... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
National Aeronautics and Space Administration — The need for in-flight event detection and monitoring systems is clear. To address this and other safety and security needs, IEM proposed the Reactive In-flight...
Wagner, David A.
The Space Flight Operations Center is a networked system of workstation-class computers that will provide ground support for NASA's next generation of deep-space missions. The author recounts the development of the SFOC system security policy and discusses the various management and technology issues involved. Particular attention is given to risk assessment, security plan development, security implications of design requirements, automatic safeguards, and procedural safeguards.
Thomas J Mowen
Full Text Available Although investigation of school security measures and their relationships to various outcomes including school crime rates (Gottfredson, 2001, perpetuation of social inequality (Ferguson, 2001; Nolan, 2011; Welch & Payne, 2010, and the impact on childhood experiences has seen significant growth within the last 20 years (Newman, 2004; Kupchik, 2010, few studies have sought to explore the impacts of these measures on suspension rates. Using data from the Educational Longitudinal Study (2002, I explore the relationship between security measures and in-school, out-of-school, and overall suspension rates. Results indicate schools with a security officer experience higher rates of in-school suspensions but have no difference in rates of out-of-school or overall suspensions compared to schools without a security officer. No other measure of security was related to higher suspension rates. As prior literature suggests, schools with greater proportions of black students experienced significantly higher rates of all suspension types. Finally, different types of parental involvement correlated with both higher and lower suspension rates.
Servoss, Timothy J.; Finn, Jeremy D.
This study utilized school-level data from several combined national databases to address two questions regarding school security policy: (1) What are the school characteristics related to levels of security? (2) How does security relate to school suspension, dropout, and college attendance rates? Among the predictors of school security, having a…
Outbreaks of violence at education institutions typically do not rise to the horrific levels of Virginia Tech, Columbine High School, or Oikos University. But incidents that threaten school security--bullying, hazing, online harassment--take place in every month of the year and may occur in any classroom or campus from coast to coast. Schools and…
...-2006-26661; Amendment No., 141-14] RIN 2120-AI86 Pilot, Flight Instructor, and Pilot School..., certification, and operating requirements for pilots, flight instructors, ground instructors, and pilot schools...: Background On August 21, 2009, the FAA published the ``Pilot, Flight Instructor, and Pilot School...
Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.
NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.
Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…
Due to the stiffening requirements of security measures at the airports, prevention of air-travel related illnesses have become more difficult. The backlash effects of restrictions (e.g. fluid and movement restrictions) can trigger or even improve pathophysiological processes. The most advanced security check methods, the full body scan, besides ethical and moral considerations, may induce yet unknown pathological processes. We face the similar problem with the traveller, who becomes ill or injured during the trip. In this case, repatriation is often required, which is usually accomplished by commercial airlines. If patient should be transported by stretcher, it is also available on regular flight, but in this case he/she must be accompanied by a medical professional. This solution raises much more security problem: not only the sick person and the medical team, but even their medical equipments and medicines have to be checked. Due to the lack of standardised regulations the security staff solves the problem by various attempts from emphatic approach till refusal. For these reasons, a clear and exact regulation is needed, which must be based upon medical experts' opinion, and should deal not only with the flight security but with the patient's security, as well. This regulation can cease the patients and their medical accompanied persons' to be defencelessness against local authorities and security services. The same is true for handicapped persons. Author suggests solutions for the problem, balancing between flight security and the patient's "sickurity".
Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are c
Hunter, Richard C.; Mazingo, Terri H.
Describes efforts by two school districts to address the potential threats of shootings and other school disruptions: Baltimore City Public Schools in Maryland and Charlotte-Mecklenburg Public Schools in North Carolina. Also describes the growing costs of providing safety and security in elementary and secondary schools. (Contains 13 references.)…
.... No. 61-127] RIN 2120-AI86 Pilot, Flight Instructor, and Pilot School Certification; Technical... for pilots, flight instructors, ground instructors, and pilot schools. This document reinstates two... entitled, ``Pilot, Flight Instructor, and Pilot School Certification; Final Rule'' (74 FR 42500). That...
... (Recordkeeping at Flight Schools); Comment Request AGENCY: Veterans Benefits Administration, Department of... offered by a flight school should be approved. DATES: Written comments and recommendations on the proposed... use of other forms of information technology. Title: Recordkeeping at Flight Schools (38 U.S.C. 21...
... (Recordkeeping at Flight Schools); Comment Request AGENCY: Veterans Benefits Administration, Department of... courses offered by a flight school should be approved. DATES: Written comments and recommendations on the... use of other forms of information technology. Title: Recordkeeping at Flight Schools (38 U.S.C. 21...
Cresente E. Glariana
Full Text Available This study attempted to determine the status of school safety and security in terms of the school sites, school playground, school canteen services, water safety, fire safety, campus security, building security, and sanitary facilities situation in eight (8 elementary schools in Libertad town. The descriptive survey was used to find out the status of school safety and security in the elementary schools of Libertad, Misamis Oriental. A checklist on the standards of facilities as implemented by the Department of Education was used to gather the data. Checklist was based from the 2010 Educational Facilities Manual. Evaluation based on the checklist showed that some of standards on 2010 Educational Facilities Manual were not observed. The schools have not complied with the requirements and specifications. The evaluation showed further that most of the schools did not comply within the standards set by the 2010 Educational Facilities Manual. School authorities may review the standards in the 2010 Educational Facilities Manual. The school should try to meet the standard to ensure safety and security of the pupils. Action plan may be prepared to be implemented in case of emergency.
In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…
Montgomery County Public Schools, 2014
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…
Montgomery County Public Schools, 2013
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…
Montgomery County Public Schools, 2012
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…
Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…
Montgomery County Public Schools, 2010
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) public schools. The information is presented for each school.…
Montgomery County Public Schools, 2009
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…
Montgomery County Public Schools, 2011
"MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…
Mowen, Thomas J.
Although investigation of school security measures and their relationships to various outcomes including school crime rates (Gottfredson, 2001), perpetuation of social inequality (Ferguson, 2001; Nolan, 2011; Welch & Payne, 2010), and the impact on childhood experiences has seen significant growth within the last 20 years (Newman, 2004;…
Gerlinger, Julie; Wo, James C.
A common response to school violence features the use of security measures to deter serious and violent incidents. However, a second approach, based on school climate theory, suggests that schools exhibiting authoritative school discipline (i.e., high structure and support) might more effectively reduce school disorder. We tested these approaches…
DeAngelis, Karen J.; Brent, Brian O.; Ianni, Danielle
A spate of school shootings in the U.S. has prompted policymakers to address the public's growing perception that our schools are unsafe. As education policymakers continue to press for additional security initiatives, it is important to understand the costs borne by school systems for these programs. Thus far, the scholarly literature is silent…
Bartfeld, Judith S; Ahn, Hong-Min
The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.
...-26661; Amdt. No. 61-129A] RIN 2120-AI86 Pilot, Flight Instructor, and Pilot School Certification... revise the training, qualification, certification, and operating requirements for pilots, flight instructors, ground instructors, and pilot schools. A portion of the codified text was inadvertently deleted...
Tanner-Smith, Emily E; Fisher, Benjamin W
Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.
Miller, Janice Williams; Nickell, Linda K.
This study presents the development and basic psychometric characteristics of the "School Safety and Security Questionnaire" (SSSQ). This new measure was constructed to assess middle grade students' perceptions of safety and security during the school year. The content validity of the theoretically-based instrument was assessed and the measure was…
...-26661; Amdt. No. 61-129] RIN 2120-AI86 Pilot, Flight Instructor, and Pilot School Certification... requirements for pilots, flight instructors, ground instructors, and pilot schools. This document corrects an... a practical test for the issuance of a sport pilot certificate in a light-sport aircraft other than...
Rossell, Christine H.; Hawley, Willis D.
Discussed in this report are the extent and causes of white flight from school desegregation and policy options for controlling it. After an introductory section, the report considers the extent of white flight from desegregating schools, taking into account the effects of suburbanization, interregional migration, and differentials in…
Trump, Kenneth S.
The top five security risks in today's schools include aggressive behavior, weapons possession or use, drug trafficking, gangs, and "stranger danger." Home-made bomb threats are common. This article also discusses security system costs, risk-reduction frameworks, security assessments, crisis-preparedness guidelines, and security-related…
Fisher, Benjamin W; Mowen, Thomas J; Boman, John H
Although school security measures have become a common fixture in public schools across the United States, research on the relationship between security and adolescent victimization is mixed, with very few studies examining trends in adolescent victimization across time. Using two waves of data from the Educational Longitudinal Study 2002 (N = 7659; 50.6% female; 56.7% White, 13.3% Black, 13.5% Hispanic, 11.3% Asian American, 5.4% other race), results from a series of multi-level models demonstrate that adolescents in schools with more security measures report higher odds of being threatened with harm, and no difference in odds of being in a physical altercation or having something stolen over time. Although prior research has established racial disparities in using school security measures, results demonstrate inconsistent patterns in the extent to which adolescents' race conditions the relationship between security and victimization. The findings are discussed in light of existing theoretical and empirical work, and implications for both research and practice are offered.
White, C. J.; Gina, J. M.; Coetzee, I. E. M.
This article is based on research conducted on the topic: "Safety and security in schools: The case of KwaZulu-Natal." For the research project a purposive sample consisting of secondary school learners, teachers, school governing body chairpersons and principals were selected from the rural and township schools used in this study to…
de Waal, Elda; Grosser, M. M.
Education law and policy currently focus on broader physical aspects of safety and security at schools, as well as, for example, on pedagogical insecurity such as is caused by discriminatory teaching, but law and policy have yet to pay attention to the overall and far-reaching pedagogical safety and security of learners. By means of a descriptive…
Braun, G. W.; Varadi, P. F.
This report explores the technical and economic aspects of installing solar power (photovoltaic aka PV) systems on schools to improve the schools' energy security and provide power during disasters.
Runkle, Robert C.; Baciak, James E.; Stave, Jean A.
The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the inaugural Radiation Detection for Nuclear Security Summer School from June 11 – 22, 2012. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. The first week of the summer school focused on the foundational knowledge required by technology practitioners; the second week focused on contemporary applications. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security.
Harder, Annemiek T.; Huyghen, Anne-Marie N.; Knot-Dickscheit, Jana; Kalverboer, Margrite E.; Köngeter, Stefan; Zeller, Maren; Knorth, Erik J.
Despite poor school performance by adolescents in secure residential care and the potential importance of education during care, little is known about how to achieve academic success with these adolescents. Therefore, the aim of the present study is to assess adolescents' academic achievement during
De Patta, Joe
Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…
Runkle, Robert C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Baciak, James E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Woodring, Mitchell L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Jenno, Diana M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
Executive Summary The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the 3rd Radiation Detection for Nuclear Security Summer School from 16 – 27 June 2014. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security. In fact, we are beginning to see previous students both enroll in graduate programs (former undergraduates) and complete internships at agencies like the National Nuclear Security Administration.
... DEPARTMENT OF AGRICULTURE Forest Service Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: In accordance with the Secure Rural Schools and Community Self Determination Act of 2000 (Pub. L. 106-393), [as...
Pietsch, Renée B.; Bohland, Cynthia L.; Schmale, David G., III.
Biological flight mechanics is typically taught in graduate level college classes rather than in secondary school classes. We developed an interdisciplinary unit for advanced upper-level secondary school students (ages 15-18) to teach the principles of flight and applications to biological systems. This unit capitalised on the tremendous…
Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian
NASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto
Beyer, Anja; Westendorf, Christiane
The internet is a fast changing medium and comprises several websites fraught with risk. In this context especially young age groups are endangered. They have less experience using the media and little knowledge on existing internet risks. There are a number of initiatives, which are engaged in the topic of internet safety. They provide information about measures on how to prevent and to deal with internet risks. However it is not certain if these initiatives do reach their target group (children and adolescents). In this regard schools bear a special relevance, since they have the knowledge about didactic methods and the chance to address measures directly to children and adolescents. The authors of this paper provide an overview of current security education in German schools, problems and open questions. Finally the authors make recommendations on how to establish internet safety in schools.
The research problem addressed in this quantitative correlational study was the inadequacy of sound information security management (ISM) practices in K-12 school districts, despite their increasing ownership of information assets. Researchers have linked organizational and sociotechnical factors to the implementation of information security…
Full Text Available This study assessed the relationship between teacher retention and job security in private secondary schools in Ogun state, Nigeria. The study assessed ade-quacy in teaching and learning infrastructure, evaluated mode of recruitment of teachers, the factors responsible for high teacher turnover and teachers retention strategies employed in private secondary schools. Descriptive research of the survey design was employed in this study. Data were collected using questionnaire. Multistage sampling technique was used for data collection among 200 teachers including the school principals. Data collected were analyzed with a mixture of descriptive and inferential statistics. Percentages, mean and frequency counts were used to answer the research questions raised while Pearson Moment Correlation Coefficient and t-test analysis were used to test the formulated hypotheses at 0.05 level of significance. The findings from this study revealed that teaching and learning infrastructure were inadequate in most of the schools. It was observed that books, classroom and teachers were very adequate in some of the schools. However, few of the schools had internet facility for knowledge transfer and student exposure to the worldwide web. The study also showed that the proprietors were primarily responsible for staff recruitment although there were instances where formal advertisement for recruitment was made. The study further revealed a significant relationship between teacher retention strategies and job security in private secondary schools in Osun state. The study also showed a significant relationship between teacher turnover and job security in the schools. In addition, the findings showed a significant relationship between teacher turnover and job security in private secondary schools in Osun state. Lastly, the study revealed a significant difference in the mean rate and female teachers' turnover in the selected private secondary schools. Based on the
..., and training aids. 141.41 Section 141.41 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... aids. An applicant for a pilot school certificate or a provisional pilot school certificate must show that its flight simulators, flight training devices, training aids, and equipment meet the following...
Potamites, Elizabeth; Gordon, Anne
Using 2005 data from the U.S. Department of Agriculture's Third School Nutrition Dietary Assessment survey, this study examines the contribution of school meals to the food and nutrient intake of children in food-secure, marginally secure, and food-insecure households. The study finds that children from food-insecure and marginally secure…
This study examined the relations between 8-12-year-olds' perceived attachment security to father, academic self-concept and school performance in language mastery. One hundred and twenty two French students' perceptions of attachment to mother and to father were explored with the Security Scale and their academic self-concept was assessed with…
In a move away from the open or low-fenced grounds that have traditionally been a feature of Australian school design, the last decade has seen a growth in the installation of high-security fences around schools. These structures, far from being passive and neutral, act to redefine the possibilities for movement and connectivity in the local…
... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... transportation operators, flight students, and others, where appropriate, for services related to security threat.... Enforce safety- and security-related regulations and requirements; 3. Assess and distribute intelligence...
... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Security. 460.53 Section 460.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....53 Security. An operator must implement security requirements to prevent any space flight participant...
Green, Mary W.
As problems of violence and crime become more prevalent in our schools, more and more school districts will elect to use security technologies to control these problems. While the desired change in student and community attitudes will require significant systemic change through intense US social programs, security technologies can greatly augment school staff today by providing services similar to having extra adults present. Technologies such as cameras, sensors, drug detection, biometric and personnel identification, lighting, barriers, weapon and explosives detection, anti- graffiti methods, and duress alarms can all be effective, given they are used in appropriate applications, with realistic expectations and an understanding of limitations. Similar to a high-risk government facility, schools must consider a systems approach to security, which includes the use of personnel and procedures as well as security technologies, such that the synergy created by all these elements together contributes more tot he general 'order maintenance' of the facility than could be achieved by separate measures not integrated or related.
Education is a complex social practice. In the United Kingdom context, schooling is further nested within the complex social practices of community governance, quasi-market public choice, and religion. This essay explores the shifting definitions of community and education in the context of the Counter Terrorism and Security Act 2015, which places…
Rutledge, Jennifer Geist
This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…
Green, Mary Wilson
The purpose of this report is to provide school administrators with the ability to determine their security system requirements, so they can make informed decisions when working with vendors and others to improve their security posture. This is accomplished by (1) explaining a systems-based approach to defining the objectives and needs of the system, and (2), providing information on the ability of common components (sensors, cameras, metal detectors, etc) to achieve those objectives, in an effectively integrated system.
Mohammadzadeh, Assieh; Dorosty, Ahmadreza; Eshraghian, Mohammadreza
The present study was designed to determine household food security status and factors associated with food insecurity among high-school students in Esfahan, Iran. Cross-sectional surveys. The present study was conducted in autumn 2008 in Esfahan, Iran. The samples were selected using systematic cluster sampling. Socio-economic questionnaires, food security questionnaires and FFQ were filled out during face-to-face interviews. In addition, data on participants' weights and heights were collected. A total of 580 students (261 boys and 319 girls) aged 14-17 years from forty high schools in Esfahan, Iran, were selected. The prevalence of household food insecurity according to the US Department of Agriculture food security questionnaire was 36.6 % (95 % CI 0.33, 0.40). Food insecurity was positively associated with number of members in the household (P hamburger, poultry, fish, green vegetables, root and bulb (coloured) vegetables, melons, apples and oranges, milk and yoghurt (P hamburger), whereas those living in food-insecure households more frequently consumed cheap foods containing high energy per kilogram. The present study suggests that intervention programmes be designed and carried out.
6th Annual Homeland Security and Defense Education Summit Developing an Adaptive Homeland Security Environment, Burlington, MA, September 26-28, 2013 2013 Summit Agenda Naval Postgraduate School Center for Homeland Defense and Security In Partnership With Northeastern University, Department of Homeland Security, Federal Emergency Management Agency, National Guard Homeland Security Institute, National Homeland Defense Foundation Naval Postgraduate School Center for Homeland Defense and S...
... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aircraft security. 121.538 Section 121.538..., FLAG, AND SUPPLEMENTAL OPERATIONS Flight Operations § 121.538 Aircraft security. Certificate holders conducting operations under this part must comply with the applicable security requirements in 49 CFR chapter...
Full Text Available In this research has been presented an assessment of safety situation in schools, examined through the attitudes of students and teachers of secondary schools in five municipalities of Tuzla Canton. The sample consisted of 160 subjects, who for the purposes of this research divided in three subsample: male students, female students and professors. The research was conducted as a questionnaire, where on the posted statements subjects chose one of five responses on the Likert-type scale. The results of the research showed that subjects generally have unfavourable attitudes about security situation in secondary schools, which makes them feel very insecure. By descriptive analysis, besides these attitudes, it was determined that there are certain differences between the subsamples per individual variables. By analysis of variance, about influence of different status (student-professor on the sub-samples attitudes about safety in schools, it was determined that these differences were not statistically significant at the level p <.05 in results for the three subsample (F = .421, p = .245. In relation on manifested negative attitudes about safety in schools, but also the homogeneity of results, in relation on the total sample of subjects, it is necessary to determine an adequate strategy of action, develop appropriate programs for work with students and make their prompt implementation in order to achieve safer living conditions and work in the school environment.
Karam soltani Z
Full Text Available Background: Food security is defined as access, for all people at all times, to enough food for an active and healthy life. Food security includes: 1 the ready availability of nutritionally-adequate and safe food, and 2 an assured ability to acquire acceptable foods in socially acceptable ways. The increase in childhood as well as adulthood obesity and food insecurity has caused many recent investigations on obesity, food insecurity and some associated factors. However, there appears to be a lack of published information regarding some factors affecting obesity and food insecurity. This study aimed to determine the prevalence obesity and food insecurity and some associated factors among Yazd province primary school students in Iran.Methods: Using two-stage cluster sampling, a total of 3245 students (1587 boys and 1658 girls, aged 9-11 years, were randomly selected from primary school pupils in Yazd, Iran. From these, 187 students having BMIs ≥95th percentile, as defined by Hosseini et al. (1999, were identified as obese and 187 pupils of the same age and gender having BMIs between the 15th and 85th percentiles were selected as controls. Data were collected using 24-hour food-recall and USDA food insecurity questionnaires.Results: We found that the prevalence of obesity among students aged 9-11 years was 13.3%, and the prevalence of food insecurity was 30.5%. Daily energy intakes, compared to those recommended by the RDA, carbohydrate intake and energy percentages from proteins and carbohydrates were higher in obese children, and all macronutrient intakes per kilogram of body weight were significantly higher. An association between obesity and food insecurity was observed with adjusted fat intake.Conclusion: In conclusion, the prevalence of obesity and food insecurity is high among Yazd primary school students, and high-level intakes of energy, protein, carbohydrate are associated with obesity. Furthermore, variation in the rate of fat intake
... their official duties. The computer system also maintains a real-time audit of individuals who access... Secure Flight Program regulations \\4\\ for the purpose of enhancing the security of air travel in the... detection of individuals on federal government watch lists who seek to travel by air, and to facilitate the...
