WorldWideScience

Sample records for securely navigating synthetic

  1. The Navigation Metaphor in Security Economics

    DEFF Research Database (Denmark)

    Pieters, Wolter; Barendse, Jeroen; Ford, Margaret

    2016-01-01

    The navigation metaphor for cybersecurity merges security architecture models and security economics. By identifying the most efficient routes for gaining access to assets from an attacker's viewpoint, an organization can optimize its defenses along these routes. The well-understood concept of na...... of navigation makes it easier to motivate and explain security investment to a wide audience, encouraging strategic security decisions....

  2. The Navigation Metaphor in Security Economics

    NARCIS (Netherlands)

    Pieters, W.; Barendse, Jeroen; Ford, Margaret; Heath, Claude P R; Probst, Christian W.; Verbij, Ruud

    2016-01-01

    The navigation metaphor for cybersecurity merges security architecture models and security economics. By identifying the most efficient routes for gaining access to assets from an attacker's viewpoint, an organization can optimize its defenses along these routes. The well-understood concept of

  3. The navigation metaphor in security economics

    NARCIS (Netherlands)

    Pieters, Wolter; Barendse, Jeroen; Ford, Margaret; Heath, Claude P.R.; Probst, Christian W.; Verbij, Ruud

    2016-01-01

    The navigation metaphor for cybersecurity merges security architecture models and security economics. By identifying the most efficient routes for gaining access to assets from an attacker's viewpoint, an organization can optimize its defenses along these routes. The well-understood concept of

  4. Advanced synthetic holograms for security purposes

    Science.gov (United States)

    Kotačka, Libor; Vízdal, Petr; Behounek, Tomás

    2009-05-01

    Our paper deals with the recent advances in synthetically written optical security devices (DOVIDs) and holograms. The synthesized holographic security elements are recorded with a resolution reaching 500.000 dpi and are specially developed for the "layman-level" security of the most important state valuables and documents, like banknotes and identity cards. We especially pay an attention to such holographic features being impossible to originate through conventional optical holography of matrix based devices.

  5. Feasibility of Using Synthetic Aperture Radar to Aid UAV Navigation.

    Science.gov (United States)

    Nitti, Davide O; Bovenga, Fabio; Chiaradia, Maria T; Greco, Mario; Pinelli, Gianpaolo

    2015-07-28

    This study explores the potential of Synthetic Aperture Radar (SAR) to aid Unmanned Aerial Vehicle (UAV) navigation when Inertial Navigation System (INS) measurements are not accurate enough to eliminate drifts from a planned trajectory. This problem can affect medium-altitude long-endurance (MALE) UAV class, which permits heavy and wide payloads (as required by SAR) and flights for thousands of kilometres accumulating large drifts. The basic idea is to infer position and attitude of an aerial platform by inspecting both amplitude and phase of SAR images acquired onboard. For the amplitude-based approach, the system navigation corrections are obtained by matching the actual coordinates of ground landmarks with those automatically extracted from the SAR image. When the use of SAR amplitude is unfeasible, the phase content can be exploited through SAR interferometry by using a reference Digital Terrain Model (DTM). A feasibility analysis was carried out to derive system requirements by exploring both radiometric and geometric parameters of the acquisition setting. We showed that MALE UAV, specific commercial navigation sensors and SAR systems, typical landmark position accuracy and classes, and available DTMs lead to estimated UAV coordinates with errors bounded within ±12 m, thus making feasible the proposed SAR-based backup system.

  6. Feasibility of Using Synthetic Aperture Radar to Aid UAV Navigation

    Directory of Open Access Journals (Sweden)

    Davide O. Nitti

    2015-07-01

    Full Text Available This study explores the potential of Synthetic Aperture Radar (SAR to aid Unmanned Aerial Vehicle (UAV navigation when Inertial Navigation System (INS measurements are not accurate enough to eliminate drifts from a planned trajectory. This problem can affect medium-altitude long-endurance (MALE UAV class, which permits heavy and wide payloads (as required by SAR and flights for thousands of kilometres accumulating large drifts. The basic idea is to infer position and attitude of an aerial platform by inspecting both amplitude and phase of SAR images acquired onboard. For the amplitude-based approach, the system navigation corrections are obtained by matching the actual coordinates of ground landmarks with those automatically extracted from the SAR image. When the use of SAR amplitude is unfeasible, the phase content can be exploited through SAR interferometry by using a reference Digital Terrain Model (DTM. A feasibility analysis was carried out to derive system requirements by exploring both radiometric and geometric parameters of the acquisition setting. We showed that MALE UAV, specific commercial navigation sensors and SAR systems, typical landmark position accuracy and classes, and available DTMs lead to estimated UAV coordinates with errors bounded within ±12 m, thus making feasible the proposed SAR-based backup system.

  7. CASH vs. SYNTHETIC ASSET-BACKED SECURITIES

    Directory of Open Access Journals (Sweden)

    SILVIU EDUARD DINCA

    2015-12-01

    Full Text Available During the past few years, in the recent post-crisis aftermath, financial and banking institutions around the world are exploring new alternatives to better secure their financing and refinancing demands altogether with the enhancement of their risk management capabilities. We will exhibit herewith a theoretical and applied comparison between the true-sale and synthetic ABS securitizations as financial markets-based funding and risks mitigation techniques, highlighting certain key structuring and implementation specifics, discovered during the research, on each of them.

  8. Legal regime of the Bering Strait and security of navigation

    Directory of Open Access Journals (Sweden)

    Aleksandr S. Skaridov

    2016-12-01

    Full Text Available Objective to establish the legal regime and security of navigation in the Bering Strait. Methods formal logical method systemic method comparative legal method statistical method. Results in the recent years specialized publications contain numerous publications on the problems of development of Arctic shipping and the future intensification of the use of the Northern Sea Route. Whatever Arctic routes may be chosen by the skippers the vessels will have to overcome the narrowness of the Bering Strait. If the existing estimates are reasonable and the navigation of the NorthWest Sea Passage will increase it is appropriate to ask whether the legal regime and security means are adapted to the possible increase of commercial shipping and military navigation. In this respect the author formulates the legal measures aimed at ensuring security in the Bering Strait area with the account of growing cargo traffic. Scientific novelty for the first time the article proves the necessity to include into the Bering Strait area the territories bounded from the north by the east and west passages formed by the Diomede Islands and continental coasts of the Russian Federation and the United States and from the south ndash by the passages between the Cape of Chukotka and Cape Sevuokuk of St. Lawrence Island Cape Sivuka and the mainland of Alaska in order to protect the sea natural landscape and to ensure the maritime safety. The opinion is substantiated about the necessity to equip the marine passages forming the waters of the Bering Strait with a security system. The proposed legal regime of ensuring the safety of navigation in the Bering Strait which includes the common navigation rules establishing the areas of the vessel traffic separation designation of areas of marine reserves and organizationallegal means for damping the dangerous situations. Practical significance the findings and conclusions of the article can be used in scientific educational and law

  9. Safety, security, and serving the public interest in synthetic biology.

    Science.gov (United States)

    Gronvall, Gigi Kwik

    2018-03-21

    This article describes what may be done by scientists and by the biotechnology industry, generally, to address the safety and security challenges in synthetic biology. Given the technical expertise requirements for developing sound policy options, as well as the importance of these issues to the future of the industry, scientists who work in synthetic biology should be informed about these challenges and get involved in shaping policies relevant to the field.

  10. 33 CFR 165.117 - Regulated Navigation Areas, Safety and Security Zones: Deepwater Ports, First Coast Guard District.

    Science.gov (United States)

    2010-07-01

    ..., Safety and Security Zones: Deepwater Ports, First Coast Guard District. 165.117 Section 165.117... Limited Access Areas First Coast Guard District § 165.117 Regulated Navigation Areas, Safety and Security... section are designated as regulated navigation areas. (2) Safety and security zones. All waters within a...

  11. 75 FR 16370 - Regulated Navigation Areas, Safety Zones, Security Zones; Deepwater Ports in Boston Captain of...

    Science.gov (United States)

    2010-04-01

    ... rule under Executive Order 13045, Protection of Children from Environmental Health Risks and Safety Risks. This rule is not an economically significant rule and would not create an environmental risk to...] RIN 1625-AA00, RIN 1625-AA11 Regulated Navigation Areas, Safety Zones, Security Zones; Deepwater Ports...

  12. Synthetic biology for the directed evolution of protein biocatalysts: navigating sequence space intelligently

    Science.gov (United States)

    Currin, Andrew; Swainston, Neil; Day, Philip J.

    2015-01-01

    The amino acid sequence of a protein affects both its structure and its function. Thus, the ability to modify the sequence, and hence the structure and activity, of individual proteins in a systematic way, opens up many opportunities, both scientifically and (as we focus on here) for exploitation in biocatalysis. Modern methods of synthetic biology, whereby increasingly large sequences of DNA can be synthesised de novo, allow an unprecedented ability to engineer proteins with novel functions. However, the number of possible proteins is far too large to test individually, so we need means for navigating the ‘search space’ of possible protein sequences efficiently and reliably in order to find desirable activities and other properties. Enzymologists distinguish binding (K d) and catalytic (k cat) steps. In a similar way, judicious strategies have blended design (for binding, specificity and active site modelling) with the more empirical methods of classical directed evolution (DE) for improving k cat (where natural evolution rarely seeks the highest values), especially with regard to residues distant from the active site and where the functional linkages underpinning enzyme dynamics are both unknown and hard to predict. Epistasis (where the ‘best’ amino acid at one site depends on that or those at others) is a notable feature of directed evolution. The aim of this review is to highlight some of the approaches that are being developed to allow us to use directed evolution to improve enzyme properties, often dramatically. We note that directed evolution differs in a number of ways from natural evolution, including in particular the available mechanisms and the likely selection pressures. Thus, we stress the opportunities afforded by techniques that enable one to map sequence to (structure and) activity in silico, as an effective means of modelling and exploring protein landscapes. Because known landscapes may be assessed and reasoned about as a whole

  13. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs

    Science.gov (United States)

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-01-01

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620

  14. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.

    Science.gov (United States)

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-03-24

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.

  15. Development of a self-navigating mobile interior robot application as a security guard/sentry

    International Nuclear Information System (INIS)

    Klarer, P.R.; Harrington, J.J.

    1986-07-01

    This paper describes a mobile robot system designed to function as part of an overall security system at a high security facility. The features of this robot system include specialized software and sensors for navigation without the need for external locator beacons or signposts, sensors for remote imaging and intruder detection, and the ability to communicate information either directly to the electronic portion of the security system or to a manned central control center. Other desirable features of the robot system include low weight, compact size, and low power consumption. The robot system can be operated either by remote manual control, or it can operate autonomously where direct human control can be limited to the global command level. The robot can act as a mobile remote sensing platform for alarm assessment or roving patrol, as a point sensor (sentry) in routine security applications, or as an exploratory device in situations potentially hazardous to humans. This robot system may also be used to ''walk-test'' intrusion detection sensors as part of a routine test and maintenance program for an interior intrusion detection system. The hardware, software, and operation of this robot system will be briefly described herein

  16. Navigation Lights - USACE IENC

    Data.gov (United States)

    Department of Homeland Security — These inland electronic Navigational charts (IENCs) were developed from available data used in maintenance of Navigation channels. Users of these IENCs should be...

  17. DNA Compass: a secure, client-side site for navigating personal genetic information.

    Science.gov (United States)

    Curnin, Charles; Gordon, Assaf; Erlich, Yaniv

    2017-07-15

    Millions of individuals have access to raw genomic data using direct-to-consumer companies. The advent of large-scale sequencing projects, such as the Precision Medicine Initiative, will further increase the number of individuals with access to their own genomic information. However, querying genomic data requires a computer terminal and computational skill to analyze the data-an impediment for the general public. DNA Compass is a website designed to empower the public by enabling simple navigation of personal genomic data. Users can query the status of their genomic variants for over 1658 markers or tens of millions of documented single nucleotide polymorphisms (SNPs). DNA Compass presents the relevant genotypes of the user side-by-side with explanatory scientific resources. The genotype data never leaves the user's computer, a feature that provides improved security and performance. More than 12 000 unique users, mainly from the general genetic genealogy community, have already used DNA Compass, demonstrating its utility. DNA Compass is freely available on https://compass.dna.land . yaniv@cs.columbia.edu. © The Author(s) 2017. Published by Oxford University Press.

  18. Synthetic

    Directory of Open Access Journals (Sweden)

    Anna Maria Manferdini

    2010-06-01

    Full Text Available Traditionally materials have been associated with a series of physical properties that can be used as inputs to production and manufacturing. Recently we witnessed an interest in materials considered not only as ‘true matter’, but also as new breeds where geometry, texture, tooling and finish are able to provoke new sensations when they are applied to a substance. These artificial materials can be described as synthetic because they are the outcome of various qualities that are not necessarily true to the original matter, but they are the combination of two or more parts, whether by design or by natural processes. The aim of this paper is to investigate the potential of architectural surfaces to produce effects through the invention of new breeds of artificial matter, using micro-scale details derived from Nature as an inspiration.

  19. Maritime supply chain security: navigating through a sea of compliance requirements

    CSIR Research Space (South Africa)

    Maspero, EL

    2008-11-01

    Full Text Available MTSA Maritime Transportation Security Act RFID Radio Frequency Identification SAFE Security and Accountability For Every port SOLAS Safety Of Life At Sea SST Smart and Secure Tradelane UNCTAD United Nations Conference on Trade and Development... for increased security within maritime shipping and so the SOLAS (the Safety of Lives at Sea) Convention Chapter 11 was amended to provide for the inclusion of the International Ships and Port Facilities Security Code (ISPS Code), which was internationally...

  20. Restricted Navigation Areas - USACE IENC

    Data.gov (United States)

    Department of Homeland Security — These inland electronic Navigational charts (IENCs) were developed from available data used in maintenance of Navigation channels. Users of these IENCs should be...

  1. 75 FR 51374 - Regulated Navigation Areas, Safety Zones, Security Zones; Deepwater Ports in Boston Captain of...

    Science.gov (United States)

    2010-08-20

    ... Ocean off the coast of Gloucester, Massachusetts. The purpose of these regulated areas is to protect... a water area within a defined boundary for which regulations for vessels navigating within the area..., Neptune Deepwater Port (Neptune), is located in the Atlantic Ocean, approximately eight nautical miles...

  2. Maritime supply chain security: Navigating through a sea of compliance requirements

    Directory of Open Access Journals (Sweden)

    Emma Maspero

    2008-11-01

    Full Text Available As a direct result of the 9-11 New York attack all modes of freight and passengertransportation were scrutinised for vulnerabilities. Over 90% of international trade takes place via sea transport for at least some part of the supply chain and as a result there has been a drive to better secure maritime transportation. This paper outlines the background to and the rationale behind the most important of the new security measures for maritime transportation and provides an overview of the likely implications for supply chain role-players. In addition the paper endeavours to create awareness of the importance of maritime supply chain security.

  3. 33 CFR 165.1405 - Regulated Navigation Areas and Security Zones; Designated Escorted Vessels-Philippine Sea and...

    Science.gov (United States)

    2010-07-01

    ...) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Specific Regulated...). (a) Regulated navigation area. The following areas, designated by coordinates referencing World...

  4. 33 CFR 2.36 - Navigable waters of the United States, navigable waters, and territorial waters.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Navigable waters of the United States, navigable waters, and territorial waters. 2.36 Section 2.36 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL JURISDICTION Jurisdictional Terms § 2.36 Navigable waters...

  5. The Utilisation of Pisang Island as a Platform to Support the Current Safety and Security Needs of Marine Navigation in the Straits of Malacca

    Directory of Open Access Journals (Sweden)

    Ahmad Faizal Ahmad Fuad

    2017-06-01

    Full Text Available Current marine navigational practice relies less on long-range visual marine signals such as lighthouses for reference purposes. This is due to the availability of Global Navigation Satellite Systems (GNSS, which are integrated with other navigational aids on ships. Therefore, the objective of this study is to review the function of Pisang Island lighthouse and to propose the most relevant use of Pisang Island for current navigational needs. The function of the lighthouse was reviewed according to the IALA Navigational Guide and the AIS data image. The result showed that the most suitable navigational use of the lighthouse is to act as a reference for Line of Position (LOP. The AIS data image indicated that mariners are not using Pisang Island lighthouse for LOP. The trend in the Straits of Malacca (SoM was compared with the trend in the Straits of Dover, UK. The selected experts verified that LOP was not practised there. As a specific example, a tanker ship route in the South China Sea was used to further support that LOP was not practised. This evidence supported the view that Pisang Island lighthouse is less relevant for current navigational practice and does not directly support the coastal state VTS operation and the establishment of the marine electronic highway. Furthermore, the existing shore-based VTS radar has limitations on range and the detection of targets near Pisang Island. Therefore, this study proposes the establishment of a new radar station on Pisang Island at the existing site of the lighthouse. The proposed new radar station on Pisang Island will add to the existing coverage of the VTS radar, bridging the coverage gaps to overcome the weakness of the existing shore-based radar and improve the safety and security of marine navigation in the SoM.

  6. Navigation System of Marks Areas - USACE IENC

    Data.gov (United States)

    Department of Homeland Security — These inland electronic Navigational charts (IENCs) were developed from available data used in maintenance of Navigation channels. Users of these IENCs should be...

  7. Nautical Navigation Aids (NAVAID) Locations

    Data.gov (United States)

    Department of Homeland Security — Structures intended to assist a navigator to determine position or safe course, or to warn of dangers or obstructions to navigation. This dataset includes lights,...

  8. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Science.gov (United States)

    2010-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids to...

  9. Track 7: policy and public interest U.S.-Russian nuclear security cooperation: navigating the present realities. Panel Discussion

    International Nuclear Information System (INIS)

    Hayden, N.K.; Hayden-Prindle, Nancy; McCarthy, Maureen; Rich, John; Graham, Thomas Jr.; Mizin, Victor; Cagan, Debra; Alessi, Vic

    2001-01-01

    Full text of publication follows: In the 10 yr since the beginning of cooperation between the United States and the Russian Federation on nuclear security and nonproliferation issues, the political, economic, and security environment governing the nuclear security cooperation has evolved and, in some cases, undergone dramatic changes. On one hand, the protection of nuclear weapons and materials continues as an urgent national security concern for both the United States and Russia. At the same time, defense infrastructures have been closed or converted to civilian purposes, and there has been increased activity in international cooperation for civilian nuclear technology. This special panel will explore the future of the U.S.-Russia nuclear cooperation with particular attention to the following three themes. Theme 1: Managing the Risks: U.S.-Russian Federation Cooperative Programs for Nuclear Weapons and Materials Security; Theme 2: Creating the Benefits: The Changing Nature of Russia's Domestic Nuclear Industry; Theme 3: Addressing the Impediments: United States and Russia as Nuclear Exporters: Reconciling Nonproliferation Goals, Technology Advancements, and Economic Incentives

  10. 33 CFR 127.705 - Security systems.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...

  11. 33 CFR 103.310 - Responsibilities of the Area Maritime Security (AMS) Committee.

    Science.gov (United States)

    2010-07-01

    ... disseminating appropriate security information to port stakeholders. ... Maritime Security (AMS) Committee. 103.310 Section 103.310 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  12. 77 FR 42637 - Navigation and Navigable Waters; Technical, Organizational, and Conforming Amendments; Corrections

    Science.gov (United States)

    2012-07-20

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Parts 84 and 115 [Docket No. USCG-2012-0306] RIN 1625-AB86 Navigation and Navigable Waters; Technical, Organizational, and Conforming Amendments...), the Coast Guard published a final rule entitled ``Navigation and Navigable Waters; Technical...

  13. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  14. 33 CFR 104.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 104.145 Section 104.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.145 Maritime Security (MARSEC...

  15. 33 CFR 105.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 105.145 Section 105.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES General § 105.145 Maritime Security (MARSEC...

  16. 33 CFR 165.1407 - Security Zones; Oahu, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Oahu, HI. 165.1407 Section 165.1407 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1407 Security Zones; Oahu, HI...

  17. Coal-based synthetic natural gas (SNG): A solution to China’s energy security and CO2 reduction?

    International Nuclear Information System (INIS)

    Ding, Yanjun; Han, Weijian; Chai, Qinhu; Yang, Shuhong; Shen, Wei

    2013-01-01

    Considering natural gas (NG) to be the most promising low-carbon option for the energy industry, large state owned companies in China have established numerous coal-based synthetic natural gas (SNG) projects. The objective of this paper is to use a system approach to evaluate coal-derived SNG in terms of life-cycle energy efficiency and CO 2 emissions. This project examined main applications of the SNG and developed a model that can be used for evaluating energy efficiency and CO 2 emissions of various fuel pathway systems. The model development started with the GREET model, and added the SNG module and an end-use equipment module. The database was constructed with Chinese data. The analyses show when the SNG are used for cooking, power generation, steam production for heating and industry, life-cycle energies are 20–108% higher than all competitive pathways, with a similar rate of increase in life-cycle CO 2 emissions. When a compressed natural gas (CNG) car uses the SNG, life-cycle CO 2 emission will increase by 150–190% compared to the baseline gasoline car and by 140–210% compared to an electric car powered by electricity from coal-fired power plants. The life-cycle CO 2 emission of SNG-powered city bus will be 220–270% higher than that of traditional diesel city bus. The gap between SNG-powered buses and new hybrid diesel buses will be even larger—life-cycle CO 2 emission of the former being around 4 times of that of the latter. It is concluded that the SNG will not accomplish the tasks of both energy conservation and CO 2 reduction. - Highlights: ► We evaluated life-cycle energy efficiency and CO 2 emissions of coal-derived SNG. ► We used GREET model and added a coal-based SNG and an end-use modules. ► The database was constructed with Chinese domestic data. ► Life-cycle energies and CO 2 emissions of coal-based SNG are 20–100% higher. ► Coal-based SNG is not a solution to both energy conservation and CO 2 reduction

  18. Ecodesign Navigator

    DEFF Research Database (Denmark)

    Simon, M; Evans, S.; McAloone, Timothy Charles

    The Ecodesign Navigator is the product of a three-year research project called DEEDS - DEsign for Environment Decision Support. The initial partners were Manchester Metropolitan University, Cranfield University, Engineering 6 Physical Sciences Resaech Council, Electrolux, ICL, and the Industry...

  19. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...

  20. 33 CFR 165.T09-1080 - Safety Zone and Regulated Navigation Area, Chicago Sanitary and Ship Canal, Romeoville, IL.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety Zone and Regulated Navigation Area, Chicago Sanitary and Ship Canal, Romeoville, IL. 165.T09-1080 Section 165.T09-1080 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED...

  1. 33 CFR 150.705 - What are the requirements for maintaining and inspecting aids to navigation?

    Science.gov (United States)

    2010-07-01

    ... maintaining and inspecting aids to navigation? 150.705 Section 150.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Aids to Navigation § 150.705 What are the requirements for maintaining and inspecting aids to navigation? (a) All...

  2. Surgical Navigation

    DEFF Research Database (Denmark)

    Azarmehr, Iman; Stokbro, Kasper; Bell, R. Bryan

    2017-01-01

    Purpose: This systematic review investigates the most common indications, treatments, and outcomes of surgical navigation (SN) published from 2010 to 2015. The evolution of SN and its application in oral and maxillofacial surgery have rapidly developed over recent years, and therapeutic indicatio...

  3. Responsibility navigator

    NARCIS (Netherlands)

    Kuhlmann, Stefan; Edler, Jakob; Ordonez Matamoros, Hector Gonzalo; Randles, Sally; Walhout, Bart; Walhout, Bart; Gough, Clair; Lindner, Ralf; Lindner, Ralf; Kuhlmann, Stefan; Randles, Sally; Bedsted, Bjorn; Gorgoni, Guido; Griessler, Erich; Loconto, Allison; Mejlgaard, Niels

    2016-01-01

    Research and innovation activities need to become more responsive to societal challenges and concerns. The Responsibility Navigator, developed in the Res-AGorA project, supports decision-makers to govern such activities towards more conscious responsibility. What is considered “responsible” will

  4. Cislunar navigation

    Science.gov (United States)

    Cesarone, R. J.; Burke, J. D.; Hastrup, R. C.; Lo, M. W.

    2003-01-01

    In the future, navigation and communication in Earth-Moon space and on the Moon will differ from past practice due to evolving technology and new requirements. Here we describe likely requirements, discuss options for meeting them, and advocate steps that can be taken now to begin building the navcom systems needed in coming years for exploring and using the moon.

  5. 76 FR 27337 - Houston/Galveston Navigation Safety Advisory Committee

    Science.gov (United States)

    2011-05-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-1116] Houston/Galveston Navigation Safety...: The Houston/Galveston Navigation Safety Advisory Committee postponed its originally scheduled February... Houston Ship Channel, and various other navigation safety matters in the Galveston Bay area. The meeting...

  6. 78 FR 41304 - Navigation and Navigable Waters; Technical, Organizational, and Conforming Amendments; Correction

    Science.gov (United States)

    2013-07-10

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 105 [Docket No. USCG-2013-0397] RIN 1625-AC06 Navigation and Navigable Waters; Technical, Organizational, and Conforming Amendments; Correction AGENCY: Coast Guard, DHS. ACTION: Final rule; correction. SUMMARY: The Coast Guard published a final rule...

  7. 75 FR 48564 - Navigation and Navigable Waters; Technical, Organizational, and Conforming Amendments, Sector...

    Science.gov (United States)

    2010-08-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Parts 3 and 165 [Docket No. USCG-2010-0351] RIN 1625-ZA25 Navigation and Navigable Waters; Technical, Organizational, and Conforming Amendments, Sector Columbia River, WA AGENCY: Coast Guard, DHS. ACTION: Final rule. SUMMARY: This rule makes non-substantive...

  8. 33 CFR 106.140 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.140 Maritime Security (MARSEC) Directive. All OCS facility owners or operators subject to this part must comply...

  9. 33 CFR 101.405 - Maritime Security (MARSEC) Directives.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Control Measures for Security § 101.405 Maritime... necessary to respond to a threat assessment or to a specific threat against the maritime elements of the...

  10. 33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.

    Science.gov (United States)

    2010-07-01

    ... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  11. Synthetic Cannabinoids

    Directory of Open Access Journals (Sweden)

    Aslihan Okan Ibiloglu

    2017-09-01

    Full Text Available Synthetic cannabinoids which is a subgroup of cannabinoids are commonly used for recreational drug use throughout the whole world. Although both marijuana and synthetic cannabinoids stimulate the same receptors, cannabinoid receptor 1 (CB1 and cannabinoid receptor 2 (CB2, studies have shown that synthetic cannabinoids are much more potent than marijuana. The longer use of synthetic cannabinoids can cause severe physical and psychological symptoms that might even result in death, similar to many known illicit drugs. Main treatment options mostly involve symptom management and supportive care. The aim of this article is to discuss clinical and pharmacological properties of the increasingly used synthetic cannabinoids. [Psikiyatride Guncel Yaklasimlar - Current Approaches in Psychiatry 2017; 9(3.000: 317-328

  12. 33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.235 Maritime Security (MARSEC) Level...

  13. 33 CFR 105.230 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.230 Maritime Security (MARSEC) Level coordination and implementation. (a) The facility owner...

  14. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.240 Maritime Security (MARSEC) Level coordination and implementation. (a) The vessel owner or...

  15. 33 CFR 103.305 - Composition of an Area Maritime Security (AMS) Committee.

    Science.gov (United States)

    2010-07-01

    ... port stakeholders having a special competence in maritime security; and (7) Port stakeholders affected... Security (AMS) Committee. 103.305 Section 103.305 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  16. 33 CFR 106.255 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance. (a) Security systems and equipment must be in good working order and inspected, tested, calibrated, and...

  17. 33 CFR 165.923 - Regulated Navigation Area between mile markers 296.1 and 296.7 of the Chicago Sanitary and Ship...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Regulated Navigation Area between mile markers 296.1 and 296.7 of the Chicago Sanitary and Ship Canal located near Romeoville, IL. 165.923 Section 165.923 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED...

  18. Towards Safe Navigation by Formalizing Navigation Rules

    Directory of Open Access Journals (Sweden)

    Arne Kreutzmann

    2013-06-01

    Full Text Available One crucial aspect of safe navigation is to obey all navigation regulations applicable, in particular the collision regulations issued by the International Maritime Organization (IMO Colregs. Therefore, decision support systems for navigation need to respect Colregs and this feature should be verifiably correct. We tackle compliancy of navigation regulations from a perspective of software verification. One common approach is to use formal logic, but it requires to bridge a wide gap between navigation concepts and simple logic. We introduce a novel domain specification language based on a spatio-temporal logic that allows us to overcome this gap. We are able to capture complex navigation concepts in an easily comprehensible representation that can direcly be utilized by various bridge systems and that allows for software verification.

  19. Synthetic environments

    Science.gov (United States)

    Lukes, George E.; Cain, Joel M.

    1996-02-01

    The Advanced Distributed Simulation (ADS) Synthetic Environments Program seeks to create robust virtual worlds from operational terrain and environmental data sources of sufficient fidelity and currency to interact with the real world. While some applications can be met by direct exploitation of standard digital terrain data, more demanding applications -- particularly those support operations 'close to the ground' -- are well-served by emerging capabilities for 'value-adding' by the user working with controlled imagery. For users to rigorously refine and exploit controlled imagery within functionally different workstations they must have a shared framework to allow interoperability within and between these environments in terms of passing image and object coordinates and other information using a variety of validated sensor models. The Synthetic Environments Program is now being expanded to address rapid construction of virtual worlds with research initiatives in digital mapping, softcopy workstations, and cartographic image understanding. The Synthetic Environments Program is also participating in a joint initiative for a sensor model applications programer's interface (API) to ensure that a common controlled imagery exploitation framework is available to all researchers, developers and users. This presentation provides an introduction to ADS and the associated requirements for synthetic environments to support synthetic theaters of war. It provides a technical rationale for exploring applications of image understanding technology to automated cartography in support of ADS and related programs benefitting from automated analysis of mapping, earth resources and reconnaissance imagery. And it provides an overview and status of the joint initiative for a sensor model API.

  20. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  1. 33 CFR 165.1408 - Security Zones; Maui, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Maui, HI. 165... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1408 Security Zones; Maui, HI... Harbor, Maui, HI or within 3 nautical miles seaward of the Kahului Harbor COLREGS DEMARCATION (See 33 CFR...

  2. 33 CFR 165.1409 - Security Zones; Hawaii, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Hawaii, HI. 165... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1409 Security Zones; Hawaii..., Hawaii. All waters extending 100 yards in all directions from each large passenger vessel in Hilo Harbor...

  3. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Waters..., California. 165.1192 Section 165.1192 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport...

  4. 33 CFR 165.1312 - Security Zone; Portland Rose Festival on Willamette River.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Portland Rose Festival on Willamette River. 165.1312 Section 165.1312 Navigation and Navigable Waters COAST GUARD... § 165.1312 Security Zone; Portland Rose Festival on Willamette River. (a) Location. The following area...

  5. 33 CFR 165.1121 - Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA.

    Science.gov (United States)

    2010-07-01

    ... Guard District § 165.1121 Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA. (a... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA. 165.1121 Section 165.1121 Navigation and Navigable Waters COAST...

  6. 33 CFR 165.1120 - Security Zone; Naval Amphibious Base, San Diego, CA.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Naval Amphibious Base, San Diego, CA. 165.1120 Section 165.1120 Navigation and Navigable Waters COAST GUARD, DEPARTMENT... § 165.1120 Security Zone; Naval Amphibious Base, San Diego, CA. (a) Location. The following area is a...

  7. 33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth...

  8. 33 CFR 165.835 - Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL. 165.835 Section 165.835 Navigation and Navigable Waters COAST GUARD... § 165.835 Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL. (a) Definition. As used in...

  9. 75 FR 51473 - Houston/Galveston Navigation Safety Advisory Committee

    Science.gov (United States)

    2010-08-20

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2010-0656] Houston/Galveston... Houston/Galveston Navigation Safety Advisory Committee (HOGANSAC) and its working groups will meet in Houston, Texas, to discuss waterway improvements, aids to navigation, area projects impacting safety on...

  10. 75 FR 23793 - Houston/Galveston Navigation Safety Advisory Committee

    Science.gov (United States)

    2010-05-04

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2010-0032] Houston/Galveston... Houston/Galveston Navigation Safety Advisory Committee (``HOGANSAC'' or ``the Committee'') and its working groups will meet in Houston, Texas to discuss waterway improvements, aids to navigation, area projects...

  11. PRIVATE GRAPHS – ACCESS RIGHTS ON GRAPHS FOR SEAMLESS NAVIGATION

    Directory of Open Access Journals (Sweden)

    W. Dorner

    2016-06-01

    Full Text Available After the success of GNSS (Global Navigational Satellite Systems and navigation services for public streets, indoor seems to be the next big development in navigational services, relying on RTLS – Real Time Locating Services (e.g. WIFI and allowing seamless navigation. In contrast to navigation and routing services on public streets, seamless navigation will cause an additional challenge: how to make routing data accessible to defined users or restrict access rights for defined areas or only to parts of the graph to a defined user group? The paper will present case studies and data from literature, where seamless and especially indoor navigation solutions are presented (hospitals, industrial complexes, building sites, but the problem of restricted access rights was only touched from a real world, but not a technical perspective. The analysis of case studies will show, that the objective of navigation and the different target groups for navigation solutions will demand well defined access rights and require solutions, how to make only parts of a graph to a user or application available to solve a navigational task. The paper will therefore introduce the concept of private graphs, which is defined as a graph for navigational purposes covering the street, road or floor network of an area behind a public street and suggest different approaches how to make graph data for navigational purposes available considering access rights and data protection, privacy and security issues as well.

  12. Synthetic Rutile

    International Nuclear Information System (INIS)

    Burastero, J.

    1975-01-01

    This work is about the laboratory scale investigation of the conditions in the rutile synthetic production from one me nita in Aguas Dulces reservoir. The iron mineral is chlorinated and volatilized selectively leaving a residue enriched in titanium dioxide which can be used as a substitute of rutile mineral

  13. 77 FR 67658 - Navigation Safety Advisory Council

    Science.gov (United States)

    2012-11-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0212] Navigation Safety Advisory.../en/hotels/florida/embassy-suites-tampa-downtown-convention-center-TPAESES/index.html . For... possible. To facilitate public participation, we are inviting public comment on the issues to be considered...

  14. 33 CFR 165.121 - Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode Island.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: High... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.121 Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode...

  15. 33 CFR 165.500 - Safety/Security Zones; Chesapeake Bay, Maryland.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zones; Chesapeake... HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS... Safety/Security Zones; Chesapeake Bay, Maryland. (a) Definitions. (1) Certain Dangerous Cargo (CDC) means...

  16. 33 CFR 165.116 - Safety and Security Zones; Salem and Boston Harbors, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Salem..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED... § 165.116 Safety and Security Zones; Salem and Boston Harbors, Massachusetts. (a) Location. The...

  17. 33 CFR 165.114 - Safety and Security Zones: Escorted Vessels-Boston Harbor, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.114 Safety and Security Zones: Escorted Vessels—Boston Harbor, Massachusetts. (a...

  18. 33 CFR 165.720 - Safety/Security Zone: St. Johns River, Jacksonville, FL.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: St. Johns... OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED... § 165.720 Safety/Security Zone: St. Johns River, Jacksonville, FL. (a) Location. The water and the land...

  19. Radar and electronic navigation

    CERN Document Server

    Sonnenberg, G J

    2013-01-01

    Radar and Electronic Navigation, Sixth Edition discusses radar in marine navigation, underwater navigational aids, direction finding, the Decca navigator system, and the Omega system. The book also describes the Loran system for position fixing, the navy navigation satellite system, and the global positioning system (GPS). It reviews the principles, operation, presentations, specifications, and uses of radar. It also describes GPS, a real time position-fixing system in three dimensions (longitude, latitude, altitude), plus velocity information with Universal Time Coordinated (UTC). It is accur

  20. 33 CFR 105.250 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... include procedures for identifying and responding to security system and equipment failures or...

  1. 33 CFR 104.260 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... procedures for identifying and responding to security system and equipment failures or malfunctions. ...

