The virtual teeth were positioned with an angulation of zero; thereafter, a reference value for the perimeter of the arch was measured. Furthermore, teeth angulations were applied according to the standards of the Edgewise bracket system and the Straight-wire systems: MBT, Capelozza, Andrews, and Roth. The largest linear distances for tooth crown (anterior arch perimeter) and root (radicular distance) were obtained for each bracket prescription. The anterior perimeter for well-aligned incisors and canines without angulation was used as reference (crown: 47.34mm; root: 39.13mm). An increase in the arch perimeter was obtained for all bracket prescriptions evaluated, which ranged from 0.28 and 3.19mm in the Edgewise technique, for the crown and root measurements, respectively, to 1.09 and 11.28mm for the Roth prescription. Bracket prescriptions with greater angulation led to an increased use of space within the dental arch, mainly in the radicular region. The consequence of this radicular angular displacement will need to be further investigated. © The Author 2014. Published by Oxford University Press on behalf of the European Orthodontic Society. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  10. The North Atlantic Treaty Organization and the European Union’s Common Security and Defense Policy: Intersecting Trajectories

    Science.gov (United States)

    2011-07-01

    Lieutenant General, Canadian Forces, Canadian Military Repre- sentative to NATO Elizabeth Race, Deputy Defence Policy Advisor, Canadian Joint...Ruehle, Head, Energy Security Section, Emerging Security Challenges Division, NATO ( Brus - sels) Patrick Nash, Lieutenant General, Irish Army, for- mer

  11. Norms Versus Security: What is More Important to Japan’s View of Nuclear Weapons

    Science.gov (United States)

    2017-03-01

    SECURITY : WHAT IS MORE IMPORTANT TO JAPAN’S VIEW OF NUCLEAR WEAPONS? by Calvin W. Dillard March 2017 Thesis Advisor: S. Paul Kapur Second...TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE NORMS VERSUS SECURITY : WHAT IS MORE IMPORTANT TO JAPAN’S VIEW OF NUCLEAR WEAPONS... security concerns and technology are important in determining whether a nation will create a weapons program while politics, economics, and security

  12. Visual field examination method using virtual reality glasses compared with the Humphrey perimeter

    Directory of Open Access Journals (Sweden)

    Tsapakis S

    2017-08-01

    Full Text Available Stylianos Tsapakis, Dimitrios Papaconstantinou, Andreas Diagourtas, Konstantinos Droutsas, Konstantinos Andreanos, Marilita M Moschos, Dimitrios Brouzas 1st Department of Ophthalmology, National and Kapodistrian University of Athens, Athens, Greece Purpose: To present a visual field examination method using virtual reality glasses and evaluate the reliability of the method by comparing the results with those of the Humphrey perimeter.Materials and methods: Virtual reality glasses, a smartphone with a 6 inch display, and software that implements a fast-threshold 3 dB step staircase algorithm for the central 24° of visual field (52 points were used to test 20 eyes of 10 patients, who were tested in a random and consecutive order as they appeared in our glaucoma department. The results were compared with those obtained from the same patients using the Humphrey perimeter.Results: High correlation coefficient (r=0.808, P<0.0001 was found between the virtual reality visual field test and the Humphrey perimeter visual field.Conclusion: Visual field examination results using virtual reality glasses have a high correlation with the Humphrey perimeter allowing the method to be suitable for probable clinical use. Keywords: visual fields, virtual reality glasses, perimetry, visual fields software, smartphone

  13. An Iraq C-130 Aviation Advisor Mission and Lessons for the Future

    National Research Council Canada - National Science Library

    Bauer, Michael J

    2007-01-01

    .... A review of lessons learned from the initial Iraq C-130 advisor mission provided insights into challenges stemming from differences in United States advisors and Iraqi airmen in language, culture...

  14. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    terrorist or criminal targets based on their grade, assignment, symbolic value, criticality, and threat and vulnerability assessment. Levels of protection The recommendations contained in this criterion are intended to minimize the possibility of HRP casualties in buildings or portions of buildings in which they work and live. These recommendations provide appropriate and implementable measures to establish a level of protection against terrorist attacks where no known threat of terrorist activity currently exists. While complete protection against all potential threats is cost prohibitive, the intent of these recommendations can be achieved through prudent master planning, real estate acquisition, and design and construction practices. Tag number The tag number at the beginning of each physical security measure (recommendation is unique and is intended to be a communication aid when linking the requirement (recommendation to the supporting text or commentary. The three-character tag number uses the following legend. Tag Number First Character -The first character is an abbreviation for the defense zone layer that is most applicable for the countermeasure. “S” is used to represent site or external zone issues. “P” is used to represent the perimeter zone. “G” is used to represent issues relative to the property grounds. “E” is used to represent issues associated with the building exterior of the HRP office or residence. “I” is used to represent issues associated with the building interior. “H” is used to represent issues associated with the safe room or safe haven. Tag Number Second Character - The second character is a sequential number for countermeasures in a given zone - a requirement or a recommendation. This number ensures a unique tag number. Tag Number Third Character- The third character indicates whether the countermeasure is applicable to offices, residences, or both (common. “O” indicates a requirement or recommendation unique to

  15. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  16. The Advisor and Instructor as a Dynamic Duo: Academic Motivation and Basic Psychological Needs

    Science.gov (United States)

    Burt, Tracie D.; Young-Jones, Adena D.; Yadon, Carly A.; Carr, Michael T.

    2013-01-01

    Students learn in and out of a formal classroom, and instructors and academic advisors play key roles in academic motivation and learning. Therefore, through the lens of self-determination theory, we examined the ways perceived support from instructors and advisors relates to satisfaction of college students' basic psychological needs. Advisor and…

  17. Urban Design Dimension Of Informality At The Perimeter Of Brawijaya University And UIN Maliki Malang

    Directory of Open Access Journals (Sweden)

    Tyaghita Cesarin Binar

    2018-01-01

    Full Text Available Informality is one of the commonly emerged issues in urban design which rarely explored, especially informality within university’s perimeter. Brawijaya as one of the biggest and oldest University in Malang over time has boosted the development of several of its perimeter, provided several hotspots for students and youth. These rapid hotspots growth is related to the growth of informal practices. For cities that developed by its universities, it is necessary to understand both of the formal and informal practices within its perimeter. Through this study I would like to know the characteristic of informality within university perimeter, which formed by Brawijaya, UIN Maliki, and ITN; and to frame it within Carmona’s Urban Design Dimension. Mapping is utilized as a primary method to analyze both formal and informality within site. The formal aspect consists of formal activities, function and site user. While informality mapper consists of street vendors and street art. The research found that while urban informality within Brawijaya and UIN Maliki are related to the character and morphology, its formal structure has; its relation is reciprocal. The morphological, visual and functional dimension of university perimeter is driven by the social, perceptual and temporal dimension formed by its user and showed through informality.

  18. Student goal orientation in learning inquiry skills with modifiable software advisors

    Science.gov (United States)

    Shimoda, Todd Adrian

    A computer support environment (SCI-WISE) for learning and doing inquiry was designed. The system incorporates software advisors that give task completion advice (eg., forming hypotheses), general purpose advice (e.g., brainstorming), or system modification advice. Advisors' knowledge includes concepts, strategies, examples, referrals to other advisors, and criteria for evaluating good products and skills. Students using SCI-WISE can select the advisors' advice type (specific, general, or hints), and when advisors give advice (anytime, alert, or ask). Students can also modify the advisors' knowledge. The system is designed partly on a theoretical framework that assumes giving students higher levels of agency will facilitate higher-level goal orientation (such as knowledge-building) and produce higher levels of competence. In two studies of sixth graders, science students took a pretest of an open-ended inquiry question and a questionnaire that measured their goal orientations. The students worked in pairs on an inquiry project about memory, using one of two versions of SCI-WISE, one modifiable and one not modifiable. After finishing the project, the students took a posttest similar to the pretest, and evaluated the system. The main hypotheses predicted that knowledge-oriented students using the modifiable version would rate the system higher, use it more effectively, and do better on the inquiry posttest than task-oriented students. The results supported many of the hypotheses generated from the theoretical framework. Knowledge-oriented students tended to rate SCI-WISE higher, use more general purpose and system development advisors, and select more general advice and hints than task-oriented students. On the posttest inquiry test, students with higher goal orientations scored higher on average, particularly when paired with another knowledge oriented student. The studies also showed that goal orientation was not correlated with grade point average. Finally, the

  19. Knowledge representation and knowledge base design for operator advisor system

    International Nuclear Information System (INIS)

    Hangos, K.M.; Sziano, T.; Tapolcai, L.

    1990-01-01

    The problems of knowledge representation, knowledge base handling and design has been described for an Operator Advisor System in the Paks Nuclear Power Plant. The Operator Advisor System is to be implemented as a part of the 5th and 6th unit. The knowledge of the Operator Advisor system is described by a few elementary knowledge items (diagnostic event functions, fault graph, action trees), weighted directed graphs have been found as their common structure. List-type and relational representation of these graphs have been used for the on-line and off-line part of the knowledge base respectively. A uniform data base design and handling has been proposed which consists of a design system, a knowledge base editor and a knowledge base compiler

  20. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Science.gov (United States)

    2010-08-23

    ... within that agency. Sec. 2. Policy Direction. With policy guidance from the National Security Advisor and... of other agencies and representatives of SLTPS entities, as nominated by any Committee member and...

  1. The Remote Security Station (RSS) final report

    International Nuclear Information System (INIS)

    Pletta, J.B.; Amai, W.A.; Klarer, P.; Frank, D.; Carlson, J.; Byrne, R.

    1992-10-01

    The Remote Security Station (RSS) was developed by Sandia National Laboratories for the Defense Nuclear Agency to investigate issues pertaining to robotics and sensor fusion in physical security systems. This final report documents the status of the RSS program at its completion in April 1992. The RSS system consists of the Man Portable Security Station (MaPSS) and the Telemanaged Mobile Security Station (TMSS), which are integrated by the Operator's Control Unit (OCU) into a flexible exterior perimeter security system. The RSS system uses optical, infrared, microwave, and acoustic intrusion detection sensors in conjunction with sensor fusion techniques to increase the probability of detection and to decrease the nuisance alarm rate of the system. Major improvements to the system developed during the final year are an autonomous patrol capability, which allows TMSS to execute security patrols with limited operator interaction, and a neural network approach to sensor fusion, which significantly improves the system's ability to filter out nuisance alarms due to adverse weather conditions

  2. Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations

    Science.gov (United States)

    Davis, Robert E.

    2017-01-01

    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing…

  3. Explaining Doctoral Students' Relational Maintenance with Their Advisor: A Psychosocial Development Perspective

    Science.gov (United States)

    Goldman, Zachary W.; Goodboy, Alan K.

    2017-01-01

    This study explored how psychosocial development affects doctoral students' relationship and communication with their advisor. Chickering and Reisser's vectors of psychosocial development were examined in the doctoral context to understand how students preserve communicatively satisfying relationships with their advisor through the use of…

  4. Solar Advisor Model User Guide for Version 2.0

    Energy Technology Data Exchange (ETDEWEB)

    Gilman, P.; Blair, N.; Mehos, M.; Christensen, C.; Janzou, S.; Cameron, C.

    2008-08-01

    The Solar Advisor Model (SAM) provides a consistent framework for analyzing and comparing power system costs and performance across the range of solar technologies and markets, from photovoltaic systems for residential and commercial markets to concentrating solar power and large photovoltaic systems for utility markets. This manual describes Version 2.0 of the software, which can model photovoltaic and concentrating solar power technologies for electric applications for several markets. The current version of the Solar Advisor Model does not model solar heating and lighting technologies.

  5. Economy Over Security: Why Crises Fail to Impact Economic Behavior in East Asia

    Science.gov (United States)

    2017-12-01

    SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST ASIA by Aaron R. Sipos December 2017 Thesis Advisor: Michael Glosny Second...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ECONOMY OVER SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST...release. Distribution is unlimited. 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) This study examines changes in economic behavior in

  6. Convex lattice polygons of fixed area with perimeter-dependent weights.

    Science.gov (United States)

    Rajesh, R; Dhar, Deepak

    2005-01-01

    We study fully convex polygons with a given area, and variable perimeter length on square and hexagonal lattices. We attach a weight tm to a convex polygon of perimeter m and show that the sum of weights of all polygons with a fixed area s varies as s(-theta(conv))eK(t)square root(s) for large s and t less than a critical threshold tc, where K(t) is a t-dependent constant, and theta(conv) is a critical exponent which does not change with t. Using heuristic arguments, we find that theta(conv) is 1/4 for the square lattice, but -1/4 for the hexagonal lattice. The reason for this unexpected nonuniversality of theta(conv) is traced to existence of sharp corners in the asymptotic shape of these polygons.

  7. The American Military Advisor: Dealing with Senior Foreign Officials in the Islamic World

    National Research Council Canada - National Science Library

    Metrinko, Michael J

    2008-01-01

    "The American Military Advisor: Dealing with Senior Foreign Officials in the Islamic World" is a comprehensive guide for American military officers assigned as advisors to regional officials in places very different from the United States...

  8. Training need analysis for energy efficiency advisors and data bank of available training programs (9255 U 965)

    International Nuclear Information System (INIS)

    Lail, K.S.

    1995-01-01

    Development of a skill profile for an 'energy efficiency advisor' position, and production of a data base of available training programs undertaken by the Power Acquisition department of B.C. Hydro, were described. Driving forces for products and services at competitive prices and transition factors crucial to successful market positioning were outlined, along with future plans for securing a foothold in British Columbia. Desirable market oriented management principles and dynamic competitive marketing strategies were noted. It was concluded that the progression toward market-based dynamics would make changes occur more quickly and would require the introduction of tailored products and services

  9. Senior Media Relations Advisor | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In addition, the Advisor contributes to the Centre's corporate strategic and ... of media strategies, opportunities, approaches, and initiatives to enhance awareness, ... The job demands strategic thinking and planning skills as well as diplomacy, ...

  10. Compensation Services Advisor | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Job Summary The Compensation Services Advisor is accountable for the effective ... Coordinates the annual Performance Review and Assessment System ... by IDRC and the broader financial and social implications of working in Canada. ... in areas such as mortgages, credit and so on to individuals not accustomed to ...

  11. Industrial-Organizational and Human Factors Graduate Program Admission: Information for Undergraduate Advisors

    Science.gov (United States)

    Shoenfelt, Elizabeth L.; Stone, Nancy J.; Kottke, Janet L.

    2015-01-01

    Many psychology departments do not have industrial-organizational (IO) or human factors (HF) faculty members. As such, potential IO and HF graduate students may miss career opportunities because faculty advisors are unfamiliar with the disciplines and their graduate programs. To assist advisors, this article highlights the content of IO and HF…

  12. Symmetric Link Key Management for Secure Neighbor Discovery in a Decentralized Wireless Sensor Network

    Science.gov (United States)

    2017-09-01

    KEY MANAGEMENT FOR SECURE NEIGHBOR DISCOVERY IN A DECENTRALIZED WIRELESS SENSOR NETWORK by Kelvin T. Chew September 2017 Thesis Advisor...and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT...DATE September 2017 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE SYMMETRIC LINK KEY MANAGEMENT FOR SECURE NEIGHBOR

  13. The Home, the Family and the Energy Advisor

    DEFF Research Database (Denmark)

    Tjørring, Lise

    within. The empirical focus is on the households' potential to perform energy renovations of their homes and adopt flexible electricity use. Four papers investigate what characterises the social and gendered engagements among the home, the family and the energy advisor and the implications...... events, social relations, historical conditions and social status. These findings call for new methods to increase the number of energy renovations and the likelihood of adopting flexible electricity use. We must focus on the home not only as a technical issue that can be improved but also as a dwelling...... space that contains gendered practices, cultural norms and social engagements among the home, the family and the energy advisor....

  14. Developmental Dyscalculia and Automatic Magnitudes Processing: Investigating Interference Effects between Area and Perimeter

    Directory of Open Access Journals (Sweden)

    Hili Eidlin-Levy

    2017-12-01

    Full Text Available The relationship between numbers and other magnitudes has been extensively investigated in the scientific literature. Here, the objectives were to examine whether two continuous magnitudes, area and perimeter, are automatically processed and whether adults with developmental dyscalculia (DD are deficient in their ability to automatically process one or both of these magnitudes. Fifty-seven students (30 with DD and 27 with typical development performed a novel Stroop-like task requiring estimation of one aspect (area or perimeter while ignoring the other. In order to track possible changes in automaticity due to practice, we measured performance after initial and continuous exposure to stimuli. Similar to previous findings, current results show a significant group × congruency interaction, evident beyond exposure level or magnitude type. That is, the DD group systematically showed larger Stroop effects. However, analysis of each exposure period showed that during initial exposure to stimuli the DD group showed larger Stroop effects in the perimeter and not in the area task. In contrast, during continuous exposure to stimuli no triple interaction was evident. It is concluded that both magnitudes are automatically processed. Nevertheless, individuals with DD are deficient in inhibiting irrelevant magnitude information in general and, specifically, struggle to inhibit salient area information after initial exposure to a perimeter comparison task. Accordingly, the findings support the assumption that DD involves a deficiency in multiple cognitive components, which include domain-specific and domain-general cognitive functions.

  15. Developmental Dyscalculia and Automatic Magnitudes Processing: Investigating Interference Effects between Area and Perimeter.

    Science.gov (United States)

    Eidlin-Levy, Hili; Rubinsten, Orly

    2017-01-01

    The relationship between numbers and other magnitudes has been extensively investigated in the scientific literature. Here, the objectives were to examine whether two continuous magnitudes, area and perimeter, are automatically processed and whether adults with developmental dyscalculia (DD) are deficient in their ability to automatically process one or both of these magnitudes. Fifty-seven students (30 with DD and 27 with typical development) performed a novel Stroop-like task requiring estimation of one aspect (area or perimeter) while ignoring the other. In order to track possible changes in automaticity due to practice, we measured performance after initial and continuous exposure to stimuli. Similar to previous findings, current results show a significant group × congruency interaction, evident beyond exposure level or magnitude type. That is, the DD group systematically showed larger Stroop effects. However, analysis of each exposure period showed that during initial exposure to stimuli the DD group showed larger Stroop effects in the perimeter and not in the area task. In contrast, during continuous exposure to stimuli no triple interaction was evident. It is concluded that both magnitudes are automatically processed. Nevertheless, individuals with DD are deficient in inhibiting irrelevant magnitude information in general and, specifically, struggle to inhibit salient area information after initial exposure to a perimeter comparison task. Accordingly, the findings support the assumption that DD involves a deficiency in multiple cognitive components, which include domain-specific and domain-general cognitive functions.

  16. The influence of TripAdvisor portal on hotel bussines in Serbia

    Directory of Open Access Journals (Sweden)

    Čačić Krunoslav

    2013-01-01

    Full Text Available Numerous researches have shown the existence of influence of specialized Web 2.0 portals on hotel business. One of most famous portals of that kind is TripAdvisor. The goal of this work is to determine the degree and mode of representation of hotels in Serbia on TripAdvisor portal. The results of the conducted research show that in past years the number of hotels from Serbia represented on this portal has increased significantly. At the end of 2012 there have been registered 3.288 comments which evaluated the service quality of 165 hotels from Serbia. The average vote, on five-degree scale, calculated at the level of all represented hotels at the end of 2012 was 3,92. Considering that Belgrade represents the primarily business, administrative and touristic center of Serbia, on the Belgrade's hotels specimen there has been analyzed the connection between business performances of hotels expressed through indicator TREVPAR and their image on TripAdvisor expressed through average vote determined based on user's comments, as well as in relation with TripAdvisor Popularity Index (TPI. The results show the high degree of correlation between analyzed features on the specimen of Belgrade's hotels, in range of hotels of second (4* and third category (3*. Having in mind the results of conducted research it is obvious that the hotels managers from Serbia should adopt and implement the corresponding procedures of monitoring and adequate reactions on contents on TripAdvisor, considering their influence on behavior of modern consumer in hotels.

  17. A Preliminary Report of Advisor Perceptions of Advising and of a Profession

    Science.gov (United States)

    Aiken-Wisniewski, Sharon A.; Johnson, Anna; Larson, Joshua; Barkemeyer, Jason

    2015-01-01

    Practicing advisors may not agree, know, or understand that advising does not meet the scholarly definition of a profession. Through a phenomenological study, members of NACADA: The Global Community for Academic Advising were invited to describe the position of academic advisor. The data gathered were used to address two research questions:…

  18. United States Security Assistance 1977-1980: Human Rights Issues Affecting Arms Transfers.

    Science.gov (United States)

    1995-09-01

    police attempted to break up the gathering, the crowd became enraged and proceeded to destroy a number of banks, cinemas , and hotels (Brown:296...According to Carter’s National Security Advisor, Zbigniew Brzezinski, the Peruvian government released over 300 prisoners in April 1977; "disappearances

  19. 2001 Joint ADVISOR/PSAT Vehicle Systems Modeling User's Conference Proceedings (CD)

    International Nuclear Information System (INIS)

    Markel, T.

    2001-01-01

    The 2001 Joint ADVISOR/PSAT Vehicle Systems Modeling User Conference provided an opportunity for engineers in the automotive industry and the research environment to share their experiences in vehicle systems modeling using ADVISOR and PSAT. ADVISOR and PSAT are vehicle systems modeling tools developed and supported by the National Renewable Energy Laboratory and Argonne National Laboratory respectively with the financial support of the US Department of Energy. During this conference peers presented the results of studies using the simulation tools and improvements that they have made or would like to see in the simulation tools. Focus areas of the presentations included Control Strategy, Model Validation, Optimization and Co-Simulation, Model Development, Applications, and Fuel Cell Vehicle Systems Analysis. Attendees were offered the opportunity to give feedback on future model development plans

  20. Safety review advisor

    International Nuclear Information System (INIS)

    Boshers, J.A.; Uhrig, R.E.; Alguindigue, I.A.; Burnett, C.G.

    1991-01-01

    The University of Tennessee's Nuclear Engineering department, in cooperation with the Tennessee Valley Authority (TVA), is evaluating the feasibility of utilizing an expert system to aid in 10CFR50.59 evaluations. This paper discusses the history of 10CFR50.59 reviews, and details the development approach used in the construction of a prototype Safety Review Advisor (SRA). The goals for this expert system prototype are to aid the engineer in the evaluation process by directing his attention to the appropriate critical issues, increase the efficiency, consistency, and thoroughness of the evaluation process, and provide a foundation of appropriate Safety Analysis Report (SAR) references for the reviewer

  1. 78 FR 11865 - President's Board of Advisors on Historically Black Colleges and Universities

    Science.gov (United States)

    2013-02-20

    .... Brown, Jr., White House Initiative on Historically Black Colleges and Universities, U.S. Department of... DEPARTMENT OF EDUCATION President's Board of Advisors on Historically Black Colleges and Universities AGENCY: U.S. Department of Education, President's Board of Advisors on Historically Black Colleges...

  2. 78 FR 14297 - President's Board of Advisors on Historically Black Colleges and Universities

    Science.gov (United States)

    2013-03-05

    ... DEPARTMENT OF EDUCATION President's Board of Advisors on Historically Black Colleges and... Board of Advisors on Historically Black Colleges and Universities scheduled for March 6, 2013, and... for a date to be announced in the future. FOR FURTHER INFORMATION CONTACT: John P. Brown, Designated...

  3. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    communication theory. Author, Timothy Coombs , in Ongoing Crisis Communication , discusses the need for a crisis management 10 plan to prepare for potential... COMMUNICATION : A NEW CRISIS COMMUNICATION STRATEGY FOR HOMELAND SECURITY by Sharon L. Watson March 2012 Thesis Advisor: Christopher Bellavita...REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Resilient Communication : A New Crisis Communication

  4. THE ROLE OF 'PROFESSIONAL ADVISORS ON FINANCIAL MATTERS' IN ENTREPRENEURIAL NETWORKS

    OpenAIRE

    KIM KLYVER; KEVIN HINDLE

    2010-01-01

    This study investigated the influence that 'professional advisors on financial matters' have in comparison with other people with whom entrepreneurs discuss their venture. Based on follow-up surveys completed in relation to the Danish participation in the Global Entrepreneurship Monitor (GEM) survey, it was found that professional advisors on financial matters only play a minor role in the two early phases of the entrepreneurial process before the venture is actually started. It was further r...

  5. Factors leading to the involvement of Forensic Advisors in the Belgian criminal justice system.

    Science.gov (United States)

    Bitzer, Sonja

    2018-04-01

    Forensic Advisors at the National Institute for Criminalistics and Criminology in Brussels act as advising body to the magistrate regarding analytical possibilities and the usefulness of trace analysis in a case. Initially, their function was devised to assist in complex murder cases with unknown offender. However, in a previous study, the increasing diversity of the cases they are requested for has been observed (Bitzer et al., in press). In order to deepen our understanding of the decision steps in the criminal investigation process, the decision to involve a Forensic Advisor and the factors leading to their involvement were evaluated. The study focused on homicide, robbery and burglary cases with and without requests for a Forensic Advisor between January 2014 and June 2016. The factors were categorised into five knowledge dimensions: strategic, immediate, physical, criminal and utility. Decision tree modelling was carried out in order to identify the factors influencing the request for a Forensic Advisor in the case. The decision to request a Forensic Advisor differs between different types of offences. It also depends on the complexity of the case in terms of the number of traces and objects collected at the crime scene, and the availability of witness reports. Indeed, Forensic Advisors take the role of trace analysis coordinator by providing an overview of all available traces, objects, analyses and results. According to the principal implication factors and the performed case study, the contribution of Forensic Advisors consists mainly in summarising all information and advise on potential additional analyses. This might be explained by a loss of overview of the information and the possibilities regarding trace analysis by the magistrate responsible of the case. Copyright © 2018 Elsevier B.V. All rights reserved.

  6. Guide to good practices for the selection, training, and qualification of shift technical advisors

    Energy Technology Data Exchange (ETDEWEB)

    1993-02-01

    The DOE Guide to Good Practices For The Selection, Training, and Qualification of Shift Technical Advisors can be used by any DOE nuclear facility that has implemented the shift technical advisor position. DOE Order 5480-20, ``Personnel Selection, Qualification, Training, and Staffing Requirements at DOE Reactor and Non-Reactor Nuclear Facilities,`` states that only Category A reactors must use shift technical advisor position. However, many DOE nuclear facilities have implemented the shift technical advisor position to provide independent on-shift technical advice and counsel to the shift operating personnel to help determine cause and mitigation of facility accidents. Those DOE nuclear facilities that have implemented or are going to implement the shift technical advisor position will find this guide useful. This guide addresses areas that may be covered by other training programs. In these cases, it is unnecessary (and undesirable) to duplicate these areas in the STA training program as long as the specific skills and knowledge essential for STAs are addressed. The guide is presented based on the premise that the trainee has not completed any facility-specific training other than general employee training.

  7. Viewpoints of students of Shahid Sadoughi University of Medical Sciences regarding their academic advisors

    Directory of Open Access Journals (Sweden)

    M.H Fallah Yakhdani

    2012-02-01

    Results: The majority of samples were from Nursing, Midwifery, and Public Health School and a few from Faculty of Medicine. The majority of students (41.8% agreed to have the same advisor from the first term to the last. Also the results showed that the functions of advisors were poor in the areas of constant supervision and monitoring of students’ educational status (35.8%, preparing the timetable for performing the personal or group counseling (41.8% and providing counseling sessions according to the timetable (42.3%. But their functions were fair in the areas of acceptable guidance of students in the educational problems (35.1%, and the advisor’s familiarity to educational regulations (43.9%. It is necessary to note that the advisor's ability in making the intimate relationship with students (37.1%, and the advisors’ motivation and tendency to guidance and counseling (30.1% were the two items evaluated excellent by students. Conclusion: It is necessary that advisors make the students familiar with educational regulations at the first semester of higher education. Also, the policies and regulations for advisors will clarify their activities and will help them to perform better.

  8. Safety review advisor

    International Nuclear Information System (INIS)

    Boshers, J.A.; Alguindigue, I.E.; Uhrig, R.E.

    1989-01-01

    The University of Tennessee's Nuclear Engineering Department, in cooperation with the Tennessee Valley Authority (TVA), is evaluating the feasibility of utilizing an expert system to aid in 10CFR50.59 evaluations. This paper discusses the history of 10CFR50.59 reviews, and details the development approach used in the construction of a prototype Safety Review Advisor (SRA). The goals for this expert system prototype are to (1) aid the engineer in the evaluation process by directing his attention to the appropriate critical issues, (2) increase the efficiency, consistency, and thoroughness of the evaluation process, and (3) provide a foundation of appropriate Safety Analysis Report (SAR) references for the reviewer. 6 refs., 2 figs

  9. Thomas Sinks, Director, Office of the Science Advisor

    Science.gov (United States)

    Biography of the Director of the Office of the Science Advisor which is responsible for is responsible for EPA’s human subject research ethics, scientific integrity, and developing cross-agency science policy guidance.

  10. GSA Advisors' Self-Efficacy Related to LGBT Youth of Color and Transgender Youth

    Science.gov (United States)

    Poteat, V. Paul; Scheer, Jillian R.

    2016-01-01

    Gay-Straight Alliances (GSAs) serve lesbian, gay, bisexual, transgender (LGBT) and heterosexual youth from diverse backgrounds. Although some attention has been given to youth members in general, little attention has been given to adult advisors. Among 47 GSA advisors from 33 high schools (39 cisgender female, 8 cisgender male), the authors…

  11. How do incentives lead to deception in advisor-client interactions? Explicit and implicit strategies of self-interested deception.

    Science.gov (United States)

    Mackinger, Barbara; Jonas, Eva

    2012-01-01

    When confronted with important questions we like to rely on the advice of experts. However, uncertainty can occur regarding advisors' motivation to pursue self-interest and deceive the client. This can especially occur when the advisor has the possibility to receive an incentive by recommending a certain alternative. We investigated how the possibility to pursue self-interest led to explicit strategic behavior (bias in recommendation and transfer of information) and to implicit strategic behavior (bias in information processing: evaluation and memory). In Study 1 explicit strategic behavior could be identified: self-interested advisors recommended more often the self-serving alternative and transferred more self-interested biased information to their client compared to the advisor without specific interest. Also deception through implicit strategic behavior was identified: self-interested advisors biased the evaluation of information less in favor of the client compared to the control group. Self-interested advisors also remembered conflicting information regarding their self-interest worse compared to advisors without self-interest. In Study 2 beside self-interest we assessed accountability which interacted with self-interest and increased the bias: when accountability was high advisor's self-interest led to higher explicit strategic behavior (less transfer of conflicting information), and to higher implicit strategic behavior (devaluated and remembered less conflicting information). Both studies identified implicit strategic behavior as mediator which can explain the relation between self-interest and explicit strategic behavior. Results of both studies suggest that self-interested advisors use explicit and implicit strategic behavior to receive an incentive. Thus, advisors do not only consciously inform their clients "self-interested," but they are influenced unconsciously by biased information processing - a tendency which even increased with high

  12. DAVID: A new video motion sensor for outdoor perimeter applications

    International Nuclear Information System (INIS)

    Alexander, J.C.

    1986-01-01

    To be effective, a perimeter intrusion detection system must comprise both sensor and rapid assessment components. The use of closed circuit television (CCTV) to provide the rapid assessment capability, makes possible the use of video motion detection (VMD) processing as a system sensor component. Despite it's conceptual appeal, video motion detection has not been widely used in outdoor perimeter systems because of an inability to discriminate between genuine intrusions and numerous environmental effects such as cloud shadows, wind motion, reflections, precipitation, etc. The result has been an unacceptably high false alarm rate and operator work-load. DAVID (Digital Automatic Video Intrusion Detector) utilizes new digital signal processing techniques to achieve a dramatic improvement in discrimination performance thereby making video motion detection practical for outdoor applications. This paper begins with a discussion of the key considerations in implementing an outdoor video intrusion detection system, followed by a description of the DAVID design in light of these considerations

  13. P50/P90 Analysis for Solar Energy Systems Using the System Advisor Model: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Dobos, A. P.; Gilman, P.; Kasberg, M.

    2012-06-01

    To secure competitive financing for a solar energy generation project, the economic risk associated with interannual solar resource variability must be quantified. One way to quantify this risk is to calculate exceedance probabilities representing the amount of energy expected to be produced by a plant. Many years of solar radiation and metereological data are required to determine these values, often called P50 or P90 values for the level of certainty they represent. This paper describes the two methods implemented in the National Renewable Energy Laboratory's System Advisor Model (SAM) to calculate P50 and P90 exceedance probabilities for solar energy projects. The methodology and supporting data sets are applicable to photovoltaic, solar water heating, and concentrating solar power (CSP) systems.

  14. Returning to Our Small Wars Roots: Preparing Marine Advisors to Help Other Lands Meet Future Threats

    Science.gov (United States)

    2012-04-26

    1918 uprising. Not surprisingly, the best qualified Marines like Smedley Butler were sent to France, adding to these challenges. When confronted... Robert S. McNamara authorized advisors for each province and advisory teams for each combat battalion. In addition to the increased role advisors...University of Pennsylvania Press, 2009), 51. 17 Ibid, 40. 18 Ibid. 19 Ramsey III, Robert D., Advising Indigenous Forces: American Advisors in

  15. Top scientists join Stephen Hawking at Perimeter Institute

    Science.gov (United States)

    Banks, Michael

    2009-03-01

    Nine leading researchers are to join Stephen Hawking as visiting fellows at the Perimeter Institute for Theoretical Physics in Ontario, Canada. The researchers, who include string theorists Leonard Susskind from Stanford University and Asoka Sen from the Harisch-Chandra Research Institute in India, will each spend a few months of the year at the institute as "distinguished research chairs". They will be joined by another 30 scientists to be announced at a later date.

  16. Asymptotics of the $s$-perimeter as $s\\searrow 0$

    OpenAIRE

    Dipierro, Serena; Figalli, Alessio; Palatucci, Giampiero; Valdinoci, Enrico

    2012-01-01

    We deal with the asymptotic behavior of the $s$-perimeter of a set $E$ inside a domain $\\Omega$ as $s\\searrow0$. We prove necessary and sufficient conditions for the existence of such limit, by also providing an explicit formulation in terms of the Lebesgue measure of $E$ and $\\Omega$. Moreover, we construct examples of sets for which the limit does not exist.

  17. 75 FR 79061 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2010-12-17

    ... securities advisors--the Commission seeks comment on whether the proposed structure of the MSRB Nominating... membership on the Board, in order to establish a Nominating Committee in compliance with MSRB transitional... appropriate prior to the creation of the Nominating Committee of the MSRB (hereinafter, ``Nominating and...

  18. LIA: An Intelligent Advisor for E-Learning

    Science.gov (United States)

    Capuano, Nicola; Gaeta, Matteo; Marengo, Agostino; Miranda, Sergio; Orciuoli, Francesco; Ritrovato, Pierluigi

    2009-01-01

    Intelligent e-learning systems have revolutionized online education by providing individualized and personalized instruction for each learner. Nevertheless, until now very few systems were able to leave academic laboratories and be integrated into real commercial products. One of these few exceptions is the Learning Intelligent Advisor (LIA)…

  19. 78 FR 44607 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of a...

    Science.gov (United States)

    2013-07-24

    ... (collectively ``regulated entities''). It is governed by a 21- member board composed of eleven independent... directors in overseeing the municipal securities market, it is imperative that the board identify candidates... non- dealer municipal advisors. The public representatives must be independent of any regulated entity...

  20. SPILC: An expert student advisor

    Science.gov (United States)

    Read, D. R.

    1990-01-01

    The Lamar University Computer Science Department serves about 350 undergraduate C.S. majors, and 70 graduate majors. B.S. degrees are offered in Computer Science and Computer and Information Science, and an M.S. degree is offered in Computer Science. In addition, the Computer Science Department plays a strong service role, offering approximately sixteen service course sections per long semester. The department has eight regular full-time faculty members, including the Department Chairman and the Undergraduate Advisor, and from three to seven part-time faculty members. Due to the small number of regular faculty members and the resulting very heavy teaching loads, undergraduate advising has become a difficult problem for the department. There is a one week early registration period and a three-day regular registration period once each semester. The Undergraduate Advisor's regular teaching load of two classes, 6 - 8 semester hours, per semester, together with the large number of majors and small number of regular faculty, cause long queues and short tempers during these advising periods. The situation is aggravated by the fact that entering freshmen are rarely accompanied by adequate documentation containing the facts necessary for proper counselling. There has been no good method of obtaining necessary facts and documenting both the information provided by the student and the resulting advice offered by the counsellors.