Bleacher, L. V.; Lakew, B.; Bracken, J.; Brown, T.; Rivera, R.
The NASA Goddard Planetary Science Winter School (PSWS) is a Goddard Space Flight Center-sponsored training program, managed by Goddard's Solar System Exploration Division (SSED), for Goddard-based postdoctoral fellows and early career planetary scientists. Currently in its third year, the PSWS is an experiential training program for scientists interested in participating on future planetary science instrument teams. Inspired by the NASA Planetary Science Summer School, Goddard's PSWS is unique in that participants learn the flight instrument lifecycle by designing a planetary flight instrument under actual consideration by Goddard for proposal and development. They work alongside the instrument Principal Investigator (PI) and engineers in Goddard's Instrument Design Laboratory (IDL; idc.nasa.gov), to develop a science traceability matrix and design the instrument, culminating in a conceptual design and presentation to the PI, the IDL team and Goddard management. By shadowing and working alongside IDL discipline engineers, participants experience firsthand the science and cost constraints, trade-offs, and teamwork that are required for optimal instrument design. Each PSWS is collaboratively designed with representatives from SSED, IDL, and the instrument PI, to ensure value added for all stakeholders. The pilot PSWS was held in early 2015, with a second implementation in early 2016. Feedback from past participants was used to design the 2017 PSWS, which is underway as of the writing of this abstract.
Randall Reback; Jonah Rockoff; Heather L. Schwartz
We conduct the first nationwide study of incentives under the No Child Left Behind (NCLB) Act, which requires states to punish schools failing to meet target passing rates on students' standardized exams. States' idiosyncratic policies created variation in the risk of failure among very similar schools in different states, which we use to identify effects of accountability pressure. We find NCLB lowers teachers' perceptions of job security, shifts time towards specialist teachers in high-stak...
Xargay, Enric; Hovakimyan, Naira; Dobrokhodov, Vladimir; Kaminer, Isaac; Gregory, Irene M.; Cao, Chengyu
Certification of adaptive control technologies for both manned and unmanned aircraft represent a major challenge for current Verification and Validation techniques. A (missing) key step towards flight certification of adaptive flight control systems is the definition and development of analysis tools and methods to support Verification and Validation for nonlinear systems, similar to the procedures currently used for linear systems. In this paper, we describe and demonstrate the advantages of L(sub l) adaptive control architectures for closing some of the gaps in certification of adaptive flight control systems, which may facilitate the transition of adaptive control into military and commercial aerospace applications. As illustrative examples, we present the results of a piloted simulation evaluation on the NASA AirSTAR flight test vehicle, and results of an extensive flight test program conducted by the Naval Postgraduate School to demonstrate the advantages of L(sub l) adaptive control as a verifiable robust adaptive flight control system.
A. N. Tkhishev
Full Text Available A special aspect of aircraft test is carrying out both flight evaluation and ground operation evaluation in a structure of flying aids and special tools equipment. The specific of flight and sea tests involve metering in offshore zone, which excludes the possibility of fixed geodetically related measuring tools. In this regard, the specific role is acquired by shipbased measurement systems, in particular the mobile modular measuring systems. Information processed in the mobile modular measurement systems is a critical resource having a high level of confidentiality. When carrying out their functions, it should be implemented a proper information control of the mobile modular measurement systems to ensure their protection from the risk of data leakage, modification or loss, i.e. to ensure a certain level of information security. Due to the specific of their application it is difficult to solve the problems of information security in such complexes. The intruder model, the threat model, the security requirements generated for fixed informatization objects are not applicable to mobile systems. It was concluded that the advanced mobile modular measuring systems designed for flight experiments monitoring and control should be created due to necessary information protection measures and means. The article contains a diagram of security requirements formation, starting with the data envelopment analysis and ending with the practical implementation. The information security probabilistic model applied to mobile modular measurement systems is developed. The list of current security threats based on the environment and specific of the mobile measurement system functioning is examined. The probabilistic model of the information security evaluation is given. The problems of vulnerabilities transformation of designed information system into the security targets with the subsequent formation of the functional and trust requirements list are examined.
Payab, Moloud; Motlagh, Ahmad-Reza Dorosty; Eshraghian, Mohammadreza; Rostami, Reza; Siassi, Fereydoun
As a major public health problem, food insecurity has adverse social and psychological effects, in addition to the impact on public health. This study aimed to determine the association of household food security and depression in mothers with primary school children in Ray County. This descriptive, analytical cross-sectional study was conducted on 430 mothers with primary school children in the spring 2010. During a two-stage cluster sampling, an 18-items food security questionnaire (USDA) and the Beck depression inventory were completed via interviewing mothers. Chi-squared test, one-way analysis of variance, simple regression and stepwise multiple regression were used to describe and analyze data, and to identify related factors using SPSS-16 software. The prevalence of food insecurity and depression in mothers were 50.2% and 51.4% respectively. Also 34.6% of mothers in the "food secure" group were depressed and 77.8% in "food insecure with hunger" group were depressed and this difference was statistically significant. Twelve out of the 20 examined variables (age, family size, number of children, economic status, home ownership, employment households, educational level of the mother and also the head of household, height, energy intake, and carbohydrate and protein intakes) were significantly associated with food security and depression. Food insecurity and depression in mothers with primary school children in Ray County showed a significant positive correlation (P < 0.001). The prevalence of household food insecurity and depression in the studied population were high. Since there is a significant relationship between food insecurity and depression, more attention must be paid to this group.
Full Text Available Sports law can be regarded as one of the latest developments in law. As applied to the school setting, and with special reference to sport coaching, this article deals with the five fundamental elements of the law of delict that influence and inform the execution of the duty of care of the educator-coach. This article pays special attention to the legal aspects related to the security, on the one hand, of the learners as participants, but also the educator-coach in his or her respective roles as coach, organiser of sport events, referee and sport official on the other.The basic research question is: To what extent can educator-coaches increase their own security by ensuring safer participation of learners? How can these educators prevent or minimise the occurrence of serious injuries during practices (as coaches and during meetings, contests or matches (as officials, such as being referees? A certain amount of risk is typical of and inherent to most types of sports, especially those that involve physical contact or in which potentially dangerous implements are used. In contrast, many learners are coached by educators that do not necessarily have enough experience, skills or knowledge regarding the more advanced techniques of the specific sports code. This contrast between the inherent risks and the lack of expertise of many educator-coaches creates an amount of insecurity for both the participants and the coaches.This article includes a discussion of the application of the five fundamental elements of the South African law of delict to school sports coaching. To illustrate the ways in which courts consider sports law issues, examples from court cases related to different types of sports are analysed, and, where applicable, cases from other countries and from outside the sphere of education are also included. This discussion is followed by an overview of those legal provisions that impact on sports participation at school.The legal duty of care
Teets, Edward H.
Information enclosed is to be shared with students of Atmospheric Sciences, Engineering and High School STEM programs. Information will show the relationship between atmospheric Sciences and aeronautical flight testing.
Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...
..., and aircraft identification number; (xi) An accounts receivable ledger; (xii) Individual instructor... higher learning are the only entities that can offer flight courses. A State approving agency may approve a flight course only if a flight school or an institution of higher learning offers the course. A...
The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…
...: Basic weather principles. Temperature. Pressure. Winds. Moisture in the atmosphere. Stability. Clouds... school subjects. (3) Each instructor who conducts flight training must hold a valid flight navigator... accordance with the normal practices of accredited technical schools. Before credit is given for any ground...
Capkun, Srdjan; Srivastava, Mani; Cagalj, Mario
localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure nodecentric...
CARO, PAUL W., JR.; ISLEY, ROBERT N.
A STUDY WAS CONDUCTED AT THE U.S. ARMY PRIMARY HELICOPTER SCHOOL, FORT WOLTERS, TEXAS, TO DETERMINE WHETHER THE USE OF A HELICOPTER TRAINING DEVICE WOULD IMPROVE STUDENT PERFORMANCE DURING SUBSEQUENT HELICOPTER CONTACT FLIGHT TRAINING. SUBJECTS WERE TWO EXPERIMENTAL GROUPS AND TWO CONTROL GROUPS OF WARRANT OFFICER CANDIDATES ENROLLED FOR A…
Rossell, Christine H.; Hawley, Willis D.
The context and effects of desegregation on the racial composition of school districts are described with the characteristics and causes of White flight from the schools involved. Federal and state policy options are presented in terms of desegregation plan design, public information needs, metropolitan-wide programs and incentives for voluntary,…
Goseva-Popstojanova, Katerina; Tyo, Jacob
While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.
Administrators are constantly seeking ways to cost-effectively and adequately increase security and improve efficiency in K-12 schools. While video is not a new tool to schools, the shift from analog to network technology has increased the accessibility and usability in a variety of applications. Properly installed and used, video is a powerful…
The Cooperating Hampton Roads Organizations for Minorities in Engineering (CHROME) in cooperation with the NASA Office of Space Flight, Human Exploration and Development of Space Enterprise sponsored a summer institute, Young PHD#s (Persons Having Dreams) in Human Space Flight. This 3-day institute used the curriculum of a workshop designed for space professionals, 'Human Space Flight-Analysis and Design: An Integrated, Systematic Approach.' The content was tailored to a high school audience. This institute seeks to stimulate the interest of pre-college students in space flight and motivate them to pursue further experiences in this field. Additionally, this institute will serve as a pilot model for a pre- collegiate training program that can be replicated throughout the country. The institute was complemented with a trip to the Goddard Space Flight Center.
Floreno, Jeff; Keil, Brad
The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…
Hao Yu Choo
Full Text Available Some researchers have long been interested in reconstructing natural insects into steerable robots or vehicles. However, until recently, these so-called cyborg insects, biobots, or living machines existed only in science fiction. Owing to recent advances in nano/micro manufacturing, data processing, and anatomical and physiological biology, we can now stimulate living insects to induce user-desired motor actions and behaviors. To improve the practicality and applicability of airborne cyborg insects, a reliable and controllable flight initiation protocol is required. This study demonstrates an electrical stimulation protocol that initiates flight in a beetle (Mecynorrhina torquata, Coleoptera. A reliable stimulation protocol was determined by analyzing a pair of dorsal longitudinal muscles (DLMs, flight muscles that oscillate the wings. DLM stimulation has achieved with a high success rate (> 90%, rapid response time (< 1.0 s, and small variation (< 0.33 s; indicating little habituation. Notably, the stimulation of DLMs caused no crucial damage to the free flight ability. In contrast, stimulation of optic lobes, which was earlier demonstrated as a successful flight initiation protocol, destabilized the beetle in flight. Thus, DLM stimulation is a promising secure protocol for inducing flight in cyborg insects or biobots.
Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...
Flanigan, Robin L.
Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)
Chasukwa Mwalwenje, Yvonne; Chasukwa, Steria
Malawi is popularly known as the Warm Heart of Africa. Malawi has a total land area of 45,747 sq. miles. Of the total area, 80 % is covered by fresh water from Lake Malawi and other rivers. The country boasts that it holds large amounts of fresh water and has the third largest lake in Africa. Ironically, the number of households with reliable water access is low (Water Aid, 2014, UNDP, Human Development Report 2008). Regardless of signs of economic development, water security still remains a challenge in the Warm Heart of Africa. The problem with access to water prompted the Government of Malawi to introduce a National Water Policy in 1994 with the vision of 'Water and Sanitation for All'. Since then, other water access interventions have impacted on the ability to manage water sustainably. Over the past few years, more inclusive and diversified interventions have been put in place to reverse the situation. For instance, the government of Malawi has taken action to increase the number of water tanks in schools (UNICEF 2005). Several stakeholders' support the government in their role provides policy direction and coordinate management of the water sector. The outlined National Water and Sanitation Policy strategies includes promoting water conservation and catchment protection; incorporating local governments and communities in planning, development and management of water supplies and sanitation services; rehabilitating the existing infrastructure; creating an enabling environment for public-private partnerships in water supply and sanitation activities; undertaking rehabilitation and reduction of unaccounted-for-water of existing urban, peri-urban, as a priority; promoting economic incentives and opportunities to encourage the participation of small-scale water and sanitation service providers; and promoting water recycling and re-use. Despite of all these interventions, Malawi still continues to face significant challenges with issues of access and quality of
Thienel, Lee; Stouffer, Chuck
This paper presents an overview of the Cryogenic Test Bed (CTB) experiments including experiment results, integration techniques used, and lessons learned during integration, test and flight phases of the Cryogenic Heat Pipe Flight Experiment (STS-53) and the Cryogenic Two Phase Flight Experiment (OAST-2, STS-62). We will also discuss the Cryogenic Flexible Diode Heat Pipe (CRYOFD) experiment which will fly in the 1996/97 time frame and the fourth flight of the CTB which will fly in the 1997/98 time frame. The two missions tested two oxygen axially grooved heat pipes, a nitrogen fibrous wick heat pipe and a 2-methylpentane phase change material thermal storage unit. Techniques were found for solving problems with vibration from the cryo-collers transmitted through the compressors and the cold heads, and mounting the heat pipe without introducing parasitic heat leaks. A thermally conductive interface material was selected that would meet the requirements and perform over the temperature range of 55 to 300 K. Problems are discussed with the bi-metallic thermostats used for heater circuit protection and the S-Glass suspension straps originally used to secure the BETSU PCM in the CRYOTP mission. Flight results will be compared to 1-g test results and differences will be discussed.
... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false ADIZ flight plan requirements. 99.11 Section 99.11 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SECURITY CONTROL OF AIR TRAFFIC General § 99.11 ADIZ...
Aviation security : TSA is increasing procurement and deployment of the advanced imaging technology, but challenges to this effort and other areas of aviation security remain : testimony before the Subcommittee on Transportation Security and Infrastructur
The attempted bombing of Northwest flight 253 highlighted the importance of detecting improvised explosive devices on passengers. This testimony focuses on (1) the Transportation Security Administrations (TSA) efforts to procure and deploy advance...
By nearly all accounts, the staff and students at Sandy Hook Elementary School did everything right on Dec. 14--and with the security measures they took before that day--when a young man armed with powerful weapons blasted his way into the school. But the deadliest K-12 school shooting in American history, a day that President Barack Obama has…
This article analyses how education is positioned in the current concerns about security and extremism. This means firstly examining the different meanings of security (national, human and societal) and who provides security for whom. Initially, a central dilemma is acknowledged: that schooling appears to be simultaneously irrelevant to the huge…
O'Donnell, Robert William
The purpose of this study was to examine changes implemented by public school district personnel in response to the Newtown school shooting that occurred on December 14, 2012. The researcher used the U.S. Department of Education's National Center for Educational Statistics (NCES) School Survey on Crime and Safety (SSOCS) to gather quantitative…
Kulkarni, Deepak; Wang, Yao; Keller, Rich; Chidester, Tom; Statler, Irving; Lynch, Bob; Patel, Hemil; Windrem, May; Lawrence, Bob
The Aviation Data Integration System (ADIS) of Ames Research Center has been established to promote analysis of aviation data by airlines and other interested users for purposes of enhancing the quality (especially safety) of flight operations. The ADIS is a system of computer hardware and software for collecting, integrating, and disseminating aviation data pertaining to flights and specified flight events that involve one or more airline(s). The ADIS is secure in the sense that care is taken to ensure the integrity of sources of collected data and to verify the authorizations of requesters to receive data. Most importantly, the ADIS removes a disincentive to collection and exchange of useful data by providing for automatic removal of information that could be used to identify specific flights and crewmembers. Such information, denoted sensitive information, includes flight data (here signifying data collected by sensors aboard an aircraft during flight), weather data for a specified route on a specified date, date and time, and any other information traceable to a specific flight. The removal of information that could be used to perform such tracing is called "deidentification." Airlines are often reluctant to keep flight data in identifiable form because of concerns about loss of anonymity. Hence, one of the things needed to promote retention and analysis of aviation data is an automated means of de-identification of archived flight data to enable integration of flight data with non-flight aviation data while preserving anonymity. Preferably, such an automated means would enable end users of the data to continue to use pre-existing data-analysis software to identify anomalies in flight data without identifying a specific anomalous flight. It would then also be possible to perform statistical analyses of integrated data. These needs are satisfied by the ADIS, which enables an end user to request aviation data associated with de-identified flight data. The ADIS
Vlissidis, Nikolaos; Leonidas, Filippos; Giovanis, Christos; Marinos, Dimitrios; Aidinis, Konstantinos; Vassilopoulos, Christos; Pagiatakis, Gerasimos; Schmitt, Nikolaus; Pistner, Thomas; Klaue, Jirka
A sensor system capable of medical, safety and security monitoring in avionic and other environments (e.g. homes) is examined. For application inside an aircraft cabin, the system relies on an optical cellular network that connects each seat to a server and uses a set of database applications to process data related to passengers' health, safety and security status. Health monitoring typically encompasses electrocardiogram, pulse oximetry and blood pressure, body temperature and respiration rate while safety and security monitoring is related to the standard flight attendance duties, such as cabin preparation for take-off, landing, flight in regions of turbulence, etc. In contrast to previous related works, this article focuses on the system's modules (medical and safety sensors and associated hardware), the database applications used for the overall control of the monitoring function and the potential use of the system for security applications. Further tests involving medical, safety and security sensing performed in an real A340 mock-up set-up are also described and reference is made to the possible use of the sensing system in alternative environments and applications, such as health monitoring within other means of transport (e.g. trains or small passenger sea vessels) as well as for remotely located home users, over a wired Ethernet network or the Internet.
security architecture has yet to adapt satisfactorily to the new landscape. The UN Security Council has failed to adapt to the rise of new powers. Across...including cinemas , theatres, pubs, nightclubs, restaurants, hotels and commercial centres, hospitals, schools and places of worship); work with architects...and export control regimes, and improving the international monitoring architecture . Countering the threat of nuclear weapons and other weapons of
Janson, Gregory R.; King, Margaret A.
Discussions regarding young children and secure schools often focus on children's physical safety and external stressors such as chaotic families, dangerous neighborhoods, and terrorism. Less attention is given to the emotional security of children in schools, a necessary prerequisite to learning and healthy development. The most effective way to…
Merlino, Daniel K.; Wilson, C. Logan; Carboneau, Lindsey M.; Wilder, Andrew J.; Underwood, Matthew C.
There is an overwhelming desire to create and enhance communication mechanisms between entities that operate within the National Airspace System. Furthermore, airlines are always extremely interested in increasing the efficiency of their flights. An innovative system prototype was developed and tested that improves collaborative decision making without modifying existing infrastructure or operational procedures within the current Air Traffic Management System. This system enables collaboration between flight crew and airline dispatchers to share and assess optimized flight routes through an Internet connection. Using a sophisticated medium-fidelity flight simulation environment, a rapid-prototyping development, and a unified modeling language, the software was designed to ensure reliability and scalability for future growth and applications. Ensuring safety and security were primary design goals, therefore the software does not interact or interfere with major flight control or safety systems. The system prototype demonstrated an unprecedented use of in-flight Internet to facilitate effective communication with Airline Operations Centers, which may contribute to increased flight efficiency for airlines.
Doss, Kevin T.
Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…
as these have already been used successfully in school attacks such as those used in the Columbine massacre . Aum Shinrikyo, now known as Aleph, 36...terrorist siege. Equally disturbing was the school massacre in "Netiv Meir," an elementary school in Ma’a lot, Israel, on May 15, 1974, the twenty-sixth...Immediate Consumer The immediate consumer will be School District 207, which is comprised of three large high schools with a combined student enrollment
Nipkow, T; Hauptmann, B
Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was
CFD . 15. SUBJECT TERMS Boundary layer transition, hypersonic , flight test 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT: SAR 18...consistent with prior CFD 33,34 and wind tunnel measurements 28,29 at hypersonic conditions that indicated that the centerline is more unstable... Hypersonic Sciences Branch High Speed Systems Division NOVEMBER 2013 Approved for public release; distribution unlimited
Trout, B. Thomas; And Others
This conference report addresses education on national security and international relations in secondary school courses in the social studies. Main conclusions of the conference are: (1) Topics on national security should be added to the secondary school curriculum. (2) Current institutional and instructional settings are open to inclusion of…
Department of Homeland Security — Certified schools must provide specific information regarding the school, the nature and requirements of the educational program, location and contact information,...
Feng, Gang; Yang, Zhiyong; Liu, Yongjin
The guided missiles flight control system is essential for guidance accuracy and kill probability. It is complicated and fragile. Since actuator faults and sensor faults could seriously affect the security and reliability of the system, fault detection for missiles flight control system is of great significance. This paper deals with the problem of fault detection for the closed-loop nonlinear model of the guided missiles flight control system in the presence of disturbance. First, set up the fault model of flight control system, and then design the residual generation based on the extended Kalman filter (EKF) for the Eulerian-discrete fault model. After that, the Chi-square test was selected for the residual evaluation and the fault detention task for guided missiles closed-loop system was accomplished. Finally, simulation results are provided to illustrate the effectiveness of the approach proposed in the case of elevator fault separately.