  2. Enabling Autonomous Navigation for Affordable Scooters

    Directory of Open Access Journals (Sweden)

    Kaikai Liu

    2018-06-01

    Full Text Available Despite the technical success of existing assistive technologies, for example, electric wheelchairs and scooters, they are still far from effective enough in helping those in need navigate to their destinations in a hassle-free manner. In this paper, we propose to improve the safety and autonomy of navigation by designing a cutting-edge autonomous scooter, thus allowing people with mobility challenges to ambulate independently and safely in possibly unfamiliar surroundings. We focus on indoor navigation scenarios for the autonomous scooter where the current location, maps, and nearby obstacles are unknown. To achieve semi-LiDAR functionality, we leverage the gyros-based pose data to compensate the laser motion in real time and create synthetic mapping of simple environments with regular shapes and deep hallways. Laser range finders are suitable for long ranges with limited resolution. Stereo vision, on the other hand, provides 3D structural data of nearby complex objects. To achieve simultaneous fine-grained resolution and long range coverage in the mapping of cluttered and complex environments, we dynamically fuse the measurements from the stereo vision camera system, the synthetic laser scanner, and the LiDAR. We propose solutions to self-correct errors in data fusion and create a hybrid map to assist the scooter in achieving collision-free navigation in an indoor environment.

  3. Enabling Autonomous Navigation for Affordable Scooters.

    Science.gov (United States)

    Liu, Kaikai; Mulky, Rajathswaroop

    2018-06-05

    Despite the technical success of existing assistive technologies, for example, electric wheelchairs and scooters, they are still far from effective enough in helping those in need navigate to their destinations in a hassle-free manner. In this paper, we propose to improve the safety and autonomy of navigation by designing a cutting-edge autonomous scooter, thus allowing people with mobility challenges to ambulate independently and safely in possibly unfamiliar surroundings. We focus on indoor navigation scenarios for the autonomous scooter where the current location, maps, and nearby obstacles are unknown. To achieve semi-LiDAR functionality, we leverage the gyros-based pose data to compensate the laser motion in real time and create synthetic mapping of simple environments with regular shapes and deep hallways. Laser range finders are suitable for long ranges with limited resolution. Stereo vision, on the other hand, provides 3D structural data of nearby complex objects. To achieve simultaneous fine-grained resolution and long range coverage in the mapping of cluttered and complex environments, we dynamically fuse the measurements from the stereo vision camera system, the synthetic laser scanner, and the LiDAR. We propose solutions to self-correct errors in data fusion and create a hybrid map to assist the scooter in achieving collision-free navigation in an indoor environment.

  4. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  5. 33 CFR 165.776 - Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico 165.776 Section 165.776 Navigation and Navigable Waters COAST... Guard District § 165.776 Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico (a...

  6. 33 CFR 165.820 - Security Zone; Ohio River Mile, 34.6 to 35.1, Shippingport, Pennsylvania.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Ohio River Mile, 34.6 to 35.1, Shippingport, Pennsylvania. 165.820 Section 165.820 Navigation and Navigable Waters... Guard District § 165.820 Security Zone; Ohio River Mile, 34.6 to 35.1, Shippingport, Pennsylvania. (a...

  7. 33 CFR 165.1317 - Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters, Washington. 165.1317 Section 165.1317 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS...

  8. 33 CFR 165.1318 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of the Port Zone 165.1318 Section 165.1318 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND...

  9. NFC Internal: An Indoor Navigation System

    Science.gov (United States)

    Ozdenizci, Busra; Coskun, Vedat; Ok, Kerem

    2015-01-01

    Indoor navigation systems have recently become a popular research field due to the lack of GPS signals indoors. Several indoors navigation systems have already been proposed in order to eliminate deficiencies; however each of them has several technical and usability limitations. In this study, we propose NFC Internal, a Near Field Communication (NFC)-based indoor navigation system, which enables users to navigate through a building or a complex by enabling a simple location update, simply by touching NFC tags those are spread around and orient users to the destination. In this paper, we initially present the system requirements, give the design details and study the viability of NFC Internal with a prototype application and a case study. Moreover, we evaluate the performance of the system and compare it with existing indoor navigation systems. It is seen that NFC Internal has considerable advantages and significant contributions to existing indoor navigation systems in terms of security and privacy, cost, performance, robustness, complexity, user preference and commercial availability. PMID:25825976

  10. NFC Internal: An Indoor Navigation System

    Directory of Open Access Journals (Sweden)

    Busra Ozdenizci

    2015-03-01

    Full Text Available Indoor navigation systems have recently become a popular research field due to the lack of GPS signals indoors. Several indoors navigation systems have already been proposed in order to eliminate deficiencies; however each of them has several technical and usability limitations. In this study, we propose NFC Internal, a Near Field Communication (NFC-based indoor navigation system, which enables users to navigate through a building or a complex by enabling a simple location update, simply by touching NFC tags those are spread around and orient users to the destination. In this paper, we initially present the system requirements, give the design details and study the viability of NFC Internal with a prototype application and a case study. Moreover, we evaluate the performance of the system and compare it with existing indoor navigation systems. It is seen that NFC Internal has considerable advantages and significant contributions to existing indoor navigation systems in terms of security and privacy, cost, performance, robustness, complexity, user preference and commercial availability.

  11. Defining the Synthetic Biology Supply Chain.

    Science.gov (United States)

    Frazar, Sarah L; Hund, Gretchen E; Bonheyo, George T; Diggans, James; Bartholomew, Rachel A; Gehrig, Lindsey; Greaves, Mark

    Several recent articles have described risks posed by synthetic biology and spurred vigorous discussion in the scientific, commercial, and government communities about how to best detect, prevent, regulate, and respond to these risks. The Pacific Northwest National Laboratory's (PNNL) deep experience working with dual-use technologies for the nuclear industry has shown that analysis of supply chains can reveal security vulnerabilities and ways to mitigate security risk without hindering beneficial research and commerce. In this article, a team of experts in synthetic biology, data analytics, and national security describe the overall supply chain surrounding synthetic biology to illustrate new insights about the effectiveness of current regulations, the possible need for different screening approaches, and new technical solutions that could help identify or mitigate risks in the synthetic biology supply chain.

  12. Natural - synthetic - artificial!

    DEFF Research Database (Denmark)

    Nielsen, Peter E

    2010-01-01

    The terms "natural," "synthetic" and "artificial" are discussed in relation to synthetic and artificial chromosomes and genomes, synthetic and artificial cells and artificial life.......The terms "natural," "synthetic" and "artificial" are discussed in relation to synthetic and artificial chromosomes and genomes, synthetic and artificial cells and artificial life....

  13. Synthetic Cannabinoids.

    Science.gov (United States)

    Mills, Brooke; Yepes, Andres; Nugent, Kenneth

    2015-07-01

    Synthetic cannabinoids (SCBs), also known under the brand names of "Spice," "K2," "herbal incense," "Cloud 9," "Mojo" and many others, are becoming a large public health concern due not only to their increasing use but also to their unpredictable toxicity and abuse potential. There are many types of SCBs, each having a unique binding affinity for cannabinoid receptors. Although both Δ-tetrahydrocannabinol (THC) and SCBs stimulate the same receptors, cannabinoid receptor 1 (CB1) and cannabinoid receptor 2 (CB2), studies have shown that SCBs are associated with higher rates of toxicity and hospital admissions than is natural cannabis. This is likely due to SCBs being direct agonists of the cannabinoid receptors, whereas THC is a partial agonist. Furthermore, the different chemical structures of SCBs found in Spice or K2 may interact in unpredictable ways to elicit previously unknown, and the commercial products may have unknown contaminants. The largest group of users is men in their 20s who participate in polydrug use. The most common reported toxicities with SCB use based on studies using Texas Poison Control records are tachycardia, agitation and irritability, drowsiness, hallucinations, delusions, hypertension, nausea, confusion, dizziness, vertigo and chest pain. Acute kidney injury has also been strongly associated with SCB use. Treatment mostly involves symptom management and supportive care. More research is needed to identify which contaminants are typically found in synthetic marijuana and to understand the interactions between different SBCs to better predict adverse health outcomes.

  14. Indoor wayfinding and navigation

    CERN Document Server

    2015-01-01

    Due to the widespread use of navigation systems for wayfinding and navigation in the outdoors, researchers have devoted their efforts in recent years to designing navigation systems that can be used indoors. This book is a comprehensive guide to designing and building indoor wayfinding and navigation systems. It covers all types of feasible sensors (for example, Wi-Fi, A-GPS), discussing the level of accuracy, the types of map data needed, the data sources, and the techniques for providing routes and directions within structures.

  15. Synthetic Brainbows

    KAUST Repository

    Wan, Y.

    2013-06-01

    Brainbow is a genetic engineering technique that randomly colorizes cells. Biological samples processed with this technique and imaged with confocal microscopy have distinctive colors for individual cells. Complex cellular structures can then be easily visualized. However, the complexity of the Brainbow technique limits its applications. In practice, most confocal microscopy scans use different florescence staining with typically at most three distinct cellular structures. These structures are often packed and obscure each other in rendered images making analysis difficult. In this paper, we leverage a process known as GPU framebuffer feedback loops to synthesize Brainbow-like images. In addition, we incorporate ID shuffing and Monte-Carlo sampling into our technique, so that it can be applied to single-channel confocal microscopy data. The synthesized Brainbow images are presented to domain experts with positive feedback. A user survey demonstrates that our synthetic Brainbow technique improves visualizations of volume data with complex structures for biologists.

  16. Synthetic Botany.

    Science.gov (United States)

    Boehm, Christian R; Pollak, Bernardo; Purswani, Nuri; Patron, Nicola; Haseloff, Jim

    2017-07-05

    Plants are attractive platforms for synthetic biology and metabolic engineering. Plants' modular and plastic body plans, capacity for photosynthesis, extensive secondary metabolism, and agronomic systems for large-scale production make them ideal targets for genetic reprogramming. However, efforts in this area have been constrained by slow growth, long life cycles, the requirement for specialized facilities, a paucity of efficient tools for genetic manipulation, and the complexity of multicellularity. There is a need for better experimental and theoretical frameworks to understand the way genetic networks, cellular populations, and tissue-wide physical processes interact at different scales. We highlight new approaches to the DNA-based manipulation of plants and the use of advanced quantitative imaging techniques in simple plant models such as Marchantia polymorpha. These offer the prospects of improved understanding of plant dynamics and new approaches to rational engineering of plant traits. Copyright © 2017 Cold Spring Harbor Laboratory Press; all rights reserved.

  17. 33 CFR 165.110 - Safety and Security Zone; Liquefied Natural Gas Carrier Transits and Anchorage Operations, Boston...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone... Limited Access Areas First Coast Guard District § 165.110 Safety and Security Zone; Liquefied Natural Gas.... The following areas are safety and security zones: (1) Vessels underway. All navigable waters of the...

  18. 33 CFR 165.169 - Safety and Security Zones: New York Marine Inspection Zone and Captain of the Port Zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: New... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas First Coast Guard District § 165.169 Safety and Security Zones: New York Marine Inspection Zone...

  19. 33 CFR 165.904 - Lake Michigan at Chicago Harbor & Burnham Park Harbor-Safety and Security Zone.

    Science.gov (United States)

    2010-07-01

    ... & Burnham Park Harbor-Safety and Security Zone. 165.904 Section 165.904 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.904 Lake Michigan at Chicago Harbor & Burnham Park Harbor—Safety and Security Zone...

  20. 33 CFR 165.502 - Safety and Security Zone; Cove Point Liquefied Natural Gas Terminal, Chesapeake Bay, Maryland.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone; Cove... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas Fifth Coast Guard District § 165.502 Safety and Security Zone; Cove Point Liquefied Natural Gas...

  1. 33 CFR 165.1321 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Protection of... Areas Thirteenth Coast Guard District § 165.1321 Security Zone; Protection of Military Cargo, Captain of... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY...

  2. 33 CFR 1.05-5 - Marine Safety and Security Council.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine Safety and Security Council, composed of senior Coast Guard officials, acts as policy advisor to the...

  3. A Leapfrog Navigation System

    Science.gov (United States)

    Opshaug, Guttorm Ringstad

    There are times and places where conventional navigation systems, such as the Global Positioning System (GPS), are unavailable due to anything from temporary signal occultations to lack of navigation system infrastructure altogether. The goal of the Leapfrog Navigation System (LNS) is to provide localized positioning services for such cases. The concept behind leapfrog navigation is to advance a group of navigation units teamwise into an area of interest. In a practical 2-D case, leapfrogging assumes known initial positions of at least two currently stationary navigation units. Two or more mobile units can then start to advance into the area of interest. The positions of the mobiles are constantly being calculated based on cross-range distance measurements to the stationary units, as well as cross-ranges among the mobiles themselves. At some point the mobile units stop, and the stationary units are released to move. This second team of units (now mobile) can then overtake the first team (now stationary) and travel even further towards the common goal of the group. Since there always is one stationary team, the position of any unit can be referenced back to the initial positions. Thus, LNS provides absolute positioning. I developed navigation algorithms needed to solve leapfrog positions based on cross-range measurements. I used statistical tools to predict how position errors would grow as a function of navigation unit geometry, cross-range measurement accuracy and previous position errors. Using this knowledge I predicted that a 4-unit Leapfrog Navigation System using 100 m baselines and 200 m leap distances could travel almost 15 km before accumulating absolute position errors of 10 m (1sigma). Finally, I built a prototype leapfrog navigation system using 4 GPS transceiver ranging units. I placed the 4 units in the vertices a 10m x 10m square, and leapfrogged the group 20 meters forwards, and then back again (40 m total travel). Average horizontal RMS position

  4. Synthetic Astrobiology

    Science.gov (United States)

    Rothschild, Lynn J.

    2017-01-01

    "Are we alone?" is one of the primary questions of astrobiology, and whose answer defines our significance in the universe. Unfortunately, this quest is hindered by the fact that we have only one confirmed example of life, that of earth. While this is enormously helpful in helping to define the minimum envelope for life, it strains credulity to imagine that life, if it arose multiple times, has not taken other routes. To help fill this gap, our lab has begun using synthetic biology - the design and construction of new biological parts and systems and the redesign of existing ones for useful purposes - as an enabling technology. One theme, the "Hell Cell" project, focuses on creating artificial extremophiles in order to push the limits for Earth life, and to understand how difficult it is for life to evolve into extreme niches. In another project, we are re-evolving biotic functions using only the most thermodynamically stable amino acids in order to understand potential capabilities of an early organism with a limited repertoire of amino acids.

  5. Synthetic aperture radar capabilities in development

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M. [Lawrence Livermore National Lab., CA (United States)

    1994-11-15

    The Imaging and Detection Program (IDP) within the Laser Program is currently developing an X-band Synthetic Aperture Radar (SAR) to support the Joint US/UK Radar Ocean Imaging Program. The radar system will be mounted in the program`s Airborne Experimental Test-Bed (AETB), where the initial mission is to image ocean surfaces and better understand the physics of low grazing angle backscatter. The Synthetic Aperture Radar presentation will discuss its overall functionality and a brief discussion on the AETB`s capabilities. Vital subsystems including radar, computer, navigation, antenna stabilization, and SAR focusing algorithms will be examined in more detail.

  6. 33 CFR 165.1190 - Security Zone; San Francisco Bay, Oakland Estuary, Alameda, CA.

    Science.gov (United States)

    2010-07-01

    ..., Oakland Estuary, Alameda, CA. 165.1190 Section 165.1190 Navigation and Navigable Waters COAST GUARD... § 165.1190 Security Zone; San Francisco Bay, Oakland Estuary, Alameda, CA. (a) Location. The following area is a security zone: All navigable waters of the Oakland Estuary, California, from the surface to...

  7. Getting Lost Through Navigation

    DEFF Research Database (Denmark)

    Debus, Michael S.

    2017-01-01

    In this presentation, I argued two things. First, that it is navigation that lies at the core of contemporary (3D-) videogames and that its analysis is of utmost importance. Second, that this analysis needs a more rigorous differentiation between specific acts of navigation. Considering the Oxford...... in videogames is a configurational rather than an interpretational one (Eskelinen 2001). Especially in the case of game spaces, navigation appears to be of importance (Wolf 2009; Flynn 2008). Further, it does not only play a crucial role for the games themselves, but also for the experience of the player...

  8. Inertial navigation without accelerometers

    Science.gov (United States)

    Boehm, M.

    The Kennedy-Thorndike (1932) experiment points to the feasibility of fiber-optic inertial velocimeters, to which state-of-the-art technology could furnish substantial sensitivity and accuracy improvements. Velocimeters of this type would obviate the use of both gyros and accelerometers, and allow inertial navigation to be conducted together with vehicle attitude control, through the derivation of rotation rates from the ratios of the three possible velocimeter pairs. An inertial navigator and reference system based on this approach would probably have both fewer components and simpler algorithms, due to the obviation of the first level of integration in classic inertial navigators.

  9. Semiotic resources for navigation

    DEFF Research Database (Denmark)

    Due, Brian Lystgaard; Lange, Simon Bierring

    2018-01-01

    This paper describes two typical semiotic resources blind people use when navigating in urban areas. Everyone makes use of a variety of interpretive semiotic resources and senses when navigating. For sighted individuals, this especially involves sight. Blind people, however, must rely on everything...... else than sight, thereby substituting sight with other modalities and distributing the navigational work to other semiotic resources. Based on a large corpus of fieldwork among blind people in Denmark, undertaking observations, interviews, and video recordings of their naturally occurring practices...... of walking and navigating, this paper shows how two prototypical types of semiotic resources function as helpful cognitive extensions: the guide dog and the white cane. This paper takes its theoretical and methodological perspective from EMCA multimodal interaction analysis....

  10. USACE Navigation Channels 2012

    Data.gov (United States)

    California Natural Resource Agency — This dataset represents both San Francisco and Los Angeles District navigation channel lines. All San Francisco District channel lines were digitized from CAD files...

  11. Visual Guided Navigation

    National Research Council Canada - National Science Library

    Banks, Martin

    1999-01-01

    .... Similarly, the problem of visual navigation is the recovery of an observer's self-motion with respect to the environment from the moving pattern of light reaching the eyes and the complex of extra...

  12. Tinnitus Patient Navigator

    Science.gov (United States)

    ... Cure About Us Initiatives News & Events Professional Resources Tinnitus Patient Navigator Want to get started on the ... unique and may require a different treatment workflow. Tinnitus Health-Care Providers If you, or someone you ...

  13. Biologically Inspired Waveform Diversity for Synthetic Autonomous Navigation Sensing

    Science.gov (United States)

    2009-11-01

    Pulse interval and repetition rate When searching for prey, bats often emit one pulse per wing beat . This is because the mechanics of flapping the...wings, breathing, and producing sound pulses are all coupled. Because of this coupling, the pulse repetition rate is often the same as wing beat ...give accurate measures of delay and hence range [26]. For determination of direction, the horizontal angle of a target is determined from binaural

  14. 33 CFR 165.1410 - Security Zones; Kauai, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Kauai, HI. 165..., HI. (a) Location. The following areas, from the surface of the water to the ocean floor, are security... Nawiliwili Harbor, Kauai, HI or within 3 nautical miles seaward of the Nawiliwili Harbor COLREGS DEMARCATION...

  15. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Science.gov (United States)

    2010-07-01

    ... evacuation routes and assembly stations; and (viii) Existing security and safety equipment for protection of... protection systems; (iv) Procedural policies; (v) Radio and telecommunication systems, including computer... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Security Assessment (FSA...

  16. Defining the Synthetic Biology Supply Chain

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; Hund, Gretchen E.; Bonheyo, George T.; Diggans, James; Bartholomew, Rachel A.; Gehrig, Lindsey; Greaves, Mark

    2017-08-01

    In this article, a team of experts in synthetic biology, data analytics, and national security describe the overall supply chain surrounding synthetic biology. The team analyzes selected interactions within that network to better understand the risks raised by synthetic biology and identifies opportunities for risk mitigation. To introduce the concept, the article will briefly describe how an understanding of supply chains has been important in promoting nuclear nonproliferation objectives. The article concludes by assessing the structure and networks identified in the supply chains to reveal potential opportunities for future biodefense research and development; options for additional information exchange; and means to interdict, detect, or deter suspicious activity.

  17. 33 CFR 165.1182 - Safety/Security Zone: San Francisco Bay, San Pablo Bay, Carquinez Strait, and Suisun Bay, CA.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: San... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas Eleventh Coast Guard District § 165.1182 Safety/Security Zone: San Francisco Bay, San Pablo Bay...

  18. 33 CFR 165.154 - Safety and Security Zones: Long Island Sound Marine Inspection Zone and Captain of the Port Zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: Long... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas First Coast Guard District § 165.154 Safety and Security Zones: Long Island Sound Marine...

  19. 33 CFR 165.T09-0073 - Safety and Security Zones; Tall Ships Challenge 2010; Great Lakes; Cleveland, OH; Bay City, MI...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Tall... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS... Guard District § 165.T09-0073 Safety and Security Zones; Tall Ships Challenge 2010; Great Lakes...

  20. Requirements for e-Navigation Architectures

    Directory of Open Access Journals (Sweden)

    Axel Hahn

    2016-12-01

    Full Text Available Technology is changing the way of navigation. New technologies for communication and navigation can be found on virtually every vessel. System architectures define structure and cooperation of components and subsystems. IMO, IALA, costal authorities, technology provider and many more actually propose new architectures for e-Navigation. This paper looks at other transportation domains and technical as normative requirements for e-Navigation architectures. With the aim of identifying possible synergies in the research, development, certification and standardization, this paper sets out to compare requirements and approaches of these two domains with respect to safety and security aspects. Since from an autonomy perspective, the automotive domain has started earlier and therefore has achieved a higher degree of technical progress, we will start with an overview of the developments in this domain. After that, the paper discusses the requirements on automation and assistance systems in the maritime domain and gives an overview of the developments into this direction within the maritime domain. This then allows us to compare developments in both domains and to derive recommendations for further developments in the maritime domain at the end of this paper.

  1. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Science.gov (United States)

    2010-07-01

    ... stores and industrial supplies. (a) General. The OCS facility owner or operator must ensure that security...). These additional security measures may include: (1) Intensifying inspection of the stores or industrial... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for delivery of...

  2. 33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.

    Science.gov (United States)

    2010-07-01

    ..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...

  3. 33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.

    Science.gov (United States)

    2010-07-01

    ... to: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of... substances and devices on structures and port services; (g) Port security requirements; (h) Port business... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD...

  4. 33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; St. Thomas, U.S....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas...

  5. Navigating in higher education

    DEFF Research Database (Denmark)

    Thingholm, Hanne Balsby; Reimer, David; Keiding, Tina Bering

    Denne rapport er skrevet på baggrund af spørgeskemaundersøgelsen – Navigating in Higher Education (NiHE) – der rummer besvarelser fra 1410 bachelorstuderende og 283 undervisere fordelt på ni uddannelser fra Aarhus Universitet: Uddannelsesvidenskab, Historie, Nordisk sprog og litteratur, Informati......Denne rapport er skrevet på baggrund af spørgeskemaundersøgelsen – Navigating in Higher Education (NiHE) – der rummer besvarelser fra 1410 bachelorstuderende og 283 undervisere fordelt på ni uddannelser fra Aarhus Universitet: Uddannelsesvidenskab, Historie, Nordisk sprog og litteratur...

  6. Navigating ‘riskscapes’

    DEFF Research Database (Denmark)

    Gee, Stephanie; Skovdal, Morten

    2017-01-01

    This paper draws on interview data to examine how international health care workers navigated risk during the unprecedented Ebola outbreak in West Africa. It identifies the importance of place in risk perception, including how different spatial localities give rise to different feelings of threat...... or safety, some from the construction of physical boundaries, and others mediated through aspects of social relations, such as trust, communication and team dynamics. Referring to these spatial localities as ‘riskscapes’, the paper calls for greater recognition of the role of place in understanding risk...... perception, and how people navigate risk....

  7. 33 CFR 165.552 - Security Zone; Oyster Creek Generation Station, Forked River, Ocean County, New Jersey.

    Science.gov (United States)

    2010-07-01

    ... Generation Station, Forked River, Ocean County, New Jersey. 165.552 Section 165.552 Navigation and Navigable... Coast Guard District § 165.552 Security Zone; Oyster Creek Generation Station, Forked River, Ocean... part. (2) No person or vessel may enter or navigate within this security zone unless authorized to do...

  8. 33 CFR 165.505 - Security Zone; Calvert Cliffs Nuclear Power Plant, Chesapeake Bay, Calvert County, Maryland.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Calvert Cliffs Nuclear Power Plant, Chesapeake Bay, Calvert County, Maryland. 165.505 Section 165.505 Navigation and... Areas Fifth Coast Guard District § 165.505 Security Zone; Calvert Cliffs Nuclear Power Plant, Chesapeake...

  9. 33 CFR 165.1313 - Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington

    Science.gov (United States)

    2010-07-01

    ... Areas Thirteenth Coast Guard District § 165.1313 Security zone regulations, tank ship protection, Puget... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington 165.1313 Section 165.1313 Navigation and...

  10. 33 CFR 165.1324 - Safety and Security Zone; Cruise Ship Protection, Elliott Bay and Pier-91, Seattle, Washington.

    Science.gov (United States)

    2010-07-01

    ... Areas Thirteenth Coast Guard District § 165.1324 Safety and Security Zone; Cruise Ship Protection... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone; Cruise Ship Protection, Elliott Bay and Pier-91, Seattle, Washington. 165.1324 Section 165.1324 Navigation and...

  11. Synthetic biology, inspired by synthetic chemistry.

    Science.gov (United States)

    Malinova, V; Nallani, M; Meier, W P; Sinner, E K

    2012-07-16

    The topic synthetic biology appears still as an 'empty basket to be filled'. However, there is already plenty of claims and visions, as well as convincing research strategies about the theme of synthetic biology. First of all, synthetic biology seems to be about the engineering of biology - about bottom-up and top-down approaches, compromising complexity versus stability of artificial architectures, relevant in biology. Synthetic biology accounts for heterogeneous approaches towards minimal and even artificial life, the engineering of biochemical pathways on the organismic level, the modelling of molecular processes and finally, the combination of synthetic with nature-derived materials and architectural concepts, such as a cellular membrane. Still, synthetic biology is a discipline, which embraces interdisciplinary attempts in order to have a profound, scientific base to enable the re-design of nature and to compose architectures and processes with man-made matter. We like to give an overview about the developments in the field of synthetic biology, regarding polymer-based analogs of cellular membranes and what questions can be answered by applying synthetic polymer science towards the smallest unit in life, namely a cell. Copyright © 2012 Federation of European Biochemical Societies. Published by Elsevier B.V. All rights reserved.

  12. 76 FR 2916 - Houston/Galveston Navigation Safety Advisory Committee; Meetings

    Science.gov (United States)

    2011-01-18

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-1116] Houston/Galveston Navigation Safety Advisory Committee; Meetings AGENCY: Coast Guard, DHS. ACTION: Notice of Meetings. SUMMARY: The Houston... will meet in Texas City, Texas and Houston, Texas to discuss waterway improvements, aids to navigation...

  13. 77 FR 62437 - Regulated Navigation Area; Columbus Day Weekend, Biscayne Bay, Miami, FL

    Science.gov (United States)

    2012-10-15

    ... Acronyms DHS Department of Homeland Security FR Federal Register NPRM Notice of Proposed Rulemaking RNA Regulated Navigation Area I. Regulatory History and Information On July 25, 2012, we published a Notice of... Bay Columbus Day regulated navigation area (RNA), established in 2011 and contained in 33 CFR 165.779...

  14. 78 FR 59237 - Regulated Navigation Area-Weymouth Fore River, Fore River Bridge Construction, Weymouth and...

    Science.gov (United States)

    2013-09-26

    ... regulatory action because this RNA will only be enforced when construction operations require such. Thus... establishing a temporary regulated navigation area (RNA) on the navigable waters of Weymouth Fore River in the...: Table of Acronyms COTP Captain of the Port DHS Department of Homeland Security FR Federal Register RNA...

  15. Evaluation of synthetic promoters in Physcomitrella patens

    DEFF Research Database (Denmark)

    Peramuna, Anantha; Bae, Hansol; Rasmussen, Erling Koch

    2018-01-01

    Securing a molecular toolbox including diverse promoters is essential for genome engineering. However, native promoters have limitations such as the available number or the length of the promoter. In this work, three short synthetic promoters were characterized by using the yellow fluorescent...

  16. Navigating on handheld displays: Dynamic versus Static Keyhole Navigation

    NARCIS (Netherlands)

    Mehra, S.; Werkhoven, P.; Worring, M.

    2006-01-01

    Handheld displays leave little space for the visualization and navigation of spatial layouts representing rich information spaces. The most common navigation method for handheld displays is static peephole navigation: The peephole is static and we move the spatial layout behind it (scrolling). A

  17. Improving Canada's Marine Navigation System through e-Navigation

    Directory of Open Access Journals (Sweden)

    Daniel Breton

    2016-06-01

    The conclusion proposed is that on-going work with key partners and stakeholders can be used as the primary mechanism to identify e-Navigation related innovation and needs, and to prioritize next steps. Moving forward in Canada, implementation of new e-navigation services will continue to be stakeholder driven, and used to drive improvements to Canada's marine navigation system.

  18. Inland Electronic Navigational Charts (IENC)

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — These Inland Electronic Navigational Charts (IENCs) were developed from available data used in maintenance of Navigation channels. Users of these IENCs should be...

  19. Navigating ECA-Zones

    DEFF Research Database (Denmark)

    Hansen, Carsten Ørts; Grønsedt, Peter; Hendriksen, Christian

    This report examines the effect that ECA-zone regulation has on the optimal vessel fuel strategies for compliance. The findings of this report are trifold, and this report is coupled with a calculation tool which is released to assist ship-owners in the ECA decision making. The first key insight...... much time their operated vessels navigate the ECA in the future....

  20. Plant synthetic biology.

    Science.gov (United States)

    Liu, Wusheng; Stewart, C Neal

    2015-05-01

    Plant synthetic biology is an emerging field that combines engineering principles with plant biology toward the design and production of new devices. This emerging field should play an important role in future agriculture for traditional crop improvement, but also in enabling novel bioproduction in plants. In this review we discuss the design cycles of synthetic biology as well as key engineering principles, genetic parts, and computational tools that can be utilized in plant synthetic biology. Some pioneering examples are offered as a demonstration of how synthetic biology can be used to modify plants for specific purposes. These include synthetic sensors, synthetic metabolic pathways, and synthetic genomes. We also speculate about the future of synthetic biology of plants. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. Synthetic Cathinones ("Bath Salts")

    Science.gov (United States)

    ... Alcohol Club Drugs Cocaine Fentanyl Hallucinogens Inhalants Heroin Marijuana MDMA (Ecstasy/Molly) Methamphetamine Opioids Over-the-Counter Medicines Prescription Medicines Steroids (Anabolic) Synthetic Cannabinoids (K2/Spice) Synthetic Cathinones (Bath Salts) Tobacco/ ...

  2. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  3. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  4. Strategies for navigating the healthcare credit market.

    Science.gov (United States)

    Wareham, T L

    2001-04-01

    Not-for-profit healthcare organizations are experiencing a tightened credit market due to financial stresses on the healthcare industry such as declining payments, effects of the Balanced Budget Act of 1997, and the shift to outpatient care. In the future, healthcare organizations wanting to access the capital market will be expected to preserve cash as an "insurance policy," offer greater security and stricter covenants, and report financial information on a quarterly basis. To meet these requirements and navigate today's tighter credit market, healthcare financial managers will need to focus on the organization's most reliably profitable areas of business, link strategic and financial issues, and carefully monitor the balance sheet.

  5. Control algorithms for autonomous robot navigation

    International Nuclear Information System (INIS)

    Jorgensen, C.C.

    1985-01-01

    This paper examines control algorithm requirements for autonomous robot navigation outside laboratory environments. Three aspects of navigation are considered: navigation control in explored terrain, environment interactions with robot sensors, and navigation control in unanticipated situations. Major navigation methods are presented and relevance of traditional human learning theory is discussed. A new navigation technique linking graph theory and incidental learning is introduced

  6. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  7. Mobile Robot Navigation

    DEFF Research Database (Denmark)

    Andersen, Jens Christian

    2007-01-01

    the current position to a desired destination. This thesis presents and experimentally validates solutions for road classification, obstacle avoidance and mission execution. The road classification is based on laser scanner measurements and supported at longer ranges by vision. The road classification...... is sufficiently sensitive to separate the road from flat roadsides, and to distinguish asphalt roads from gravelled roads. The vision-based road detection uses a combination of chromaticity and edge detection to outline the traversable part of the road based on a laser scanner classified sample area....... The perception of these two sensors are utilised by a path planner to allow a number of drive modes, and especially the ability to follow road edges are investigated. The navigation mission is controlled by a script language. The navigation script controls route sequencing, junction detection, junction crossing...

  8. 33 CFR 165.731 - Safety/Security Zone: Cumberland Sound, Georgia and St. Marys River Entrance Channel.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: Cumberland... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED... Seventh Coast Guard District § 165.731 Safety/Security Zone: Cumberland Sound, Georgia and St. Marys River...

  9. 76 FR 70350 - West Oahu Offshore Security Zone

    Science.gov (United States)

    2011-11-14

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1048] RIN 1625-AA87 West Oahu Offshore Security Zone AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone on the navigable waters of Oahu's western...

  10. Social Influence for Security

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2014-08-01

    Full Text Available The main aim of this work marks the reveling of scientific premises intended to structure the issue of social influence for security. The approach has as aim the identification of those elements that define and characterize the social influence in order to manage conflict, from the perspective of public communication. The proposed approach establishes some synthetic, clear boundaries through the method of research and analysis of the concept of security, social influence, revealing the specifics of public communication in conflict management.

  11. Evolvable synthetic neural system

    Science.gov (United States)

    Curtis, Steven A. (Inventor)

    2009-01-01

    An evolvable synthetic neural system includes an evolvable neural interface operably coupled to at least one neural basis function. Each neural basis function includes an evolvable neural interface operably coupled to a heuristic neural system to perform high-level functions and an autonomic neural system to perform low-level functions. In some embodiments, the evolvable synthetic neural system is operably coupled to one or more evolvable synthetic neural systems in a hierarchy.

  12. [From synthetic biology to synthetic humankind].

    Science.gov (United States)

    Nouvel, Pascal

    2015-01-01

    In this paper, we propose an historical survey of the expression "synthetic biology" in order to identify its main philosophical components. The result of the analysis is then used to investigate the meaning of the notion of "synthetic man". It is shown that both notions share a common philosophical background that can be summed up by the short but meaningful assertion: "biology is technology". The analysis allows us to distinguish two notions that are often confused in transhumanist literature: the notion of synthetic man and the notion of renewed man. The consequences of this crucial distinction are discussed. Copyright © 2015 Académie des sciences. Published by Elsevier SAS. All rights reserved.

  13. Indoor navigation by image recognition

    Science.gov (United States)

    Choi, Io Teng; Leong, Chi Chong; Hong, Ka Wo; Pun, Chi-Man

    2017-07-01

    With the progress of smartphones hardware, it is simple on smartphone using image recognition technique such as face detection. In addition, indoor navigation system development is much slower than outdoor navigation system. Hence, this research proves a usage of image recognition technique for navigation in indoor environment. In this paper, we introduced an indoor navigation application that uses the indoor environment features to locate user's location and a route calculating algorithm to generate an appropriate path for user. The application is implemented on Android smartphone rather than iPhone. Yet, the application design can also be applied on iOS because the design is implemented without using special features only for Android. We found that digital navigation system provides better and clearer location information than paper map. Also, the indoor environment is ideal for Image recognition processing. Hence, the results motivate us to design an indoor navigation system using image recognition.

  14. China Satellite Navigation Conference

    CERN Document Server

    Liu, Jingnan; Fan, Shiwei; Wang, Feixue

    2016-01-01

    These Proceedings present selected research papers from CSNC2016, held during 18th-20th May in Changsha, China. The theme of CSNC2016 is Smart Sensing, Smart Perception. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou System (BDS) especially. They are divided into 12 topics to match the corresponding sessions in CSNC2016, which broadly covered key topics in GNSS. Readers can learn about the BDS and keep abreast of the latest advances in GNSS techniques and applications.