  1. Refined universal laws for hull volumes and perimeters in large planar maps

    International Nuclear Information System (INIS)

    Guitter, Emmanuel

    2017-01-01

    We consider ensembles of planar maps with two marked vertices at distance k from each other, and look at the closed line separating these vertices and lying at distance d from the first one ( d   <   k ). This line divides the map into two components, the hull at distance d which corresponds to the part of the map lying on the same side as the first vertex and its complementary. The number of faces within the hull is called the hull volume, and the length of the separating line the hull perimeter. We study the statistics of the hull volume and perimeter for arbitrary d and k in the limit of infinitely large planar quadrangulations, triangulations and Eulerian triangulations. We consider more precisely situations where both d and k become large with the ratio d / k remaining finite. For infinitely large maps, two regimes may be encountered: either the hull has a finite volume and its complementary is infinitely large, or the hull itself has an infinite volume and its complementary is of finite size. We compute the probability for the map to be in either regime as a function of d / k as well as a number of universal statistical laws for the hull perimeter and volume when maps are conditioned to be in one regime or the other. (paper)

  2. Design of complex bone internal structure using topology optimization with perimeter control.

    Science.gov (United States)

    Park, Jaejong; Sutradhar, Alok; Shah, Jami J; Paulino, Glaucio H

    2018-03-01

    Large facial bone loss usually requires patient-specific bone implants to restore the structural integrity and functionality that also affects the appearance of each patient. Titanium alloys (e.g., Ti-6Al-4V) are typically used in the interfacial porous coatings between the implant and the surrounding bone to promote stability. There exists a property mismatch between the two that in general leads to complications such as stress-shielding. This biomechanical discrepancy is a hurdle in the design of bone replacements. To alleviate the mismatch, the internal structure of the bone replacements should match that of the bone. Topology optimization has proven to be a good technique for designing bone replacements. However, the complex internal structure of the bone is difficult to mimic using conventional topology optimization methods without additional restrictions. In this work, the complex bone internal structure is recovered using a perimeter control based topology optimization approach. By restricting the solution space by means of the perimeter, the intricate design complexity of bones can be achieved. Three different bone regions with well-known physiological loadings are selected to illustrate the method. Additionally, we found that the target perimeter value and the pattern of the initial distribution play a vital role in obtaining the natural curvatures in the bone internal structures as well as avoiding excessive island patterns. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. Clock Drawing in Spatial Neglect: A Comprehensive Analysis of Clock Perimeter, Placement, and Accuracy

    Science.gov (United States)

    Chen, Peii; Goedert, Kelly M.

    2012-01-01

    Clock drawings produced by right-brain-damaged (RBD) individuals with spatial neglect often contain an abundance of empty space on the left while numbers and hands are placed on the right. However, the clock perimeter is rarely compromised in neglect patients’ drawings. By analyzing clock drawings produced by 71 RBD and 40 healthy adults, this study investigated whether the geometric characteristics of the clock perimeter reveal novel insights to understanding spatial neglect. Neglect participants drew smaller clocks than either healthy or non-neglect RBD participants. While healthy participants’ clock perimeter was close to circular, RBD participants drew radially extended ellipses. The mechanisms for these phenomena were investigated by examining the relation between clock-drawing characteristics and performance on six subtests of the Behavioral Inattention Test (BIT). The findings indicated that the clock shape was independent of any BIT subtest or the drawing placement on the test sheet and that the clock size was significantly predicted by one BIT subtest: the poorer the figure and shape copying, the smaller the clock perimeter. Further analyses revealed that in all participants, clocks decreased in size as they were placed farther from the center of the paper. However, even when neglect participants placed their clocks towards the center of the page, they were smaller than those produced by healthy or non-neglect RBD participants. These results suggest a neglect-specific reduction in the subjectively available workspace for graphic production from memory, consistent with the hypothesis that neglect patients are impaired in the ability to enlarge the attentional aperture. PMID:22390278

  4. The process of candidates choose graduate programs: an analysis from the advisor perspective

    International Nuclear Information System (INIS)

    Nascimento, Ridnal Joao do

    2016-01-01

    This study aims to identify the criteria used by advisors in the decision-making on whether to accept a candidate for mentoring in a postgraduate strictu sensu program and examines possible relationships between this decision and their scientific production and mentees evasion. In order to meet these goals one seeks to identify and analyze the selection criteria of candidates for the master's and doctorate programs at an institution; in this case, the Energy and Nuclear Research Institute - IPEN. More specifically, one seeks to study similarities and differences between those criteria among the advisors; find out whether there is a correlation between the selection criteria and the advisors characteristics (Profile); identify the selection process used by advisors and point out which are the motivations that lead to evasion according to their point of view. To meet these challenges, as the starting point of the research, a conceptual model was designed in order to form the basis for the preparation of the script for the interviews with open-ended questions as to identify the selection criteria used by a small group of advisors with a predefined profile. From that point, based on the responses obtained in interviews, the survey was expanded to all advisors working in the IPEN Postgraduate program by implementing an online survey using Google Docs app for data collection. These data were then analyzed and reorganized according to an operational model of research that would guide the analysis by structural equation modeling (SEM) by means of the SmartPLS software, in order to identify the presence or absence of correlation between the criteria adopted by the advisors and their academic production and the evasion of their mentees, for that one relied on studies in: Bazerman and Moore (2010); Cohen (1988); Hair Jr. et al (2009); Hansmann and Ringle (2004); Martins (1997); Ringle, C.; Silva and Bido (2014); Sousa (2007); Sousa and Yu (2014); Torres (2014); Yu (2011

  5. Feature-based alert correlation in security systems using self organizing maps

    Science.gov (United States)

    Kumar, Munesh; Siddique, Shoaib; Noor, Humera

    2009-04-01

    The security of the networks has been an important concern for any organization. This is especially important for the defense sector as to get unauthorized access to the sensitive information of an organization has been the prime desire for cyber criminals. Many network security techniques like Firewall, VPN Concentrator etc. are deployed at the perimeter of network to deal with attack(s) that occur(s) from exterior of network. But any vulnerability that causes to penetrate the network's perimeter of defense, can exploit the entire network. To deal with such vulnerabilities a system has been evolved with the purpose of generating an alert for any malicious activity triggered against the network and its resources, termed as Intrusion Detection System (IDS). The traditional IDS have still some deficiencies like generating large number of alerts, containing both true and false one etc. By automatically classifying (correlating) various alerts, the high-level analysis of the security status of network can be identified and the job of network security administrator becomes much easier. In this paper we propose to utilize Self Organizing Maps (SOM); an Artificial Neural Network for correlating large amount of logged intrusion alerts based on generic features such as Source/Destination IP Addresses, Port No, Signature ID etc. The different ways in which alerts can be correlated by Artificial Intelligence techniques are also discussed. . We've shown that the strategy described in the paper improves the efficiency of IDS by better correlating the alerts, leading to reduced false positives and increased competence of network administrator.

  6. Towards Rural Land Use: Challenges for Oversizing Urban Perimeters in Shrinking Towns

    Science.gov (United States)

    Sá, João; Virtudes, Ana

    2017-12-01

    This article, based on the literature review, aims to study the challenges of the urban dispersion and oversizing of urban perimeters, in the cases where the towns are shrinking or spreading to the rural land-use. It is focused on the case of Portugal where during the last decades there was an escaping to the big cities alongside to the sea (Atlantic and Mediterranean) shore. In the Interior part of the country, which means near to the border with Spain, several towns are shrinking, despite their huge urban perimeters, proposed by the municipal master plans, since the middle of the nineties. Consequently, these urban perimeters are nowadays oversizing, with empty buildings and non-urbanized areas. At the same time, the social patterns of occupation of this territory have changed significantly, moving from a society with signs of rurality to an urban realm, understood not only in territorial terms but also regarding the current lifestyle. This deep changing has occurred not only in urbanistic terms but also in the economic, cultural and social organizations of the country, under a movement that corresponds to a decline of the small urban settlements in rural areas, far away from the cosmopolitan strip of land nearby the sea, in between the capital city, Lisbon and the second one Oporto. These transformations were not driven by any significant public policy for land-use actions. On the contrary, the production of urban areas, supporting the new model of economic and social development was largely left to the initiative of economic and social private agents and land owners. These agents were the leading responsible for the new urban developments and housing. In this sense, this research aims to present some strategies for the short time period regarding the devolution of urban areas to rural land use. In this sense, the next steps of spatial planning policies, under the role of local authorities (the 308 municipalities including Madeira and Azores islands, plus the

  7. Programs of the Office of the Science Advisor (OSA)

    Science.gov (United States)

    Office of the Science Advisor provides leadership in cross-Agency science and science policy. Program areas: Risk Assessment, Science and Technology Policy, Human Subjects Research, Environmental Measurement and Modeling, Scientific Integrity.

  8. 2001 Joint ADVISOR/PSAT Vehicle Systems Modeling User's Conference Proceedings (CD)

    Energy Technology Data Exchange (ETDEWEB)

    Markel, T.

    2001-08-01

    The 2001 Joint ADVISOR/PSAT Vehicle Systems Modeling User Conference provided an opportunity for engineers in the automotive industry and the research environment to share their experiences in vehicle systems modeling using ADVISOR and PSAT. ADVISOR and PSAT are vehicle systems modeling tools developed and supported by the National Renewable Energy Laboratory and Argonne National Laboratory respectively with the financial support of the US Department of Energy. During this conference peers presented the results of studies using the simulation tools and improvements that they have made or would like to see in the simulation tools. Focus areas of the presentations included Control Strategy, Model Validation, Optimization and Co-Simulation, Model Development, Applications, and Fuel Cell Vehicle Systems Analysis. Attendees were offered the opportunity to give feedback on future model development plans.

  9. To Whistleblow or Not to Whistleblow: Affective and Cognitive Differences in Reporting Peers and Advisors.

    Science.gov (United States)

    McIntosh, Tristan; Higgs, Cory; Turner, Megan; Partlow, Paul; Steele, Logan; MacDougall, Alexandra E; Connelly, Shane; Mumford, Michael D

    2017-09-20

    Traditional whistleblowing theories have purported that whistleblowers engage in a rational process in determining whether or not to blow the whistle on misconduct. However, stressors inherent to whistleblowing often impede rational thinking and act as a barrier to effective whistleblowing. The negative impact of these stressors on whistleblowing may be made worse depending on who engages in the misconduct: a peer or advisor. In the present study, participants are presented with an ethical scenario where either a peer or advisor engages in misconduct, and positive and the negative consequences of whistleblowing are either directed to the wrongdoer, department, or university. Participant responses to case questions were evaluated for whistleblowing intentions, moral intensity, metacognitive reasoning strategies, and positive and negative, active and passive emotions. Findings indicate that participants were less likely to report the observed misconduct of an advisor compared to a peer. Furthermore, the findings also suggest that when an advisor is the source of misconduct, greater negative affect results. Post-hoc analyses were also conducted examining the differences between those who did and did not intend to blow the whistle under the circumstances of either having to report an advisor or peer. The implications of these findings for understanding the complexities involved in whistleblowing are discussed.

  10. Experimental study of abdominal CT scanning exposal doses adjusted on the basis of pediatric abdominal perimeter

    International Nuclear Information System (INIS)

    Wei Wenzhou; Zhu Gongsheng; Zeng Lingyan; Yin Xianglin; Yang Fuwen; Liu Changsheng

    2006-01-01

    Objective: To optimize the abdominal helical CT scanning parameters in pediatric patients and to reduce its radiation hazards. Methods: 60 canines were evenly grouped into 4 groups on the basis of pediatric abdominal perimeter, scanned with 110,150,190 and 240 mAs, and their qualities of canine CT images were analyzed. 120 pediafric patients with clinic suspected abdominal diseases were divided into 4 groups on the basis of abdominal perimeter, scanned by optimal parameters and their image qualities were analyzed. Results: After CT exposure were reduced, the percentages of total A and B were 90.9 % and 92.0 % in experimental canines and in pediatric patients, respectively. Compared with conventional CT scanning, the exposure and single slice CT dose index weighted (CTDIw) were reduced to 45.8%-79.17%. Conclusion: By adjusted the pediatric helical CT parameters basedon the of pediatric abdominal perimeter, exposure of patient to the hazards of radiation is reduced. (authors)

  11. A Strategy for American Power: Energy, Climate and National Security

    Science.gov (United States)

    2008-06-01

    For example, Greg Mankiw , Harvard economist and former chair of President Bush’s Council of Economic Advisors, has proposed phasing in a $1 per...International Energy Barrier By Amy Myers Jaffe 77 Chapter V: Overcoming the Economic Barriers to Climate Change and Energy Security By Jason Furman (lead...Hamilton Project. He previously served in the Clinton administration and at the Council of Economic Advisers, the National Economic Council, and the World

  12. Undergraduate Students' Perceptions of the Communication Behaviors of Their Advisors and Perceptions of Relational Satisfaction

    Science.gov (United States)

    Punyanunt-Carter, Narissra; Carter, Stacy

    2015-01-01

    This study examined the specific interpersonal communication styles and behaviors of advisors and the expectations they have on their advisee's level of satisfaction, as well as what characteristics lead to higher relational satisfaction in the advisor-advisee relationship. A combination of convenience and snowball sampling were utilized to obtain…

  13. A study on optimization of hybrid drive train using Advanced Vehicle Simulator (ADVISOR)

    Energy Technology Data Exchange (ETDEWEB)

    Same, Adam; Stipe, Alex; Grossman, David; Park, Jae Wan [Department of Mechanical and Aeronautical Engineering, University of California, Davis, One Shields Ave, Davis, CA 95616 (United States)

    2010-10-01

    This study investigates the advantages and disadvantages of three hybrid drive train configurations: series, parallel, and ''through-the-ground'' parallel. Power flow simulations are conducted with the MATLAB/Simulink-based software ADVISOR. These simulations are then applied in an application for the UC Davis SAE Formula Hybrid vehicle. ADVISOR performs simulation calculations for vehicle position using a combined backward/forward method. These simulations are used to study how efficiency and agility are affected by the motor, fuel converter, and hybrid configuration. Three different vehicle models are developed to optimize the drive train of a vehicle for three stages of the SAE Formula Hybrid competition: autocross, endurance, and acceleration. Input cycles are created based on rough estimates of track geometry. The output from these ADVISOR simulations is a series of plots of velocity profile and energy storage State of Charge that provide a good estimate of how the Formula Hybrid vehicle will perform on the given course. The most noticeable discrepancy between the input cycle and the actual velocity profile of the vehicle occurs during deceleration. A weighted ranking system is developed to organize the simulation results and to determine the best drive train configuration for the Formula Hybrid vehicle. Results show that the through-the-ground parallel configuration with front-mounted motors achieves an optimal balance of efficiency, simplicity, and cost. ADVISOR is proven to be a useful tool for vehicle power train design for the SAE Formula Hybrid competition. This vehicle model based on ADVISOR simulation is applicable to various studies concerning performance and efficiency of hybrid drive trains. (author)

  14. An Exploration of the Relationship between International Students and Their Advisors in U.S. Higher Education Institution

    OpenAIRE

    Mitra, Shreya

    2017-01-01

    International students in U.S. academic settings are facing barriers in the path of their academic accomplishments. In higher educational institutions, students work very closely with their academic advisors to solve a definite problem. Dependence on the academic advisor is much more when the advisee is international. Keeping these points in mind, one of the factors that might impact academic environment for an international student is the bonding that they share with their advisor. This rese...

  15. Miniscrew-assisted rapid palatal expansion for managing arch perimeter in an adult patient

    Directory of Open Access Journals (Sweden)

    Amanda Carneiro da Cunha

    Full Text Available ABSTRACT Introduction: Etiology of dental crowding may be related to arch constriction in diverse dimensions, and an appropriate manipulation of arch perimeter by intervening in basal bone discrepancies cases, may be a key for crowding relief, especially when incisors movement is limited due to underlying pathology, periodontal issues or restrictions related to soft tissue profile. Objectives: This case report illustrates a 24-year old woman, with maxillary transverse deficiency, upper and lower arches crowding, Class II, division 1, subdivision right relationship, previous upper incisors traumatic episode and straight profile. A non-surgical and non-extraction treatment approach was feasible due to the miniscrew-assisted rapid palatal expansion technique (MARPE. Methods: The MARPE appliance consisted of a conventional Hyrax expander supported by four orthodontic miniscrews. A slow expansion protocol was adopted, with an overall of 40 days of activation and a 3-month retention period. Intrusive traction miniscrew-anchored mechanics were used for correcting the Class II subdivision relationship, managing lower arch perimeter and midline deviation before including the upper central incisors. Results: Post-treatment records show an intermolar width increase of 5 mm, bilateral Class I molar and canine relationships, upper and lower crowding resolution, coincident dental midlines and proper intercuspation. Conclusions: The MARPE is an effective treatment approach for managing arch-perimeter deficiencies related to maxillary transverse discrepancies in adult patients.

  16. Trends in Defamation Law: Let the Advisor Beware.

    Science.gov (United States)

    King, Robert D.

    1992-01-01

    Although most lawsuits brought by students against a college are grounded on contract and due process theories, courts have been willing to consider students' defamation suits using tort theories. Recent changes in defamation law have engendered increased litigation and risk of liability for faculty and advisors. (Author/MSE)

  17. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  18. Are South African financial advisor addressing the estate planning objectives that are important to their client?

    Directory of Open Access Journals (Sweden)

    Venter, J.M.P.

    2014-07-01

    Full Text Available Estate planning is an important aspect of any effective financial plan. When preparing an estate plan several objectives identified by the individual planner, as well as several pieces of legislation have to be considered. In South Africa the actions of financial advisors are regulated by the Financial Advisory and Intermediary Services Act. The act aims to ensure that the financial advisor act in the best interest of his / her client. If the act meets its set objectives there will be an alignment of objectives set by a financial advisor and his / her client. This study investigates the existence of an expectation gap between the estate planning objectives considered to be important by the financial advisor and the importance allocated to these factors by the clients. The study found that there was an expectation gap for three of the objectives that should be considered in the estate plan

  19. How do incentives lead to deception in advisors-client interactions? Explicit and implicit strategies of self-interested deception.

    Directory of Open Access Journals (Sweden)

    Barbara eMackinger

    2012-12-01

    Full Text Available When confronted with important questions we like to rely on the advice of experts. However, uncertainty can occur regarding advisors’ motivation to pursue self-interest and deceive the client. This can especially occur when the advisor has the possibility to receive an incentive by recommending a certain alternative. We investigated how the possibility to pursue self-interest led to explicit strategic behavior (bias in recommendation and transfer of information and to implicit strategic behavior (bias in information processing: evaluation and memory. In Study 1 explicit strategic behavior could be identified: Self-interested advisors recommended more often the self-serving alternative and transferred more self-interested biased information to their client compared to the advisor without specific interest. Also deception through implicit strategic behavior was identified: Self-interested advisors biased the evaluation of information less in favor of the client compared to the control group. Self-interested advisors also remembered conflicting information regarding their self-interest worse compared to advisors without self-interest. In Study 2 beside self-interest we assessed accountability which interacted with self-interest and increased the bias: When accountability was high advisor’s self-interest led to higher explicit strategic behavior (less transfer of conflicting information, and to higher implicit strategic behavior (devaluated and remembered less conflicting information. Both studies identified implicit strategic behavior as mediator which can explain the relation between self-interest and explicit strategic behavior. Results of both studies suggest that self-interested advisors use explicit and implicit strategic behavior to receive an incentive. Thus, advisors do not only consciously inform their clients self-interested, but they are influenced unconsciously by biased information processing—a tendency which even increased with

  20. 78 FR 30346 - Financial Investors Trust and Hanson McClain Strategic Advisors, Inc.; Notice of Application

    Science.gov (United States)

    2013-05-22

    ...] Financial Investors Trust and Hanson McClain Strategic Advisors, Inc.; Notice of Application May 15, 2013... instruments. Applicants: Financial Investors Trust (the ``Trust''), on behalf of the Pathway Advisors... consistent with the public interest and the protection of investors. Applicants seek an exemption under...

  1. Personal finance: there are no shortcuts to financial security.

    Science.gov (United States)

    Yarkony, Kathryn

    2009-12-01

    Perioperative nurses have skills that lend themselves to sound financial decision-making, and during these difficult economic times, it is important to know how to secure earnings for the future. Key strategies include saving for retirement, consulting a financial advisor, investing in reliable vehicles, holding investments until the market stabilizes, and controlling credit card debt. Nurses can use the nursing process of assessment, diagnosis, planning, implementation, and evaluation to help them make sound financial decisions. (c) AORN, Inc, 2009.

  2. Examining perimeter gating control of urban traffic networkswith locally adaptive traffic signals

    NARCIS (Netherlands)

    Keyvan Ekbatani, M.; Gao, X.; Gayah, V.V.; Knoop, V.L.

    2015-01-01

    Traditionally, urban traffic is controlled by traffic lights. Recent findings of the Macroscopic or Network Fundamental Diagram (MFD or NFD) have led to the development of novel traffic control strategies that can be applied at a networkwide level. One pertinent example is perimeter flow control

  3. Differential GPS effectiveness in measuring area and perimeter in forested settings

    International Nuclear Information System (INIS)

    Frank, Jereme; Wing, Michael G

    2013-01-01

    This study quantifies area and perimeter measurement errors, traverse times, recording intervals, and overall time and cost effectiveness for using a mapping-grade differential Global Positioning System (GPS) receiver in forested settings. We compared two configurations including one that maximized data collection productivity (position dilution of precision (PDOP) 20, signal to noise ratio (SNR 33), and minimum elevation mask 5°) and a second that involved traditional receiver settings that was designed to improve accuracies (PDOP 6, SNR 39, and minimum elevation mask 15°). We determined that averaging 30 positions and using the settings that maximized productivity was the most time effective combination of recording interval and settings. This combination of recording interval and settings proved slightly more cost effective than other traditional surveying methods such as a laser with digital compass and string box. Average absolute per cent area errors when averaging 30 positions and using maximum settings were 2.6% and average absolute per cent perimeter errors were 2.0%. These results should help forest resource professionals more effectively evaluate GPS techniques and receiver configurations. (paper)

  4. The Use of Images in Intelligent Advisor Systems.

    Science.gov (United States)

    Boulet, Marie-Michele

    This paper describes the intelligent advisor system, named CODAMA, used in teaching a university-level systems analysis and design course. The paper discusses: (1) the use of CODAMA to assist students to transfer theoretical knowledge to the practical; (2) details of how CODAMA is applied in conjunction with a computer-aided software engineering…

  5. 76 FR 60564 - President's Council of Advisors on Science and Technology; Notice of Meeting: Open Regional...

    Science.gov (United States)

    2011-09-29

    ... development. Facility and infrastructure sharing. Policies that could create a fertile innovation environment...; Notice of Meeting: Open Regional Meeting of the President's Council of Advisors on Science and Technology... schedule and summary agenda for an open regional meeting of the President's Council of Advisors on Science...

  6. Crop advisors as climate information brokers: Building the capacity of US farmers to adapt to climate change

    Directory of Open Access Journals (Sweden)

    Maria Carmen Lemos

    2014-01-01

    Full Text Available This paper examines the role of crop advisors as brokers of climate information to support US corn farmers to adapt to climatic change. It uses quantitative data collected from a broad survey of crop advisors in the US Corn Belt to examine the factors that shape advisors’ use of (and willingness to provide climate information to their clients. Building upon a general model of climate information usability we argue that advisors’ willingness to provide climate advice to farmers is influenced by three main factors: their information seeking habits and behavior, their experience with innovation in the past, and how climate information interplays with other kinds of information that they provide—especially agronomic advice. We find that advisors’ willingness to provide climate related information depends both on factors at the individual and organizational level and on the type of advice they provide. First, at the individual and organizational levels, advisors who work in supportive organizations and who collaborate with other advisors are more likely to provide climate information. Second, advisors are more likely to provide climate information if it does not interfere with their main profit making business (e.g. provision of agronomic advice. Third, there is a significant positive relationship between trust in a greater number or sources of information and use of climate information. Fourth, the way advisors perceive short- and long-term risk also influences their willingness to provide climate information; the more concerned they are about long-term climate-related risks to farming, the more likely they are to provide (or want to provide advice based on climate information. Differently from other empirical work in the literature, our analytical model suggests that neither negative experiences with climate information in the past nor the high level of uncertainty characteristic of climate information appear to influence advisors

  7. LEGAL STATUS OF ADVISORS IN THE FIELD OF INTELLECTUAL PROPERTY RIGHT IN THE UNITED KINGDOM

    Directory of Open Access Journals (Sweden)

    Khrystyna Kmetyk

    2017-11-01

    Full Text Available Purpose: to research the legal status of advisors in the field of intellectual property right in the United Kingdom. In this article an author distinguishes and gives a legal description of the types of advisors in the field of intellectual property right in the United Kingdom. The main provisions of the Rules of Conduct for Patent Attorneys, Ttrade Mark Attorneys and Other Regulated Persons (2015 are considered. Methods: to analyse the legal status of advisors in the field of intellectual property right in the United Kingdom the method of induction, systematic approach, formal legal methods were used. Results: this research provides an opportunity to broaden the understanding of the institute of advisors in the field of intellectual property right (in particular patent attorneys and trademark attorneys in the UK and thus include this knowledge in domestic research on intellectual property right. Conclusions: the majority of types of advisors in the field of intellectual property right in the United Kingdom (patent attorneys, chartered patent attorneys, European patent attorneys, registered trademark attorneys and trademark attorneys, European trademark attorneys, etc. is well-educated professionals in all areas of intellectual property and are able to advise on a wide range of technical and commercial issues in this field. The obtained results will have a positive impact on the reform of the institute of representatives in the field of intellectual property in Ukraine in order to ensure its effectiveness and relevance to the challenges of the present.

  8. Computer Security: How to succeed in software deployment

    CERN Multimedia

    Computer Security Team

    2014-01-01

    The summer student period has ended and we would like to congratulate all those who successfully accomplished their project! In particular, well done to those who managed to develop and deploy sophisticated web applications in the short summer season. Unfortunately, not all web applications made the final cut, moved into production and became visible on the Internet. We had to reject some... let me explain why.   Making a web application visible on the Internet requires an opening in the CERN outer perimeter firewall. Such a request is usually made through the CERN WebReq web interface. As standard procedure, the CERN Computer Security team reviews every request and performs a security assessment. This is where you, your supervisee and the Computer Security team all start to get frustrated. Many summer students delivered awesome web applications with great new functions and a good “look and feel” following precise use cases, using modern web technologies, dashboards, integr...

  9. Contextualizing Gay-straight Alliances: Student, Advisor, and Structural Factors Related to Positive Youth Development among Members

    Science.gov (United States)

    Poteat, V. Paul; Yoshikawa, Hirokazu; Calzo, Jerel P.; Gray, Mary L.; DiGiovanni, Craig D.; Lipkin, Arthur; Mundy-Shephard, Adrienne; Perrotti, Jeff; Scheer, Jillian R.; Shaw, Matthew P.

    2015-01-01

    Gay-straight alliances (GSAs) may promote resilience. Yet, what GSA components predict well-being? Among 146 youth and advisors in 13 GSAs (58% lesbian, gay, bisexual, or questioning; 64% White; 38% received free/reduced-cost lunch), student (demographics, victimization, attendance frequency, leadership, support, control), advisor (years served,…

  10. Swivel arm perimeter for visual field testing in different body positions.

    Science.gov (United States)

    Flammer, J; Hendrickson, P; Lietz, A; Stümpfig, D

    1993-01-01

    To investigate the influence of body position on visual field results, a 'swivel arm perimeter' was built, based on a modified Octopus 1-2-3. Here, the measuring unit was detected from the control unit and mounted on a swivel arm, allowing its movement in all directions. The first results obtained with this device have indicated that its development was worthwhile.

  11. The impact of patient advisors on healthcare outcomes: a systematic review

    Directory of Open Access Journals (Sweden)

    Anjana E. Sharma

    2017-10-01

    Full Text Available Abstract Background Patient advisory councils are a way for healthcare organizations to promote patient engagement. Despite mandates to implement patient advisory councils through programs like the Patient-Centered Medical Home (PCMH, there is a paucity of data measuring the impact of patients functioning in advisory roles. Our objective is to investigate whether patient engagement in patient advisory councils is linked to improvements in clinical quality, patient safety or patient satisfaction. Methods We searched PubMed, SCOPUS, CINAHL and Google Scholar for English language publications between November 2002 to August 2015, using a combination of “patient advisor” and “care outcomes” search terms. Article selection utilized dual screening facilitated by DistillerSR software, with group discussion to resolve discordance. Observational studies, randomized controlled trials, and case studies were included that described patients serving in an advisory role where primary outcomes were mentioned. Reference lists of included studies and grey literature searches were conducted. Qualitative thematic analysis was performed to synthesize results. Results Database searching yielded 639 articles total after removing duplicates, with 129 articles meeting full text inclusion criteria. 32 articles were identified for final review, 16 of which were case studies. Advisory roles included patient advisory councils, ad-hoc patient committees, community advisory councils, experience-based co-design, and other. Four practice-based studies from one research group, involving community advisors in the design of public health interventions, found improved clinical outcomes. No prospective experimental studies assessed the impact of patient advisors on patient safety or patient satisfaction. One cluster-randomized RCT showed that patient advisors helped health care planning efforts identify priorities more aligned with the PCMH. Ten case studies reported

  12. How can the West Better Assist Partner Nations in Establishing Internal Security

    Science.gov (United States)

    2017-03-31

    disappointing results. At the heart of this issue is the inability to respond to failures of internal security in partner nations. This essay posits that...Antis, Ph. Deputy Director Joint Advanced War Thesis Advisors: Approved by: Signature: Peter IL Yeager, Colonel! Acting Dean of Faculty and Academic ...of an element of land forces to respond to a new, additional paradigm of war. This essay surveys why helping partner nations build transparent

  13. Expanding the Use of Time-Based Metering: Multi-Center Traffic Management Advisor

    Science.gov (United States)

    Landry, Steven J.; Farley, Todd; Hoang, Ty

    2005-01-01

    Time-based metering is an efficient air traffic management alternative to the more common practice of distance-based metering (or "miles-in-trail spacing"). Despite having demonstrated significant operational benefit to airspace users and service providers, time-based metering is used in the United States for arrivals to just nine airports and is not used at all for non-arrival traffic flows. The Multi-Center Traffic Management Advisor promises to bring time-based metering into the mainstream of air traffic management techniques. Not constrained to operate solely on arrival traffic, Multi-Center Traffic Management Advisor is flexible enough to work in highly congested or heavily partitioned airspace for any and all traffic flows in a region. This broader and more general application of time-based metering is expected to bring the operational benefits of time-based metering to a much wider pool of beneficiaries than is possible with existing technology. It also promises to facilitate more collaborative traffic management on a regional basis. This paper focuses on the operational concept of the Multi-Center Traffic Management Advisor, touching also on its system architecture, field test results, and prospects for near-term deployment to the United States National Airspace System.

  14. Perspectives on the Science Advisor Program at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Bennett, P.C.; Heath, R.B.; Podlesny, A.; Channon, P.A.

    1992-01-01

    This paper discusses a Science Advisor Program which has been established at Sandia National Laboratories (SNL) for the long term augmentation of math and science instruction in New Mexico schools. Volunteer SNL engineers and scientists team with the faculty of participating schools to enhance the teachers' abilities to capture and hold the student's scientific imagination and develop their scientific skills. This is done primarily through providing laboratory resources, training the teachers how to use those resources, and advising how to obtain them in the future. In its first year, over 140 advisors teamed with 132 schools, for average weekly contact with 500 teachers and 10,000 students. Surveys indicate a general rise in frequency and quality of hands-on science instruction, as well as teacher and student attitudes. An expanded evaluation is planned for subsequent years

  15. Ukraine-Japanese-Swedish project: Upgrading of perimeter protection system at Kharkov Institute of Physics and Technology (KIPT)

    International Nuclear Information System (INIS)

    Mikahaylov, V.; Lapshin, V.; Ek, P.; Flyghed, L.; Nilsson, A.; Ooka, N.; Shimizu, K.; Tanuma, K.

    2001-01-01

    Full text: Since the Ukraine voluntarily accepted the status of a non-nuclear-weapons state and concluded a Safeguards Agreement with the IAEA, the Kharkov Institute of Physics and Technology (KIPT) as a nuclear facility using the nuclear material of category 1, has become a Ukrainian priority object for the international community's efforts to ensure nuclear non-proliferation measures and to bring the existing protection systems to the generally accepted security standards. In March 1996, at the meeting held under the auspices of the IAEA in Kiev, the representatives from Japan, Sweden and the USA agreed to provide technical assistance concerning improvement of the nuclear material accountancy and control and physical protection system (MPC and A) available at KIPT. The Technical Secretariat of the Japan-Ukraine Committee for Co-operation on Reducing Nuclear Weapons and Swedish Nuclear Power Inspectorate undertook to solve the most expensive and labour-consuming task namely, the upgrading of the perimeter protection system at KIPT. This included that the current perimeter system, comprising several kilometers, should be completely replaced. Besides the above-mentioned problem, the upgrading should be carried out with the institute in operation. Thus, it was not allowed to replace the existing protection system by a new one unless KIPT was constantly protected. This required the creation of a new protected zone that to a large extent was occupied by the communication equipment, buildings, trees and other objects interfering with the work. All these difficulties required very comprehensive development of the project design as well as a great deal of flexibility during the implementation of the project. These problems were all successfully resolved thanks to a well working project organization, composed of experts from KIPT, JAERI and ANS, involving the highly qualified Swedish technical experts who played a leading role. In the framework of implementation of the

  16. The introduction of forensic advisors in Belgium and their role in the criminal justice system.

    Science.gov (United States)

    Bitzer, Sonja; Heudt, Laetitia; Barret, Aurélie; George, Lore; Van Dijk, Karolien; Gason, Fabrice; Renard, Bertrand

    2018-05-01

    Forensic advisors (FA) at the National Institute for Criminalistics and Criminology (NICC), generalists in forensic science, act as an advising body to the magistrate to improve communication between the various parties involved in the investigation: magistrate, police and crime scene investigators, and forensic experts. Their role is manifold, but their main objectives are to optimise trace processing by selecting the most pertinent traces in the context of the case and by advising magistrates on the feasibility of forensic analyses in particular circumstances in regards to the latest technical advances. Despite the absence of a legal framework governing their role and involvement in judicial cases, the demand for their services has increased over the years. Initially, forensic advisors were called for complex homicide cases. Due to the proximity with the Public Prosecutor's Office, the types of offences for which their expertise was sought have become more diverse (mainly including robbery, burglary and sexual assault cases), leading to a diversity in the types of cases handled by the forensic advisors (complex, simple and review). In many of the cases they are requested for, in addition to consulting on the best analytical strategy, forensic advisors also assume the role of case coordinator regarding the seized objects and their respective analyses. Indeed, in the majority of cases treated by the FAs, two or more types of expertise have been requested and performed, either at the internal laboratories of NICC or at external laboratories. This paper explains the role of the forensic advisors in Belgium, the path that let to their current status and problems encountered. Copyright © 2017 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.

  17. Supporting non proliferation and global security efforts

    International Nuclear Information System (INIS)

    Pochon, E.

    2013-01-01

    CEA contributes as a major actor of France's action against nuclear proliferation and to the strengthening of nuclear security at national level as European and International levels, in particular through the support of the IAEA activities in nuclear non proliferation with the French Support Programme for the IAEA safeguards system and security with the contribution to the IAEA Nuclear Security Plan and cooperation projects with the European Commission. The CEA is a French government funded technological research organization, organized around 5 branches: Nuclear Energy, Technological Researches, Defence (DAM), Material Sciences and Life Sciences. Within the scope of its activities, CEA covers most of the research areas and techniques in nuclear non-proliferation and security. The CEA is also the advisor of the French Government on nuclear policy. Treaty monitoring and the development and implementation of non proliferation and global security programs is an important mission of DAM which rely on nuclear weapons manufacture and past testing experience. The programmes on non proliferation and global security carried out to fulfil DAM's mission cover the following areas: development of monitoring and detection methods and equipments, country profiles and nuclear stockpiles assessment, arms control instruments, proliferation resistance of nuclear fuel cycle, monitoring of nuclear tests, operation and maintenance of national detection capabilities and contribution to CTBT verification systems. (A.C.)