The Cognitive Continuum Theory (CCT) was first proposed 25 years ago to explain the relationship between intuition and analytical decision making processes. In order for aircraft pilots to make these analytical and intuitive decisions, they obtain information from various instruments within the cockpit of the aircraft. Advanced instrumentation is used to provide a broad array of information about the aircraft condition and flight situation to aid the flight crew in making effective decisions. The problem addressed is that advanced instrumentation has not improved the pilot decision making in modern aircraft. Because making a decision is dependent upon the information available, this experimental quantitative study sought to determine how well pilots organize and interpret information obtained from various cockpit instrumentation displays when under time pressure. The population for this study was the students, flight instructors, and aviation faculty at the Middle Georgia State College School of Aviation campus in Eastman, Georgia. The sample was comprised of two groups of 90 individuals (45 in each group) in various stages of pilot licensure from student pilot to airline transport pilot (ATP). The ages ranged from 18 to 55 years old. There was a statistically significant relationship at the p safety of flight.
Czernik, Pawel; Olszyna, Jakub
As Air Traffic Control Systems move from a voice only environment to one in which clearances are issued via data link, there is a risk that an unauthorized entity may attempt to masquerade as either the pilot or controller. In order to protect against this and related attacks, air-ground communications must be secured. The challenge is to add security in an environment in which bandwidth is limited. The Aeronautical Telecommunications Network (ATN) is an enabling digital network communications technology that addresses capacity and efficiency issues associated with current aeronautical voice communication systems. Equally important, the ATN facilitates migration to free flight, where direct computer-to-computer communication will automate air traffic management, minimize controller and pilot workload, and improve overall aircraft routing efficiency. Protecting ATN communications is critical since safety-of-flight is seriously affected if an unauthorized entity, a hacker for example, is able to penetrate an otherwise reliable communications system and accidentally or maliciously introduce erroneous information that jeopardizes the overall safety and integrity of a given airspace. However, an ATN security implementation must address the challenges associated with aircraft mobility, limited bandwidth communication channels, and uninterrupted operation across organizational and geopolitical boundaries. This paper provides a brief overview of the ATN, the ATN security concept, and begins a basic introduction to the relevant security concepts of security threats, security services and security mechanisms. Security mechanisms are further examined by presenting the fundamental building blocks of symmetric encipherment, asymmetric encipherment, and hash functions. The second part of this paper presents the project of cryptographiclly secure wireless communication between Unmanned Aerial Vehicles (UAV) and the ground station in the ATM system, based on the ARM9 processor
Full Text Available In modern society teachers experience a significant increase in psychological as well as physical violence of pupils, which, consequently, aggravates the overall educational process and demotivates teachers to carry out their duties properly. On the basis of the research carried out, the article analyses feelings of teachers working in schools of different types and their reaction to experienced insecurity. It is shown that the manifestation of teachers’ insecurity experienced at schools of different types is different: teachers of primary schools suffer from economic insecurity the most, teachers of basic schools suffer from economic and psychological insecurity, and teachers of secondary schools and gymnasiums suffer from psychological insecurity.
Department of Homeland Security — This Private Schools feature dataset is composed of all Private elementary and secondary education features in the United States as defined by the Private School...
... the 5 years prior to the date of the candidate's application; (xii) The candidate's gender; and (xiii... this section. A flight school may then issue an I-20 form to the candidate to present with the... reasonable business hours. (j) Candidates subject to the Department of Justice rule. A candidate who submits...
Department of Transportation — As mandated by the FAA Extension, Safety, and Security Act of 2016 the Federal Aviation Administration has established, at the request of various Government agencies...
The intentional assessment and management of school climate is an essential component of a comprehensive school safety plan. The value of this preventive aspect of school safety is often diminished as schools invest resources in physical security measures as a narrowly focused effort to increase school safety (Addington, 2009). This dissertation…
Carlson, Helen L.
A survey of secondary students after they had completed a course entitled "Security in the Nuclear Age" suggests that instruction can make some impact in the area of security information. However, results also showed that students use media rather than school as information sources. Peace curricula are also discussed. (RM)
Herpel, H. J.; Willig, G.; Montano, G.; Tverdyshev, S.; Eckstein, K.; Schoen, M.
Future satellite missions like Earth Observation, Telecommunication or any other kind are likely to be exposed to various threats aiming at exploiting vulnerabilities of the involved systems and communications. Moreover, the growing complexity of systems coupled with more ambitious types of operational scenarios imply increased security vulnerabilities in the future. In the paper we will describe an architecture and software elements to ensure high level of security on-board a spacecraft. First the threats to the Security Partition Communication Controller (SPCC) will be addressed including the identification of specific vulnerabilities to the SPCC. Furthermore, appropriate security objectives and security requirements are identified to be counter the identified threats. The security evaluation of the SPCC will be done in accordance to the Common Criteria (CC). The Software Elements for SPCC has been implemented on flight representative hardware which consists of two major elements: the I/O board and the SPCC board. The SPCC board provides the interfaces with ground while the I/O board interfaces with typical spacecraft equipment busses. Both boards are physically interconnected by a high speed spacewire (SpW) link.
Mooij, Ton; Fettelaar, Daan
In line with fear of crime research, schools should be secure places where pupils feel safe in order to function well. Various types of risk and promotive variables at school and pupil level may differently influence a pupil's feelings of safety in school, the school surroundings, and at home. The aim is to elaborate and test a theoretical…
Department of Homeland Security — his dataset is composed of any type of Post Secondary Education facility such as: colleges, universities, technical schools, or trade schools that provide training...
Akmal, Fadira; Michrandi Nasution, Surya; Azmi, Fairuz
Aircraft blackbox is a device used to record all aircraft information, which consists of Flight Data Recorder (FDR) and Cockpit Voice Recorder (CVR). Cockpit Voice Recorder contains conversations in the aircraft during the flight.Investigations on aircraft crashes usually take a long time, because it is difficult to find the aircraft blackbox. Then blackbox should have the ability to send information to other places. Aircraft blackbox must have a data security system, data security is a very important part at the time of information exchange process. The system in this research is to perform the encryption and decryption process on Cockpit Voice Recorder by people who are entitled by using Dragon Stream Cipher algorithm. The tests performed are time of data encryption and decryption, and avalanche effect. Result in this paper show us time encryption and decryption are 0,85 seconds and 1,84 second for 30 seconds Cockpit Voice Recorder data witn an avalanche effect 48,67 %.
Mar 28, 2018 ... Lecturer, Department of Social Work, Bindura University of Science Education; Email. ... Lecturer, School of Social Work, University of Zimbabwe, Mount ... There are two types of informal social security: traditional or family ...
... looseleaf binder to include a table of contents. If an applicant desires approval of both a ground school course and a flight school course, they must be combined in one looseleaf binder that includes a separate... control. Temperature control. Engine operation analysis. Operation of all systems. Fuel management...
This book makes the compelling argument that religion can be complicit in conflict and that a new secularism is vital to foster security. Using insights from complexity science, it shows how dynamic secularism can be used to accommodate diverse faiths and beliefs within worldly politics. Exploration of the interplay of religion and education in…
Goldner, Limor; Scharf, Miri
Children's development is assumed to be closely related to their attachment security and their personality. The authors' aim was to examine the joint contribution of attachment security and personality traits to children's adjustment by examining diverse children's outcomes (emotional symptoms, social functioning, and behavioral problems) and using various perspectives (children, parents, and teachers). The sample comprised 247 8-12-year-old children from low socioeconomic status neighborhoods. Personality and attachment contribute to the different domains of adjustment. In cases of moderation, attachment security moderates the implications of personality traits on children's adjustment. The findings highlight the contribution of positive personality tendencies in playing down the difficulties of insecurely attached children.
Blaser, Tammy M.
NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.
Full Text Available Background and Purpose. Leukocyte telomere length (LTL is a biomarker of biologic age. Whether food security status modulates LTL is still unknown. We investigated the association between food security and LTL in participants of the 1999–2002 US National Health and Nutrition Examination Survey (NHANES. Methods. Analysis of covariance (ANCOVA was used to evaluate the association between food security categories and LTL controlling for sex, race, and education and accounting for the survey design and sample weights. Results. We included 10,888 participants with 5228 (48.0% being men. They were aged on average 44.1 years. In all, 2362 (21.7% had less than high school, 2787 (25.6% had achieved high school, while 5705 (52.5% had done more than high school. In sex-, race-, and education-adjusted ANCOVA, average LTL (T/S ratio for participants with high food security versus those with marginal, low, or very low food security was 1.32 versus 1.20 for the age group 25–35 years and 1.26 versus 1.11 for the 35–45 years, (p<0.001. Conclusion. The association between food insecurity and LTL shortening in young adults suggest that some of the future effects of food insecurity on chronic disease risk in this population could be mediated by telomere shortening.
Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. April 2006. Welcome to the third edition of Homeland Securit...
Bruce Martin has found a second act in homeland security. The fire services veteran and college educator is now Project Manager of the Bay Area Urban Areas Security Initiative (UASI), overseeing its Chemical, Biological, Radiological, Nuclear Explosives (CBRNE) program. Martin is a 2010 master’s degree graduate of the Naval Postgraduate School Center for Homeland Defense and Security.
I work in the Flight Software Engineering Branch, where we provide design and development of embedded real-time software applications for flight and supporting ground systems to support the NASA Aeronautics and Space Programs. In addition, this branch evaluates, develops and implements new technologies for embedded real-time systems, and maintains a laboratory for applications of embedded technology. The majority of microchips that are used in modern society have been programmed using embedded technology. These small chips can be found in microwaves, calculators, home security systems, cell phones and more. My assignment this summer entails working with an iPAQ HP 5500 Pocket PC. This top-of-the-line hand-held device is one of the first mobile PC's to introduce biometric security capabilities. Biometric security, in this case a fingerprint authentication system, is on the edge of technology as far as securing information. The benefits of fingerprint authentication are enormous. The most significant of them are that it is extremely difficult to reproduce someone else's fingerprint, and it is equally difficult to lose or forget your own fingerprint as opposed to a password or pin number. One of my goals for this summer is to integrate this technology with another Pocket PC application. The second task for the summer is to develop a simple application that provides an Astronaut EVA (Extravehicular Activity) Log Book capability. The Astronaut EVA Log Book is what an astronaut would use to report the status of field missions, crew physical health, successes, future plans, etc. My goal is to develop a user interface into which these data fields can be entered and stored. The applications that I am developing are created using eMbedded Visual C++ 4.0 with the Pocket PC 2003 Software Development Kit provided by Microsoft.
Langston, James H.; Murray, Henry L.; Hunt, Gary R.
A prototype has been developed which makes use of commercially available products in conjunction with the Java programming language to provide a secure user interface for command and control over the open Internet. This paper reports successful demonstration of: (1) Security over the Internet, including encryption and certification; (2) Integration of Java applets with a COTS command and control product; (3) Remote spacecraft commanding using the Internet. The Java-based Spacecraft Web Interface to Telemetry and Command Handling (Jswitch) ground system prototype provides these capabilities. This activity demonstrates the use and integration of current technologies to enable a spacecraft engineer or flight operator to monitor and control a spacecraft from a user interface communicating over the open Internet using standard World Wide Web (WWW) protocols and commercial off-the-shelf (COTS) products. The core command and control functions are provided by the COTS Epoch 2000 product. The standard WWW tools and browsers are used in conjunction with the Java programming technology. Security is provided with the current encryption and certification technology. This system prototype is a step in the direction of giving scientist and flight operators Web-based access to instrument, payload, and spacecraft data.
Alderete, Thomas S.; Ascencio-Lee, Carmen E.; Bray, Richard; Carlton, John; Dohme, Jack; Eshow, Michelle M.; Francis, Stephen; Lee, Owen M.; Lintern, Gavan; Lombardo, David A.
The principal purpose of this publication is to provide a broad overview of the technology that is relevant to the design of aviation training systems and of the techniques applicable to the development, use, and evaluation of those systems. The issues addressed in our 11 chapters are, for the most part, those that would be expected to surface in any informed discussion of the major characterizing elements of aviation training systems. Indeed, many of the same facets of vertical-flight training discussed were recognized and, to some extent, dealt with at the 1991 NASA/FAA Helicopter Simulator Workshop. These generic topics are essential to a sound understanding of training and training systems, and they quite properly form the basis of any attempt to systematize the development and evaluation of more effective, more efficient, more productive, and more economical approaches to aircrew training. Individual chapters address the following topics: an overview of the vertical flight industry: the source of training requirements; training and training schools: meeting current requirements; training systems design and development; transfer of training and cost-effectiveness; the military quest for flight training effectiveness; alternative training systems; training device manufacturing; simulator aero model implementation; simulation validation in the frequency domain; cockpit motion in helicopter simulation; and visual space perception in flight simulators.
Buzan, Barry; Wæver, Ole
the middle and system levels, and asks whether there is not more of substance there than the existing Copenhagen school analyses suggests. It revisits the under-discussed concept of security constellations in Copenhagen school theory, and adds to it the idea of macrosecuritizations as ways of getting...... active both because of the facility with which collective political units can construct each other as threats, and the difficulty of finding audiences for the kinds of securitizations and referent objects that are available at the individual and system levels. This paper focuses on the gap between...
Schramm, Jan Martinez; Barth, Tarik; Wagner, Alexander; Hannemann, Klaus
The SHarp Edge Flight EXperiment (SHEFEX) program of the German Aerospace Center (DLR) is primarily focused on the investigation of the potential to utilise improved shapes for space vehicles by considering sharp edges and facetted surfaces. One goal is to set up a sky based test facility to gain knowledge of the physics of hypersonic flow, complemented by numerical analysis and ground based testing. Further, the series of SHEFEX flight experiments is an excellent test bed for new technological concepts and flight instrumentation, and it is a source of motivation for young scientist and engineers providing an excellent school for future space-program engineers and managers. After the successful first SHEFEX flight in October 2005, a second flight is scheduled for September 2011 and additional flights are planned for 2015 ff. With the SHEFEX-I flight and the subsequent numerical and experimental post flight analysis, DLR could for the first time close the loop between the three major disciplines of aerothermodynamic research namely CFD, ground based testing and flight.
Carter, John; Stephenson, Mark
The NASA Dryden Flight Research Center has completed the initial flight test of a modified set of F/A-18 flight control computers that gives the aircraft a research control law capability. The production support flight control computers (PSFCC) provide an increased capability for flight research in the control law, handling qualities, and flight systems areas. The PSFCC feature a research flight control processor that is "piggybacked" onto the baseline F/A-18 flight control system. This research processor allows for pilot selection of research control law operation in flight. To validate flight operation, a replication of a standard F/A-18 control law was programmed into the research processor and flight-tested over a limited envelope. This paper provides a brief description of the system, summarizes the initial flight test of the PSFCC, and describes future experiments for the PSFCC.
'Energy Security' concept has played the central role in Japan's energy policy. However, the definition of the concept is not clear. If energy security will remain a principal policy target, its concept should be clearly defined as a precondition. This dissertation analyzes historical changes in energy security concept and considers their relationship with the development of national security concept in international relations studies. Following an introduction in the first chapter, the second chapter reveals that energy security concept has changed in accord with energy situation and policymakers' concern of the times. As a result, several different definitions of the concept now coexist. The third chapter deals with the relationship between energy security concept and national security concepts in international relations. Three major definitions of energy security concepts correspond to definitions of security concepts by three schools in security theory - realism, liberalism, and globalism. In the fourth chapter, energy security is conceptualized and its policy measures are systematized by addressing the issues appeared in its historical changes and referring to security theory in international relations studies. The fifth chapter discusses the contribution by nuclear energy to Japan's energy security, applying a theoretical framework presented in previous chapters. Characteristics of nuclear energy which enhance energy security are identified, and policy measures for improving those characteristics are proposed. (author)
confronting school -shooter situations. Columbine , Jonesboro, and Virginia Tech are not just places of profound sorrow but rallying cries for those advocating...installed physical security mechanisms to protect students during a school shooting incident. However, to secure students from a concerted terrorist...Strategy Forum 2004, 6). Some Manhattan schools were forced to evacuate to sites miles away. Two high schools ’ evacuation plans called for students to
Irvine, Cynthia E.
The Naval Postgraduate School Center for Information Systems Security (INFOSEC) Studies and Research (NPS CISR) has developed an instructional program in computer security. Its objective is to insure that students not only understand practical aspects of computer security associated with current technology, but also learn the fundamental principles that can be applied to the development of systems for which high confidence in policy enforcement can be achieved. Introduction to Computer Sec...
and largely ignores the social aspects that influence an individual’s beliefs, attitudes and, behaviors.53 Self-efficacy is defined by Albert Bandura ...master’s thesis Naval Postgraduate School, Monterey, CA), 39–52 53 Ibid., 53. 54 Albert Bandura , “Self-efficacy: Toward a Unifying Theory of...Hometown Security: Advancing the Homeland Security Paradigm, Homeland Security Affairs V (2009). http://www.hsaj.org/?fullarticle=5.2.2. Bandura
The Maryland/Goddard Space Flight Center (GSFC) Earth and Environmental Science Teacher Ambassador Program was designed to enhance classroom instruction in the Earth and environmental science programs in the secondary schools of the state of Maryland. In October 1992, more than 100 school system administrators from the 24 local Maryland school systems, the Maryland State Department of Education, and the University of Maryland met with NASA GSFC scientists and education officers to propose a cooperative state-wide secondary school science teaching enhancement initiative.
There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.
The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.
US Department of Education, 2016
Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…
Fram, Maryah Stella; Frongillo, Edward A.; Fishbein, Eliza M.; Burke, Michael P.
Food insecurity is associated with a range of child developmental, behavioral, and emotional challenges, all of which can inhibit a child's school success. Schools offer a number of formal and informal services aimed at reducing food insecurity, but the problems associated with identifying children in need, addressing issues of stigma, and…
The Southwest Surety Institute was formed in June 1996 by Arizona State University (ASU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL) to provide educational programs in Security Engineering, and to conduct research and development in security technologies. This is the first science-based program of its kind in the US, focused on educating Security Engineers to help government and industry address their security needs. Each member brings a unique educational capability to the Institute. NM Tech has a formidable explosives testing and evaluation facility. ASU is developing a Masters program in Security Engineering at their School of Technology located on a new campus in Mesa, Arizona. NMSU provides a Security Technology minor, merging programs in Criminal Justice and Engineering Technology. The Sandia National Laboratories security system design and evaluation process forms the basis for the Security Engineering curricula. In an effort to leverage the special capabilities of each university, distance education will be used to share courses among Institute members and eventually with other sites across the country.
Davidson, Ron; Bosworth, John T.; Jacobson, Steven R.; Thomson, Michael Pl; Jorgensen, Charles C.
The F-15 Advanced Controls Technology for Integrated Vehicles (ACTIVE) airplane (see figure) was the test bed for a flight test of an intelligent flight control system (IFCS). This IFCS utilizes a neural network to determine critical stability and control derivatives for a control law, the real-time gains of which are computed by an algorithm that solves the Riccati equation. These derivatives are also used to identify the parameters of a dynamic model of the airplane. The model is used in a model-following portion of the control law, in order to provide specific vehicle handling characteristics. The flight test of the IFCS marks the initiation of the Intelligent Flight Control System Advanced Concept Program (IFCS ACP), which is a collaboration between NASA and Boeing Phantom Works. The goals of the IFCS ACP are to (1) develop the concept of a flight-control system that uses neural-network technology to identify aircraft characteristics to provide optimal aircraft performance, (2) develop a self-training neural network to update estimates of aircraft properties in flight, and (3) demonstrate the aforementioned concepts on the F-15 ACTIVE airplane in flight. The activities of the initial IFCS ACP were divided into three Phases, each devoted to the attainment of a different objective. The objective of Phase I was to develop a pre-trained neural network to store and recall the wind-tunnel-based stability and control derivatives of the vehicle. The objective of Phase II was to develop a neural network that can learn how to adjust the stability and control derivatives to account for failures or modeling deficiencies. The objective of Phase III was to develop a flight control system that uses the neural network outputs as a basis for controlling the aircraft. The flight test of the IFCS was performed in stages. In the first stage, the Phase I version of the pre-trained neural network was flown in a passive mode. The neural network software was running using flight data
Schwarz, Sebastian; Sjöström, Mårten; Olsson, Roger
Obtaining three-dimensional scenery data is an essential task in computer vision, with diverse applications in various areas such as manufacturing and quality control, security and surveillance, or user interaction and entertainment. Dedicated Time-of-Flight sensors can provide detailed scenery depth in real-time and overcome short-comings of traditional stereo analysis. Nonetheless, they do not provide texture information and have limited spatial resolution. Therefore such sensors are typically combined with high resolution video sensors. Time-of-Flight Sensor Fusion is a highly active field of research. Over the recent years, there have been multiple proposals addressing important topics such as texture-guided depth upsampling and depth data denoising. In this article we take a step back and look at the underlying principles of ToF sensor fusion. We derive the ToF sensor fusion error model and evaluate its sensitivity to inaccuracies in camera calibration and depth measurements. In accordance with our findings, we propose certain courses of action to ensure high quality fusion results. With this multivariate sensitivity analysis of the ToF sensor fusion model, we provide an important guideline for designing, calibrating and running a sophisticated Time-of-Flight sensor fusion capture systems.