  15. China Satellite Navigation Conference

    CERN Document Server

    Liu, Jingnan; Yang, Yuanxi; Fan, Shiwei; Yu, Wenxian

    2017-01-01

    These proceedings present selected research papers from CSNC2017, held during 23th-25th May in Shanghai, China. The theme of CSNC2017 is Positioning, Connecting All. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou System (BDS) especially. They are divided into 12 topics to match the corresponding sessions in CSNC2017, which broadly covered key topics in GNSS. Readers can learn about the BDS and keep abreast of the latest advances in GNSS techniques and applications.

  16. Understanding satellite navigation

    CERN Document Server

    Acharya, Rajat

    2014-01-01

    This book explains the basic principles of satellite navigation technology with the bare minimum of mathematics and without complex equations. It helps you to conceptualize the underlying theory from first principles, building up your knowledge gradually using practical demonstrations and worked examples. A full range of MATLAB simulations is used to visualize concepts and solve problems, allowing you to see what happens to signals and systems with different configurations. Implementation and applications are discussed, along with some special topics such as Kalman Filter and Ionosphere. W

  17. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  18. Multitarget Approaches to Robust Navigation

    Data.gov (United States)

    National Aeronautics and Space Administration — The performance, stability, and statistical consistency of a vehicle's navigation algorithm are vitally important to the success and safety of its mission....

  19. Advancements in Optical Navigation Capabilities

    Data.gov (United States)

    National Aeronautics and Space Administration — The Goddard Image Analysis and Navigation Tool (GIANT) is a tool that was developed for the Origins, Spectral Interpretation, Resource Identification,...

  20. Learning for Autonomous Navigation

    Science.gov (United States)

    Angelova, Anelia; Howard, Andrew; Matthies, Larry; Tang, Benyang; Turmon, Michael; Mjolsness, Eric

    2005-01-01

    Robotic ground vehicles for outdoor applications have achieved some remarkable successes, notably in autonomous highway following (Dickmanns, 1987), planetary exploration (1), and off-road navigation on Earth (1). Nevertheless, major challenges remain to enable reliable, high-speed, autonomous navigation in a wide variety of complex, off-road terrain. 3-D perception of terrain geometry with imaging range sensors is the mainstay of off-road driving systems. However, the stopping distance at high speed exceeds the effective lookahead distance of existing range sensors. Prospects for extending the range of 3-D sensors is strongly limited by sensor physics, eye safety of lasers, and related issues. Range sensor limitations also allow vehicles to enter large cul-de-sacs even at low speed, leading to long detours. Moreover, sensing only terrain geometry fails to reveal mechanical properties of terrain that are critical to assessing its traversability, such as potential for slippage, sinkage, and the degree of compliance of potential obstacles. Rovers in the Mars Exploration Rover (MER) mission have got stuck in sand dunes and experienced significant downhill slippage in the vicinity of large rock hazards. Earth-based off-road robots today have very limited ability to discriminate traversable vegetation from non-traversable vegetation or rough ground. It is impossible today to preprogram a system with knowledge of these properties for all types of terrain and weather conditions that might be encountered.

  1. Designing synthetic biology.

    Science.gov (United States)

    Agapakis, Christina M

    2014-03-21

    Synthetic biology is frequently defined as the application of engineering design principles to biology. Such principles are intended to streamline the practice of biological engineering, to shorten the time required to design, build, and test synthetic gene networks. This streamlining of iterative design cycles can facilitate the future construction of biological systems for a range of applications in the production of fuels, foods, materials, and medicines. The promise of these potential applications as well as the emphasis on design has prompted critical reflection on synthetic biology from design theorists and practicing designers from many fields, who can bring valuable perspectives to the discipline. While interdisciplinary connections between biologists and engineers have built synthetic biology via the science and the technology of biology, interdisciplinary collaboration with artists, designers, and social theorists can provide insight on the connections between technology and society. Such collaborations can open up new avenues and new principles for research and design, as well as shed new light on the challenging context-dependence-both biological and social-that face living technologies at many scales. This review is inspired by the session titled "Design and Synthetic Biology: Connecting People and Technology" at Synthetic Biology 6.0 and covers a range of literature on design practice in synthetic biology and beyond. Critical engagement with how design is used to shape the discipline opens up new possibilities for how we might design the future of synthetic biology.

  2. Interactive navigation-guided ophthalmic plastic surgery: navigation enabling of telescopes and their use in endoscopic lacrimal surgeries

    Directory of Open Access Journals (Sweden)

    Ali MJ

    2016-11-01

    Full Text Available Mohammad Javed Ali,1 Swati Singh,1 Milind N Naik,1 Swathi Kaliki,2 Tarjani Vivek Dave1 1The Institute of Dacryology, 2The Operation Eyesight Universal Institute for Eye Cancer, L.V. Prasad Eye Institute, Hyderabad, India Purpose: The aims of this study were to report the preliminary experience of using telescopes, which were enabled for navigation guidance, and their utility in complex endoscopic lacrimal surgeries. Methods: Navigation enabling of the telescope was achieved by using the AxiEM™ malleable neuronavigation shunt stylet. Image-guided dacryolocalization was performed in five patients using the intraoperative image-guided StealthStation™ system in the electromagnetic mode. The “look ahead” protocol software was used to assist the surgeon in assessing the intraoperative geometric location of the endoscope and what lies ahead in real time. All patients underwent navigation-guided powered endoscopic dacryocystorhinostomy. The utility of uninterrupted navigation guidance throughout the surgery with the endoscope as the navigating tool was noted. Results: Intraoperative geometric localization of the lacrimal sac and the nasolacrimal duct could be easily deciphered. Constant orientation of the lacrimal drainage system and the peri-lacrimal anatomy was possible without the need for repeated point localizations throughout the surgery. The “look ahead” features could accurately alert the surgeon of anatomical structures that exists at 5, 10 and 15 mm in front of the endoscope. Good securing of the shunt stylet with the telescope was found to be essential for constant and accurate navigation. Conclusion: Navigation-enabled endoscopes provide the surgeon with the advantage of sustained stereotactic anatomical awareness at all times during the surgery. Keywords: telescope, endoscope, image guidance, navigation, lacrimal surgery, powered endoscopic DCR

  3. 33 CFR 165.554 - Security Zone; Three Mile Island Generating Station, Susquehanna River, Dauphin County...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Three Mile Island... Areas Fifth Coast Guard District § 165.554 Security Zone; Three Mile Island Generating Station... waters of the Susquehanna River in the vicinity of the Three Mile Island Generating Station bounded by a...

  4. 33 CFR 125.11 - Form of Coast Guard Port Security Card.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Form of Coast Guard Port Security... WATERFRONT FACILITIES OR VESSELS § 125.11 Form of Coast Guard Port Security Card. The Coast Guard Port... data. ...

  5. 33 CFR 165.813 - Security Zones; Ports of Houston and Galveston, TX.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Ports of Houston... Security Zones; Ports of Houston and Galveston, TX. (a) Location. Within the Ports of Houston and Galveston... yards of a cruise ship unless expressly authorized by the Coast Guard Captain of the Port Houston...

  6. 33 CFR 165.814 - Security Zones; Captain of the Port Houston-Galveston Zone.

    Science.gov (United States)

    2010-07-01

    ... Port Houston-Galveston Zone. 165.814 Section 165.814 Navigation and Navigable Waters COAST GUARD... § 165.814 Security Zones; Captain of the Port Houston-Galveston Zone. (a) Location. The following areas are designated as security zones: (1) Houston, Texas. The Houston Ship Channel and all associated...

  7. 33 CFR 165.709 - Security Zone; Charleston Harbor, Cooper River, South Carolina.

    Science.gov (United States)

    2010-07-01

    ..., Cooper River, South Carolina. 165.709 Section 165.709 Navigation and Navigable Waters COAST GUARD... § 165.709 Security Zone; Charleston Harbor, Cooper River, South Carolina. (a) Regulated area. The Coast Guard is establishing a fixed security zone on all waters of the Cooper River, bank-to-bank and surface...

  8. Intelligent personal navigator supported by knowledge-based systems for estimating dead reckoning navigation parameters

    Science.gov (United States)

    Moafipoor, Shahram

    Personal navigators (PN) have been studied for about a decade in different fields and applications, such as safety and rescue operations, security and emergency services, and police and military applications. The common goal of all these applications is to provide precise and reliable position, velocity, and heading information of each individual in various environments. In the PN system developed in this dissertation, the underlying assumption is that the system does not require pre-existing infrastructure to enable pedestrian navigation. To facilitate this capability, a multisensor system concept, based on the Global Positioning System (GPS), inertial navigation, barometer, magnetometer, and a human pedometry model has been developed. An important aspect of this design is to use the human body as navigation sensor to facilitate Dead Reckoning (DR) navigation in GPS-challenged environments. The system is designed predominantly for outdoor environments, where occasional loss of GPS lock may happen; however, testing and performance demonstration have been extended to indoor environments. DR navigation is based on a relative-measurement approach, with the key idea of integrating the incremental motion information in the form of step direction (SD) and step length (SL) over time. The foundation of the intelligent navigation system concept proposed here rests in exploiting the human locomotion pattern, as well as change of locomotion in varying environments. In this context, the term intelligent navigation represents the transition from the conventional point-to-point DR to dynamic navigation using the knowledge about the mechanism of the moving person. This approach increasingly relies on integrating knowledge-based systems (KBS) and artificial intelligence (AI) methodologies, including artificial neural networks (ANN) and fuzzy logic (FL). In addition, a general framework of the quality control for the real-time validation of the DR processing is proposed, based on a

  9. 46 CFR 24.15-5 - Canadian pleasure craft temporarily using navigable waters of the United States.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Canadian pleasure craft temporarily using navigable... SECURITY UNINSPECTED VESSELS GENERAL PROVISIONS Equivalents § 24.15-5 Canadian pleasure craft temporarily using navigable waters of the United States. Uninspected Canadian pleasure craft (uninspected vessels...

  10. Navigation integrity monitoring and obstacle detection for enhanced-vision systems

    Science.gov (United States)

    Korn, Bernd; Doehler, Hans-Ullrich; Hecker, Peter

    2001-08-01

    Typically, Enhanced Vision (EV) systems consist of two main parts, sensor vision and synthetic vision. Synthetic vision usually generates a virtual out-the-window view using databases and accurate navigation data, e. g. provided by differential GPS (DGPS). The reliability of the synthetic vision highly depends on both, the accuracy of the used database and the integrity of the navigation data. But especially in GPS based systems, the integrity of the navigation can't be guaranteed. Furthermore, only objects that are stored in the database can be displayed to the pilot. Consequently, unexpected obstacles are invisible and this might cause severe problems. Therefore, additional information has to be extracted from sensor data to overcome these problems. In particular, the sensor data analysis has to identify obstacles and has to monitor the integrity of databases and navigation. Furthermore, if a lack of integrity arises, navigation data, e.g. the relative position of runway and aircraft, has to be extracted directly from the sensor data. The main contribution of this paper is about the realization of these three sensor data analysis tasks within our EV system, which uses the HiVision 35 GHz MMW radar of EADS, Ulm as the primary EV sensor. For the integrity monitoring, objects extracted from radar images are registered with both database objects and objects (e. g. other aircrafts) transmitted via data link. This results in a classification into known and unknown radar image objects and consequently, in a validation of the integrity of database and navigation. Furthermore, special runway structures are searched for in the radar image where they should appear. The outcome of this runway check contributes to the integrity analysis, too. Concurrent to this investigation a radar image based navigation is performed without using neither precision navigation nor detailed database information to determine the aircraft's position relative to the runway. The performance of our

  11. The Attack Navigator (Invited)

    NARCIS (Netherlands)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter; Mauw, Sjouke; Kordy, Barbara; Jajodia, Sushil

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and develop-ment speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are

  12. Dynamic Transportation Navigation

    Science.gov (United States)

    Meng, Xiaofeng; Chen, Jidong

    Miniaturization of computing devices, and advances in wireless communication and sensor technology are some of the forces that are propagating computing from the stationary desktop to the mobile outdoors. Some important classes of new applications that will be enabled by this revolutionary development include intelligent traffic management, location-based services, tourist services, mobile electronic commerce, and digital battlefield. Some existing application classes that will benefit from the development include transportation and air traffic control, weather forecasting, emergency response, mobile resource management, and mobile workforce. Location management, i.e., the management of transient location information, is an enabling technology for all these applications. In this chapter, we present the applications of moving objects management and their functionalities, in particular, the application of dynamic traffic navigation, which is a challenge due to the highly variable traffic state and the requirement of fast, on-line computations.

  13. Sensory bases of navigation.

    Science.gov (United States)

    Gould, J L

    1998-10-08

    Navigating animals need to know both the bearing of their goal (the 'map' step), and how to determine that direction (the 'compass' step). Compasses are typically arranged in hierarchies, with magnetic backup as a last resort when celestial information is unavailable. Magnetic information is often essential to calibrating celestial cues, though, and repeated recalibration between celestial and magnetic compasses is important in many species. Most magnetic compasses are based on magnetite crystals, but others make use of induction or paramagnetic interactions between short-wavelength light and visual pigments. Though odors may be used in some cases, most if not all long-range maps probably depend on magnetite. Magnetitebased map senses are used to measure only latitude in some species, but provide the distance and direction of the goal in others.

  14. Comprehension of Navigation Directions

    Science.gov (United States)

    Schneider, Vivian I.; Healy, Alice F.

    2000-01-01

    In an experiment simulating communication between air traffic controllers and pilots, subjects were given navigation instructions varying in length telling them to move in a space represented by grids on a computer screen. The subjects followed the instructions by clicking on the grids in the locations specified. Half of the subjects read the instructions, and half heard them. Half of the subjects in each modality condition repeated back the instructions before following them,and half did not. Performance was worse for the visual than for the auditory modality on the longer messages. Repetition of the instructions generally depressed performance, especially with the longer messages, which required more output than did the shorter messages, and especially with the visual modality, in which phonological recoding from the visual input to the spoken output was necessary. These results are explained in terms of the degrading effects of output interference on memory for instructions.

  15. Synthetic Defects for Vibrothermography

    Science.gov (United States)

    Renshaw, Jeremy; Holland, Stephen D.; Thompson, R. Bruce; Eisenmann, David J.

    2010-02-01

    Synthetic defects are an important tool used for characterizing the performance of nondestructive evaluation techniques. Viscous material-filled synthetic defects were developed for use in vibrothermography (also known as sonic IR) as a tool to improve inspection accuracy and reliability. This paper describes how the heat-generation response of these VMF synthetic defects is similar to the response of real defects. It also shows how VMF defects can be applied to improve inspection accuracy for complex industrial parts and presents a study of their application in an aircraft engine stator vane.

  16. Synthetic biological networks

    International Nuclear Information System (INIS)

    Archer, Eric; Süel, Gürol M

    2013-01-01

    Despite their obvious relationship and overlap, the field of physics is blessed with many insightful laws, while such laws are sadly absent in biology. Here we aim to discuss how the rise of a more recent field known as synthetic biology may allow us to more directly test hypotheses regarding the possible design principles of natural biological networks and systems. In particular, this review focuses on synthetic gene regulatory networks engineered to perform specific functions or exhibit particular dynamic behaviors. Advances in synthetic biology may set the stage to uncover the relationship of potential biological principles to those developed in physics. (review article)

  17. Synthetic vision systems: operational considerations simulation experiment

    Science.gov (United States)

    Kramer, Lynda J.; Williams, Steven P.; Bailey, Randall E.; Glaab, Louis J.

    2007-04-01

    Synthetic vision is a computer-generated image of the external scene topography that is generated from aircraft attitude, high-precision navigation information, and data of the terrain, obstacles, cultural features, and other required flight information. A synthetic vision system (SVS) enhances this basic functionality with real-time integrity to ensure the validity of the databases, perform obstacle detection and independent navigation accuracy verification, and provide traffic surveillance. Over the last five years, NASA and its industry partners have developed and deployed SVS technologies for commercial, business, and general aviation aircraft which have been shown to provide significant improvements in terrain awareness and reductions in the potential for Controlled-Flight-Into-Terrain incidents / accidents compared to current generation cockpit technologies. It has been hypothesized that SVS displays can greatly improve the safety and operational flexibility of flight in Instrument Meteorological Conditions (IMC) to a level comparable to clear-day Visual Meteorological Conditions (VMC), regardless of actual weather conditions or time of day. An experiment was conducted to evaluate SVS and SVS-related technologies as well as the influence of where the information is provided to the pilot (e.g., on a Head-Up or Head-Down Display) for consideration in defining landing minima based upon aircraft and airport equipage. The "operational considerations" evaluated under this effort included reduced visibility, decision altitudes, and airport equipage requirements, such as approach lighting systems, for SVS-equipped aircraft. Subjective results from the present study suggest that synthetic vision imagery on both head-up and head-down displays may offer benefits in situation awareness; workload; and approach and landing performance in the visibility levels, approach lighting systems, and decision altitudes tested.

  18. Synthetic Vision Systems - Operational Considerations Simulation Experiment

    Science.gov (United States)

    Kramer, Lynda J.; Williams, Steven P.; Bailey, Randall E.; Glaab, Louis J.

    2007-01-01

    Synthetic vision is a computer-generated image of the external scene topography that is generated from aircraft attitude, high-precision navigation information, and data of the terrain, obstacles, cultural features, and other required flight information. A synthetic vision system (SVS) enhances this basic functionality with real-time integrity to ensure the validity of the databases, perform obstacle detection and independent navigation accuracy verification, and provide traffic surveillance. Over the last five years, NASA and its industry partners have developed and deployed SVS technologies for commercial, business, and general aviation aircraft which have been shown to provide significant improvements in terrain awareness and reductions in the potential for Controlled-Flight-Into-Terrain incidents/accidents compared to current generation cockpit technologies. It has been hypothesized that SVS displays can greatly improve the safety and operational flexibility of flight in Instrument Meteorological Conditions (IMC) to a level comparable to clear-day Visual Meteorological Conditions (VMC), regardless of actual weather conditions or time of day. An experiment was conducted to evaluate SVS and SVS-related technologies as well as the influence of where the information is provided to the pilot (e.g., on a Head-Up or Head-Down Display) for consideration in defining landing minima based upon aircraft and airport equipage. The "operational considerations" evaluated under this effort included reduced visibility, decision altitudes, and airport equipage requirements, such as approach lighting systems, for SVS-equipped aircraft. Subjective results from the present study suggest that synthetic vision imagery on both head-up and head-down displays may offer benefits in situation awareness; workload; and approach and landing performance in the visibility levels, approach lighting systems, and decision altitudes tested.

  19. WISB: Warwick Integrative Synthetic Biology Centre.

    Science.gov (United States)

    McCarthy, John

    2016-06-15

    Synthetic biology promises to create high-impact solutions to challenges in the areas of biotechnology, human/animal health, the environment, energy, materials and food security. Equally, synthetic biologists create tools and strategies that have the potential to help us answer important fundamental questions in biology. Warwick Integrative Synthetic Biology (WISB) pursues both of these mutually complementary 'build to apply' and 'build to understand' approaches. This is reflected in our research structure, in which a core theme on predictive biosystems engineering develops underpinning understanding as well as next-generation experimental/theoretical tools, and these are then incorporated into three applied themes in which we engineer biosynthetic pathways, microbial communities and microbial effector systems in plants. WISB takes a comprehensive approach to training, education and outreach. For example, WISB is a partner in the EPSRC/BBSRC-funded U.K. Doctoral Training Centre in synthetic biology, we have developed a new undergraduate module in the subject, and we have established five WISB Research Career Development Fellowships to support young group leaders. Research in Ethical, Legal and Societal Aspects (ELSA) of synthetic biology is embedded in our centre activities. WISB has been highly proactive in building an international research and training network that includes partners in Barcelona, Boston, Copenhagen, Madrid, Marburg, São Paulo, Tartu and Valencia. © 2016 The Author(s).

  20. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  1. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  2. Toward Functional Augmented Reality in Marine Navigation : A Cognitive Work Analysis

    NARCIS (Netherlands)

    Procee, S.; Borst, C.; van Paassen, M.M.; Mulder, M.; Bertram, V.

    2017-01-01

    Augmented Reality, (AR) also known as vision-overlay, can help the navigator to visually detect a dangerous target by the overlay of a synthetic image, thus providing a visual cue over the real world. This is the first paper of a series about the practicalities and consequences of implementing AR in

  3. Models for synthetic biology.

    Science.gov (United States)

    Kaznessis, Yiannis N

    2007-11-06

    Synthetic biological engineering is emerging from biology as a distinct discipline based on quantification. The technologies propelling synthetic biology are not new, nor is the concept of designing novel biological molecules. What is new is the emphasis on system behavior. The objective is the design and construction of new biological devices and systems to deliver useful applications. Numerous synthetic gene circuits have been created in the past decade, including bistable switches, oscillators, and logic gates, and possible applications abound, including biofuels, detectors for biochemical and chemical weapons, disease diagnosis, and gene therapies. More than fifty years after the discovery of the molecular structure of DNA, molecular biology is mature enough for real quantification that is useful for biological engineering applications, similar to the revolution in modeling in chemistry in the 1950s. With the excitement that synthetic biology is generating, the engineering and biological science communities appear remarkably willing to cross disciplinary boundaries toward a common goal.

  4. Technical Assessment: Synthetic Biology

    Science.gov (United States)

    2015-01-01

    Pfizer, Bausch & Lomb, Coca - Cola , and other Fortune 500 companies 8 Data estimated by the... financial prize for ideas to drive forward the production of a sensor relying on synthetic organisms that can detect exposure to 500 specific chemicals

  5. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  6. Lunar Navigation Architecture Design Considerations

    Science.gov (United States)

    D'Souza, Christopher; Getchius, Joel; Holt, Greg; Moreau, Michael

    2009-01-01

    The NASA Constellation Program is aiming to establish a long-term presence on the lunar surface. The Constellation elements (Orion, Altair, Earth Departure Stage, and Ares launch vehicles) will require a lunar navigation architecture for navigation state updates during lunar-class missions. Orion in particular has baselined earth-based ground direct tracking as the primary source for much of its absolute navigation needs. However, due to the uncertainty in the lunar navigation architecture, the Orion program has had to make certain assumptions on the capabilities of such architectures in order to adequately scale the vehicle design trade space. The following paper outlines lunar navigation requirements, the Orion program assumptions, and the impacts of these assumptions to the lunar navigation architecture design. The selection of potential sites was based upon geometric baselines, logistical feasibility, redundancy, and abort support capability. Simulated navigation covariances mapped to entry interface flightpath- angle uncertainties were used to evaluate knowledge errors. A minimum ground station architecture was identified consisting of Goldstone, Madrid, Canberra, Santiago, Hartebeeshoek, Dongora, Hawaii, Guam, and Ascension Island (or the geometric equivalent).

  7. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  8. Economic Efficiency of Establishing Domestic Production of Synthetic Liquid Fuel

    Directory of Open Access Journals (Sweden)

    Kyzym Mykola O.

    2017-06-01

    Full Text Available The article notes a stable tendency to increasing the oil dependence of Ukraine, which creates a threat to the national economic security, and proves an expediency of establishing domestic production of synthetic liquid fuel. The technical, organizational and economic features of establishing synthetic liquid fuel production in Ukraine are presented. There proved a hypothesis on the expediency of organizing the production of synthetic liquid fuels based on steam-plasma coal gasification technology. The forecast resource cycle of the country until 2020 under conditions of developing this technology is modeled.

  9. Monitoring Completed Navigation Projects Program

    National Research Council Canada - National Science Library

    Bottin, Jr., Robert R

    2001-01-01

    ... (MCNP) Program. The program was formerly known as the Monitoring Completed Coastal Projects Program, but was modified in the late 1990s to include all navigation projects, inland as well as coastal...

  10. NOAA Electronic Navigational Charts (ENC)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Office of Coast Survey (OCS) has been involved in the development of a NOAA Electronic Navigational Chart (NOAA ENC) suite to support the marine transportation...

  11. Navigating "Assisted Dying".

    Science.gov (United States)

    Schipper, Harvey

    2016-02-01

    Carter is a bellwether decision, an adjudication on a narrow point of law whose implications are vast across society, and whose impact may not be realized for years. Coupled with Quebec's Act Respecting End-of-life Care it has sharply changed the legal landscape with respect to actively ending a person's life. "Medically assisted dying" will be permitted under circumstances, and through processes, which have yet to be operationally defined. This decision carries with it moral assumptions, which mean that it will be difficult to reach a unifying consensus. For some, the decision and Act reflect a modern acknowledgement of individual autonomy. For others, allowing such acts is morally unspeakable. Having opened the Pandora's Box, the question becomes one of navigating a tolerable societal path. I believe it is possible to achieve a workable solution based on the core principle that "medically assisted dying" should be a very rarely employed last option, subject to transparent ongoing review, specifically as to why it was deemed necessary. My analysis is based on 1. The societal conditions in which have fostered demand for "assisted dying", 2. Actions in other jurisdictions, 3. Carter and Quebec Bill 52, 4. Political considerations, 5. Current medical practice. Leading to a series of recommendations regarding. 1. Legislation and regulation, 2. The role of professional regulatory agencies, 3. Medical professions education and practice, 4. Public education, 5. Health care delivery and palliative care. Given the burden of public opinion, and the legal steps already taken, a process for assisted-dying is required. However, those legal and regulatory steps should only be considered a necessary and defensive first step in a two stage process. The larger goal, the second step, is to drive the improvement of care, and thus minimize assisted-dying.

  12. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  13. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  14. 33 CFR 165.103 - Safety and Security Zones; LPG Vessel Transits in Portland, Maine, Captain of the Port Zone...

    Science.gov (United States)

    2010-07-01

    ... within a 500-yard radius of any Liquefied Petroleum Gas (LPG) vessel while it is moored at the LPG... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; LPG... and Security Zones; LPG Vessel Transits in Portland, Maine, Captain of the Port Zone, Portsmouth...

  15. 33 CFR 165.553 - Security Zone; Salem and Hope Creek Generation Stations, Delaware River, Salem County, New Jersey.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Salem and Hope... Limited Access Areas Fifth Coast Guard District § 165.553 Security Zone; Salem and Hope Creek Generation...: the waters of the Delaware River in the vicinity of the Salem and Hope Creek Generation Stations...

  16. Compact autonomous navigation system (CANS)

    Science.gov (United States)

    Hao, Y. C.; Ying, L.; Xiong, K.; Cheng, H. Y.; Qiao, G. D.

    2017-11-01

    Autonomous navigation of Satellite and constellation has series of benefits, such as to reduce operation cost and ground station workload, to avoid the event of crises of war and natural disaster, to increase spacecraft autonomy, and so on. Autonomous navigation satellite is independent of ground station support. Many systems are developed for autonomous navigation of satellite in the past 20 years. Along them American MANS (Microcosm Autonomous Navigation System) [1] of Microcosm Inc. and ERADS [2] [3] (Earth Reference Attitude Determination System) of Honeywell Inc. are well known. The systems anticipate a series of good features of autonomous navigation and aim low cost, integrated structure, low power consumption and compact layout. The ERADS is an integrated small 3-axis attitude sensor system with low cost and small volume. It has the Earth center measurement accuracy higher than the common IR sensor because the detected ultraviolet radiation zone of the atmosphere has a brightness gradient larger than that of the IR zone. But the ERADS is still a complex system because it has to eliminate many problems such as making of the sapphire sphere lens, birefringence effect of sapphire, high precision image transfer optical fiber flattener, ultraviolet intensifier noise, and so on. The marginal sphere FOV of the sphere lens of the ERADS is used to star imaging that may be bring some disadvantages., i.e. , the image energy and attitude measurements accuracy may be reduced due to the tilt image acceptance end of the fiber flattener in the FOV. Besides Japan, Germany and Russia developed visible earth sensor for GEO [4] [5]. Do we have a way to develop a cheaper/easier and more accurate autonomous navigation system that can be used to all LEO spacecraft, especially, to LEO small and micro satellites? To return this problem we provide a new type of the system—CANS (Compact Autonomous Navigation System) [6].

  17. Cognitive mapping based on synthetic vision?

    Science.gov (United States)

    Helmetag, Arnd; Halbig, Christian; Kubbat, Wolfgang; Schmidt, Rainer

    1999-07-01

    The analysis of accidents focused our work on the avoidance of 'Controlled Flight Into Terrain' caused by insufficient situation awareness. Analysis of safety concepts led us to the design of the proposed synthetic vision system that will be described. Since most information on these 3D-Displays is shown in a graphical way, it can intuitively be understood by the pilot. What are the new possibilities using SVS enhancing situation awareness? First, detection of ground collision hazard is possible by monitoring a perspective Primary Flight Display. Under the psychological point of view it is based on the perception of expanding objects in the visual flow field. Supported by a Navigation Display a local conflict resolution can be mentally worked out very fast. Secondly, it is possible to follow a 3D flight path visualized as a 'Tunnel in the sky.' This can further be improved by using a flight path prediction. These are the prerequisites for a safe and adequate movement in any kind of spatial environment. However situation awareness requires the ability of navigation and spatial problem solving. Both abilities are based on higher cognitive functions in real as well as in a synthetic environment. In this paper the current training concept will be analyzed. Advantages resulting from the integration of a SVS concerning pilot training will be discussed and necessary requirements in terrain depiction will be pinpointed. Finally a modified Computer Based Training for the familiarization with Salzburg Airport for a SVS equipped aircraft will be presented. It is developed by Darmstadt University of Technology in co-operation with Lufthansa Flight Training.

  18. What Are Synthetic Cannabinoids?

    Science.gov (United States)

    ... years, synthetic cannabinoid mixtures have been easy to buy in drug paraphernalia shops, novelty stores, gas stations, and over ... abuse, authorities have made it illegal to sell, buy, or possess some of ... use is that standard drug tests cannot easily detect many of the chemicals ...

  19. Synthetic Aperture Sequential Beamforming

    DEFF Research Database (Denmark)

    Kortbek, Jacob; Jensen, Jørgen Arendt; Gammelmark, Kim Løkke

    2008-01-01

    A synthetic aperture focusing (SAF) technique denoted Synthetic Aperture Sequential Beamforming (SASB) suitable for 2D and 3D imaging is presented. The technique differ from prior art of SAF in the sense that SAF is performed on pre-beamformed data contrary to channel data. The objective is to im......A synthetic aperture focusing (SAF) technique denoted Synthetic Aperture Sequential Beamforming (SASB) suitable for 2D and 3D imaging is presented. The technique differ from prior art of SAF in the sense that SAF is performed on pre-beamformed data contrary to channel data. The objective...... is to improve and obtain a more range independent lateral resolution compared to conventional dynamic receive focusing (DRF) without compromising frame rate. SASB is a two-stage procedure using two separate beamformers. First a set of Bmode image lines using a single focal point in both transmit and receive...... is stored. The second stage applies the focused image lines from the first stage as input data. The SASB method has been investigated using simulations in Field II and by off-line processing of data acquired with a commercial scanner. The performance of SASB with a static image object is compared with DRF...

  20. Building synthetic cellular organization

    OpenAIRE

    Polka, Jessica K.; Silver, Pamela A.

    2013-01-01

    The elaborate spatial organization of cells enhances, restricts, and regulates protein–protein interactions. However, the biological significance of this organization has been difficult to study without ways of directly perturbing it. We highlight synthetic biology tools for engineering novel cellular organization, describing how they have been, and can be, used to advance cell biology.

  1. Towards a synthetic chloroplast.

    Directory of Open Access Journals (Sweden)

    Christina M Agapakis

    2011-04-01

    Full Text Available The evolution of eukaryotic cells is widely agreed to have proceeded through a series of endosymbiotic events between larger cells and proteobacteria or cyanobacteria, leading to the formation of mitochondria or chloroplasts, respectively. Engineered endosymbiotic relationships between different species of cells are a valuable tool for synthetic biology, where engineered pathways based on two species could take advantage of the unique abilities of each mutualistic partner.We explored the possibility of using the photosynthetic bacterium Synechococcus elongatus PCC 7942 as a platform for studying evolutionary dynamics and for designing two-species synthetic biological systems. We observed that the cyanobacteria were relatively harmless to eukaryotic host cells compared to Escherichia coli when injected into the embryos of zebrafish, Danio rerio, or taken up by mammalian macrophages. In addition, when engineered with invasin from Yersinia pestis and listeriolysin O from Listeria monocytogenes, S. elongatus was able to invade cultured mammalian cells and divide inside macrophages.Our results show that it is possible to engineer photosynthetic bacteria to invade the cytoplasm of mammalian cells for further engineering and applications in synthetic biology. Engineered invasive but non-pathogenic or immunogenic photosynthetic bacteria have great potential as synthetic biological devices.

  2. Synthetic Metabolic Pathways

    DEFF Research Database (Denmark)

    topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and tips on troubleshooting and avoiding known pitfalls. Authoritative and practical, Synthetic Metabolic Pathways: Methods and Protocols aims to ensure successful results in the further study...

  3. 33 CFR 401.54 - Interference with navigation aids.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Interference with navigation aids. 401.54 Section 401.54 Navigation and Navigable Waters SAINT LAWRENCE SEAWAY DEVELOPMENT CORPORATION... with navigation aids. (a) Aids to navigation shall not be interfered with or used as moorings. (b) No...

  4. Optimal motion planning using navigation measure

    Science.gov (United States)

    Vaidya, Umesh

    2018-05-01

    We introduce navigation measure as a new tool to solve the motion planning problem in the presence of static obstacles. Existence of navigation measure guarantees collision-free convergence at the final destination set beginning with almost every initial condition with respect to the Lebesgue measure. Navigation measure can be viewed as a dual to the navigation function. While the navigation function has its minimum at the final destination set and peaks at the obstacle set, navigation measure takes the maximum value at the destination set and is zero at the obstacle set. A linear programming formalism is proposed for the construction of navigation measure. Set-oriented numerical methods are utilised to obtain finite dimensional approximation of this navigation measure. Application of the proposed navigation measure-based theoretical and computational framework is demonstrated for a motion planning problem in a complex fluid flow.

  5. Using Genetic Algorithms for Navigation Planning in Dynamic Environments

    Directory of Open Access Journals (Sweden)

    Ferhat Uçan

    2012-01-01

    Full Text Available Navigation planning can be considered as a combination of searching and executing the most convenient flight path from an initial waypoint to a destination waypoint. Generally the aim is to follow the flight path, which provides minimum fuel consumption for the air vehicle. For dynamic environments, constraints change dynamically during flight. This is a special case of dynamic path planning. As the main concern of this paper is flight planning, the conditions and objectives that are most probable to be used in navigation problem are considered. In this paper, the genetic algorithm solution of the dynamic flight planning problem is explained. The evolutionary dynamic navigation planning algorithm is developed for compensating the existing deficiencies of the other approaches. The existing fully dynamic algorithms process unit changes to topology one modification at a time, but when there are several such operations occurring in the environment simultaneously, the algorithms are quite inefficient. The proposed algorithm may respond to the concurrent constraint updates in a shorter time for dynamic environment. The most secure navigation of the air vehicle is planned and executed so that the fuel consumption is minimum.

  6. GPS Navigation and Tracking Device

    Directory of Open Access Journals (Sweden)

    Yahya Salameh Khraisat

    2011-10-01

    Full Text Available Since the introduction of GPS Navigation systems in the marketplace, consumers and businesses have been coming up with innovative ways to use the technology in their everyday life. GPS Navigation and Tracking systems keep us from getting lost when we are in strange locations, they monitor children when they are away from home, keep track of business vehicles and can even let us know where a philandering partner is at all times. Because of this we attend to build a GPS tracking device to solve the mentioned problems. Our work consists of the GPS module that collects data from satellites and calculates the position information before transmitting them to the user’s PC (of Navigation system or observers (of Tracking System using wireless technology (GSM.

  7. Surface navigation on Mars with a Navigation Satellite

    Science.gov (United States)

    Vijayaraghavan, A.; Thurman, Sam W.; Kahn, Robert D.; Hastrup, Rolf C.

    Radiometric navigation data from the Deep Space Network (DSN) stations on the earth to transponders and other surface elements such as rovers and landers on Mars, can determine their positions to only within a kilometer in inertial space. The positional error is mostly in the z-component of the surface element parallel to the Martian spin-axis. However, with Doppler and differenced-Doppler data from a Navigation Satellite in orbit around Mars to two or more of such transponders on the planetary surface, their positions can be determined to within 15 meters (or 20 meters for one-way Doppler beacons on Mars) in inertial space. In this case, the transponders (or other vehicles) on Mars need not even be capable of directly communicating to the earth. When the Navigation Satellite data is complemented by radiometric observations from the DSN stations also, directly to the surface elements on Mars, their positions can be determined to within 3 meters in inertial space. The relative positions of such surface elements on Mars (relative to one another) in Mars-fixed coordinates, however, can be determined to within 5 meters from simply range and Doppler data from the DSN stations to the surface elements. These results are obtained from covariance studies assuming X-band data noise levels and data-arcs not exceeding 10 days. They are significant in the planning and deployment of a Mars-based navigation network necessary to support real-time operations during critical phases of manned exploration of Mars.