  18. An intrusion prevention system as a proactive security mechanism in network infrastructure

    Directory of Open Access Journals (Sweden)

    Dulanović Nenad

    2008-01-01

    Full Text Available A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS, proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.

  19. March of the Robo-advisors : The potential for global expansion of digital asset management platforms

    OpenAIRE

    Rättyä, Jere

    2016-01-01

    This thesis looks into the robo-advisory market in the U.S. and Europe, with the goal of determining the international potential for a Finnish robo-advisor service and inspecting the interest of foreign service providers in the Finnish market. Fintech is becoming increasingly disruptive for the traditional and conservative financial sector, which has resulted in start-ups building their own robo-advisor platform around the world. Traditional wealth management is both expensive and exclusi...

  20. Data fusion concept in multispectral system for perimeter protection of stationary and moving objects

    Science.gov (United States)

    Ciurapiński, Wieslaw; Dulski, Rafal; Kastek, Mariusz; Szustakowski, Mieczyslaw; Bieszczad, Grzegorz; Życzkowski, Marek; Trzaskawka, Piotr; Piszczek, Marek

    2009-09-01

    The paper presents the concept of multispectral protection system for perimeter protection for stationary and moving objects. The system consists of active ground radar, thermal and visible cameras. The radar allows the system to locate potential intruders and to control an observation area for system cameras. The multisensor construction of the system ensures significant improvement of detection probability of intruder and reduction of false alarms. A final decision from system is worked out using image data. The method of data fusion used in the system has been presented. The system is working under control of FLIR Nexus system. The Nexus offers complete technology and components to create network-based, high-end integrated systems for security and surveillance applications. Based on unique "plug and play" architecture, system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provides high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering.

  1. Science PhD career preferences: levels, changes, and advisor encouragement.

    Directory of Open Access Journals (Sweden)

    Henry Sauermann

    Full Text Available Even though academic research is often viewed as the preferred career path for PhD trained scientists, most U.S. graduates enter careers in industry, government, or "alternative careers." There has been a growing concern that these career patterns reflect fundamental imbalances between the supply of scientists seeking academic positions and the availability of such positions. However, while government statistics provide insights into realized career transitions, there is little systematic data on scientists' career preferences and thus on the degree to which there is a mismatch between observed career paths and scientists' preferences. Moreover, we lack systematic evidence whether career preferences adjust over the course of the PhD training and to what extent advisors exacerbate imbalances by encouraging their students to pursue academic positions. Based on a national survey of PhD students at tier-one U.S. institutions, we provide insights into the career preferences of junior scientists across the life sciences, physics, and chemistry. We also show that the attractiveness of academic careers decreases significantly over the course of the PhD program, despite the fact that advisors strongly encourage academic careers over non-academic careers. Our data provide an empirical basis for common concerns regarding labor market imbalances. Our results also suggest the need for mechanisms that provide PhD applicants with information that allows them to carefully weigh the costs and benefits of pursuing a PhD, as well as for mechanisms that complement the job market advice advisors give to their current students.

  2. Science PhD career preferences: levels, changes, and advisor encouragement.

    Science.gov (United States)

    Sauermann, Henry; Roach, Michael

    2012-01-01

    Even though academic research is often viewed as the preferred career path for PhD trained scientists, most U.S. graduates enter careers in industry, government, or "alternative careers." There has been a growing concern that these career patterns reflect fundamental imbalances between the supply of scientists seeking academic positions and the availability of such positions. However, while government statistics provide insights into realized career transitions, there is little systematic data on scientists' career preferences and thus on the degree to which there is a mismatch between observed career paths and scientists' preferences. Moreover, we lack systematic evidence whether career preferences adjust over the course of the PhD training and to what extent advisors exacerbate imbalances by encouraging their students to pursue academic positions. Based on a national survey of PhD students at tier-one U.S. institutions, we provide insights into the career preferences of junior scientists across the life sciences, physics, and chemistry. We also show that the attractiveness of academic careers decreases significantly over the course of the PhD program, despite the fact that advisors strongly encourage academic careers over non-academic careers. Our data provide an empirical basis for common concerns regarding labor market imbalances. Our results also suggest the need for mechanisms that provide PhD applicants with information that allows them to carefully weigh the costs and benefits of pursuing a PhD, as well as for mechanisms that complement the job market advice advisors give to their current students.

  3. Perimeter generating functions for the mean-squared radius of gyration of convex polygons

    International Nuclear Information System (INIS)

    Jensen, Iwan

    2005-01-01

    We have derived long series expansions for the perimeter generating functions of the radius of gyration of various polygons with a convexity constraint. Using the series we numerically find simple (algebraic) exact solutions for the generating functions. In all cases the size exponent ν 1. (letter to the editor)

  4. Current state in the research on electronic monitoring systems for the security and flow of objects and individuals

    Directory of Open Access Journals (Sweden)

    Man Dietrich Marcela

    2017-01-01

    Full Text Available This paper sets forth the current state of security systems in prisons from Romania and around the world, particularly aiming electronic systems of monitoring the flow of people, materials control and perimeter security, focusing on the research results concluded by motion detection tests and devices. The currently used systems were observed in order to put an analysis of the methodology together and implement and perfect these systems in protected areas. The protection of citizens must be performed to the extent that is allowed by the legislation.

  5. Design and Implementation of an Experimental Cataloging Advisor--Mapper.

    Science.gov (United States)

    Ercegovac, Zorana; Borko, Harold

    1992-01-01

    Describes the design of an experimental computer-aided cataloging advisor, Mapper, that was developed to help novice users with the descriptive cataloging of single-sheet maps from U.S. publishers. The human-computer interface is considered, the use of HyperCard is discussed, the knowledge base is explained, and assistance screens are described.…

  6. TEACHER-ADVISORS: Where There's a Skill There's A Way.

    Science.gov (United States)

    Tamminen, Armas; And Others

    This report discusses a program to present the Teacher Advisement Training Model. This model for training teacher-advisors is based on the assumption that tentative commitment to making school a more rewarding experience for all is the first step in starting an effective program. The approach is to help teachers learn specific skills and methods…

  7. History of physical security R and D

    International Nuclear Information System (INIS)

    Myre, W.C.; De Montmollin, J.M.

    1987-01-01

    Serious concern about physical protection of nuclear facilities began around 1972. R and D was initiated at Sandia National Laboratory which had developed techniques to protect weapons for many years. Special vehicles, convoy procedures, and a communications system previously developed for weapons shipments were improved and extended for shipments of other sensitive materials. Barriers, perimeter alarms, portal and internal control systems were developed, tested, and published in handbooks and presented at symposia. Training programs were initiated for U.S. and foreign personnel. Containment and surveillance techniques were developed for the IAEA. Presently emphasis is on computer security, active barriers, and techniques to prevent theft or sabotage by ''insiders''

  8. Trainer module for security control center operations

    International Nuclear Information System (INIS)

    Bernard, E.A.

    1982-01-01

    An operator trainer module has been developed to be used with the security control center equipment to be installed as part of a safeguards physical protection system. The module is designed to provide improved training and testing capabilities for control center operators through the use of simulations for perimeter equipment operations. Operators, through the trainer module, can be challenged with a variety of realistic situations which require responsive action identical to that needed in an actual system. This permits a consistent evaluation and confirmation of operator capabilities prior to assignment as an operator and allows for periodic retesting to verify that adequate performance levels are maintained

  9. Dissemination of colorectal cancer screening by Filipino American community health advisors: a feasibility study.

    Science.gov (United States)

    Maxwell, Annette E; Danao, Leda L; Bastani, Roshan

    2013-07-01

    Filipino Americans underutilize life-saving screening tests for colorectal cancer, resulting in late stage of diagnosis and poor survival relative to other racial/ethnic groups. Education regarding colorectal cancer screening and distribution of free fecal occult blood test (FOBT) kits are evidence-based interventions that can significantly increase screening. However, this community will only benefit if the intervention is broadly disseminated. We assessed the feasibility of promoting colorectal cancer screening in Filipino American community settings working with community health advisors, and the practicality of conducting one-on-one or small group education, in addition to passing out free FOBT kits. Twenty community health advisors from 4 organizations engaged in recruitment and education activities with 132 participants. Community health advisors consistently completed screening questionnaires to establish eligibility and kept logs of FOBT distribution. However, they did not consistently record eligible participants who did not consent to participate. Process checklists that indicated what information was covered in each educational session and postsession follow-up logs were partially completed. Almost all participants reported receipt of intervention components and receipt of screening at 4-month follow-up and reported high acceptability of the program. The pilot study established the feasibility of working with community health advisors to promote colorectal cancer screening in Filipino American community settings. Findings informed the design of a dissemination trial that is currently ongoing with regards to monitoring recruitment, intervention implementation and follow-up and allowing flexibility regarding one-on-one or small group education.

  10. Intelligent data retrieval in the industry experience advisor expert system

    International Nuclear Information System (INIS)

    Swisshelm, J.D.

    1991-01-01

    ABB Impell Corporation developed a prototype expert system called the Industry Experience Advisor for Florida Power and Light Company. This expert system assists plant engineers in evaluating design changes against previous nuclear industry experience. Previous experience is in the form of root causes or lessons learned of past events. The root-cause statements were developed from an engineering review of important event documents [US Nuclear Regulatory Commission information notices (INs) and information bulletins (IBs) and the Institute of Nuclear Power Operations safety evaluation reports and significant operating experience reports]. This paper describes the project that is currently expanding the prototype into a production system for use at a nuclear plant site. The Industry Experience Advisor should be ready for production release by the end of 1991. It will include knowledge of important events through 1990. In 1992 and in each following year, an update will be released adding the previous year's events

  11. A modular real time Operator Advisor expert system for installation on a full function nuclear power plant simulator

    International Nuclear Information System (INIS)

    Hajek, B.K.; Miller, D.W.; Bhatnagar, R.; Maresh, J.L.

    1989-01-01

    A knowledge-based expert system that uses the Generic Task approach is being developed to serve as an operator Advisor in the control room of a commercial nuclear power plant. Having identified the broad scope tasks performed by an operator in responding to abnormal plant conditions, our research team has modularized the Operator Advisor according to the tasks of (1) monitoring plant parameters, (2) classifying or diagnosing the abnormality, and (3) planning for execution of the procedures for recovery. The operator Advisor uses the Perry Nuclear Power Plant full-scope simulator as the reference system, and is currently being prepared for direct connection to the simulator

  12. The perceived roles and functions of school science subject advisors

    African Journals Online (AJOL)

    The science subject advisor can play an important role in upgrading ... literature study highlighted practices in the UK and the US that are ... South Africa has recently adopted a strate- ... (North West Province) felt that a solution to their teaching problems ..... teachers, clustering of schools, practical work, cross teaching,.

  13. Risk Management in College Fraternities: Guidance from Two Faculty Advisors

    Science.gov (United States)

    Rosenberg, Stuart; Mosca, Joseph

    2016-01-01

    Students who become members of fraternities and sororities avail themselves of significant opportunities that enrich their college life. Faculty advisors play an important role in assisting fraternities and sororities in shaping students' leadership, scholastic, and personal development. Given the risks such as alcohol use and hazing that continue…

  14. Training Mentors as Educational Advisors for Adult Learners. Process Manual.

    Science.gov (United States)

    Singer, Elizabeth W.

    Materials used by the director of a project designed to assist key personnel in businesses, industries, and agencies with the educational counseling of their employees are presented. The objectives of the project, "Training Mentors as Educational Advisors of Adult Learners," were to: (1) provide two training sessions in educational…

  15. Fire Perimeters (2012)

    Data.gov (United States)

    Department of Homeland Security — The Geospatial Multi-Agency Coordination Group, or GeoMAC, is an internet-based mapping tool originally designed for fire managers to access online maps of current...

  16. The App Squad: SLJ's Advisors Weigh in on Kids' Book Apps

    Science.gov (United States)

    Ishizuka, Kathy

    2011-01-01

    In this article, "School Library Journal's" ("SLJ") advisors talk about book apps for kids. They discuss what they like, what one should look for in discerning the best for kids and teens, and where this all might be headed.

  17. Summary Report for the Radiation Detection for Nuclear Security Summer School 2012

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C.; Baciak, James E.; Stave, Jean A.

    2012-08-22

    The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the inaugural Radiation Detection for Nuclear Security Summer School from June 11 – 22, 2012. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. The first week of the summer school focused on the foundational knowledge required by technology practitioners; the second week focused on contemporary applications. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security.

  18. Evaluation of high-perimeter electrode designs for deep brain stimulation

    Science.gov (United States)

    Howell, Bryan; Grill, Warren M.

    2014-08-01

    Objective. Deep brain stimulation (DBS) is an effective treatment for movement disorders and a promising therapy for treating epilepsy and psychiatric disorders. Despite its clinical success, complications including infections and mis-programing following surgical replacement of the battery-powered implantable pulse generator adversely impact the safety profile of this therapy. We sought to decrease power consumption and extend battery life by modifying the electrode geometry to increase stimulation efficiency. The specific goal of this study was to determine whether electrode contact perimeter or area had a greater effect on increasing stimulation efficiency. Approach. Finite-element method (FEM) models of eight prototype electrode designs were used to calculate the electrode access resistance, and the FEM models were coupled with cable models of passing axons to quantify stimulation efficiency. We also measured in vitro the electrical properties of the prototype electrode designs and measured in vivo the stimulation efficiency following acute implantation in anesthetized cats. Main results. Area had a greater effect than perimeter on altering the electrode access resistance; electrode (access or dynamic) resistance alone did not predict stimulation efficiency because efficiency was dependent on the shape of the potential distribution in the tissue; and, quantitative assessment of stimulation efficiency required consideration of the effects of the electrode-tissue interface impedance. Significance. These results advance understanding of the features of electrode geometry that are important for designing the next generation of efficient DBS electrodes.

  19. The figure of the helper advisor in cases of sexual abuse against people with intellectual disabilities

    Directory of Open Access Journals (Sweden)

    Almudena MARTORELL CAFRANGA

    2017-09-01

    Full Text Available In this paper we analyse the main barriers that people with intellectual disabilities who have suffered sexual abuse have to face when they access the Justice system. Regarding these barriers, the Victim Support Unit for People with Intellectual Disabilities of the Fundación Carmen Pardo-Valcarce proposes the inclusion in the judicial process of a helper advisor. The entry into force in 2015 of the Law 4/2015, in 27 April, the Statute of the crime victim represents an exemplary opportunity to ensure the incorporation of support proposals involving the insertion of the helper advisor in the judicial process in cases where the victim is a person with intellectual disabilities. In this paper we analyse the impact of the helper advisor, with particular emphasis on cases that have been dismissed under instruction.

  20. Demographic Trends and Advocacy Experiences of Gay-Straight Alliance Advisors

    Science.gov (United States)

    Graybill, Emily C.; Varjas, Kris; Meyers, Joel; Dever, Bridget V.; Greenberg, Daphne; Roach, Andrew T.; Morillas, Catalina

    2015-01-01

    Using an ecological model, the individual-, school-, and sociocultural-level characteristics that affect gay-straight alliance (GSA) advisors were examined in the current study. The formation of GSAs has been one way that schools have sought to improve the school climate for lesbian, gay, bisexual, and transgender (LGBT) youth. Limited information…

  1. Summary Report for the Radiation Detection for Nuclear Security Summer School 2014

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Baciak, James E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Woodring, Mitchell L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Jenno, Diana M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-09-01

    Executive Summary The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the 3rd Radiation Detection for Nuclear Security Summer School from 16 – 27 June 2014. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security. In fact, we are beginning to see previous students both enroll in graduate programs (former undergraduates) and complete internships at agencies like the National Nuclear Security Administration.

  2. Soviet Advisors Group in South China and Soviet Union Financing of Gomindan War Planes in 1924

    Directory of Open Access Journals (Sweden)

    Александр Геннадьевич Юркевич

    2011-12-01

    Full Text Available The article dwells on the organization and activities of the Soviet advisors group, which assisted to the South China government of Sun Yatsen, its participation in financing Kuomintang political and military projects. The author pointed out that the main aim of the advisors group efforts was to form new Kuomintang power institutions and to bring its policy and army under control, for all that the tactics of implementation of strategy aim were constantly changing.

  3. Education and training of the shift technical advisor

    International Nuclear Information System (INIS)

    Thomas, E.L.

    1981-01-01

    This paper discusses the background and current approaches for qualifying the required position of Shift Technical Advisor (STA). Industry positions regarding the regulation are given. Problems associated with meeting the requirement are identified, along with a discussion of other alternatives for upgrading the education level of shift management. Inherent in the discussion is the conclusion that voluntary improvements in the training and education of shift management personnel are more effective than mandatory positions or degree requirements

  4. Comparative analysis of the tools 'Retrofit Advisor' and 'EPIQR+' - Final report; Analisi comparativa degli strumenti 'Retrofit Advisor' e 'EPIQR+' - Rapporto finale

    Energy Technology Data Exchange (ETDEWEB)

    Pittet, D.; Ghirlanda, L.

    2008-07-01

    This report represents the final phase of Swiss Federal Office of Energy project 'Strategy for long-term management of city-owned real estate - the case of the City Council of Chiasso'. It contains a comparative analysis of two tools for the evaluation of the potential for retrofitting and refurbishment of buildings (Retrofit Advisor and Epiqr+). By applying the two tools in parallel, it was possible to compare information and data obtained, and also to obtain indications for the evaluation of the usability of the tools. To achieve this, five buildings in the territory of the city of Chiasso were submitted to the tools for analysis. The applications have highlighted the usability of each case study. The ease of use of Retrofit Advisor has allowed the evaluation of each proposed scenario; by using the same reference system, comparable data are obtained (at indication level) to support the choice of the intervention strategy on existing buildings. In addition to the analysis of the current status, the tool Retrofit Advisor supports a structure analysis over three intervention scenarios, namely reparation, renovation, rebuild. Data entry does not require advanced knowledge of construction work, and is limited to basic characteristics. The analysis performed through Epiqr+ is more rigorous, providing a specific and detailed diagnosis on the state of deterioration of each construction element, supported by a series of intervention suggestions. The Epiqr+ tool has furthermore allowed the evaluation (within a precision range of {+-}15%) the cost of reparation/renovation works, and also the thermal energy balance of each building, based on the characteristics of their envelops. On the basis of contents criteria and cost analysis, the approach has allowed the evaluation of different options for the improvement of the buildings, from simple reparation to total rebuild. Estimates are evaluated in terms of cost, of environmental impact, and, in the case of Retrofit

  5. Design and testing of a perimeter of increment threshold by projection

    OpenAIRE

    García Domene, María del Carmen; Luque Cobija, María José; Fez Saiz, Dolores de

    2017-01-01

    In the present study, we have designed and tested a perimeter for the detection of damage in the chromatic mechanisms using a video projector. To this purpose, we have characterized pixel to pixel a video projector, to account for the inhomogeneities in the projection. We have measured the tristimulus values of the projector primaries as a function of digital level, at 49 locations of the projection screen and, from them, we have arrived to a characterization model which reduces the color dif...

  6. The CBT Advisor: An Expert System Program for Making Decisions about CBT.

    Science.gov (United States)

    Kearsley, Greg

    1985-01-01

    Discusses structure, credibility, and use of the Computer Based Training (CBT) Advisor, an expert system designed to help managers make judgements about course selection, system selection, cost/benefits, development effort, and probable success of CBT projects. (MBR)

  7. Ties That Bind: Academic Advisors as Agents of Student Relationship Management

    Science.gov (United States)

    Vianden, Jörg

    2016-01-01

    To affect college retention, academic advisors should act as agents of student relationship management by strengthening the connection between students and their institutions. Satisfaction and dissatisfaction with academic advising as perceived by 29 college students at 3 midwestern comprehensive institutions are described. Discussion is framed in…

  8. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Science.gov (United States)

    2010-02-03

    ..., date of birth, and social security number. Organization's name; Citizenship; Country of origin, if... servers, magnetic disc, tape, digital media, and CD-ROM. Retrievability: Records may be retrieved by...

  9. [Irrigated perimeters as a geopolitical strategy for the development of the semi-arid region and its implications for health, labor and the environment].

    Science.gov (United States)

    Pontes, Andrezza Graziella Veríssimo; Gadelha, Diego; Freitas, Bernadete Maria Coêlho; Rigotto, Raquel Maria; Ferreira, Marcelo José Monteiro

    2013-11-01

    An analysis was made of irrigated perimeters as a geopolitical strategy for expanding Brazilian agricultural frontiers and the "development" of the northeastern semi-arid region with respect to social determinants in health in rural communities. Research was conducted in the Chapada do Apodi in the states of Ceará and Rio Grande do Norte between 2007 and 2011. Various research techniques and tools were adopted, such as research-action, ethnographic studies, questionnaires and laboratory exams, water contamination analyses, social cartography and focal groups. In the context of agribusiness expansion, it was revealed that public policies of irrigation have had consequences for health, labor and the environment with the implementation of the Jaguaribe-Apodi Irrigated Perimeter in Ceará. The social and environmental conflict and resistance in the phase prior to the installation of the Santa Cruz do Apodi Irrigated Perimeter in Rio Grande do Norte was significant as it had consequences for the health-disease process on rural communities. It is important for the evaluation of public irrigation policies to consider the impacts of the perimeters on the lifestyle, labor, health and the environment of the affected territories.

  10. 76 FR 70779 - President's Council of Advisors on Science and Technology

    Science.gov (United States)

    2011-11-15

    ... University of Michigan North Campus Research Complex, 2800 Plymouth Road, Building 18, Ann Arbor, MI 48109... the University of Michigan North Research Complex from 8:30 a.m. to 2:45 p.m. on December 12, 2011... OFFICE OF SCIENCE AND TECHNOLOGY POLICY President's Council of Advisors on Science and Technology...

  11. 77 FR 10736 - President's Council of Advisors on Science and Technology (PCAST)

    Science.gov (United States)

    2012-02-23

    ... an overview of the Department of Agriculture's science, technology, and innovation activities, and... DEPARTMENT OF ENERGY President's Council of Advisors on Science and Technology (PCAST) AGENCY... Science and Technology (PCAST), and describes the functions of the Council. Notice of this meeting is...

  12. The treatment implementation advisor: a component of the GypsES project

    Science.gov (United States)

    Michael C. Saunders; Michael A. Foster

    1991-01-01

    The treatment implementation advisor is one of the knowledge based advisory modules of GypsES, a knowledge system environment for decision support in gypsy moth management. Its function is to provide detailed advice on intervention tactics for gypsy moth: e.g. aerial and ground application of insecticides and microbials, inundative or augmentative releases of...

  13. A Pervasive Social Networking Application: I-NFC enabled Florist Smart Advisor

    Science.gov (United States)

    Swee Wen, Khoo; Mahinderjit Singh, Manmeet

    2016-11-01

    Location based service is an information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device. NFC location based service is using one of the modes of NFC such as peer-to-peer, reader/writer, and card emulation to obtain the information of the object and then get the location of the object. In this paper, the proposed solution is I- NFC-enabled Pervasive Social Networking apps for florists. It combines the NFC location based service with Online Social Network (OSN). In addition, a smart advisor in the system to provide output in making their own decision while purchasing products.The development of the system demonstrates that a designed commerce site is provided which enable a communication between NFC-enabled smartphone, NFC-enabled application and OSN. GPS functionalities also implemented to provide map and location of business services. Smart advisor also designed to provide information for users who do not have ideas what to purchase.

  14. 77 FR 65593 - PNC Capital Advisors, LLC, et al.; Notice of Application

    Science.gov (United States)

    2012-10-29

    ... registered open-end management investment companies that operate as ``funds of funds'' to acquire shares of.... Applicants: PNC Capital Advisors, LLC (``Adviser'') and PNC Funds and PNC Advantage Funds (each a ``Trust... statutory trust. Each Trust is comprised of separate series that pursue distinct investment objectives and...

  15. Analysis Of The Socioeconomic And Environmental Impacts Of Irrigated Agriculture In The Irrigated Perimeter Of Pau Dos Ferros (Rn

    Directory of Open Access Journals (Sweden)

    José Jobson Garcia de Almeida

    2014-07-01

    Full Text Available The Brazilian Government implemented irrigated perimeters to ameliorate problems of drought and poverty in the Northeast. In this sense, the objective of this work was to analyze the social, economic and environmental impacts generated by the practice of irrigated agriculture in the municipality of Pau dos Ferros-RN, resulting from the impacts caused by the activity. Obtained references on the topic, on-site visits and interviews with producers of the perimeter. It was observed the presence of negative impacts in the area, such as waste, contamination and water salinisation, compaction and soil erosion, deforestation caused by the removal of the native vegetation, high consumption of energy and public health problems.

  16. Spot and Runway Departure Advisor (SARDA)

    Science.gov (United States)

    Jung, Yoon

    2016-01-01

    Spot and Runway Departure Advisor (SARDA) is a decision support tool to assist airline ramp controllers and ATC tower controllers to manage traffic on the airport surface to significantly improve efficiency and predictability in surface operations. The core function of the tool is the runway scheduler which generates an optimal solution for runway sequence and schedule of departure aircraft, which would minimize system delay and maximize runway throughput. The presentation also discusses the latest status of NASA's current surface research through a collaboration with an airline partner, where a tool is developed for airline ramp operators to assist departure pushback operations. The presentation describes the concept of the SARDA tool and results from human-in-the-loop simulations conducted in 2012 for Dallas-Ft. Worth International Airport and 2014 for Charlotte airport ramp tower.

  17. Spot and Runway Departure Advisor

    Science.gov (United States)

    Jung, Yoon Chul

    2013-01-01

    The Spot and Runway Departure Advisor (SARDA) is a research prototype of a decision support tool for ATC tower controllers to assist in manging and controlling traffic on the surface of an airport. SARDA employs a scheduler to generate an optimal runway schedule and gate push-back - spot release sequence and schedule that improves efficiency of surface operations. The advisories for ATC tower controllers are displayed on an Electronic Flight Strip (EFS) system. The human-in-the-loop simulation of the SARDA tool was conducted for east operations of Dallas-Ft. Worth International Airport (DFW) to evaluate performance of the SARDA tool and human factors, such as situational awareness and workload. The results indicates noticeable taxi delay reduction and fuel savings by using the SARDA tool. Reduction in controller workload were also observed throughout the scenario runs. The future plan includes modeling and simulation of the ramp operations of the Charlotte International Airport, and develop a decision support tool for the ramp controllers.

  18. 75 FR 26815 - AdvisorShares Investments, LLC and AdvisorShares Trust; Notice of Application

    Science.gov (United States)

    2010-05-12

    ... replace any Deposit Security or Redemption Security that is a to-be-announced transaction (``TBA Transaction''). A TBA transaction is a method of trading mortgage-backed securities. In a TBA Transaction, the... amount of substituted cash in the case of TBA Transactions will be equivalent to the value of the TBA...

  19. Graduate Students' Perceptions of Their Advisors: Is There Systematic Disadvantage in Mentorship?

    Science.gov (United States)

    Noy, Shiri; Ray, Rashawn

    2012-01-01

    We explore how race and gender shape graduate students' perceptions of their advisors. We find evidence that women of color and students in the biological/physical sciences report significantly less support than other groups. Our findings speak to the utility of the intersectionality framework for examining interpersonal relations in higher…

  20. Exploring Inner Speech as a Psycho-Educational Resource for Language Learning Advisors

    Science.gov (United States)

    McCarthy, Tanya M.

    2018-01-01

    The analysis of advising sessions has recognized common standards of the profession in areas such as advising skills employed and non-verbal communicative practices. There are however numerous variations in advisor behavior due to differences in cognitive processes. This study used a stimulated recall approach to identify the content of inner…

  1. Aspects Fostering the Programming of Today's College Radio Station: The Advisor's Perspective.

    Science.gov (United States)

    Sauls, Samuel J.

    To help ascertain leadership, guidance, and capabilities of the station advisor (those who foster the efforts of their student staffs), this paper provides an overview of programming elements discussing such topics as programming philosophy, general formats, and legal and ethical issues. It states that those advising the campus radio station can…

  2. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    International Nuclear Information System (INIS)

    Pollet, J.

    2006-01-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

  3. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    Energy Technology Data Exchange (ETDEWEB)

    Pollet, J. [PlantData Technologies, Inc., 1201 Louisiana Street, Houston, TX 77002 (United States)

    2006-07-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

  4. THE IMPACT ASSESSMENT OF THE ABANDONED URANIUM MINING EXPLOITATIONS ON ROCKS AND SOILS - ZIMBRU PERIMETER, ARAD COUNTY

    Directory of Open Access Journals (Sweden)

    DIANA M. BANU

    2016-10-01

    Full Text Available The mining exploration and exploitation, especially the activity of uranium mineralization exploration and exploitation has a negative impact on the environment by the alterations of the landscape and the degradation of the environmental factors' quality. The principal environmental factors that could be affected by mining operations resulting from uranium exploitation are: water, air, soil, population, fauna, and flora. The aim of this study is, first, to identify the sources of pollution (natural radionuclides - natural radioactive series of uranium, radium, thorium, potassium and heavy metals that are accompanying the mineralizations for two of the most important environmental factors: rocks and soils: and, second, to assess the pollution impact on those two environmental factors. In order to identify this pollutants and their impact assessment it was selected as a study case an abandoned uranium mining perimeter named the Zimbru perimeter located in Arad County, Romania.

  5. 40 CFR 35.4190 - How does my group identify a qualified technical advisor?

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false How does my group identify a qualified technical advisor? 35.4190 Section 35.4190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS...: (1) Demonstrated knowledge of hazardous or toxic waste issues, relocation issues, redevelopment...

  6. Roofline Analysis in the Intel® Advisor to Deliver Optimized Performance for applications on Intel® Xeon Phi™ Processor

    OpenAIRE

    Koskela, TS; Lobet, M

    2017-01-01

    In this session we show, in two case studies, how the roofline feature of Intel Advisor has been utilized to optimize the performance of kernels of the XGC1 and PICSAR codes in preparation for Intel Knights Landing architecture. The impact of the implemented optimizations and the benefits of using the automatic roofline feature of Intel Advisor to study performance of large applications will be presented. This demonstrates an effective optimization strategy that has enabled these science appl...

  7. Architects, Captains, and Dreamers: Creating Advisor Roles that Foster Youth-Adult Partnerships

    Science.gov (United States)

    Mitra, Dana; Lewis, Tiffanie; Sanders, Felicia

    2013-01-01

    While research has documented the many ways in which student voice can enable educational change, the process of how adults can help to enable student voice is less clear. This article examines how adults new to working as advisors of student voice initiatives begin to develop partnerships with young people. Using a Youth-Adult Partnership…

  8. Application Development: AN Interactive, Non-Technical Perspective of the Geology and Geomorphology of the Ouray Perimeter Tail, CO.

    Science.gov (United States)

    Allen, H. M.; Giardino, J. R.

    2015-12-01

    Each year people seek respite from their busy lifestyles by traveling to state or national parks, national forests or wilderness areas. The majority of these parks were established in order to help preserve our natural heritage, including wildlife, forests, and the beauty of landscapes formed from thousands of years of geologic/geomorphologic processes. Whilst being able to enjoy the tranquility of nature, tourists are being robbed of a more in-depth experience as a result of the lack of a geologic background. One such location that attracts a large number of summer tourists is the perimeter trail in Ouray, Colorado. Located in the Southwestern portion of Colorado, Ouray is situated in the beautiful San Juan Mountain range along the "Million Dollar Highway." The Perimeter trail is a six-mile trail loop that circles the city of Ouray. The city is a very popular place for summertime tourism because of its unparalleled scenery. Ouray is situated in an area that is riddled with textbook angular unconformities, metasedimentary, sedimentary, and volcanic rocks. In the study area, The San Juans have been beautifully sculpted by an array of major faulting events, glacial activity and volcanics. With the understanding that technology is ever expanding, we think there is no better way to experience the Perimeter Trail than to have an interactive application that will be both educational as well as interesting. This application is a non-technical way of looking at the geology and geomorphology of the perimeter trail. Additionally, a paper brochure shows the most noteworthy points of interest. The brochure contains a brief geologic history of the San Juan Mountains accompanied with annotated photographs to illustrate the complex geology/geomorphology encountered on the trail. The application is based on an interactive three-dimensional map, which can be zoomed to various scales. The app hosts a locational service that uses the phone's GPS to communicate location of the hiker

  9. Preliminary field evaluation of solid state cameras for security applications

    International Nuclear Information System (INIS)

    1987-01-01

    Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. In general, all-solid-state cameras need to be improved in four areas before they can be used as wholesale replacements for tube cameras in exterior security applications: resolution, sensitivity, contrast, and smear. However, with careful design some of the higher performance cameras can be used for perimeter security systems, and all of the cameras have applications where they are uniquely qualified. Many of the cameras are well suited for interior assessment and surveillance uses, and several of the cameras are well designed as robotics and machine vision devices

  10. Testing the effects of perimeter fencing and elephant exclosures on lion predation patterns in a Kenyan wildlife conservancy.

    Science.gov (United States)

    Dupuis-Desormeaux, Marc; Davidson, Zeke; Pratt, Laura; Mwololo, Mary; MacDonald, Suzanne E

    2016-01-01

    The use of fences to segregate wildlife can change predator and prey behaviour. Predators can learn to incorporate fencing into their hunting strategies and prey can learn to avoid foraging near fences. A twelve-strand electric predator-proof fence surrounds our study site. There are also porous one-strand electric fences used to create exclosures where elephant (and giraffe) cannot enter in order to protect blocs of browse vegetation for two critically endangered species, the black rhinoceros (Diceros bicornis) and the Grevy's zebra (Equus grevyi). The denser vegetation in these exclosures attracts both browsing prey and ambush predators. In this study we examined if lion predation patterns differed near the perimeter fencing and inside the elephant exclosures by mapping the location of kills. We used a spatial analysis to compare the predation patterns near the perimeter fencing and inside the exclosures to predation in the rest of the conservancy. Predation was not over-represented near the perimeter fence but the pattern of predation near the fence suggests that fences may be a contributing factor to predation success. Overall, we found that predation was over-represented inside and within 50 m of the exclosures. However, by examining individual exclosures in greater detail using a hot spot analysis, we found that only a few exclosures contained lion predation hot spots. Although some exclosures provide good hunting grounds for lions, we concluded that exclosures did not necessarily create prey-traps per se and that managers could continue to use this type of exclusionary fencing to protect stands of dense vegetation.

  11. Testing the effects of perimeter fencing and elephant exclosures on lion predation patterns in a Kenyan wildlife conservancy

    Directory of Open Access Journals (Sweden)

    Marc Dupuis-Desormeaux

    2016-02-01

    Full Text Available The use of fences to segregate wildlife can change predator and prey behaviour. Predators can learn to incorporate fencing into their hunting strategies and prey can learn to avoid foraging near fences. A twelve-strand electric predator-proof fence surrounds our study site. There are also porous one-strand electric fences used to create exclosures where elephant (and giraffe cannot enter in order to protect blocs of browse vegetation for two critically endangered species, the black rhinoceros (Diceros bicornis and the Grevy’s zebra (Equus grevyi. The denser vegetation in these exclosures attracts both browsing prey and ambush predators. In this study we examined if lion predation patterns differed near the perimeter fencing and inside the elephant exclosures by mapping the location of kills. We used a spatial analysis to compare the predation patterns near the perimeter fencing and inside the exclosures to predation in the rest of the conservancy. Predation was not over-represented near the perimeter fence but the pattern of predation near the fence suggests that fences may be a contributing factor to predation success. Overall, we found that predation was over-represented inside and within 50 m of the exclosures. However, by examining individual exclosures in greater detail using a hot spot analysis, we found that only a few exclosures contained lion predation hot spots. Although some exclosures provide good hunting grounds for lions, we concluded that exclosures did not necessarily create prey-traps per se and that managers could continue to use this type of exclusionary fencing to protect stands of dense vegetation.