This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…
Signal, T. Leigh; Gander, Philippa H.; van den Berg, Margo J.; Graeber, R. Curtis
Study Objectives: To assess the amount and quality of sleep that flight crew are able to obtain during flight, and identify factors that influence the sleep obtained. Design: Flight crew operating flights between Everett, WA, USA and Asia had their sleep recorded polysomnographically for 1 night in a layover hotel and during a 7-h in-flight rest opportunity on flights averaging 15.7 h. Setting: Layover hotel and in-flight crew rest facilities onboard the Boeing 777-200ER aircraft. Participants: Twenty-one male flight crew (11 Captains, mean age 48 yr and 10 First Officers, mean age 35 yr). Interventions: N/A. Measurements and Results: Sleep was recorded using actigraphy during the entire tour of duty, and polysomnographically in a layover hotel and during the flight. Mixed model analysis of covariance was used to determine the factors affecting in-flight sleep. In-flight sleep was less efficient (70% vs. 88%), with more nonrapid eye movement Stage 1/Stage 2 and more frequent awakenings per h (7.7/h vs. 4.6/h) than sleep in the layover hotel. In-flight sleep included very little slow wave sleep (median 0.5%). Less time was spent trying to sleep and less sleep was obtained when sleep opportunities occurred during the first half of the flight. Multivariate analyses suggest age is the most consistent factor affecting in-flight sleep duration and quality. Conclusions: This study confirms that even during long sleep opportunities, in-flight sleep is of poorer quality than sleep on the ground. With longer flight times, the quality and recuperative value of in-flight sleep is increasingly important for flight safety. Because the age limit for flight crew is being challenged, the consequences of age adversely affecting sleep quantity and quality need to be evaluated. Citation: Signal TL; Gander PH; van den Berg MJ; Graeber RC. In-flight sleep of flight crew during a 7-hour rest break: implications for research and flight safety. SLEEP 2013;36(1):109–115. PMID:23288977
Means, Alexander J.
This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…
Carrico, John S.; Schaaf, Michaela M.
This monograph is a companion to UNOAI Monograph 96-2, "The Image of Airport Security: An Annotated Bibliography," compiled in June 1996. The White House Commission on Aviation Safety and Security, headed by Vice President Al Gore, was formed as a result of the TWA Flight 800 crash in August 1996. The Commission's final report included 31 recommendations addressed toward aviation security. The recommendations were cause for security issues to be revisited in the media and by the aviation industry. These developments necessitated the need for an updated bibliography to review the resulting literature. Many of the articles were written in response to the recommendations made by the Gore Commission. "Aviation Security: An Annotated Bibliography of Responses to the Gore Commission" is the result of this need.
Department of Homeland Security — This Public Schools feature dataset is composed of all Public elementary and secondary education in the United States as defined by the Common Core of Data, National...
Diploma thesis deals with digitized, computerized flight control system »Fly-by-wire« and security aspects of the computer system of an aircraft Airbus A330. As for space and military aircraft structures is also in commercial airplanes, much of the financial contribution devoted to reliability. Conventional aircraft control systems have, and some are still, to rely on mechanical and hydraulic connections between the controls on aircraft operated by the pilot and control surfaces. But newer a...
Signal, T Leigh; Gander, Philippa H; van den Berg, Margo J; Graeber, R Curtis
To assess the amount and quality of sleep that flight crew are able to obtain during flight, and identify factors that influence the sleep obtained. Flight crew operating flights between Everett, WA, USA and Asia had their sleep recorded polysomnographically for 1 night in a layover hotel and during a 7-h in-flight rest opportunity on flights averaging 15.7 h. Layover hotel and in-flight crew rest facilities onboard the Boeing 777-200ER aircraft. Twenty-one male flight crew (11 Captains, mean age 48 yr and 10 First Officers, mean age 35 yr). N/A. Sleep was recorded using actigraphy during the entire tour of duty, and polysomnographically in a layover hotel and during the flight. Mixed model analysis of covariance was used to determine the factors affecting in-flight sleep. In-flight sleep was less efficient (70% vs. 88%), with more nonrapid eye movement Stage 1/Stage 2 and more frequent awakenings per h (7.7/h vs. 4.6/h) than sleep in the layover hotel. In-flight sleep included very little slow wave sleep (median 0.5%). Less time was spent trying to sleep and less sleep was obtained when sleep opportunities occurred during the first half of the flight. Multivariate analyses suggest age is the most consistent factor affecting in-flight sleep duration and quality. This study confirms that even during long sleep opportunities, in-flight sleep is of poorer quality than sleep on the ground. With longer flight times, the quality and recuperative value of in-flight sleep is increasingly important for flight safety. Because the age limit for flight crew is being challenged, the consequences of age adversely affecting sleep quantity and quality need to be evaluated.
... 46 Shipping 7 2010-10-01 2010-10-01 false Public nautical school. 167.05-35 Section 167.05-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS PUBLIC NAUTICAL SCHOOL SHIPS Definitions § 167.05-35 Public nautical school. The term public nautical school means any school...
Jones, David R; Gross, Leroy P; Marchbanks-Robinson, Roslyn
.... Segregation policies in early 1941 required a few African American flight surgeons to support black student pilots at Tuskegee, Alabama from cadet training in preflight ground school until graduation with pilot wings...
Maxwell, Lesli A.
The three school shootings that left a principal and six students dead in less than a week have sparked a barrage of pledges from national and state political leaders to tighten campus security. School safety experts urged caution against overreacting to the horrific, but rare, incidents in rural schools in Colorado, Pennsylvania, and Wisconsin.…
On this seventh day of the STS-72 mission, the flight crew, Cmdr. Brian Duffy, Pilot Brent W. Jett, and Mission Specialists Leroy Chiao, Daniel T. Barry, Winston E. Scott, and Koichi Wakata (NASDA), awakened to music from the Walt Disney movie, 'Snow White and the Seven Dwarfs.' Chiao and Scott performed the second spacewalk of the mission where they tested equipment and work platforms that will be used in building the planned International Space Station. This spacewalk was almost seven hours long. Wakata conducted an interview with and answered questions from six graders from a Japanese school in Houston, Texas.
The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.
Vaught, Sabina E.
This article theoretically examines the meaning and function of hate speech in a high-security juvenile male prison school. Specifically, the article draws on data from an ethnographic study of this prison school site in order to map the institutional mechanisms of hate speech. Additionally, the article suggests these mechanisms are not anomalous…
Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.
We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.
... such as police, fire service personnel, flight attendants, security guards and other lay rescuers who have been ... venues, shopping malls, airports, airplanes, businesses, convention centers, hotels, schools and doctors’ offices. They should also be ...
... 46 Shipping 7 2010-10-01 2010-10-01 false Nautical school ship. 167.05-25 Section 167.05-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS PUBLIC NAUTICAL SCHOOL SHIPS Definitions § 167.05-25 Nautical school ship. The term nautical school ship means a vessel operated by or in connection with a nautical school...
This clip, running 15 seconds in length, shows the QF-106 'Delta Dart' gear down, with the tow rope secured to the attachment point above the aircraft nose. First there is a view looking back from the C-141A, then looking forward from the nose of the QF-106, and finally a shot of the aircraft being released from the tow rope. NASA Dryden Flight Research Center, Edwards, California, supported a Kelly Space and Technology, Inc. (KST)/U.S. Air Force project known as Eclipse, which demonstrated a reusable tow launch vehicle concept. The purpose of the project was to demonstrate a reusable tow launch vehicle concept that had been conceived and patented by KST. Kelly Space obtained a contract with the USAF Research Laboratory for the tow launch demonstration project under the Small Business Innovation Research (SBIR) program. The USAF SBIR contract included the modifications to turn the QF-106 into the Experimental Demonstrator #1 (EXD-01), and the C141A aircraft to incorporate the tow provisions to link the two aircraft, as well as conducting flight tests. The demonstration consisted of ground and flight tests. These tests included a Combined Systems Test of both airplanes joined by a tow rope, a towed taxi test, and six towed flights. The primary goal of the project was demonstrating the tow phase of the Eclipse concept using a scaled-down tow aircraft (C-141A) and a representative aerodynamically-shaped aircraft (QF-106A) as a launch vehicle. This was successfully accomplished. On December 20, 1997, NASA research pilot Mark Stucky flew a QF-106 on the first towed flight behind an Air Force C-141 in the joint Eclipse project with KST to demonstrate a reusable tow launch vehicle concept developed by KST. Kelly Space and Technology hoped to use the data from the tow tests to validate a tow-to-launch procedure for reusable space launch vehicles. Stucky flew six successful tow tests between December 1997 and February 6, 1998. On February 6, 1998, the sixth and final towed
Schima Viktoria Labitsch
Full Text Available The 2010 Arab uprisings led to profound changes in the political landscape of the Southern Mediterranean, and came at a time of staggering Euro-Mediterranean relations. With prevailing turmoil and violence in Europe’s closest proximity, the Euromed relationship – heavily dominated by security objectives and concerns in the past – is facing new social, political and economic challenges. This work analyses what challenges have made it onto the security agenda of the European Union in response to the uprisings in Tunisia, Libya and Egypt between December 2010 and 2013. It does so by analysing the discourse of three institutions: the European Commission, the European Council and the Council of Ministers. Accordingly, it argues that security in the Euro-Mediterranean context may be analysed in the framework of the wider constructivist Copenhagen school of security studies, treating threats as politically constructed in the process of securitization. It emphasizes the different degrees of institutional involvement in framing the regional security agenda, and the vast application of security logic to migration and mobility as well as its absence in areas of biological and chemical weapons, extremism and weapons of mass destruction. This work’s final argument is that whilst the overall level of securitization throughout the three years remains low and partially inconsistent with the security priorities before 2010, the EU exhibited a particularly strong regional focus on Libya as well as a thematic one on migration and external borders.
School Library Supplement. Putting Your Library Automation System to Work [and] Using Videodiscs in Research Projects [and] Library Security: What to Look For [and] Expanding Library/Media Services with Media Retrieval [and] How to Network CD-ROMs (and) The School Library Resource Directory.
Karpisek, Marian; And Others
Presents five articles and a company resource directory to help librarians successfully incorporate technology into school libraries. Discusses actual situations, examines student needs, and gives advice to help librarians with library automation systems, videodiscs, library security systems, media retrieval, networking CD-ROMs, and locating…
Kaufman, Phillip; Chen, Xianglei; Choy, Susan P.; Ruddy, Sally A.; Miller, Amanda K.; Fleury, Jill K.; Chandler, Kathryn A.; Rand, Michael R.; Klaus, Patsy; Planty, Michael
Providing the latest data, this report on school safety presents a mixed picture: while overall crime has declined, violence, gangs, and drugs remain at some schools. Victimization at school declined from 1995-99, though rates for fighting and weapon threats remain steady. Students seem more secure, and gang activity decreased; however, in grades…
determine the power required to fly the airplane, optimize the airframe/propulsion system, and train the pilot. He made the first flights on April 7, 1980, and made a brief solar-powered flight on May 18. The official project pilot was Janice Brown, a Bakersfield school teacher who weighed in at slightly under 100 pounds and was a charter pilot with commercial, instrument, and glider ratings. She checked out in the plane at Shafter and made about 40 flights under battery and solar power there. Wind direction, turbulence, convection, temperature and radiation at Shafter in mid-summer proved to be less than ideal for Gossamer Penguin because takeoffs required no crosswind and increases in temperature reduced the power output from the solar cells. Consequently, the project moved to Dryden in late July, although conditions there also were not ideal. Nevertheless, Janice finished the testing, and on August 7, 1980, she flew a public demonstration of the aircraft at Dryden in which it went roughly 1.95 miles in 14 minutes and 21 seconds. This was significant as the first sustained flight of an aircraft relying solely on direct solar power rather than batteries. It provided the designers with practical experience for developing a more advanced, solar-powered aircraft, since the Gossamer Penguin was fragile and had limited controllability. This necessitated its flying early in the day when there were minimal wind and turbulence levels, but the angle of the sun was also low, requiring a panel for the solar cells that could be tilted toward the sun. Using the specific conclusions derived from their experience with Gossamer Penguin, the AeroVironment engineers designed Solar Challenger, a piloted, solar-powered aircraft strong enough to handle both long and high flights when encountering normal turbulence.
... a Flight Get Involved Events Shop Miles Contact Miracle Flights Blog Giving Tuesday 800-359-1711 Thousands of children have been saved, but we still have miles to go. Request a Flight Click Here to Donate - Your ...
17 A. HISTORY OF SCHOOL SHOOTINGS ...............................................17 B. NEED FOR CHANGE ...tactical scenarios—teachers and school staff, for example—might have difficulty implementing the model when faced with multiple and changing variables. For... International School Safety and Security Council, ed. Robin Hattersley (Alexandria, VA: ASIS International School Safety and Security Council, 2016), 53
... 46 Shipping 7 2010-10-01 2010-10-01 false Public nautical school ships. 173.051 Section 173.051 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY SPECIAL RULES PERTAINING TO VESSEL USE School Ships § 173.051 Public nautical school ships. Each public nautical school...
Improving food and nutrition security in the Philippines through school ... Implementation of the Community Health Assessment Program in the Philippines ... This project will address the effects of fast-paced economic growth in the Greater ...
Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…
Full Text Available Purpose: the main aim of this paper is to clarify several issues of conflicting jurisdiction over crimes committed on board aircraft in flight. The study will examine the way in which the Tokyo Convention attempts to provide justice in the event of aviation security violations, and discuss its effectiveness in preventing such offences in the future. Methods: formal legal and case-study methods together with inductive reasoning, and comparison were used to analyse the legislation in the area of jurisdiction over crimes and other offences committed on board aircraft in flight. Results: it follows from the study that although the Tokyo Convention has contributed considerably to the establishing of clearer rules of jurisdiction over offences committed on board aircraft, considerable deficiencies of this treaty remain. The results have important implications for international policy-making. Discussion: the results of the study reveal several weaknesses of the Tokyo Convention. Firstly, it does not provide any definition or list of offences to which it applies, instead it relies on national penal laws to do so. In addition, the ‘freedom fighter exception’ and the lack of a strong enforcement mechanism may prove to impede the effective attainment of the Tokyo Convention’s main objectives – that is, to provide justice in the event of aviation security violations, and prevent such offences in the future. Therefore, further improvement in aviation security legislation is necessary to ensure that it is effective and adequate in the challenges faced today.
... 46 Shipping 7 2010-10-01 2010-10-01 false Civilian nautical school. 168.10-5 Section 168.10-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS CIVILIAN NAUTICAL SCHOOL VESSELS Definitions of Terms Used in This Part § 168.10-5 Civilian nautical school. The term civilian...
In response to violence against students and school personnel in the past decade, school districts have implemented an array of security measures designed to keep all the occupants of a school free from harm. Despite these safeguards, personnel continue to operate under the assumption that it's not a question of "if," it's a question of "when."…
abduction and killing of people; destruction of houses, schools, health care centres, churches, mosques and farms has ... KEYWORDS: Boko Haram, Insurgency, Human Security, Violence, Nigeria ..... Provide the citizens with adequate ...
Heinig, Ruth Beall
Describes how a student at Stagecoach (a private arts school), by securing the lead role in the film "Billy Elliot," encouraged other British boys to enroll in ballet and dance classes as well as Stagecoach Theatre Arts Schools. Present locations and international links for Stagecoach schools. Describes how the Stagecoach schools are run…
Fleege, Pamela O.; And Others
This study examined the effects of hands-on instruction on young children's understanding of an aspect of flight, specifically Bernoulli's principle. First, 137 public school children, ages 5 through 8 years, were interviewed about their understanding of how an airplane flies. Two weeks later, the subjects participated in two hands-on…
This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…
Full Text Available This paper discusses how perceptions of personal security can impact on school enrolment and attendance. It mainly focuses on threats of physical harm, crime, and community and domestic violence. These security fears can include insecurity that children suffer from as they go to school, maybe through the use of unsafe routes; insecurity that children feel at school; and the insecurity they suffer from in their homes. Although poverty can be a source and/or an indicator of insecurity, this paper does not focus solely on poverty as it is well covered elsewhere in the literature. The paper relies on qualitative data col- lected in Korogocho and Viwandani slum areas in Nairobi, Kenya between October and November 2004. The paper analyses data from individual interviews and focus group interviews and focuses on the narrative of slum dwellers on how insecurity impacts on educational attainment. The conclusion in this paper is that insecure neighbourhoods may have a negative impact on schooling. As a result policies that address insecurity in slum neighbourhoods can also improve school attendance and performance.
In 1985, a total of 126 talented high school students gained first hand knowledge about science and engineering careers by working directly with a NASA scientist or engineer during the summer. This marked the sixth year of operation for NASA's Summer High School Apprenticeship Research Program (SHARP). The major priority of maintaining the high standards and success of prior years was satisfied. The following eight sites participated in the Program: Ames Research Center, Ames' Dryden Flight Research Facility, Goddard Space Flight Center, Goddard's Wallop Flight Facility, Kennedy Space Center, Langley Research Center, Lewis Research Center, and Marshall Space Flight Center. Tresp Associates served as the SHARP contractor and worked closely with NASA staff at headquarters and the sites just mentioned to plan, implement, and evaluate the program.
PhD Thesis Co-Advisor Anders Strindberg, PhD Thesis Co-Advisor Mohammed Hafez, PhD Chair, Department of National Security Affairs...expectations may be deleterious in the long-term, emotionally, psychologically , spiritually , and socially (what we label as moral injury)” (Litz 2009). They...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited ETHICAL DECISION
Safety Policy (Washington, DC: Congressional Research Service, 2013). 9 alienation, rumination on...The First of All Fears. Shoemaker contends the likelihood of a terrorist attack on an American school is minimal. He concludes that risk management...but also deftly explain why the targeting of schools by terrorists are rare events and therefore require measured responses.43 They contend that
Che Wan Jasimah bt Wan Mohamed Radzi; Huang Hui; Nur Anisah Binti Mohamed @ A. Rahman; Hashem Salarzadeh Jenatabadi
Structural Equation Modeling (SEM) has been used extensively in sustainability studies to model relationships among latent and manifest variables. This paper provides a tutorial exposition of the SEM approach in food security studies and introduces a basic framework based on family food security and children’s environment sustainability. This framework includes family food security and three main concepts representing children’s environment, including children’s BMI, health, and school perfor...
McPhee, J. C.; White, R. J.
The hazards of long-duration space flight are real and unacceptable. In order for humans to participate effectively in long-duration orbital missions or continue the exploration of space, we must first secure the health of the astronaut and the success of such missions by assessing in detail the biomedical risks of space flight and developing countermeasures to these hazards. Acquiring the understanding necessary for building a sound foundation for countermeasure development requires an integrated approach to research in physiology and medicine and a level of cooperative action uncommon in the biomedical sciences. The research program of the National Space Biomedical Research Institute (NSBRI) was designed to accomplish just such an integrated research goal, ameliorating or eliminating the biomedical risks of long-duration space flight and enabling safe and productive exploration of space. The fruits of these labors are not limited to the space program. We can also use the gained understanding of the effects and mechanisms of the physiological changes engendered in space and the applied preventive and rehabilitative methods developed to combat these changes to the benefit of those on Earth who are facing similar physiological and psychological difficulties. This paper will discuss the innovative approach the NSBRI has taken to integrated research management and will present some of the successes of this approach. c2003 International Astronautical Federation. Published by Elsevier Science Ltd. All rights reserved.
Williams-Hayes, Peggy S.