  8. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  9. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  10. Synthetic Electric Microbial Biosensors

    Science.gov (United States)

    2017-06-10

    domains and DNA-binding domains into a single protein for deregulation of down stream genes of have been favored [10]. Initially experiments with... Germany DISTRIBUTION A. Approved for public release: distribution unlimited.   Talk title: “Synthetic biology based microbial biosensors for the...toolbox” in Heidelberg, Germany Poster title: “Anaerobic whole cell microbial biosensors” Link: http://phdsymposium.embl.org/#home   September, 2014

  11. 76 FR 48751 - Security Zones; Captain of the Port Lake Michigan Zone

    Science.gov (United States)

    2011-08-09

    ... Jardine Water Filtration Plant security zone would encompass all U.S. navigable waters of Lake Michigan... areas near shore to Chicago's water filtration plants; the security zones have been designed to allow.... 165.910 Security Zones; Captain of the Port Lake Michigan. (a) * * * (1) Jardine Water Filtration...

  12. 76 FR 1521 - Security Zone: Fleet Industrial Supply Center Pier, San Diego, CA

    Science.gov (United States)

    2011-01-11

    ...-AA87 Security Zone: Fleet Industrial Supply Center Pier, San Diego, CA AGENCY: Coast Guard, DHS. ACTION... Diego, CA. The existing security zone is around the former Fleet Industrial Supply Center Pier. The security zone encompasses all navigable waters within 100 feet of the former Fleet Industrial Supply Center...

  13. Determination of UAV position using high accuracy navigation platform

    Directory of Open Access Journals (Sweden)

    Ireneusz Kubicki

    2016-07-01

    Full Text Available The choice of navigation system for mini UAV is very important because of its application and exploitation, particularly when the installed on it a synthetic aperture radar requires highly precise information about an object’s position. The presented exemplary solution of such a system draws attention to the possible problems associated with the use of appropriate technology, sensors, and devices or with a complete navigation system. The position and spatial orientation errors of the measurement platform influence on the obtained SAR imaging. Both, turbulences and maneuvers performed during flight cause the changes in the position of the airborne object resulting in deterioration or lack of images from SAR. Consequently, it is necessary to perform operations for reducing or eliminating the impact of the sensors’ errors on the UAV position accuracy. You need to look for compromise solutions between newer better technologies and in the field of software. Keywords: navigation systems, unmanned aerial vehicles, sensors integration

  14. Navigation in Cross-cultural business relationships

    DEFF Research Database (Denmark)

    Andersen, Poul Houman

    2001-01-01

    Cross-cultural business navigation concerns the process of handling the complexity of several interacting cultural spheres of influence......Cross-cultural business navigation concerns the process of handling the complexity of several interacting cultural spheres of influence...

  15. An Integrated Approach to Electronic Navigation

    National Research Council Canada - National Science Library

    Shaw, Peter; Pettus, Bill

    2001-01-01

    While the Global Positioning System (GPS) is and will continue to be an excellent navigation system, it is neither flawless nor is it the only system employed in the navigation of today's seagoing warfighters...

  16. Global Positioning System Navigation Algorithms

    Science.gov (United States)

    1977-05-01

    Historical Remarks on Navigation In Greek mythology , Odysseus sailed safely by the Sirens only to encounter the monsters Scylla and Charybdis...TNED 000 00 1(.7 BIBLIOGRAPHY 1. Pinsent, John. Greek Mythology . Paul Hamlyn, London, 1969. 2. Kline, Morris. Mathematical Thought from Ancient to

  17. Conceptual Grounds of Navigation Safety

    Directory of Open Access Journals (Sweden)

    Vladimir Torskiy

    2016-04-01

    Full Text Available The most important global problem being solved by the whole world community nowadays is to provide sustainable mankind development. Recent research in the field of sustainable development states that civilization safety is impossible without transfer sustainable development. At the same time, sustainable development (i.e. preservation of human culture and biosphere is impossible as a system that serves to meet economical, cultural, scientific, recreational and other human needs without safety. Safety plays an important role in sustainable development goals achievement. An essential condition of effective navigation functioning is to provide its safety. The “prescriptive” approach to the navigation safety, which is currently used in the world maritime field, is based on long-term experience and ship accidents investigation results. Thus this approach acted as an the great fact in reduction of number of accidents at sea. Having adopted the International Safety Management Code all the activities connected with navigation safety problems solution were transferred to the higher qualitative level. Search and development of new approaches and methods of ship accidents prevention during their operation have obtained greater importance. However, the maritime safety concept (i.e. the different points on ways, means and methods that should be used to achieve this goal hasn't been formed and described yet. The article contains a brief review of the main provisions of Navigation Safety Conceptions, which contribute to the number of accidents and incidents at sea reduction.

  18. Surgical navigation with QR codes

    Directory of Open Access Journals (Sweden)

    Katanacho Manuel

    2016-09-01

    Full Text Available The presented work is an alternative to established measurement systems in surgical navigation. The system is based on camera based tracking of QR code markers. The application uses a single video camera, integrated in a surgical lamp, that captures the QR markers attached to surgical instruments and to the patient.

  19. 46 CFR 131.915 - Persons allowed in pilothouse and on navigational bridge.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Persons allowed in pilothouse and on navigational bridge. 131.915 Section 131.915 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE... bridge. No person may be in the pilothouse while the vessel is under way, unless connected with the...

  20. 46 CFR 11.713 - Requirements for maintaining current knowledge of waters to be navigated.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Requirements for maintaining current knowledge of waters to be navigated. 11.713 Section 11.713 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN REQUIREMENTS FOR OFFICER ENDORSEMENTS Professional Requirements for Pilots § 11.713 Requirements for maintaining curren...

  1. 78 FR 42012 - Safety Zone and Regulated Navigation Area; Chicago Sanitary and Ship Canal, Romeoville, IL

    Science.gov (United States)

    2013-07-15

    ... is issuing this Interim Rule to address two omissions from the regulatory text of the Safety zone and... boats, etc.). This revision is intended to make the regulatory text consistent with the discussion of... of Homeland Security IR Interim Rule NPRM Notice of Proposed Rulemaking RNA Regulated Navigation Area...

  2. Navigation system for interstitial brachytherapy

    International Nuclear Information System (INIS)

    Strassmann, G.; Kolotas, C.; Heyd, R.

    2000-01-01

    The purpose of the stud was to develop a computed tomography (CT) based electromagnetic navigation system for interstitial brachytherapy. This is especially designed for situations when needles have to be positioned adjacent to or within critical anatomical structures. In such instances interactive 3D visualisation of the needle positions is essential. The material consisted of a Polhemus electromagnetic 3D digitizer, a Pentium 200 MHz laptop and a voice recognition for continuous speech. In addition, we developed an external reference system constructed of Perspex which could be positioned above the tumour region and attached to the patient using a non-invasive fixation method. A specially designed needle holder and patient bed were also developed. Measurements were made on a series of phantoms in order to study the efficacy and accuracy of the navigation system. The mean navigation accuracy of positioning the 20.0 cm length metallic needles within the phantoms was in the range 2.0-4.1 mm with a maximum of 5.4 mm. This is an improvement on the accuracy of a CT-guided technique which was in the range 6.1-11.3 mm with a maximum of 19.4 mm. The mean reconstruction accuracy of the implant geometry was 3.2 mm within a non-ferromagnetic environment. We found that although the needles were metallic this did not have a significant influence. We also found for our experimental setups that the CT table and operation table non-ferromagnetic parts had no significant influence on the navigation accuracy. This navigation system will be a very useful clinical tool for interstitial brachytherapy applications, particularly when critical structures have to be avoided. It also should provide a significant improvement on our existing technique

  3. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  4. Opportunities in plant synthetic biology.

    Science.gov (United States)

    Cook, Charis; Martin, Lisa; Bastow, Ruth

    2014-05-01

    Synthetic biology is an emerging field uniting scientists from all disciplines with the aim of designing or re-designing biological processes. Initially, synthetic biology breakthroughs came from microbiology, chemistry, physics, computer science, materials science, mathematics, and engineering disciplines. A transition to multicellular systems is the next logical step for synthetic biologists and plants will provide an ideal platform for this new phase of research. This meeting report highlights some of the exciting plant synthetic biology projects, and tools and resources, presented and discussed at the 2013 GARNet workshop on plant synthetic biology.

  5. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  6. Improved GPS-based Satellite Relative Navigation Using Femtosecond Laser Relative Distance Measurements

    Directory of Open Access Journals (Sweden)

    Hyungjik Oh

    2016-03-01

    Full Text Available This study developed an approach for improving Carrier-phase Differential Global Positioning System (CDGPS based realtime satellite relative navigation by applying laser baseline measurement data. The robustness against the space operational environment was considered, and a Synthetic Wavelength Interferometer (SWI algorithm based on a femtosecond laser measurement model was developed. The phase differences between two laser wavelengths were combined to measure precise distance. Generated laser data were used to improve estimation accuracy for the float ambiguity of CDGPS data. Relative navigation simulations in real-time were performed using the extended Kalman filter algorithm. The GPS and laser-combined relative navigation accuracy was compared with GPS-only relative navigation solutions to determine the impact of laser data on relative navigation. In numerical simulations, the success rate of integer ambiguity resolution increased when laser data was added to GPS data. The relative navigational errors also improved five-fold and two-fold, relative to the GPS-only error, for 250 m and 5 km initial relative distances, respectively. The methodology developed in this study is suitable for application to future satellite formation-flying missions.

  7. 32 CFR 644.3 - Navigation Projects.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Navigation Projects. 644.3 Section 644.3 National... HANDBOOK Project Planning Civil Works § 644.3 Navigation Projects. (a) Land to be acquired in fee. All... construction and borrow areas. (3) In navigation-only projects, the right to permanently flood should be...

  8. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  9. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  10. Synthetic staggered architecture composites

    International Nuclear Information System (INIS)

    Dutta, Abhishek; Tekalur, Srinivasan Arjun

    2013-01-01

    Highlights: ► Composite design inspired by nature. ► Tuning microstructure via changing ceramic content and aspect ratio. ► Experimental display of structure–property correlationship in synthetic composites. - Abstract: Structural biocomposites (for example, nacre in seashells, bone, etc.) are designed according to the functional role they are delegated for. For instance, bone is primarily designed for withstanding time-dependent loading (for example, withstanding stresses while running, jumping, accidental fall) and hence the microstructure is designed primarily from enhanced toughness and moderate stiffness point of view. On the contrary, seashells (which lie in the abyss of oceans) apart from providing defense to the organism (it is hosting) against predatory attacks, are subjected to static loading (for example, enormous hydrostatic pressure). Hence, emphasis on the shell structure evolution is directed primarily towards providing enhanced stiffness. In order to conform between stiffness and toughness, nature precisely employs a staggered arrangement of inorganic bricks in a biopolymer matrix (at its most elementary level of architecture). Aspect ratio and content of ceramic bricks are meticulously used by nature to synthesize composites having varying degrees of stiffness, strength and toughness. Such an amazing capability of structure–property correlationship has rarely been demonstrated in synthetic composites. Therefore, in order to better understand the mechanical behavior of synthetic staggered composites, the problem becomes two-pronged: (a) synthesize composites with varying brick size and contents and (b) experimental investigation of the material response. In this article, an attempt has been made to synthesize and characterize staggered ceramic–polymer composites having varying aspect ratio and ceramic content using freeze-casting technique. This will in-turn help us in custom-design manufacture of hybrid bio-inspired composite materials

  11. Theoretical Limits of Lunar Vision Aided Navigation with Inertial Navigation System

    Science.gov (United States)

    2015-03-26

    THEORETICAL LIMITS OF LUNAR VISION AIDED NAVIGATION WITH INERTIAL NAVIGATION SYSTEM THESIS David W. Jones, Capt, USAF AFIT-ENG-MS-15-M-020 DEPARTMENT...Government and is not subject to copyright protection in the United States. AFIT-ENG-MS-15-M-020 THEORETICAL LIMITS OF LUNAR VISION AIDED NAVIGATION WITH...DISTRIBUTION UNLIMITED. AFIT-ENG-MS-15-M-020 THEORETICAL LIMITS OF LUNAR VISION AIDED NAVIGATION WITH INERTIAL NAVIGATION SYSTEM THESIS David W. Jones

  12. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  13. Synthetic Aperture Ultrasound Imaging

    DEFF Research Database (Denmark)

    Jensen, Jørgen Arendt; Nikolov, Svetoslav; Gammelmark, Kim Løkke

    2006-01-01

    The paper describes the use of synthetic aperture (SA) imaging in medical ultrasound. SA imaging is a radical break with today's commercial systems, where the image is acquired sequentially one image line at a time. This puts a strict limit on the frame rate and the possibility of acquiring...... a sufficient amount of data for high precision flow estimation. These constrictions can be lifted by employing SA imaging. Here data is acquired simultaneously from all directions over a number of emissions, and the full image can be reconstructed from this data. The talk will demonstrate the many benefits...

  14. Transition in synthetic jets

    Czech Academy of Sciences Publication Activity Database

    Tesař, Václav; Kordík, Jozef

    2012-01-01

    Roč. 187, NOV 2012 (2012), s. 105-117 ISSN 0924-4247 R&D Projects: GA TA ČR(CZ) TA02020795; GA ČR(CZ) GPP101/12/P556; GA ČR(CZ) GCP101/11/J019 Institutional research plan: CEZ:AV0Z20760514 Keywords : turbulence * synthetic jet * transition * velocity spectra Subject RIV: BK - Fluid Dynamics Impact factor: 1.841, year: 2012 http://www. science direct.com/ science /article/pii/S0924424712005031

  15. Development of field navigation system; Field navigation system no kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    Ibara, S; Minode, M; Nishioka, K [Daihatsu Motor Co. Ltd., Osaka (Japan)

    1995-04-20

    This paper describes the following matters on a field navigation system developed for the purpose of covering a field of several kilometer square. This system consists of a center system and a vehicle system, and the center system comprises a map information computer and a communication data controlling computer; since the accuracy for a vehicle position detected by a GPS is not sufficient, an attempt of increasing the accuracy of vehicle position detection is made by means of a hybrid system; the hybrid system uses a satellite navigation method of differential system in which the error components in the GPS are transmitted from the center, and also uses a self-contained navigation method which performs an auxiliary function when the accuracy in the GPS has dropped; corrected GPS values, emergency messages to all of the vehicles and data of each vehicle position are communicated by wireless transmission in two ways between the center and vehicles; and accommodation of the map data adopted a system that can respond quickly to any change in roads and facilities. 3 refs., 13 figs., 1 tab.

  16. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  17. 33 CFR 165.1155 - Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach, California.

    Science.gov (United States)

    2010-07-01

    ... Nuclear Power Plant, Avila Beach, California. 165.1155 Section 165.1155 Navigation and Navigable Waters... Coast Guard District § 165.1155 Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach... surface to bottom, within a 2,000 yard radius of Diablo Canyon Nuclear Power Plant centered at position 35...

  18. 33 CFR 165.708 - Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC.

    Science.gov (United States)

    2010-07-01

    ... Harbor and Cooper River, Charleston, SC. 165.708 Section 165.708 Navigation and Navigable Waters COAST... Guard District § 165.708 Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC. (a... Cooper River. All coordinates referenced use datum: NAD 1983. (2) All waters within 100 yards of the...

  19. 33 CFR 165.503 - Security Zone; Captain of the Port Hampton Roads Zone.

    Science.gov (United States)

    2010-07-01

    ... Port Hampton Roads Zone. 165.503 Section 165.503 Navigation and Navigable Waters COAST GUARD... § 165.503 Security Zone; Captain of the Port Hampton Roads Zone. (a) Definitions. As used in this... been authorized by the Captain of the Port (COTP), Hampton Roads, Virginia to act on his or her behalf...

  20. 76 FR 63202 - Security Zones; Captain of the Port Lake Michigan Zone

    Science.gov (United States)

    2011-10-12

    ..., SE., Washington, DC 20590, between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays... Filtration Plant security zone will encompass all U.S. navigable waters of Lake Michigan within an arc of a..., Illinois. It encompasses all U.S. navigable waters of Lake Michigan within the arc of a circle with a 100...

  1. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  2. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  3. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  4. Design and visualization of synthetic holograms for security applications

    International Nuclear Information System (INIS)

    Škeren, M; Nývlt, M; Svoboda, J

    2013-01-01

    In this paper we present a software for the design and visualization of holographic elements containing full scale of visual effects. It enables to simulate an observation of the holographic elements under general conditions including different light sources with various spectral and coherence properties and various geometries of reconstruction. Furthermore, recent technologies offer interesting possibilities for the 3D visualization such as the 3D techniques based on shutter or polarization glasses, anaglyphs, etc. The presented software is compatible with the mentioned techniques and enables an application of the 3D hardware tools for visualization. The software package can be used not only for visualization of the existing designs, but also for a fine tuning of the spatial, kinetic, and color properties of the hologram. Moreover, the holograms containing all types of the 3D effects, general color mixing, kinetic behavior, diffractive cryptograms, etc. can be translated using the software directly to a high resolution micro-structure.

  5. Freedom and Responsibility in Synthetic Genomics: The Synthetic Yeast Project

    OpenAIRE

    Sliva, Anna; Yang, Huanming; Boeke, Jef D.; Mathews, Debra J. H.

    2015-01-01

    First introduced in 2011, the Synthetic Yeast Genome (Sc2.0) Project is a large international synthetic genomics project that will culminate in the first eukaryotic cell (Saccharomyces cerevisiae) with a fully synthetic genome. With collaborators from across the globe and from a range of institutions spanning from do-it-yourself biology (DIYbio) to commercial enterprises, it is important that all scientists working on this project are cognizant of the ethical and policy issues associated with...

  6. Analog synthetic biology.

    Science.gov (United States)

    Sarpeshkar, R

    2014-03-28

    We analyse the pros and cons of analog versus digital computation in living cells. Our analysis is based on fundamental laws of noise in gene and protein expression, which set limits on the energy, time, space, molecular count and part-count resources needed to compute at a given level of precision. We conclude that analog computation is significantly more efficient in its use of resources than deterministic digital computation even at relatively high levels of precision in the cell. Based on this analysis, we conclude that synthetic biology must use analog, collective analog, probabilistic and hybrid analog-digital computational approaches; otherwise, even relatively simple synthetic computations in cells such as addition will exceed energy and molecular-count budgets. We present schematics for efficiently representing analog DNA-protein computation in cells. Analog electronic flow in subthreshold transistors and analog molecular flux in chemical reactions obey Boltzmann exponential laws of thermodynamics and are described by astoundingly similar logarithmic electrochemical potentials. Therefore, cytomorphic circuits can help to map circuit designs between electronic and biochemical domains. We review recent work that uses positive-feedback linearization circuits to architect wide-dynamic-range logarithmic analog computation in Escherichia coli using three transcription factors, nearly two orders of magnitude more efficient in parts than prior digital implementations.

  7. Synthetic lubricating oils

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez Jurado, J

    1953-01-01

    A yellow solid petroleum paraffin d/sup 60/ 0.808, I number 3.5, average molecular weight 350, chlorinated and condensed with benzene, xylene, or naphthalene by the Friedel and Crafts reaction, in the presence of anhydrous AlCl/sub 3/ or activated Al, gave synthetic lubricating oils. Xylene was the preferred aromatic compound, naphthalene required the use of less completely chlorinated paraffin, benzene produced resins difficult to remove and gave darker oils with excessive green fluorescence. Activated Al rather than anhydrous AlCl/sub 3/ gave darker oils with higher viscosity and Conradson C values. Tar from the low-temperature distillation of lignite, used as a source of a paraffin fraction melting 40/sup 0/ to 48/sup 0/ (chlorinated to 26.5 percent Cl) and an aromatic fraction, 45 percent aromatic compounds by volume (mainly polysubstituted benzenes), I number 10, was converted to a similar synthetic lubricant with the following properties: Kinematic viscosity at 210/sup 0/ F., 50.4 centistokes; viscosity index, 92; Conradson C, 1.5 percent; solidification point, 9/sup 0/; S, 0.41 percent.

  8. Coloring of synthetic fluorite

    International Nuclear Information System (INIS)

    Birsoy, R.

    1980-01-01

    A synthetic fluorite of the Harshaw Chemical Company is analyzed for rare earth elements, yttrium, and sodium. Samples of this fluorite are irradiated with X-rays, γ-rays, neutrons, electrons, protons, and α-particles at different energies, and their absorption spectra are analyzed. Analyzing the thermal bleaching of these radiation-coloured fluorites shows that both, impurities and radiation play a part in the coloration of synthetic fluorite. However, the main contribution comes from the radiation induced lattice defects. In the visible region spectra, the colour centre of the 5800 to 5900 A absorption band is probably mainly related with large aggregates of F-centres. The 5450 and the 5300 A absorption bands are mainly related to monovalent and divalent ion impurities and their association with lattice defects. The 3800 A absorption band seems to be related with F-centre aggregates. However, the contribution from the rare earth elements related complex color centres also plays some part for the production of this absorption band. These results indicate that the color centres of different origin can absorb light at the same wavelength. (author)

  9. Autonomous Robot Navigation based on Visual Landmarks

    DEFF Research Database (Denmark)

    Livatino, Salvatore

    2005-01-01

    The use of landmarks for robot navigation is a popular alternative to having a geometrical model of the environment through which to navigate and monitor self-localization. If the landmarks are defined as special visual structures already in the environment then we have the possibility of fully a...... automatically learn and store visual landmarks, and later recognize these landmarks from arbitrary positions and thus estimate robot position and heading.......The use of landmarks for robot navigation is a popular alternative to having a geometrical model of the environment through which to navigate and monitor self-localization. If the landmarks are defined as special visual structures already in the environment then we have the possibility of fully...... autonomous navigation and self-localization using automatically selected landmarks. The thesis investigates autonomous robot navigation and proposes a new method which benefits from the potential of the visual sensor to provide accuracy and reliability to the navigation process while relying on naturally...

  10. Observability during planetary approach navigation

    Science.gov (United States)

    Bishop, Robert H.; Burkhart, P. Daniel; Thurman, Sam W.

    1993-01-01

    The objective of the research is to develop an analytic technique to predict the relative navigation capability of different Earth-based radio navigation measurements. In particular, the problem is to determine the relative ability of geocentric range and Doppler measurements to detect the effects of the target planet gravitational attraction on the spacecraft during the planetary approach and near-encounter mission phases. A complete solution to the two-dimensional problem has been developed. Relatively simple analytic formulas are obtained for range and Doppler measurements which describe the observability content of the measurement data along the approach trajectories. An observability measure is defined which is based on the observability matrix for nonlinear systems. The results show good agreement between the analytic observability analysis and the computational batch processing method.

  11. Navigating the Internet of Things

    DEFF Research Database (Denmark)

    Rassia, Stamatina; Steiner, Henriette

    2017-01-01

    Navigating the Internet of Things is an exploration of interconnected objects, functions, and situations in networks created to ease and manage our daily lives. The Internet of Things represents semi-automated interconnections of different objects in a network based on different information...... technologies. Some examples of this are presented here in order to better understand, explain, and discuss the elements that compose the Internet of Things. In this chapter, we provide a theoretical and practical perspective on both the micro- and macro-scales of ‘things’ (objects), small and large (e.......g. computers or interactive maps), that suggest new topographic relationships and challenge our understanding of users’ involvement with a given technology against the semi-automated workings of these systems. We navigate from a philosophical enquiry into the ‘thingness of things’ dating from the 1950s...

  12. A Dataset for Visual Navigation with Neuromorphic Methods

    Directory of Open Access Journals (Sweden)

    Francisco eBarranco

    2016-02-01

    Full Text Available Standardized benchmarks in Computer Vision have greatly contributed to the advance of approaches to many problems in the field. If we want to enhance the visibility of event-driven vision and increase its impact, we will need benchmarks that allow comparison among different neuromorphic methods as well as comparison to Computer Vision conventional approaches. We present datasets to evaluate the accuracy of frame-free and frame-based approaches for tasks of visual navigation. Similar to conventional Computer Vision datasets, we provide synthetic and real scenes, with the synthetic data created with graphics packages, and the real data recorded using a mobile robotic platform carrying a dynamic and active pixel vision sensor (DAVIS and an RGB+Depth sensor. For both datasets the cameras move with a rigid motion in a static scene, and the data includes the images, events, optic flow, 3D camera motion, and the depth of the scene, along with calibration procedures. Finally, we also provide simulated event data generated synthetically from well-known frame-based optical flow datasets.

  13. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  14. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  15. Navigation in diagnosis and therapy

    International Nuclear Information System (INIS)

    Vannier, Michael W.; Haller, John W.

    1999-01-01

    Image-guided navigation for surgery and other therapeutic interventions has grown in importance in recent years. During image-guided navigation a target is detected, localized and characterized for diagnosis and therapy. Thus, images are used to select, plan, guide and evaluate therapy, thereby reducing invasiveness and improving outcomes. A shift from traditional open surgery to less-invasive image-guided surgery will continue to impact the surgical marketplace. Increases in the speed and capacity of computers and computer networks have enabled image-guided interventions. Key elements in image navigation systems are pre-operative 3D imaging (or real-time image acquisition), a graphical display and interactive input devices, such as surgical instruments with light emitting diodes (LEDs). CT and MRI, 3D imaging devices, are commonplace today and 3D images are useful in complex interventions such as radiation oncology and surgery. For example, integrated surgical imaging workstations can be used for frameless stereotaxy during neurosurgical interventions. In addition, imaging systems are being expanded to include decision aids in diagnosis and treatment. Electronic atlases, such as Voxel Man or others derived from the Visible Human Project, combine a set of image data with non-image knowledge such as anatomic labels. Robot assistants and magnetic guidance technology are being developed for minimally invasive surgery and other therapeutic interventions. Major progress is expected at the interface between the disciplines of radiology and surgery where imaging, intervention and informatics converge

  16. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  17. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  18. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  19. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  20. Bioinspired polarization navigation sensor for autonomous munitions systems

    Science.gov (United States)

    Giakos, G. C.; Quang, T.; Farrahi, T.; Deshpande, A.; Narayan, C.; Shrestha, S.; Li, Y.; Agarwal, M.

    2013-05-01

    Small unmanned aerial vehicles UAVs (SUAVs), micro air vehicles (MAVs), Automated Target Recognition (ATR), and munitions guidance, require extreme operational agility and robustness which can be partially offset by efficient bioinspired imaging sensor designs capable to provide enhanced guidance, navigation and control capabilities (GNC). Bioinspired-based imaging technology can be proved useful either for long-distance surveillance of targets in a cluttered environment, or at close distances limited by space surroundings and obstructions. The purpose of this study is to explore the phenomenology of image formation by different insect eye architectures, which would directly benefit the areas of defense and security, on the following four distinct areas: a) fabrication of the bioinspired sensor b) optical architecture, c) topology, and d) artificial intelligence. The outcome of this study indicates that bioinspired imaging can impact the areas of defense and security significantly by dedicated designs fitting into different combat scenarios and applications.

  1. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  2. Space Synthetic Biology Project

    Science.gov (United States)

    Howard, David; Roman, Monsi; Mansell, James (Matt)

    2015-01-01

    Synthetic biology is an effort to make genetic engineering more useful by standardizing sections of genetic code. By standardizing genetic components, biological engineering will become much more similar to traditional fields of engineering, in which well-defined components and subsystems are readily available in markets. Specifications of the behavior of those components and subsystems can be used to model a system which incorporates them. Then, the behavior of the novel system can be simulated and optimized. Finally, the components and subsystems can be purchased and assembled to create the optimized system, which most often will exhibit behavior similar to that indicated by the model. The Space Synthetic Biology project began in 2012 as a multi-Center effort. The purpose of this project was to harness Synthetic Biology principals to enable NASA's missions. A central target for application was to Environmental Control & Life Support (ECLS). Engineers from NASA Marshall Space Flight Center's (MSFC's) ECLS Systems Development Branch (ES62) were brought into the project to contribute expertise in operational ECLS systems. Project lead scientists chose to pursue the development of bioelectrochemical technologies to spacecraft life support. Therefore, the ECLS element of the project became essentially an effort to develop a bioelectrochemical ECLS subsystem. Bioelectrochemical systems exploit the ability of many microorganisms to drive their metabolisms by direct or indirect utilization of electrical potential gradients. Whereas many microorganisms are capable of deriving the energy required for the processes of interest (such as carbon dioxide (CO2) fixation) from sunlight, it is believed that subsystems utilizing electrotrophs will exhibit smaller mass, volume, and power requirements than those that derive their energy from sunlight. In the first 2 years of the project, MSFC personnel conducted modeling, simulation, and conceptual design efforts to assist the

  3. Digital waterway construction based on inland electronic navigation chart

    Science.gov (United States)

    Wang, Xue; Pan, Junfeng; Zhu, Weiwei

    2015-12-01

    With advantages of large capacity, long distance, low energy consumption, low cost, less land occupation and light pollution, inland waterway transportation becomes one of the most important constituents of the comprehensive transportation system and comprehensive water resources utilization in China. As one of "three elements" of navigation, waterway is the important basis for the development of water transportation and plays a key supporting role in shipping economic. The paper discuss how to realize the informatization and digitization of waterway management based on constructing an integrated system of standard inland electronic navigation chart production, waterway maintenance, navigation mark remote sensing and control, ship dynamic management, and water level remote sensing and report, which can also be the foundation of the intelligent waterway construction. Digital waterway construction is an information project and also has a practical meaning for waterway. It can not only meet the growing high assurance and security requirements for waterway, but also play a significant advantage in improving transport efficiency, reducing costs, promoting energy conservation and so on. This study lays a solid foundation on realizing intelligent waterway and building a smooth, efficient, safe, green modern inland waterway system, and must be considered as an unavoidable problem for the coordinated development between "low carbon" transportation and social economic.

  4. Current status of synthetic epikeratoplasty.

    Science.gov (United States)

    Thompson, K P; Hanna, K; Waring, G O; Gipson, I; Liu, Y; Gailitis, R P; Johnson-Wint, B; Green, K

    1991-01-01

    Many of the deficiencies with human tissue epikeratoplasty might be improved by the use of a suitable synthetic lenticule. Potential biomaterials for epikeratoplasty include collagen (types I, III, or IV), collagen-hydrogel copolymers, bioactive synthetics, and coated hydrogels. The biomaterial must be engineered to achieve strict specifications of optical clarity, support of epithelial migration and adhesion, permeability to solutes, and stability to corneal proteases. Attaching synthetic lenticules to the cornea without cutting Bowman's layer by adhesives, laser welding, or direct adhesion may also improve the efficacy of synthetic epikeratoplasty.

  5. Synthetic biology and occupational risk.

    Science.gov (United States)

    Howard, John; Murashov, Vladimir; Schulte, Paul

    2017-03-01

    Synthetic biology is an emerging interdisciplinary field of biotechnology that involves applying the principles of engineering and chemical design to biological systems. Biosafety professionals have done an excellent job in addressing research laboratory safety as synthetic biology and gene editing have emerged from the larger field of biotechnology. Despite these efforts, risks posed by synthetic biology are of increasing concern as research procedures scale up to industrial processes in the larger bioeconomy. A greater number and variety of workers will be exposed to commercial synthetic biology risks in the future, including risks to a variety of workers from the use of lentiviral vectors as gene transfer devices. There is a need to review and enhance current protection measures in the field of synthetic biology, whether in experimental laboratories where new advances are being researched, in health care settings where treatments using viral vectors as gene delivery systems are increasingly being used, or in the industrial bioeconomy. Enhanced worker protection measures should include increased injury and illness surveillance of the synthetic biology workforce; proactive risk assessment and management of synthetic biology products; research on the relative effectiveness of extrinsic and intrinsic biocontainment methods; specific safety guidance for synthetic biology industrial processes; determination of appropriate medical mitigation measures for lentiviral vector exposure incidents; and greater awareness and involvement in synthetic biology safety by the general occupational safety and health community as well as by government occupational safety and health research and regulatory agencies.

  6. Finding Hope in Synthetic Biology.

    Science.gov (United States)

    Takala, Tuija

    2017-04-01

    For some, synthetic biology represents great hope in offering possible solutions to many of the world's biggest problems, from hunger to sustainable development. Others remain fearful of the harmful uses, such as bioweapons, that synthetic biology can lend itself to, and most hold that issues of biosafety are of utmost importance. In this article, I will evaluate these points of view and conclude that although the biggest promises of synthetic biology are unlikely to become reality, and the probability of accidents is fairly substantial, synthetic biology could still be seen to benefit humanity by enhancing our ethical understanding and by offering a boost to world economy.

  7. Tissue Harmonic Synthetic Aperture Imaging

    DEFF Research Database (Denmark)

    Rasmussen, Joachim

    The main purpose of this PhD project is to develop an ultrasonic method for tissue harmonic synthetic aperture imaging. The motivation is to advance the field of synthetic aperture imaging in ultrasound, which has shown great potentials in the clinic. Suggestions for synthetic aperture tissue...... system complexity compared to conventional synthetic aperture techniques. In this project, SASB is sought combined with a pulse inversion technique for 2nd harmonic tissue harmonic imaging. The advantages in tissue harmonic imaging (THI) are expected to further improve the image quality of SASB...

  8. Life after the synthetic cell

    DEFF Research Database (Denmark)

    Rasmussen, Steen

    2010-01-01

    Nature asked eight synthetic-biology experts about the implications for science and society of the “synthetic cell” made by the J. Craig Venter Institute (JCVI). The institute's team assembled, modified and implanted a synthesized genome into a DNA-free bacterial shell to make a self-replicating ......Nature asked eight synthetic-biology experts about the implications for science and society of the “synthetic cell” made by the J. Craig Venter Institute (JCVI). The institute's team assembled, modified and implanted a synthesized genome into a DNA-free bacterial shell to make a self...

  9. Computational synthetic geometry

    CERN Document Server

    Bokowski, Jürgen

    1989-01-01

    Computational synthetic geometry deals with methods for realizing abstract geometric objects in concrete vector spaces. This research monograph considers a large class of problems from convexity and discrete geometry including constructing convex polytopes from simplicial complexes, vector geometries from incidence structures and hyperplane arrangements from oriented matroids. It turns out that algorithms for these constructions exist if and only if arbitrary polynomial equations are decidable with respect to the underlying field. Besides such complexity theorems a variety of symbolic algorithms are discussed, and the methods are applied to obtain new mathematical results on convex polytopes, projective configurations and the combinatorics of Grassmann varieties. Finally algebraic varieties characterizing matroids and oriented matroids are introduced providing a new basis for applying computer algebra methods in this field. The necessary background knowledge is reviewed briefly. The text is accessible to stud...

  10. Synthetic Aperture Compound Imaging

    DEFF Research Database (Denmark)

    Hansen, Jens Munk

    and the limiting factor is the amount of memory IO resources available. An equally high demand for memory throughput is found in the computer gaming industry, where a large part of the processing takes place on the graphics processing unit (GPU). Using the GPU, a framework for synthetic aperture imaging......Medical ultrasound imaging is used for many purposes, e.g. for localizing and classifying cysts, lesions, and other processes. Almost any mass is first observed using B-mode imaging and later classified using e.g. color flow, strain, or attenuation imaging. It is therefore important that the B......-mode images have high contrast. Like all imaging modalities, ultrasound is subject to a number of inherent artifacts that compromise image quality. The most prominent artifact is the degradation by coherent wave interference, known as “speckle”, which gives a granular appearance to an otherwise homogeneous...

  11. Transionospheric synthetic aperture imaging

    CERN Document Server

    Gilman, Mikhail; Tsynkov, Semyon

    2017-01-01

    This landmark monograph presents the most recent mathematical developments in the analysis of ionospheric distortions of SAR images and offers innovative new strategies for their mitigation. As a prerequisite to addressing these topics, the book also discusses the radar ambiguity theory as it applies to synthetic aperture imaging and the propagation of radio waves through the ionospheric plasma, including the anisotropic and turbulent cases. In addition, it covers a host of related subjects, such as the mathematical modeling of extended radar targets (as opposed to point-wise targets) and the scattering of radio waves off those targets, as well as the theoretical analysis of the start-stop approximation, which is used routinely in SAR signal processing but often without proper justification. The mathematics in this volume is clean and rigorous – no assumptions are hidden or ambiguously stated. The resulting work is truly interdisciplinary, providing both a comprehensive and thorough exposition of the field,...