  12. Career advising in family medicine: a theoretical framework for structuring the medical student/faculty advisor interview

    Directory of Open Access Journals (Sweden)

    Melissa Bradner

    2013-08-01

    Full Text Available Background: There are unique challenges to recruiting students into the specialty of family medicine within academic medical centers. Methods: At Virginia Commonwealth University, we developed an advising framework to help students address institutional and personal obstacles to choosing family medicine as a career. Results: The role of a faculty advisor is not to direct the student to a career choice but rather to foster a mentor relationship and help the student come to his or her own realizations regarding career choice. The faculty advisor/medical student interview is conceptualized as five discussion topics: self-knowledge, perception, organizational voice, cognitive dissonance, and anticipatory counseling. Conclusion: This framework is intended to assist faculty in their efforts to encourage students to consider a career in family medicine.

  13. Thermal performance advisor expert system development

    International Nuclear Information System (INIS)

    McClintock, M.; Hirota, N.; Metzinger, R.

    1991-01-01

    In recent years the electric industry has developed an increased interest in improving efficiency of nuclear power plants. EPRI has embarked upon a research project RP2407, Nuclear Plant Performance Improvements which is designed to address needs in this area. One product of this project has been the Thermal Performance Diagnostic Manual for Nuclear Power Plants (NP-4990P). The purpose of this manual is to provide engineering personnel at nuclear power plants with a consistent way in which to identify thermal performance problems. General Physics is also involved in the development of another computer system called Fossil Thermal Performance Advisor (FTPA) which helps operators improve performance for fossil power plants. FTPA is a joint venture between General Physics and New York State Electric and Gas Company. This paper describes both of these computer systems and uses the FTPA as an interesting comparison that illustrates the considerations required for the development of a computer system that effectively addresses the needs of the users

  14. Communicating Health Risks under Pressure: Homeland Security Applications

    International Nuclear Information System (INIS)

    Garrahan, K.G.; Collie, S.L.

    2006-01-01

    The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to

  15. Elaboration et Suivi des Budgets de Marketing Industriel: le Système ADVISOR

    OpenAIRE

    Choffray, Jean-Marie; Delabre, Gilles

    1982-01-01

    Cet article revoit les problèmes posés par l'élaboration et le suivi des budgets de marketing dans un environnement industriel. Il présente le système ADVISOR pour lequel nous avons développé un programme interactif adapté aux besoins des entreprises Françaises.

  16. Partnering With a Family Advisor to Improve Communication in a Pediatric Intensive Care Unit.

    Science.gov (United States)

    Czulada, Laura; Leino, Patience; Willis, Tina Schade

    2016-11-01

    Inadequate communication between medical teams and families can lead to errors and poor-quality care. The objective was to understand why communication between the clinical team and families was not occurring consistently in the pediatric intensive care unit and improve the system using a multidisciplinary improvement team including a family advisor. This improvement project used Lean Six Sigma. The team observed updates and collected documented communication, survey, interview, and focus group data from families and staff. Root causes of failures included lack of assigned responsibility, lack of defined daily update, and lack of a daily communication standard. Process changes were implemented, resulting in an increased mean documented communication rate from 13% pre intervention to 65% post intervention that was sustained for more than 2 years (P < .001). Including a family advisor as an equal member of an improvement team provides family empowerment and a greater chance of success in complex areas. © The Author(s) 2015.

  17. Doctoral Advisor-Advisee Pairing in STEM Fields: Selection Criteria and Impact of Faculty, Student and Departmental Factors

    Directory of Open Access Journals (Sweden)

    Simy Joy

    2015-09-01

    Full Text Available Unlike the doctoral programs in places where students are paired with advisors at the time of admission itself, most US programs require the students to choose their advisors, and the advisors to formally accept the students as advisees. Little research has been done to understand how students and faculty approach this mutual selection and pairing process. This paper examines this process in STEM departments (Science, Technology, Engineering and Mathematics, with specific focus on factors influencing the decisions. Based on focus groups and interviews of doctoral students and faculty from STEM departments in an American university, we identify criteria applied by students and faculty in making their choices. Students were found to assess faculty on available funding, area of research, personality, ability to graduate students fast, and career prospects for students, and faculty to assess students on their qualifications/credentials and perceived ability to contribute to research. We also found that this mutual assessment was not objective, but influenced by perceptions associated with faculty gender and career stage, and student nationality. In the end, whether students and faculty were actually paired with persons of their choice depended on departmental factors including prevalent pairing practices, restrictions on student numbers per faculty, and reward structure. We discuss implications of the findings for research and practice.

  18. Conceptual Design Approach to Implementing Hardware-based Security Controls in Data Communication Systems

    International Nuclear Information System (INIS)

    Ibrahim, Ahmad Salah; Jung, Jaecheon

    2016-01-01

    In the Korean Advanced Power Reactor (APR1400), safety control systems network is electrically isolated and physically separated from non-safety systems data network. Unidirectional gateways, include data diode fiber-optic cabling and computer-based servers, transmit the plant safety critical parameters to the main control room (MCR) for control and monitoring processes. The data transmission is only one-way from safety to non-safety. Reverse communication is blocked so that safety systems network is protected from potential cyberattacks or intrusions from non-safety side. Most of commercials off-the-shelf (COTS) security devices are software-based solutions that require operating systems and processors to perform its functions. Field Programmable Gate Arrays (FPGAs) offer digital hardware solutions to implement security controls such as data packet filtering and deep data packet inspection. This paper presents a conceptual design to implement hardware-based network security controls for maintaining the availability of gateway servers. A conceptual design of hardware-based network security controls was discussed in this paper. The proposed design is aiming at utilizing the hardware-based capabilities of FPGAs together with filtering and DPI functions of COTS software-based firewalls and intrusion detection and prevention systems (IDPS). The proposed design implemented a network security perimeter between the DCN-I zone and gateway servers zone. Security control functions are to protect the gateway servers from potential DoS attacks that could affect the data availability and integrity

  19. Conceptual Design Approach to Implementing Hardware-based Security Controls in Data Communication Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, Ahmad Salah; Jung, Jaecheon [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2016-10-15

    In the Korean Advanced Power Reactor (APR1400), safety control systems network is electrically isolated and physically separated from non-safety systems data network. Unidirectional gateways, include data diode fiber-optic cabling and computer-based servers, transmit the plant safety critical parameters to the main control room (MCR) for control and monitoring processes. The data transmission is only one-way from safety to non-safety. Reverse communication is blocked so that safety systems network is protected from potential cyberattacks or intrusions from non-safety side. Most of commercials off-the-shelf (COTS) security devices are software-based solutions that require operating systems and processors to perform its functions. Field Programmable Gate Arrays (FPGAs) offer digital hardware solutions to implement security controls such as data packet filtering and deep data packet inspection. This paper presents a conceptual design to implement hardware-based network security controls for maintaining the availability of gateway servers. A conceptual design of hardware-based network security controls was discussed in this paper. The proposed design is aiming at utilizing the hardware-based capabilities of FPGAs together with filtering and DPI functions of COTS software-based firewalls and intrusion detection and prevention systems (IDPS). The proposed design implemented a network security perimeter between the DCN-I zone and gateway servers zone. Security control functions are to protect the gateway servers from potential DoS attacks that could affect the data availability and integrity.

  20. OTA director to be Clinton's science advisor

    Science.gov (United States)

    Leath, Audrey

    President Clinton has nominated John H. “Jack” Gibbons to be Assistant to the President for Science and Technology, and director of the White House Office of Science and Technology Policy (OSTP). For over a decade, Gibbons has served as director of the Office of Technology Assessment (OTA), a bipartisan research arm of Congress.In nominating Gibbons, Clinton said, “I am delighted to appoint a brilliant scientist and gifted administrator… It is profoundly important that the president have a science advisor who understands science, who understands technology, who understands the practical application of these disciplines to the myriad of problems we face today. And I can tell you that from [Vice-president] Al Gore on down to every other member of Congress I have discussed John Gibbons with, I have hardly ever received more glowing and more consistent recommendations for anyone.”

  1. Rapid repair advisor for motor-operated valves

    International Nuclear Information System (INIS)

    Somsel, J.K.

    1991-01-01

    This paper reports on the initial proposed application for the Rapid Repair Advisor project for motor-operated valves (MOVs). The expected benefits from an MOV testing expert system depend on the purpose of the testing. Straight acceptance testing (post-maintenance and surveillance) could benefit from field verification of test validity. Troubleshooting of failed operators is seldom difficult. Intermittent problems are difficult to resolve suggesting that trace recording capabilities are needed. Predictive diagnosis places the most demands on the interpretive skills of the engineer. However, the limit to predictive capabilities seems to lie in the design of the MOV and the measurable parameters. Utilities are expected to require a knowledgeable MOV maintenance engineer to make decisions on MOV maintenance and operability. The economics of developing an expert system are comparable to improved training for the end-users

  2. The Moderating Effect of Personality Traits on Advisor Relationships in Predicting Doctoral Student Burnout

    Science.gov (United States)

    Kosh, Emily P.

    2014-01-01

    Personality affects relationships. During the doctoral education, the second most important factor in degree completion, after financial support, is the student-advisor relationship. Approximately half of doctoral students do not finish their degrees. While it is known mentors have a profound impact on the success of doctoral students, the effect…

  3. The Northern States Power Company welding manual advisor

    International Nuclear Information System (INIS)

    Lu, Yi; Wood, R.M.

    1993-01-01

    The Welding Manual Advisor (WMA) is an object oriented expert system designed to assist Northern States Power (NSP) personnel in implementing the company's Welding Manual. The expert system captures the knowledge of welding experts, addresses important issues in welding activities and automates the use of the Welding Manual. It is estimated that use of the WMA will save $81,000 over the next six years at NSP, because of the reduction of labor and errors in the use of the Welding Manual, and facilitation of training of NSP personnel. The important features of the WMA include the accuracy and consistency in determining welding procedure and requirements, update capability, user friendly interface, on-line help function, back-up capability, and well-documented manuals

  4. Robo advisor, your reliable partner? Building a trustworthy digital investment management service

    OpenAIRE

    Salo, Anni

    2017-01-01

    Investment management services have strongly relied on traditional face-to-face business models, causing the services being highly expensive and therefore available only for the wealthiest population. Recently a new digital business model, robo advisors, entered the market and are predicted to democratise the entire industry by bringing investment management services available to a wider public than ever before. Although the business models in financial services are changing, customer tr...

  5. Activity-based costing of security services for a Department of Energy nuclear site

    International Nuclear Information System (INIS)

    Togo, D.F.

    1997-01-01

    Department of Energy (DOE) nuclear facilities are being encouraged to reduce costs but the accounting data typically in use by the financial organizations at these laboratories cannot easily be used to determine which security activities offer the best reduction in cost. For example, labor costs have historically been aggregated over various activities, making it difficult to determine the true costs of performing each activity. To illustrate how this problem can be solved, a study was performed applying activity-based costing (ABC) to a hypothetical DOE facility. ABC is a type of cost-accounting developed expressly to determine truer costs of company activities. The hypothetical facility was defined to have features similar to those found across the DOE nuclear complex. ABC traced costs for three major security functions - Protective Force Operations, Material Control and Accountability, and Technical Security - to various activities. Once these costs had been allocated, we compared the cost of three fictitious upgrades: (1) an improvement in training or weapons that allows the protective force to have better capabilities instead of adding more response forces; (2) a change in the frequency of inventories; and (3) a reduction in the annual frequencies of perimeter sensor tests

  6. Doing Research Together: A Study on the Views of Advisors with Intellectual Disabilities and Non-Disabled Researchers Collaborating in Research.

    Science.gov (United States)

    Puyalto, Carol; Pallisera, Maria; Fullana, Judit; Vilà, Montserrat

    2016-03-01

    Despite an increase in inclusive studies in recent years, research on the views of the people with and without disabilities who have participated in these studies is scarce. The aim of this study was to explore the perceptions and views of advisors with intellectual disabilities and non-disabled researchers who collaborated together on a joint project to study transition to adulthood. Two questionnaires were devised, one for advisors and one for researchers; two focus groups were held with people with intellectual disabilities, three focus groups with researchers, and one focus group with all participants together. Thematic analysis was used for the data analysis. The advisors valued this experience as an opportunity to learn new skills, freely express themselves on matters that affect them, and engage in a socially valued activity. The researchers considered that the participation of people with intellectual disabilities contributed to improving the quality of the research. The study provides a better understanding of inclusive research processes by taking into account participants' views. © 2015 John Wiley & Sons Ltd.

  7. Preferential Hyperacuity Perimeter (PreView PHP) for detecting choroidal neovascularization study.

    Science.gov (United States)

    Alster, Yair; Bressler, Neil M; Bressler, Susan B; Brimacombe, Judith A; Crompton, R Michael; Duh, Yi-Jing; Gabel, Veit-Peter; Heier, Jeffrey S; Ip, Michael S; Loewenstein, Anat; Packo, Kirk H; Stur, Michael; Toaff, Techiya

    2005-10-01

    To assess the ability of the Preferential Hyperacuity Perimeter (PreView PHP; Carl Zeiss Meditec, Dublin, CA) to detect recent-onset choroidal neovascularization (CNV) resulting from age-related macular degeneration (AMD) and to differentiate it from an intermediate stage of AMD. Prospective, comparative, concurrent, nonrandomized, multicenter study. Eligible participants' study eyes had a corrected visual acuity of 20/160 or better and either untreated CNV from AMD diagnosed within the last 60 days or an intermediate stage of AMD. After obtaining consent, visual acuity with habitual correction, masked PHP testing, stereoscopic color fundus photography, and fluorescein angiography were performed. Photographs and angiograms were evaluated by graders masked to diagnosis and PHP results. The reading center's diagnosis determined if the patient was categorized as having intermediate AMD or neovascular AMD. A successful study outcome was defined a priori as a sensitivity of at least 80% and a specificity of at least 80%. Of 185 patients who gave consent to be enrolled, 11 (6%) had PHP results judged to be unreliable. An additional 52 were not included because they did not meet all eligibility criteria. Of the remaining 122 patients, 57 had an intermediate stage of AMD and 65 had neovascular AMD. The sensitivity to detect newly diagnosed CNV using PHP testing was 82% (95% confidence interval [CI], 70%-90%). The specificity to differentiate newly diagnosed CNV from the intermediate stage of AMD using PHP testing was 88% (95% CI, 76%-95%). Preferential Hyperacuity Perimeter testing can detect recent-onset CNV resulting from AMD and can differentiate it from an intermediate stage of AMD with high sensitivity and specificity. These data suggest that monitoring with PHP should detect most cases of CNV of recent onset with few false-positive results at a stage when treatment usually would be beneficial. Thus, this monitoring should be considered in the management of the

  8. Does young adults' preferred role in decision making about health, money, and career depend on their advisors' leadership skills?

    Science.gov (United States)

    Garcia-Retamero, Rocio; Galesic, Mirta

    2013-01-01

    Few empirical data exist on how decision making about health differs from that in other crucial life domains with less threatening consequences. To shed light on this issue we conducted a study with 175 young adults (average age 19 years). We presented the participants with scenarios involving advisors who provided assistance in making decisions about health, money, and career. For each scenario, participants were asked to what extent they wanted the advisor to exhibit several leadership styles and competencies and what role (active, collaborative, or passive) they preferred to play when making decisions. Results show that decision making about health is distinct from that in the other domains in three ways. First, most of the participants preferred to delegate decision making about their health to their physician, whereas they were willing to collaborate or play an active role in decision making about their career or money. Second, the competencies and leadership style preferred for the physician differed substantially from those desired for advisors in the other two domains: Participants expected physicians to show more transformational leadership--the style that is most effective in a wide range of environments--than those who provide advice about financial investments or career. Finally, participants' willingness to share medical decision making with their physician was tied to how strongly they preferred that the physician shows an effective leadership style. In contrast, motivation to participate in decision making in the other domains was not related to preferences regarding advisors' leadership style or competencies. Our results have implications for medical practice as they suggest that physicians are expected to have superior leadership skills compared to those who provide assistance in other important areas of life.

  9. Farmers’ willingness to pay for surface water in the West Mitidja irrigated perimeter, northern Algeria

    International Nuclear Information System (INIS)

    Azzi, M.; Calatrava, J.; Bedrani, S.

    2018-01-01

    Algeria is among the most water-stressed countries in the world. Because of its climatic conditions, irrigation is essential for agricultural production. Water prices paid by farmers in public irrigation districts are very low and do not cover the operation and maintenance (O&M) costs of the irrigated perimeters, thus leading to the deterioration of these infrastructures. The objective of this paper is to analyse whether farmer’s in the West Mitidja irrigation district in northern Algeria would be willing to pay more for surface water in order to maintain the water supply service in its current conditions. We estimated farmers’ willingness to pay (WTP) for water using data from a dichotomous choice contingent valuation survey to 112 randomly selected farmers. Farmers’ responses were modelled using logistic regression techniques. We also analysed which technical, structural, social and economic characteristics of farms and farmers explain the differences in WTP. Our results showed that nearly 80% of the surveyed farmers are willing to pay an extra price for irrigation water. The average WTP was 64% greater than the price currently paid by farmers, suggesting some scope for improving the financial resources of the Mitidja irrigated perimeter, but insufficient to cover all O&M costs. Some of the key identified factors that affect WTP for surface water relate to farm ownership, access to groundwater resources, cropping patterns, farmers’ agricultural training and risk exposure.

  10. Rigorous derivation of the perimeter generating functions for the mean-squared radius of gyration of rectangular, Ferrers and pyramid polygons

    International Nuclear Information System (INIS)

    Lin, Keh Ying

    2006-01-01

    We have derived rigorously the perimeter generating functions for the mean-squared radius of gyration of rectangular, Ferrers and pyramid polygons. These functions were found by Jensen recently. His nonrigorous results are based on the analysis of the long series expansions. (comment)

  11. Theoretical construction of the contextualized dynamics of the constant shaping of advisor professors in the teaching unit

    Directory of Open Access Journals (Sweden)

    Nirma Pérez-Pelipiche

    2016-10-01

    Full Text Available This work paper shows research results on the contextualized dynamics of the constant shaping of advisor professors in the teaching unit, taking epistemological foundations as a starting point, which substantiate their theoretical construction. A model has been displayed basing on comprehension and interpretation of this process as a whole, in which its subsystems, components, structure, relations and levels among them, prove contradictions that become evident in such process, therefore allowing to structure the dynamics of shaping professors as an instrument, earning, as a result, the transforming capability of advisor professors when practicing their skill, having the teaching unit as a scenary. In that way we used different techniques: questionnaire, interviews, observation, statistical techniques and methods: historical-logical; analysis-synthesis and systemic-structural-functional, all of those ones from the hermeneutic-dialectic focus.

  12. An intelligent, knowledge-based multiple criteria decision making advisor for systems design

    Science.gov (United States)

    Li, Yongchang

    of an appropriate decision making method. Furthermore, some DMs may be exclusively using one or two specific methods which they are familiar with or trust and not realizing that they may be inappropriate to handle certain classes of the problems, thus yielding erroneous results. These issues reveal that in order to ensure a good decision a suitable decision method should be chosen before the decision making process proceeds. The first part of this dissertation proposes an MCDM process supported by an intelligent, knowledge-based advisor system referred to as Multi-Criteria Interactive Decision-Making Advisor and Synthesis process (MIDAS), which is able to facilitate the selection of the most appropriate decision making method and which provides insight to the user for fulfilling different preferences. The second part of this dissertation presents an autonomous decision making advisor which is capable of dealing with ever-evolving real time information and making autonomous decisions under uncertain conditions. The advisor encompasses a Markov Decision Process (MDP) formulation which takes uncertainty into account when determines the best action for each system state. (Abstract shortened by UMI.)

  13. The Advisor as Servant: The Theoretical and Philosophical Relevance of Servant Leadership to Academic Advising

    Science.gov (United States)

    McClellan, Jeffrey L.

    2007-01-01

    Servant. This novel actively portrays Greenleaf's concept of servant leadership by describing the extracurricular work of a university professor. Consequently, some scholars have demonstrated the relevance of servant leadership to classroom instruction (Powers & Moore, 2005). However, it was not as an instructor, but as an advisor that the…

  14. 75 FR 54673 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2010-09-08

    ... financial journal soliciting nominations for municipal advisor candidates, with the Nominating Committee... must be associated with a municipal advisor. For the first time, the MSRB has been authorized to promulgate rules governing the conduct of municipal advisors who must be fairly represented on the Board...

  15. 75 FR 61806 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2010-10-06

    ... under MSRB Rule A-3(i), to allow the Nominating Committee to solicit nominations for municipal advisor... Independent Public Finance Advisors, dated September 22, 2010 (``NAIPFA Letter''); letter from Michael Decker... No. 1, to address concerns raised by commenters, MSRB proposes that advisor representatives (as...

  16. CRITERIA FOR CONSULTANT AND ADVISOR IN THE BRAZILIAN POSTGRADUATE SYSTEM.

    Science.gov (United States)

    Petroianu, Andy

    2015-01-01

    To review the rules, resolutions and existing documents relating to consultant and advisor to better target the actions of those who exercise these roles. The following documents were consulted: Statute of CAPES, through Decree No. 7692 of March 2, 2012; Ordinance No. 47 of 17/10/1995; Opinion 977 1965 Newton Sucupira; Area Document of Medicine III; Interministerial Ordinance 251 of 2012, based on Decree No. 7642 of 2011 of the Ministry of Science and Technology; CAPES Regiment. The Brazilian Postgraduate system is divided in two different fields, according to its aspects: the "lato sensu" postgraduate, defined as all professional studies performed after the high school graduation; and the "stricto sensu" postgraduate that includes the master degree and the doctorate, both of them different from what is known as MSc or MS and PhD. The Brazilian doctorate is recognized as academic because its purposes include to improve the scientific and the teaching levels of university docents. The master degree has two different objectives one is to be academic and similar to the doctorate; the other is to upgrade professionals to a higher level than specialist or MBA and is denominated professional master degree. The master degrees and the doctorate are designated as courses and may be put together in a structure known as stricto sensu postgraduate program. The complexity of these courses and programs in all the areas of the superior human knowledge requires a large number of professional directly involved with this system and other professionals that attend them, called consultants and advisors. The consultants are counselors, and the advisors are assistants, both of them legally established with the incumbency to aid the postgraduate staff in all their duties. Nothing prevents a person from being a consultant on the situation and advisor on another, even in the same institution. Have knowledge about what being a consultant and advisor is required to exercise the function

  17. Computer Security: The dilemma of fractal defence

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Aren’t mathematical fractals just beautiful? The Mandelbrot set and the Julia set, the Sierpinski gasket, the Menger sponge, the Koch curve (see here)… Based on very simple mathematical rules, they quickly develop into a mosaic of facets slightly different from each other. More and more features appear the closer you zoom into a fractal and expose similar but not identical features of the overall picture.   Computer security is like these fractals, only much less pretty: simple at first glance, but increasingly complex and complicated when you look more closely at the details. The deeper you dig, the more and more possibilities open up for malicious people as the attack surface grows, just like that of “Koch’s snowflakes”, where the border length grows exponentially. Consequently, the defensive perimeter also increases when we follow the bits and bytes layer by layer from their processing in the CPU, trickling up the software stack thro...

  18. Designing Security-Hardened Microkernels For Field Devices

    Science.gov (United States)

    Hieb, Jeffrey; Graham, James

    Distributed control systems (DCSs) play an essential role in the operation of critical infrastructures. Perimeter field devices are important DCS components that measure physical process parameters and perform control actions. Modern field devices are vulnerable to cyber attacks due to their increased adoption of commodity technologies and that fact that control networks are no longer isolated. This paper describes an approach for creating security-hardened field devices using operating system microkernels that isolate vital field device operations from untrusted network-accessible applications. The approach, which is influenced by the MILS and Nizza architectures, is implemented in a prototype field device. Whereas, previous microkernel-based implementations have been plagued by poor inter-process communication (IPC) performance, the prototype exhibits an average IPC overhead for protected device calls of 64.59 μs. The overall performance of field devices is influenced by several factors; nevertheless, the observed IPC overhead is low enough to encourage the continued development of the prototype.

  19. Career Preparation: An Often Omitted Element of the Advisor-Graduate Student Relationship

    Science.gov (United States)

    McManus, D. A.

    2001-05-01

    Most graduate research advisors care about the education of their graduate students. However, they often define "graduate education" so narrowly that it consists only of solving a research problem. This narrow definition is consistent with their principal goal as geoscientists, to understand the Earth better, and with the reward system typical of research universities, with its emphasis on research. As a result, most advisors usually well prepare students to be researchers in research universities. Research, however, is only part of a faculty member's duties. Commonly omitted is mentoring in the teaching and service duties of a faculty member. Students interested in teaching, in positions in other academic institutions, or in careers outside of academia may be perceived as questioning the advisors' career values and may not be encouraged in these interests. Graduate students should take an active role in their education. In addition to seeking information on career preparation from the campus career center and teaching center and from books, newsmagazines, newspapers, and seminars, students should also seek mentors who have demonstrated an interest in what the student is interested in: teaching and service, as well as research, or in careers outside academia. These mentors may be the students' committee members, other faculty members, or other professional geoscientists. With a broad base of information and some personal decisions, students will have a rationale for exploring careers. The questions students ask can now be more specific: How do they gain the requisite breadth in knowledge and the beneficial skills, beyond the depth of the research experience, and how do they gain opportunities to practice these skills? In short, how can they experience, and preferably practice, what professional geoscientists do in particular careers? If necessary, graduate students can work together to answer these questions by inviting experts to offer workshops in the department

  20. Decommissioning economic risk advisor: DERAD Version 1.0 user's manual. Final report

    International Nuclear Information System (INIS)

    Gjerde, A.R.; Qian, M.; Govil, P.; Balson, W.E.

    1995-04-01

    DERAD - Decommissioning Economic and Risk ADvisor - is a decision support tool designed to help utility decision makers analyze economics and financial risk of decommissioning nuclear power plants. Your current copy of DERAD, Version 1.0, is customized for PWR configurated plants. DERAD has been developed by Decision Focus Incorporated under EPRI sponsorship. If you have ideas or recommendations for how we can improve and enhance future versions of DERAD, we would like to hear from you

  1. Data Transfer Advisor with Transport Profiling Optimization

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Liu, Qiang [ORNL; Yun, Daqing [Harrisburg University; Wu, Chase Qishi [New Jersey Institute of Technology; Kettimuthu, R. [Argonne National Laboratory (ANL); Jung, Eun-sung [Argonne National Laboratory (ANL)

    2017-11-01

    The network infrastructures have been rapidly upgraded in many high-performance networks (HPNs). However, such infrastructure investment has not led to corresponding performance improvement in big data transfer, especially at the application layer, largely due to the complexity of optimizing transport control on end hosts. We design and implement ProbData, a PRofiling Optimization Based DAta Transfer Advisor, to help users determine the most effective data transfer method with the most appropriate control parameter values to achieve the best data transfer performance. ProbData employs a profiling optimization based approach to exploit the optimal operational zone of various data transfer methods in support of big data transfer in extreme scale scientific applications. We present a theoretical framework of the optimized profiling approach employed in ProbData as wellas its detailed design and implementation. The advising procedure and performance benefits of ProbData are illustrated and evaluated by proof-of-concept experiments in real-life networks.

  2. The U.S. National Security Council in Contemporary American International Studies

    Directory of Open Access Journals (Sweden)

    Vladimir V. Pavlov

    2016-01-01

    Full Text Available Established in accordance with the provisions of the National Security Act of 1947, the U.S. National Security Council is the main advisory body to the President of the United States tasked with helping the head of state to make the right decisions on matters related to national security. NSC system has been constantly evolving for some 70 years, and the NSC staff became a separate 'ministry' of a kind, allowing presidential administrations to focus ever-increasing control over American foreign policy in the White House. That is why serious attention is devoted to the National Security Council by American researches studying foreign policy decision-making. Here, a 'three-pronged consensus' exists: functioning and efficiency of the decision-making process is primarily a result of presidential actions; the President will make the best decision after becoming aware of the whole range of possible alternatives and assessing the consequences of each policy option; the position of the National Security Advisor, who is often one of the closest officials to the President and serves as a coordinator of the decision-making process, is considered to be one of the most notable in today's U.S. presidential administrations - and the most influential of those not being a subject to approval by the legislative branch of U.S. government. Any fundamental changes in the practice of U.S. foreign policy mechanism, as well as a decline of the White House influence on foreign policy are unlikely in the short term.

  3. Retrospective Review of Student Research Projects in a Canadian Master of Science in Physical Therapy Programme and the Perceived Impact on Advisors' Research Capacity, Education, Clinical Practice, Knowledge Translation, and Health Policy.

    Science.gov (United States)

    Lacey, Courtney; Scodras, Stephanie; Ardron, Julie; Sellan, Ryan; Garbaczewska, Martyna; O'Brien, Kelly K; Salbach, Nancy M

    2018-01-01

    Purpose: This study's aim was to characterize the nature of students' research conducted for a Master of Science in Physical Therapy (MScPT) degree programme at a Canadian university and evaluate the lead advisors' perspectives of its impact on their research capacity, education, clinical practice, knowledge translation, and health policy. Methods: We conducted a quantitative, cross-sectional, retrospective review of research reports from 2003 to 2014 to characterize the MScPT students' research and a quantitative, cross-sectional e-survey of lead research advisors to evaluate the impact of this research. Results: Data were abstracted from reports of 201 research projects completed between 2003 and 2014. Projects were conducted primarily in university-affiliated hospitals (41.6%) or the university's physical therapy department (41.1%), and the majority (52.5%) had a clinical focus. Of the 95 lead advisors of 201 projects, 59 advisors (response rate 62.1%) of 119 projects completed the survey questionnaire. The respondents most frequently identified clinical practice (45.1%) and advisors' research capacity (31.4%) as areas positively affected by the students' research. Conclusions: The MScPT students' research projects facilitate the conduct of extensive research internally and across affiliated hospitals. This research appears to advance not only clinical practice but also the ability of lead advisors to undertake research.

  4. The environmental impacts of land transformation in the coastal perimeter of the Mar Menor lagoon (Spain)

    OpenAIRE

    GARCÍA-AYLLON VEINTIMILLA, SALVADOR; Miralles García, José Luis

    2014-01-01

    Assigned to WIT Press all rights under copyright that may exist in and to the Work and any associated written or multimedia components or other enhancements accompanying the Work. The distinctive environment of the lagoon has long been attractive for visitors. A surge in touristic activities has taken place in the area since the early 1960s, characterised by intense urban development along the lagoon s perimeter to accommodate the growing seasonal population. This phenomenon has particular...

  5. Farmers’ willingness to pay for surface water in the West Mitidja irrigated perimeter, northern Algeria

    Directory of Open Access Journals (Sweden)

    Malika Azzi

    2018-04-01

    Full Text Available Algeria is among the most water-stressed countries in the world. Because of its climatic conditions, irrigation is essential for agricultural production. Water prices paid by farmers in public irrigation districts are very low and do not cover the operation and maintenance (O&M costs of the irrigated perimeters, thus leading to the deterioration of these infrastructures. The objective of this paper is to analyse whether farmer’s in the West Mitidja irrigation district in northern Algeria would be willing to pay more for surface water in order to maintain the water supply service in its current conditions. We estimated farmers’ willingness to pay (WTP for water using data from a dichotomous choice contingent valuation survey to 112 randomly selected farmers. Farmers’ responses were modelled using logistic regression techniques. We also analysed which technical, structural, social and economic characteristics of farms and farmers explain the differences in WTP. Our results showed that nearly 80% of the surveyed farmers are willing to pay an extra price for irrigation water. The average WTP was 64% greater than the price currently paid by farmers, suggesting some scope for improving the financial resources of the Mitidja irrigated perimeter, but insufficient to cover all O&M costs. Some of the key identified factors that affect WTP for surface water relate to farm ownership, access to groundwater resources, cropping patterns, farmers’ agricultural training and risk exposure.

  6. Area G perimeter surface-soil and single-stage water sampling: Environmental surveillance for fiscal year 94, Group ESH-19. Progress report

    International Nuclear Information System (INIS)

    Conrad, R.; Childs, M.; Lyons, C.R.; Coriz, F.

    1996-08-01

    ESH-19 personnel collected soil and single-stage water samples around the perimeter of Area G at Los Alamos National Laboratory during FY94 to characterize possible contaminant movement out of Area G through surface-water and sediment runoff. These samples were analyzed for tritium, total uranium, isotopic plutonium, americium-241, and cesium-137. Ten metals were also analyzed on selected soils using analytical laboratory techniques. All radiochemical data are compared with analogous samples collected during FY 93 and reported in LA-12986. Baseline concentrations for future disposal operations were established for metals and radionuclides by a sampling program in the proposed Area G Expansion Area. Considering the amount of radioactive waste that has been disposed at Area G, there is evidence of only low concentrations of radionuclides on perimeter surface soils. Consequently, little radioactivity is leaving the confines of Area G via the surface water runoff pathway

  7. 76 FR 33376 - Altegris Advisors, L.L.C. and Northern Lights Fund Trust; Notice of Application

    Science.gov (United States)

    2011-06-08

    ... the Fund and its shareholders, and does not involve a conflict of interest from which the Adviser or... amend subadvisory agreements without shareholder approval. Applicants: Altegris Advisors, L.L.C. (the.... Interested persons may request a hearing by writing to the Commission's Secretary and serving applicants with...

  8. Culturally Competent Training Program: A Key to Training Lay Health Advisors for Promoting Breast Cancer Screening

    Science.gov (United States)

    Yu, Mei-yu; Song, Lixin; Seetoo, Amy; Cai, Cuijuan; Smith, Gary; Oakley, Deborah

    2007-01-01

    The lay health advisor (LHA) training program for breast cancer screening was conducted among Chinese-English bilingual trainees residing in Southeast Michigan. Guided by Bandura's Social Learning Theory, the development of the training curriculum followed the health communication process recommended by the National Cancer Institute. Data analysis…

  9. Shift technical advisors: in the eyes of the NRC

    International Nuclear Information System (INIS)

    Crocker, L.P.

    1981-01-01

    Since January 1, 1980, the NRC has required that Shift Technical Advisors be on-shift at all operating nuclear power plants. The objective of the requirement is to assure that technical expertise is immediately available to each operating shift to assess off-normal events and to provide advice to control room personnel. Further, this advice and assistance is to be provided by an individual not responsible for control manipulations or for directing the activities of reactor operators. The long-term requirement for on-shift technical expertise is firm. However, the exact manner in which this expertise must be furnished has not been determined. Licensees have proposed various alternatives to meet this requirement. These proposals still are being reviewed by the NRC staff

  10. 77 FR 60732 - PACE Select Advisors Trust and UBS Global Asset Management (Americas) Inc.; Notice of Application

    Science.gov (United States)

    2012-10-04

    ....; Institutional Capital, LLC; J.P. Morgan Investment Management, Inc.; Kayne Anderson Rudnick Investment...; Standish Mellon Asset Management Company, LLC; Systematic Financial Management, L.P.; Wellington Management... Select Advisors Trust and UBS Global Asset Management (Americas) Inc.; Notice of Application September 27...

  11. Historical Fire Perimeters (2000 to 2011)

    Data.gov (United States)

    Department of Homeland Security — The Geospatial Multi-Agency Coordination Group, or GeoMAC, is an internet-based mapping tool originally designed for fire managers to access online maps of current...

  12. Photonic sensor opportunities for distributed and wireless systems in security applications

    Science.gov (United States)

    Krohn, David

    2006-10-01

    There are broad ranges of homeland security sensing applications that can be facilitated by distributed fiber optic sensors and photonics integrated wireless systems. These applications include [1]: Pipeline, (Monitoring, Security); Smart structures (Bridges, Tunnels, Dams, Public spaces); Power lines (Monitoring, Security); Transportation security; Chemical/biological detection; Wide area surveillance - perimeter; and Port Security (Underwater surveillance, Cargo container). Many vital assets which cover wide areas, such as pipeline and borders, are under constant threat of being attacked or breached. There is a rapidly emerging need to be able to provide identification of intrusion threats to such vital assets. Similar problems exit for monitoring the basic infrastructure such as water supply, power utilities, communications systems as well as transportation. There is a need to develop a coordinated and integrated solution for the detection of threats. From a sensor standpoint, consideration must not be limited to detection, but how does detection lead to intervention and deterrence. Fiber optic sensor technology must be compatible with other surveillance technologies such as wireless mote technology to facilitate integration. In addition, the multi-functionality of fiber optic sensors must be expanded to include bio-chemical detection. There have been a number of barriers for the acceptance and broad use of smart fiber optic sensors. Compared to telecommunications, the volume is low. This fact coupled with proprietary and custom specifications has kept the price of fiber optic sensors high. There is a general lack of a manufacturing infrastructure and lack of standards for packaging and reliability. Also, there are several competing technologies; some photonic based and other approaches based on conventional non-photonic technologies.