The NASA F-15 Intelligent Flight Control System project team has developed a series of flight control concepts designed to demonstrate the benefits of a neural network-based adaptive controller. The objective of the team was to develop and flight-test control systems that use neural network technology, to optimize the performance of the aircraft under nominal conditions, and to stabilize the aircraft under failure conditions. Failure conditions include locked or failed control surfaces as well as unforeseen damage that might occur to the aircraft in flight. The Intelligent Flight Control System team is currently in the process of implementing a second generation control scheme, collectively known as Generation 2 or Gen 2, for flight testing on the NASA F-15 aircraft. This report describes the Gen 2 system as implemented by the team for flight test evaluation. Simulation results are shown which describe the experiment to be performed in flight and highlight the ways in which the Gen 2 system meets the defined objectives.
Cooper, Glen; Hoffman, Kent; Powell, Bert
This article describes the Circle of Security-Classroom (COS-C) approach to applying attachment theory in preschool settings. Early childhood is an incubator for a wide range of development including the underpinnings of school readiness. Secure teacher-child relationships support this process. However, most preschool staff members lack guidance…
Nguyen, Binh T; Ford, Christopher N; Yaroch, Amy L; Shuval, Kerem; Drope, Jeffrey
It is unclear whether Supplemental Nutrition Assistance Program (SNAP) or National School Lunch Program (NSLP) participation modifies the relationship between food insecurity and obesity in children. Data were included for 4,719 children aged 9-17 years who participated in the National Health and Nutrition Survey between 2003-2004 and 2011-2012. Linear regression was used to examine the relationship between household food security (full, marginal, low, and very low) and BMI percentile. Adjusted models were also stratified by SNAP and NSLP participation. There was no significant overall relationship between household food security and BMI percentile. In SNAP non-participants, there was no apparent overall relationship between BMI percentile and household food security. However, BMI percentile in children from households with low food security was significantly higher than that of children from fully food-secure households (risk difference [RD]=5.95, 95% CI=1.11, 10.80). Among SNAP participants, there was no significant relationship between household food security and BMI percentile. By NSLP participation category, there was a non-significant trend toward increasing BMI percentile with decreasing household food security in those reporting two or fewer (RD=1.75, 95% CI= -0.79, 4.29) and two to three (RD=1.07; 95% CI= -1.74, 3.89) lunches/week. There was no apparent relationship between household food security and BMI percentile in those reporting four or more lunches/week. Although the overall relationship between household food security and weight status in school-aged children was not statistically significant, there was some evidence that the relationship may differ by SNAP or NSLP participation, suggesting the need for more research. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.
SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL March 2013 Author: Jonna West Approved by...local agencies with homeland security related agencies. For purposes of this study , agencies included the U.S. DHS and its component agencies, state...circles. In fact, often when the topic does come up, it is generally followed by discussions about feminism in general, and is often accompanied by
Issa, Raquel Carvalho; Moraes, Letícia Freitas; Francisco, Raquel Rocha Jabour; dos Santos, Luana Caroline; dos Anjos, Adriana Fernandez Versiani; Pereira, Simone Cardoso Lisboa
To evaluate the planning, production, distribution, and nutritional adequacy of meals served at city schools. This descriptive cross-sectional study was conducted between March 2011 and April 2012 and included a representative sample (n = 42 schools) of extended shift city schools from Belo Horizonte, Minas Gerais, Brazil. Five meals from each school were randomly selected and analyzed by direct weighing. Production indicators and nutritional adequacy were evaluated in contrast to the recommendations of the city food security bureau and the Brazilian National Program of School Meals (PNAE). Seventy-nine percent of the analyzed meals did not meet the recommendations of the city food security bureau. The rate of waste (food left on plates) was acceptable at 4,90%, but the rates of cooked and not served food (7,06%) and counter leftovers (5,30%) were high. Both the city planned meals and the meals served in the schools were nutritionally inadequate in terms of the PNAE, particularly for children aged 11-15 years. There was a relationship between consumption by school staff and the amount of food that was cooked (r = 0.353; P planning, production, and distribution of school meals and of food and nutrition education in order to improve the quality of food and to reduce waste in schools.
Full Text Available The aim of the research was to determine how students/respondents perceive security on their travels in Europe. The respondents belong to two different study programmes, one focusing on the field of security (Faculty of Criminal Justice and Security, University of Maribor and the other on the field of tourism (Higher Vocational School for Catering and Tourism. Our main presumption was that students of the two institutions developed a different attitude towards travel security since their studies focus on two substantively different academic-professional fields. We examined their attitude towards security factors such as: security climate, self-protection and collective security. In our research we included a sample of 100 students/respondents. We used an instrument in the form of a questionnaire for the quantitative measurement of responses on a 5-point Likert scale. To portray the results of the research we also used various statistical indicators in the computer programme SPSS such as: arithmetic mean, Man-Whitney test, frequency distribution of responses, where independent variables are displayed. The findings suggest that the students/respondents attitude towards safety and their expectations on individual elements of all three security factors differ in the two target groups. The expectations of students/respondents of FCJS regarding the implementation and provision of security are higher compared to students/respondents of HVC. Respondents have different experience with security on their travels, as the number of travels varies quite substantially between students. Both institutions can use the results of the research in the evaluation processes of their study programmes. On the basis of the results of the research it is substantiated that the field and content of study have an impact on the students’ attitude to elements of security while travelling. The findings are intended to all researchers in the field of security and tourism, as
A total of 125 talented high school students had the opportunity to gain first hand experience about science and engineering careers by working directly with a NASA scientist or engineer during the summer. This marked the fifth year of operation for NASA's Summer High School Apprenticehsip Research Program (SHARP). Ferguson Bryan served as the SHARP contractor and worked closely with NASA staff at Headquarters and the eight participating sites to plan, implement, and evaluate the Program. The main objectives were to strengthen SHARP and expand the number of students in the Program. These eight sites participated in the Program: Ames Research Center North, Ames' Dryden Flight Research Facility, Goddard Space Flight Center, Goddard's Wallops Flight Facility, Kennedy Space Center, Langley Research Center, Lewis Research Center, and Marshall Space Flight Center.
McFarland, Joshua C; Meyers, Ron A
Birds utilize one of two hindlimb postures during flight: an extended posture (with the hip and knee joints flexed, while the ankle joint is extended caudally) or a flexed posture (with the hip, knee, and ankle joints flexed beneath the body). American Avocets (Recurvirostra americana) and Black-necked Stilts (Himantopus mexicanus) extend their legs caudally during flight and support them for extended periods. Slow tonic and slow twitch muscle fibers are typically found in muscles functioning in postural support due to the fatigue resistance of these fibers. We hypothesized that a set of small muscles composed of high percentages of slow fibers and thus dedicated to postural support would function in securing the legs in the extended posture during flight. This study examined the anatomy and histochemical profile of eleven hindlimb muscles to gain insight into their functional roles during flight. Contrary to our hypothesis, all muscles possessed both fast twitch and slow twitch or slow tonic fibers. We believe this finding is due to the versatility of dynamic and postural functions the leg muscles must facilitate, including standing, walking, running, swimming, and hindlimb support during flight. Whether birds use an extended or flexed hindlimb flight posture may be related to the aerodynamic effect of leg position or may reflect evolutionary history. (c) 2008 Wiley-Liss, Inc.
Hayashi, Masaki; Nakamura, Jun; Sasaki, Ken; Harano, Ken-Ichi
Honeybees use nectar held in the crop as their main source of energy for flight but the mass of the crop nectar load may be a cost burden. This study investigated whether males of the honeybee Apis mellifera adjust their nectar fuel load and concentration to enhance the success of mating flights. When the crop content was compared between males staying in the hive and those departing, the latter group had the larger volume (median, 5.0μl; range, 0.0-17.8μl) and higher concentration (median, 71.6%; range, 49.0%-77.6%), indicating that departing males load concentrated nectar as fuel before mating flights. Moreover, the crop nectar concentration was significantly higher in departing males than in departing workers. These results suggest that concentrated nectar is advantageous to males because it provides more sugar for energy at lower mass and secures longer or more effective mating flights for higher chance of reproductive success. No significant effect of age was detected in crop volume, and concentration and amount of dissolved sugars in the crop content. In addition, laboratory experiments showed that males had only about 5μl of nectar in the crop soon after feeding, irrespective of fed volume (5-15μl), suggesting they do not hold much nectar in the crop but send it rapidly to the midgut, unlike workers. Copyright © 2016 Elsevier Ltd. All rights reserved.
There is extensive research evidence indicating that children and youth are the most vulnerable population for developing psychological symptoms relating to war and terror. Although studies have documented a wide range of detrimental emotional and behavioral effects of such exposure, much less is known about the effects of exposure to a continuous security threat for children and adolescents. Against this background, the current article examined the implications of continuous exposure to missile attacks among 1096 children and adolescents enrolled in public schools near the Israeli border with Gaza. Participants filled out quantitative questionnaires, which relate to the pathological consequences of continuous exposure to security threats, and to the role of the school and the community as a protective environment against disruptive behavior resulting from such exposure. The findings revealed that PTSS responses were mainly related to the security threat, whereas interpersonal aggression resulted from other types of traumatic events. Significant differences were found between aggression and posttraumatic symptoms, by age and gender. PTSS was found to be lower for older participants and higher for girls, whereas aggression was higher for boys and higher for older participants. Furthermore, the sense of belonging to the place of residence was negatively associated with PTSS as well as with aggressive behavior: the higher the participants' sense of belonging, the lower their levels of PTSS and aggressive responses. In contrast, the sense of belonging to the school was negatively associated only with aggressive behavior: the higher the participants' sense of belonging to the school, the lower their aggressive responses. The findings are discussed in the light of trauma theories and in light of the results of previous research. The study contributed to knowledge about the differential consequences of exposure to a security threat, and highlighted the importance of
National Clearinghouse for Educational Facilities, 2009
Doors serve a variety of needs and purposes in schools: (1) Exterior doors provide building security and protection from the elements; and (2) Interior doors control the movement of people among school spaces, help control noise and air flow, and act as flame and smoke barriers during a fire. In a lockdown, they serve as safety barriers. From a…
Tamiru, Dessalegn; Melaku, Yabsira; Belachew, Tefera
Studies showed that poor health and nutrition among school adolescents are major barriers to educational access and achievements in low-income countries. This school-based study was aimed to assess the association of school absenteeism and food insecurity among rural school adolescents from grades 5 to 8 in Jimma zone, Ethiopia. Regression analyses were used to see the strength of association between dependent and independent variables using odds ratio and 95% confidence intervals. Multivariable logistic regression analysis was used to identify the predictor of school absenteeism. Validated tools are used to collect household food insecurity data. Results showed that school absenteeism is significantly high among adolescents from food insecure households when compared to adolescents from food secure households ( P absenteeism was negatively associated with male sex (adjusted odds ratio [AOR] = -0.91, 95% CI -1.85 to -0.03), household food security (adjusted odds ratio = -1.85, 95% CI -3.11 to -0.59), being an elder sibling (AOR = -0.37, 95% CI, -0.62 to -0.12), and mother involvement in decision making (AOR = -0.68, 95% CI, -1.33 to -0.03) while male-headed household was positively associated (AOR = 2.46, 95% CI, 1.37 to 4.56). Generally, this study showed that household food insecurity has significant contribution to school absenteeism among rural adolescents. Therefore, efforts should be made to improve household income earning capacity to reduce the prevalence of school absenteeism among rural school adolescents.
Tamiru, Dessalegn; Argaw, Alemayehu; Gerbaba, Mulusew; Ayana, Girmay; Nigussie, Aderajew; Belachew, Tefera
Household food insecurity and lack of education are two of the most remarkable deprivations which developing countries are currently experiencing. Evidences from different studies showed that health and nutrition problems are major barriers to educational access and achievement in low-income countries which poses a serious challenge on effort towards the achieving Sustainable Development Goals. Evidence on the link between food security and school attendance is very important to address this challenge. This study aimed to assess to what extent food insecurity affects school absenteeism among primary school adolescents. A school based cross-sectional study was conducted among primary school adolescents in Jimma zone from October-November, 2013. Structured questionnaire was used to collect data on the household food security and socio-demographic variables. Data were analyzed using SPSS for windows version 16.0 after checking for missing values and outliers. Multivariable logistic regression analyses were used to determine the association of school absenteeism and food insecurity with independent variables using odds ratio and 95 % of confidence intervals. Variables with p ≤ 0.25 in the bivariate analyses were entered into a multivariable regression analysis to control for associations among the independent variables. The frequency of adolescent school absenteeism was significantly high (50.20 %) among food insecure households (P absenteeism. Household food insecurity was positively associated with lack of maternal education [AOR = 2.26 (0.57, 8.93)] and poor household economic status [AOR = 1.39 (1.18, 2.83)]. However, livestock ownership [AOR = 0.17 (0.06, 0.51)] was negatively associated with household food insecurity. Findings of this study showed that household food insecurity has strong linkage with adolescent school absenteeism. Maternal education and household economic status were significantly associated with household food security
Ebeid, Emad Samuel Malki; Skriver, Martin; Terkildsen, Kristian Husum
, which are all tightly linked to the UAV flight controller hardware and software. The lack of standardization of flight controller architectures and the use of proprietary closed-source flight controllers on many UAV platforms, however, complicates this work: solutions developed for one flight controller...... may be difficult to port to another without substantial extra development and testing. Using open-source flight controllers mitigates some of these challenges and enables other researchers to validate and build upon existing research. This paper presents a survey of the publicly available open...
Wiegmann, Douglas A; Goh, Juliana; O'Hare, David
Visual flight rules (VFR) flight into instrument meteorological conditions (IMC) is a major safety hazard in general aviation. In this study we examined pilots' decisions to continue or divert from a VFR flight into IMC during a dynamic simulation of a cross-country flight. Pilots encountered IMC either early or later into the flight, and the amount of time and distance pilots flew into the adverse weather prior to diverting was recorded. Results revealed that pilots who encountered the deteriorating weather earlier in the flight flew longer into the weather prior to diverting and had more optimistic estimates of weather conditions than did pilots who encountered the deteriorating weather later in the flight. Both the time and distance traveled into the weather prior to diverting were negatively correlated with pilots' previous flight experience. These findings suggest that VFR flight into IMC may be attributable, at least in part, to poor situation assessment and experience rather than to motivational judgment that induces risk-taking behavior as more time and effort are invested in a flight. Actual or potential applications of this research include the design of interventions that focus on improving weather evaluation skills in addition to addressing risk-taking attitudes.
The twin pusher propeller-driven engines of the Theseus research aircraft can be clearly seen in this photo, taken during a 1996 research flight at NASA's Dryden Flight Research Center, Edwards, California. The Theseus aircraft, built and operated by Aurora Flight Sciences Corporation, Manassas, Virginia, was a unique aircraft flown at NASA's Dryden Flight Research Center, Edwards, California, under a cooperative agreement between NASA and Aurora. Dryden hosted the Theseus program, providing hangar space and range safety for flight testing. Aurora Flight Sciences was responsible for the actual flight testing, vehicle flight safety, and operation of the aircraft. The Theseus remotely piloted aircraft flew its maiden flight on May 24, 1996, at Dryden. During its sixth flight on November 12, 1996, Theseus experienced an in-flight structural failure that resulted in the loss of the aircraft. As of the beginning of the year 2000, Aurora had not rebuilt the aircraft. Theseus was built for NASA under an innovative, $4.9 million fixed-price contract by Aurora Flight Sciences Corporation and its partners, West Virginia University, Morgantown, West Virginia, and Fairmont State College, Fairmont, West Virginia. The twin-engine, unpiloted vehicle had a 140-foot wingspan, and was constructed largely of composite materials. Powered by two 80-horsepower, turbocharged piston engines that drove twin 9-foot-diameter propellers, Theseus was designed to fly autonomously at high altitudes, with takeoff and landing under the active control of a ground-based pilot in a ground control station 'cockpit.' With the potential ability to carry 700 pounds of science instruments to altitudes above 60,000 feet for durations of greater than 24 hours, Theseus was intended to support research in areas such as stratospheric ozone depletion and the atmospheric effects of future high-speed civil transport aircraft engines. Instruments carried aboard Theseus also would be able to validate satellite
Attisano, Alfredo; Murphy, James T; Vickers, Andrew; Moore, Patricia J
Flight in insects can be long-range migratory flights, intermediate-range dispersal flights, or short-range host-seeking flights. Previous studies have shown that flight mills are valuable tools for the experimental study of insect flight behavior, allowing researchers to examine how factors such as age, host plants, or population source can influence an insects' propensity to disperse. Flight mills allow researchers to measure components of flight such as speed and distance flown. Lack of detailed information about how to build such a device can make their construction appear to be prohibitively complex. We present a simple and relatively inexpensive flight mill for the study of tethered flight in insects. Experimental insects can be tethered with non-toxic adhesives and revolve around an axis by means of a very low friction magnetic bearing. The mill is designed for the study of flight in controlled conditions as it can be used inside an incubator or environmental chamber. The strongest points are the very simple electronic circuitry, the design that allows sixteen insects to fly simultaneously allowing the collection and analysis of a large number of samples in a short time and the potential to use the device in a very limited workspace. This design is extremely flexible, and we have adjusted the mill to accommodate different species of insects of various sizes.
Hedenström, Anders; Johansson, L Christoffer
Bats evolved the ability of powered flight more than 50 million years ago. The modern bat is an efficient flyer and recent research on bat flight has revealed many intriguing facts. By using particle image velocimetry to visualize wake vortices, both the magnitude and time-history of aerodynamic forces can be estimated. At most speeds the downstroke generates both lift and thrust, whereas the function of the upstroke changes with forward flight speed. At hovering and slow speed bats use a leading edge vortex to enhance the lift beyond that allowed by steady aerodynamics and an inverted wing during the upstroke to further aid weight support. The bat wing and its skeleton exhibit many features and control mechanisms that are presumed to improve flight performance. Whereas bats appear aerodynamically less efficient than birds when it comes to cruising flight, they have the edge over birds when it comes to manoeuvring. There is a direct relationship between kinematics and the aerodynamic performance, but there is still a lack of knowledge about how (and if) the bat controls the movements and shape (planform and camber) of the wing. Considering the relatively few bat species whose aerodynamic tracks have been characterized, there is scope for new discoveries and a need to study species representing more extreme positions in the bat morphospace. © 2015. Published by The Company of Biologists Ltd.
South Africa is regarded as food secure; however, food insecurity and malnutrition are still affecting school-aged children residing mostly in rural areas. This paper reports the nutritional status and consumption patterns of school children from two purposively selected schools located in Orange Farm informal settlement.
Williams-Hayes, Peggy S.
The NASA F-15 Intelligent Flight Control System project team developed a series of flight control concepts designed to demonstrate neural network-based adaptive controller benefits, with the objective to develop and flight-test control systems using neural network technology to optimize aircraft performance under nominal conditions and stabilize the aircraft under failure conditions. This report presents flight-test results for an adaptive controller using stability and control derivative values from an online learning neural network. A dynamic cell structure neural network is used in conjunction with a real-time parameter identification algorithm to estimate aerodynamic stability and control derivative increments to baseline aerodynamic derivatives in flight. This open-loop flight test set was performed in preparation for a future phase in which the learning neural network and parameter identification algorithm output would provide the flight controller with aerodynamic stability and control derivative updates in near real time. Two flight maneuvers are analyzed - pitch frequency sweep and automated flight-test maneuver designed to optimally excite the parameter identification algorithm in all axes. Frequency responses generated from flight data are compared to those obtained from nonlinear simulation runs. Flight data examination shows that addition of flight-identified aerodynamic derivative increments into the simulation improved aircraft pitch handling qualities.
Webb, Evan; Day, John H. (Technical Monitor)
NASA's Goddard Space Flight Center (GSFC) is adapting current data networking technologies to fly on future spaceflight missions. The benefits of using commercially based networking standards and protocols have been widely discussed and are expected to include reduction in overall mission cost, shortened integration and test (I&T) schedules, increased operations flexibility, and hardware and software upgradeability/scalability with developments ongoing in the commercial world. The networking effort is a comprehensive one encompassing missions ranging from small University Explorer (UNEX) class spacecraft to large observatories such as the Next Generation Space Telescope (NGST). Mission aspects such as flight hardware and software, ground station hardware and software, operations, RF communications, and security (physical and electronic) are all being addressed to ensure a complete end-to-end system solution. One of the current networking development efforts at GSFC is the SpaceLAN (Spacecraft Local Area Network) project, development of a space-qualifiable Ethernet network. To this end we have purchased an IEEE 802.3-compatible 10/100/1000 Media Access Control (MAC) layer Intellectual Property (IP) core and are designing a network node interface (NNI) and associated network components such as a switch. These systems will ultimately allow the replacement of the typical MIL-STD-1553/1773 and custom interfaces that inhabit most spacecraft. In this paper we will describe our current Ethernet NNI development along with a novel new space qualified physical layer that will be used in place of the standard interfaces. We will outline our plans for development of space qualified network components that will allow future spacecraft to operate in significant radiation environments while using a single onboard network for reliable commanding and data transfer. There will be a brief discussion of some issues surrounding system implications of a flight Ethernet. Finally, we will
... (airplane) and flight instructors (simulator). 121.412 Section 121.412 Aeronautics and Space FEDERAL... OPERATIONS Training Program § 121.412 Qualifications: Flight instructors (airplane) and flight instructors (simulator). (a) For the purposes of this section and § 121.414: (1) A flight instructor (airplane) is a...
Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution
Full Text Available Indonesia and Malaysia have a good potency for cooperation in aviation industry. It can be seen in the establishing two aviation companies namely PT. Indonesia Air Asia and Malindo which both are low-cost carrier. These aviation industries are categorized as low-cost carrier, however safety and security are absolute factors because these are rights for consumers. This article will describe further about safety and security standard; protecting the rights for consumers in connection with safety aviation in Indonesia and Malaysia from the Consumer Protection Law and the Aviation Law. As a result of the research shows that safety standard passenger for air transportation in airport covers information and safety facility in the shape of availability of the emergency safety tools (fires, accidents and natural disasters; information, area and health facility; and healthcare workers. Moreover, safety standards for passenger in an aircraft include information and safety facility in the shape of availability information and the emergency safety tools for passenger in an aircraft. The protection for consumer rights for safety flight in Indonesia as follows: aviation industry has obligation to fulfill minimum standard of safety and security; consumers must be safety from false information which raises concern; aircraft operation which endanger of the passenger; and consumer protection in operating the electronic device which endanger flight. On the other hand, the law of consumer rights in Malaysia relating to aviation are ruled under the Aviation Law as a result of the Warsaw Convention 1929. In conclusion, the verdict of consumer rights related to security aviation begins when the passenger enter to an aircraft, in the aircraft, and by the time they get off the plane.
Gregory A. Merkel (left), high school student from Springfield, Massachusetts, is pictured here with Harry Coons of the Marshall Space Flight Center (MSFC) during a visit to the center. Merkel was among 25 winners of a contest in which some 3,500 high school students proposed experiments for the following year's Skylab mission. The nationwide scientific competition was sponsored by the National Science Teachers Association and the National Aeronautics and Space Administration (NASA). The winning students, along with their parents and sponsor teachers, visited MSFC where they met with scientists and engineers, participated in design reviews for their experiments, and toured MSFC facilities. Of the 25 students, 6 did not see their experiments conducted on Skylab because the experiments were not compatible with Skylab hardware and timelines. Of the 19 remaining, 11 experiments required the manufacture of additional equipment.
Drones and Remotely Piloted Vehicles are types of Unmanned Aerial Vehicles. UAVs began to be used with the war of Vietnam, they had a great interest when Israel used them in Bekaa Valley Operations of 1982. UAVs have been used by different countries with different aims with the help of emerging technology and investments. In this article, in the context of areas of UAV usage in national security, benefits and disadvantages of UAVs are put forward. Particularly, it has been evaluated on the basis of cost-effectiveness by focusing the use of UAV in the border security. UAVs have been studied by taking cost analysis, procurement and operational costs into consideration. Analysis of effectiveness has been done with illegal passages of people and drugs from flight times of UAVs. Although the procurement cost of the medium-level UAVs is low, its operational costs are high. For this reason, the idea of less costly alternative systems have been revealed for the border security. As the costs are reduced to acceptable level involving national security and border security in future with high-technology products in their structure, it will continue to be used in an increasing proportion.
International Space Station (ISS) astronauts receive supervised physical training pre-flight, utilize exercise countermeasures in-flight, and participate in a structured reconditioning program post-flight. Despite recent advances in exercise hardware and prescribed exercise countermeasures, ISS crewmembers are still found to have variable levels of deconditioning post-flight. This presentation provides an overview of the astronaut medical certification requirements, pre-flight physical training, in-flight exercise countermeasures, and the post-flight reconditioning program. Astronauts must meet medical certification requirements on selection, annually, and prior to ISS missions. In addition, extensive physical fitness testing and standardized medical assessments are performed on long duration crewmembers pre-flight. Limited physical fitness assessments and medical examinations are performed in-flight to develop exercise countermeasure prescriptions, ensure that the crewmembers are physically capable of performing mission tasks, and monitor astronaut health. Upon mission completion, long duration astronauts must re-adapt to the 1 G environment, and be certified as fit to return to space flight training and active duty. A structured, supervised postflight reconditioning program has been developed to prevent injuries, facilitate re-adaptation to the 1 G environment, and subsequently return astronauts to training and space flight. The NASA reconditioning program is implemented by the Astronaut Strength, Conditioning, and Rehabilitation (ASCR) team and supervised by NASA flight surgeons. This program has evolved over the past 10 years of the International Space Station (ISS) program and has been successful in ensuring that long duration astronauts safely re-adapt to the 1 g environment and return to active duty. Lessons learned from this approach to managing deconditioning can be applied to terrestrial medicine and future exploration space flight missions.
Devore, E.; Gillespie, C.; Hull, G.; Koch, D.
Flight Opportunities for Science Teacher EnRichment (FOSTER) is a new educational program from the Imitative to Develop Education through Astronomy in the Astrophysics Division at NASA Headquarters. Now in its first year of the pilot program, the FOSTER project brings eleven Bay Area teaaaachers to NASA Ames to participate in a year-long program of workshops, educational programs at their schools and the opportunity to fly aboard the Kuiper Airborne Observatory (KAO) on research missions. As science and math educators, FOSTER teachers get a close-up look at science in action and have the opportunity to interact with the entire team of scientists, aviators and engineers that support the research abord the KAO. In June, a second group of FOSTER teachers will participate in a week-long workshop at ASes to prepare for flights during the 1993-94 school year. In addition, the FOSTER project trains teachers to use e-mail for ongoing communication with scientists and the KAO team, develops educational materials and supports opportunities for scientists to become directly involved in local schools. FOSTER is supported by a NASA grant (NAGW 3291).
This research is an effort to understand current method and to propose an advanced method for Damage Tolerance Analysis (DTA) for the purpose of monitoring the aircraft service life. As one of tasks in the DTA, the current indirect Individual Aircraft Tracking (IAT) method for the F-16C/D Block 32 does not properly represent changes in flight usage severity affecting structural fatigue life. Therefore, an advanced aircraft service life monitoring method based on flight-by-flight load spectra is proposed and recommended for IAT program to track consumed fatigue life as an alternative to the current method which is based on the crack severity index (CSI) value. Damage Tolerance is one of aircraft design philosophies to ensure that aging aircrafts satisfy structural reliability in terms of fatigue failures throughout their service periods. IAT program, one of the most important tasks of DTA, is able to track potential structural crack growth at critical areas in the major airframe structural components of individual aircraft. The F-16C/D aircraft is equipped with a flight data recorder to monitor flight usage and provide the data to support structural load analysis. However, limited memory of flight data recorder allows user to monitor individual aircraft fatigue usage in terms of only the vertical inertia (NzW) data for calculating Crack Severity Index (CSI) value which defines the relative maneuver severity. Current IAT method for the F-16C/D Block 32 based on CSI value calculated from NzW is shown to be not accurate enough to monitor individual aircraft fatigue usage due to several problems. The proposed advanced aircraft service life monitoring method based on flight-by-flight load spectra is recommended as an improved method for the F-16C/D Block 32 aircraft. Flight-by-flight load spectra was generated from downloaded Crash Survival Flight Data Recorder (CSFDR) data by calculating loads for each time hack in selected flight data utilizing loads equations. From
Bruhn, Mark; Gettes, Michael; West, Ann
Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…
Lesneskie, Eric; Block, Steven
This study utilizes the School Survey on Crime and Safety to identify variables that predict lower levels of violence from four domains: school security, school climate, parental involvement, and community involvement. Negative binomial regression was performed and the findings indicate that statistically significant results come from all four…
Udonwa, N E
The issue of human capital flight has been discussed at different forums with a consensus opinion that it has its merits and demerits to equitable health system. Most often one nation becomes a substantial net exporter of talent, leaving the provider nation at risk of depleting its natural supply of talent. This paper looks into the historical perspective of human capital flight or "brain drain", and its burden. It attempts to elucidate the various causes and suggested solutions. The paper's objective is to educate colleagues on the conceptual and contextual imperatives of the issue. Using a convenient sample of key informants who were medical colleagues in Nigeria relevant information was sourced from these colleagues, documents from the postgraduate medical college of Nigeria and the internet on maters relating to human capital flight and brain drain. Every year, thousands of qualified doctors, and other professionals leave Nigeria tempted by significantly higher wages, brighter prospects for employment and education, stability, food security. It appears that the potential exposure to different working conditions, resources and professional environments can be of advantage to the country, should Nigeria be able to recall these professionals. It also appears that necessary economic reforms that make staying at home rewarding, that is--good leadership, and policy planning that seriously looks into rural development, among other issues, are keys ingredients to reversing the trend in order to ensure a more equitable health system.
Wolverton, David A.; Dickson, Richard W.; Clinedinst, Winston C.; Slominski, Christopher J.
The flight software developed for the Flight Management/Flight Controls (FM/FC) MicroVAX computer used on the Transport Systems Research Vehicle for Advanced Transport Operating Systems (ATOPS) research is described. The FM/FC software computes navigation position estimates, guidance commands, and those commands issued to the control surfaces to direct the aircraft in flight. Various modes of flight are provided for, ranging from computer assisted manual modes to fully automatic modes including automatic landing. A high-level system overview as well as a description of each software module comprising the system is provided. Digital systems diagrams are included for each major flight control component and selected flight management functions.
Takamura, Eduardo; Gomez-Rosa, Carlos A.; Mangum, Kevin; Wasiak, Fran
As the first interplanetary mission managed by the NASA Goddard Space Flight Center, the Mars Atmosphere and Volatile EvolutioN (MAVEN) had three IT security goals for its ground system: COMPLIANCE, (IT) RISK REDUCTION, and COST REDUCTION. In a multiorganizational environment in which government, industry and academia work together in support of the ground system and mission operations, information security governance, risk management, and compliance (GRC) becomes a challenge as each component of the ground system has and follows its own set of IT security requirements. These requirements are not necessarily the same or even similar to each other's, making the auditing of the ground system security a challenging feat. A combination of standards-based information security management based on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), due diligence by the Mission's leadership, and effective collaboration among all elements of the ground system enabled MAVEN to successfully meet NASA's requirements for IT security, and therefore meet Federal Information Security Management Act (FISMA) mandate on the Agency. Throughout the implementation of GRC on MAVEN during the early stages of the mission development, the Project faced many challenges some of which have been identified in this paper. The purpose of this paper is to document these challenges, and provide a brief analysis of the lessons MAVEN learned. The historical information documented herein, derived from an internal pre-launch lessons learned analysis, can be used by current and future missions and organizations implementing and auditing GRC.
Nunes, Miguel Baptista; McPherson, Maggie; Whiteside, Amy
This paper focuses on aspects of e-government with emphasis on how local authorities are coping with the transition into the Information Society. E-government is reviewed in the flight of such topics as a social inclusion, security and e-democracy. The challenge has been set in the United Kingdom for local authorities to deliver 100% of services…
should bind PSCs actions.21 This document laid out guiding principles and best practices but fell...use the terms in this 28Stanley, 168. 29Major Kevin Clarke, “ Microeconomics , Private Security and the Significance to Operational Planning...Clarke, Kevin. “ Microeconomics , Private Security and the Significance to Operational Planning.” Master’s thesis, School of Advanced Military Studies
NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified. The approach includes a comprehensive safety-hazard analysis of the RCO system to determine top level INFOSEC requirements for RCO and proposes an option for effective RCO implementation. This paper concludes with questioning the economic viability of RCO in light of the expense of overcoming the operational safety and security hazards it would introduce.
Schick, Andreas; Cierpka, Manfred
Schools and kindergartens are particularly suitable for the implementation of violence prevention programs. Many German schools and kindergartens have securely established the violence prevention curriculum Faustlos. The Faustlos programs for kindergartens and elementary schools are now complemented with the version for middle schools. As the kindergarten- and elementary school versions the middle school program too focuses on the theoretically profound, age group-tailored promotion of empathy, impulse control and anger management. These dimensions are subdivided into the five themes "understanding the problem" "training for empathy"; "anger management", "problem solving" and "applying skills" and taught stepwise, highly structured and based on several video sequences in 31 lessons. US-American evaluation studies proof the effectiveness and the violence prevention potential of the program. With the curriculum for middle schools a comprehensive Faustlos program package is now made available to sustainably promote core violence prevention competences of children and adolescents on a developmentally appropriate level and with a consistent didactic approach.
Sallack, David J.
Although state laws governing school district investing are quite conservative, there have been some notable investment failures leading to the loss of public funds. School districts must beware three kinds of investment risks involving credit, market, and interest rates and consider safety, legality, liquidity, and cash-flow requirements. (MLH)
Kim, Sanghag; Boldt, Lea J.; Kochanska, Grazyna
A developmental cascade from positive early parent-child relationship to child security with the parent to adaptive socialization outcomes, proposed in attachment theory and often implicitly accepted but rarely formally tested, was examined in 100 mothers, fathers, and children followed from toddler age to preadolescence. Parent-child Mutually Responsive Orientation (MRO) was observed in lengthy interactions at 38, 52, 67, and 80 months; children reported their security with parents at age 8. Socialization outcomes (parent- and child-reported cooperation with parental monitoring and teacher-reported school competence) were assessed at age 10. Mediation was tested with PROCESS (Hayes, 2013). The parent-child history of MRO significantly predicted both mother-child and father-child security. For mother-child dyads, security mediated links between history of MRO and cooperation with maternal monitoring and school competence, controlling for developmental continuity of the studied constructs. For father-child dyads, the mediation effect was not evident. PMID:26258443
Naumanen, M.; Rouhiainen, V. (eds.)
Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important
Muhammad Siddique Ansari
Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers
computing and communication technologies become powerful and advanced , people are exchanging a huge amount of data, and they are de- manding more storage...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS EMPIRICAL ANALYSIS OF USING ERASURE CODING IN OUTSOURCING DATA STORAGEWITH PROVABLE SECURITY by...2015 to 06-17-2016 4. TITLE AND SUBTITLE EMPIRICAL ANALYSIS OF USING ERASURE CODING IN OUTSOURCING DATA STORAGE WITH PROVABLE SECURITY 5. FUNDING
Francis Robert Usman
Full Text Available This study empirically examines the impact of capital fight and its macroeconomic determinants on agricultural growth in Nigeria from 1970 -2013. Data generated were analyzed using Unit root test, co-integration test, regression analysis. The study result found negative and insignificant relationship(P>0.05 between total capital flight and agricultural growth; meaning that capital flight has no direct impact on agricultural growth or the impact on agricultural growth is shadowed by the other macroeconomic variables in the system. Also, the stock of gross external debt (EXD variable showed positive and statistically significant relationship (P<0.05 with agricultural growth. The result shows that a unit change in EXD will bring about 24% change in the growth of agriculture provided other factors are kept constant. Political instability (POL variable has negative and significant effect on agricultural growth in Nigeria. The study recommends that Nigeria’s judicious use of the income accruing from loans and Foreign Direct Investment (FDI is paramount if Agricultural growth is to be enhanced. Furthermore, the overall peace, security of lives and property and guaranty of investment by the government is essential therefore; Government should take concerted step to improve security of life and property in the country.
Eka Dian Pusfitasari
Full Text Available Indonesia has experiences on the lack of chemical security such as: a number of bombing terrors and hazardous chemicals found in food. Bomb used in terror is a homemade bomb made from chemicals which are widely spread in the research laboratories such as a mixture of pottasium chlorate, sulphur, and alumunium. Therefore, security of chemicals should be implemented to avoid the misused of the chemicals. Although it has experienced many cases of the misuse of chemicals, and many regulations and seminars related to chemical security have been held, but the implementation of chemical security is still a new thing for Indonesian citizens. The evident is coming from the interviews conducted in this study. Questions asked in this interview/survey included: the implementation of chemical safety and chemical security in laboratory; chemical inventory system and its regulation; and training needed for chemical security implementation. Respondents were basically a researcher from Government Research Institutes, University laboratories, senior high school laboratories, and service laboratories were still ambiguous in distinguishing chemical safety and chemical security. Because of this condition, most Indonesia chemical laboratories did not totally apply chemical security system. Education is very important step to raise people awareness and address this problem. Law and regulations should be sustained by all laboratory personnel activities to avoid chemical diversion to be used for harming people and environment. The Indonesia Government could also develop practical guidelines and standards to be applied to all chemical laboratories in Indonesia. These acts can help Government’s efforts to promote chemical security best practices which usually conducted by doing seminars and workshop.
Hall, Peter; Coles-Kemp, Lizzie
The talks presented in this book were delivered as part of a summer school held at Royal Holloway University of London between the 20th and the 23rd of June 2016. The focus of the summer school was social aspects of cyber security risk and was an engagement and dissemination activity for the EU FP7
Seagull Technology, Inc., Sunnyvale, CA, produced a computer program under a Langley Research Center Small Business Innovation Research (SBIR) grant called STAFPLAN (Seagull Technology Advanced Flight Plan) that plans optimal trajectory routes for small to medium sized airlines to minimize direct operating costs while complying with various airline operating constraints. STAFPLAN incorporates four input databases, weather, route data, aircraft performance, and flight-specific information (times, payload, crew, fuel cost) to provide the correct amount of fuel optimal cruise altitude, climb and descent points, optimal cruise speed, and flight path.
Flores, Sarah L.; Chapman, Bruce D.; Tung, Waye W.; Zheng, Yang
This new interface will enable Principal Investigators (PIs), as well as UAVSAR (Uninhabited Aerial Vehicle Synthetic Aperture Radar) members to do their own flight planning and time estimation without having to request flight lines through the science coordinator. It uses an all-in-one Google Maps interface, a JPL hosted database, and PI flight requirements to design an airborne flight plan. The application will enable users to see their own flight plan being constructed interactively through a map interface, and then the flight planning software will generate all the files necessary for the flight. Afterward, the UAVSAR team can then complete the flight request, including calendaring and supplying requisite flight request files in the expected format for processing by NASA s airborne science program. Some of the main features of the interface include drawing flight lines on the map, nudging them, adding them to the current flight plan, and reordering them. The user can also search and select takeoff, landing, and intermediate airports. As the flight plan is constructed, all of its components are constantly being saved to the database, and the estimated flight times are updated. Another feature is the ability to import flight lines from previously saved flight plans. One of the main motivations was to make this Web application as simple and intuitive as possible, while also being dynamic and robust. This Web application can easily be extended to support other airborne instruments.
Díaz, Mónica del Pilar; Montoya, Iván A; Montoya, Luz A
This research was aimed at ascertaining the state's role regarding hunger and how it manages to combat this matter; a food security program in two Colombian cities was thus assessed (i.e. school meals' provision in Cali and Bogota). A qualitative approach was adopted; documentary analysis, participant observation and in-depth interviews with various actors for both selected cases were used as data collection techniques. It was found that several measures taken in this area were not covered by regulatory principles aimed at covering all the dimensions of food security. Serious weaknesses in school meals' management in Cali were associated with a weak environment regarding the fight against hunger. School meals' management in Bogotá was aimed at recognizing the right to food as being supported by an institutional process where the issue of reducing hunger has become a firm purpose. School meals' program management was associated with the characteristics of its product, thereby affecting the program and the population's food and nutritional status; state management thus becomes another dimension of food security.
Lauritsen, Peter; Bøge, Ask Risom; Andersen, Lars Bo
with technologies is carried out as well as observation is conducted. We obtain and present new knowledge about how surveillance is practiced in the interpersonal relations of students and teachers. References: Monahan, T., & Torres, R. D. (2009). Schools Under Surveillance: Cultures of Control in Public Education....... Rutgers University Press. Selwyn, N. (2010). Schools and Schooling in the Digital Age: A Critical Analysis. Routledge. Taylor, E. (2013). Surveillance Schools: Security, Discipline and Control in Contemporary Education. Palgrave Macmillan UK. Taylor, E., & Rooney, T. (2016). Surveillance Futures: Social......In this presentation we pursue the question: How is privacy performed and perceived in schools by children? Our aim is to investigate how the boundaries between public and private spheres are continuously performed in the formal setting of the classroom as well as in the social lives of students...
Clinedinst, Winston C.; Debure, Kelly R.; Dickson, Richard W.; Heaphy, William J.; Parks, Mark A.; Slominski, Christopher J.; Wolverton, David A.