  12. Radioimmunoassay of synthetic steroids

    Energy Technology Data Exchange (ETDEWEB)

    Raynaud, J -P; Bucourt, R; Salmon, J

    1975-12-01

    The sensitivity of a radioimmunoassay depends on the intrinsic association constant of the interaction between ligand and antibody. Its specificity depends on the position of the chain which forms the link with the antigen. Thus, an antibody specific of estradiol has been obtained by coupling estradiol to albumin via a chain at position 7. For synthetic steroids the structure of which is sufficiency different from that of natural hormones, the requirements for a sensitive assay method not involving chromatography are simply maximum affinity and positioning of the couple at a site which does not undergo metabolic attack. These criteria were used to develop assays for R 2858 and R 2453 which obviate the need to administer radioactive product in clinical pharmacology. Cross-reaction with structural analogs may be used to assay competitors. Thus, R 2323 antibody, highly specific for endogenous steroids, may be used to assay other trienes such as R 1697 (trenbolone) and R 2010 (norgestrienone).

  13. Synthetic fuels and fusion

    Energy Technology Data Exchange (ETDEWEB)

    Fillo, J A; Powell, J; Steinberg, M [Brookhaven National Lab., Upton, NY (USA)

    1981-03-01

    The decreasing availability of fossil fuels emphasizes the need to develop systems which will produce synthetic fuel to substitute for and supplement the natural supply. An important first step in the synthesis of liquid and gaseous fuels is the production of hydrogen. Thermonuclear fusion offers an inexhaustible source of energy for the production of hydrogen from water. Depending on design, electric generation efficiencies of approx. equal to 40-60% and hydrogen production efficiencies by high temperature electrolysis of approx. equal to 50-70% are projected for fusion reactors using high temperature blankets. Fusion/coal symbiotic systems appear economically promising for the first generation of commercial fusion synfuels plants. Coal production requirements and the environmental effects of large-scale coal usage would be greatly reduced by a fusion/coal system. In the long-term, there could be a gradual transition to an inexhaustible energy system based solely on fusion.

  14. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  15. Emergency navigation without an infrastructure.

    Science.gov (United States)

    Gelenbe, Erol; Bi, Huibo

    2014-08-18

    Emergency navigation systems for buildings and other built environments, such as sport arenas or shopping centres, typically rely on simple sensor networks to detect emergencies and, then, provide automatic signs to direct the evacuees. The major drawbacks of such static wireless sensor network (WSN)-based emergency navigation systems are the very limited computing capacity, which makes adaptivity very difficult, and the restricted battery power, due to the low cost of sensor nodes for unattended operation. If static wireless sensor networks and cloud-computing can be integrated, then intensive computations that are needed to determine optimal evacuation routes in the presence of time-varying hazards can be offloaded to the cloud, but the disadvantages of limited battery life-time at the client side, as well as the high likelihood of system malfunction during an emergency still remain. By making use of the powerful sensing ability of smart phones, which are increasingly ubiquitous, this paper presents a cloud-enabled indoor emergency navigation framework to direct evacuees in a coordinated fashion and to improve the reliability and resilience for both communication and localization. By combining social potential fields (SPF) and a cognitive packet network (CPN)-based algorithm, evacuees are guided to exits in dynamic loose clusters. Rather than relying on a conventional telecommunications infrastructure, we suggest an ad hoc cognitive packet network (AHCPN)-based protocol to adaptively search optimal communication routes between portable devices and the network egress nodes that provide access to cloud servers, in a manner that spares the remaining battery power of smart phones and minimizes the time latency. Experimental results through detailed simulations indicate that smart human motion and smart network management can increase the survival rate of evacuees and reduce the number of drained smart phones in an evacuation process.

  16. Emergency Navigation without an Infrastructure

    Directory of Open Access Journals (Sweden)

    Erol Gelenbe

    2014-08-01

    Full Text Available Emergency navigation systems for buildings and other built environments, such as sport arenas or shopping centres, typically rely on simple sensor networks to detect emergencies and, then, provide automatic signs to direct the evacuees. The major drawbacks of such static wireless sensor network (WSN-based emergency navigation systems are the very limited computing capacity, which makes adaptivity very difficult, and the restricted battery power, due to the low cost of sensor nodes for unattended operation. If static wireless sensor networks and cloud-computing can be integrated, then intensive computations that are needed to determine optimal evacuation routes in the presence of time-varying hazards can be offloaded to the cloud, but the disadvantages of limited battery life-time at the client side, as well as the high likelihood of system malfunction during an emergency still remain. By making use of the powerful sensing ability of smart phones, which are increasingly ubiquitous, this paper presents a cloud-enabled indoor emergency navigation framework to direct evacuees in a coordinated fashion and to improve the reliability and resilience for both communication and localization. By combining social potential fields (SPF and a cognitive packet network (CPN-based algorithm, evacuees are guided to exits in dynamic loose clusters. Rather than relying on a conventional telecommunications infrastructure, we suggest an ad hoc cognitive packet network (AHCPN-based protocol to adaptively search optimal communication routes between portable devices and the network egress nodes that provide access to cloud servers, in a manner that spares the remaining battery power of smart phones and minimizes the time latency. Experimental results through detailed simulations indicate that smart human motion and smart network management can increase the survival rate of evacuees and reduce the number of drained smart phones in an evacuation process.

  17. Imaging with Synthetic Aperture Radar

    CERN Document Server

    Massonnet, Didier

    2008-01-01

    Describing a field that has been transformed by the recent availability of data from a new generation of space and airborne systems, the authors offer a synthetic geometrical approach to the description of synthetic aperture radar, one that addresses physicists, radar specialists, as well as experts in image processing.  

  18. Synthetic peptides for antibody production

    NARCIS (Netherlands)

    Zegers, N.D.

    1995-01-01

    Synthetic peptides are useful tools for the generation of antibodies. The use of antibodies as specific reagents in inununochemical assays is widely applied. In this chapter, the application of synthetic peptides for the generation of antibodies is described. The different steps that lead to the

  19. Synthetic peptides for antibody production

    NARCIS (Netherlands)

    N.D. Zegers (Netty)

    1995-01-01

    textabstractSynthetic peptides are useful tools for the generation of antibodies. The use of antibodies as specific reagents in inununochemical assays is widely applied. In this chapter, the application of synthetic peptides for the generation of antibodies is described. The different steps

  20. Synthetic biology and metabolic engineering.

    Science.gov (United States)

    Stephanopoulos, Gregory

    2012-11-16

    Metabolic engineering emerged 20 years ago as the discipline occupied with the directed modification of metabolic pathways for the microbial synthesis of various products. As such, it deals with the engineering (design, construction, and optimization) of native as well as non-natural routes of product synthesis, aided in this task by the availability of synthetic DNA, the core enabling technology of synthetic biology. The two fields, however, only partially overlap in their interest in pathway engineering. While fabrication of biobricks, synthetic cells, genetic circuits, and nonlinear cell dynamics, along with pathway engineering, have occupied researchers in the field of synthetic biology, the sum total of these areas does not constitute a coherent definition of synthetic biology with a distinct intellectual foundation and well-defined areas of application. This paper reviews the origins of the two fields and advances two distinct paradigms for each of them: that of unit operations for metabolic engineering and electronic circuits for synthetic biology. In this context, metabolic engineering is about engineering cell factories for the biological manufacturing of chemical and pharmaceutical products, whereas the main focus of synthetic biology is fundamental biological research facilitated by the use of synthetic DNA and genetic circuits.

  1. The Ethics of Synthetic Biology

    DEFF Research Database (Denmark)

    Christiansen, Andreas

    The dissertation analyses and discusses a number of ethical issues that have been raised in connection with the development of synthetic biology. Synthetic biology is a set of new techniques for DNA-level design and construction of living beings with useful properties. The dissertation especially...

  2. Synthetic biology of polyketide synthases

    DEFF Research Database (Denmark)

    Yuzawa, Satoshi; Backman, Tyler W.H.; Keasling, Jay D.

    2018-01-01

    ). The modules are composed of enzymatic domains that share sequence and functional similarity across all known PKSs. We have used the nomenclature of synthetic biology to classify the enzymatic domains and modules as parts and devices, respectively, and have generated detailed lists of both. In addition, we...... realize the potential that synthetic biology approaches bring to this class of molecules....

  3. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  4. Chemical compass for bird navigation

    DEFF Research Database (Denmark)

    Solov'yov, Ilia; Hore, Peter J.; Ritz, Thorsten

    2014-01-01

    Migratory birds travel spectacular distances each year, navigating and orienting by a variety of means, most of which are poorly understood. Among them is a remarkable ability to perceive the intensity and direction of the Earth's magnetic field. Biologically credible mechanisms for the detection...... increased interest following the proposal in 2000 that free radical chemistry could occur in the bird's retina initiated by photoexcitation of cryptochrome, a specialized photoreceptor protein. In the present paper we review the important physical and chemical constraints on a possible radical...

  5. Robotics_MobileRobot Navigation, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Robots and rovers exploring planets need to autonomously navigate to specified locations. Advanced Scientific Concepts, Inc. (ASC) and the University of Minnesota...

  6. Usability Testing of Two Ambulatory EHR Navigators.

    Science.gov (United States)

    Hultman, Gretchen; Marquard, Jenna; Arsoniadis, Elliot; Mink, Pamela; Rizvi, Rubina; Ramer, Tim; Khairat, Saif; Fickau, Keri; Melton, Genevieve B

    2016-01-01

    Despite widespread electronic health record (EHR) adoption, poor EHR system usability continues to be a significant barrier to effective system use for end users. One key to addressing usability problems is to employ user testing and user-centered design. To understand if redesigning an EHR-based navigation tool with clinician input improved user performance and satisfaction. A usability evaluation was conducted to compare two versions of a redesigned ambulatory navigator. Participants completed tasks for five patient cases using the navigators, while employing a think-aloud protocol. The tasks were based on Meaningful Use (MU) requirements. The version of navigator did not affect perceived workload, and time to complete tasks was longer in the redesigned navigator. A relatively small portion of navigator content was used to complete the MU-related tasks, though navigation patterns were highly variable across participants for both navigators. Preferences for EHR navigation structures appeared to be individualized. This study demonstrates the importance of EHR usability assessments to evaluate group and individual performance of different interfaces and preferences for each design.

  7. Applications of navigation for orthognathic surgery.

    Science.gov (United States)

    Bobek, Samuel L

    2014-11-01

    Stereotactic surgical navigation has been used in oral and maxillofacial surgery for orbital reconstruction, reduction of facial fractures, localization of foreign bodies, placement of implants, skull base surgery, tumor removal, temporomandibular joint surgery, and orthognathic surgery. The primary goals in adopting intraoperative navigation into these different surgeries were to define and localize operative anatomy, to localize implant position, and to orient the surgical wound. Navigation can optimize the functional and esthetic outcomes in patients with dentofacial deformities by identifying pertinent anatomic structures, transferring the surgical plan to the patient, and verifying the surgical result. This article discusses the principles of navigation-guided orthognathic surgery. Copyright © 2014 Elsevier Inc. All rights reserved.

  8. Airports and Navigation Aids Database System -

    Data.gov (United States)

    Department of Transportation — Airport and Navigation Aids Database System is the repository of aeronautical data related to airports, runways, lighting, NAVAID and their components, obstacles, no...

  9. Computing with synthetic protocells.

    Science.gov (United States)

    Courbet, Alexis; Molina, Franck; Amar, Patrick

    2015-09-01

    In this article we present a new kind of computing device that uses biochemical reactions networks as building blocks to implement logic gates. The architecture of a computing machine relies on these generic and composable building blocks, computation units, that can be used in multiple instances to perform complex boolean functions. Standard logical operations are implemented by biochemical networks, encapsulated and insulated within synthetic vesicles called protocells. These protocells are capable of exchanging energy and information with each other through transmembrane electron transfer. In the paradigm of computation we propose, protoputing, a machine can solve only one problem and therefore has to be built specifically. Thus, the programming phase in the standard computing paradigm is represented in our approach by the set of assembly instructions (specific attachments) that directs the wiring of the protocells that constitute the machine itself. To demonstrate the computing power of protocellular machines, we apply it to solve a NP-complete problem, known to be very demanding in computing power, the 3-SAT problem. We show how to program the assembly of a machine that can verify the satisfiability of a given boolean formula. Then we show how to use the massive parallelism of these machines to verify in less than 20 min all the valuations of the input variables and output a fluorescent signal when the formula is satisfiable or no signal at all otherwise.

  10. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  11. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  12. Youth Mobilisation as Social Navigation

    DEFF Research Database (Denmark)

    Vigh, Henrik Erdman

    2010-01-01

     ties and options that arise in such situations. Building on the Guinean Creole term of dubriagem, the article proposes the concept of social navigation as an analytical optic able to shed light on praxis in unstable environments. The concept of social navigation makes it possible to focus on the way we move within changing social environments. It is processuality squared, illuminating motion within motion. The article thus advocates an analysis of praxis that takes its point of departure in a Batesonian and intermorphological understanding of action in order to further our understanding of the acts of youth in conflict....

  13. Off the Beaten tracks: Exploring Three Aspects of Web Navigation

    NARCIS (Netherlands)

    Weinreich, H.; Obendorf, H.; Herder, E.; Mayer, M.; Edmonds, H.; Hawkey, K.; Kellar, M.; Turnbull, D.

    2006-01-01

    This paper presents results of a long-term client-side Web usage study, updating previous studies that range in age from five to ten years. We focus on three aspects of Web navigation: changes in the distribution of navigation actions, speed of navigation and within-page navigation. “Navigation

  14. Autonomous Navigation with Constrained Consistency for C-Ranger

    Directory of Open Access Journals (Sweden)

    Shujing Zhang

    2014-06-01

    Full Text Available Autonomous underwater vehicles (AUVs have become the most widely used tools for undertaking complex exploration tasks in marine environments. Their synthetic ability to carry out localization autonomously and build an environmental map concurrently, in other words, simultaneous localization and mapping (SLAM, are considered to be pivotal requirements for AUVs to have truly autonomous navigation. However, the consistency problem of the SLAM system has been greatly ignored during the past decades. In this paper, a consistency constrained extended Kalman filter (EKF SLAM algorithm, applying the idea of local consistency, is proposed and applied to the autonomous navigation of the C-Ranger AUV, which is developed as our experimental platform. The concept of local consistency (LC is introduced after an explicit theoretical derivation of the EKF-SLAM system. Then, we present a locally consistency-constrained EKF-SLAM design, LC-EKF, in which the landmark estimates used for linearization are fixed at the beginning of each local time period, rather than evaluated at the latest landmark estimates. Finally, our proposed LC-EKF algorithm is experimentally verified, both in simulations and sea trials. The experimental results show that the LC-EKF performs well with regard to consistency, accuracy and computational efficiency.

  15. Synthetic Biology and Personalized Medicine

    Science.gov (United States)

    Jain, K.K.

    2013-01-01

    Synthetic biology, application of synthetic chemistry to biology, is a broad term that covers the engineering of biological systems with structures and functions not found in nature to process information, manipulate chemicals, produce energy, maintain cell environment and enhance human health. Synthetic biology devices contribute not only to improve our understanding of disease mechanisms, but also provide novel diagnostic tools. Methods based on synthetic biology enable the design of novel strategies for the treatment of cancer, immune diseases metabolic disorders and infectious diseases as well as the production of cheap drugs. The potential of synthetic genome, using an expanded genetic code that is designed for specific drug synthesis as well as delivery and activation of the drug in vivo by a pathological signal, was already pointed out during a lecture delivered at Kuwait University in 2005. Of two approaches to synthetic biology, top-down and bottom-up, the latter is more relevant to the development of personalized medicines as it provides more flexibility in constructing a partially synthetic cell from basic building blocks for a desired task. PMID:22907209

  16. Synthetic Biology: Advancing Biological Frontiers by Building Synthetic Systems

    OpenAIRE

    Chen, Yvonne Yu-Hsuan; Galloway, Kate E; Smolke, Christina D

    2012-01-01

    Advances in synthetic biology are contributing to diverse research areas, from basic biology to biomanufacturing and disease therapy. We discuss the theoretical foundation, applications, and potential of this emerging field.

  17. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  18. Vibrotactile in-vehicle navigation system

    NARCIS (Netherlands)

    Erp, J.B.F. van; Veen, H.J. van

    2004-01-01

    A vibrotactile display, consisting ofeight vibrating elements or tactors mounted in a driver's seat, was tested in a driving simulator. Participants drove with visual, tactile and multimodal navigation displays through a built-up area. Workload and the reaction time to navigation messages were

  19. Parsimonious Ways to Use Vision for Navigation

    Directory of Open Access Journals (Sweden)

    Paul Graham

    2012-05-01

    Full Text Available The use of visual information for navigation appears to be a universal strategy for sighted animals, amongst which, one particular group of expert navigators are the ants. The broad interest in studies of ant navigation is in part due to their small brains, thus biomimetic engineers expect to be impressed by elegant control solutions, and psychologists might hope for a description of the minimal cognitive requirements for complex spatial behaviours. In this spirit, we have been taking an interdisciplinary approach to the visual guided navigation of ants in their natural habitat. Behavioural experiments and natural image statistics show that visual navigation need not depend on the remembering or recognition of objects. Further modelling work suggests how simple behavioural routines might enable navigation using familiarity detection rather than explicit recall, and we present a proof of concept that visual navigation using familiarity can be achieved without specifying when or what to learn, nor separating routes into sequences of waypoints. We suggest that our current model represents the only detailed and complete model of insect route guidance to date. What's more, we believe the suggested mechanisms represent useful parsimonious hypotheses for the visually guided navigation in larger-brain animals.

  20. A Semantic Navigation Model for Video Games

    Science.gov (United States)

    van Driel, Leonard; Bidarra, Rafael

    Navigational performance of artificial intelligence (AI) characters in computer games is gaining an increasingly important role in the perception of their behavior. While recent games successfully solve some complex navigation problems, there is little known or documented on the underlying approaches, often resembling a primitive conglomerate of ad-hoc algorithms for specific situations.

  1. Sex differences in navigation strategy and efficiency.

    Science.gov (United States)

    Boone, Alexander P; Gong, Xinyi; Hegarty, Mary

    2018-05-22

    Research on human navigation has indicated that males and females differ in self-reported navigation strategy as well as objective measures of navigation efficiency. In two experiments, we investigated sex differences in navigation strategy and efficiency using an objective measure of strategy, the dual-solution paradigm (DSP; Marchette, Bakker, & Shelton, 2011). Although navigation by shortcuts and learned routes were the primary strategies used in both experiments, as in previous research on the DSP, individuals also utilized route reversals and sometimes found the goal location as a result of wandering. Importantly, sex differences were found in measures of both route selection and navigation efficiency. In particular, males were more likely to take shortcuts and reached their goal location faster than females, while females were more likely to follow learned routes and wander. Self-report measures of strategy were only weakly correlated with objective measures of strategy, casting doubt on their usefulness. This research indicates that the sex difference in navigation efficiency is large, and only partially related to an individual's navigation strategy as measured by the dual-solution paradigm.

  2. Navigator. Volume 45, Number 2, Winter 2009

    Science.gov (United States)

    National Science Education Leadership Association, 2009

    2009-01-01

    The National Science Education Leadership Association (NSELA) was formed in 1959 to meet a need to develop science education leadership for K-16 school systems. "Navigator" is published by NSELA to provide the latest NSELA events. This issue of "Navigator" contains the following reports: (1) A Message from the President: Creating Networks of…

  3. Navigator. Volume 45, Number 3, Spring 2009

    Science.gov (United States)

    National Science Education Leadership Association, 2009

    2009-01-01

    The National Science Education Leadership Association (NSELA) was formed in 1959 to meet a need to develop science education leadership for K-16 school systems. "Navigator" is published by NSELA to provide the latest NSELA events. This issue of "Navigator" includes the following items: (1) A Message from the President (Brenda Wojnowski); (2) NSELA…

  4. Natural Language Navigation Support in Virtual Reality

    NARCIS (Netherlands)

    van Luin, J.; Nijholt, Antinus; op den Akker, Hendrikus J.A.; Giagourta, V.; Strintzis, M.G.

    2001-01-01

    We describe our work on designing a natural language accessible navigation agent for a virtual reality (VR) environment. The agent is part of an agent framework, which means that it can communicate with other agents. Its navigation task consists of guiding the visitors in the environment and to

  5. Risk management model of winter navigation operations

    International Nuclear Information System (INIS)

    Valdez Banda, Osiris A.; Goerlandt, Floris; Kuzmin, Vladimir; Kujala, Pentti; Montewka, Jakub

    2016-01-01

    The wintertime maritime traffic operations in the Gulf of Finland are managed through the Finnish–Swedish Winter Navigation System. This establishes the requirements and limitations for the vessels navigating when ice covers this area. During winter navigation in the Gulf of Finland, the largest risk stems from accidental ship collisions which may also trigger oil spills. In this article, a model for managing the risk of winter navigation operations is presented. The model analyses the probability of oil spills derived from collisions involving oil tanker vessels and other vessel types. The model structure is based on the steps provided in the Formal Safety Assessment (FSA) by the International Maritime Organization (IMO) and adapted into a Bayesian Network model. The results indicate that ship independent navigation and convoys are the operations with higher probability of oil spills. Minor spills are most probable, while major oil spills found very unlikely but possible. - Highlights: •A model to assess and manage the risk of winter navigation operations is proposed. •The risks of oil spills in winter navigation in the Gulf of Finland are analysed. •The model assesses and prioritizes actions to control the risk of the operations. •The model suggests navigational training as the most efficient risk control option.

  6. Evolved Navigation Theory and Horizontal Visual Illusions

    Science.gov (United States)

    Jackson, Russell E.; Willey, Chela R.

    2011-01-01

    Environmental perception is prerequisite to most vertebrate behavior and its modern investigation initiated the founding of experimental psychology. Navigation costs may affect environmental perception, such as overestimating distances while encumbered (Solomon, 1949). However, little is known about how this occurs in real-world navigation or how…

  7. Rosetta Star Tracker and Navigation Camera

    DEFF Research Database (Denmark)

    Thuesen, Gøsta

    1998-01-01

    Proposal in response to the Invitation to Tender (ITT) issued by Matra Marconi Space (MSS) for the procurement of the ROSETTA Star Tracker and Navigation Camera.......Proposal in response to the Invitation to Tender (ITT) issued by Matra Marconi Space (MSS) for the procurement of the ROSETTA Star Tracker and Navigation Camera....

  8. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  9. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  10. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  11. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  12. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  13. Quantum imaging for underwater arctic navigation

    Science.gov (United States)

    Lanzagorta, Marco

    2017-05-01

    The precise navigation of underwater vehicles is a difficult task due to the challenges imposed by the variable oceanic environment. It is particularly difficult if the underwater vehicle is trying to navigate under the Arctic ice shelf. Indeed, in this scenario traditional navigation devices such as GPS, compasses and gyrocompasses are unavailable or unreliable. In addition, the shape and thickness of the ice shelf is variable throughout the year. Current Arctic underwater navigation systems include sonar arrays to detect the proximity to the ice. However, these systems are undesirable in a wartime environment, as the sound gives away the position of the underwater vehicle. In this paper we briefly describe the theoretical design of a quantum imaging system that could allow the safe and stealthy navigation of underwater Arctic vehicles.

  14. Ethical Navigation in Leadership Training

    Directory of Open Access Journals (Sweden)

    Øyvind Kvalnes

    2012-05-01

    Full Text Available Business leaders frequently face dilemmas, circumstances where whatever course of action they choose, something of important value will be offended. How can an organisation prepare its decision makers for such situations? This article presents a pedagogical approach to dilemma training for business leaders and managers. It has evolved through ten years of experience with human resource development, where ethics has been an integral part of programs designed to help individuals to become excellent in their professional roles. The core element in our approach is The Navigation Wheel, a figure used to keep track of relevant decision factors. Feedback from participants indicates that dilemma training has helped them to recognise the ethical dimension of leadership. They respond that the tools and concepts are highly relevant in relation to the challenges that occur in the working environment they return to after leadership training.http://dx.doi.org/10.5324/eip.v6i1.1778

  15. Autonomous navigation system and method

    Science.gov (United States)

    Bruemmer, David J [Idaho Falls, ID; Few, Douglas A [Idaho Falls, ID

    2009-09-08

    A robot platform includes perceptors, locomotors, and a system controller, which executes instructions for autonomously navigating a robot. The instructions repeat, on each iteration through an event timing loop, the acts of defining an event horizon based on the robot's current velocity, detecting a range to obstacles around the robot, testing for an event horizon intrusion by determining if any range to the obstacles is within the event horizon, and adjusting rotational and translational velocity of the robot accordingly. If the event horizon intrusion occurs, rotational velocity is modified by a proportion of the current rotational velocity reduced by a proportion of the range to the nearest obstacle and translational velocity is modified by a proportion of the range to the nearest obstacle. If no event horizon intrusion occurs, translational velocity is set as a ratio of a speed factor relative to a maximum speed.

  16. Approaches to chemical synthetic biology.

    Science.gov (United States)

    Chiarabelli, Cristiano; Stano, Pasquale; Anella, Fabrizio; Carrara, Paolo; Luisi, Pier Luigi

    2012-07-16

    Synthetic biology is first represented in terms of two complementary aspects, the bio-engineering one, based on the genetic manipulation of extant microbial forms in order to obtain forms of life which do not exist in nature; and the chemical synthetic biology, an approach mostly based on chemical manipulation for the laboratory synthesis of biological structures that do not exist in nature. The paper is mostly devoted to shortly review chemical synthetic biology projects currently carried out in our laboratory. In particular, we describe: the minimal cell project, then the "Never Born Proteins" and lastly the Never Born RNAs. We describe and critically analyze the main results, emphasizing the possible relevance of chemical synthetic biology for the progress in basic science and biotechnology. Copyright © 2012 Federation of European Biochemical Societies. Published by Elsevier B.V. All rights reserved.

  17. Synthetic Biology for Specialty Chemicals.

    Science.gov (United States)

    Markham, Kelly A; Alper, Hal S

    2015-01-01

    In this review, we address recent advances in the field of synthetic biology and describe how those tools have been applied to produce a wide variety of chemicals in microorganisms. Here we classify the expansion of the synthetic biology toolbox into three different categories based on their primary function in strain engineering-for design, for construction, and for optimization. Next, focusing on recent years, we look at how chemicals have been produced using these new synthetic biology tools. Advances in producing fuels are briefly described, followed by a more thorough treatment of commodity chemicals, specialty chemicals, pharmaceuticals, and nutraceuticals. Throughout this review, an emphasis is placed on how synthetic biology tools are applied to strain engineering. Finally, we discuss organism and host strain diversity and provide a future outlook in the field.

  18. Is synthetic biology mechanical biology?

    Science.gov (United States)

    Holm, Sune

    2015-12-01

    A widespread and influential characterization of synthetic biology emphasizes that synthetic biology is the application of engineering principles to living systems. Furthermore, there is a strong tendency to express the engineering approach to organisms in terms of what seems to be an ontological claim: organisms are machines. In the paper I investigate the ontological and heuristic significance of the machine analogy in synthetic biology. I argue that the use of the machine analogy and the aim of producing rationally designed organisms does not necessarily imply a commitment to mechanical biology. The ideal of applying engineering principles to biology is best understood as expressing recognition of the machine-unlikeness of natural organisms and the limits of human cognition. The paper suggests an interpretation of the identification of organisms with machines in synthetic biology according to which it expresses a strategy for representing, understanding, and constructing living systems that are more machine-like than natural organisms.

  19. Adaptive Synthetic Forces: Situation Awareness

    National Research Council Canada - National Science Library

    Hill, Randall

    2001-01-01

    ...: perception, comprehension, and prediction. Building on these ideas, we developed techniques for improving the situation awareness in synthetic helicopter pilots for the ModSAF military simulation by giving them more human-like perception...

  20. Programming languages for synthetic biology.

    Science.gov (United States)

    Umesh, P; Naveen, F; Rao, Chanchala Uma Maheswara; Nair, Achuthsankar S

    2010-12-01

    In the backdrop of accelerated efforts for creating synthetic organisms, the nature and scope of an ideal programming language for scripting synthetic organism in-silico has been receiving increasing attention. A few programming languages for synthetic biology capable of defining, constructing, networking, editing and delivering genome scale models of cellular processes have been recently attempted. All these represent important points in a spectrum of possibilities. This paper introduces Kera, a state of the art programming language for synthetic biology which is arguably ahead of similar languages or tools such as GEC, Antimony and GenoCAD. Kera is a full-fledged object oriented programming language which is tempered by biopart rule library named Samhita which captures the knowledge regarding the interaction of genome components and catalytic molecules. Prominent feature of the language are demonstrated through a toy example and the road map for the future development of Kera is also presented.

  1. 76 FR 9646 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2011-02-22

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Parts 100, 117, 147, and 165 [USCG-2010-0399] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation Regulations and Regulated Navigation Areas AGENCY: Coast Guard, DHS. ACTION: Notice of expired temporary rules...

  2. Social Security Number Protection Laws: State-by-State Summary Table

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…

  3. 76 FR 63841 - Security Zone; Potomac River, Georgetown Channel, Washington, DC

    Science.gov (United States)

    2011-10-14

    ... effect from 6 a.m. until 6 p.m. on October 16, 2011. The security zone will include all navigable waters... security zone at the time it is in effect are to depart the zone immediately. To seek permission to transit... can better evaluate its effects on them and participate in the rulemaking process. Small businesses...

  4. Lighting system with thermal management system having point contact synthetic jets

    Science.gov (United States)

    Arik, Mehmet; Weaver, Stanton Earl; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Sharma, Rajdeep

    2013-12-10

    Lighting system having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system includes a plurality of synthetic jets. The synthetic jets are arranged within the lighting system such that they are secured at contact points.

  5. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  6. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  7. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  8. Freedom and Responsibility in Synthetic Genomics: The Synthetic Yeast Project.

    Science.gov (United States)

    Sliva, Anna; Yang, Huanming; Boeke, Jef D; Mathews, Debra J H

    2015-08-01

    First introduced in 2011, the Synthetic Yeast Genome (Sc2.0) PROJECT is a large international synthetic genomics project that will culminate in the first eukaryotic cell (Saccharomyces cerevisiae) with a fully synthetic genome. With collaborators from across the globe and from a range of institutions spanning from do-it-yourself biology (DIYbio) to commercial enterprises, it is important that all scientists working on this project are cognizant of the ethical and policy issues associated with this field of research and operate under a common set of principles. In this commentary, we survey the current ethics and regulatory landscape of synthetic biology and present the Sc2.0 Statement of Ethics and Governance to which all members of the project adhere. This statement focuses on four aspects of the Sc2.0 PROJECT: societal benefit, intellectual property, safety, and self-governance. We propose that such project-level agreements are an important, valuable, and flexible model of self-regulation for similar global, large-scale synthetic biology projects in order to maximize the benefits and minimize potential harms. Copyright © 2015 by the Genetics Society of America.

  9. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  10. SLS Model Based Design: A Navigation Perspective

    Science.gov (United States)

    Oliver, T. Emerson; Anzalone, Evan; Park, Thomas; Geohagan, Kevin

    2018-01-01

    The SLS Program has implemented a Model-based Design (MBD) and Model-based Requirements approach for managing component design information and system requirements. This approach differs from previous large-scale design efforts at Marshall Space Flight Center where design documentation alone conveyed information required for vehicle design and analysis and where extensive requirements sets were used to scope and constrain the design. The SLS Navigation Team is responsible for the Program-controlled Design Math Models (DMMs) which describe and represent the performance of the Inertial Navigation System (INS) and the Rate Gyro Assemblies (RGAs) used by Guidance, Navigation, and Controls (GN&C). The SLS Navigation Team is also responsible for navigation algorithms. The navigation algorithms are delivered for implementation on the flight hardware as a DMM. For the SLS Block 1B design, the additional GPS Receiver hardware model is managed as a DMM at the vehicle design level. This paper describes the models, and discusses the processes and methods used to engineer, design, and coordinate engineering trades and performance assessments using SLS practices as applied to the GN&C system, with a particular focus on the navigation components.

  11. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  12. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  13. Integration of a 3D perspective view in the navigation display: featuring pilot's mental model

    Science.gov (United States)

    Ebrecht, L.; Schmerwitz, S.

    2015-05-01

    Synthetic vision systems (SVS) appear as spreading technology in the avionic domain. Several studies prove enhanced situational awareness when using synthetic vision. Since the introduction of synthetic vision a steady change and evolution started concerning the primary flight display (PFD) and the navigation display (ND). The main improvements of the ND comprise the representation of colored ground proximity warning systems (EGPWS), weather radar, and TCAS information. Synthetic vision seems to offer high potential to further enhance cockpit display systems. Especially, concerning the current trend having a 3D perspective view in a SVS-PFD while leaving the navigational content as well as methods of interaction unchanged the question arouses if and how the gap between both displays might evolve to a serious problem. This issue becomes important in relation to the transition and combination of strategic and tactical flight guidance. Hence, pros and cons of 2D and 3D views generally as well as the gap between the egocentric perspective 3D view of the PFD and the exocentric 2D top and side view of the ND will be discussed. Further a concept for the integration of a 3D perspective view, i.e., bird's eye view, in synthetic vision ND will be presented. The combination of 2D and 3D views in the ND enables a better correlation of the ND and the PFD. Additionally, this supports the building of pilot's mental model. The authors believe it will improve the situational and spatial awareness. It might prove to further raise the safety margin when operating in mountainous areas.

  14. Navigating nuclear science: Enhancing analysis through visualization

    Energy Technology Data Exchange (ETDEWEB)

    Irwin, N.H.; Berkel, J. van; Johnson, D.K.; Wylie, B.N.

    1997-09-01

    Data visualization is an emerging technology with high potential for addressing the information overload problem. This project extends the data visualization work of the Navigating Science project by coupling it with more traditional information retrieval methods. A citation-derived landscape was augmented with documents using a text-based similarity measure to show viability of extension into datasets where citation lists do not exist. Landscapes, showing hills where clusters of similar documents occur, can be navigated, manipulated and queried in this environment. The capabilities of this tool provide users with an intuitive explore-by-navigation method not currently available in today`s retrieval systems.

  15. Meeting Report: Synthetic Biology Jamboree for Undergraduates

    Science.gov (United States)

    Campbell, A. Malcolm

    2005-01-01

    The field of synthetic biology (the name is derived from an analogy to synthetic chemistry) has recognized itself as a "field" only since about 2002. Synthetic biology has gotten some high-profile attention recently, but most people are not aware the field even exists. Synthetic biologists apply engineering principles to genomic circuits to…

  16. Positioning navigation and timing service applications in cyber physical systems

    Science.gov (United States)

    Qu, Yi; Wu, Xiaojing; Zeng, Lingchuan

    2017-10-01

    The positioning navigation and timing (PNT) architecture was discussed in detail, whose history, evolvement, current status and future plan were presented, main technologies were listed, advantages and limitations of most technologies were compared, novel approaches were introduced, and future capacities were sketched. The concept of cyber-physical system (CPS) was described and their primary features were interpreted. Then the three-layer architecture of CPS was illustrated. Next CPS requirements on PNT services were analyzed, including requirements on position reference and time reference, requirements on temporal-spatial error monitor, requirements on dynamic services, real-time services, autonomous services, security services and standard services. Finally challenges faced by PNT applications in CPS were concluded. The conclusion was expected to facilitate PNT applications in CPS, and furthermore to provide references to the design and implementation of both architectures.