  13. Concept of Operations for the Next Generation Air Transportation System. Version 3.2

    Science.gov (United States)

    2011-01-01

    Airside. Security Identification Display Area/Airport ( SIDA ) operations area, terminal perimeter, terminal airspace (security) • Landside. Terminal...Definition RTSS Remote Terminal Security Screening SAA Special Activity Airspace SIDA Security Identification Display Area SM Separation Management

  14. 76 FR 823 - Registration of Municipal Advisors

    Science.gov (United States)

    2011-01-06

    ... financial products.\\12\\ For example, as derivatives have developed in the municipal securities market, some... public information regarding the size of the municipal securities derivative market. Estimates of the..., Municipal Derivative Securities--Uses and Valuation 21 (1995) (discussion of revenue bonds). See also...

  15. Teachers Providing Social and Emotional Support: A Study of Advisor Role Enactment in Small High Schools

    Science.gov (United States)

    Phillippo, Kate L.

    2010-01-01

    Background/Context: This study investigates the teacher's role in the student advisory process, which to date has generated limited research literature. Teachers who serve as student advisors assume a role that extends beyond the more traditional instructional role, and includes implied or explicit expectations to provide student advisees with…

  16. Fostering Academic Self-Concept: Advisor Support and Sense of Belonging among International and Domestic Graduate Students

    Science.gov (United States)

    Curtin, Nicola; Stewart, Abigail J.; Ostrove, Joan M.

    2013-01-01

    International doctoral students in the United States face challenges of acculturation in academia yet complete graduate school at higher rates and more quickly than their domestic counterparts. This study examined advisor support, sense of belonging, and academic self-concept among international and domestic doctoral students at a research…

  17. Latino sexual and gender identity minorities promoting sexual health within their social networks: Process evaluation findings from a lay health advisor intervention

    Science.gov (United States)

    Sun, Christina J.; García, Manuel; Mann, Lilli; Alonzo, Jorge; Eng, Eugenia; Rhodes, Scott D.

    2015-01-01

    The HOLA intervention was a lay health advisor intervention designed to reduce the disproportionate HIV burden borne by Latino sexual and gender identity minorities (gay, bisexual, and other men who have sex with men, and transgender persons) living in the United States. Process evaluation data were collected for over a year of intervention implementation from 11 trained Latino male and transgender lay health advisors (Navegantes) to document the activities each Navegante conducted to promote condom use and HIV testing among his or her 8 social network members enrolled in the study. Over 13 months, the Navegantes reported conducting 1,820 activities. The most common activity was condom distribution. Navegantes had extensive reach beyond their enrolled social network members, and they engaged in health promotion activities beyond social network members enrolled in the study. There were significant differences between the types of activities conducted by Navegantes depending on who was present. Results suggest that lay health advisor interventions reach large number of at-risk community members and may benefit populations disproportionately impacted by HIV. PMID:25416309

  18. Installation and evaluation of a nuclear power plant operator advisor based on artificial intelligence technology

    International Nuclear Information System (INIS)

    Hajek, B.K.; Miller, D.W.

    1989-01-01

    This report discusses the following topics on a Nuclear Power Plant operator advisor based on artificial Intelligence Technology; Workstation conversion; Software Conversion; V ampersand V Program Development Development; Simulator Interface Development; Knowledge Base Expansion; Dynamic Testing; Database Conversion; Installation at the Perry Simulator; Evaluation of Operator Interaction; Design of Man-Machine Interface; and Design of Maintenance Facility

  19. Bioenergy, Land Use Change and Climate Change Mitigation. Report for Policy Advisors and Policy Makers

    Energy Technology Data Exchange (ETDEWEB)

    Berndes, Goran [Chalmers Univ. of Technology (Sweden); Bird, Nell [Joanneum Research (Austria); Cowle, Annette [National Centre for Rural Greenhouse Gas Research (Australia)

    2010-07-01

    The report addresses a much debated issue - bioenergy and associated land use change, and how the climate change mitigation from use of bioenergy can be influenced by greenhouse gas emissions arising from land use change. The purpose of the report was to produce an unbiased, authoritative statement on this topic aimed especially at policy advisors and policy makers.

  20. 29 CFR Appendix F to Subpart R of... - Perimeter Columns: Non-Mandatory Guidelines for Complying With § 1926.756(e) To Protect the...

    Science.gov (United States)

    2010-07-01

    ... to Subpart R of Part 1926 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND... Steel Erection Pt. 1926, Subpt. R, App. F Appendix F to Subpart R of Part 1926—Perimeter Columns: Non...

  1. Internet-based intervention for smoking cessation (StopAdvisor) in people with low and high socioeconomic status: a randomised controlled trial.

    Science.gov (United States)

    Brown, Jamie; Michie, Susan; Geraghty, Adam W A; Yardley, Lucy; Gardner, Benjamin; Shahab, Lion; Stapleton, John A; West, Robert

    2014-12-01

    Internet-based interventions for smoking cessation could help millions of people stop smoking at very low unit costs; however, long-term biochemically verified evidence is scarce and such interventions might be less effective for smokers with low socioeconomic status than for those with high status because of lower online literacy to engage with websites. We aimed to assess a new interactive internet-based intervention (StopAdvisor) for smoking cessation that was designed with particular attention directed to people with low socioeconomic status. We did this online randomised controlled trial between Dec 6, 2011, and Oct 11, 2013, in the UK. Participants aged 18 years and older who smoked every day were randomly assigned (1:1) to receive treatment with StopAdvisor or an information-only website. Randomisation was automated with an unseen random number function embedded in the website to establish which treatment was revealed after the online baseline assessment. Recruitment continued until the required sample size had been achieved from both high and low socioeconomic status subpopulations. Participants, and researchers who obtained data and did laboratory analyses, were masked to treatment allocation. The primary outcome was 6 month sustained, biochemically verified abstinence. The main secondary outcome was 6 month, 7 day biochemically verified point prevalence. Analysis was by intention to treat. Homogeneity of intervention effect across the socioeconomic subsamples was first assessed to establish whether overall or separate subsample analyses were appropriate. The study is registered as an International Standard Randomised Controlled Trial, number ISRCTN99820519. We randomly assigned 4613 participants to the StopAdvisor group (n=2321) or the control group (n=2292); 2142 participants were of low socioeconomic status and 2471 participants were of high status. The overall rate of smoking cessation was similar between participants in the StopAdvisor and control

  2. The challenges of science journalism: The perspectives of scientists, science communication advisors and journalists from New Zealand.

    Science.gov (United States)

    Ashwell, Douglas James

    2016-04-01

    The news media play an important role in informing the public about scientific and technological developments. Some argue that restructuring and downsizing result in journalists coming under increased pressure to produce copy, leading them to use more public relations material to meet their deadlines. This article explores science journalism in the highly commercialised media market of New Zealand. Using semi-structured interviews with scientists, science communication advisors and journalists, the study finds communication advisors and scientists believe most media outlets, excluding public service media, report science poorly. Furthermore, restructuring and staff cuts have placed the journalists interviewed under increasing pressure. While smaller newspapers appear to be printing press releases verbatim, metropolitan newspaper journalists still exercise control over their use of such material. The results suggest these journalists will continue to resist increasing their use of public relations material for some time to come. © The Author(s) 2014.

  3. Perspective of the Science Advisor to the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    WEART, WENDELL D.

    1999-01-01

    In 1975 Sandia National Laboratories (SNL) was asked by the predecessor to the Department of Energy to assume responsibility for the scientific programs necessary to assure the safe and satisfactory development of a geologic repository in the salt beds of southeast New Mexico. Sandia has continued in the role of Science Advisor to the Waste Isolation Pilot Plant (WIPP) to the present time. This paper will share the perspectives developed over the past 25 years as the project was brought to fruition with successful certification by the Environmental Protection Agency (EPA) on May 13, 1998 and commencement of operations on April 26, 1999

  4. Design and Operational Evaluation of the Traffic Management Advisor at the Fort Worth Air Route Traffic Control Center

    Science.gov (United States)

    1997-06-19

    NASA and the Federal Aviation Administration (FAA) have designed and developed an automation tool known as the Traffic Management Advisor (TMA). The TMA is a time-based strategic planning tool that provides Traffic Management Coordinators (TMCs) and ...

  5. 77 FR 41464 - IndexIQ Advisors LLC and IndexIQ Active ETF Trust; Notice of Application

    Science.gov (United States)

    2012-07-13

    ...] IndexIQ Advisors LLC and IndexIQ Active ETF Trust; Notice of Application July 9, 2012. AGENCY... IndexIQ Active ETF Trust (``Trust''). Filing Dates: The application was filed on September 9, 2011, and... relief is unusual insofar as the requested order seeks relief for an ETF. Applicants note, however, that...

  6. Experience with the shift technical advisor position

    International Nuclear Information System (INIS)

    Melber, B.D.; Olson, J.; Schreiber, R.E.; Winges, L.

    1984-03-01

    The provision of engineering expertise on shift at commercial nuclear power plants has mainly taken the form of the Shift Technical Advisor (STA). This person, acting in a capacity that is part engineer and part operator, is expected to advise the operations crew in the event of an emergency and review plant operating experience during normal circumstances. The position was mandated by the Nuclear Regulatory Commission following the incident at Three Mile Island. This report expands on a growing body of knowledge regarding the effectiveness of the STA. The new data presented here come from interviews with plant personnel and utility officials from nine sites. Researchers from the Pacific Northwest Laboratory (PNL) interviewed plant personnel, including the STA and immediate management, the shift supervisor and management, the training department, and ancillary staff, all of whom affect the intended performance of the STA. The conclusions of the report are that the design of the STA position results in limited contribution during emergencies; more comprehensive ways should be sought to provide the variety and specificity of engineering expertise needed during such times

  7. Experience with the shift technical advisor position

    Energy Technology Data Exchange (ETDEWEB)

    Melber, B.D.; Olson, J.; Schreiber, R.E.; Winges, L.

    1984-03-01

    The provision of engineering expertise on shift at commercial nuclear power plants has mainly taken the form of the Shift Technical Advisor (STA). This person, acting in a capacity that is part engineer and part operator, is expected to advise the operations crew in the event of an emergency and review plant operating experience during normal circumstances. The position was mandated by the Nuclear Regulatory Commission following the incident at Three Mile Island. This report expands on a growing body of knowledge regarding the effectiveness of the STA. The new data presented here come from interviews with plant personnel and utility officials from nine sites. Researchers from the Pacific Northwest Laboratory (PNL) interviewed plant personnel, including the STA and immediate management, the shift supervisor and management, the training department, and ancillary staff, all of whom affect the intended performance of the STA. The conclusions of the report are that the design of the STA position results in limited contribution during emergencies; more comprehensive ways should be sought to provide the variety and specificity of engineering expertise needed during such times.

  8. Comparison of perimeter trap crop varieties: effects on herbivory, pollination, and yield in butternut squash.

    Science.gov (United States)

    Adler, L S; Hazzard, R V

    2009-02-01

    Perimeter trap cropping (PTC) is a method of integrated pest management (IPM) in which the main crop is surrounded with a perimeter trap crop that is more attractive to pests. Blue Hubbard (Cucurbita maxima Duch.) is a highly effective trap crop for butternut squash (C. moschata Duch. ex Poir) attacked by striped cucumber beetles (Acalymma vittatum Fabricius), but its limited marketability may reduce adoption of PTC by growers. Research comparing border crop varieties is necessary to provide options for growers. Furthermore, pollinators are critical for cucurbit yield, and the effect of PTC on pollination to main crops is unknown. We examined the effect of five border treatments on herbivory, pollination, and yield in butternut squash and manipulated herbivory and pollination to compare their importance for main crop yield. Blue Hubbard, buttercup squash (C. maxima Duch.), and zucchini (C. pepo L.) were equally attractive to cucumber beetles. Border treatments did not affect butternut leaf damage, but butternut flowers had the fewest beetles when surrounded by Blue Hubbard or buttercup squash. Yield was highest in the Blue Hubbard and buttercup treatments, but this effect was not statistically significant. Native bees accounted for 87% of pollinator visits, and pollination did not limit yield. There was no evidence that border crops competed with the main crop for pollinators. Our results suggest that both buttercup squash and zucchini may be viable alternatives to Blue Hubbard as borders for the main crop of butternut squash. Thus, growers may have multiple border options that reduce pesticide use, effectively manage pests, and do not disturb mutualist interactions with pollinators.

  9. Perceptions of pre-clerkship medical students and academic advisors about sleep deprivation and its relationship to academic performance: a cross-sectional perspective from Saudi Arabia.

    Science.gov (United States)

    AlFakhri, Lama; Sarraj, Jumana; Kherallah, Shouq; Kuhail, Khulood; Obeidat, Akef; Abu-Zaid, Ahmed

    2015-12-01

    The medical student population is believed to be at an increased risk for sleep deprivation. Little is known about students' perceptions towards sleep deprivation and its relationship to academic performance. The aim of study is to explore the perceptions of medical students and their academic advisors about sleep deprivation and its relationship to academic performance. The study took place at Alfaisal University, College of Medicine, Riyadh, Saudi Arabia. An online, anonymous, cross-sectional, self-rating survey was administered to first-, third-year students and their academic advisors. Two-tailed Mann-Whitney U test was used to compare the mean 5-point Likert scale responses between students according to gender, academic year and cumulative grade point average (cGPA). A total of 259 students and 21 academic advisors participated in the survey (response rates: 70.6 and 84%, respectively). The vast majority of students agreed that sleep deprivation negatively affects academic performance (78.8%) and mood (78.4%). Around 62.2 and 73.7% of students agreed that the demanding medical curriculum and stress of final exams lead to sleep deprivation, respectively. While 36.7% of students voiced the need for incorporation of curricular separate courses about healthy sleep patterns into medical curriculum, a much greater proportion of students (45.9%) expressed interest in extracurricular activities about healthy sleep patterns. Interestingly, only 13.5% of students affirmed that they were counselled about sleep patterns and academic performance by their academic advisors. There were several statistically significant differences of means of students' perceptions according to gender, academic year and cGPA. Despite almost all academic advisors (95.5%) asserted the importance of sleep patterns to academic performance, none (0%) inquired about sleep patterns when counselling students. Nineteen academic advisors (90.5%) recommended incorporation of sleep patterns related

  10. Impacts of Vehicle (In)Security

    Energy Technology Data Exchange (ETDEWEB)

    Chugg, J.; Rohde, K.

    2015-05-01

    Nuclear and radioactive material is routinely transported worldwide every day. Since 2010, the complexity of the transport vehicle to support such activities has grown exponentially. Many core functions of a vehicle are now handled by small embedded computer modules with more being added each year to enhance the owner’s experience and convenience. With a system as complex as today’s automobile, the potential for cyber security issues is certain. Hackers have begun exploring this new domain with public information increasingly disseminated. Because vehicles are allowed into and around secure nuclear facilities, the potential for using a vehicle as a new cyber entry point or vector into the facility is now plausible and must be mitigated. In addition, compromising such a vehicle could aide in illicit removal of nuclear material, putting sensitive cargo at risk. Because cyber attacks can now be introduced using vehicles, cyber security, needs to be integrated into an organization’s design basis threat document. Essentially, a vehicle now extends the perimeter for which security professionals are responsible.Electronic Control Units (ECU) responsible for handling all core and ancillary vehicle functions are interconnected using the controller area network (CAN) bus. A typical CAN network in a modern automobile contains 50 or more ECUs. The CAN protocol now supports a wide variety of areas, including automotive, road transportation, rail transportation, industrial automation, power generation, maritime, military vehicles, aviation, and medical devices. In many ways, the nuclear industry is employing the CAN bus protocol or other similar broadcast serial networks. This paper will provide an overview of the current state of automobile and CAN Bus security, as well as an overview of what has been publicly disclosed by many research organizations. It will then present several hypotheses of how vehicle security issues may impact nuclear activities. An initial

  11. The Effects of Task Clarification, Feedback, and Goal Setting on Student Advisors' Office Behaviors and Customer Service

    Science.gov (United States)

    Tittelbach, Danielle; DeAngelis, Maureen; Sturmey, Peter; Alvero, Alicia M.

    2007-01-01

    This study evaluated the effects of feedback, task clarification and goal-setting on office behaviors and customer service of ten undergraduate participants that served as university advisors. A multiple baseline design was implemented across three target behaviors: client greeting, front-desk behaviors, and punctuality. During intervention the…

  12. Take me where I want to go: Institutional prestige, advisor sponsorship, and academic career placement preferences.

    Directory of Open Access Journals (Sweden)

    Diogo L Pinheiro

    Full Text Available Placement in prestigious research institutions for STEM (science, technology, engineering, and mathematics PhD recipients is generally considered to be optimal. Yet some doctoral recipients are not interested in intensive research careers and instead seek alternative careers, outside but also within academe (for example teaching positions in Liberal Arts Schools. Recent attention to non-academic pathways has expanded our understanding of alternative PhD careers. However, career preferences and placements are also nuanced along the academic pathway. Existing research on academic careers (mostly research-centric has found that certain factors have a significant impact on the prestige of both the institutional placement and the salary of PhD recipients. We understand less, however, about the functioning of career preferences and related placements outside of the top academic research institutions. Our work builds on prior studies of academic career placement to explore the impact that prestige of PhD-granting institution, advisor involvement, and cultural capital have on the extent to which STEM PhDs are placed in their preferred academic institution types. What determines whether an individual with a preference for research oriented institutions works at a Research Extensive university? Or whether an individual with a preference for teaching works at a Liberal Arts college? Using survey data from a nationally representative sample of faculty in biology, biochemistry, civil engineering and mathematics at four different Carnegie Classified institution types (Research Extensive, Research Intensive, Master's I & II, and Liberal Arts Colleges, we examine the relative weight of different individual and institutional characteristics on institutional type placement. We find that doctoral institutional prestige plays a significant role in matching individuals with their preferred institutional type, but that advisor involvement only has an impact on those

  13. Take me where I want to go: Institutional prestige, advisor sponsorship, and academic career placement preferences.

    Science.gov (United States)

    Pinheiro, Diogo L; Melkers, Julia; Newton, Sunni

    2017-01-01

    Placement in prestigious research institutions for STEM (science, technology, engineering, and mathematics) PhD recipients is generally considered to be optimal. Yet some doctoral recipients are not interested in intensive research careers and instead seek alternative careers, outside but also within academe (for example teaching positions in Liberal Arts Schools). Recent attention to non-academic pathways has expanded our understanding of alternative PhD careers. However, career preferences and placements are also nuanced along the academic pathway. Existing research on academic careers (mostly research-centric) has found that certain factors have a significant impact on the prestige of both the institutional placement and the salary of PhD recipients. We understand less, however, about the functioning of career preferences and related placements outside of the top academic research institutions. Our work builds on prior studies of academic career placement to explore the impact that prestige of PhD-granting institution, advisor involvement, and cultural capital have on the extent to which STEM PhDs are placed in their preferred academic institution types. What determines whether an individual with a preference for research oriented institutions works at a Research Extensive university? Or whether an individual with a preference for teaching works at a Liberal Arts college? Using survey data from a nationally representative sample of faculty in biology, biochemistry, civil engineering and mathematics at four different Carnegie Classified institution types (Research Extensive, Research Intensive, Master's I & II, and Liberal Arts Colleges), we examine the relative weight of different individual and institutional characteristics on institutional type placement. We find that doctoral institutional prestige plays a significant role in matching individuals with their preferred institutional type, but that advisor involvement only has an impact on those with a

  14. Reference Value Advisor: a new freeware set of macroinstructions to calculate reference intervals with Microsoft Excel.

    Science.gov (United States)

    Geffré, Anne; Concordet, Didier; Braun, Jean-Pierre; Trumel, Catherine

    2011-03-01

    International recommendations for determination of reference intervals have been recently updated, especially for small reference sample groups, and use of the robust method and Box-Cox transformation is now recommended. Unfortunately, these methods are not included in most software programs used for data analysis by clinical laboratories. We have created a set of macroinstructions, named Reference Value Advisor, for use in Microsoft Excel to calculate reference limits applying different methods. For any series of data, Reference Value Advisor calculates reference limits (with 90% confidence intervals [CI]) using a nonparametric method when n≥40 and by parametric and robust methods from native and Box-Cox transformed values; tests normality of distributions using the Anderson-Darling test and outliers using Tukey and Dixon-Reed tests; displays the distribution of values in dot plots and histograms and constructs Q-Q plots for visual inspection of normality; and provides minimal guidelines in the form of comments based on international recommendations. The critical steps in determination of reference intervals are correct selection of as many reference individuals as possible and analysis of specimens in controlled preanalytical and analytical conditions. Computing tools cannot compensate for flaws in selection and size of the reference sample group and handling and analysis of samples. However, if those steps are performed properly, Reference Value Advisor, available as freeware at http://www.biostat.envt.fr/spip/spip.php?article63, permits rapid assessment and comparison of results calculated using different methods, including currently unavailable methods. This allows for selection of the most appropriate method, especially as the program provides the CI of limits. It should be useful in veterinary clinical pathology when only small reference sample groups are available. ©2011 American Society for Veterinary Clinical Pathology.

  15. A Workflow-based Intelligent Network Data Movement Advisor with End-to-end Performance Optimization

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Michelle M. [Southern Illinois Univ., Carbondale, IL (United States); Wu, Chase Q. [Univ. of Memphis, TN (United States)

    2013-11-07

    Next-generation eScience applications often generate large amounts of simulation, experimental, or observational data that must be shared and managed by collaborative organizations. Advanced networking technologies and services have been rapidly developed and deployed to facilitate such massive data transfer. However, these technologies and services have not been fully utilized mainly because their use typically requires significant domain knowledge and in many cases application users are even not aware of their existence. By leveraging the functionalities of an existing Network-Aware Data Movement Advisor (NADMA) utility, we propose a new Workflow-based Intelligent Network Data Movement Advisor (WINDMA) with end-to-end performance optimization for this DOE funded project. This WINDMA system integrates three major components: resource discovery, data movement, and status monitoring, and supports the sharing of common data movement workflows through account and database management. This system provides a web interface and interacts with existing data/space management and discovery services such as Storage Resource Management, transport methods such as GridFTP and GlobusOnline, and network resource provisioning brokers such as ION and OSCARS. We demonstrate the efficacy of the proposed transport-support workflow system in several use cases based on its implementation and deployment in DOE wide-area networks.

  16. Area G perimeter surface-soil and single-stage water sampling: Environmental surveillance for fiscal year 1993

    International Nuclear Information System (INIS)

    Conrad, R.; Childs, M.; Rivera-Dirks, C.; Coriz, F.

    1995-07-01

    Area G, in Technical Area 54, has been the principle facility at Los Alamos National Laboratory for the storage and disposal of low-level and transuranic (TRU) radioactive wastes since 1957. The current environmental investigation consisted of ESH-19 personnel who collected soil and single-stage water samples around the perimeter of Area G to characterize possible contaminant movement through surface-water runoff. These samples were analyzed for tritium, total uranium, isotopic plutonium, americium-241 (soil only), and cesium 137. The metals, mercury, lead, and barium, were analyzed using x-ray fluorescence

  17. Recent Updates to the System Advisor Model (SAM)

    Energy Technology Data Exchange (ETDEWEB)

    DiOrio, Nicholas A [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2018-02-14

    The System Advisor Model (SAM) is a mature suite of techno-economic models for many renewable energy technologies that can be downloaded for free as a desktop application or software development kit. SAM is used for system-level modeling, including generating performance pro the release of the code as an open source project on GitHub. Other additions that will be covered include the ability to download data directly into SAM from the National Solar Radiation Database (NSRDB) and up- dates to a user-interface macro that assists with PV system sizing. A brief update on SAM's battery model and its integration with the detailed photovoltaic model will also be discussed. Finally, an outline of planned work for the next year will be presented, including the addition of a bifacial model, support for multiple MPPT inputs for detailed inverter modeling, and the addition of a model for inverter thermal behavior.

  18. Resident Advisor General Intelligence, Emotional Intelligence, Personality Dimensions, and Internal Belief Characteristics as Predictors of Rated Performance

    Science.gov (United States)

    Wu, Max B.; Stemler, Steven

    2008-01-01

    Resident Advisors (RAs) have a significant hand in helping students adjust and thrive in college life. Given the importance of selecting high-performing RAs, this study sought to examine how well various measures of intelligence (e.g., general, emotional) in addition to personality and additional "internal belief" characteristics predict…

  19. 75 FR 13264 - Meeting of the Board of Advisors (BOA) to the President, Naval Postgraduate School (NPS)

    Science.gov (United States)

    2010-03-19

    ... DEPARTMENT OF DEFENSE Department of the Navy Meeting of the Board of Advisors (BOA) to the President, Naval Postgraduate School (NPS) AGENCY: Department of the Navy, DoD. ACTION: Notice of open... access, information, or to send written comments regarding the NPS BOA, contact Ms. Jaye Panza, Naval...

  20. Cyber security issues, challenges and solutions for the emerging smart grid

    Energy Technology Data Exchange (ETDEWEB)

    Westlund, D. [N-Dimension Solutions Inc., Richmond Hill, ON (Canada)

    2007-07-01

    This paper explored the technology and business issues and challenges associated the smart grid's tolerance of physical and cyber security attacks and proposed a framework that provides practical solutions for the electric operator. The 7 characteristics of a smart grid were described. Notably, a smart grid is self healing; supports client equipment and usage behaviour; tolerates physical and cyber security attacks; delivers high-quality power to customers; supports various power generation technologies; supports competitive power markets; and, delivers capital asset optimization while minimizing operational costs. According to the North American Electric Reliability Council (NERC), power capacity will increase by 6 per cent in the United States and 9 per cent in Canada, while the demand for electricity is expected to rise by 19 and 13 per cent respectively. In addition, total transmission miles are projected to increase by less than 7 per cent in the U.S. and by only 3.5 per cent in Canada. A Smart Grid, with distributed monitoring and control, is therefore needed to meet the increased demand. However, the power and energy sectors are targets for cyber attackers. Cyber security in real-time grid operations is a complex matter. Cyber risks include unauthorized access to control systems; interception of control data; attack on system components; interception of monitoring data; intentional and unintentional human intervention; and, impairment to application software. The proposed solution framework is based on a roadmap developed by the United States Homeland Security organization, the United States Department of Energy, and the Canadian Energy Infrastructure Protection Division. NERC reliability standards and framework are also integrated into this framework. The technical aspects of the framework include: ease of use; defence-in-depth characteristics; extensive monitoring within electronic security perimeters; protection of legacy systems; auditing, logging

  1. Knowledge Sharing Among Tourists via Social Media: A Comparison Between Facebook and TripAdvisor

    OpenAIRE

    Okazaki Ono, Shintaro; Andreu, Luisa; Campo, Sara

    2016-01-01

    This paper examines tourists’ knowledge sharing behavior in social media. Based on social capital theory, we aim to examine the effects of three dimensions of social capital—structural (social interaction ties), cognitive (shared vision), and relational (trust)—for two different types of social media: Facebook and TripAdvisor. We propose a structural model that connects an antecedent (homophily) and a consequence (knowledge sharing through posting) of these main dimensions of social capital. ...

  2. Effectiveness evaluation of alternative fixed-site safeguard security systems

    International Nuclear Information System (INIS)

    Chapman, L.D.

    1976-01-01

    An evaluation of a fixed-site physical protection system must consider the interrelationships of barriers, alarms, on-site and off-site guards, and their effectiveness against a forcible adversary attack intent on creating an act of sabotage of theft. A computer model, Forcible Entry Safeguard Effectiveness Model (FESEM), was developed for the evaluation of alternative fixed-site protection systems. It was written in the GASP IV simulation language. A hypothetical fixed-state protection system is defined and relative evaluations from a cost-effectiveness point of view are presented in order to demonstrate how the model can be used. Trade-offs involving on-site and off-site response forces and response times, perimeter system alarms, barrier configurations, and varying levels of threat are analyzed. The computer model provides a framework for performing inexpensive experiments on fixed-site security systems, for testing alternative decisions, and for determining the relative cost effectiveness associated with these decision policies

  3. Academic involvement in shift technical advisor training for the utilities

    International Nuclear Information System (INIS)

    Davidson, J.N.; Sain, L.H.

    1981-01-01

    One of the clearest conclusions reached of nearly every commission and panel formed in response to the Three Mile Island accident was the desirability of upgrading the educational background of those persons with direct operational responsibility in a nuclear power plant. The long term objective is for all shift supervisors to have engineering degrees as well as NRC senior operating licenses. In the interim, the utilities are required to provide in-depth engineering expertise on every shift in the person of a Shift Technical Advisor (STA). The training of STA's is complicated by the requirement to have college level instruction in plant specific topics which are not typically included in the curricula of degree-granting instructions. One possible response to this challenge is presented

  4. The StreamCat Dataset: Accumulated Attributes for NHDPlusV2 Catchments (Version 2.1) for the Conterminous United States: Wildland Fire Perimeters By Year 2000 - 2010

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset represents the historical fire perimeters within individual local NHDPlusV2 catchments and upstream, contributing watersheds based on the GeoMAC...

  5. Evaluating the Relation between Dominant and Non-Dominant Hand Perimeters and Handgrip Strength of Basketball, Volleyball, Badminton and Handball Athletes

    Science.gov (United States)

    Kaplan, Defne Öcal

    2016-01-01

    In this study, it's aimed to evaluate the relation between dominant and non-dominant hand perimeters and handgrip strength of basketball, volleyball, badminton and handball athletes. Totally 101 active athletes (49 females, 52 male), of the average age in female 20±1.42 years, in male 21±1.99 years, joined to this study. Height, body weight, BMI…

  6. Mission Accomplished Rebuilding the Iraqi and Afghan Armies

    Science.gov (United States)

    2016-06-01

    National Defense Security Forces ANSF Afghanistan National Security Forces AQI Al-Qaeda in Iraq ATC Advisor Training Cell ATG Advisor Training Group... Cells (ATCs) resident with the Marine Expeditionary Forces.29 Many of these accounts were in the early years of the wars in Iraq and Afghanistan...convinced that the counterinsurgents have the means, ability, stamina , and will to win…The populace must have confidence in the staying power of both the

  7. The role of fire severity, distance from fire perimeter and vegetation on post-fire recovery of small-mammal communities in chaparal

    Science.gov (United States)

    Jay Diffendorfer; Genie M. Fleming; Scott Tremor; Wayne Spencer; Jan L. Beyers

    2012-01-01

    Chaparral shrublands in southern California, US, exhibit significant biodiversity but are prone to large, intense wildfires. Debate exists regarding fuel reduction to prevent such fires in wildland areas, but the effects of these fires on fauna are not well understood. We studied whether fire severity and distance from unburned fire perimeter influenced recovery of the...

  8. On some aspects of the UN Security Council Mandate Application during the NATO Operation Unified Protector

    Directory of Open Access Journals (Sweden)

    Zdeněk Kříž

    2012-12-01

    Full Text Available The question of the compliance of the NATO operation Unified Protector with the international law has not become a key topic of scholarly debate yet. The prevailing attitude is such that NATO intervention was in accordance with the international law. Nevertheless, the article argues that NATO in Libya exceeded the UN Security Council mandate. Unified Protector was an operation conducted in the favour of one side, in this case, the rebels. NATO military engagement in Libya very much approached providing air support to Libyan rebelling groups in order to topple the regime. Furthermore, this conclusion is also confirmed by the fact that Western countries had provided military advisors and arms as well.

  9. Multi-Center Traffic Management Advisor Operational Field Test Results

    Science.gov (United States)

    Farley, Todd; Landry, Steven J.; Hoang, Ty; Nickelson, Monicarol; Levin, Kerry M.; Rowe, Dennis W.

    2005-01-01

    The Multi-Center Traffic Management Advisor (McTMA) is a research prototype system which seeks to bring time-based metering into the mainstream of air traffic control (ATC) operations. Time-based metering is an efficient alternative to traditional air traffic management techniques such as distance-based spacing (miles-in-trail spacing) and managed arrival reservoirs (airborne holding). While time-based metering has demonstrated significant benefit in terms of arrival throughput and arrival delay, its use to date has been limited to arrival operations at just nine airports nationally. Wide-scale adoption of time-based metering has been hampered, in part, by the limited scalability of metering automation. In order to realize the full spectrum of efficiency benefits possible with time-based metering, a much more modular, scalable time-based metering capability is required. With its distributed metering architecture, multi-center TMA offers such a capability.

  10. The Honors Thesis: A Handbook for Honors Directors, Deans, and Faculty Advisors. National Collegiate Honors Council Monograph Series

    Science.gov (United States)

    Anderson, Mark; Lyons, Karen; Weiner, Norman

    2014-01-01

    This handbook is intended to help all those who design, administer, and implement honors thesis programs--honors directors, deans, staff, faculty, and advisors--evaluate their thesis programs, solve pressing problems, select more effective requirements or procedures, or introduce an entirely new thesis program. The authors' goal is to provide…

  11. Oxytocin facilitation of acceptance of social advice is dependent upon the perceived trustworthiness of individual advisors.

    Science.gov (United States)

    Luo, Ruixue; Xu, Lei; Zhao, Weihua; Ma, Xiaole; Xu, Xiaolei; Kou, Juan; Gao, Zhao; Becker, Benjamin; Kendrick, Keith M

    2017-09-01

    The neuropeptide oxytocin may increase social cohesion by making us more willing to trust others and/or to conform to their opinions. Here we investigated whether intranasal oxytocin can influence acceptance of advice given on solving everyday social problems by either individual expert (psychologist) or non-expert advisors with or without influencing their perceived likeability or trustworthiness. In a double-blind, between-subject, placebo-control design study in 160 male and female subjects, intranasal oxytocin (24IU) only significantly enhanced acceptance of advice given by female psychologists who were rated as the most trustworthy advisors. However, oxytocin itself did not alter either trustworthiness or likeability ratings. The oxytocin effect on acceptance of the female psychologist's advice was not maintained after a week, with subjects mainly reverting to their original solutions. These findings suggest that while oxytocin can transiently increase acceptance of advice from the most trustworthy individuals this is because it makes subjects more likely to conform to their opinions rather than enhancing their perceived trustworthiness or likeability. Thus in every day contexts oxytocin may primarily promote social cohesion by facilitating conformity towards the opinions of the most trusted individuals. Copyright © 2017. Published by Elsevier Ltd.

  12. Installation and evaluation of a nuclear power plant Operator Advisor based on artificial intelligence technology

    International Nuclear Information System (INIS)

    Hajek, B.K.; Miller, D.W.

    1993-02-01

    The Artificial Intelligence Group in the Nuclear Engineering Program has designed and built an Operator Advisor (OA), an AI system to monitor nuclear power plant parameters, detect component and system malfunctions, dispose their causes, and provide the plant operators with the correct procedures for mitigating the consequences of the malfunctions. It then monitors performance of the procedures, and provides backup steps when specific operator actions fail. The OA has been implemented on Sun 4 workstations in Common Lisp, and has been interfaced to run in real time on the Perry Nuclear Power Plant full-function simulator in the plant training department. The eventual goal for a fully functioning Operator Advisor would be to have reactor operators receive direction for all plant operations. Such a goal requires considerable testing of the system within limited malfunction boundaries, an extensive Verification ampersand Validation (V ampersand V) effort, a large knowledge base development effort, and development of tools as part of the system to automate its maintenance. Clearly, these efforts are beyond the scope of the feasibility effort expended during this project period. However, as a result of this project, we have an AI based platform upon which a complete system can be built

  13. PTT Advisor: A CDC-supported initiative to develop a mobile clinical laboratory decision support application for the iOS platform.