The Flight Management/Flight Controls (FM/FC) software for the Norden 2 (PDP-11/70M) computer installed on the NASA 737 aircraft is described. The software computes the navigation position estimates, guidance commands, those commands to be issued to the control surfaces to direct the aircraft in flight based on the modes selected on the Advanced Guidance Control System (AGSC) mode panel, and the flight path selected via the Navigation Control/Display Unit (NCDU).
Melville, Keith, Ed.
Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…
Smith, B. P.; Dutta, S.
The Adaptable Deployable Entry and Placement Technology (ADEPT) project will be conducting the first flight test of ADEPT, titled Sounding Rocket One (SR-1), in just two months. The need for this flight test stems from the fact that ADEPT's supersonic dynamic stability has not yet been characterized. The SR-1 flight test will provide critical data describing the flight mechanics of ADEPT in ballistic flight. These data will feed decision making on future ADEPT mission designs. This presentation will describe the SR-1 scientific data products, possible flight test outcomes, and the implications of those outcomes on future ADEPT development. In addition, this presentation will describe free-flight ground testing performed in advance of the flight test. A subsonic flight dynamics test conducted at the Vertical Spin Tunnel located at NASA Langley Research Center provided subsonic flight dynamics data at high and low altitudes for multiple center of mass (CoM) locations. A ballistic range test at the Hypervelocity Free Flight Aerodynamics Facility (HFFAF) located at NASA Ames Research Center provided supersonic flight dynamics data at low supersonic Mach numbers. Execution and outcomes of these tests will be discussed. Finally, a hypothesized trajectory estimate for the SR-1 flight will be presented.
Wingett, Paul T. (Inventor); Gaines, Louie T. (Inventor); Evans, Paul S. (Inventor); Kern, James I. (Inventor)
A flight control actuation system comprises a controller, electromechanical actuator and a pneumatic actuator. During normal operation, only the electromechanical actuator is needed to operate a flight control surface. When the electromechanical actuator load level exceeds 40 amps positive, the controller activates the pneumatic actuator to offset electromechanical actuator loads to assist the manipulation of flight control surfaces. The assistance from the pneumatic load assist actuator enables the use of an electromechanical actuator that is smaller in size and mass, requires less power, needs less cooling processes, achieves high output forces and adapts to electrical current variations. The flight control actuation system is adapted for aircraft, spacecraft, missiles, and other flight vehicles, especially flight vehicles that are large in size and travel at high velocities.
Harini, R.; Handayani, H. N.; Ramdani, F. R.
Food security is an issue of national and global level. Food is a basic human need to live. Without food will threaten human life. This research was conducted in coastal area of Demak Regency. This research is to understand the potential of human resources, natural resources and assess the level of food security of coastal communities. The data used are primary data through interviews with the local community. Also used Secondary data from government agencies. Data analysis used qualitative and quantitative descriptive methods through graphs, tables and maps. The results showed that potential of human resources in Demak coastal area (Wedung, Purworejo, and Sidogemah villages) is low. It can be indicated from education level of respondents in Demak are elementary school and junior high school. Beside, total households income are about 2-4 million. This study found that the households sampled are 90% is food insecured households. The most of households in Demak coastal area are about 90% households include on insecurity food category.
Anxieties relating to the health, safety and security of schoolchildren have been met with a variety of surveillance apparatus in schools internationally. Drawing on findings from a content analysis of newspaper reports relating to drug testing in Australian schools, this article seeks to excavate the ways in which the media shapes, informs,…
An airplane in steady rectilinear flight was assumed to experience an initial disturbance in rolling or yawing velocity. The equations of motion were solved to see if it was possible to hasten recovery of a stable airplane or to secure recovery of an unstable airplane by the application of a single lateral control following an exponential law. The sample computations indicate that, for initial disturbances complex in character, it would be difficult to secure correlation with any type of exponential control. The possibility is visualized that the two-control operation may seriously impair the ability to hasten recovery or counteract instability.
Atencio, Julian J.
This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.
Dykstra, Holly; Davey, Adam; Fisher, Jennifer O; Polonsky, Heather; Sherman, Sandra; Abel, Michelle L; Dale, Lauren C; Foster, Gary D; Bauer, Katherine W
Universal access to the School Breakfast Program (SBP) is intended to help low-income and food-insecure students overcome barriers to eating breakfast. However, SBP participation is often still low despite universal access. Further information is needed with regard to these children's breakfast behaviors, and in particular breakfast behaviors among youth from food-insecure families, to inform effective breakfast interventions. The objective of this study was to examine breakfast behaviors among a large sample of urban students with universal access to the SBP and to identify differences in breakfast behaviors among children from food-secure compared with food-insecure households. A cross-sectional study of 821 fourth- through sixth-grade students and their parents from 16 schools was conducted. Students reported the foods/drinks selected and location of obtaining food/drink on the morning of data collection, parents reported household food security status using the 6-item Food Security Survey Module, and the school district provided SBP participation data during the fall semester of 2013. Multivariable linear regression models accounting for school-level clustering were used to examine differences in breakfast behaviors across 3 levels of household food security: food secure, low food secure, and very low food secure. Students participated in the SBP 31.2% of possible days, with 13% never participating in the SBP. One-fifth (19.4%) of students purchased something from a corner store for breakfast, and 16.9% skipped breakfast. Forty-six percent of students were food insecure; few differences in breakfast behaviors were observed across levels of food security. Despite universal access to the SBP, participation in the SBP is low. Breakfast skipping and selection of foods of low nutritional quality in the morning are common, regardless of household food security status. Additional novel implementation of the SBP and addressing students' breakfast preferences may be
A long, slender wing and a pusher propeller at the rear characterize the Perseus B remotely piloted research aircraft, seen here during a test flight in June 1998. Perseus B is a remotely piloted aircraft developed as a design-performance testbed under NASA's Environmental Research Aircraft and Sensor Technology (ERAST) project. Perseus is one of several flight vehicles involved in the ERAST project. A piston engine, propeller-powered aircraft, Perseus was designed and built by Aurora Flight Sciences Corporation, Manassas, Virginia. The objectives of Perseus B's ERAST flight tests have been to reach and maintain horizontal flight above altitudes of 60,000 feet and demonstrate the capability to fly missions lasting from 8 to 24 hours, depending on payload and altitude requirements. The Perseus B aircraft established an unofficial altitude record for a single-engine, propeller-driven, remotely piloted aircraft on June 27, 1998. It reached an altitude of 60,280 feet. In 1999, several modifications were made to the Perseus aircraft including engine, avionics, and flight-control-system improvements. These improvements were evaluated in a series of operational readiness and test missions at the Dryden Flight Research Center, Edwards, California. Perseus is a high-wing monoplane with a conventional tail design. Its narrow, straight, high-aspect-ratio wing is mounted atop the fuselage. The aircraft is pusher-designed with the propeller mounted in the rear. This design allows for interchangeable scientific-instrument payloads to be placed in the forward fuselage. The design also allows for unobstructed airflow to the sensors and other devices mounted in the payload compartment. The Perseus B that underwent test and development in 1999 was the third generation of the Perseus design, which began with the Perseus Proof-Of-Concept aircraft. Perseus was initially developed as part of NASA's Small High-Altitude Science Aircraft (SHASA) program, which later evolved into the ERAST
Ratvasky, Thomas P.; Barnhart, Billy P.; Lee, Sam; Cooper, Jon
A flight test of a business jet aircraft with various ice accretions was performed to obtain data to validate flight simulation models developed through wind tunnel tests. Three types of ice accretions were tested: pre-activation roughness, runback shapes that form downstream of the thermal wing ice protection system, and a wing ice protection system failure shape. The high fidelity flight simulation models of this business jet aircraft were validated using a software tool called "Overdrive." Through comparisons of flight-extracted aerodynamic forces and moments to simulation-predicted forces and moments, the simulation models were successfully validated. Only minor adjustments in the simulation database were required to obtain adequate match, signifying the process used to develop the simulation models was successful. The simulation models were implemented in the NASA Ice Contamination Effects Flight Training Device (ICEFTD) to enable company pilots to evaluate flight characteristics of the simulation models. By and large, the pilots confirmed good similarities in the flight characteristics when compared to the real airplane. However, pilots noted pitch up tendencies at stall with the flaps extended that were not representative of the airplane and identified some differences in pilot forces. The elevator hinge moment model and implementation of the control forces on the ICEFTD were identified as a driver in the pitch ups and control force issues, and will be an area for future work.
Putnam, Terrill W.; Ayers, Theodore G.
Flight research and testing form a critical link in the aeronautic research and development chain. Brilliant concepts, elegant theories, and even sophisticated ground tests of flight vehicles are not sufficient to prove beyond a doubt that an unproven aeronautical concept will actually perform as predicted. Flight research and testing provide the ultimate proof that an idea or concept performs as expected. Ever since the Wright brothers, flight research and testing were the crucible in which aeronautical concepts were advanced and proven to the point that engineers and companies are willing to stake their future to produce and design aircraft. This is still true today, as shown by the development of the experimental X-30 aerospace plane. The Dryden Flight Research Center (Ames-Dryden) continues to be involved in a number of flight research programs that require understanding and characterization of the total airplane in all the aeronautical disciplines, for example the X-29. Other programs such as the F-14 variable-sweep transition flight experiment have focused on a single concept or discipline. Ames-Dryden also continues to conduct flight and ground based experiments to improve and expand the ability to test and evaluate advanced aeronautical concepts. A review of significant aeronautical flight research programs and experiments is presented to illustrate both the progress being made and the challenges to come.
The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.
Muslims are folk-devils that mark the ubiquitous moral panic. For some, the idea of the "Muslim problematic" signifies a long and worrying trend of creeping "Islamification" of state schools. For others, the discourse of the "Muslim problematic" reflects the ongoing racial patholigisation of Britain's minoritised…
New York State Education Dept., Albany.
Purchasing, one of the most highly specialized activities in school administration, involves securing material or service in the right quantity and quality, at the right time, and for the right price. This handbook, intended as a guide for purchasing agents, details principles essential for operating a school purchasing office in New York State.…
... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Fire protection of flight controls, engine... Design and Construction Fire Protection § 25.865 Fire protection of flight controls, engine mounts, and other flight structure. Essential flight controls, engine mounts, and other flight structures located in...
The impact of systems thinking can be found in numerous security-oriented research, beginning from the early works on international system: Pitrim Sorokin, Quincy Wright, first models of military conflict and war: Frederick Lanchester, Lewis F. Richardson, national and military security (origins of RAND Corporation), through development of game theory-based conflict studies, International Relations, classical security studies of Morton A. Kaplan, Karl W. Deutsch [Mesjasz 1988], and ending with contemporary ideas of broadened concepts of security proposed by the Copenhagen School [Buzan et al 1998]. At present it may be even stated that the new military and non-military threats to contemporary complex society, such as low-intensity conflicts, regional conflicts, terrorism, environmental disturbances, etc. cannot be embraced without ideas taken from modern complex systems studies.
Haslbeck, Andreas; Hoermann, Hans-Juergen
The aim of this study was to evaluate the influence of practice and training on fine-motor flying skills during a manual instrument landing system (ILS) approach. There is an ongoing debate that manual flying skills of long-haul crews suffer from a lack of flight practice due to conducting only a few flights per month and the intensive use of automation. However, objective evidence is rare. One hundred twenty-six randomly selected airline pilots had to perform a manual flight scenario with a raw data precision approach. Pilots were assigned to four equal groups according to their level of practice and training by fleet (short-haul, long-haul) and rank (first officer, captain). Average ILS deviation scores differed significantly in relation to the group assignments. The strongest predictor variable was fleet, indicating degraded performance among long-haul pilots. Manual flying skills are subject to erosion due to a lack of practice on long-haul fleets: All results support the conclusion that recent flight practice is a significantly stronger predictor for fine-motor flying performance than the time period since flight school or even the total or type-specific flight experience. Long-haul crews have to be supported in a timely manner by adequate training tailored to address manual skills or by operational provisions like mixed-fleet flying or more frequent transitions between short-haul and long-haul operation. © 2016, Human Factors and Ergonomics Society.
Crew members check out the Perseus proof-of-concept vehicle on Rogers Dry Lake, adjacent to the Dryden Flight Research Center, Edwards, California, after a test flight in 1991. Perseus B is a remotely piloted aircraft developed as a design-performance testbed under NASA's Environmental Research Aircraft and Sensor Technology (ERAST) project. Perseus is one of several flight vehicles involved in the ERAST project. A piston engine, propeller-powered aircraft, Perseus was designed and built by Aurora Flight Sciences Corporation, Manassas, Virginia. The objectives of Perseus B's ERAST flight tests have been to reach and maintain horizontal flight above altitudes of 60,000 feet and demonstrate the capability to fly missions lasting from 8 to 24 hours, depending on payload and altitude requirements. The Perseus B aircraft established an unofficial altitude record for a single-engine, propeller-driven, remotely piloted aircraft on June 27, 1998. It reached an altitude of 60,280 feet. In 1999, several modifications were made to the Perseus aircraft including engine, avionics, and flight-control-system improvements. These improvements were evaluated in a series of operational readiness and test missions at the Dryden Flight Research Center, Edwards, California. Perseus is a high-wing monoplane with a conventional tail design. Its narrow, straight, high-aspect-ratio wing is mounted atop the fuselage. The aircraft is pusher-designed with the propeller mounted in the rear. This design allows for interchangeable scientific-instrument payloads to be placed in the forward fuselage. The design also allows for unobstructed airflow to the sensors and other devices mounted in the payload compartment. The Perseus B that underwent test and development in 1999 was the third generation of the Perseus design, which began with the Perseus Proof-Of-Concept aircraft. Perseus was initially developed as part of NASA's Small High-Altitude Science Aircraft (SHASA) program, which later evolved
The association of household food security, household characteristics and school environment with obesity status among off-reserve First Nations and Métis children and youth in Canada: results from the 2012 Aboriginal Peoples Survey.
Bhawra, Jasmin; Cooke, Martin J; Guo, Yanling; Wilk, Piotr
Indigenous children are twice as likely to be classified as obese and three times as likely to experience household food insecurity when compared with non- Indigenous Canadian children. The purpose of this study was to explore the relationship between food insecurity and weight status among Métis and off-reserve First Nations children and youth across Canada. We obtained data on children and youth aged 6 to 17 years (n = 6900) from the 2012 Aboriginal Peoples Survey. We tested bivariate relationships using Pearson chi-square tests and used nested binary logistic regressions to examine the food insecurity-weight status relationship, after controlling for geography, household and school characteristics and cultural factors. Approximately 22% of Métis and First Nations children and youth were overweight, and 15% were classified as obese. Over 80% of the sample was reported as food secure, 9% experienced low food security and 7% were severely food insecure. Off-reserve Indigenous children and youth from households with very low food security were at higher risk of overweight or obese status; however, this excess risk was not independent of household socioeconomic status, and was reduced by controlling for household income, adjusted for household size. Negative school environment was also a significant predictor of obesity risk, independent of demographic, household and geographic factors. Both food insecurity and obesity were prevalent among the Indigenous groups studied, and our results suggest that a large proportion of children and youth who are food insecure are also overweight or obese. This study reinforces the importance of including social determinants of health, such as income, school environment and geography, in programs or policies targeting child obesity.
Larrabee, Trenton Jameson
Wind turbulence including atmospheric turbulence and wake turbulence have been widely investigated; however, only recently it become possible to use Unmanned Aerial Vehicles (UAVs) as a validation tool for research in this area. Wind can be a major contributing factor of adverse weather for aircraft. More importantly, it is an even greater risk towards UAVs because of their small size and weight. Being able to estimate wind fields and gusts can potentially provide substantial benefits for both unmanned and manned aviation. Possible applications include gust suppression for improving handling qualities, a better warning system for high wind encounters, and enhanced control for small UAVs during flight. On the other hand, the existence of wind can be advantageous since it can lead to fuel savings and longer duration flights through dynamic soaring or thermal soaring. Wakes are an effect of the lift distribution across an aircraft's wing or tail. Wakes can cause substantial disturbances when multiple aircraft are moving through the same airspace. In fact, the perils from an aircraft flying through the wake of another aircraft is a leading cause of the delay between takeoff times at airports. Similar to wind, though, wakes can be useful for energy harvesting and increasing an aircraft's endurance when flying in formation which can be a great advantage to UAVs because they are often limited in flight time due to small payload capacity. Formation flight can most often be seen in manned aircraft but can be adopted for use with unmanned systems. Autonomous flight is needed for flying in the "sweet spot" of the generated wakes for energy harvesting as well as for thermal soaring during long duration flights. For the research presented here formation flight was implemented for the study of wake sensing and gust alleviation. The major contributions of this research are in the areas of a novel technique to estimate wind using an Unscented Kalman filter and experimental wake
A viewgraph presentation detailing X-43A Flight controls at NASA Dryden Flight Research Center is shown. The topics include: 1) NASA Dryden, Overview and current and recent flight test programs; 2) Unmanned Aerial Vehicle Synthetic Aperture Radar (UAVSAR) Program, Program Overview and Platform Precision Autopilot; and 3) Hyper-X Program, Program Overview, X-43A Flight Controls and Flight Results.
After completing its first flight with the Digital Flight Control System on December 16, 1997, the F-16XL #1 aircraft began a series of envelope expansion flights. On January 27 and 29, 1998, it successfully completed structural clearance tests, as well as most of the load testing Only flights at Mach 1.05 at 10,000 feet, Mach 1.1 at 15,000 feet, and Mach 1.2 at 20,000 feet remained. During the next flight, on February 4, an instrumentation problem cut short the planned envelope expansion tests. After the problem was corrected, the F-16XL returned to flight status, and on February 18 and 20, flight control and evaluation flights were made. Two more research flights were planned for the following week, but another problem appeared. During the ground start up, project personnel noticed that the leading edge flap moved without being commanded. The Digital Flight Control Computer was sent to the Lockheed-Martin facility at Fort Worth, where the problem was traced to a defective chip in the computer. After it was replaced, the F-16XL #1 flew a highly successful flight controls and handling qualities evaluation flight on March 26, clearing the way for the final tests. The final limited loads expansion flight occurred on March 31, and was fully successful. As a result, the on-site Lockheed-Martin loads engineer cleared the aircraft to Mach 1.8. The remaining two handling qualities and flight control evaluation flights were both made on April 3, 1998. These three flights concluded the flight test portion of the DFCS upgrade.
Culture to Identify the Post 9/11 Homeland Security Zeitgeist” (Master’s thesis, Naval Postgraduate School, 2008). 4 Abraham H. Maslow , The Farther...Archetypes in a Public Mental Hospital.” Doctoral dissertation, University of Southern California, 1987. Maslow , Abraham H. 1971. The Farther Reaches
The modified BQM-34 Firebee II drone with Aeroelastic Research Wing (ARW-1), a supercritical airfoil, during a 1980 research flight. The remotely-piloted vehicle, which was air launched from NASA's NB-52B mothership, participated in the Drones for Aerodynamic and Structural Testing (DAST) program which ran from 1977 to 1983. The DAST 1 aircraft (Serial #72-1557), pictured, crashed on 12 June 1980 after its right wing ripped off during a test flight near Cuddeback Dry Lake, California. The crash occurred on the modified drone's third free flight. These are the image contact sheets for each image resolution of the NASA Dryden Drones for Aerodynamic and Structural Testing (DAST) Photo Gallery. From 1977 to 1983, the Dryden Flight Research Center, Edwards, California, (under two different names) conducted the DAST Program as a high-risk flight experiment using a ground-controlled, pilotless aircraft. Described by NASA engineers as a 'wind tunnel in the sky,' the DAST was a specially modified Teledyne-Ryan BQM-34E/F Firebee II supersonic target drone that was flown to validate theoretical predictions under actual flight conditions in a joint project with the Langley Research Center, Hampton, Virginia. The DAST Program merged advances in electronic remote control systems with advances in airplane design. Drones (remotely controlled, missile-like vehicles initially developed to serve as gunnery targets) had been deployed successfully during the Vietnamese conflict as reconnaissance aircraft. After the war, the energy crisis of the 1970s led NASA to seek new ways to cut fuel use and improve airplane efficiency. The DAST Program's drones provided an economical, fuel-conscious method for conducting in-flight experiments from a remote ground site. DAST explored the technology required to build wing structures with less than normal stiffness. This was done because stiffness requires structural weight but ensures freedom from flutter-an uncontrolled, divergent oscillation of
Pesavento, Umberto; Wang, Z Jane
Flapping flight is more maneuverable than steady flight. It is debated whether this advantage is necessarily accompanied by a trade-off in the flight efficiency. Here we ask if any flapping motion exists that is aerodynamically more efficient than the optimal steady motion. We solve the Navier-Stokes equation governing the fluid dynamics around a 2D flapping wing, and determine the minimal aerodynamic power needed to support a specified weight. While most flapping wing motions are more costly than the optimal steady wing motion, we find that optimized flapping wing motions can save up to 27% of the aerodynamic power required by the optimal steady flight. We explain the cause of this energetic advantage.