  17. Synthetic biology, metaphors and responsibility.

    Science.gov (United States)

    McLeod, Carmen; Nerlich, Brigitte

    2017-08-29

    Metaphors are not just decorative rhetorical devices that make speech pretty. They are fundamental tools for thinking about the world and acting on the world. The language we use to make a better world matters; words matter; metaphors matter. Words have consequences - ethical, social and legal ones, as well as political and economic ones. They need to be used 'responsibly'. They also need to be studied carefully - this is what we want to do through this editorial and the related thematic collection. In the context of synthetic biology, natural and social scientists have become increasingly interested in metaphors, a wave of interest that we want to exploit and amplify. We want to build on emerging articles and books on synthetic biology, metaphors of life and the ethical and moral implications of such metaphors. This editorial provides a brief introduction to synthetic biology and responsible innovation, as well as a comprehensive review of literature on the social, cultural and ethical impacts of metaphor use in genomics and synthetic biology. Our aim is to stimulate an interdisciplinary and international discussion on the impact that metaphors can have on science, policy and publics in the context of synthetic biology.

  18. Content metamorphosis in synthetic holography

    International Nuclear Information System (INIS)

    Desbiens, Jacques

    2013-01-01

    A synthetic hologram is an optical system made of hundreds of images amalgamated in a structure of holographic cells. Each of these images represents a point of view on a three-dimensional space which makes us consider synthetic holography as a multiple points of view perspective system. In the composition of a computer graphics scene for a synthetic hologram, the field of view of the holographic image can be divided into several viewing zones. We can attribute these divisions to any object or image feature independently and operate different transformations on image content. In computer generated holography, we tend to consider content variations as a continuous animation much like a short movie. However, by composing sequential variations of image features in relation with spatial divisions, we can build new narrative forms distinct from linear cinematographic narration. When observers move freely and change their viewing positions, they travel from one field of view division to another. In synthetic holography, metamorphoses of image content are within the observer's path. In all imaging Medias, the transformation of image features in synchronisation with the observer's position is a rare occurrence. However, this is a predominant characteristic of synthetic holography. This paper describes some of my experimental works in the development of metamorphic holographic images.

  19. Control theory meets synthetic biology.

    Science.gov (United States)

    Del Vecchio, Domitilla; Dy, Aaron J; Qian, Yili

    2016-07-01

    The past several years have witnessed an increased presence of control theoretic concepts in synthetic biology. This review presents an organized summary of how these control design concepts have been applied to tackle a variety of problems faced when building synthetic biomolecular circuits in living cells. In particular, we describe success stories that demonstrate how simple or more elaborate control design methods can be used to make the behaviour of synthetic genetic circuits within a single cell or across a cell population more reliable, predictable and robust to perturbations. The description especially highlights technical challenges that uniquely arise from the need to implement control designs within a new hardware setting, along with implemented or proposed solutions. Some engineering solutions employing complex feedback control schemes are also described, which, however, still require a deeper theoretical analysis of stability, performance and robustness properties. Overall, this paper should help synthetic biologists become familiar with feedback control concepts as they can be used in their application area. At the same time, it should provide some domain knowledge to control theorists who wish to enter the rising and exciting field of synthetic biology. © 2016 The Author(s).

  20. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  1. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  2. Venous catheterization with ultrasound navigation

    International Nuclear Information System (INIS)

    Kasatkin, A. A.; Nigmatullina, A. R.; Urakov, A. L.

    2015-01-01

    By ultrasound scanning it was determined that respiratory movements made by chest of healthy and sick person are accompanied by respiratory chest rise of internal jugular veins. During the exhalation of an individual diameter of his veins increases and during the breath it decreases down to the complete disappearing if their lumen. Change of the diameter of internal jugular veins in different phases can influence significantly the results of vein puncture and cauterization in patients. The purpose of this research is development of the method increasing the efficiency and safety of cannulation of internal jugular veins by the ultrasound visualization. We suggested the method of catheterization of internal jugular veins by the ultrasound navigation during the execution of which the puncture of venous wall by puncture needle and the following conduction of J-guide is carried out at the moment of patient’s exhalation. This method decreases the risk of complications development during catheterization of internal jugular vein due to exclusion of perforating wound of vein and subjacent tissues and anatomical structures

  3. Venous catheterization with ultrasound navigation

    Energy Technology Data Exchange (ETDEWEB)

    Kasatkin, A. A., E-mail: ant-kasatkin@yandex.ru; Nigmatullina, A. R. [Izhevsk State Medical Academy, Kommunarov street, 281, Izhevsk, Russia, 426034 (Russian Federation); Urakov, A. L., E-mail: ant-kasatkin@yandex.ru [Institute of Mechanics Ural Branch of Russian Academy of Sciences, T.Baramzinoy street 34, Izhevsk, Russia, 426067, Izhevsk (Russian Federation); Izhevsk State Medical Academy, Kommunarov street, 281, Izhevsk, Russia, 426034 (Russian Federation)

    2015-11-17

    By ultrasound scanning it was determined that respiratory movements made by chest of healthy and sick person are accompanied by respiratory chest rise of internal jugular veins. During the exhalation of an individual diameter of his veins increases and during the breath it decreases down to the complete disappearing if their lumen. Change of the diameter of internal jugular veins in different phases can influence significantly the results of vein puncture and cauterization in patients. The purpose of this research is development of the method increasing the efficiency and safety of cannulation of internal jugular veins by the ultrasound visualization. We suggested the method of catheterization of internal jugular veins by the ultrasound navigation during the execution of which the puncture of venous wall by puncture needle and the following conduction of J-guide is carried out at the moment of patient’s exhalation. This method decreases the risk of complications development during catheterization of internal jugular vein due to exclusion of perforating wound of vein and subjacent tissues and anatomical structures.

  4. Qatari Women Navigating Gendered Space

    Directory of Open Access Journals (Sweden)

    Krystyna Golkowska

    2017-10-01

    Full Text Available ADespite growing interest in the lived experience of Muslim women in Arab countries, there is still a dearth of studies on the Gulf region. This article focuses on Qatar, a Gulf Corporation Council (GCC country, to explore its changing sociocultural landscape and reflect on Qatari women’s agency within the framework of the traditional gendered space model. Applying Grounded Theory methodology to data collected from a variety of scholarly and non-scholarly sources, the author offers a themed overview of factors that facilitate and constrain Qatari women’s mobility. The findings testify to a significant increase in female presence and visibility in the public sphere—specifically in the spaces of education, employment, and sports. They also show that young Qatari women exercise agency through navigating the existing systems rather than question traditional socio-cultural norms. The paper identifies this search for a middle ground between tradition and modernity and its ideological underpinnings as the area of future research that should be led by Qatari women themselves.

  5. ANALYSIS OF FREE ROUTE AIRSPACE AND PERFORMANCE BASED NAVIGATION IMPLEMENTATION IN THE EUROPEAN AIR NAVIGATION SYSTEM

    Directory of Open Access Journals (Sweden)

    Svetlana Pavlova

    2014-12-01

    Full Text Available European Air Traffic Management system requires continuous improvements as air traffic is increasingday by day. For this purpose it was developed by international organizations Free Route Airspace and PerformanceBased Navigation concepts that allow to offer a required level of safety, capacity, environmental performance alongwith cost-effectiveness. The aim of the article is to provide detailed analysis of Free Route Airspace and PerformanceBased Navigation implementation status within European region including Ukrainian air navigation system.

  6. Real-time precision pedestrian navigation solution using Inertial Navigation System and Global Positioning System

    OpenAIRE

    Yong-Jin Yoon; King Ho Holden Li; Jiahe Steven Lee; Woo-Tae Park

    2015-01-01

    Global Positioning System and Inertial Navigation System can be used to determine position and velocity. A Global Positioning System module is able to accurately determine position without sensor drift, but its usage is limited in heavily urbanized environments and heavy vegetation. While high-cost tactical-grade Inertial Navigation System can determine position accurately, low-cost micro-electro-mechanical system Inertial Navigation System sensors are plagued by significant errors. Global Po...

  7. Microfluidic Technologies for Synthetic Biology

    Directory of Open Access Journals (Sweden)

    Sung Kuk Lee

    2011-06-01

    Full Text Available Microfluidic technologies have shown powerful abilities for reducing cost, time, and labor, and at the same time, for increasing accuracy, throughput, and performance in the analysis of biological and biochemical samples compared with the conventional, macroscale instruments. Synthetic biology is an emerging field of biology and has drawn much attraction due to its potential to create novel, functional biological parts and systems for special purposes. Since it is believed that the development of synthetic biology can be accelerated through the use of microfluidic technology, in this review work we focus our discussion on the latest microfluidic technologies that can provide unprecedented means in synthetic biology for dynamic profiling of gene expression/regulation with high resolution, highly sensitive on-chip and off-chip detection of metabolites, and whole-cell analysis.

  8. Synthetic neurosteroids on brain protection

    Directory of Open Access Journals (Sweden)

    Mariana Rey

    2015-01-01

    Full Text Available Neurosteroids, like allopregnanolone and pregnanolone, are endogenous regulators of neuronal excitability. Inside the brain, they are highly selective and potent modulators of GABA A receptor activity. Their anticonvulsant, anesthetics and anxiolytic properties are useful for the treatments of several neurological and psychiatric disorders via reducing the risks of side effects obtained with the commercial drugs. The principal disadvantages of endogenous neurosteroids administration are their rapid metabolism and their low oral bioavailability. Synthetic steroids analogues with major stability or endogenous neurosteroids stimulation synthesis might constitute promising novel strategies for the treatment of several disorders. Numerous studies indicate that the 3α-hydroxyl configuration is the key for binding and activity, but modifications in the steroid nucleus may emphasize different pharmacophores. So far, several synthetic steroids have been developed with successful neurosteroid-like effects. In this work, we summarize the properties of various synthetic steroids probed in trials throughout the analysis of several neurosteroids-like actions.

  9. Smart parking management and navigation system

    KAUST Repository

    Saadeldin, Mohamed

    2017-01-01

    Various examples are provided for smart parking management, which can include navigation. In one example, a system includes a base station controller configured to: receive a wireless signal from a parking controller located at a parking space

  10. Challenges in navigational strategies for flexible endoscopy

    NARCIS (Netherlands)

    van der Stap, N.; van der Heijden, Ferdinand; Broeders, Ivo Adriaan Maria Johannes

    Automating flexible endoscope navigation could lead to an increase in patient safety for endoluminal therapeutic procedures. Additionally, it may decrease the costs of diagnostic flexible endoscope procedures by shortening the learning curve and increasing the efficiency of insertion. Earlier

  11. Fuzzy Logic Controller for Small Satellites Navigation

    National Research Council Canada - National Science Library

    Della Pietra, G; Falzini, S; Colzi, E; Crisconio, M

    2005-01-01

    .... The navigator aims at operating satellites in orbit with a minimum ground support and very good performances, by the adoption of innovative technologies, such as attitude observation GPS, attitude...

  12. From Navigation to Star Hopping: Forgotten Formulae

    Indian Academy of Sciences (India)

    IAS Admin

    Mathematics and wrote a book Navigation and Nautical Astronomy for Sea-men in 1821 with tables ... and arcseconds. The reference ... Roger W Sinnott, an astronomy graduate from Harvard, served on the editorial board of the monthly ...

  13. Comprehension and navigation of networked hypertexts

    NARCIS (Netherlands)

    Blom, Helen; Segers, Eliane; Knoors, Harry; Hermans, Daan; Verhoeven, Ludo

    2018-01-01

    This study aims to investigate secondary school students' reading comprehension and navigation of networked hypertexts with and without a graphic overview compared to linear digital texts. Additionally, it was studied whether prior knowledge, vocabulary, verbal, and visual working memory moderated

  14. 78 FR 68077 - Navigation Safety Advisory Council

    Science.gov (United States)

    2013-11-13

    ... Privacy Act notice regarding our public dockets in the January 17, 2008, issue of the Federal Register (73... commence in calendar year 2014. (4) Navigation Rules Regulatory Project. The Council will receive an update...

  15. Navigation with a passive brain based interface

    NARCIS (Netherlands)

    Erp, J.B.F. van; Werkhoven, P.J.; Thurlings, M.E.; Brouwer, A.-M.

    2009-01-01

    In this paper, we describe a Brain Computer Interface (BCI) for navigation. The system is based on detecting brain signals that are elicited by tactile stimulation on the torso indicating the desired direction.

  16. Mars rover local navigation and hazard avoidance

    Science.gov (United States)

    Wilcox, B. H.; Gennery, D. B.; Mishkin, A. H.

    1989-01-01

    A Mars rover sample return mission has been proposed for the late 1990's. Due to the long speed-of-light delays between earth and Mars, some autonomy on the rover is highly desirable. JPL has been conducting research in two possible modes of rover operation, Computer-Aided Remote Driving and Semiautonomous Navigation. A recently-completed research program used a half-scale testbed vehicle to explore several of the concepts in semiautonomous navigation. A new, full-scale vehicle with all computational and power resources on-board will be used in the coming year to demonstrate relatively fast semiautonomous navigation. The computational and power requirements for Mars rover local navigation and hazard avoidance are discussed.

  17. Onboard Optical Navigation Measurement Processing in GEONS

    Data.gov (United States)

    National Aeronautics and Space Administration — Optical Navigation (OpNav) measurements derived from spacecraft-based images are a powerful data type in the precision orbit determination process.  OpNav...

  18. NOAA Seamless Raster Navigational Charts (RNC)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The NOAA Seamless Raster Chart Server provides a seamless collarless mosaic of the NOAA Raster Navigational Charts (RNC). The RNC are a collection of approximately...

  19. Synthetic biology as red herring.

    Science.gov (United States)

    Preston, Beth

    2013-12-01

    It has become commonplace to say that with the advent of technologies like synthetic biology the line between artifacts and living organisms, policed by metaphysicians since antiquity, is beginning to blur. But that line began to blur 10,000 years ago when plants and animals were first domesticated; and has been thoroughly blurred at least since agriculture became the dominant human subsistence pattern many millennia ago. Synthetic biology is ultimately only a late and unexceptional offshoot of this prehistoric development. From this perspective, then, synthetic biology is a red herring, distracting us from more thorough philosophical consideration of the most truly revolutionary human practice-agriculture. In the first section of this paper I will make this case with regard to ontology, arguing that synthetic biology crosses no ontological lines that were not crossed already in the Neolithic. In the second section I will construct a parallel case with regard to cognition, arguing that synthetic biology as biological engineering represents no cognitive advance over what was required for domestication and the new agricultural subsistence pattern it grounds. In the final section I will make the case with regard to human existence, arguing that synthetic biology, even if wildly successful, is not in a position to cause significant existential change in what it is to be human over and above the massive existential change caused by the transition to agriculture. I conclude that a longer historical perspective casts new light on some important issues in philosophy of technology and environmental philosophy. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. US Competitiveness in Synthetic Biology.

    Science.gov (United States)

    Gronvall, Gigi Kwik

    2015-01-01

    Synthetic biology is an emerging technical field that aims to make biology easier to engineer; the field has applications in strategically important sectors for the US economy. While the United States currently leads in synthetic biology R&D, other nations are heavily investing in order to boost their economies, which will inevitably diminish the US leadership position. This outcome is not entirely negative--additional investments will expand markets--but it is critical that the US government take steps to remain competitive: There are applications from which the US population and economy may benefit; there are specific applications with importance for national defense; and US technical leadership will ensure that US experts have a leading role in synthetic biology governance, regulation, and oversight. Measures to increase competitiveness in S&T generally are broadly applicable for synthetic biology and should be pursued. However, the US government will also need to take action on fundamental issues that will affect the field's development, such as countering anti-GMO (genetically modified organism) sentiments and anti-GMO legislation. The United States should maintain its regulatory approach so that it is the product that is regulated, not the method used to create a product. At the same time, the United States needs to ensure that the regulatory framework is updated so that synthetic biology products do not fall into regulatory gaps. Finally, the United States needs to pay close attention to how synthetic biology applications may be governed internationally, such as through the Nagoya Protocol of the Convention on Biological Diversity, so that beneficial applications may be realized.

  1. Neurobiologically inspired mobile robot navigation and planning

    Directory of Open Access Journals (Sweden)

    Mathias Quoy

    2007-11-01

    Full Text Available After a short review of biologically inspired navigation architectures, mainly relying on modeling the hippocampal anatomy, or at least some of its functions, we present a navigation and planning model for mobile robots. This architecture is based on a model of the hippocampal and prefrontal interactions. In particular, the system relies on the definition of a new cell type “transition cells” that encompasses traditional “place cells”.

  2. Unraveling navigational strategies in migratory insects

    OpenAIRE

    Merlin, Christine; Heinze, Stanley; Reppert, Steven M.

    2011-01-01

    Long-distance migration is a strategy some animals use to survive a seasonally changing environment. To reach favorable grounds, migratory animals have evolved sophisticated navigational mechanisms that rely on a map and compasses. In migratory insects, the existence of a map sense (sense of position) remains poorly understood, but recent work has provided new insights into the mechanisms some compasses use for maintaining a constant bearing during long-distance navigation. The best-studied d...

  3. Magnetic navigation and tracking of underwater vehicles

    Digital Repository Service at National Institute of Oceanography (India)

    Teixeira, F.C.; Pascoal, A.M.

    for the navigation of AUVs has been proposed many years ago but the concept still requires practical demonstration. Implementation issues One of the advantages of mag- netic navigation consists in being passive and economical in terms of energy. Magnetic sensors do... like the present one, that require magnetic measurements with very high precision. A typical solution to this problem consists in the placement of magnetic sensors as far away as possible from the sources of noise but this may not be practical...

  4. Navigational Strategies of Migrating Monarch Butterflies

    Science.gov (United States)

    2014-11-10

    AFRL-OSR-VA-TR-2014-0339 NAVIGATIONAL STRATEGIES OF MIGRATING MONARCH BUTTERFLIES Steven Reppert UNIVERSITY OF MASSACHUSETTS Final Report 11/10/2014...Final Progress Statement to (Dr. Patrick Bradshaw) Contract/Grant Title: Navigational Strategies of Migrating Monarch Butterflies Contract...Grant #: FA9550-10-1-0480 Reporting Period: 01-Sept-10 to 31-Aug-14 Overview of accomplishments: Migrating monarch butterflies (Danaus

  5. Clinical applications of virtual navigation bronchial intervention.

    Science.gov (United States)

    Kajiwara, Naohiro; Maehara, Sachio; Maeda, Junichi; Hagiwara, Masaru; Okano, Tetsuya; Kakihana, Masatoshi; Ohira, Tatsuo; Kawate, Norihiko; Ikeda, Norihiko

    2018-01-01

    In patients with bronchial tumors, we frequently consider endoscopic treatment as the first treatment of choice. All computed tomography (CT) must satisfy several conditions necessary to analyze images by Synapse Vincent. To select safer and more precise approaches for patients with bronchial tumors, we determined the indications and efficacy of virtual navigation intervention for the treatment of bronchial tumors. We examined the efficacy of virtual navigation bronchial intervention for the treatment of bronchial tumors located at a variety of sites in the tracheobronchial tree using a high-speed 3-dimensional (3D) image analysis system, Synapse Vincent. Constructed images can be utilized to decide on the simulation and interventional strategy as well as for navigation during interventional manipulation in two cases. Synapse Vincent was used to determine the optimal planning of virtual navigation bronchial intervention. Moreover, this system can detect tumor location and alsodepict surrounding tissues, quickly, accurately, and safely. The feasibility and safety of Synapse Vincent in performing useful preoperative simulation and navigation of surgical procedures can lead to safer, more precise, and less invasion for the patient, and makes it easy to construct an image, depending on the purpose, in 5-10 minutes using Synapse Vincent. Moreover, if the lesion is in the parenchyma or sub-bronchial lumen, it helps to perform simulation with virtual skeletal subtraction to estimate potential lesion movement. By using virtual navigation system for simulation, bronchial intervention was performed with no complications safely and precisely. Preoperative simulation using virtual navigation bronchial intervention reduces the surgeon's stress levels, particularly when highly skilled techniques are needed to operate on lesions. This task, including both preoperative simulation and intraoperative navigation, leads to greater safety and precision. These technological instruments

  6. Shape Perception and Navigation in Blind Adults

    Science.gov (United States)

    Gori, Monica; Cappagli, Giulia; Baud-Bovy, Gabriel; Finocchietti, Sara

    2017-01-01

    Different sensory systems interact to generate a representation of space and to navigate. Vision plays a critical role in the representation of space development. During navigation, vision is integrated with auditory and mobility cues. In blind individuals, visual experience is not available and navigation therefore lacks this important sensory signal. In blind individuals, compensatory mechanisms can be adopted to improve spatial and navigation skills. On the other hand, the limitations of these compensatory mechanisms are not completely clear. Both enhanced and impaired reliance on auditory cues in blind individuals have been reported. Here, we develop a new paradigm to test both auditory perception and navigation skills in blind and sighted individuals and to investigate the effect that visual experience has on the ability to reproduce simple and complex paths. During the navigation task, early blind, late blind and sighted individuals were required first to listen to an audio shape and then to recognize and reproduce it by walking. After each audio shape was presented, a static sound was played and the participants were asked to reach it. Movements were recorded with a motion tracking system. Our results show three main impairments specific to early blind individuals. The first is the tendency to compress the shapes reproduced during navigation. The second is the difficulty to recognize complex audio stimuli, and finally, the third is the difficulty in reproducing the desired shape: early blind participants occasionally reported perceiving a square but they actually reproduced a circle during the navigation task. We discuss these results in terms of compromised spatial reference frames due to lack of visual input during the early period of development. PMID:28144226

  7. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  8. Effects of Visual, Auditory, and Tactile Navigation Cues on Navigation Performance, Situation Awareness, and Mental Workload

    National Research Council Canada - National Science Library

    Davis, Bradley M

    2007-01-01

    .... Results from both experiments indicate that augmented visual displays reduced time to complete navigation, maintained situation awareness, and drastically reduced mental workload in comparison...

  9. Synthetic Phage for Tissue Regeneration

    Directory of Open Access Journals (Sweden)

    So Young Yoo

    2014-01-01

    Full Text Available Controlling structural organization and signaling motif display is of great importance to design the functional tissue regenerating materials. Synthetic phage, genetically engineered M13 bacteriophage has been recently introduced as novel tissue regeneration materials to display a high density of cell-signaling peptides on their major coat proteins for tissue regeneration purposes. Structural advantages of their long-rod shape and monodispersity can be taken together to construct nanofibrous scaffolds which support cell proliferation and differentiation as well as direct orientation of their growth in two or three dimensions. This review demonstrated how functional synthetic phage is designed and subsequently utilized for tissue regeneration that offers potential cell therapy.

  10. Synthetic biology and its promises

    Directory of Open Access Journals (Sweden)

    José Manuel De Cózar Escalante

    2016-12-01

    Full Text Available Synthetic biology is a new science and emerging technology, or rather a technoscience, which converges with others such as nanotechnology, information technology, robotics, artificial intelligence and neuroscience. All have common features that could have highly concerning social and environmental impacts. With its ambitious goals of controlling complexity, redesigning and creating new living entities, synthetic biology perfectly exemplifies the new bioeconomic reality. This requires expanding the focus of the discussion beyond the limited comparative analysis of risks and benefits, to address uncertainties, reassign responsibilities and initiate a thorough social assessment of what is at stake.

  11. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  12. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  13. National Positioning, Navigation, and Timing Architecture Study

    Science.gov (United States)

    van Dyke, K.; Vicario, J.; Hothem, L.

    2007-12-01

    The purpose of the National Positioning, Navigation and Timing (PNT) Architecture effort is to help guide future PNT system-of-systems investment and implementation decisions. The Assistant Secretary of Defense for Networks and Information Integration and the Under Secretary of Transportation for Policy sponsored a National PNT Architecture study to provide more effective and efficient PNT capabilities focused on the 2025 timeframe and an evolutionary path for government provided systems and services. U.S. Space-Based PNT Policy states that the U.S. must continue to improve and maintain GPS, augmentations to GPS, and back-up capabilities to meet growing national, homeland, and economic security needs. PNT touches almost every aspect of people´s lives today. PNT is essential for Defense and Civilian applications ranging from the Department of Defense´s Joint network centric and precision operations to the transportation and telecommunications sectors, improving efficiency, increasing safety, and being more productive. Absence of an approved PNT architecture results in uncoordinated research efforts, lack of clear developmental paths, potentially wasteful procurements and inefficient deployment of PNT resources. The national PNT architecture effort evaluated alternative future mixes of global (space and non space-based) and regional PNT solutions, PNT augmentations, and autonomous PNT capabilities to address priorities identified in the DoD PNT Joint Capabilities Document (JCD) and civil equivalents. The path to achieving the Should-Be architecture is described by the National PNT Architecture's Guiding Principles, representing an overarching Vision of the US' role in PNT, an architectural Strategy to fulfill that Vision, and four Vectors which support the Strategy. The National PNT Architecture effort has developed nineteen recommendations. Five foundational recommendations are tied directly to the Strategy while the remaining fourteen individually support one of

  14. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  15. Fuzzy Behavior Modulation with Threshold Activation for Autonomous Vehicle Navigation

    Science.gov (United States)

    Tunstel, Edward

    2000-01-01

    This paper describes fuzzy logic techniques used in a hierarchical behavior-based architecture for robot navigation. An architectural feature for threshold activation of fuzzy-behaviors is emphasized, which is potentially useful for tuning navigation performance in real world applications. The target application is autonomous local navigation of a small planetary rover. Threshold activation of low-level navigation behaviors is the primary focus. A preliminary assessment of its impact on local navigation performance is provided based on computer simulations.

  16. Orion Optical Navigation Progress Toward Exploration Mission 1

    Science.gov (United States)

    Holt, Greg N.; D'Souza, Christopher N.; Saley, David

    2018-01-01

    Optical navigation of human spacecraft was proposed on Gemini and implemented successfully on Apollo as a means of autonomously operating the vehicle in the event of lost communication with controllers on Earth. The Orion emergency return system utilizing optical navigation has matured in design over the last several years, and is currently undergoing the final implementation and test phase in preparation for Exploration Mission 1 (EM-1) in 2019. The software development is past its Critical Design Review, and is progressing through test and certification for human rating. The filter architecture uses a square-root-free UDU covariance factorization. Linear Covariance Analysis (LinCov) was used to analyze the measurement models and the measurement error models on a representative EM-1 trajectory. The Orion EM-1 flight camera was calibrated at the Johnson Space Center (JSC) electro-optics lab. To permanently stake the focal length of the camera a 500 mm focal length refractive collimator was used. Two Engineering Design Unit (EDU) cameras and an EDU star tracker were used for a live-sky test in Denver. In-space imagery with high-fidelity truth metadata is rare so these live-sky tests provide one of the closest real-world analogs to operational use. A hardware-in-the-loop test rig was developed in the Johnson Space Center Electro-Optics Lab to exercise the OpNav system prior to integrated testing on the Orion vehicle. The software is verified with synthetic images. Several hundred off-nominal images are also used to analyze robustness and fault detection in the software. These include effects such as stray light, excess radiation damage, and specular reflections, and are used to help verify the tuning parameters chosen for the algorithms such as earth atmosphere bias, minimum pixel intensity, and star detection thresholds.

  17. Where Synthetic Biology Meets ET

    Science.gov (United States)

    Rothschild, Lynn J.

    2016-01-01

    Synthetic biology - the design and construction of new biological parts and systems and the redesign of existing ones for useful purposes - has the potential to transform fields from pharmaceuticals to fuels. Our lab has focused on the potential of synthetic biology to revolutionize all three major parts of astrobiology: Where do we come from? Where are we going? and Are we alone? For the first and third, synthetic biology is allowing us to answer whether the evolutionary narrative that has played out on planet earth is likely to have been unique or universal. For example, in our lab we are re-evolving the biosynthetic pathways of amino acids in order to understand potential capabilities of an early organism with a limited repertoire of amino acids and developing techniques for the recovery of metals from spent electronics on other planetary bodies. And what about the limits for life? Can we create organisms that expand the envelope for life? In the future synthetic biology will play an increasing role in human activities both on earth, in fields as diverse as human health and the industrial production of novel bio-composites. Beyond earth, we will rely increasingly on biologically-provided life support, as we have throughout our evolutionary history. In order to do this, the field will build on two of the great contributions of astrobiology: studies of the origin of life and life in extreme environments.

  18. Stereoscopy in cinematographic synthetic imagery

    Science.gov (United States)

    Eisenmann, Jonathan; Parent, Rick

    2009-02-01

    In this paper we present experiments and results pertaining to the perception of depth in stereoscopic viewing of synthetic imagery. In computer animation, typical synthetic imagery is highly textured and uses stylized illumination of abstracted material models by abstracted light source models. While there have been numerous studies concerning stereoscopic capabilities, conventions for staging and cinematography in stereoscopic movies have not yet been well-established. Our long-term goal is to measure the effectiveness of various cinematography techniques on the human visual system in a theatrical viewing environment. We would like to identify the elements of stereoscopic cinema that are important in terms of enhancing the viewer's understanding of a scene as well as providing guidelines for the cinematographer relating to storytelling. In these experiments we isolated stereoscopic effects by eliminating as many other visual cues as is reasonable. In particular, we aim to empirically determine what types of movement in synthetic imagery affect the perceptual depth sensing capabilities of our viewers. Using synthetic imagery, we created several viewing scenarios in which the viewer is asked to locate a target object's depth in a simple environment. The scenarios were specifically designed to compare the effectiveness of stereo viewing, camera movement, and object motion in aiding depth perception. Data were collected showing the error between the choice of the user and the actual depth value, and patterns were identified that relate the test variables to the viewer's perceptual depth accuracy in our theatrical viewing environment.

  19. Synthetic biology meets tissue engineering.

    Science.gov (United States)

    Davies, Jamie A; Cachat, Elise

    2016-06-15

    Classical tissue engineering is aimed mainly at producing anatomically and physiologically realistic replacements for normal human tissues. It is done either by encouraging cellular colonization of manufactured matrices or cellular recolonization of decellularized natural extracellular matrices from donor organs, or by allowing cells to self-organize into organs as they do during fetal life. For repair of normal bodies, this will be adequate but there are reasons for making unusual, non-evolved tissues (repair of unusual bodies, interface to electromechanical prostheses, incorporating living cells into life-support machines). Synthetic biology is aimed mainly at engineering cells so that they can perform custom functions: applying synthetic biological approaches to tissue engineering may be one way of engineering custom structures. In this article, we outline the 'embryological cycle' of patterning, differentiation and morphogenesis and review progress that has been made in constructing synthetic biological systems to reproduce these processes in new ways. The state-of-the-art remains a long way from making truly synthetic tissues, but there are now at least foundations for future work. © 2016 Authors; published by Portland Press Limited.

  20. Shock compression of synthetic opal

    International Nuclear Information System (INIS)

    Inoue, A; Okuno, M; Okudera, H; Mashimo, T; Omurzak, E; Katayama, S; Koyano, M

    2010-01-01

    Structural change of synthetic opal by shock-wave compression up to 38.1 GPa has been investigated by using SEM, X-ray diffraction method (XRD), Infrared (IR) and Raman spectroscopies. Obtained information may indicate that the dehydration and polymerization of surface silanole due to high shock and residual temperature are very important factors in the structural evolution of synthetic opal by shock compression. Synthetic opal loses opalescence by 10.9 and 18.4 GPa of shock pressures. At 18.4 GPa, dehydration and polymerization of surface silanole and transformation of network structure may occur simultaneously. The 4-membered ring of TO 4 tetrahedrons in as synthetic opal may be relaxed to larger ring such as 6-membered ring by high residual temperature. Therefore, the residual temperature may be significantly high at even 18.4 GPa of shock compression. At 23.9 GPa, opal sample recovered the opalescence. Origin of this opalescence may be its layer structure by shock compression. Finally, sample fuse by very high residual temperature at 38.1 GPa and the structure closes to that of fused SiO 2 glass. However, internal silanole groups still remain even at 38.1 GPa.

  1. Assessment of synthetic image fidelity

    Science.gov (United States)

    Mitchell, Kevin D.; Moorhead, Ian R.; Gilmore, Marilyn A.; Watson, Graham H.; Thomson, Mitch; Yates, T.; Troscianko, Tomasz; Tolhurst, David J.

    2000-07-01

    Computer generated imagery is increasingly used for a wide variety of purposes ranging from computer games to flight simulators to camouflage and sensor assessment. The fidelity required for this imagery is dependent on the anticipated use - for example when used for camouflage design it must be physically correct spectrally and spatially. The rendering techniques used will also depend upon the waveband being simulated, spatial resolution of the sensor and the required frame rate. Rendering of natural outdoor scenes is particularly demanding, because of the statistical variation in materials and illumination, atmospheric effects and the complex geometric structures of objects such as trees. The accuracy of the simulated imagery has tended to be assessed subjectively in the past. First and second order statistics do not capture many of the essential characteristics of natural scenes. Direct pixel comparison would impose an unachievable demand on the synthetic imagery. For many applications, such as camouflage design, it is important that nay metrics used will work in both visible and infrared wavebands. We are investigating a variety of different methods of comparing real and synthetic imagery and comparing synthetic imagery rendered to different levels of fidelity. These techniques will include neural networks (ICA), higher order statistics and models of human contrast perception. This paper will present an overview of the analyses we have carried out and some initial results along with some preliminary conclusions regarding the fidelity of synthetic imagery.

  2. Shock compression of synthetic opal

    Science.gov (United States)

    Inoue, A.; Okuno, M.; Okudera, H.; Mashimo, T.; Omurzak, E.; Katayama, S.; Koyano, M.

    2010-03-01

    Structural change of synthetic opal by shock-wave compression up to 38.1 GPa has been investigated by using SEM, X-ray diffraction method (XRD), Infrared (IR) and Raman spectroscopies. Obtained information may indicate that the dehydration and polymerization of surface silanole due to high shock and residual temperature are very important factors in the structural evolution of synthetic opal by shock compression. Synthetic opal loses opalescence by 10.9 and 18.4 GPa of shock pressures. At 18.4 GPa, dehydration and polymerization of surface silanole and transformation of network structure may occur simultaneously. The 4-membered ring of TO4 tetrahedrons in as synthetic opal may be relaxed to larger ring such as 6-membered ring by high residual temperature. Therefore, the residual temperature may be significantly high at even 18.4 GPa of shock compression. At 23.9 GPa, opal sample recovered the opalescence. Origin of this opalescence may be its layer structure by shock compression. Finally, sample fuse by very high residual temperature at 38.1 GPa and the structure closes to that of fused SiO2 glass. However, internal silanole groups still remain even at 38.1 GPa.

  3. Shock compression of synthetic opal

    Energy Technology Data Exchange (ETDEWEB)

    Inoue, A; Okuno, M; Okudera, H [Department of Earth Sciences, Kanazawa University Kanazawa, Ishikawa, 920-1192 (Japan); Mashimo, T; Omurzak, E [Shock Wave and Condensed Matter Research Center, Kumamoto University, Kumamoto, 860-8555 (Japan); Katayama, S; Koyano, M, E-mail: okuno@kenroku.kanazawa-u.ac.j [JAIST, Nomi, Ishikawa, 923-1297 (Japan)

    2010-03-01

    Structural change of synthetic opal by shock-wave compression up to 38.1 GPa has been investigated by using SEM, X-ray diffraction method (XRD), Infrared (IR) and Raman spectroscopies. Obtained information may indicate that the dehydration and polymerization of surface silanole due to high shock and residual temperature are very important factors in the structural evolution of synthetic opal by shock compression. Synthetic opal loses opalescence by 10.9 and 18.4 GPa of shock pressures. At 18.4 GPa, dehydration and polymerization of surface silanole and transformation of network structure may occur simultaneously. The 4-membered ring of TO{sub 4} tetrahedrons in as synthetic opal may be relaxed to larger ring such as 6-membered ring by high residual temperature. Therefore, the residual temperature may be significantly high at even 18.4 GPa of shock compression. At 23.9 GPa, opal sample recovered the opalescence. Origin of this opalescence may be its layer structure by shock compression. Finally, sample fuse by very high residual temperature at 38.1 GPa and the structure closes to that of fused SiO{sub 2} glass. However, internal silanole groups still remain even at 38.1 GPa.