    Science.gov (United States)

    Savel, Thomas G; Lee, Brian A; Ledbetter, Greg; Brown, Sara; Lavalley, Dale; Taylor, Julie; Thompson, Pam

    2013-01-01

    This manuscript describes the development of PTT (Partial Thromboplastin Time) Advisor, one of the first of a handful of iOS-based mobile applications to be released by the US Centers for Disease Control and Prevention (CDC). PTT Advisor has been a collaboration between two groups at CDC (Informatics R&D and Laboratory Science), and one partner team (Clinical Laboratory Integration into Healthcare Collaborative - CLIHC). The application offers clinicians a resource to quickly select the appropriate follow-up tests to evaluate patients with a prolonged PTT and a normal Prothrombin Time (PT) laboratory result. The application was designed leveraging an agile methodology, and best practices in user experience (UX) design and mobile application development. As it is an open-source project, the code to PTT Advisor was made available to the public under the Apache Software License. On July 6, 2012, the free app was approved by Apple, and was published to their App Store. Regardless of the complexity of the mobile application, the level of effort required in the development process should not be underestimated. There are several issues that make designing the UI for a mobile phone challenging (not just small screen size): the touchscreen, users' mobile mindset (tasks need to be quick and focused), and the fact that mobile UI conventions/expectations are still being defined and refined (due to the maturity level of the field of mobile application development).

  14. Prediction based Greedy Perimeter Stateless Routing Protocol for Vehicular Self-organizing Network

    Science.gov (United States)

    Wang, Chunlin; Fan, Quanrun; Chen, Xiaolin; Xu, Wanjin

    2018-03-01

    PGPSR (Prediction based Greedy Perimeter Stateless Routing) is based on and extended the GPSR protocol to adapt to the high speed mobility of the vehicle auto organization network (VANET) and the changes in the network topology. GPSR is used in the VANET network environment, the network loss rate and throughput are not ideal, even cannot work. Aiming at the problems of the GPSR, the proposed PGPSR routing protocol, it redefines the hello and query packet structure, in the structure of the new node speed and direction information, which received the next update before you can take advantage of its speed and direction to predict the position of node and new network topology, select the right the next hop routing and path. Secondly, the update of the outdated node information of the neighbor’s table is deleted in time. The simulation experiment shows the performance of PGPSR is better than that of GPSR.

  15. The StreamCat Dataset: Accumulated Attributes for NHDPlusV2 Catchments Riparian Buffer (Version 2.1) for the Conterminous United States: Wildland Fire Perimeters By Year 2000 - 2010

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset represents the historical fire perimeters within individual local NHDPlusV2 catchments and upstream, contributing watersheds riparian buffers based on...

  16. Impact of sensor-scene interaction on the design of an IR security surveillance system

    International Nuclear Information System (INIS)

    Claassen, J.P.; Phipps, G.S.

    1982-01-01

    Recent encouraging developments in infrared staring arrays with CCD readouts and in real time image processors working on and off the focal plane have suggested that technologies suitable for infrared security surveillance may be available in a two-to-five year time frame. In anticipation of these emerging technologies, an investigation has been undertaken to establish the design potential of a passive IR perimeter security system incorporating both detection and verification capabilities. To establish the design potential, it is necessary to characterize the interactions between the scene ad the sensor. To this end, theoretical and experimental findings were employed to document (1) the emission properties of scenes to include an intruder, (2) the propagation and emission characteristics of the intervening atmosphere, and (3) the reception properties of the imaging sensor. The impact of these findings are summarized in the light of the application constraints. Optimal wavelengths, intruder and background emission characteristics, weather limitations, and basic sensor design considerations are treated. Although many system design features have been identified to this date, continued efforts are required to complete a detailed system design to include the identifying processing requirements. A program to accomplish these objectives is presented

  17. THE GODFATHER DOCTRINE SECURITY FORCE ASSISTANCE (SFA) TRAINING - AN OFFER THE MARINE CORPS CAN’T REFUSE

    Science.gov (United States)

    2016-02-16

    experience training military advisors suggests that the commander’s exposure to military advising has a direct affect on who is nominated to advise... Advisor : CAPT Patrick J McCormick, USN 16 February 2016 DISTRIBUTION A. Approved for public release: distribution unlimited. 2 DISCLAIMER The...SFA AT) leader / senior advisor . He advised an Iraqi National Police (INP) Port of Entry Director near the Iraq / Syria Border and Afghan

  18. Scientific writing: strategies and tools for students and advisors.

    Science.gov (United States)

    Singh, Vikash; Mayer, Philipp

    2014-01-01

    Scientific writing is a demanding task and many students need more time than expected to finish their research articles. To speed up the process, we highlight some tools, strategies as well as writing guides. We recommend starting early in the research process with writing and to prepare research articles, not after but in parallel to the lab or field work. We suggest considering scientific writing as a team enterprise, which needs proper organization and regular feedback. In addition, it is helpful to select potential target journals early and to consider not only scope and reputation, but also decision times and rejection rates. Before submission, instructions to authors and writing guides should be considered, and drafts should be extensively revised. Later in the process editor's and reviewer's comments should be followed. Our tips and tools help students and advisors to structure the writing and publishing process, thereby stimulating them to develop their own strategies to success. Copyright © 2014 The International Union of Biochemistry and Molecular Biology.

  19. System Advisor Model: Flat Plate Photovoltaic Performance Modeling Validation Report

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, Janine [National Renewable Energy Lab. (NREL), Golden, CO (United States); Whitmore, Jonathan [National Renewable Energy Lab. (NREL), Golden, CO (United States); Kaffine, Leah [National Renewable Energy Lab. (NREL), Golden, CO (United States); Blair, Nate [National Renewable Energy Lab. (NREL), Golden, CO (United States); Dobos, Aron P. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2013-12-01

    The System Advisor Model (SAM) is a free software tool that performs detailed analysis of both system performance and system financing for a variety of renewable energy technologies. This report provides detailed validation of the SAM flat plate photovoltaic performance model by comparing SAM-modeled PV system generation data to actual measured production data for nine PV systems ranging from 75 kW to greater than 25 MW in size. The results show strong agreement between SAM predictions and field data, with annualized prediction error below 3% for all fixed tilt cases and below 8% for all one axis tracked cases. The analysis concludes that snow cover and system outages are the primary sources of disagreement, and other deviations resulting from seasonal biases in the irradiation models and one axis tracking issues are discussed in detail.

  20. 75 FR 2562 - Publication of Model Notices for Health Care Continuation Coverage Provided Pursuant to the...

    Science.gov (United States)

    2010-01-15

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Publication of Model Notices for... AGENCY: Employee Benefits Security Administration, Department of Labor. ACTION: Notice of the..., contact the Department's Employee Benefits Security Administration's Benefits Advisors at 1-866-444-3272...

  1. The process of candidates choose graduate programs: an analysis from the advisor perspective; O processo de escolha de candidatos a programas de Pos-Graduacao: uma analise a partir da perspectiva do orientador

    Energy Technology Data Exchange (ETDEWEB)

    Nascimento, Ridnal Joao do

    2016-11-01

    This study aims to identify the criteria used by advisors in the decision-making on whether to accept a candidate for mentoring in a postgraduate strictu sensu program and examines possible relationships between this decision and their scientific production and mentees evasion. In order to meet these goals one seeks to identify and analyze the selection criteria of candidates for the master's and doctorate programs at an institution; in this case, the Energy and Nuclear Research Institute - IPEN. More specifically, one seeks to study similarities and differences between those criteria among the advisors; find out whether there is a correlation between the selection criteria and the advisors characteristics (Profile); identify the selection process used by advisors and point out which are the motivations that lead to evasion according to their point of view. To meet these challenges, as the starting point of the research, a conceptual model was designed in order to form the basis for the preparation of the script for the interviews with open-ended questions as to identify the selection criteria used by a small group of advisors with a predefined profile. From that point, based on the responses obtained in interviews, the survey was expanded to all advisors working in the IPEN Postgraduate program by implementing an online survey using Google Docs app for data collection. These data were then analyzed and reorganized according to an operational model of research that would guide the analysis by structural equation modeling (SEM) by means of the SmartPLS software, in order to identify the presence or absence of correlation between the criteria adopted by the advisors and their academic production and the evasion of their mentees, for that one relied on studies in: Bazerman and Moore (2010); Cohen (1988); Hair Jr. et al (2009); Hansmann and Ringle (2004); Martins (1997); Ringle, C.; Silva and Bido (2014); Sousa (2007); Sousa and Yu (2014); Torres (2014); Yu (2011

  2. Forming Of Spherical Titanium Cups From Circular Blanks With Cutouts On The Perimeter

    Directory of Open Access Journals (Sweden)

    Lacki P.

    2015-06-01

    Full Text Available Despite substantial demand for drawn parts made of high-strength sheet metal (including titanium alloys observed in the modern industry, particularly automotive and aviation, their application remains insignificant. This results from the fact that such sheet metal shows poor plasticity and its cold-forming is almost impossible. Low drawability makes it impossible to obtain even such simple shapes as spherical cups. The authors of this study developed circular sheet-metal blanks with cutouts on their perimeter. The blanks allow for cold forming of spherical cups from Ti6Al4V titanium alloy sheet metal using conventional rigid tools. The cutouts proposed in the study affect plastic strain distribution, which in turn leads to an increase in forming depth by about 30%. The numerical analysis, performed using the PamStamp 2G System software based on finite element method, was verified experimentally.

  3. Pushing the physics envelope Canada's new Perimeter Institute is planning to apply the risk-taking approach of venture capitalism to the pursuit of theoretical physics

    CERN Multimedia

    Spurgeon, D

    2001-01-01

    An highly successful business man has donated 100 million Canadian dollars to found the Perimeter Institue for Theoretical Physics. It is designed to attract young, innovative scientists to tackle some of the most difficult problems in physics such as quantum gravity and quantum information theory (1 page).

  4. Building Rapport between International Graduate Students and Their Faculty Advisors: Cross- Cultural Mentoring Relationships at the University of Guelph

    Science.gov (United States)

    Omar, Faiza; Mahone, James P.; Ngobia, Jane; FitzSimons, John

    2016-01-01

    Mentoring graduate students is very challenging, even when both the student and faculty have similar cultural values. Many international students have a different culture from that of Canadian. Their challenge is adapting to their new environment, and for their faculty advisors to understand and work well with them. This research explored the…

  5. Validation of PV-RPM Code in the System Advisor Model.

    Energy Technology Data Exchange (ETDEWEB)

    Klise, Geoffrey Taylor [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lavrova, Olga [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Freeman, Janine [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2017-04-01

    This paper describes efforts made by Sandia National Laboratories (SNL) and the National Renewable Energy Laboratory (NREL) to validate the SNL developed PV Reliability Performance Model (PV - RPM) algorithm as implemented in the NREL System Advisor Model (SAM). The PV - RPM model is a library of functions that estimates component failure and repair in a photovoltaic system over a desired simulation period. The failure and repair distributions in this paper are probabilistic representations of component failure and repair based on data collected by SNL for a PV power plant operating in Arizona. The validation effort focuses on whether the failure and repair dist ributions used in the SAM implementation result in estimated failures that match the expected failures developed in the proof - of - concept implementation. Results indicate that the SAM implementation of PV - RPM provides the same results as the proof - of - concep t implementation, indicating the algorithms were reproduced successfully.

  6. 75 FR 82119 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Science.gov (United States)

    2010-12-29

    ..., the Board's basic fair practice rule, to apply the rules to municipal advisors. The proposed rule... Independent Public Finance Advisors, dated December 9, 2010. This order approves the proposed rule change. II... of which may have a substantial impact on the finances of those municipal entities. In other cases...

  7. 78 FR 21349 - Meeting of the Board of Advisors to the Presidents of the Naval Postgraduate School and Naval War...

    Science.gov (United States)

    2013-04-10

    ... DEPARTMENT OF DEFENSE Department of the Navy Meeting of the Board of Advisors to the Presidents of the Naval Postgraduate School and Naval War College, Naval Postgraduate School Subcommittee AGENCY... War College report on progress to the Secretary of the Navy. The Board will meet in closed executive...

  8. 75 FR 53958 - Meeting of the Board of Advisors to the Presidents of the Naval Postgraduate School and the Naval...

    Science.gov (United States)

    2010-09-02

    ... the Naval Postgraduate School and the Naval War College AGENCY: Department of the Navy, DoD. ACTION... of Advisors (BOA) to the Presidents of the Naval Postgraduate School (NPS) and the Naval War College... elicit the advice of the Board on the Naval Service's Postgraduate Education Program and the...

  9. Advisor-advisee relationship: the multiplier knowledge Relação orientador-orientando: o conhecimento multiplicador

    Directory of Open Access Journals (Sweden)

    Lydia Masako Ferreira

    2009-06-01

    Full Text Available The article captures the essence of the advisor-advisee relationship as the fulcrum of the graduate program, and its influence and implications in the present formation process of new researchers.O artigo resgata a essência da relação orientador-orientado como núcleo de sustentação de um programa de pós-graduação senso estrito e suas influências e implicações no processo atual de formação dos pesquisadores.

  10. Navy Chaplains as Religious Advisors: A Combatant Commander’s Strategic Asset in Conflict, Reconstruction and Peace

    Science.gov (United States)

    2012-04-05

    attempting to foster a climate of fairness, trust, and accountability .40 As the essential advisor, the chaplain operates as the moral conscience for the...local community. In doing so, the chaplain affords the widest possible free exercise of religion in the most cost effective manner. In addition...Operations, JP 1-05 (Washington, DC: Joint Forces Staff, November 2009), i. 13 SACNAVINST 1730.10, 1. 14 Clifford Drury , The History of the

  11. A Career Exploration Program: An Effective Alternative to the Traditional Use of Faculty Advisors.

    Science.gov (United States)

    Olive, Kenneth E; Kwasigroch, Thomas E; Wooten, Daniel J; Lybrand, Cynthia; Peeples, Catherine R

    2016-11-01

    Providing medical students with resources to make effective career choices is challenging for medical schools as career options outnumber the formal clinical rotations students can experience during their undergraduate education. In 2009, the authors introduced the Career Exploration (CE) courses into the required curriculum at the Quillen College of Medicine. This three-course sequence includes large-group sessions addressing broad issues related to career choices, small-group specialty interest groups, individual student self-assessments, assignments through which students receive individualized feedback, and individual student advising sessions. The overall objective of the course sequence is to involve all students in career planning from the beginning of medical school so as to help them make more informed career decisions. The authors used improvement in student satisfaction with career planning activities as a surrogate measure for the outcome of helping students make more informed career choices. Students evaluated the CE courses positively, and overall satisfaction scores averaged 4 (1 = poor to 5 = excellent). Scores on Association of American Medical Colleges Graduation Questionnaire items related to career planning showed improved student satisfaction from 2010 to 2015. Succession planning for the first- and second-year career advisor is vital-as is faculty development for all clinical advisors to ensure that they have current information regarding both the curriculum and Match process, especially as residency selection becomes increasingly competitive. Enhancing the role of fourth-year students who serve as CE III mentors has the potential to prepare these students to be better teachers as residents.

  12. Avaliação do espaço adicional requerido no perímetro do arco inferior para o nivelamento da curva de Spee Assessment of the additional lower arch perimeter needed for leveling the curve of Spee

    Directory of Open Access Journals (Sweden)

    Marcio José da Silva Campos

    2009-08-01

    Full Text Available OBJETIVO: determinar o perímetro de arco adicional necessário para o nivelamento da curva de Spee através de uma técnica laboratorial em modelos de estudo. MÉTODOS: foram utilizados 70 modelos inferiores nos quais se mediu a profundidade da curva de Spee e o perímetro do arco (de segundo molar a segundo molar. Nos mesmos modelos, após a simulação do nivelamento da curva de Spee, o perímetro de arco foi novamente avaliado, mantendo sua forma e comprimento. RESULTADOS: foi confirmada a correlação entre a profundidade da curva de Spee e o perímetro de arco adicional, sendo deduzida a fórmula [Paa = 0,21 CSmax - 0,04]. CONCLUSÃO: a técnica proposta permitiu, através da avaliação do perímetro de arco com curva de Spee nivelada, a determinação do espaço disponível para o alinhamento dentário.AIM: To determine the additional arch perimeter needed for leveling the curve of Spee by means of a laboratory technique using dental casts. METHODS: Seventy lower dental models were used for measuring the depth of the curve of Spee and assessing the arch perimeter from second molar to second molar. In these dental casts, after simulation of leveling the curve of Spee, arch perimeter was reevaluated, after maintaining its form and length. RESULTS: The correlation between the depth of the curve of Spee and the additional arch perimeter was ratified, as can be shown by the formula [Paa = 0,21 CSmax - 0,04]. CONCLUSION: The proposed technique allowed, through the assessment of the arch perimeter with the leveled curve of Spee, the determination of the space available for tooth alignment.

  13. Commonwealth Edison captures intruders on screen

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Commonwealth Edison has developed three software programs, with the supporting hardware, that significantly upgrade security monitoring capabilities at nuclear power stations. These are Video Capture, the Alternate Perimeter Alarm Reporting System, and the Redundant Access Control System. Conventional video systems only display what is happening at the moment and rewinding a VCR to discover what occurred earlier takes time. With Video Capture the images can be instantly restored to the monitor screen and printed out. When one of the security devices used to monitor the perimeter of a Commonwealth Edison nuclear power station is tripped, the Video Capture program stores the visual image digitally. This is done using similar technology to the employed in fax machines. The security staff are thus able to distinguish immediately between disturbances taking place simultaneously at different security zones. They can magnify and compare the stored images and print them out. The Alternate Perimeter Alarm Reporting System was developed to speed the transmission of alarm signals from the security sensors to the security computer. The Redundant Access Control System (RACS) was originally developed to meet the requirement of the Nuclear Regulatory Commission (NRC) for a secondary computer-operated security measure to monitor employee access to a nuclear power station. When employee drug testing became an additional NRC requirement, the Nuclear Division of Commonwealth Edison asked their programmers to modify RACS to generate a random list of personnel to be tested for substance abuse. RACS was then further modified to produce numerous station operating reports that had been previously compiled manually. (author)

  14. 75 FR 51161 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals

    Science.gov (United States)

    2010-08-18

    .... Brief Description of Withdrawn Projects: Blast barrier. Land acquisition. Access control. Electrical.... Preliminary engineering, access road security fence. Construct perimeter access road. Security related... the total annual enplanements at Jack McNamara Field. Brief Description of Projects Approved for...

  15. Robust site security using smart seismic array technology and multi-sensor data fusion

    Science.gov (United States)

    Hellickson, Dean; Richards, Paul; Reynolds, Zane; Keener, Joshua

    2010-04-01

    Traditional site security systems are susceptible to high individual sensor nuisance alarm rates that reduce the overall system effectiveness. Visual assessment of intrusions can be intensive and manually difficult as cameras are slewed by the system to non intrusion areas or as operators respond to nuisance alarms. Very little system intrusion performance data are available other than discrete sensor alarm indications that provide no real value. This paper discusses the system architecture, integration and display of a multi-sensor data fused system for wide area surveillance, local site intrusion detection and intrusion classification. The incorporation of a novel seismic array of smart sensors using FK Beamforming processing that greatly enhances the overall system detection and classification performance of the system is discussed. Recent test data demonstrates the performance of the seismic array within several different installations and its ability to classify and track moving targets at significant standoff distances with exceptional immunity to background clutter and noise. Multi-sensor data fusion is applied across a suite of complimentary sensors eliminating almost all nuisance alarms while integrating within a geographical information system to feed a visual-fusion display of the area being secured. Real-time sensor detection and intrusion classification data is presented within a visual-fusion display providing greatly enhanced situational awareness, system performance information and real-time assessment of intrusions and situations of interest with limited security operator involvement. This approach scales from a small local perimeter to very large geographical area and can be used across multiple sites controlled at a single command and control station.

  16. Parabolic Trough Reference Plant for Cost Modeling with the Solar Advisor Model (SAM)

    Energy Technology Data Exchange (ETDEWEB)

    Turchi, C.

    2010-07-01

    This report describes a component-based cost model developed for parabolic trough solar power plants. The cost model was developed by the National Renewable Energy Laboratory (NREL), assisted by WorleyParsons Group Inc., for use with NREL's Solar Advisor Model (SAM). This report includes an overview and explanation of the model, two summary contract reports from WorleyParsons, and an Excel spreadsheet for use with SAM. The cost study uses a reference plant with a 100-MWe capacity and six hours of thermal energy storage. Wet-cooling and dry-cooling configurations are considered. The spreadsheet includes capital and operating cost by component to allow users to estimate the impact of changes in component costs.

  17. The way of land use in the perimeter of town Podu Iloaiei.

    Directory of Open Access Journals (Sweden)

    Irina Elena TODAŞCĂ

    2010-04-01

    Full Text Available Podu Iloaiei is situated in the south part of Jijia Plain, in Bahlui hydrographic basin. The relief is predominantlysculptural, followed by the accumulation relief. There are quaternary and basarabian  sediments/deposits. The climate is temperate-continental with dryness nuances whichcontributed to the growth of forest steppe vegetation. The hidrography is represented by Bahlui river and its main tributary: Bahluet. Pedological layer is influenced by the particular factors and processes of pedogenesis of Podu Iloaiei. There are spread types ofsoil from the following soil classes:cernisols, fluvisols, protisols and anthrosols. Podu Iloaiei perimeter didn’t have a spectacular evolution concerning its target. Its use is predominantly agricultural(83%, no matter the period studied(before and after 1990 orits recently rural-urban administrative structure. We may speak, in this case, about the existence of an agricultural-town. Many lands of Podu Iloaiei research station were taken over after 1990, by local entrepreneurs who preserve the modern techniques of land use,inherited from it. More than that, it feels the pressure of Iasi city, which determined some lands to get real interest.

  18. Full perimeter intersection criteria. Definitions and implementations in SR-Site

    Energy Technology Data Exchange (ETDEWEB)

    Munier, Raymond

    2010-03-15

    Large fractures intersecting canisters have potential to reactivate due to nearby earthquakes and thereby jeopardising the canister/buffer integrity. The use of full perimeter intersection (FPI) as a proxy for fracture size has been explored within SKB since late 2004. A methodology to use FPI as a deposition hole rejection criterion was first reported in and the concept has successively matured ever since. As a response to feedback obtained from various instances of our organisation and external reviewers, additional analyses and benchmarks were reported in 2007. An analytical solution to the canister/fracture intersection probability was introduced, which enabled us to benchmark various aspects of the FPI simulations. The methodology was first applied within the framework of SR-CAN to compute the number of potentially critical canister positions and soon after, based on preliminary DFN models, as one of many prerequisites for repository design. The methodology and simulation logic has evolved substantially ever since it was originally reported in 2006 and the present report is intended to entirely replace previous reports on this subject, to thereby provide the interested reader with an description of the modelling procedure, prerequisites and limitations. As a consequence thereof, major portions of previous reports are repeated herein, though we occasionally refer to these reports for comparative purposes. Furthermore, as the final versions of the site descriptive models have been reported we find it convenient to, within this report, also apply the methodology using the most actual site specific fracture data

  19. Security Force Assistance

    Science.gov (United States)

    2009-05-01

    themselves isolated with great autonomy and no The Advisor 1 May 2009 FM 3-07.1 7-3 supervision. These conditions present moral and ethical dilemmas daily...Group 8-59. Cultures may be individualistic or collectivist in their orientation. An individualist culture is one in which the ties between...individuals are loose—where people are expected to take care of themselves and their immediate families. In a collectivist culture, people are raised from

  20. The life, times, and health care of Harry L Hopkins: Presidential advisor and perpetual patient.

    Science.gov (United States)

    Pappas, Theodore N; Swanson, Sven

    2018-02-01

    Harry Hopkins was the most important nontitled allied leader in World War II. He was the advisor to President Roosevelt who managed the diplomacy between Roosevelt, Churchill, and Stalin from 1941 to 1946. Throughout these times, Hopkins was ill and required transfusions, admissions to the hospital, and nutritional supplementation to keep him well enough to travel the world and manage the allied war diplomacy. There has been no unifying theory to account for all his symptoms and his reported pathologic and autopsy findings. In this paper, we will review his political and medical history and a differential diagnosis of his illness.

  1. AIRFIL: a FORTRAN program for reduction of data obtained from alpha spectrometry of perimeter air filters

    International Nuclear Information System (INIS)

    Hinton, E.R. Jr.; Howell, R.L.

    1984-03-01

    Isotopic alpha spectrometry of 238 U, 235 U, and 234 U, along with gross alpha/beta counting of perimeter air filters, is performed by the Oak Ridge Y-12 Plant Laboratory in support of the Envrirnomental Monitoring Section of the Radiation Safety Department. Weekly samples are gross alpha/beta counted and the isotopic analysis performed on quarterly composites. Calculations and data management represents a major portion of the anlaysis time when performed manually, even with a desktop calculator. In order to reduce calculation time, perform orderly data manipulation and management, reduce errors due to redundant calculations, and eliminate report typing turnaround time, a computer program (AIRFIL) has been developed that performs these functions. The program accepts data through user prompts, then calculates and prints intermediate and final data, including detection limits

  2. Reference Manual for the System Advisor Model's Wind Power Performance Model

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, J.; Jorgenson, J.; Gilman, P.; Ferguson, T.

    2014-08-01

    This manual describes the National Renewable Energy Laboratory's System Advisor Model (SAM) wind power performance model. The model calculates the hourly electrical output of a single wind turbine or of a wind farm. The wind power performance model requires information about the wind resource, wind turbine specifications, wind farm layout (if applicable), and costs. In SAM, the performance model can be coupled to one of the financial models to calculate economic metrics for residential, commercial, or utility-scale wind projects. This manual describes the algorithms used by the wind power performance model, which is available in the SAM user interface and as part of the SAM Simulation Core (SSC) library, and is intended to supplement the user documentation that comes with the software.

  3. Las Matematicas: Lenguaje Universal. Grados Intermedios, Nivel 5b: Medida Lineal, Perimetro y Area (Mathematics: A Universal Language. Intermediate Grades, Level 5b: Linear Measure, Perimeter and Area).

    Science.gov (United States)

    Dissemination and Assessment Center for Bilingual Education, Austin, TX.

    This is one of a series of student booklets designed for use in a bilingual mathematics program in grades 6-8. The general format is to present each page in both Spanish and English. The mathematical topics in this booklet include measurement, perimeter, and area. (MK)

  4. VAMIL and EIA regulations. Options for the installer/advisor; VAMIL- en EIA-regeling. Kansen voor installateur/adviseur

    Energy Technology Data Exchange (ETDEWEB)

    Wondergem, J. [Wondergem Intermedium, (Netherlands)

    1997-03-01

    The new title financial incentives regulations of the Dutch government are outlined. VAMIL and EIA came into effect January 1, 1997. The regulations offer the tax payer a number of financial advantages when investments are made for energy saving capital goods. Also for installers and advisors the regulations offer new chances to realize energy saving measures in maintenance, replacement or extension of existing installations. In this article attention is paid to the practical possibilities of the VAMIL and EIA regulations for the installation sector. 2 tabs.

  5. Military-political Processes in the Caucasus Region and the Security of Russia

    Directory of Open Access Journals (Sweden)

    Anna V. Vilovatykh

    2015-01-01

    Full Text Available The unipolar world breaking and the tightening of geopolitical struggle led to destructive military-political processes in different regions of the world. In conditions of instability along the perimeter of Russia's borders the significance of the Caucasus region increases, especially in geo-strategic and geoeconomic perspectives. The efforts of world politics actors for the transformation of the region environment increase substantially. As a result the dynamics and the scope of the proceeding military-political processes in the Caucasus are complicated. The failures in the assessment and the prediction of the processes development influence on the safety of Russia. Wrong gradation of existing threats and challenges can lead to disastrous and irreversible consequences for state security. Designated circumstances caused the need for the expert survey on assessing the impact of the current military-political processes in the Caucasus region on the security of the Russian state and necessity for the concretization of military dangers and threats, due to political and military developments in the Caucasus. An expert survey was conducted in June 2014. During it authors interviewed 40 Russian and foreign experts representing Federal and regional authorities, academic community, research centers, analytical structures. Implementation of the survey allowed to identify the experts positions and the degree of their coherence on the military-political processes in the Caucasus region and their impact on the modern Russia security. As a result the degree of destructiveness of the regional military-political processes was fixed. We conclude that anti-Russian processes in the countries of the Caucasus continue to determine the overall geopolitical situation, including in the military-political sphere. The reason is mainly seen in interests clashing of Russia and countries of the "Atlantic world." Analysis of the military-political processes in the Caucasus

  6. 76 FR 54197 - Membership of the Office of the Secretary Performance Review Board

    Science.gov (United States)

    2011-08-31

    ..., Director, Office of Executive Resources, Office of Human Resources Management, Office of the Director, 14th..., Office of Information Technology, Security, Infrastructure, and Technology. Ellen Herbst, Senior Advisor..., Director, Office of Civil Rights. Alfred J. Broadbent, Director, Office of Security. Economic Development...

  7. 75 FR 62905 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of a Proposed Rule Change...

    Science.gov (United States)

    2010-10-13

    ... of high yield debt securities, which include senior and subordinated corporate debt obligations (such... banks, corporations and other entities to finance short- term credit needs. These securities generally..., rather than just traditional credit analysis. Through fundamental and valuation analysis, the Sub-Advisor...

  8. 76 FR 60820 - North American Electric Reliability Corporation; Notice of Technical Conference

    Science.gov (United States)

    2011-09-30

    ... controlled access area, such as the physical security perimeter to critical cyber assets, but also when authorized personnel leave the controlled access area. The Commission is interested in the level of security... speaking at the conference should notify the Commission by close of business October 7, 2011 by completing...

  9. 77 FR 53941 - Emerging Global Advisors, LLC, et al.;

    Science.gov (United States)

    2012-09-04

    ...'s portfolio as a result of the rebalancing of its Underlying Index (any such change, a ``Rebalancing... within the meaning of section 2(a)(3) of the Act. 3. Each Fund will consist of a portfolio of securities (``Portfolio Securities'') selected to correspond generally to the performance of an Underlying Index. No...

  10. AN EXPLORATORY STUDY OF DIVERSIFIED MENTORING RELATIONSHIPS AMONG GRADUATE STUDENTS AND THEIR ADVISORS IN SCIENCE, TECHNOLOGY, ENGINEERING, AND MATHEMATICS FIELDS

    OpenAIRE

    Bodden, Krystin R.

    2014-01-01

    Minorities and women continue to be underrepresented in science, technology, engineering, and mathematics (STEM) fields. In graduate education, factors such as racism, prejudice, discrimination, sexism, stereotypes, tokenism, and a lack of role models can all plague students and contribute to uncompleted degrees and non-entrance into STEM fields. One of the tools being used to combat these barriers is effective mentoring. Graduate students and their advisors generally have close working relat...

  11. Spatial and Temporal Patterns of Unburned Areas within Fire Perimeters in the Northwestern United States from 1984 to 2014

    Science.gov (United States)

    Meddens, A. J.; Kolden, C.; Lutz, J. A.; Abatzoglou, J. T.; Hudak, A. T.

    2016-12-01

    Recently, there has been concern about increasing extent and severity of wildfires across the globe given rapid climate change. Areas that do not burn within fire perimeters can act as fire refugia, providing (1) protection from the detrimental effects of the fire, (2) seed sources, and (3) post-fire habitat on the landscape. However, recent studies have mainly focused on the higher end of the burn severity spectrum whereas the lower end of the burn severity spectrum has been largely ignored. We developed a spatially explicit database for 2,200 fires across the inland northwestern USA, delineating unburned areas within fire perimeters from 1984 to 2014. We used 1,600 Landsat scenes with one or two scenes before and one or two scenes after the fires to capture the unburned proportion of the fire. Subsequently, we characterized the spatial and temporal patterns of unburned areas and related the unburned proportion to interannual climate variability. The overall classification accuracy detecting unburned locations was 89.2% using a 10-fold cross-validation classification tree approach in combination with 719 randomly located field plots. The unburned proportion ranged from 2% to 58% with an average of 19% for a select number of fires. We find that using both an immediate post-fire image and a one-year post fire image improves classification accuracy of unburned islands over using just a single post-fire image. The spatial characteristics of the unburned islands differ between forested and non-forested regions with a larger amount of unburned area within non-forest. In addition, we show trends of unburned proportion related primarily to concurrent climatic drought conditions across the entire region. This database is important for subsequent analyses of fire refugia prioritization, vegetation recovery studies, ecosystem resilience, and forest management to facilitate unburned islands through fuels breaks, prescribed burning, and fire suppression strategies.

  12. Transient simulation for a real-time operator advisor expert system

    International Nuclear Information System (INIS)

    Jakubowski, T.; Hajek, B.K.; Miller, D.W.; Bhatnagar, R.

    1990-01-01

    An Operator Advisor (OA) consisting of four integrated expert systems has been under development at The Ohio State University since 1985. The OA, designed for a General Electric BWR-6 plant, has used the Perry Nuclear Power Plants full scope simulator near Cleveland, Ohio (USA) as the reference plant. The primary goal of this development has been to provide a single system which not only performs monitoring and diagnosis functions, but also provides fault mitigation procedures to the operator, monitors the performance of these procedures and provides backup procudures should the initial ones fail. To test the system off line, a transient event simulation methodology has been developed. The simulator employs event scenarios from the Perry simulator. Scenarios are selected to test both inter- and intra-modular system behavior and response and to verify the consistency and accuracy of the knowledge base. This paper describes the OA architecture and design and the transient simulation. A discussion of a sample scenario test, including the rationale for scenario selection, is included as an example. The results of the testing demonstrate the value of off line transient simulations in that they verify system operation and help to identify characteristics requiring further improvements

  13. Cloud-based crowd sensing: a framework for location-based crowd analyzer and advisor

    Science.gov (United States)

    Aishwarya, K. C.; Nambi, A.; Hudson, S.; Nadesh, R. K.

    2017-11-01

    Cloud computing is an emerging field of computer science to integrate and explore large and powerful computing systems and storages for personal and also for enterprise requirements. Mobile Cloud Computing is the inheritance of this concept towards mobile hand-held devices. Crowdsensing, or to be precise, Mobile Crowdsensing is the process of sharing resources from an available group of mobile handheld devices that support sharing of different resources such as data, memory and bandwidth to perform a single task for collective reasons. In this paper, we propose a framework to use Crowdsensing and perform a crowd analyzer and advisor whether the user can go to the place or not. This is an ongoing research and is a new concept to which the direction of cloud computing has shifted and is viable for more expansion in the near future.

  14. UK minister and science advisors reassert roles of PWRs and FBRs

    International Nuclear Information System (INIS)

    Fishlock, D.

    1988-01-01

    Britain continues to vigorously debate the wisdom of privatizing its electricity supply system by breaking the Central Electricity Generating Board into three separate parts, with specific consequences for nuclear energy. What is already clear is that the proposed changes must have a profound impact on all long-term activities, from the future of the fast reactor to national research into the environmental impact of electricity supply. The Government stated that future use of nuclear energy is necessary. The Government then published a nuclear study by its own top technical advisors, the Advisory Council on Science and Technology (ACOST). ACOST recommends that Britain should abandon further research and development on gas-cooled reactors and concentrate wholeheartedly on the PWR, following what it says is the public inquiry's unequivocal endorsement of the Sizewell-B design. The Advisory Council also comments on the fast reactor, in the context of what it calls the Government's responsibility to underpin long-term ventures in power generation. It states that the technology is approaching commercialization

  15. Can Refugees Be National Security Assets : Afghan American Contributions to U.S. National Defense since 1978

    Science.gov (United States)

    2016-04-12

    cultural advisors for the U.S. government and military. Most Afghans came to the United States since 1978, after war broke out in Afghanistan and created...September 2001, Afghans in the United States have served as interpreters, analysts, language instructors, and cultural advisors . Others used the...negatively about the Communist-inspired, nominally Af- ghan government.16 Resentment of the Afghan government and its Soviet allies led to the desire of

  16. U.S. Southwest Border Security: An Operational Approach

    Science.gov (United States)

    2012-06-08

    NAFTA North American Free Trade Agreement NG National Guard ONDCP Office of National Drug Control Policy SGA Small Group Advisor TCO Transnational......Transit Zone Interdiction Efforts (Washington DC: Government Accountability Office, 2002), 20. 3The Constitution Net, s.v. “Impunity,” http

  17. System Advisor Model, SAM 2014.1.14: General Description

    Energy Technology Data Exchange (ETDEWEB)

    Blair, Nate [National Renewable Energy Lab. (NREL), Golden, CO (United States); Dobos, Aron P. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Freeman, Janine [National Renewable Energy Lab. (NREL), Golden, CO (United States); Neises, Ty [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wagner, Michael [National Renewable Energy Lab. (NREL), Golden, CO (United States); Ferguson, Tom [Global Resources, Northbrook, IL (United States); Gilman, Paul [National Renewable Energy Lab. (NREL), Golden, CO (United States); Janzou, Steven [Janzou Consulting, Idaho Springs, CO (United States)

    2014-02-01

    This document describes the capabilities of the U.S. Department of Energy and National Renewable Energy Laboratory's System Advisor Model (SAM), Version 2013.9.20, released on September 9, 2013. SAM is a computer model that calculates performance and financial metrics of renewable energy systems. Project developers, policy makers, equipment manufacturers, and researchers use graphs and tables of SAM results in the process of evaluating financial, technology, and incentive options for renewable energy projects. SAM simulates the performance of photovoltaic, concentrating solar power, solar water heating, wind, geothermal, biomass, and conventional power systems. The financial model can represent financial structures for projects that either buy and sell electricity at retail rates (residential and commercial) or sell electricity at a price determined in a power purchase agreement (utility). SAM's advanced simulation options facilitate parametric and sensitivity analyses, and statistical analysis capabilities are available for Monte Carlo simulation and weather variability (P50/P90) studies. SAM can also read input variables from Microsoft Excel worksheets. For software developers, the SAM software development kit (SDK) makes it possible to use SAM simulation modules in their applications written in C/C++, C#, Java, Python, and MATLAB. NREL provides both SAM and the SDK as free downloads at http://sam.nrel.gov. Technical support and more information about the software are available on the website.