  4. Methods for preparing synthetic freshwaters.

    Science.gov (United States)

    Smith, E J; Davison, W; Hamilton-Taylor, J

    2002-03-01

    Synthetic solutions that emulate the major ion compositions of natural waters are useful in experiments aimed at understanding biogeochemical processes. Standard recipes exist for preparing synthetic analogues of seawater, with its relatively constant composition, but, due to the diversity of freshwaters, a range of compositions and recipes is required. Generic protocols are developed for preparing synthetic freshwaters of any desired composition. The major problems encountered in preparing hard and soft waters include dissolving sparingly soluble calcium carbonate, ensuring that the ionic components of each concentrated stock solution cannot form an insoluble salt and dealing with the supersaturation of calcium carbonate in many hard waters. For acidic waters the poor solubility of aluminium salts requires attention. These problems are overcome by preparing concentrated stock solutions according to carefully designed reaction paths that were tested using a combination of experiment and equilibrium modeling. These stock solutions must then be added in a prescribed order to prepare a final solution that is brought into equilibrium with the atmosphere. The example calculations for preparing hard, soft and acidic freshwater surrogates with major ion compositions the same as published analyses, are presented in a generalized fashion that should allow preparation of any synthetic freshwater according to its known analysis.

  5. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  6. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  7. E-navigation Services for Non-SOLAS Ships

    Directory of Open Access Journals (Sweden)

    Kwang An

    2016-06-01

    Full Text Available It is clearly understood that the main benefits of e-navigation are improved safety and better protection of the environment through the promotion of standards of navigational system and a reduction in human error. In order to meet the expectations on the benefit of e-navigation, e-navigation services should be more focused on non-SOLAS ships. The purpose of this paper is to present necessary e-navigation services for non-SOLAS ships in order to prevent marine accidents in Korean coastal waters. To meet the objectives of the study, an examination on the present navigation and communication system for non-SOLAS ships was performed. Based on the IMO's e-navigation Strategy Implementation Plan (SIP and Korea's national SIP for e-navigation, future trends for the development and implementation of e-navigation were discussed. Consequently, Electronic Navigational Chart (ENC download and ENC up-date service, ENC streaming service, route support service and communication support service based on Maritime Cloud were presented as essential e-navigation services for non-SOLAS ships. This study will help for the planning and designing of the Korean e-navigation system. It is expected that the further researches on the navigation support systems based on e-navigation will be carried out in order to implement the essential e-navigation services for non-SOLAS ships.

  8. Protease-sensitive synthetic prions.

    Directory of Open Access Journals (Sweden)

    David W Colby

    2010-01-01

    Full Text Available Prions arise when the cellular prion protein (PrP(C undergoes a self-propagating conformational change; the resulting infectious conformer is designated PrP(Sc. Frequently, PrP(Sc is protease-resistant but protease-sensitive (s prions have been isolated in humans and other animals. We report here that protease-sensitive, synthetic prions were generated in vitro during polymerization of recombinant (rec PrP into amyloid fibers. In 22 independent experiments, recPrP amyloid preparations, but not recPrP monomers or oligomers, transmitted disease to transgenic mice (n = 164, denoted Tg9949 mice, that overexpress N-terminally truncated PrP. Tg9949 control mice (n = 174 did not spontaneously generate prions although they were prone to late-onset spontaneous neurological dysfunction. When synthetic prion isolates from infected Tg9949 mice were serially transmitted in the same line of mice, they exhibited sPrP(Sc and caused neurodegeneration. Interestingly, these protease-sensitive prions did not shorten the life span of Tg9949 mice despite causing extensive neurodegeneration. We inoculated three synthetic prion isolates into Tg4053 mice that overexpress full-length PrP; Tg4053 mice are not prone to developing spontaneous neurological dysfunction. The synthetic prion isolates caused disease in 600-750 days in Tg4053 mice, which exhibited sPrP(Sc. These novel synthetic prions demonstrate that conformational changes in wild-type PrP can produce mouse prions composed exclusively of sPrP(Sc.

  9. Target relative navigation results from hardware-in-the-loop tests using the sinplex navigation system

    NARCIS (Netherlands)

    Steffes, S.; Dumke, M.; Heise, D.; Sagliano, M.; Samaan, M.; Theil, S.; Boslooper, E.C.; Oosterling, J.A.J.; Schulte, J.; Skaborn, D.; Söderholm, S.; Conticello, S.; Esposito, M.; Yanson, Y.; Monna, B.; Stelwagen, F.; Visee, R.

    2014-01-01

    The goal of the SINPLEX project is to develop an innovative solution to significantly reduce the mass of the navigation subsystem for exploration missions which include landing and/or rendezvous and capture phases. The system mass is reduced while still maintaining good navigation performance as

  10. Integrated navigation method of a marine strapdown inertial navigation system using a star sensor

    International Nuclear Information System (INIS)

    Wang, Qiuying; Diao, Ming; Gao, Wei; Zhu, Minghong; Xiao, Shu

    2015-01-01

    This paper presents an integrated navigation method of the strapdown inertial navigation system (SINS) using a star sensor. According to the principle of SINS, its own navigation information contains an error that increases with time. Hence, the inertial attitude matrix from the star sensor is introduced as the reference information to correct the SINS increases error. For the integrated navigation method, the vehicle’s attitude can be obtained in two ways: one is calculated from SINS; the other, which we have called star sensor attitude, is obtained as the product between the SINS position and the inertial attitude matrix from the star sensor. Therefore, the SINS position error is introduced in the star sensor attitude error. Based on the characteristics of star sensor attitude error and the mathematical derivation, the SINS navigation errors can be obtained by the coupling calculation between the SINS attitude and the star sensor attitude. Unlike several current techniques, the navigation process of this method is non-radiating and invulnerable to jamming. The effectiveness of this approach was demonstrated by simulation and experimental study. The results show that this integrated navigation method can estimate the attitude error and the position error of SINS. Therefore, the SINS navigation accuracy is improved. (paper)

  11. 75 FR 50884 - Navigation and Navigable Waters; Technical, Organizational, and Conforming Amendments, Sector...

    Science.gov (United States)

    2010-08-18

    ... 3 and 165 to reflect changes in Coast Guard internal organizational structure. Sector Portland and... 1625-ZA25 Navigation and Navigable Waters; Technical, Organizational, and Conforming Amendments, Sector... Waters; Technical, Organizational, and Conforming Amendments, Sector Columbia River.'' 2. On page 48564...

  12. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  13. Global Navigation Satellite Systems (GNSS: The Utmost Interdisciplinary Integrator

    Directory of Open Access Journals (Sweden)

    Bernd Eissfeller

    2015-08-01

    Full Text Available Currently four global satellite navigation systems are under modernization and development: The US American GPS III, the Russian GLONASS, the European Galileo and Chinese BeiDou systems. In the paper the interdisciplinary contributions of different scientific areas to GNSS are assessed. It is outlined that GNSS is not only a technical system but also a basic element of mobile computing high-tech market. At the same time a GNSS has the role of a force enabler in security related applications. Technology, market and security policies are interdependent and are sometimes in a relationship of tension. The goal of the paper is to describe the overall systemics of GNSS from a holistic point of view. The paper also addresses the human factor side of GNSS. The requirements on human resources in GNSS are at least two-fold: On the one hand very specialized engineers are needed; on the other hand the generalists are necessary who are able to understand the system aspects. Decision makers in institutions and industry need special knowledge in technologies, economics and political strategies. Is the current university system able to educate and prepare such generalists? Are specialized master courses for GNSS needed? Are external training courses necessary?

  14. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  15. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  16. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  17. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  18. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  19. Intelligent navigation to improve obstetrical sonography.

    Science.gov (United States)

    Yeo, Lami; Romero, Roberto

    2016-04-01

    'Manual navigation' by the operator is the standard method used to obtain information from two-dimensional and volumetric sonography. Two-dimensional sonography is highly operator dependent and requires extensive training and expertise to assess fetal anatomy properly. Most of the sonographic examination time is devoted to acquisition of images, while 'retrieval' and display of diagnostic planes occurs rapidly (essentially instantaneously). In contrast, volumetric sonography has a rapid acquisition phase, but the retrieval and display of relevant diagnostic planes is often time-consuming, tedious and challenging. We propose the term 'intelligent navigation' to refer to a new method of interrogation of a volume dataset whereby identification and selection of key anatomical landmarks allow the system to: 1) generate a geometrical reconstruction of the organ of interest; and 2) automatically navigate, find, extract and display specific diagnostic planes. This is accomplished using operator-independent algorithms that are both predictable and adaptive. Virtual Intelligent Sonographer Assistance (VIS-Assistance®) is a tool that allows operator-independent sonographic navigation and exploration of the surrounding structures in previously identified diagnostic planes. The advantage of intelligent (over manual) navigation in volumetric sonography is the short time required for both acquisition and retrieval and display of diagnostic planes. Intelligent navigation technology automatically realigns the volume, and reorients and standardizes the anatomical position, so that the fetus and the diagnostic planes are consistently displayed in the same manner each time, regardless of the fetal position or the initial orientation. Automatic labeling of anatomical structures, subject orientation and each of the diagnostic planes is also possible. Intelligent navigation technology can operate on conventional computers, and is not dependent on specific ultrasound platforms or on the

  20. Robotic security vehicle for exterior environments

    International Nuclear Information System (INIS)

    Klarer, P.R.; Workhoven, R.M.

    1988-01-01

    This paper describes a current effort at Sandia National Labs to develop an outdoor robotic vehicle capable of performing limited security functions autonomously in a structured environment. The present stage of development entails application of algorithms originally developed for the SIR vehicle to a testbed vehicle more appropriate to an outdoor environment. The current effort will culminate in a full scale demonstration of autonomous navigation capabilities on routine patrol and teleoperation by a human operator for alarm assessment and response. Various schemes for implementation of the robot system are discussed, as are plans for further development of the system

  1. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  2. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  3. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  4. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  5. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  6. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  7. Navigation Architecture for a Space Mobile Network

    Science.gov (United States)

    Valdez, Jennifer E.; Ashman, Benjamin; Gramling, Cheryl; Heckler, Gregory W.; Carpenter, Russell

    2016-01-01

    The Tracking and Data Relay Satellite System (TDRSS) Augmentation Service for Satellites (TASS) is a proposed beacon service to provide a global, space based GPS augmentation service based on the NASA Global Differential GPS (GDGPS) System. The TASS signal will be tied to the GPS time system and usable as an additional ranging and Doppler radiometric source. Additionally, it will provide data vital to autonomous navigation in the near Earth regime, including space weather information, TDRS ephemerides, Earth Orientation Parameters (EOP), and forward commanding capability. TASS benefits include enhancing situational awareness, enabling increased autonomy, and providing near real-time command access for user platforms. As NASA Headquarters' Space Communication and Navigation Office (SCaN) begins to move away from a centralized network architecture and towards a Space Mobile Network (SMN) that allows for user initiated services, autonomous navigation will be a key part of such a system. This paper explores how a TASS beacon service enables the Space Mobile Networking paradigm, what a typical user platform would require, and provides an in-depth analysis of several navigation scenarios and operations concepts. This paper provides an overview of the TASS beacon and its role within the SMN and user community. Supporting navigation analysis is presented for two user mission scenarios: an Earth observing spacecraft in low earth orbit (LEO), and a highly elliptical spacecraft in a lunar resonance orbit. These diverse flight scenarios indicate the breadth of applicability of the TASS beacon for upcoming users within the current network architecture and in the SMN.

  8. Motion measurement for synthetic aperture radar

    Energy Technology Data Exchange (ETDEWEB)

    Doerry, Armin W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-01-01

    Synthetic Aperture Radar (SAR) measures radar soundings from a set of locations typically along the flight path of a radar platform vehicle. Optimal focusing requires precise knowledge of the sounding source locations in 3-D space with respect to the target scene. Even data driven focusing techniques (i.e. autofocus) requires some degree of initial fidelity in the measurements of the motion of the radar. These requirements may be quite stringent especially for fine resolution, long ranges, and low velocities. The principal instrument for measuring motion is typically an Inertial Measurement Unit (IMU), but these instruments have inherent limi ted precision and accuracy. The question is %22How good does an IMU need to be for a SAR across its performance space?%22 This report analytically relates IMU specifications to parametric requirements for SAR. - 4 - Acknowledgements Th e preparation of this report is the result of a n unfunded research and development activity . Although this report is an independent effort, it draws heavily from limited - release documentation generated under a CRADA with General Atomics - Aeronautical System, Inc. (GA - ASI), and under the Joint DoD/DOE Munitions Program Memorandum of Understanding. Sandia National Laboratories is a multi - program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of En ergy's National Nuclear Security Administration under contract AC04-94AL85000.

  9. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  10. An on-line monitoring system for navigation equipment

    Science.gov (United States)

    Wang, Bo; Yang, Ping; Liu, Jing; Yang, Zhengbo; Liang, Fei

    2017-10-01

    Civil air navigation equipment is the most important infrastructure of Civil Aviation, which is closely related to flight safety. In addition to regular flight inspection, navigation equipment's patrol measuring, maintenance measuring, running measuring under special weather conditions are the important means of ensuring aviation flight safety. According to the safety maintenance requirements of Civil Aviation Air Traffic Control navigation equipment, this paper developed one on-line monitoring system with independent intellectual property rights for navigation equipment, the system breakthroughs the key technologies of measuring navigation equipment on-line including Instrument Landing System (ILS) and VHF Omni-directional Range (VOR), which also meets the requirements of navigation equipment ground measurement set by the ICAO DOC 8071, it provides technical means of the ground on-line measurement for navigation equipment, improves the safety of navigation equipment operation, and reduces the impact of measuring navigation equipment on airport operation.

  11. Spoofing Detection Using GNSS/INS/Odometer Coupling for Vehicular Navigation.

    Science.gov (United States)

    Broumandan, Ali; Lachapelle, Gérard

    2018-04-24

    Location information is one of the most vital information required to achieve intelligent and context-aware capability for various applications such as driverless cars. However, related security and privacy threats are a major holdback. With increasing focus on using Global Navigation Satellite Systems (GNSS) for autonomous navigation and related applications, it is important to provide robust navigation solutions, yet signal spoofing for illegal or covert transportation and misleading receiver timing is increasing and now frequent. Hence, detection and mitigation of spoofing attacks has become an important topic. Several contributions on spoofing detection have been made, focusing on different layers of a GNSS receiver. This paper focuses on spoofing detection utilizing self-contained sensors, namely inertial measurement units (IMUs) and vehicle odometer outputs. A spoofing detection approach based on a consistency check between GNSS and IMU/odometer mechanization is proposed. To detect a spoofing attack, the method analyses GNSS and IMU/odometer measurements independently during a pre-selected observation window and cross checks the solutions provided by GNSS and inertial navigation solution (INS)/odometer mechanization. The performance of the proposed method is verified in real vehicular environments. Mean spoofing detection time and detection performance in terms of receiver operation characteristics (ROC) in sub-urban and dense urban environments are evaluated.

  12. Spoofing Detection Using GNSS/INS/Odometer Coupling for Vehicular Navigation

    Directory of Open Access Journals (Sweden)

    Ali Broumandan

    2018-04-01

    Full Text Available Location information is one of the most vital information required to achieve intelligent and context-aware capability for various applications such as driverless cars. However, related security and privacy threats are a major holdback. With increasing focus on using Global Navigation Satellite Systems (GNSS for autonomous navigation and related applications, it is important to provide robust navigation solutions, yet signal spoofing for illegal or covert transportation and misleading receiver timing is increasing and now frequent. Hence, detection and mitigation of spoofing attacks has become an important topic. Several contributions on spoofing detection have been made, focusing on different layers of a GNSS receiver. This paper focuses on spoofing detection utilizing self-contained sensors, namely inertial measurement units (IMUs and vehicle odometer outputs. A spoofing detection approach based on a consistency check between GNSS and IMU/odometer mechanization is proposed. To detect a spoofing attack, the method analyses GNSS and IMU/odometer measurements independently during a pre-selected observation window and cross checks the solutions provided by GNSS and inertial navigation solution (INS/odometer mechanization. The performance of the proposed method is verified in real vehicular environments. Mean spoofing detection time and detection performance in terms of receiver operation characteristics (ROC in sub-urban and dense urban environments are evaluated.

  13. Heavy crude oil and synthetic crude market outlook

    International Nuclear Information System (INIS)

    Crandall, G.R.

    1997-01-01

    This presentation included an outline of the international heavy crude supply and demand versus Canadian heavy crude supply and disposition, and pricing outlook for synthetic crudes. Differences among crude oils such as light sweet, light sour, heavy and bitumen were described and illustrated with respect to their gravity, API, percentage of sulphur, metals and nitrogen. Internationally, heavy and sour crude supplies are forecast to increase significantly over the next four years. Discoveries of light sour crude in offshore Gulf of Mexico will provide a major new source of sour crude to U.S. Gulf Coast refineries. Venezuela's supplies of heavy and sour crude are also expected to increase over the next few years. Mexico and Canada have plans to increase their heavy crude production. All of the crudes will be aimed at the U.S. Gulf Coast and Midwest markets. Pentanes and condensates are also expected to increase based on the growing Canadian natural gas production. Diluent demand will also grow to match Canadian heavy crude/bitumen production. U.S. midwest refiners are proposing expansions to allow them to process more Canadian heavy crude oil. At present, only a few refineries are equipped to process significant amounts of synthetic crude. It was suggested that to absorb available heavy and synthetic production, increased penetration into both Canadian and U.S. markets will be required. Some refineries may have to be modified to process heavy and synthetic oil supplies. Heavy oil and synthetic producers may need to develop relationships with refiners such as joint ventures and term supply agreements to secure markets. 2 tabs., 12 figs

  14. Catalysts for synthetic liquid fuels

    Energy Technology Data Exchange (ETDEWEB)

    Bruce, L.A.; Turney, T.W.

    1987-12-01

    Fischer-Tropsch catalysts have been designed, characterized and tested for the selective production of hydrocarbons suitable as synthetic liquid transport fuels from synthesis gas (i.e., by the reduction of carbon monoxide with hydrogen). It was found that hydrocarbons in the middle distillate range, or suitable for conversion to that range, could be produced over several of the new catalyst systems. The various catalysts examined included: (1) synthetic cobalt clays, mainly cobalt chlorites; (2) cobalt hydrotalcites; (3) ruthenium metal supported on rare earth oxides of high surface area; and (4) a novel promoted cobalt catalyst. Active and selective catalysts have been obtained, in each category. With the exception of the clays, reproducibility of catalyst performance has been good. Catalysts in groups 2 and 4 have exhibited very high activity, with long lifetimes and easy regeneration.

  15. Design Automation in Synthetic Biology.

    Science.gov (United States)

    Appleton, Evan; Madsen, Curtis; Roehner, Nicholas; Densmore, Douglas

    2017-04-03

    Design automation refers to a category of software tools for designing systems that work together in a workflow for designing, building, testing, and analyzing systems with a target behavior. In synthetic biology, these tools are called bio-design automation (BDA) tools. In this review, we discuss the BDA tools areas-specify, design, build, test, and learn-and introduce the existing software tools designed to solve problems in these areas. We then detail the functionality of some of these tools and show how they can be used together to create the desired behavior of two types of modern synthetic genetic regulatory networks. Copyright © 2017 Cold Spring Harbor Laboratory Press; all rights reserved.

  16. Synthetic biology character and impact

    CERN Document Server

    Pade, Christian; Wigger, Henning; Gleich, Arnim

    2015-01-01

    Synthetic Biology is already an object of intensive debate. However, to a great extent the discussion to date has been concerned with fundamental ethical, religious and philosophical questions. By contrast, based on an investigation of the field’s scientific and technological character, this book focuses on new functionalities provided by synthetic biology and explores the associated opportunities and risks. Following an introduction to the subject and a discussion of the most central paradigms and methodologies, the book provides an overview of the structure of this field of science and technology. It informs the reader about the current stage of development, as well as topical problems and potential opportunities in important fields of application. But not only the science itself is in focus. In order to investigate its broader impact, ecological as well as ethical implications will be considered, paving the way for a discussion of responsibilities in the context of a field at a transitional crossroads be...

  17. Synthetic greenhouse gases under control

    International Nuclear Information System (INIS)

    Horisberger, B.; Karlaganis, G.

    2003-01-01

    This article discusses new Swiss regulations on the use of synthetic materials that posses a considerable greenhouse-warming potential. Synthetic materials such as hydro-chlorofluorocarbons HCFCs, perfluoride-hydrocarbons and sulphur hexafluoride have, in recent years, replaced chlorofluorocarbons CFCs, which were banned on account of their ozone depletion characteristics. The use of these persistent substances is now being limited to applications where more environment-friendly alternatives are not available. The measures decreed in the legislation, which include a general ban on HCFCs as of 2004 and a ban on the export of installations and equipment that use ozone-depleting refrigerants are described. Details on the legislation's effects on the Swiss refrigeration industry are listed and discussed

  18. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  19. Synthetic LDL as targeted drug delivery vehicle

    Science.gov (United States)

    Forte, Trudy M [Berkeley, CA; Nikanjam, Mina [Richmond, CA

    2012-08-28

    The present invention provides a synthetic LDL nanoparticle comprising a lipid moiety and a synthetic chimeric peptide so as to be capable of binding the LDL receptor. The synthetic LDL nanoparticle of the present invention is capable of incorporating and targeting therapeutics to cells expressing the LDL receptor for diseases associated with the expression of the LDL receptor such as central nervous system diseases. The invention further provides methods of using such synthetic LDL nanoparticles.

  20. Navigating the perfect [data] storm

    Directory of Open Access Journals (Sweden)

    M.J. Murtagh

    2012-04-01

    Full Text Available Bioscience has recently undergone a series of knowledge-based and technological revolutions. A critical consequence has been increasing recognition of the need to invest in infrastructure. Good access to data (and samples from multiple studies is axiomatic to the value of this infrastructure. Access must be streamlined, secure, and based upon transparent and ‘fair’ decision making. It must be clear who has created and who has used which data. Ethico-legal policies and guidelines, which reflect dominant local cultural and societal norms, must take account of the increasingly global nature of bioscience research. A robust data infrastructure must also be attentive to the translational aims and social impact of its knowledge generation. In order to maintain the trust of its constituency – the general public as well as professional, political, commercial stakeholders – it must develop mechanisms to take account of all of these perspectives. These considerations form the basis of an emerging data economy. Building on extant achievements and pursuing the ideas outlined here could revolutionise the way we use and manage large-scale data. They have critical implications for biomedical and public health research communities and will be of central relevance for healthcare managers and policy makers, governments and industry. However, if the major challenges are to be met we must continue to invest,both nationally and internationally, in developing the cooperative infrastructures that provide a complementary foil to competitive resourcing mechanisms that drive hypothesis-driven science.

  1. Benchmark Framework for Mobile Robots Navigation Algorithms

    Directory of Open Access Journals (Sweden)

    Nelson David Muñoz-Ceballos

    2014-01-01

    Full Text Available Despite the wide variety of studies and research on mobile robot systems, performance metrics are not often examined. This makes difficult to establish an objective comparison of achievements. In this paper, the navigation of an autonomous mobile robot is evaluated. Several metrics are described. These metrics, collectively, provide an indication of navigation quality, useful for comparing and analyzing navigation algorithms of mobile robots. This method is suggested as an educational tool, which allows the student to optimize the algorithms quality, relating to important aspectsof science, technology and engineering teaching, as energy consumption, optimization and design.

  2. Wavefront Propagation and Fuzzy Based Autonomous Navigation

    Directory of Open Access Journals (Sweden)

    Adel Al-Jumaily

    2005-06-01

    Full Text Available Path planning and obstacle avoidance are the two major issues in any navigation system. Wavefront propagation algorithm, as a good path planner, can be used to determine an optimal path. Obstacle avoidance can be achieved using possibility theory. Combining these two functions enable a robot to autonomously navigate to its destination. This paper presents the approach and results in implementing an autonomous navigation system for an indoor mobile robot. The system developed is based on a laser sensor used to retrieve data to update a two dimensional world model of therobot environment. Waypoints in the path are incorporated into the obstacle avoidance. Features such as ageing of objects and smooth motion planning are implemented to enhance efficiency and also to cater for dynamic environments.

  3. Cloud Absorption Radiometer Autonomous Navigation System - CANS

    Science.gov (United States)

    Kahle, Duncan; Gatebe, Charles; McCune, Bill; Hellwig, Dustan

    2013-01-01

    CAR (cloud absorption radiometer) acquires spatial reference data from host aircraft navigation systems. This poses various problems during CAR data reduction, including navigation data format, accuracy of position data, accuracy of airframe inertial data, and navigation data rate. Incorporating its own navigation system, which included GPS (Global Positioning System), roll axis inertia and rates, and three axis acceleration, CANS expedites data reduction and increases the accuracy of the CAR end data product. CANS provides a self-contained navigation system for the CAR, using inertial reference and GPS positional information. The intent of the software application was to correct the sensor with respect to aircraft roll in real time based upon inputs from a precision navigation sensor. In addition, the navigation information (including GPS position), attitude data, and sensor position details are all streamed to a remote system for recording and later analysis. CANS comprises a commercially available inertial navigation system with integral GPS capability (Attitude Heading Reference System AHRS) integrated into the CAR support structure and data system. The unit is attached to the bottom of the tripod support structure. The related GPS antenna is located on the P-3 radome immediately above the CAR. The AHRS unit provides a RS-232 data stream containing global position and inertial attitude and velocity data to the CAR, which is recorded concurrently with the CAR data. This independence from aircraft navigation input provides for position and inertial state data that accounts for very small changes in aircraft attitude and position, sensed at the CAR location as opposed to aircraft state sensors typically installed close to the aircraft center of gravity. More accurate positional data enables quicker CAR data reduction with better resolution. The CANS software operates in two modes: initialization/calibration and operational. In the initialization/calibration mode

  4. Mobile Robot Designed with Autonomous Navigation System

    Science.gov (United States)

    An, Feng; Chen, Qiang; Zha, Yanfang; Tao, Wenyin

    2017-10-01

    With the rapid development of robot technology, robots appear more and more in all aspects of life and social production, people also ask more requirements for the robot, one is that robot capable of autonomous navigation, can recognize the road. Take the common household sweeping robot as an example, which could avoid obstacles, clean the ground and automatically find the charging place; Another example is AGV tracking car, which can following the route and reach the destination successfully. This paper introduces a new type of robot navigation scheme: SLAM, which can build the environment map in a totally strange environment, and at the same time, locate its own position, so as to achieve autonomous navigation function.

  5. Navigation of robotic system using cricket motes

    Science.gov (United States)

    Patil, Yogendra J.; Baine, Nicholas A.; Rattan, Kuldip S.

    2011-06-01

    This paper presents a novel algorithm for self-mapping of the cricket motes that can be used for indoor navigation of autonomous robotic systems. The cricket system is a wireless sensor network that can provide indoor localization service to its user via acoustic ranging techniques. The behavior of the ultrasonic transducer on the cricket mote is studied and the regions where satisfactorily distance measurements can be obtained are recorded. Placing the motes in these regions results fine-grain mapping of the cricket motes. Trilateration is used to obtain a rigid coordinate system, but is insufficient if the network is to be used for navigation. A modified SLAM algorithm is applied to overcome the shortcomings of trilateration. Finally, the self-mapped cricket motes can be used for navigation of autonomous robotic systems in an indoor location.

  6. Vibrational spectrum of synthetic carnotite

    Energy Technology Data Exchange (ETDEWEB)

    Baran, E J; Botto, I L [La Plata Univ. Nacional (Argentina). Facultad de Ciencias Exactas

    1976-05-01

    The infrared and laser-Raman spectra of synthetic carnotite, K/sub 2/((UO/sub 2/)/sub 2/V/sub 2/O/sub 8/), are reported and discussed. Force constants for the terminal V-O bonds as well as for the UO/sub 2//sup 2 +/ ions are evaluated. From the spectroscopic data, a U-O bond length of 1.81 A is estimated for the uranyl ion in this compound.

  7. Designer Drugs: A Synthetic Catastrophe

    OpenAIRE

    Fratantonio, James; Andrade, Lawrence; Febo, Marcelo

    2015-01-01

    Synthetic stimulants can cause hallucinations, aggressive behaviors, death and are sometimes legal. These substances are sold as plant food and bath salts that are "Not for Human Consumption", therefore skirting the 1986 Federal Analogue Act and giving a false pretense of safety. Studies have proved that these substances are toxic, have a high abuse potential, and are becoming extremely prevalent in the United States. This creates a dilemma for law enforcement agents, hospitals, and substance...

  8. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  9. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  10. Hydrogen speciation in synthetic quartz

    Science.gov (United States)

    Aines, R.D.; Kirby, S.H.; Rossman, G.R.

    1984-01-01

    The dominant hydrogen impurity in synthetic quartz is molecular H2O. H-OH groups also occur, but there is no direct evidence for the hydrolysis of Si-O-Si bonds to yield Si-OH HO-Si groups. Molecular H2O concentrations in the synthetic quartz crystals studied range from less than 10 to 3,300 ppm (H/Si), and decrease smoothly by up to an order of magnitude with distance away from the seed. OH- concentrations range from 96 to 715 ppm, and rise smoothly with distance away from the seed by up to a factor of three. The observed OH- is probably all associated with cationic impurities, as in natural quartz. Molecular H2O is the dominant initial hydrogen impurity in weak quartz. The hydrolytic weakening of quartz may be caused by the transformation H2O + Si-O-Si ??? 2SiOH, but this may be a transitory change with the SiOH groups recombining to form H2O, and the average SiOH concentration remaining very low. Synthetic quartz is strengthened when the H2O is accumulated into fluid inclusions and cannot react with the quartz framework. ?? 1984 Springer-Verlag.

  11. Characterization of synthetic peptides by mass spectrometry

    DEFF Research Database (Denmark)

    Prabhala, Bala Krishna; Mirza, Osman Asghar; Højrup, Peter

    2015-01-01

    Mass spectrometry (MS) is well suited for analysis of the identity and purity of synthetic peptides. The sequence of a synthetic peptide is most often known, so the analysis is mainly used to confirm the identity and purity of the peptide. Here, simple procedures are described for MALDI......-TOF-MS and LC-MS of synthetic peptides....

  12. Lucy: Navigating a Jupiter Trojan Tour

    Science.gov (United States)

    Stanbridge, Dale; Williams, Ken; Williams, Bobby; Jackman, Coralie; Weaver, Hal; Berry, Kevin; Sutter, Brian; Englander, Jacob

    2017-01-01

    In January 2017, NASA selected the Lucy mission to explore six Jupiter Trojan asteroids. These six bodies, remnants of the primordial material that formed the outer planets, were captured in the Sun-Jupiter L4 and L5 Lagrangian regions early in the solar system formation. These particular bodies were chosen because of their diverse spectral properties and the chance to observe up close for the first time two orbiting approximately equal mass binaries, Patroclus and Menoetius. KinetX, Inc. is the primary navigation supplier for the Lucy mission. This paper describes preliminary navigation analyses of the approach phase for each Trojan encounter.

  13. BOREAS Level-0 ER-2 Navigation Data

    Science.gov (United States)

    Strub, Richard; Dominguez, Roseanne; Newcomer, Jeffrey A.; Hall, Forrest G. (Editor)

    2000-01-01

    The BOREAS Staff Science effort covered those activities that were BOREAS community-level activities or required uniform data collection procedures across sites and time. These activities included the acquisition, processing, and archiving of aircraft navigation/attitude data to complement the digital image data. The level-0 ER-2 navigation data files contain aircraft attitude and position information acquired during the digital image and photographic data collection missions. Temporally, the data were acquired from April to September 1994. Data were recorded at intervals of 5 seconds. The data are stored in tabular ASCII files.

  14. Navigation: bat orientation using Earth's magnetic field.

    Science.gov (United States)

    Holland, Richard A; Thorup, Kasper; Vonhof, Maarten J; Cochran, William W; Wikelski, Martin

    2006-12-07

    Bats famously orientate at night by echolocation, but this works over only a short range, and little is known about how they navigate over longer distances. Here we show that the homing behaviour of Eptesicus fuscus, known as the big brown bat, can be altered by artificially shifting the Earth's magnetic field, indicating that these bats rely on a magnetic compass to return to their home roost. This finding adds to the impressive array of sensory abilities possessed by this animal for navigation in the dark.

  15. Navigation: Bat orientation using Earth's magnetic field

    DEFF Research Database (Denmark)

    Holland, Richard A.; Thorup, Kasper; Vonhof, Maarten J.

    2006-01-01

    Bats famously orientate at night by echolocation 1 , but this works over only a short range, and little is known about how they navigate over longer distances 2 . Here we show that the homing behaviour of Eptesicus fuscus, known as the big brown bat, can be altered by artificially shifting the Ea...... the Earth's magnetic field, indicating that these bats rely on a magnetic compass to return to their home roost. This finding adds to the impressive array of sensory abilities possessed by this animal for navigation in the dark....

  16. Navigation Problems in Blind-to-Blind Pedestrians Tele-assistance Navigation

    OpenAIRE

    Balata , Jan; Mikovec , Zdenek; Maly , Ivo

    2015-01-01

    International audience; We raise a question whether it is possible to build a large-scale navigation system for blind pedestrians where a blind person navigates another blind person remotely by mobile phone. We have conducted an experiment, in which we observed blind people navigating each other in a city center in 19 sessions. We focused on problems in the navigator’s attempts to direct the traveler to the destination. We observed 96 problems in total, classified them on the basis of the typ...

  17. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  18. Agricultural pest control programmes, food security and safety | Eze ...

    African Journals Online (AJOL)

    Agricultural pest management control strategies are primarily concerned with food security and safety. Popular pest control methods include application of synthetic pesticides, biopesticides (plant extracts), non-chemical pest management and integrated pest management (IPM). The resistance of some of the pests to the ...

  19. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  20. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  1. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  2. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  3. Aerospace Communications Security Technologies Demonstrated

    Science.gov (United States)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  4. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  5. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  6. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  7. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  8. A Canadian refiner's perspective of synthetic crudes

    International Nuclear Information System (INIS)

    Halford, T.L.; McIntosh, A.P.; Rasmussen

    1997-01-01

    Some of the factors affecting a refiner's choice of crude oil include refinery hardware, particularly gas oil crackers, products slate and product specifications, crude availability, relative crude price and crude quality. An overview of synthetic crude, the use of synthetic crude combined with other crudes and a comparison of synthetic crude with conventional crude oil was given. The two main users of synthetic crude are basically two groups of refiners, those large groups who use synthetic crude combined with other crudes, and a smaller group who run synthetic crude on specially designed units as a sole feed. The effects of changes in fuel legislation were reviewed. It was predicted that the changes will have a mixed impact on the value of synthetic crude, but low sulphur diesel regulations and gasoline sulphur regulations will make current synthetic crudes attractive. The big future change with a negative impact will be diesel cetane increases to reduce engine emissions. This will reduce synthetic crude attractiveness due to distillate yields and quality and high gas oil yields. Similarly, any legislation limiting aromatics in diesel fuel will also make synthetic crudes less attractive. Problems experienced by refiners with hardware dedicated to synthetic crude (salt, naphthenic acid, fouling, quality variations) were also reviewed. 3 tabs

  9. Synthetic biology: Emerging bioengineering in Indonesia

    Science.gov (United States)

    Suhandono, Sony

    2017-05-01

    The development of synthetic biology will shape the new era of science and technology. It is an emerging bioengineering technique involving genetic engineering which can alter the phenotype and behavior of the cell or the new product. Synthetic biology may produce biomaterials, drugs, vaccines, biosensors, and even a recombinant secondary metabolite used in herbal and complementary medicine, such as artemisinin, a malaria drug which is usually extracted from the plant Artemisia annua. The power of synthetic biology has encouraged scientists in Indonesia, and is still in early development. This paper also covers some research from an Indonesian research institute in synthetic biology such as observing the production of bio surfactants and the enhanced production of artemisinin using a transient expression system. Synthetic biology development in Indonesia may also be related to the iGEM competition, a large synthetic biology research competition which was attended by several universities in Indonesia. The application of synthetic biology for drug discovery will be discussed.

  10. Printability of Synthetic Papers by Electrophotography

    Directory of Open Access Journals (Sweden)

    Rozália Szentgyörgyvölgyi

    2010-04-01

    Full Text Available This paper deals with the printability of synthetic papers by the electrophotography technique. Prints of cmyk colour fields from 20% to 100% raster tone values were printed on three types of synthetic papers (one film synthetic paper and two fiber synthetic papers. The investigation of the appearance included densitometric measurement of the cmyk prints. The results have shown differences in the optical density and optical tone value between cmyk prints made on various synthetic papers. The highest optical density and the increase of the optical tone value were observed on the film synthetic paper, where cmyk prints were more saturated. The highest abrasion resistance of cmyk prints was obtained from the fibre synthetic paper.

  11. Adaptive Landmark-Based Navigation System Using Learning Techniques

    DEFF Research Database (Denmark)

    Zeidan, Bassel; Dasgupta, Sakyasingha; Wörgötter, Florentin

    2014-01-01

    The goal-directed navigational ability of animals is an essential prerequisite for them to survive. They can learn to navigate to a distal goal in a complex environment. During this long-distance navigation, they exploit environmental features, like landmarks, to guide them towards their goal. In...... hexapod robots. As a result, it allows the robots to successfully learn to navigate to distal goals in complex environments.......The goal-directed navigational ability of animals is an essential prerequisite for them to survive. They can learn to navigate to a distal goal in a complex environment. During this long-distance navigation, they exploit environmental features, like landmarks, to guide them towards their goal....... Inspired by this, we develop an adaptive landmark-based navigation system based on sequential reinforcement learning. In addition, correlation-based learning is also integrated into the system to improve learning performance. The proposed system has been applied to simulated simple wheeled and more complex...

  12. GRIP DC-8 NAVIGATION AND HOUSEKEEPING DATA V1

    Data.gov (United States)

    National Aeronautics and Space Administration — The GRIP DC-8 Navigation and Housekeeping Data contains aircraft navigational data obtained during the GRIP campaign (15 Aug 2010 - 30 Sep 2010). The major goal was...

  13. GRIP DC-8 NAVIGATION AND HOUSEKEEPING DATA V1

    Data.gov (United States)

    National Aeronautics and Space Administration — This dataset contains aircraft navigational data obtained during the GRIP campaign (15 Aug 2010 - 30 Sep 2010). The NASA DC-8 is outfitted with a navigational...

  14. Issues in symbol design for electronic displays of navigation information

    Science.gov (United States)

    2004-10-24

    An increasing number of electronic displays, ranging from small hand-held displays for general aviation to installed displays for air transport, are showing navigation information, such as symbols representing navigational aids. The wide range of dis...

  15. GPM Ground Validation Navigation Data ER-2 OLYMPEX V1

    Data.gov (United States)

    National Aeronautics and Space Administration — The GPM Ground Validation NASA ER-2 Navigation Data OLYMPEX dataset supplies navigation data collected by the NASA ER-2 aircraft for flights that occurred during...

  16. Gamifying Navigation in Location-Based Applications

    DEFF Research Database (Denmark)

    Nadarajah, Stephanie Githa; Overgaard, Benjamin Nicholas; Pedersen, Peder Walz

    2017-01-01

    Location-based games entertain players usually by interactions at points of interest (POIs). Navigation between POIs often involve the use of either a physical or digital map, not taking advantage of the opportunity available to engage users in activities between POIs. The paper presents riddle s...

  17. Navigation in musculoskeletal oncology: An overview

    Directory of Open Access Journals (Sweden)

    Guy Vernon Morris

    2018-01-01

    Full Text Available Navigation in surgery has increasingly become more commonplace. The use of this technological advancement has enabled ever more complex and detailed surgery to be performed to the benefit of surgeons and patients alike. This is particularly so when applying the use of navigation within the field of orthopedic oncology. The developments in computer processing power coupled with the improvements in scanning technologies have permitted the incorporation of navigational procedures into day-to-day practice. A comprehensive search of PubMed using the search terms “navigation”, “orthopaedic” and “oncology” yielded 97 results. After filtering for English language papers, excluding spinal surgery and review articles, this resulted in 38 clinical studies and case reports. These were analyzed in detail by the authors (GM and JS and the most relevant papers reviewed. We have sought to provide an overview of the main types of navigation systems currently available within orthopedic oncology and to assess some of the evidence behind its use.

  18. Ohio River Navigation: Past-Present-Future

    Science.gov (United States)

    1979-10-01

    navigation structures had been built: the auxillary 56- by 360-foot lock at dam 41 (Louisville), 1930; Montgomery Locks and Dam, 1936; and Gallipolis...Mile 974.2. This project was approved in 1963, but substantial ’ delay is anticipated ina decision concerning its execu- tion. For this reason a

  19. Mobile Screens: The Visual Regime of Navigation

    NARCIS (Netherlands)

    Verhoeff, N.

    2012-01-01

    In this book on screen media, space, and mobility I compare synchronically, as well as diachronically, diverse and variegated screen media - their technologies and practices – as sites for virtual mobility and navigation. Mobility as a central trope can be found on the multiple levels that are

  20. The "Set Map" Method of Navigation.

    Science.gov (United States)

    Tippett, Julian

    1998-01-01

    Explains the "set map" method of using the baseplate compass to solve walkers' navigational needs as opposed to the 1-2-3 method for taking a bearing. The map, with the compass permanently clipped to it, is rotated to the position in which its features have the same orientation as their counterparts on the ground. Includes directions and…

  1. Neurosurgical robotic arm drilling navigation system.

    Science.gov (United States)

    Lin, Chung-Chih; Lin, Hsin-Cheng; Lee, Wen-Yo; Lee, Shih-Tseng; Wu, Chieh-Tsai

    2017-09-01

    The aim of this work was to develop a neurosurgical robotic arm drilling navigation system that provides assistance throughout the complete bone drilling process. The system comprised neurosurgical robotic arm navigation combining robotic and surgical navigation, 3D medical imaging based surgical planning that could identify lesion location and plan the surgical path on 3D images, and automatic bone drilling control that would stop drilling when the bone was to be drilled-through. Three kinds of experiment were designed. The average positioning error deduced from 3D images of the robotic arm was 0.502 ± 0.069 mm. The correlation between automatically and manually planned paths was 0.975. The average distance error between automatically planned paths and risky zones was 0.279 ± 0.401 mm. The drilling auto-stopping algorithm had 0.00% unstopped cases (26.32% in control group 1) and 70.53% non-drilled-through cases (8.42% and 4.21% in control groups 1 and 2). The system may be useful for neurosurgical robotic arm drilling navigation. Copyright © 2016 John Wiley & Sons, Ltd.

  2. Orchard navigation using derivative free Kalman filtering

    DEFF Research Database (Denmark)

    Hansen, Søren; Bayramoglu, Enis; Andersen, Jens Christian

    2011-01-01

    This paper describes the use of derivative free filters for mobile robot localization and navigation in an orchard. The localization algorithm fuses odometry and gyro measurements with line features representing the surrounding fruit trees of the orchard. The line features are created on basis of 2...

  3. Cloud-Induced Uncertainty for Visual Navigation

    Science.gov (United States)

    2014-12-26

    can occur due to interference, jamming, or signal blockage in urban canyons. In GPS-denied environments, a GP- S/INS navigation system is forced to rely...physics-based approaches use equations that model fluid flow, thermodynamics, water condensation , and evapora- tion to generate clouds [4]. The drawback

  4. 'Outsmarting Traffic, Together': Driving as Social Navigation

    Directory of Open Access Journals (Sweden)

    Sam Hind

    2014-04-01

    Full Text Available The automotive world is evolving. Ten years ago Nigel Thrift (2004: 41 made the claim that the experience of driving was slipping into our 'technological unconscious'. Only recently the New York Times suggested that with the rise of automated driving, standalone navigation tools as we know them would cease to exist, instead being 'fully absorbed into the machine' (Fisher, 2013. But in order to bridge the gap between past and future driving worlds, another technological evolution is emerging. This short, critical piece charts the rise of what has been called 'social navigation' in the industry; the development of digital mapping platforms designed to foster automotive sociality. It makes two provisional points. Firstly, that 'ludic' conceptualisations can shed light on the ongoing reconfiguration of drivers, vehicles, roads and technological aids such as touch-screen satellite navigation platforms. And secondly, that as a result of this, there is a coming-into-being of a new kind of driving politics; a 'casual politicking' centred on an engagement with digital interfaces. We explicate both by turning our attention towards Waze; a social navigation application that encourages users to interact with various driving dynamics.

  5. Celestial Navigation on the Surface of Mars

    Science.gov (United States)

    Malay, Benjamin P.

    2001-05-01

    A simple, accurate, and autonomous method of finding position on the surface of Mars currently does not exist. The goal of this project is to develop a celestial navigation process that will fix a position on Mars with 100-meter accuracy. This method requires knowing the position of the stars and planets referenced to the Martian surface with one arcsecond accuracy. This information is contained in an ephemeris known as the Aeronautical Almanac (from Ares, the god of war) . Naval Observatory Vector Astrometry Subroutines (NOVAS) form the basis of the code used to generate the almanac. Planetary position data come the JPL DE405 Planetary Ephemeris. The theoretical accuracy of the almanac is determined mathematically and compared with the Ephemeris for Physical Observations of Mars contained in the Astronautical Almanac. A preliminary design of an autonomous celestial navigation system is presented. Recommendations of how to integrate celestial navigation into NASA=s current Mars exploration program are also discussed. This project is a useful and much-needed first step towards establishing celestial navigation as a practical way to find position on the surface of Mars.

  6. Autonomous Rule Based Robot Navigation In Orchards

    DEFF Research Database (Denmark)

    Andersen, Jens Christian; Ravn, Ole; Andersen, Nils Axel

    2010-01-01

    Orchard navigation using sensor-based localization and exible mission management facilitates successful missions independent of the Global Positioning System (GPS). This is especially important while driving between tight tree rows where the GPS coverage is poor. This paper suggests localization ...

  7. Navigating Transitions: Challenges for Engineering Students

    Science.gov (United States)

    Moore-Russo, Deborah; Wilsey, Jillian N.; Parthum, Michael J., Sr.; Lewis, Kemper

    2017-01-01

    As college students enter engineering, they face challenges when they navigate across various transitions. These challenges impact whether a student can successfully adapt to the rigorous curricular requirements of an engineering degree and to the norms and expectations that are particular to engineering. This article focuses on the transitions…

  8. Navigable windows of the Northwest Passage

    Science.gov (United States)

    Liu, Xing-he; Ma, Long; Wang, Jia-yue; Wang, Ye; Wang, Li-na

    2017-09-01

    Artic sea ice loss trends support a greater potential for Arctic shipping. The information of sea ice conditions is important for utilizing Arctic passages. Based on the shipping routes given by ;Arctic Marine Shipping Assessment 2009 Report;, the navigable windows of these routes and the constituent legs were calculated by using sea ice concentration product data from 2006 to 2015, by which a comprehensive knowledge of the sea ice condition of the Northwest Passage was achieved. The results showed that Route 4 (Lancaster Sound - Barrow Strait - Prince Regent Inlet and Bellot Strait - Franklin Strait - Larsen Sound - Victoria Strait - Queen Maud Gulf - Dease Strait - Coronation Gulf - Dolphin and Union Strait - Amundsen Gulf) had the best navigable expectation, Route 2 (Parry Channel - M'Clure Strait) had the worst, and the critical legs affecting the navigation of Northwest Passage were Viscount Melville Sound, Franklin Strait, Victoria Strait, Bellot Strait, M'Clure Strait and Prince of Wales Strait. The shortest navigable period of the routes of Northwest Passage was up to 69 days. The methods used and the results of the study can help the selection and evaluation of Arctic commercial routes.

  9. Spatial navigation by congenitally blind individuals.

    Science.gov (United States)

    Schinazi, Victor R; Thrash, Tyler; Chebat, Daniel-Robert

    2016-01-01

    Spatial navigation in the absence of vision has been investigated from a variety of perspectives and disciplines. These different approaches have progressed our understanding of spatial knowledge acquisition by blind individuals, including their abilities, strategies, and corresponding mental representations. In this review, we propose a framework for investigating differences in spatial knowledge acquisition by blind and sighted people consisting of three longitudinal models (i.e., convergent, cumulative, and persistent). Recent advances in neuroscience and technological devices have provided novel insights into the different neural mechanisms underlying spatial navigation by blind and sighted people and the potential for functional reorganization. Despite these advances, there is still a lack of consensus regarding the extent to which locomotion and wayfinding depend on amodal spatial representations. This challenge largely stems from methodological limitations such as heterogeneity in the blind population and terminological ambiguity related to the concept of cognitive maps. Coupled with an over-reliance on potential technological solutions, the field has diffused into theoretical and applied branches that do not always communicate. Here, we review research on navigation by congenitally blind individuals with an emphasis on behavioral and neuroscientific evidence, as well as the potential of technological assistance. Throughout the article, we emphasize the need to disentangle strategy choice and performance when discussing the navigation abilities of the blind population. For further resources related to this article, please visit the WIREs website. © 2015 The Authors. WIREs Cognitive Science published by Wiley Periodicals, Inc.

  10. Robust Pedestrian Navigation for Challenging Applications

    OpenAIRE

    Gilliéron, PY; Renaudin, V

    2009-01-01

    Presentation of a concept for robust indoor navigation. The concept is based on three key elements: - the use of an absolute geographical reference - the hybridisation of complementary technologies - specific motion models. This concept is illustrated by the means of two applications: the urban displacement of blind people and the indoor guidance of fire-fighters

  11. From translation to navigation of different discourses

    DEFF Research Database (Denmark)

    Livonen, Mirja; Sonnenwald, Diane H.

    1998-01-01

    ' own search experience. Data further suggest that searchers navigate these discourses dynamically and have preferences for certain discourses. Conceptualizing the selection of search terms as a meeting place of different discourses provides new insights into the complex nature of the search term...

  12. Navigating the Bio-Politics of Childhood

    Science.gov (United States)

    Lee, Nick; Motzkau, Johanna

    2011-01-01

    Childhood research has long shared a bio-political terrain with state agencies in which children figure primarily as "human futures". In the 20th century bio-social dualism helped to make that terrain navigable by researchers, but, as life processes increasingly become key sites of bio-political action, bio-social dualism is becoming…

  13. A GPS inspired Terrain Referenced Navigation algorithm

    NARCIS (Netherlands)

    Vaman, D.

    2014-01-01

    Terrain Referenced Navigation (TRN) refers to a form of localization in which measurements of distances to the terrain surface are matched with a digital elevation map allowing a vehicle to estimate its own position within the map. The main goal of this dissertation is to improve TRN performance

  14. Navigated Waterways of Louisiana, Geographic NAD83, LOSCO (1999) [navigated_waterways_LOSCO_1999

    Data.gov (United States)

    Louisiana Geographic Information Center — This is a line dataset of navigated waterways fitting the LOSCO definition: it has been traveled by vessels transporting 10,000 gallons of oil or fuel as determined...

  15. Lunar Navigator - A Miniature, Fully Autonomous, Lunar Navigation, Surveyor, and Range Finder System, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Microcosm will use existing hardware and software from related programs to create a prototype Lunar Navigation Sensor (LNS) early in Phase II, such that most of the...

  16. Vision/INS Integrated Navigation System for Poor Vision Navigation Environments

    Directory of Open Access Journals (Sweden)

    Youngsun Kim

    2016-10-01

    Full Text Available In order to improve the performance of an inertial navigation system, many aiding sensors can be used. Among these aiding sensors, a vision sensor is of particular note due to its benefits in terms of weight, cost, and power consumption. This paper proposes an inertial and vision integrated navigation method for poor vision navigation environments. The proposed method uses focal plane measurements of landmarks in order to provide position, velocity and attitude outputs even when the number of landmarks on the focal plane is not enough for navigation. In order to verify the proposed method, computer simulations and van tests are carried out. The results show that the proposed method gives accurate and reliable position, velocity and attitude outputs when the number of landmarks is insufficient.

  17. Lunar Navigator - A Miniature, Fully Autonomous, Lunar Navigation, Surveyor, and Range Finder System, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Microcosm proposes to design and develop a fully autonomous Lunar Navigator based on our MicroMak miniature star sensor and a gravity gradiometer similar to one on a...

  18. First experience using navigation-guided radiofrequency kyphoplasty for sacroplasty in sacral insufficiency fractures

    Energy Technology Data Exchange (ETDEWEB)

    Klingler, J.H.; Kluge, P.; Sircar, R.; Kogias, E.; Scholz, C.; Krueger, M.T.; Scheiwe, C.; Hubbe, U. [Freiburg Univ. Medical Center, Freiburg (Germany). Dept. of Neurosurgery

    2013-08-15

    Purpose: To evaluate the efficacy and safety of navigation-guided radiofrequency kyphoplasty for sacroplasty in patients with sacral insufficiency fractures. Methods: In this single-center retrospective observational study, four consecutive patients with sacral insufficiency fractures were treated with navigation-guided radiofrequency kyphoplasty for sacroplasty between April 2010 and May 2012. Symptom characteristics, pain duration and pain intensity were recorded for each patient. Cement extravasation was evaluated in thin-sliced and triplanar reconstructed CT scans of the sacrum. Results: Four female patients with painful sacral insufficiency fractures and extensive osteopenic areas significantly improved from an average pre-treatment VAS score of 8.3 {+-} 0.5 to 2.3 {+-} 1.0 (p < 0.001) on the first postoperative day and to 1.3 {+-} 1.9 (p < 0.004) at follow-up (mean, 20.1 weeks). Slight cement extravasations were observed without evidence of being symptomatic. No major complications or procedure-related morbidity were noted. Conclusion: From the limited experience in four patients, navigation-guided radiofrequency kyphoplasty appears to be a safe and effective treatment option for sacral insufficiency fractures even though asymptomatic cement extravasation was noted. The use of navigation based on intraoperative 3 D images simplifies the positioning of the navigated bone needles via the long axis approach. The radiofrequency kyphoplasty system provides the possibility to administer a sufficient amount of bone cement with a well-defined viscosity over the entire period of the procedure leading to high security and low cement extravasation. Sacroplasty provides rapid and enduring pain relief and facilitates prompt mobilization. (orig.)

  19. Synthetic Aperture Vector Flow Imaging

    DEFF Research Database (Denmark)

    Villagómez Hoyos, Carlos Armando

    The main objective of this project was to continue the development of a synthetic aperture vector flow estimator. This type of estimator is capable of overcoming two of the major limitations in conventional ultrasound systems: 1) the inability to scan large region of interest with high temporal......, this thesis showed that novel information can be obtained with vector velocity methods providing quantitative estimates of blood flow and insight into the complexity of the hemodynamics dynamics. This could give the clinician a new tool in assessment and treatment of a broad range of diseases....

  20. Synthetic Biology Guides Biofuel Production

    Directory of Open Access Journals (Sweden)

    Michael R. Connor

    2010-01-01

    Full Text Available The advancement of microbial processes for the production of renewable liquid fuels has increased with concerns about the current fuel economy. The development of advanced biofuels in particular has risen to address some of the shortcomings of ethanol. These advanced fuels have chemical properties similar to petroleum-based liquid fuels, thus removing the need for engine modification or infrastructure redesign. While the productivity and titers of each of these processes remains to be improved, progress in synthetic biology has provided tools to guide the engineering of these processes through present and future challenges.

  1. Evaluation of navigation interfaces in virtual environments

    Science.gov (United States)

    Mestre, Daniel R.

    2014-02-01

    When users are immersed in cave-like virtual reality systems, navigational interfaces have to be used when the size of the virtual environment becomes larger than the physical extent of the cave floor. However, using navigation interfaces, physically static users experience self-motion (visually-induced vection). As a consequence, sensorial incoherence between vision (indicating self-motion) and other proprioceptive inputs (indicating immobility) can make them feel dizzy and disoriented. We tested, in two experimental studies, different locomotion interfaces. The objective was twofold: testing spatial learning and cybersickness. In a first experiment, using first-person navigation with a flystick ®, we tested the effect of sensorial aids, a spatialized sound or guiding arrows on the ground, attracting the user toward the goal of the navigation task. Results revealed that sensorial aids tended to impact negatively spatial learning. Moreover, subjects reported significant levels of cybersickness. In a second experiment, we tested whether such negative effects could be due to poorly controlled rotational motion during simulated self-motion. Subjects used a gamepad, in which rotational and translational displacements were independently controlled by two joysticks. Furthermore, we tested first- versus third-person navigation. No significant difference was observed between these two conditions. Overall, cybersickness tended to be lower, as compared to experiment 1, but the difference was not significant. Future research should evaluate further the hypothesis of the role of passively perceived optical flow in cybersickness, but manipulating the virtual environment'sperrot structure. It also seems that video-gaming experience might be involved in the user's sensitivity to cybersickness.

  2. Biologically inspired autonomous agent navigation using an integrated polarization analyzing CMOS image sensor

    NARCIS (Netherlands)

    Sarkaer, M.; San Segundo Bello, D.; Van Hoof, C.; Theuwissen, A.

    2010-01-01

    The navigational strategies of insects using skylight polarization are interesting for applications in autonomous agent navigation because they rely on very little information for navigation. A polarization navigation sensor using the Stokes parameters to determine the orientation is presented. The

  3. 22 CFR 401.25 - Government brief regarding navigable waters.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Government brief regarding navigable waters. 401... PROCEDURE Applications § 401.25 Government brief regarding navigable waters. When in the opinion of the Commission it is desirable that a decision should be rendered which affects navigable waters in a manner or...

  4. Gray and White Matter Correlates of Navigational Ability in Humans

    NARCIS (Netherlands)

    Wegman, J.B.T.; Fonteijn, H.M.; Ekert, J. van; Tyborowska, A.B.; Jansen, C.; Janzen, G.

    2014-01-01

    Humans differ widely in their navigational abilities. Studies have shown that self-reports on navigational abilities are good predictors of performance on navigation tasks in real and virtual environments. The caudate nucleus and medial temporal lobe regions have been suggested to subserve different

  5. Benefits of multisensory presentation on perception, memory and navigation

    NARCIS (Netherlands)

    Philippi, T.G.|info:eu-repo/dai/nl/313711577

    2012-01-01

    Navigation is the process of planning and following routes to travel from the current location to a target location. In comparison with real world navigation, we have considerable difficulty with navigation in virtual environments. An important cause is that less information is presented in a

  6. 76 FR 58105 - Regulated Navigation Area; Saugus River, Lynn, MA

    Science.gov (United States)

    2011-09-20

    ... final rule. SUMMARY: The Coast Guard is establishing a Regulated Navigation Area (RNA) on the navigable... INFORMATION: Regulatory Information The Coast Guard is issuing this temporary rule without prior notice and... Pipeline bridge poses to the navigational channel necessitates that all mariners comply with this RNA...

  7. Time and Motion Study of a Community Patient Navigator

    Directory of Open Access Journals (Sweden)

    Sara S. Phillips

    2014-04-01

    Full Text Available Research on patient navigation has focused on validating the utility of navigators by defining their roles and analyzing their effects on patient outcomes, patient satisfaction, and cost effectiveness. Patient navigators are increasingly used outside the research context, and their roles without research responsibilities may look very different. This pilot study captured the activities of a community patient navigator for uninsured women with a positive screening test for breast cancer, using a time and motion approach over a period of three days. We followed the actions of this navigator minute by minute to assess the relative ratios of actions performed and to identify areas for time efficiency improvement to increase direct time with patients. This novel approach depicts the duties of a community patient navigator no longer fettered by navigation logs, research team meetings, surveys, and the consent process. We found that the community patient navigator was able to spend more time with patients in the clinical context relative to performing paperwork or logging communication with patients as a result of her lack of research responsibilities. By illuminating how community patient navigation functions as separate from the research setting, our results will inform future hiring and training of community patient navigators, system design and operations for improving the efficiency and efficacy of navigators, and our understanding of what community patient navigators do in the absence of research responsibilities.

  8. Navigating oceans and cultures: Polynesian and European navigation systems in the late eighteenth century

    Science.gov (United States)

    Walker, M.

    2012-05-01

    Significant differences in the rotation of the celestial dome between the tropical and temperate zones did not stop the peoples of either the tropical Pacific or temperate Europe from using geocentric astronomy to guide exploration of the oceans. Although the differences in the night sky contributed to differences between the Pacific Island and European systems for navigation at sea, the two navigation systems exhibit substantial similarities. Both systems define positions on the surface of the Earth using two coordinates that vary at right angles to each other and use stars, and to a lesser extent the sun, to determine directions. This essay explores similarities and differences in the use of geocentric astronomy for navigation at sea by the peoples of Polynesia and Europe in the late eighteenth century. Captain Cook's orders to discover the unknown southern continent after observing the transit of Venus combined with differences in language and culture to obscure the deeper similarities between the navigation systems used by Cook and the Polynesians. Although it was a further 200 years before anthropologists studied Pacific navigation, collaborations in voyaging with communities in Oceania demonstrated the effectiveness of Pacific navigation systems, revived interest in traditional voyaging in island communities around the Pacific, and potentially open the way for further collaborations in other areas.

  9. The mechanism of selecting priority options and sequence of solutions to ensure the safety of towing caravan navigation

    Directory of Open Access Journals (Sweden)

    Brazhnyy A. I.

    2016-12-01

    Full Text Available The paper considers navigational safety movement of the towed object and tugboat. Some methods of alternatives choice of decision-maker persons (DMP to manage the safety of towing a caravan have been presented. Examples of navigation safety conditions, their operational relationship, critical and emergency character with respect to the predetermined position of the band have been given; the sequence of forming actions of the algorithm based on an assessment of possible losses for the sustainability of the towing operation has been proposed. The aim is to research and develop a sequence of logical conclusions for forming some mechanism to take corrective action when navigating the composition of the output of the towing caravan of navigation stable security situation for its return to the original settings of sustainable movement. To assess the risks of navigation functions the risk analysis method has been used, with further selection of management synthesized for towing process, taking into account the possible reaction of the "human element". For estimations well-known in the probability theory and mathematical statistics methods have been used. An iterative mathematical model of the tow caravan considering the posterior distribution of parameters caravan phase coordinates for the given cases has been built. The possibility of resource losses when choosing the optimal alternative has been investigated. It has been established that while selecting and adopting a single decision under risk, including alternatives to the losses, one can always find such an alternative which is able to ensure the management of the caravan navigational safety decreasing the probability of large losses. When operating the navigation state of towing caravan one should choose the optimal alternative that minimizes the possibility of the maximum cost, and then based on it to choose (with incomplete awareness of decision-makers optimal sequence of controls which in turn

  10. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  11. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  12. Tracking the emergence of synthetic biology.

    Science.gov (United States)

    Shapira, Philip; Kwon, Seokbeom; Youtie, Jan

    2017-01-01

    Synthetic biology is an emerging domain that combines biological and engineering concepts and which has seen rapid growth in research, innovation, and policy interest in recent years. This paper contributes to efforts to delineate this emerging domain by presenting a newly constructed bibliometric definition of synthetic biology. Our approach is dimensioned from a core set of papers in synthetic biology, using procedures to obtain benchmark synthetic biology publication records, extract keywords from these benchmark records, and refine the keywords, supplemented with articles published in dedicated synthetic biology journals. We compare our search strategy with other recent bibliometric approaches to define synthetic biology, using a common source of publication data for the period from 2000 to 2015. The paper details the rapid growth and international spread of research in synthetic biology in recent years, demonstrates that diverse research disciplines are contributing to the multidisciplinary development of synthetic biology research, and visualizes this by profiling synthetic biology research on the map of science. We further show the roles of a relatively concentrated set of research sponsors in funding the growth and trajectories of synthetic biology. In addition to discussing these analyses, the paper notes limitations and suggests lines for further work.

  13. DNA recognition by synthetic constructs.

    Science.gov (United States)

    Pazos, Elena; Mosquera, Jesús; Vázquez, M Eugenio; Mascareñas, José L

    2011-09-05

    The interaction of transcription factors with specific DNA sites is key for the regulation of gene expression. Despite the availability of a large body of structural data on protein-DNA complexes, we are still far from fully understanding the molecular and biophysical bases underlying such interactions. Therefore, the development of non-natural agents that can reproduce the DNA-recognition properties of natural transcription factors remains a major and challenging goal in chemical biology. In this review we summarize the basics of double-stranded DNA recognition by transcription factors, and describe recent developments in the design and preparation of synthetic DNA binders. We mainly focus on synthetic peptides that have been designed by following the DNA interaction of natural proteins, and we discuss how the tools of organic synthesis can be used to make artificial constructs equipped with functionalities that introduce additional properties to the recognition process, such as sensing and controllability. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Synthetic Biology of Polyhydroxyalkanoates (PHA).

    Science.gov (United States)

    Meng, De-Chuan; Chen, Guo-Qiang

    Microbial polyhydroxyalkanoates (PHA) are a family of biodegradable and biocompatible polyesters which have been extensively studied using synthetic biology and metabolic engineering methods for improving production and for widening its diversity. Synthetic biology has allowed PHA to become composition controllable random copolymers, homopolymers, and block copolymers. Recent developments showed that it is possible to establish a microbial platform for producing not only random copolymers with controllable monomers and their ratios but also structurally defined homopolymers and block copolymers. This was achieved by engineering the genome of Pseudomonas putida or Pseudomonas entomophiles to weaken the β-oxidation and in situ fatty acid synthesis pathways, so that a fatty acid fed to the bacteria maintains its original chain length and structures when incorporated into the PHA chains. The engineered bacterium allows functional groups in a fatty acid to be introduced into PHA, forming functional PHA, which, upon grafting, generates endless PHA variety. Recombinant Escherichia coli also succeeded in producing efficiently poly(3-hydroxypropionate) or P3HP, the strongest member of PHA. Synthesis pathways of P3HP and its copolymer P3HB3HP of 3-hydroxybutyrate and 3-hydroxypropionate were assembled respectively to allow their synthesis from glucose. CRISPRi was also successfully used to manipulate simultaneously multiple genes and control metabolic flux in E. coli to obtain a series of copolymer P3HB4HB of 3-hydroxybutyrate (3HB) and 4-hydroxybutyrate (4HB). The bacterial shapes were successfully engineered for enhanced PHA accumulation.

  15. Vectoring of parallel synthetic jets

    Science.gov (United States)

    Berk, Tim; Ganapathisubramani, Bharathram; Gomit, Guillaume

    2015-11-01

    A pair of parallel synthetic jets can be vectored by applying a phase difference between the two driving signals. The resulting jet can be merged or bifurcated and either vectored towards the actuator leading in phase or the actuator lagging in phase. In the present study, the influence of phase difference and Strouhal number on the vectoring behaviour is examined experimentally. Phase-locked vorticity fields, measured using Particle Image Velocimetry (PIV), are used to track vortex pairs. The physical mechanisms that explain the diversity in vectoring behaviour are observed based on the vortex trajectories. For a fixed phase difference, the vectoring behaviour is shown to be primarily influenced by pinch-off time of vortex rings generated by the synthetic jets. Beyond a certain formation number, the pinch-off timescale becomes invariant. In this region, the vectoring behaviour is determined by the distance between subsequent vortex rings. We acknowledge the financial support from the European Research Council (ERC grant agreement no. 277472).

  16. Synthetic membrane-targeted antibiotics.

    Science.gov (United States)

    Vooturi, S K; Firestine, S M

    2010-01-01

    Antimicrobial resistance continues to evolve and presents serious challenges in the therapy of both nosocomial and community-acquired infections. The rise of resistant strains like methicillin-resistant Staphylococcus aureus (MRSA), vancomycin-resistant Staphylococcus aureus (VRSA) and vancomycin-resistant enterococci (VRE) suggests that antimicrobial resistance is an inevitable evolutionary response to antimicrobial use. This highlights the tremendous need for antibiotics against new bacterial targets. Agents that target the integrity of bacterial membrane are relatively novel in the clinical armamentarium. Daptomycin, a lipopeptide is a classical example of membrane-bound antibiotic. Nature has also utilized this tactic. Antimicrobial peptides (AMPs), which are found in all kingdoms, function primarily by permeabilizing the bacterial membrane. AMPs have several advantages over existing antibiotics including a broad spectrum of activity, rapid bactericidal activity, no cross-resistance with the existing antibiotics and a low probability for developing resistance. Currently, a small number of peptides have been developed for clinical use but therapeutic applications are limited because of poor bioavailability and high manufacturing cost. However, their broad specificity, potent activity and lower probability for resistance have spurred the search for synthetic mimetics of antimicrobial peptides as membrane-active antibiotics. In this review, we will discuss the different classes of synthetic membrane-bound antibiotics published since 2004.

  17. Synthetic vision display evaluation studies

    Science.gov (United States)

    Regal, David M.; Whittington, David H.

    1994-01-01

    The goal of this research was to help us understand the display requirements for a synthetic vision system for the High Speed Civil Transport (HSCT). Four experiments were conducted to examine the effects of different levels of perceptual cue complexity in displays used by pilots in a flare and landing task. Increased levels of texture mapping of terrain and runway produced mixed results, including harder but shorter landings and a lower flare initiation altitude. Under higher workload conditions, increased texture resulted in an improvement in performance. An increase in familiar size cues did not result in improved performance. Only a small difference was found between displays using two patterns of high resolution texture mapping. The effects of increased perceptual cue complexity on performance was not as strong as would be predicted from the pilot's subjective reports or from related literature. A description of the role of a synthetic vision system in the High Speed Civil Transport is provide along with a literature review covering applied research related to perceptual cue usage in aircraft displays.

  18. Total knee arthroplasty with a computer-navigated saw: a pilot study.

    Science.gov (United States)

    Garvin, Kevin L; Barrera, Andres; Mahoney, Craig R; Hartman, Curtis W; Haider, Hani

    2013-01-01

    Computer-aided surgery aims to improve implant alignment in TKA but has only been adopted by a minority for routine use. A novel approach, navigated freehand bone cutting (NFC), is intended to achieve wider acceptance by eliminating the need for cumbersome, implant-specific mechanical jigs and avoiding the expense of navigation. We determined cutting time, surface quality, implant fit, and implant alignment after NFC of synthetic femoral specimens and the feasibility and alignment of a complete TKA performed with NFC technology in cadaveric specimens. Seven surgeons prepared six synthetic femoral specimens each, using our custom NFC system. Cutting times, quality of bone cuts, and implant fit and alignment were assessed quantitatively by CT surface scanning and computational measurements. Additionally, a single surgeon performed a complete TKA on two cadaveric specimens using the NFC system, with cutting time and implant alignment analyzed through plain radiographs and CT. For the synthetic specimens, femoral coronal alignment was within ± 2° of neutral in 94% of the specimens. Sagittal alignment was within 0° to 5° of flexion in all specimens. Rotation was within ± 1° of the epicondylar axis in 97% of the specimens. The mean time to make cuts improved from 13 minutes for the first specimen to 9 minutes for the fourth specimen. TKA was performed in two cadaveric specimens without complications and implants were well aligned. TKA is feasible with NFC, which eliminates the need for implant-specific instruments. We observed a fast learning curve. NFC has the potential to improve TKA alignment, reduce operative time, and reduce the number of instruments in surgery. Fewer instruments and less sterilization could reduce costs associated with TKA.

  19. SLS Navigation Model-Based Design Approach

    Science.gov (United States)

    Oliver, T. Emerson; Anzalone, Evan; Geohagan, Kevin; Bernard, Bill; Park, Thomas

    2018-01-01

    The SLS Program chose to implement a Model-based Design and Model-based Requirements approach for managing component design information and system requirements. This approach differs from previous large-scale design efforts at Marshall Space Flight Center where design documentation alone conveyed information required for vehicle design and analysis and where extensive requirements sets were used to scope and constrain the design. The SLS Navigation Team has been responsible for the Program-controlled Design Math Models (DMMs) which describe and represent the performance of the Inertial Navigation System (INS) and the Rate Gyro Assemblies (RGAs) used by Guidance, Navigation, and Controls (GN&C). The SLS Navigation Team is also responsible for the navigation algorithms. The navigation algorithms are delivered for implementation on the flight hardware as a DMM. For the SLS Block 1-B design, the additional GPS Receiver hardware is managed as a DMM at the vehicle design level. This paper provides a discussion of the processes and methods used to engineer, design, and coordinate engineering trades and performance assessments using SLS practices as applied to the GN&C system, with a particular focus on the Navigation components. These include composing system requirements, requirements verification, model development, model verification and validation, and modeling and analysis approaches. The Model-based Design and Requirements approach does not reduce the effort associated with the design process versus previous processes used at Marshall Space Flight Center. Instead, the approach takes advantage of overlap between the requirements development and management process, and the design and analysis process by efficiently combining the control (i.e. the requirement) and the design mechanisms. The design mechanism is the representation of the component behavior and performance in design and analysis tools. The focus in the early design process shifts from the development and

  20. 14 CFR 121.349 - Communication and navigation equipment for operations under VFR over routes not navigated by...

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Communication and navigation equipment for... § 121.349 Communication and navigation equipment for operations under VFR over routes not navigated by... receiver providing visual and aural signals; and (iii) One ILS receiver; and (3) Any RNAV system used to...