  18. Area G perimeter surface-soil and single-stage water sampling. Environmental surveillance for fiscal year 95. Progress report

    International Nuclear Information System (INIS)

    Childs, M.; Conrad, R.

    1997-09-01

    ESH-19 personnel collected soil and single-stage water samples around the perimeter of Area G at Los Alamos National Laboratory (LANL) during FY 95 to characterize possible radionuclide movement out of Area G through surface water and entrained sediment runoff. Soil samples were analyzed for tritium, total uranium, isotopic plutonium, americium-241, and cesium-137. The single-stage water samples were analyzed for tritium and plutonium isotopes. All radiochemical data was compared with analogous samples collected during FY 93 and 94 and reported in LA-12986 and LA-13165-PR. Six surface soils were also submitted for metal analyses. These data were included with similar data generated for soil samples collected during FY 94 and compared with metals in background samples collected at the Area G expansion area

  19. Dissertation Leadership Knowledge Transfer Using Sparsely Connected Networks with Bidirectional Edges: Case Study of Chester Hayden McCall Jr., His Dissertation Advisors, and His Students

    Science.gov (United States)

    Mallette, Leo A.

    2012-01-01

    There are many modes of information flow in the sciences: books, journals, conferences, research and development, acquisition of companies, co-workers, students, and professors in schools of higher learning. In the sciences, dissertation students learn from their dissertation advisor (or chairperson or mentor) and the other dissertation committee…

  20. Repeatability of Retinal Sensitivity Measurements Using a Medmont Dark-Adapted Chromatic Perimeter in Healthy and Age-Related Macular Degeneration Cases.

    Science.gov (United States)

    Tan, Rose S; Guymer, Robyn H; Luu, Chi D

    2018-05-01

    To determine the intrasession and intersession test-retest repeatability of retinal sensitivity measurements using a dark-adapted chromatic perimeter (DACP). For intrasession testing, retinal sensitivity within the central 24° for the 505-nm stimulus was measured after 20, 30, and 40 minutes of dark adaptation (DA) and for the 625-nm stimulus was measured after the first and second 505-nm tests. For intersession testing, retinal sensitivity for both stimuli was measured after 30 minutes of DA at baseline and 1 month. The point-wise sensitivity (PWS) difference and coefficient of repeatability (CoR) of each stimulus and group were determined. For intrasession testing, 10 age-related macular degeneration (AMD) and eight control subjects were recruited. The overall CoR for the 505-nm stimulus was 8.4 dB for control subjects and 9.1 dB for AMD cases, and for the 625-nm stimulus was 6.7 dB for control subjects and 9.5 dB for AMD cases. For intersession testing, seven AMD cases and 13 control subjects returned an overall CoR for the 505-nm stimulus of 8.2 dB for the control and 11.7 dB for the AMD group. For the 625-nm stimulus the CoR was 6.2 dB for the control group and 8.4 dB for the AMD group. Approximately 80% of all test points had a PWS difference of ±5 dB between the two intrasession or intersession measurements for both stimuli. The CoR for the DACP is larger than that reported for scotopic perimeters; however, the majority of test points had a PWS difference of ±5 dB between tests. The DACP offers an opportunity to measure static and dynamic rod function at multiple locations with an acceptable reproducibility level.

  1. Constructibility Challenges for Perimeter Control Blasting and Slope Development in Shale and Other "Weak" Rocks

    Science.gov (United States)

    Scarpato, D. J.

    2016-02-01

    Slope construction in shale can present some interesting challenges for geotechnical design engineers and contractors alike. There are challenges that can be expected and designed for; however, all too frequently, such challenges manifest themselves as "surprises" in the field. Common constructibility challenges can include drill hole deviation during drilling for controlled blasting; and, excavation slope instability arising from inconsistent perimeter control drilling. Drill hole deviation results from the cumulative effects from both drilling mechanics and rock mass conditions. Once a hole has initiated the deviation trajectory, it is difficult to rectify drill steel position. Although such challenges are not necessarily unique to shale, they are often exacerbated by weak, weathered and transversely isotropic nature of bedrock conditions. All too often, the working assumption is that shale is "soft" and easily excavatable; however, this blanket assumption can prove to be costly. This paper is intended to provide design professionals and contractors with the practical considerations needed to avoid the "surprises" associated with drill hole deviation, and minimize the potential for costly claims.

  2. Chaplain Contact with Local Religious Leaders: A Strategic Support

    National Research Council Canada - National Science Library

    Lloyd, Scottie

    2005-01-01

    .... In their role as advisor to commanders chaplains are contacting local religious leaders to build bridges of mutual understanding that foster a more secure environment for mission accomplishment...

  3. Using Argumentation Logic for Firewall Policy Specification and Analysis

    OpenAIRE

    Bandara, Arosha K.; Kakas, Antonis; Lupu, Emil C.; Russo, Alessandra

    2006-01-01

    Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. Given their widespread use, it is crucial that network administrators have tools to translate their security requirements into firewall configuration rules and ensure that these rules are consistent with each other. In this paper we propose an approach to firewall policy specification and analysis that uses a formal fram...

  4. Values and ethical principles for practicing as magistrate/ legal advisor out of the perspective of the codes and national and international statements of principles

    Directory of Open Access Journals (Sweden)

    Marţian Iovan

    2016-10-01

    Full Text Available The coordinating and regulating role of the moral values, of the Deontological Code in practicing the magistrate/ legal advisor position is analysed in this article, so that their decisions correspond the universal imperative of practical accomplishment of justice, implicitly to the audience’s expectations with regard to the efficiency and efficacy of the services delivered by the institutions in the judicial system. The subject is of obvious actuality, fact which results in the existence of a relevant number of cases of violation, deforming of the ethical principles, of the specific deontological norms for the legal advisors, especially for the magistrates, which occur in performing the act of justice. The author highlights through examples, the harmful effects of some magistrates’ side-slipping from the ethical principles (Independence, Impartiality, Integrity stipulated in the most important deontological codes, statements of principles or national and international conventions. The logical conclusion, resulting from the analyses, aims to perfection the judicial system, the moral part of the legal higher education, of the magistrates’ continuous training and assessment.

  5. The Role of Student-Advisor Interactions in Apprenticing Undergraduate Researchers into a Scientific Community of Practice

    Science.gov (United States)

    Thiry, Heather; Laursen, Sandra L.

    2011-12-01

    Among science educators, current interest in undergraduate research (UR) is influenced both by the traditional role of the research apprenticeship in scientists' preparation and by concerns about replacing the current scientific workforce. Recent research has begun to demonstrate the range of personal, professional, and intellectual benefits for STEM students from participating in UR, yet the processes by which student-advisor interactions contribute to these benefits are little understood. We employ situated learning theory (Lave and Wenger, Situated learning: legitimate peripheral participation, Cambridge University Press, Cambridge in 1991) to examine the role of student-advisor interactions in apprenticing undergraduate researchers, particularly in terms of acculturating students to the norms, values, and professional practice of science. This qualitative study examines interviews with a diverse sample of 73 undergraduate research students from two research-extensive institutions. From these interviews, we articulate a continuum of practices that research mentors employed in three domains to support undergraduate scientists-in-training: professional socialization, intellectual support, and personal/emotional support. The needs of novice students differed from those of experienced students in each of these areas. Novice students needed clear expectations, guidelines, and orientation to their specific research project, while experienced students needed broader socialization in adopting the traits, habits, and temperament of scientific researchers. Underrepresented minority students, and to a lesser extent, women, gained confidence from their interactions with their research mentors and broadened their future career and educational possibilities. Undergraduate research at research-extensive universities exemplifies a cycle of scientific learning and practice where undergraduate researchers are mentored by graduate students and postdoctoral researchers, who are

  6. Radionuclides, Heavy Metals, and Polychlorinated Biphenyls in Soils Collected Around the Perimeter of Low-Level Radioactive Waste Disposal Area G during 2006

    International Nuclear Information System (INIS)

    P. R. Fresquez

    2007-01-01

    Twenty-one soil surface samples were collected in March around the perimeter of Area G, the primary disposal facility for low-level radioactive solid waste at Los Alamos National Laboratory (LANL). Three more samples were collected in October around the northwest corner after elevated tritium levels were detected on an AIRNET station located north of pit 38 in May. Also, four soil samples were collected along a transect at various distances (48, 154, 244, and 282 m) from Area G, starting from the northeast corner and extending to the Pueblo de San Ildefonso fence line in a northeasterly direction (this is the main wind direction). Most samples were analyzed for radionuclides ( 3 H, 238 Pu, 239,240 Pu, 241 Am, 234 U, 235 U, and 238 U), inorganic elements (Al, Ba, Be, Ca, Cr, Co, Cu, Fe, Mg, Mn, Ni, K, Na, V, Hg, Zn, Sb, As, Cd, Pb, Se, Ag, and Tl) and polychlorinated biphenyl (PCB) concentrations. As in previous years, the highest levels of 3 H in soils (690 pCi/mL) were detected along the south portion of Area G near the 3 H shafts; whereas, the highest concentrations of 241 Am (1.2 pCi/g dry) and the Pu isotopes (1.9 pCi/g dry for 238 Pu and 5 pCi/g dry for 239,240 Pu) were detected along the northeastern portions near the transuranic waste pads. Concentrations of 3 H in three soil samples and 241 Am and Pu isotopes in one soil sample collected around the northwest corner in October increased over concentrations found in soils collected at the same locations earlier in the year. Almost all of the heavy metals, with the exception of Zn and Sb in one sample each, in soils around the perimeter of Area G were below regional statistical reference levels (mean plus three standard deviations) (RSRLs). Similarly, only one soil sample collected on the west side contained PCB concentrations--67 (micro)g/kg dry of aroclor-1254 and 94 (micro)g/kg dry of aroclor-1260. Radionuclide and inorganic element concentrations in soils collected along a transect from Area G to the

  7. The knowledge-based framework for a nuclear power plant operator advisor

    International Nuclear Information System (INIS)

    Miller, D.W.

    1989-01-01

    An important facet in the design, development, and evaluation of aids for complex systems is the identification of the tasks performed by the operator. Operator aids utilizing artificial intelligence, or more specifically knowledge-based systems, require identification of these tasks in the context of a knowledge-based framework. In this context, the operator responses to the plant behavior are to monitor and comprehend the state of the plant, identify normal and abnormal plant conditions, diagnose abnormal plant conditions, predict plant response to specific control actions, and select the best available control action, implement a feasible control action, monitor system response to the control action, and correct for any inappropriate responses. These tasks have been identified to formulate a knowledge-based framework for an operator advisor under development at Ohio State University that utilizes the generic task methodology proposed by Chandrasekaran. The paper lays the foundation to identify the responses as a knowledge-based set of tasks in accordance with the expected human operator responses during an event. Initial evaluation of the expert system indicates the potential for an operator aid that will improve the operator's ability to respond to both anticipated and unanticipated events

  8. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  9. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  10. Scientific Culture and Its Role in International Negotiations

    OpenAIRE

    Gottstein, Klaus L.

    2005-01-01

    Scientists as diplomats (historical examples). Scientists as advisors to governments and the public. Nongovernmental organisations and international conferences on security questions, initiated by scientists and based on their professional culture.

  11. Evaluation Report on The Department's Unclassified Cyber Security Program - 2009

    International Nuclear Information System (INIS)

    Anon

    2009-01-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter

  12. Using CBT with Anxious Language Learners: The Potential Role of the Learning Advisor

    Directory of Open Access Journals (Sweden)

    Neil Curry

    2014-01-01

    Full Text Available Foreign Language Anxiety (FLA can be a crippling condition for many students, preventing them from taking an active part in the classroom, and also retarding their L2 use in wider communicative situations. Providing learners with the tools to overcome anxiety on an individual basis is an area which needs further investigation. Cognitive Behaviour Therapy (CBT is a widespread counselling practice used to treat anxieties. It shares similarities with some techniques employed in Advising in Language Learning (ALL for helping students with language goals, and it is worthwhile investigating and raising awareness of how it can be used for FLA. The article describes major characteristics of FLA and also CBT, and then describes four functions which CBT and ALL share: goal-setting, guided discovery, Socratic questioning and use of reflection. Preliminary research also demonstrates how some of the practices associated with CBT could be applied by Learning Advisors to help students to overcome FLA.

  13. Creation of the Advisory Unit in the U.S. Army

    National Research Council Canada - National Science Library

    Jack, Charles

    2008-01-01

    ... quality foreign security forces to deal with future challenges. The Army's experiences in Iraq gave the military many lessons to begin development of doctrine and force structure for the advisor missions...

  14. Availability of processed foods in the perimeter of public schools in urban areas.

    Science.gov (United States)

    Leite, Fernanda Helena Marrocos; Oliveira, Maria Aparecida de; Cremm, Elena Carvalho; Abreu, Débora Silva Costa de; Maron, Luana Rieffe; Martins, Paula Andrea

    2012-07-01

    To assess the availability of food in relation to their degree of industrial processing and the types of food stores in the perimeters of elementary schools. This is a cross-sectional study. 82 food stores located within a 500 m radius buffer of three public schools located in three distinct regions with different socioeconomic levels in the municipality of Santos, state of São Paulo, Brazil, were assessed. All streets within a 500-meter radius of the schools were covered, geographic coordinates were recorded and information about the stores and food items available were collected by direct observation and interview with store managers. Available food items were classified in relation to their degree of industrial processing as ultra-processed foods and minimally processed foods. Kernel's density maps were used to assess the degree of agglomeration of stores near the schools. The stores that offered mostly ultra-processed foods were significantly closer to schools than those who offered mostly minimally processed foods. There was a significant difference between the availability of processed food in different types of stores and between the three regions assessed. The data found by this work evidence that children who attend the three public schools assessed are exposed to an environment that encourages the consumption of ultra-processed foods through easier access of these products in the studied stores.

  15. 77 FR 44641 - Critical Infrastructure Private Sector Clearance Program Request

    Science.gov (United States)

    2012-07-30

    .... DHS Sector Specialists or Protective Security Advisors email the form to the individual who then... clearance request form is signed by both the Federal official who nominated the applicant and the Assistant...

  16. Environmental Assessment for Perimeter Security Lighting at Fort MacArthur, California

    Science.gov (United States)

    2007-07-01

    8217J lOft pPm ifllti" ~ r- IVf $ 10~11)’ \\Qiume, or l!lO’Cm)lesOI j:""-t.-m! pE"f m;::le of gas. • ~ tQUI•<tlii:I I)IOC:tdtlr• ""lidl Wlbt $00l’l𔃻ll0...defines the appropriate styles, finishes, and materials to be used to achieve the best facility life-cycle costs . An objective of the plan is to

  17. Airway basement membrane perimeter in human airways is not a constant; potential implications for airway remodeling in asthma.

    Science.gov (United States)

    McParland, Brent E; Paré, Peter D; Johnson, Peter R A; Armour, Carol L; Black, Judith L

    2004-08-01

    Many studies that demonstrate an increase in airway smooth muscle in asthmatic patients rely on the assumption that bronchial internal perimeter (P(i)) or basement membrane perimeter (P(bm)) is a constant, i.e., not affected by fixation pressure or the degree of smooth muscle shortening. Because it is the basement membrane that has been purported to be the indistensible structure, this study examines the assumption that P(bm) is not affected by fixation pressure. P(bm) was determined for the same human airway segment (n = 12) fixed at distending pressures of 0 cmH(2)O and 21 cmH(2)O in the absence of smooth muscle tone. P(bm) for the segment fixed at 0 cmH(2)O was determined morphometrically, and the P(bm) for the same segment, had the segment been fixed at 21 cmH(2)O, was predicted from knowing the luminal volume and length of the airway when distended to 21 cmH(2)O (organ bath-derived P(i)). To ensure an accurate transformation of the organ bath-derived P(i) value to a morphometry-derived P(bm) value, had the segment been fixed at 21 cmH(2)O, the relationship between organ bath-derived P(i) and morphometry-derived P(bm) was determined for five different bronchial segments distended to 21 cmH(2)O and fixed at 21 cmH(2)O (r(2) = 0.99, P < 0.0001). Mean P(bm) for bronchial segments fixed at 0 cmH(2)O was 9.4 +/- 0.4 mm, whereas mean predicted P(bm), had the segments been fixed at 21 cmH(2)O, was 14.1 +/- 0.5 mm (P < 0.0001). This indicates that P(bm) is not a constant when isolated airway segments without smooth muscle tone are fixed distended to 21 cmH(2)O. The implication of these results is that the increase in smooth muscle mass in asthma may have been overestimated in some previous studies. Therefore, further studies are required to examine the potential artifact using whole lungs with and without abolition of airway smooth muscle tone and/or inflation.

  18. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  19. Countering the Cyber-Attack, a case-study [video

    OpenAIRE

    Keith Squires; Center for Homeland Defense and Security Naval Postgraduate School

    2015-01-01

    A cyber-criminal organization electronically diverts funds, a hacking group uses their prowess to try to influence politics, these are examples of the evolving world of cyber crime. Keith Squires, Commissioner of Public Safety and Homeland Security Advisor for the State of Utah talks about his experience in building a cyber security program to counter such cyber criminals.

  20. 78 FR 42115 - NGAM Advisors, LP, et al.; Notice of Application

    Science.gov (United States)

    2013-07-15

    ... size, experience and potentially stronger relationships in the fixed income markets. Purchases of... to deposit securities into, and receive securities from, the series in connection with the purchase... anticipate that the price of a Share will range from $20 to $200. All orders to purchase Creation Units must...

  1. 78 FR 59013 - President's Council of Advisors on Science and Technology

    Science.gov (United States)

    2013-09-25

    ... Cyber-security report. DATES: The public conference call will be held on Monday, October 7, 2013, from 4.... to 4:30 p.m. (ET) During the conference call, PCAST will discuss its Cyber-security report... work, not for business marketing purposes. Oral Comments: To be considered for the public speaker list...

  2. Uncertainties estimation in surveying measurands: application to lengths, perimeters and areas

    Science.gov (United States)

    Covián, E.; Puente, V.; Casero, M.

    2017-10-01

    The present paper develops a series of methods for the estimation of uncertainty when measuring certain measurands of interest in surveying practice, such as points elevation given a planimetric position within a triangle mesh, 2D and 3D lengths (including perimeters enclosures), 2D areas (horizontal surfaces) and 3D areas (natural surfaces). The basis for the proposed methodology is the law of propagation of variance-covariance, which, applied to the corresponding model for each measurand, allows calculating the resulting uncertainty from known measurement errors. The methods are tested first in a small example, with a limited number of measurement points, and then in two real-life measurements. In addition, the proposed methods have been incorporated to commercial software used in the field of surveying engineering and focused on the creation of digital terrain models. The aim of this evolution is, firstly, to comply with the guidelines of the BIPM (Bureau International des Poids et Mesures), as the international reference agency in the field of metrology, in relation to the determination and expression of uncertainty; and secondly, to improve the quality of the measurement by indicating the uncertainty associated with a given level of confidence. The conceptual and mathematical developments for the uncertainty estimation in the aforementioned cases were conducted by researchers from the AssIST group at the University of Oviedo, eventually resulting in several different mathematical algorithms implemented in the form of MATLAB code. Based on these prototypes, technicians incorporated the referred functionality to commercial software, developed in C++. As a result of this collaboration, in early 2016 a new version of this commercial software was made available, which will be the first, as far as the authors are aware, that incorporates the possibility of estimating the uncertainty for a given level of confidence when computing the aforementioned surveying

  3. Never ever? Characteristics, outcomes and motivations of patients who abscond or escape: A 5-year review of escapes and absconds from two medium and low secure forensic units.

    Science.gov (United States)

    Mezey, Gillian; Durkin, Catherine; Dodge, Liam; White, Sarah

    2015-12-01

    Absconds and escapes by psychiatric patients from secure forensic psychiatric settings create public anxiety and are poorly understood. To describe secure hospital patients who escape from within the secure perimeter or abscond, and test for differences between these groups. Escapes and absconds between 2008 and 2012 from the medium and low secure forensic psychiatric inpatient units of two London National Health Service Trusts were identified through the Trusts' databases. Demographic, offending, mental health and incident data were extracted from records for each. Seventy-seven incidents, involving 54 patients, were identified over the five years. These were 13 escapes involving 12 patients, representing a rate of 0.04 per 1000 bed days, and 64 absconds involving 42 patients, a rate of 0.26 per 1000 bed days; 15 (28%) patients were absent without leave more than once. Over half of the patients came back voluntarily within 24 hours of leaving. Over 50% of them had drunk alcohol or taken drugs while away from the unit. Escapees were more likely to be transferred prisoners and to have planned their escape, less likely to return to the unit voluntarily and away longer than patients who absconded. Offending was rare during unauthorised leave--just three offences among the 77 incidents; self-harm was more likely. Motives for absconding included: wanting freedom or drink or drugs, family worries and/or dissatisfaction with aspects of treatment. Escapes or absconding from secure healthcare units have different characteristics, but may best be prevented by convergent strategies. Relational security is likely to be as important for foiling plans for the former as it is for reducing boredom, building strong family support and managing substance misuse in the latter. Copyright © 2015 John Wiley & Sons, Ltd.

  4. Official (ISC)2 guide to the CSSLP CBK

    CERN Document Server

    Paul, Mano

    2013-01-01

    The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP examination, this book is also an indispensable software security reference for those already part of the certified elite. A robust and comprehensive appendix makes this book a time-saving resource for anyone involved in secure software development.

  5. Determination of action zone in the nuclear / radiology handling process

    International Nuclear Information System (INIS)

    Ade Awalludin

    2013-01-01

    Assessment has been conducted on determination of action zone in nuclear or radiological emergency. The assessment is taken into account radiological risk level in nuclear or radiological emergency management process outside nuclear installation. Managing of nuclear emergency is same as that one of other emergency by adding the principles of radiation protection. This study aims to provide guidance in making of safety and security perimeter outside the nuclear installation for first responders during nuclear/radiological emergency based on dose rate, contamination level or distance from the scene. Separation of working zone is important for first responder safety that works in radiological environment in the event of nuclear or radiation emergency without violating their standard operating procedure. Value limit of safety and security perimeter has been made according to the conditions in Indonesia and considering the applicability in practical. (author)

  6. Physiological intracellular crowdedness is defined by perimeter to area ratio of subcellular compartments

    Directory of Open Access Journals (Sweden)

    Noriko eHiroi

    2012-07-01

    Full Text Available The intracellular environment is known to be a crowded and inhomogeneous space. Such an in vivo environment differs from a well-diluted, homogeneous environment for biochemical reactions. However, the effects of both crowdedness and the inhomogeneity of environment on the behavior of a mobile particle have not yet been investigated sufficiently. As described in this paper, we constructed artificial reaction spaces with fractal models, which are assumed to be non-reactive solid obstacles in a reaction space with crevices that function as operating ranges for mobile particles threading the space. Because of the homogeneity of the structures of artificial reaction spaces, the models succeeded in reproducing the physiological fractal dimension of solid structures with a smaller number of non-reactive obstacles than in the physiological condition. This incomplete compatibility was mitigated when we chose a suitable condition of a perimeter-to-area ratio of the operating range to our model. Our results also show that a simulation space is partitioned into convenient reaction compartments as an in vivo environment with the exact amount of solid structures estimated from TEM images. The characteristics of these compartments engender larger mean square displacement of a mobile particle than that of particles in smaller compartments. Subsequently, the particles start to show confined particle-like behavior. These results are compatible with our previously presented results, which predicted that a physiological environment would produce quick-response and slow-exhaustion reactions.

  7. Molten Salt Power Tower Cost Model for the System Advisor Model (SAM)

    Energy Technology Data Exchange (ETDEWEB)

    Turchi, C. S.; Heath, G. A.

    2013-02-01

    This report describes a component-based cost model developed for molten-salt power tower solar power plants. The cost model was developed by the National Renewable Energy Laboratory (NREL), using data from several prior studies, including a contracted analysis from WorleyParsons Group, which is included herein as an Appendix. The WorleyParsons' analysis also estimated material composition and mass for the plant to facilitate a life cycle analysis of the molten salt power tower technology. Details of the life cycle assessment have been published elsewhere. The cost model provides a reference plant that interfaces with NREL's System Advisor Model or SAM. The reference plant assumes a nominal 100-MWe (net) power tower running with a nitrate salt heat transfer fluid (HTF). Thermal energy storage is provided by direct storage of the HTF in a two-tank system. The design assumes dry-cooling. The model includes a spreadsheet that interfaces with SAM via the Excel Exchange option in SAM. The spreadsheet allows users to estimate the costs of different-size plants and to take into account changes in commodity prices. This report and the accompanying Excel spreadsheet can be downloaded at https://sam.nrel.gov/cost.

  8. Detailed Physical Trough Model for NREL's Solar Advisor Model: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Wagner, M. J.; Blair, N.; Dobos, A.

    2010-10-01

    Solar Advisor Model (SAM) is a free software package made available by the National Renewable Energy Laboratory (NREL), Sandia National Laboratory, and the US Department of Energy. SAM contains hourly system performance and economic models for concentrating solar power (CSP) systems, photovoltaic, solar hot-water, and generic fuel-use technologies. Versions of SAM prior to 2010 included only the parabolic trough model based on Excelergy. This model uses top-level empirical performance curves to characterize plant behavior, and thus is limited in predictive capability for new technologies or component configurations. To address this and other functionality challenges, a new trough model; derived from physical first principles was commissioned to supplement the Excelergy-based empirical model. This new 'physical model' approaches the task of characterizing the performance of the whole parabolic trough plant by replacing empirical curve-fit relationships with more detailed calculations where practical. The resulting model matches the annual performance of the SAM empirical model (which has been previously verified with plant data) while maintaining run-times compatible with parametric analysis, adding additional flexibility in modeled system configurations, and providing more detailed performance calculations in the solar field, power block, piping, and storage subsystems.

  9. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  10. Environmental Assessment: Military Housing Privatization Initiative Schriever Air Force Base, Colorado

    Science.gov (United States)

    2006-08-24

    community features SAFB has requested include the following: secure perimeter wall for aesthetics and security, community center/ clubhouse , swimming pool...Proposed Action Under the proposed action, 269 family housing units would be constructed on approximately 150 acres of what is now categorized as open...incremental impact of the action when added to other past, present, and reasonably foreseeable future actions regardless of what agency (Federal or non

  11. A V ampersand V Program for a real time Operator Advisor expert system

    International Nuclear Information System (INIS)

    Hajek, B.K.; Hardy, C.R.; Miller, D.W.; Bhatnagar, R.

    1989-01-01

    This report discusses an Operator Advisor (OA) consisting of four integrated expert systems which has been under development at the Ohio State University since 1985. The OA was initially conceived as two independent systems, one to manage procedures for the operator, and the other to diagnose plant faults and to validate sensor data. The OA has used the Perry Nuclear Power Plant simulator as the reference plant. It has been programmed with knowledge gathered from power plant experts and plant documents. Following incremental programming, the OA has been tested off line by running scenarios on the plant simulator and verifying that the OA responded as predicted by the simulator. Specifications have been developed and periodically published in the literature over the past four years. These are currently being collected and expanded upon as part of a formal Verification and Validation (V ampersand V) Program. The V ampersand V Program is defined by three types of documents: specification documents, a V ampersand V document, and procedures to support implementation of the specifications and V ampersand V programs

  12. A V and V program for a real time operator advisor expert system

    International Nuclear Information System (INIS)

    Hajek, B.K.; Hardy, C.R.; Miller, D.W.; Bhatnagar, R.

    1991-01-01

    This paper reports on an Operator Advisor (OA) consisting of four integrated expert systems under development at The Ohio State University since 1985. The OA was initially conceived as two independent systems, one to manage procedures for the operator, and the other to diagnose plant faults and to validate sensor data. The OA has used the Perry Nuclear Power Plant simulator as the reference plant. It has been programmed with knowledge gathered from power plant experts and plant documents. Following incremental programming, the OA has been tested off line by running scenarios on the plant simulator and verifying that the OA responded as predicted by the simulator. Specifications have been developed and periodically published in the literature over the past four years. These are currently being collected and expanded upon as part of a formal Verification and Validation (V and V) Program. The V and V Program is defined by three types of documents: specification documents, a V and V document, and procedures to support implementation of the specifications and V and V program

  13. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  14. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  15. 77 FR 33805 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals

    Science.gov (United States)

    2012-06-07

    ... AGENCY: Tri State Airport Authority, Huntington, West Virginia. APPLICATION NUMBER: 12-07-C-00-HTS... equipment. Install perimeter fencing. Rehabilitate terminal building. Rehabilitate taxiway A (west). Access.... Passenger loading bridges. Security exit lane equipment. PFC consulting fees. Brief Description of...

  16. P. Gluckman Chief Science Advisor to the Prime Minister, New Zealand signing the Guest book with CERN Director-General R. Heuer and Head of International Relations R. Voss. Accompanied by A. Bell throughout.

    CERN Multimedia

    Anna Pantelia

    2013-01-01

    P. Gluckman Chief Science Advisor to the Prime Minister, New Zealand signing the Guest book with CERN Director-General R. Heuer and Head of International Relations R. Voss. Accompanied by A. Bell throughout.

  17. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  18. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  19. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  20. Pervasive surveillance-agent system based on wireless sensor networks: design and deployment

    International Nuclear Information System (INIS)

    Martínez, José F; Bravo, Sury; García, Ana B; Corredor, Iván; Familiar, Miguel S; López, Lourdes; Hernández, Vicente; Da Silva, Antonio

    2010-01-01

    Nowadays, proliferation of embedded systems is enhancing the possibilities of gathering information by using wireless sensor networks (WSNs). Flexibility and ease of installation make these kinds of pervasive networks suitable for security and surveillance environments. Moreover, the risk for humans to be exposed to these functions is minimized when using these networks. In this paper, a virtual perimeter surveillance agent, which has been designed to detect any person crossing an invisible barrier around a marked perimeter and send an alarm notification to the security staff, is presented. This agent works in a state of 'low power consumption' until there is a crossing on the perimeter. In our approach, the 'intelligence' of the agent has been distributed by using mobile nodes in order to discern the cause of the event of presence. This feature contributes to saving both processing resources and power consumption since the required code that detects presence is the only system installed. The research work described in this paper illustrates our experience in the development of a surveillance system using WNSs for a practical application as well as its evaluation in real-world deployments. This mechanism plays an important role in providing confidence in ensuring safety to our environment

  1. Supporting Rape Survivors Through the Criminal Injuries Compensation Scheme: An Exploration of English and Welsh Independent Sexual Violence Advisors' Experiences.

    Science.gov (United States)

    Smith, Olivia; Galey, Jessica

    2018-07-01

    English and Welsh responses to rape have long been critically examined, leading to attempted improvements in the criminal justice system. Despite this, little attention has been paid to the Criminal Injuries Compensation Scheme (CICS) and the difficulties applying it to rape. To begin addressing this gap, researchers interviewed three, and qualitatively surveyed 22, Independent Sexual Violence Advisors. The findings suggest that CICS may not only reinforce rape myths and disadvantage vulnerable survivors, but is also a source of validation and contributes to survivor justice. The study, while exploratory, therefore, highlights the need for further discussion about rape survivor compensation.

  2. 78 FR 46388 - NGAM Advisors, L.P., et al.; Notice of Application

    Science.gov (United States)

    2013-07-31

    ... consist of a portfolio of securities and other instruments (``Portfolio Securities'') selected to... Redemption Instruments will be identical, unless the Fund is Rebalancing (as defined below). In addition, the... Fund's portfolio (including cash positions),\\6\\ except: (a) In the case of bonds, for minor differences...

  3. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  4. 32 CFR 2001.92 - Definitions.

    Science.gov (United States)

    2010-07-01

    .... (c) Classification management means the life-cycle management of classified national security... known technique or analysis. (r) Risk management principles means the principles applied for assessing.... Examples include, but are not limited to, use of perimeter fences, employee and visitor access controls...

  5. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  6. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  7. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  8. PI in the sky: The astronaut science advisor on SLS-2

    Science.gov (United States)

    Hazelton, Lyman R.; Groleau, Nicolas; Frainier, Richard J.; Compton, Michael M.; Colombano, Silvano P.; Szolovits, Peter

    1994-01-01

    The Astronaut Science Advisor (ASA, also known as Principal-Investigator-in-a-Box) is an advanced engineering effort to apply expert systems technology to experiment monitoring and control. Its goal is to increase the scientific value of information returned from experiments on manned space missions. The first in-space test of the system will be in conjunction with Professor Larry Young's (MIT) vestibulo-ocular 'Rotating Dome' experiment on the Spacelab Life Sciences 2 mission (STS-58) in the Fall of 1993. In a cost-saving effort, off-the-shelf equipment was employed wherever possible. Several modifications were necessary in order to make the system flight-worthy. The software consists of three interlocking modules. A real-time data acquisition system digitizes and stores all experiment data and then characterizes the signals in symbolic form; a rule-based expert system uses the symbolic signal characteristics to make decisions concerning the experiment; and a highly graphic user interface requiring a minimum of user intervention presents information to the astronaut operator. Much has been learned about the design of software and user interfaces for interactive computing in space. In addition, we gained a great deal of knowledge about building relatively inexpensive hardware and software for use in space. New technologies are being assessed to make the system a much more powerful ally in future scientific research in space and on the ground.

  9. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  10. COMPARISON OF FAST PERIMETRIC STRATEGIES USING G2 PROGRAM ON OCTOPUS 101 PERIMETER

    Directory of Open Access Journals (Sweden)

    Jernej Pajek

    2002-12-01

    Full Text Available Background. The duration of the perimetric examination was significantly shortened by development of fast perimetric strategies. By analyzing the results of normal, dynamic and TOP strategy we studied the differences in determination of MD, LV, in determination of number of all points with a deficit and number of points with a significant deficit of p < 0.5%.Methods. 22 normal visual fields of 17 subjects (mean age 33 ± 15 years and 22 visual fields with defects of 17 patients (47 ± 16 years having different types and degrees of visual lesions were examined. All visual fields were examined once with each strategy in alternating order using Octopus 101 perimeter with the G2 program.Results. No statistically significant differences were measured in MD values. In abnormal visual fields group, TOP strategy showed 11 ± 14 dB2 lower LV values compared to dynamic strategy (p < 0.01 and 9.8 ± 16 dB2 lower LV values compared to normal strategy (p = 0.02. In the abnormal visual fields group the dynamic strategy measured in average 3 points with the deficit less compared to the other two strategies (p < 0.05. There were no significant differences between strategies in the number of points with a deficit of p < 0.5%.Conclusions. With the exception of lower LV values measured with TOP strategy, the differences between TOP, dynamic strategy results are small and the time sparing benefits are substantial. Therefore the usage of fast perimetric strategies is clinically justified.

  11. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  12. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  13. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  14. Collecting to Win: ISR for Strategic Effect

    Science.gov (United States)

    2014-02-13

    Cryptologic History (Ft. George G. Meade , MD: National Security Agency, 1992), 1-143; Matthew M. Aid, The Secret Sentry: The Untold History of the National...United States Cryptologic History. Ft. George G. Meade , MD: National Security Agency, 1992. Norris, Pat. Spies in the Sky: Surveillance Satellites in...Submitted to the Faculty In Partial Fulfillment of the Graduation Requirements Advisor: Dr. Herbert L. Frandsen, Jr. 13 February 2014

  15. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  16. Evaluating Community Health Advisor (CHA) Core Competencies: The CHA Core Competency Retrospective Pretest/Posttest (CCCRP).

    Science.gov (United States)

    Story, Lachel; To, Yen M

    2016-05-01

    Health care and academic systems are increasingly collaborating with community health advisors (CHAs) to provide culturally relevant health interventions that promote sustained community transformation. Little attention has been placed on CHA training evaluation, including core competency attainment. This study identified common CHA core competencies, generated a theoretically based measure of those competencies, and explored psychometric properties of that measure. A concept synthesis revealed five CHA core competencies (leadership, translation, guidance, advocacy, and caring). The CHA Core Competency Retrospective Pretest/Posttest (CCCRP) resulted from that synthesis, which was administered using multiple approaches to individuals who previously received CHA training (N= 142). Exploratory factor analyses revealed a two-factor structure underlying the posttraining data, and Cronbach's alpha indicated high internal consistency. This study suggested some CHA core competencies might be more interrelated than previously thought, and two major competencies exist rather than five and supported the CCCRP's use to evaluate core competency attainment resulting from training. © The Author(s) 2014.

  17. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  18. Microsoft Security Bible A Collection of Practical Security Techniques

    CERN Document Server

    Mullen, Timothy "Thor"

    2011-01-01

    Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications

  19. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  20. 77 FR 65025 - Trust for Professional Managers and Collins Capital Investments, LLC; Notice of Application

    Science.gov (United States)

    2012-10-24

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30235; 812-14012] Trust for Professional Managers and Collins Capital Investments, LLC; Notice of Application October 18, 2012. AGENCY...: Trust for Professional Managers (the ``Trust'') and Collins Capital Investments, LLC (the ``Advisor...

  1. Facebook Use between College Resident Advisors' and Their Residents: A Mixed Methods Approach.

    Science.gov (United States)

    Kacvinsky, Lauren E; Moreno, Megan A

    2014-01-01

    Facebook use is nearly ubiquitous among college students. Studies have shown links between Facebook displays of depression or problem drinking and risk of these problems. This project aimed to determine whether Facebook could be used to help Resident Advisors (RAs) identify college students at risk for depression or problem drinking. Interviews were conducted with college freshmen to investigate whether they were Facebook "friends" with their RA. Focus groups were conducted with RAs to determine their views on Facebook friending their dormitory residents and using Facebook to help identify at-risk students. 72 freshmen were interviewed and 25 RAs participated in focus groups; both agreed it is common for RAs and residents to be Facebook friends. RAs commonly noted references to depression and problem drinking on residents' Facebook pages, which often led to in-person discussions with the resident. This study provides support that RAs use Facebook to identify issues that may impact their student residents. RAs emphasized benefits of in-person interactions in order to provide support and obtain additional details about the situation. Universities could consider whether providing RA education about Facebook interactions with residents merits encouragement within their existing RA training programs.

  2. En Route Descent Advisor Multi-Sector Planning Using Active and Provisional Controller Plans

    Science.gov (United States)

    Vivona, Robert; Green, Steven

    2003-01-01

    As decision support tools are developed to support controllers in complex air traffic control environments, new approaches to maintaining situation awareness and managing traffic planning must be developed to handle the ever-increasing amounts of alerting and advisory data. Within high-density metering and other environments where flight path changes are the rule, not the exception, and where interactions between these changes are required, current trial planning approaches are limited by potential increases in workload. The Enroute Descent Advisor (EDA) is a set of decision support tool capabilities for managing high-density en route traffic subject to metering restrictions. The EDA system s novel approach builds aircraft plans from combinations of user intent data and builds controller plans from combinations of aircraft plans to effectively maintain situation awareness during traffic planning. By maintaining both active (current) and provisional (proposed) controller plans, EDA supports controllers in coordinated traffic planning both within and between sectors. Ultimately, EDA s multi-sector planning approach will facilitate a transition from current sector-oriented operations to a new trajectory-oriented paradigm, enabling new levels of efficiency and collaboration in air traffic control.

  3. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  4. Using the acid rain advisor to evaluate compliance strategies

    International Nuclear Information System (INIS)

    Stallard, G.S.; Anderson, A.A.

    1991-01-01

    Unlike prior Clean Air Act (CAA) legislation, the most recent amendments will require utilities to reduce SO 2 and NO x emissions for existing operating power station and provides for compliance strategies in which emissions for existing operating power stations and provides for compliance strategies in which emission reductions can be transferred from one unit to another. The Electric Power Research Institute (EPRI), in conjunction with the Department of Energy (DOE), is funding the development of the Coal Quality Expert (CQE), a comprehensive analytical/planning tool to consider the myriad of potential coal purchase decisions now facing the utility, including fuel switching, blending, coal beneficiation, and the installation of retrofit emission controls. The CQE will be built on the foundation of proven, validated computer models to the maximum extent possible, including EPRI's Coal Quality Impact Model (CQIM), a state-of-the-art computer model designed to evaluate cost/performance impacts of fuel switching at existing power plants. In addition, as the CQE development permits, interim computer products will be offered. The first of these products is the Acid Rain Advisor (ARA). The ARA complements the CQIM by providing the ability to rapidly evaluate the system-wide cost and reduction benefits which result from selecting various reduction techniques on various units within the system. Thus, with the ARA, the utility can efficiently combine cost/performance information, view overall system results, and rapidly consider various 'What if' alternatives to ensure that individual unit reduction strategies are consistent with the goals of the utility as a whole. This paper demonstrates the capabilities of the ARA, and by use of a 'sample analysis,' illustrates how a utility might develop and evaluate alternative CAA compliance strategies

  5. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  6. Perceptions of pre-clerkship medical students and academic advisors about sleep deprivation and its relationship to academic performance: a cross-sectional perspective from Saudi Arabia

    OpenAIRE

    AlFakhri, Lama; Sarraj, Jumana; Kherallah, Shouq; Kuhail, Khulood; Obeidat, Akef; Abu-Zaid, Ahmed

    2015-01-01

    Background The medical student population is believed to be at an increased risk for sleep deprivation. Little is known about students? perceptions towards sleep deprivation and its relationship to academic performance. The aim of study is to explore the perceptions of medical students and their academic advisors about sleep deprivation and its relationship to academic performance. Methods The study took place at Alfaisal University, College of Medicine, Riyadh, Saudi Arabia. An online, anony...

  7. Spectral Graph Theory Analysis of Software-Defined Networks to Improve Performance and Security

    Science.gov (United States)

    2015-09-01

    too costly to continue operating and administrating them in the same basic manner as standardized by Advanced Research Projects Agency Network...to better monitor the network as compared to network perimeter defenses, such as firewalls and web server demilitarized zones (DMZs). The Open Network

  8. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  9. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  10. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  11. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  12. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  13. 76 FR 38432 - TIAA-CREF Funds, et al.; Notice of Application

    Science.gov (United States)

    2011-06-30

    ... & Income Fund, High-Yield Fund, Inflation-Linked Bond Fund, International Equity Fund, International Equity... Market Fund, Real Estate Securities Fund, Short-Term Bond Fund, Small-Cap Equity Fund; Teachers Advisors..., Growth & Income Fund, High-Yield Fund, Inflation-Linked Bond Fund, International Equity Fund...

  14. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  15. To The Question Of The Concepts "National Security", "Information Security", "National Information Security" Meanings

    OpenAIRE

    Alexander A. Galushkin

    2015-01-01

    In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.

  16. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  17. Working Together to Deliver Usable Climate Information to Agricultural Producers and Advisors in the U.S. Corn Belt

    Science.gov (United States)

    Prokopy, L. S.; Widhalm, M.

    2012-12-01

    Weather and climate patterns are a driving force behind the success or failure of cropping systems. With U.S. corn and soybean production accounting for nearly one-third of global supplies and contributing $100 billion annually to the national economy, the ability to successfully produce crops under more variable climate conditions is critical. Useful to Usable (U2U): Transforming Climate Variability and Change Information for Cereal Crop Producers is a USDA-funded research and extension project focused on delivering to producers and farm advisors the resources and training they need to more effectively manage variable climate conditions. The U2U team is a diverse and uniquely qualified group of climatologists, crop modelers, agronomists, economists, and social scientists from 10 Midwestern universities and two NOAA Regional Climate Centers. Together, we strive to help producers make better long-term plans on what, when and where to plant and also how to manage crops for maximum yields and minimum environmental damage. Under development are tools that will allow the agricultural community to examine the financial, production, and environmental outcomes of different management options and climate scenarios so farmers can choose strategies that fit their capabilities and acceptable levels of risk. Researchers are currently using existing data and agro-climate models to investigate the impact of climate conditions on key topics such as crop yields, fieldwork opportunities, nitrogen management, and the cost-effectiveness of irrigation and tiling. To ensure relevance and usability of U2U products, our social science team is using a number of techniques including surveys and focus groups to integrate stakeholder interests, needs, and concerns into all aspects of U2U research. It is through this coupling of physical and social science disciplines that we strive to transform existing climate information into actionable knowledge. This presentation will elaborate on U2U

  18. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  19. Report on Enhancing Security and Stability in Afghanistan

    Science.gov (United States)

    2015-06-01

    11 international terrorist groups, and accept Afghanistan’s constitution , including its protections for the rights of women and minorities...Slovakia 39 Finland 80 Slovenia 7 Georgia 885 Spain 294 Germany 850 Sweden 30 Greece 4 FYR of Macedonia 38 Hungary 97 Turkey 503 Iceland 4 Ukraine...advisors work with the MoD and the MoI to ensure the ANDSF respect the rule of law and operate in accordance with Afghanistan’s constitution

  20. Navigating graduate school and beyond: A career guide for graduate students and a must read for every advisor

    Science.gov (United States)

    Schultz, Colin

    2012-05-01

    Beginning his scientific career as an engineering student at PSG College of Technology, in Coimbatore, India, Sundar A. Christopher has negotiated and navigated the higher-education system to become the chairman of the Department of Atmospheric Sciences at the University of Alabama in Huntsville. Drawing on his own experiences and on insights gleaned from the students who have passed through his graduate-level professional development course, Christopher takes a lighthearted look at peer review, proposal writing, managing budgets, and making the most of conferences in the AGU bookNavigating Graduate School and Beyond: A Career Guide for Graduate Students and a Must Read for Every Advisor. In this interview, Eos speaks to Christopher about overcoming the bureaucratic, logistical, and personal hurdles that too often lead students to disillusionment and conflict.

  1. System for critical infrastructure security based on multispectral observation-detection module

    Science.gov (United States)

    Trzaskawka, Piotr; Kastek, Mariusz; Życzkowski, Marek; Dulski, Rafał; Szustakowski, Mieczysław; Ciurapiński, Wiesław; Bareła, Jarosław

    2013-10-01

    Recent terrorist attacks and possibilities of such actions in future have forced to develop security systems for critical infrastructures that embrace sensors technologies and technical organization of systems. The used till now perimeter protection of stationary objects, based on construction of a ring with two-zone fencing, visual cameras with illumination are efficiently displaced by the systems of the multisensor technology that consists of: visible technology - day/night cameras registering optical contrast of a scene, thermal technology - cheap bolometric cameras recording thermal contrast of a scene and active ground radars - microwave and millimetre wavelengths that record and detect reflected radiation. Merging of these three different technologies into one system requires methodology for selection of technical conditions of installation and parameters of sensors. This procedure enables us to construct a system with correlated range, resolution, field of view and object identification. Important technical problem connected with the multispectral system is its software, which helps couple the radar with the cameras. This software can be used for automatic focusing of cameras, automatic guiding cameras to an object detected by the radar, tracking of the object and localization of the object on the digital map as well as target identification and alerting. Based on "plug and play" architecture, this system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provide high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering. The paper presents

  2. Security patterns in practice designing secure architectures using software patterns

    CERN Document Server

    Fernandez-Buglioni, Eduardo

    2013-01-01

    Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides

  3. Database and applications security integrating information security and data management

    CERN Document Server

    Thuraisingham, Bhavani

    2005-01-01

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging

  4. Japanese Ministry of Education, Culture, Sports, Science and Technology (MEXT) representative H. Ikukawa visiting ATLAS experiment with Collaboration Spokesperson P. Jenni, KEK representative T. Kondo and Advisor to CERN DG J. Ellis on 15 May 2007.

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    Japanese Ministry of Education, Culture, Sports, Science and Technology (MEXT) representative H. Ikukawa visiting ATLAS experiment with Collaboration Spokesperson P. Jenni, KEK representative T. Kondo and Advisor to CERN DG J. Ellis on 15 May 2007.

  5. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  6. Assisting emergency operating procedures execution with AMAS, an Accident Management Advisor System

    International Nuclear Information System (INIS)

    Guarro, S.; Milici, T.; Wu, J.S.; Apostolakis, G.

    2004-01-01

    In an accident situation, because any decisions that the operators make will depend on how instrumentation readings are ultimately interpreted, the issue of instrument uncertainty is of paramount importance. This uncertainty exists because instrument readings may not be available in the desired form - i.e., only indirect readings for a parameter of interest may exist, with uncertainty on which physical models may be used to deduce its value from these indirect indications -, or because readings may be coming from instruments whose accuracy and reliability in the face of the severe conditions produced by the accident are far from what may be expected under normal operating conditions. In following the EOPs, the operators must rely on instrumentation whose readings may not reflect the real situation. The Accident Management Advisor System (AMAS) is a decision aid intended to supplement plant Emergency Operating Procedures (EOPs) by accounting for instrumentation uncertainty, and by alerting the operators if they are on the wrong procedures, or otherwise performing an action that is not optimal in terms of preventing core damage. In AMAS, the availability and reliability of certain important instrument readings is treated in probabilistic, rather than deterministic terms. This issue is discussed in greater detail later in the paper, since it relates to one of the key characteristics of the AMAS decision aid. (author)

  7. Securing Land Tenure, Improving Food Security and Reducing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Securing Land Tenure, Improving Food Security and Reducing Poverty in Rural ... land tenure regimes as obstacles to food security, economic integration and ... its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  8. A knowledge-based operator advisor system for integration of fault detection, control, and diagnosis to enhance the safe and reliable operation of nuclear power plants

    International Nuclear Information System (INIS)

    Bhatnagar, R.

    1989-01-01

    A Knowledged-Based Operator Advisor System has been developed for enhancing the complex task of maintaining safe and reliable operation of nuclear power plants. The operator's activities have been organized into the four tasks of data interpretation for abstracting high level information from sensor data, plant state monitoring for identification of faults, plan execution for controlling the faults, and diagnosis for determination of root causes of faults. The Operator Advisor System is capable of identifying the abnormal functioning of the plant in terms of: (1) deviations from normality, (2) pre-enumerated abnormal events, and (3) safety threats. The classification of abnormal functioning into the three categories of deviations from normality, abnormal events, and safety threats allows the detection of faults at three levels of: (1) developing faults, (2) developed faults, and (3) safety threatening faults. After the identification of abnormal functioning the system will identify the procedures to be executed to mitigate the consequences of abnormal functioning and will help the operator by displaying the procedure steps and monitoring the success of actions taken. The system also is capable of diagnosing the root causes of abnormal functioning. The identification, and diagnosis of root causes of abnormal functioning are done in parallel to the task of procedure execution, allowing the detection of more critical safety threats while executing procedures to control abnormal events

  9. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  10. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  11. 75 FR 71760 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Science.gov (United States)

    2010-11-24

    ... portfolio, Peritus will perform its own independent investment analysis of each issuer to determine its... in a portfolio of securities selected by its investment advisor consistent with its investment... with respect to access to information concerning the composition and/or changes to the portfolio). \\7...

  12. 78 FR 21475 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change, as...

    Science.gov (United States)

    2013-04-10

    ... and investment policies. The Sub-Adviser will utilize various fundamental and technical research... investment company.\\7\\ The investment adviser to the Fund is AdvisorShares Investments, LLC (the ``Adviser... security that represents an interest in an investment company registered under the Investment Company Act...

  13. 75 FR 16529 - Legg Mason Partners Equity Trust, et al.; Notice of Application

    Science.gov (United States)

    2010-04-01

    ...] Legg Mason Partners Equity Trust, et al.; Notice of Application March 26, 2010. AGENCY: Securities and... investment companies. APPLICANTS: Legg Mason Partners Equity Trust (``LMP Equity Trust''), Legg Mason... ``Trusts'') and Legg Mason Partners Fund Advisor, LLC (``LMPFA'' or the ``Adviser''). FILING DATES: The...

  14. 78 FR 61817 - Continuance Of Certain Federal Advisory Committees

    Science.gov (United States)

    2013-10-04

    ...) President's Committee on the National Medal of Science; Executive Order 11287, as amended (National Science... Homeland Security). (m) President's Council on Fitness, Sports, and Nutrition; Executive Order 13265, as... of Advisors on Science and Technology; Executive Order 13539, as amended (Department of Energy). (u...

  15. Improvised Explosive Devices: Booklet of Related Readings 25

    Science.gov (United States)

    2008-05-20

    component in U.S. strategy because it influences attitudes and behavior." According to Deputy National Security Advisor Juan Zarate, this is...technology to create robo -bugs and replicate the adaptive behavior of insects would be an huge milestone in Artificial Intelligence research. After all

  16. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  17. Detecting Target Data in Network Traffic

    Science.gov (United States)

    2017-03-01

    perimeter around a network and create a single point of entry where security policies can be enforced and auditing can be performed [16]. Security...that we used in this thesis. 2.4.1 bulk_extractor Bulk_extractor is a forensic analysis tool designed for directly extracting artifacts of forensic ...educated guess whether or not the file is there. Shields et al. explains that they need other forensics tools to ensure that all forensic evidence is used

  18. Roofline Analysis in the Intel® Advisor to Deliver Optimized Performance for applications on Intel® Xeon Phi™ Processor

    Energy Technology Data Exchange (ETDEWEB)

    Koskela, Tuomas S.; Lobet, Mathieu; Deslippe, Jack; Matveev, Zakhar

    2017-05-23

    In this session we show, in two case studies, how the roofline feature of Intel Advisor has been utilized to optimize the performance of kernels of the XGC1 and PICSAR codes in preparation for Intel Knights Landing architecture. The impact of the implemented optimizations and the benefits of using the automatic roofline feature of Intel Advisor to study performance of large applications will be presented. This demonstrates an effective optimization strategy that has enabled these science applications to achieve up to 4.6 times speed-up and prepare for future exascale architectures. # Goal/Relevance of Session The roofline model [1,2] is a powerful tool for analyzing the performance of applications with respect to the theoretical peak achievable on a given computer architecture. It allows one to graphically represent the performance of an application in terms of operational intensity, i.e. the ratio of flops performed and bytes moved from memory in order to guide optimization efforts. Given the scale and complexity of modern science applications, it can often be a tedious task for the user to perform the analysis on the level of functions or loops to identify where performance gains can be made. With new Intel tools, it is now possible to automate this task, as well as base the estimates of peak performance on measurements rather than vendor specifications. The goal of this session is to demonstrate how the roofline feature of Intel Advisor can be used to balance memory vs. computation related optimization efforts and effectively identify performance bottlenecks. A series of typical optimization techniques: cache blocking, structure refactoring, data alignment, and vectorization illustrated by the kernel cases will be addressed. # Description of the codes ## XGC1 The XGC1 code [3] is a magnetic fusion Particle-In-Cell code that uses an unstructured mesh for its Poisson solver that allows it to accurately resolve the edge plasma of a magnetic fusion device. After

  19. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  20. Enterprise Mac Security Mac OS X Snow Leopard Security

    CERN Document Server

    Edge, Stephen Charles; Hunter, Beau; Sullivan, Gene; LeBlanc, Dee-Ann

    2010-01-01

    A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing s

  1. Inequality confirmed: institutional exclusion in the interaction between job-centre advisors and unemployed young people

    Directory of Open Access Journals (Sweden)

    Ulla Rantakeisu

    2015-09-01

    Full Text Available Since the 1990s, the pressures on the unemployed have intensified in Sweden owing to increasing demands on individuals to be employable. This article centres on unemployed youths’ experiences of their visits to the public employment services in four Swedish municipalities and how these experiences can be understood against the background of the intersection of social class and gender. A total of 18 unemployed youths were interviewed and their reasoning was compared with their respective employment-agency officers. The analysis shows that the employment agency gives priority to young working-class men over young working-class women and to middle-class youths over working-class youths, respectively. Young working-class women’s wish to combine employment with caregiving is seen as an encumbrance by the employment agency and these women expressed the harshest criticism against the employment agency. When the advisors meet youths who do not correspond with the current expectations and ideals of the labour market, they risk taking part in an institutional process of exclusion of these youngsters.

  2. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  3. Designing a community-based lay health advisor training curriculum to address cancer health disparities.

    Science.gov (United States)

    Gwede, Clement K; Ashley, Atalie A; McGinnis, Kara; Montiel-Ishino, F Alejandro; Standifer, Maisha; Baldwin, Julie; Williams, Coni; Sneed, Kevin B; Wathington, Deanna; Dash-Pitts, Lolita; Green, B Lee

    2013-05-01

    Racial and ethnic minorities have disproportionately higher cancer incidence and mortality than their White counterparts. In response to this inequity in cancer prevention and care, community-based lay health advisors (LHAs) may be suited to deliver effective, culturally relevant, quality cancer education, prevention/screening, and early detection services for underserved populations. APPROACH AND STRATEGIES: Consistent with key tenets of community-based participatory research (CBPR), this project engaged community partners to develop and implement a unique LHA training curriculum to address cancer health disparities among medically underserved communities in a tricounty area. Seven phases of curriculum development went into designing a final seven-module LHA curriculum. In keeping with principles of CBPR and community engagement, academic-community partners and LHAs themselves were involved at all phases to ensure the needs of academic and community partners were mutually addressed in development and implementation of the LHA program. Community-based LHA programs for outreach, education, and promotion of cancer screening and early detection, are ideal for addressing cancer health disparities in access and quality care. When community-based LHAs are appropriately recruited, trained, and located in communities, they provide unique opportunities to link, bridge, and facilitate quality cancer education, services, and research.

  4. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  5. 76 FR 72013 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2011-11-21

    ...''); Colette J. Irwin-Knott, CIPFA, President, National Association of Independent Public Finance Advisors...''); and Susan Gaffney, Director, Federal Liaison Center, Government Finance Officers Association, dated... principles of trade, to foster cooperation and coordination with persons engaged in regulating, clearing...

  6. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  7. The Challenges of Field Testing the Traffic Management Advisor (TMA) in an Operational Air Traffic Control Facility

    Science.gov (United States)

    Hoang, Ty; Swenson, Harry N.

    1997-01-01

    The Traffic Management Advisor (TMA), the sequence and schedule tool of the Center/TRACON Automation System (CTAS), was evaluated at the Fort Worth Center (ZFW) in the summer of 1996. This paper describes the challenges encountered during the various phases of the TMA field evaluation, which included system (hardware and software) installation, personnel training, and data collection. Operational procedures were developed and applied to the evaluation process that would ensure air safety. The five weeks of field evaluation imposed minimal impact on the hosting facility and provided valuable engineering and human factors data. The collection of data was very much an opportunistic affair, due to dynamic traffic conditions. One measure of the success of the TMA evaluation is that, rather than remove TMA after the evaluation until it could be fully implemented, the prototype TMA is in continual use at ZFW as the fully operational version is readied for implementation.

  8. University First Year Advisors: A network approach for first year student transition and retention. A Practice Report.

    Directory of Open Access Journals (Sweden)

    Geraldine Box

    2012-03-01

    Full Text Available Focussing expressly on student support and retention, improving the first year experience has been addressed by Murdoch University through the implementation of a School discipline-specific network of professional First Year Advisors (FYAs. FYA initiatives, both broad-based and varied, have been developed in alignment with the changing needs of students as identified throughout the semesters. A combination of outreach telephone campaigns and face-to-face student support enables FYAs to conduct a "just in time" approach to positively increase student engagement, and ultimately, retention. With a bespoke database, FYAs and academic staff have been able to streamline the process of reporting students in need of support, and gather data relating to student retention. The FYA program is yet to be formally evaluated although initial feedback and student consultation is promising. This paper outlines the program's development, current initiatives and expected outcomes.  

  9. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  10. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  11. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  12. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  13. 78 FR 37614 - Guggenheim Funds Investment Advisors, LLC, et al.; Notice of Application

    Science.gov (United States)

    2013-06-21

    ... securities into, and receive securities from, the series in connection with the purchase and redemption of... of Ethics \\12\\ and Inside Information Policy of the Adviser and Sub- Advisers, personnel of those... adopted or will adopt a code of ethics pursuant to Rule 17j-1 under the Act and Rule 204A-1 under the...

  14. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  15. National Science Foundation Assistant Director for Mathematics and Physical Sciences Tony Chan (USA) visiting LHCb experiment on 23rd May 2007 with Spokesperson T. Nakada, Advisor to CERN Director-General J. Ellis and I. Belyaev of Syracuse

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    National Science Foundation Assistant Director for Mathematics and Physical Sciences Tony Chan (USA) visiting LHCb experiment on 23rd May 2007 with Spokesperson T. Nakada, Advisor to CERN Director-General J. Ellis and I. Belyaev of Syracuse

  16. Securing the Cloud Cloud Computer Security Techniques and Tactics

    CERN Document Server

    Winkler, Vic (JR)

    2011-01-01

    As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o

  17. Shifting Sands, Firm Foundations: Proceedings of the 2009 Annual International Conference of the Association of Tertiary Learning Advisors of Aotearoa/New Zealand (ATLAANZ) (Auckland, New Zealand, November 18-20, 2009). Volume 5

    Science.gov (United States)

    van der Ham, Vanessa, Ed.; Sevillano, Lilia, Ed.; George, Lily, Ed.

    2010-01-01

    The 15 articles in this volume comprise the refereed proceedings of the 2009 ATLAANZ (Association of Tertiary Learning Advisors Aotearoa/New Zealand) conference. The first three chapters focus on collaborative work. In Chapter 1, Ann Pocock shares her experiences of working with other university support services. In Chapter 2, Berni Cooper and…

  18. Business, State of Alaska

    Science.gov (United States)

    Investment Advisors Business Law Charitable Gaming Division of Banking & Securities Laws Relating to Skip to content State of Alaska myAlaska My Government Resident Business in Alaska Visiting Alaska State Government Jobs Federal Jobs Starting a Small Business Living Get a Driver License Get a Hunting

  19. 78 FR 29787 - ALPS ETF Trust, et al.;

    Science.gov (United States)

    2013-05-21

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30519; 812-13884] ALPS ETF...(d)(1)(A) and (B) of the Act. APPLICANTS: ALPS ETF Trust (``Trust''), ALPS Advisors, Inc. (``Adviser... actively managed exchange-traded fund (``ETF''). \\1\\ All entities that currently intend to rely on the...

  20. 75 FR 60838 - American Fidelity Dual Strategy Fund, Inc. and American Fidelity Assurance Company; Notice of...

    Science.gov (United States)

    2010-10-01

    ... by proof of service on the applicants, in the form of an affidavit or, for lawyers, a certificate of... trading portfolio securities, and will have overall responsibility for the management and investment of... will prominently disclose that the Advisor has ultimate responsibility (subject to oversight by the...

  1. 76 FR 4968 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Science.gov (United States)

    2011-01-27

    ...-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change Relating to Listing and Trading Shares of the AdvisorShares Active Bear ETF January 19, 2011. I. Introduction On... of the security or investment in the portfolio. \\14\\ Under accounting procedures followed by the Fund...

  2. 75 FR 56568 - Application Nos. and Proposed Exemptions; D-11400, Wasatch Advisors, Inc.; D-11585, Retirement...

    Science.gov (United States)

    2010-09-16

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration [D-11400; D-11585; D-11603-07... AG; et al. AGENCY: Employee Benefits Security Administration, Labor. ACTION: Notice of proposed... Employee Benefits Security Administration (EBSA), Office of Exemption Determinations, Room N-5700, U.S...

  3. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  4. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  5. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in

  6. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  7. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  8. TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS

    OpenAIRE

    Sen-Tarng Lai

    2015-01-01

    E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security test and security event detection procedures, this paper proposes the Two-Layer Secure ...

  9. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  10. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  11. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  12. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  13. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  14. 75 FR 15465 - RMR Real Estate Income Fund, et al.; Notice of Application

    Science.gov (United States)

    2010-03-29

    ... Real Estate Income Fund, et al.; Notice of Application March 23, 2010. AGENCY: Securities and Exchange.... APPLICANTS: RMR Real Estate Income Fund and RMR Advisors, Inc. FILING DATES: December 31, 2003, September 23.... Applicants' Representations 1. RMR Real Estate Income Fund (``RIF'') is a closed-end management investment...

  15. 77 FR 20079 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Relating...

    Science.gov (United States)

    2012-04-03

    ..., rail cars, and trucks), storage, and terminalling of refined petroleum products (primarily gasoline... investment adviser to the Fund will be First Trust Advisors L.P. (``Adviser'' or ``First Trust''). Energy... securities of companies domiciled in the United States or Canada and deemed to be engaged in the energy...

  16. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  17. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  18. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  19. Korean Military Advisory Group: Insights for Future Security Force Assistance Efforts

    Science.gov (United States)

    2011-06-10

    Battalion MiTT Rank Brigade MiTT Rank Division MiTT Rank Team Chief Maneuver, Fires, and Effects ( MFE ) Major Lieutenant Colonel Lieutenant...Colonel (Promotable) or Colonel Staff Maneuver Trainer MFE Captain Major Lieutenant Colonel Intelligence Trainer Operational Support (OS...Field Artillery Effects Advisor MFE Captain Captain Major Intelligence NCO Trainer OS Master Sergeant Master Sergeant Master Sergeant Logistics NCO

  20. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  1. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2000-01-01

    An information security architecture is made up of several components. Each component in the architecture focuses on establishing acceptable levels of control. These controls are then applied to the operating environment of an organization. Functionally, information security architecture combines technical, practical, and cost-effective solutions to provide an adequate and appropriate level of security.Information Security Architecture: An Integrated Approach to Security in the Organization details the five key components of an information security architecture. It provides C-level executives

  2. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  3. Security threads: effective security devices in the past, present, and future

    Science.gov (United States)

    Wolpert, Gary R.

    2002-04-01

    Security threads were first used to secure banknotes in the mid 1800's. The key to their anti-counterfeiting success was the fact that by being embedded in the paper, they became an integral part of the banknote substrate. Today, all major currencies still utilize this effective security feature. Technological developments have allowed security threads to evolve from a feature authenticated by only visual means to devices that incorporate both visual and machine detectable components. When viewed from the perspective of a thread being a carrier of various security technologies and the fact that they can be incorporated into the core substrate of banknotes, documents, labels, packaging and some high valued articles, it is clear that security threads will remain as effective security devices well into the future. This paper discusses a brief historical background of security threads, current visual and machine authentication technologies incorporated into threads today and a look to the future of threads as effective security devices.

  4. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  5. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  6. Simulating Study on Drive System Performance for Hybrid Electric Bus Based on ADVISOR

    Directory of Open Access Journals (Sweden)

    Wang Xingxing

    2017-01-01

    Full Text Available Hybrid electric bus has a number of advantages when compared with ordinary passenger cars, but in the dynamic matching and the vehicle performance are difficult to detect, thus limits its development process. In this paper, combined with the actual models, the hybrid electric bus module parameters were modified in the software of ADVISOR (Advanced Vehicle Simulator, main including: module of the vehicle, the wheel module, motor module, a battery module and engine module, three kinds of bus models for A, B and C were established, and the related performance that need to be analyzed was set up, such as acceleration, gradability, emissions and energy utilization and so on, in order to ensure the vehicle running in the same environment and convenient for comparison, a fixed vehicle driving cycles was chose, then the simulation results was analyzed, and the various performance was compared with the dynamic indicators and economic indicators which determined by referencing of traditional city bus standard and each other, and finally, the performance optimal model of B was chose out which can meet the demand, its related performance parameters of the simulation results are as follows: the best gradability is 26%, maximum speed is 72.7km/h, maximum acceleration is 1.7m/s2, 0~50km/h acceleration time is 9.5s and fuel consumption is 25L/km.

  7. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  8. Detecting the Online Image of “Average” Restaurants on TripAdvisor

    Directory of Open Access Journals (Sweden)

    Hrvoje Jakopović

    2016-06-01

    Full Text Available Collective intelligence can be interpreted as the actions of individuals that provide collective effects. In online spaces, the more user comments about a matter of discussion, the higher the potential that certain repeated points of view will be used as a story frame. This observation can be a very useful explanation for the value of user comments, reviews and the ratings in the field of public relations. Nowadays, it has become noticeable that many indecisive people who are thinking of buying a product or using a certain service rely on information left by users who already have some kind of experience with the product or service. This information has an effect on decision-making and taking action. In the case of contemporary PR, collective intelligence, facilitated through user comments/reviews, is involved in the image making process. This paper uses the idea of collective intelligence to measure restaurants’ online image, using sentiment analysis to gain insight to users’ attitudes and opinions. Image is interpreted as a short-term outcome of organizational activities that can be identified through individual attitudes and opinions in this study. The author uses sentiment analysis, the use of natural language processing applications, to examine user comments and reviews for restaurants in Dubrovnik rated as “average” on the website TripAdvisor. This paper tests the accuracy of sentiment analysis software, therefore the efficiency of automated sentiment analysis is compared to human sentiment analysis. The results indicate that sentiment analysis tools could be important instruments for the estimation of a positive, negative, or neutral sentiment and detection of organization’s online image.

  9. Software Security and the "Building Security in Maturity" Model

    CERN Document Server

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  10. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  11. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  12. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  13. 76 FR 10926 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2011-02-28

    ..., Chief Financial Officer dated September 8, 2010 (``Georgetown, Texas Letter''); and Portland Letter... the financial advisor are separate, adversarial roles and cannot be provided by the same party.'' One..., President and Chief Executive Officer dated September 29, 2010 (``D.A. Davidson Letter''); and J.J.B...

  14. 76 FR 32248 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2011-06-03

    ...\\ See letter from F. John White, Chief Executive Officer, Public Financial Management, Inc., dated... Financial Strategies, dated March 21, 2011 (``Nathan Howard Letter''); letter from Mike Nicholas, Chief... preserve the general confusion between the role of a financial advisor and the role of an underwriter and...

  15. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  16. Comparison performance of split plug-in hybrid electric vehicle and hybrid electric vehicle using ADVISOR

    Directory of Open Access Journals (Sweden)

    Mohd Rashid Muhammad Ikram

    2017-01-01

    Full Text Available Electric vehicle suffers from relatively short range and long charging times and consequently has not become an acceptable solution to the automotive consumer. The addition of an internal combustion engine to extend the range of the electric vehicle is one method of exploiting the high efficiency and lack of emissions of the electric vehicle while retaining the range and convenient refuelling times of a conventional gasoline powered vehicle. The term that describes this type of vehicle is a hybrid electric vehicle. Many configurations of hybrid electric vehicles have been designed and implemented, namely the series, parallel and power-split configurations. This paper discusses the comparison between Split Plug-in Hybrid Electric Vehicle(SPHEV and Hybrid Electric Vehicle(HEV. Modelling methods such as physics-based Resistive Companion Form technique and Bond Graph method are presented with powertrain component and system modelling examples. The modelling and simulation capability of existing tools such as ADvanced VehIcle SimulatOR (ADVISOR is demonstrated through application examples. Since power electronics is indispensable in hybrid vehicles, the issue of numerical oscillations in dynamic simulations involving power electronics is briefly addressed.

  17. Job security or employment security : What's in a name?

    NARCIS (Netherlands)

    Zekic, Nuna

    2016-01-01

    The main aim of the article is to survey and conceptualize the place of employment security in labour law, and to explore a number of important legal questions relating to this concept. After scrutinizing the notion of employment security, the author endorses the view that job security that exists

  18. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  19. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  20. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...