Sims, Brent A.
An End-To-End Simulation capability for software development and validation of missile flight software on the actual embedded computer has been developed utilizing a 486 PC, i860 DSP coprocessor, embedded flight computer and custom dual port memory interface hardware. This system allows real-time interrupt driven embedded flight software development and checkout. The flight software runs in a Sandia Digital Airborne Computer and reads and writes actual hardware sensor locations in which Inertial Measurement Unit data resides. The simulator provides six degree of freedom real-time dynamic simulation, accurate real-time discrete sensor data and acts on commands and discretes from the flight computer. This system was utilized in the development and validation of the successful premier flight of the Digital Miniature Attitude Reference System in January of 1995 at the White Sands Missile Range on a two stage attitude controlled sounding rocket.
Computer Security Team
Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy? In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...
The Perseus proof-of-concept vehicle flies over Rogers Dry Lake at the Dryden Flight Research Center, Edwards, California, to test basic design concepts for the remotely-piloted, high-altitude vehicle. Perseus B is a remotely piloted aircraft developed as a design-performance testbed under NASA's Environmental Research Aircraft and Sensor Technology (ERAST) project. Perseus is one of several flight vehicles involved in the ERAST project. A piston engine, propeller-powered aircraft, Perseus was designed and built by Aurora Flight Sciences Corporation, Manassas, Virginia. The objectives of Perseus B's ERAST flight tests have been to reach and maintain horizontal flight above altitudes of 60,000 feet and demonstrate the capability to fly missions lasting from 8 to 24 hours, depending on payload and altitude requirements. The Perseus B aircraft established an unofficial altitude record for a single-engine, propeller-driven, remotely piloted aircraft on June 27, 1998. It reached an altitude of 60,280 feet. In 1999, several modifications were made to the Perseus aircraft including engine, avionics, and flight-control-system improvements. These improvements were evaluated in a series of operational readiness and test missions at the Dryden Flight Research Center, Edwards, California. Perseus is a high-wing monoplane with a conventional tail design. Its narrow, straight, high-aspect-ratio wing is mounted atop the fuselage. The aircraft is pusher-designed with the propeller mounted in the rear. This design allows for interchangeable scientific-instrument payloads to be placed in the forward fuselage. The design also allows for unobstructed airflow to the sensors and other devices mounted in the payload compartment. The Perseus B that underwent test and development in 1999 was the third generation of the Perseus design, which began with the Perseus Proof-Of-Concept aircraft. Perseus was initially developed as part of NASA's Small High-Altitude Science Aircraft (SHASA
The school feeding system in China provides 180 to 200 days of meals a year to ... to their health and nutritional status, school attendance, and educational outcomes. ... IDRC congratulates first cohort of Women in Climate Change Science Fellows ... conference of McGill's Institute for the Study of International Development.
This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview
Full Text Available The article regards the structure of the notion "school structure". The traditionally singled out components of school climate — structure and culture — are amended by the notion of an "individual", which becomes central for the concept of school security and in fact takes a domineering position in estimation and correction of school climate. The article discusses the need in elaboration of a balanced model of a school climate, able to take into account three main constituents: structural, cultural and individual.
Cole, Jennifer H.; Cogan, Bruce R.; Fullerton, C. Gordon; Burken, John J.; Venti, Michael W.; Burcham, Frank W.
The Department of Homeland Security (DHS) created the PCAR (Propulsion-Controlled Aircraft Recovery) project in 2005 to mitigate the ManPADS (man-portable air defense systems) threat to the commercial aircraft fleet with near-term, low-cost proven technology. Such an attack could potentially cause a major FCS (flight control system) malfunction or other critical system failure onboard the aircraft, despite the extreme reliability of current systems. For the situations in which nominal flight controls are lost or degraded, engine thrust may be the only remaining means for emergency flight control [ref 1]. A computer-controlled thrust system, known as propulsion-controlled aircraft (PCA), was developed in the mid 1990s with NASA, McDonnell Douglas and Honeywell. PCA's major accomplishment was a demonstration of an automatic landing capability using only engine thrust [ref 11. Despite these promising results, no production aircraft have been equipped with a PCA system, due primarily to the modifications required for implementation. A minimally invasive option is TOC (throttles-only control), which uses the same control principles as PCA, but requires absolutely no hardware, software or other aircraft modifications. TOC is pure piloting technique, and has historically been utilized several times by flight crews, both military and civilian, in emergency situations stemming from a loss of conventional control. Since the 1990s, engineers at NASA Dryden Flight Research Center (DFRC) have studied TOC, in both simulation and flight, for emergency flight control with test pilots in numerous configurations. In general, it was shown that TOC was effective on certain aircraft for making a survivable landing. DHS sponsored both NASA Dryden Flight Research Center (Edwards, CA) and United Airlines (Denver, Colorado) to conduct a flight and simulation study of the TOC characteristics of a twin-jet commercial transport, and assess the ability of a crew to control an aircraft down to
Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema
This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...
Miller, J. E.; Berger, E. L.; Bohl, W. E.; Christiansen, E. L.; Davis, B. A.; Deighton, K. D.; Enriquez, P. A.; Garcia, M. A.; Hyde, J. L.; Oliveras, O. M.
The principal mechanism for developing orbital debris environment models, is to make observations of larger pieces of debris in the range of several centimeters and greater using radar and optical techniques. For particles that are smaller than this threshold, breakup and migration models of particles to returned surfaces in lower orbit are relied upon to quantify the flux. This reliance on models to derive spatial densities of particles that are of critical importance to spacecraft make the unique nature of the EFT-1's return surface a valuable metric. To this end detailed post-flight inspections have been performed of the returned EFT-1 backshell, and the inspections identified six candidate impact sites that were not present during the pre-flight inspections. This paper describes the post-flight analysis efforts to characterize the EFT-1 mission craters. This effort included ground based testing to understand small particle impact craters in the thermal protection material, the pre- and post-flight inspection, the crater analysis using optical, X-ray computed tomography (CT) and scanning electron microscope (SEM) techniques, and numerical simulations.
Beja, Edsel Jr.
Capital flight aggravates resource constraints and contributes to undermine long-term economic growth. Counterfactual calculations on the Philippines suggest that capital flight contributed to lower the quality of long-term economic growth. Sustained capital flight over three decades means that capital flight had a role for the Philippines to lose the opportunities to achieve economic takeoff. Unless decisive policy actions are taken up to address enduring capital flight and manage the macroe...
Claessens, Stijn; Naude, David
Researchers and policymakers have in recent years paid considerable attention to the phenomenon of capital flight. Researchers have focused on four questions: What concept should be used to measure capital flight? What figure for capital flight will emerge, using this measure? Can the occurrence and magnitude of capital flight be explained by certain (economic) variables? What policy changes can be useful to reverse capital flight? The authors focus strictly on presenting estimates of capital...
Hokeness, Mark Merrill
Aviation researchers estimate airline companies will require nearly 500,000 pilots in the next 20 years. The role of a Certified Flight Instructor (CFI) is to move student pilots to professional pilots with training typically conducted in one-on-one student and instructor sessions. The knowledge of aviation, professionalism as a teacher, and the CFI’s interpersonal skills can directly affect the successes and advancement of a student pilot. A new and emerging assessment of people skills is known as emotional intelligence (EI). The EI of the CFI can and will affect a flight students’ learning experiences. With knowledge of emotional intelligence and its effect on flight training, student pilot dropouts from aviation may be reduced, thus helping to ensure an adequate supply of pilots. Without pilots, the growth of the commercial aviation industry will be restricted. This mixed method research study established the correlation between a CFI’s measured EI levels and the advancement of flight students. The elements contributing to a CFI’s EI level were not found to be teaching or flight-related experiences, suggesting other life factors are drawn upon by the CFI and are reflected in their emotional intelligence levels presented to flight students. Students respond positively to CFIs with higher levels of emotional intelligence. Awareness of EI skills by both the CFI and flight student contribute to flight student successes and advancement.
Horst, D.J. van der; Beenakkers, A.M.Th.; Marrewijk, W.J.A. van
The flight of an insect is of a very complicated and extremely energy-demanding nature. Wingbeat frequency may differ between various species but values up to 1000 Hz have been measured. Consequently metabolic activity may be very high during flight and the transition from rest to flight is
... purpose flight engineer and flight navigator certificates: Operation of U.S.-registered civil airplanes... flight engineer or flight navigator duties on a civil airplane of U.S. registry, leased to a person not a... certificate holder is performing flight engineer or flight navigator duties on the U.S.-registered civil...
Maya Padmi, Made Fitri
Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...
Haas, de M.
This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and
... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Fire protection of flight controls, engine... controls, engine mounts, and other flight structure. Flight controls, engine mounts, and other flight... they are capable of withstanding the effects of a fire. Engine vibration isolators must incorporate...
Frimpong Twum; Kwaku Ahenkora
Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...
Jelena Jardas Antonic
Full Text Available Abstract - In the cooperation with the City of Rijeka, the project of analysis of the functional and security situation of information infrastructure has been initiated in 24 schools in the authority of the city. Having completed the multicriteria analysis of the collected data, we have built a model of implementing Microsoft service technologies. The implementation should satisfy the elementary security principles that are required by the security standards today, maximizing functionality of infrastructure and minimizing network administration tasks. Server technology that has been used in this solution is Microsoft Widows 2003 Server R2 and Internet Security and Acceleration Server 2006, as well as the GFI WebMonitor and antivirus.
George, Paul S.
Over the past 30 years, Florida's 500 middle schools have become more sizeable, racially segregated, and security conscious. Other features include interdisciplinary team organization, warring curricula, block schedules, integrated technology, inclusion, ability grouping, corporate practices, and female and minority principals committed to…
Phatak, A. V.; Lee, M. G.
The navigation and flight director guidance systems implemented in the NASA/FAA helicopter microwave landing system (MLS) curved approach flight test program is described. Flight test were conducted at the U.S. Navy's Crows Landing facility, using the NASA Ames UH-lH helicopter equipped with the V/STOLAND avionics system. The purpose of these tests was to investigate the feasibility of flying complex, curved and descending approaches to a landing using MLS flight director guidance. A description of the navigation aids used, the avionics system, cockpit instrumentation and on-board navigation equipment used for the flight test is provided. Three generic reference flight paths were developed and flown during the test. They were as follows: U-Turn, S-turn and Straight-In flight profiles. These profiles and their geometries are described in detail. A 3-cue flight director was implemented on the helicopter. A description of the formulation and implementation of the flight director laws is also presented. Performance data and analysis is presented for one pilot conducting the flight director approaches.
Smith, C. W.; Broad, L.; Goelzer, S.; Levergood, R.; Lugaz, N.; Moebius, E.
Every summer for the past 26 years the University of New Hampshire (UNH) has run a month-long, residential outreach program for high school students considering careers in mathematics, science, or engineering. Space science is one of the modules. Students work directly with UNH faculty performing original work with real spacecraft data and hardware and present the results of that effort at the end of the program. This year the student research projects used data from the Messenger, STEREO, and Triana missions. In addition, the students build and fly a high-altitude balloon payload with instruments of their own construction. Students learn circuit design and construction, microcontroller programming, and core atmospheric and space science along with fundamental concepts in space physics and engineering. Our payload design has evolved significantly since the first flight of a simple rectangular box and now involves a stable descent vehicle that does not require a parachute. Our flight hardware includes an on-board flight control computer, in-flight autonomous control and data acquisition of multiple student-built instruments, and real-time camera images sent to ground. This year we developed, built and flew a successful line cutter based on GPS location information that prevents our payload from falling into the ocean while also separating the payload from the balloon remains for a cleaner descent. We will describe that new line cutter design and implementation along with the shielded Geiger counters that we flew as part of our cosmic ray air shower experiment. This is a program that can be used as a model for other schools to follow and that high schools can initiate. More information can be found at .
Levkovsky, Anna; Abot-Barkan, Sivan; Chapnik, Leah; Doron, Omer; Levy, Yuval; Heled, Yuval; Gordon, Barak
A loss of 1% or more of bodyweight due to dehydration has a negative effect on cognitive performance, which could critically affect flight safety. There is no mention in the literature concerning the amounts of military pilots' fluid loss during flight. The aim of this study was to quantify fluid loss of pilots during military flight. There were 48 aviators (mean age 23.9) from the Israeli Air Force who participated in the study, which included 104 training flights in various flight platforms. Bodyweight, urine specific gravity, and environmental heat strain were measured before and after each flight. Fluid loss was calculated as the weight differences before and after the flight. We used a univariate and one-way ANOVA to analyze the effect of different variables on the fluid loss. The mean fluid loss rate was 462 ml · h-1. The results varied among different aircraft platforms and depended on flight duration. Blackhawk pilots lost the highest amount of fluids per flight, albeit had longer flights (mean 108 min compared to 35.5 in fighter jets). Jet fighter pilots had the highest rate of fluid loss per hour of flight (up to 692 ml, extrapolated). Overall, at 11 flights (11%) aircrew completed their flight with a meaningful fluid loss. We conclude that military flights may be associated with significant amount of fluid loss among aircrew.Levkovsky A, Abot-Barkan S, Chapnik L, Doron O, Levy Y, Heled Y, Gordon B. Aviator's fluid balance during military flight. Aerosp Med Hum Perform. 2018; 89(2):9498.
During airport security check of passenger luggage, hazardous items and substances are prohibited to be taken into the restricted safety zone of the airport and the aircraft. Among equipment of the medical staff escorting the patient, there are several devices and materials which are considered hazardous for security reasons. However, medical equipment and substances are indispensable for treating patients during the flight. The aim of the author was to present his experience obtained with the use of an instrument developed for testing liquids, aerosols and gels for security reasons. An instrument based on Raman spectroscopy was used for the identification of medical substances. The results confirmed that the instrument was able to recognize the tested medical substances. The non-destructive testing maintained sample integrity and asepsis. The data indicate that the instrument has a promising utility for the identification of medical substances. It seems important that during repatriation medical substances should be selected not only on the ground of their medical necessity, but their packaging should be also taken into consideration. It is necessary to perform more tests on different medical substances used in emergency care in order to make the database of medical substances stored in the library of instrument more complete.
Farmer, N. B.
Development flight instrumentation was delivered for 25 Apollo vehicles as Government-furnished equipment. The problems and philosophies of an activity that was concerned with supplying telemetry equipment to a space-flight test program are discussed. Equipment delivery dates, system-design details, and flight-performance information for each mission also are included.
towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer
Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.
NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.
De Boever, P.
The main goal of manned exploration is to achieve a prolonged stay in space, for example in an orbital station (such as the International Space Station (ISS)) or in planetary bases on the Moon and/or Mars. It goes without saying that such missions can only be realized when the astronaut's health and well-being is secured. In this respect, the characterization of the microbiological contamination on board spacecraft and orbital stations and the influence of cosmic radiation and microgravity are of paramount importance. Microbial contamination may originate from different sources and includes the initial contamination of space flight materials during manufacturing and assembly, the delivery of supplies to the orbital station, the supplies themselves, secondary contamination during the lifetime of the orbital station, the crew and any other biological material on board e.g. animals, plants, micro-organisms used in scientific experiments. Although most microorganisms do not threaten human health, it has been reported that in a confined environment, such as a space cabin, microorganisms may produce adverse effects on the optimal performance of the space crew and the integrity of the spacecraft or habitat. These effects range from infections, allergies, and toxicities to degradation of air and water supplies. Biodegradation of critical materials may result in system failure and this may jeopardize the crew. The research aims at monitoring the biological airborne and surface contamination during manned space flight. The ISS has been selected as primary test bed for this study. The majority of the investigations are being done by the Russian Institute of Biomedical Problems (IBMP), which is responsible for monitoring the biological contamination in the habitable compartments of the ISS for safety and hygienic reasons. Within the frame of a collaboration between IBMP and the European Space Agency (ESA), SCK-CEN is able to participate in the analyses
Goffin, Kathryn C; Boldt, Lea J; Kochanska, Grazyna
Early secure attachment plays a key role in socialization by inaugurating a long-term mutual positive, collaborative interpersonal orientation within the parent-child dyad. We report findings from Family Study (community mothers, fathers, and children, from age 2 to 12, N = 102, 51 girls) and Play Study (exclusively low-income mothers and children, from age 3.5 to 7, N = 186, 90 girls). We examined links among observed secure attachment at toddler age, child and parent receptive, willing stance to each other, observed in parent-child contexts at early school age, and developmental outcomes. The developmental outcomes included parent-rated child antisocial behavior problems and observed positive mutuality with regard to conflict issues at age 12 in Family Study, and mother-rated child antisocial behavior problems and observed child regard for rules and moral self at age 7 in Play Study. In mother-child relationships, the child's willing stance mediated indirect effects of child security on positive mutuality in Family Study and on all outcomes in Play Study. In father-child relationships, both the child's and the parent's willing stance mediated indirect effects of child security on both outcomes. Early security initiates an adaptive developmental cascade by enlisting the child and the parent as active, willingly receptive and cooperative agents in the socialization process. Implications for children's parenting interventions are noted.
O'Keefe, Stephen A.; Bose, David M.
NASA s Inflatable Re-entry Vehicle Experiment (IRVE) II successfully demonstrated an inflatable aerodynamic decelerator after being launched aboard a sounding rocket from Wallops Flight Facility (WFF). Preliminary day of flight data compared well with pre-flight Monte Carlo analysis, and a more complete trajectory reconstruction performed with an Extended Kalman Filter (EKF) approach followed. The reconstructed trajectory and comparisons to an attitude solution provided by NASA Sounding Rocket Operations Contract (NSROC) personnel at WFF are presented. Additional comparisons are made between the reconstructed trajectory and pre and post-flight Monte Carlo trajectory predictions. Alternative observations of the trajectory are summarized which leverage flight accelerometer measurements, the pre-flight aerodynamic database, and on-board flight video. Finally, analysis of the payload separation and aeroshell deployment events are presented. The flight trajectory is reconstructed to fidelity sufficient to assess overall project objectives related to flight dynamics and overall, IRVE-II flight dynamics are in line with expectations
Full Text Available Abstract Background Food insecurity not only affects physical growth and health of children but also their intellectual development, school attendance and academic performance. However, most evidences are based on studies in high income countries. Although food insecurity is common in Ethiopia, to what extent it affects school attendance and educational attainment of adolescents is not explored. We hypothesized that food insecure adolescents would be more likely to be absent from school and have lower grades attained after 1 year compared to their food secure peers. Methods We used data from 2009 adolescents in the age group of 13-17 years from two consecutive surveys of a five year longitudinal family study in Southwest Ethiopia. A stratified random sampling was used to select participants. Regression analyses were used to compare school absenteeism and the highest grade attained after 1 year of follow-up in food secure and insecure adolescents. The analysis was adjusted for demographic factors, reported illness and workload. Results Significantly more (33.0% food insecure adolescents were absent from school compared with their food secure peers (17.8%, P Conclusions Adolescent and household food insecurity are positively associated with school absenteeism and a lower educational attainment. Programs aiming to achieve universal access to primary education in food insecure environments should integrate interventions to ensure food security of adolescents.
Bødker, Susanne; Mathiasen, Niels Raabjerg
While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's  experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...
IFR ) IFR Instrument Flight Rules LED Light Emitting Diode LEP Laser Eye Protection MAPP Model Assessing Pilot Performance OD Optical Density...LEP and then use them to assess the impact of wearing LEP in a flight simulator environment. 2 Pending Distribution, A: Approved for public...2005). LEP has the potential to alter distinct characteristics of the visual environment, giving rise to concerns over the impact on flight tasks and
Purpura, Philip P
Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur
Ni Mhurchu, Cliona; Turley, Maria; Gorton, Delvina; Jiang, Yannan; Michie, Jo; Maddison, Ralph; Hattie, John
Approximately 55,000 children in New Zealand do not eat breakfast on any given day. Regular breakfast skipping has been associated with poor diets, higher body mass index, and adverse effects on children's behaviour and academic performance. Research suggests that regular breakfast consumption can improve academic performance, nutrition and behaviour. This paper describes the protocol for a stepped wedge cluster randomised trial of a free school breakfast programme. The aim of the trial is to determine the effects of the breakfast intervention on school attendance, achievement, psychosocial function, dietary habits and food security. Sixteen primary schools in the North Island of New Zealand will be randomised in a sequential stepped wedge design to a free before-school breakfast programme consisting of non-sugar coated breakfast cereal, milk products, and/or toast and spreads. Four hundred children aged 5-13 years (approximately 25 per school) will be recruited. Data collection will be undertaken once each school term over the 2010 school year (February to December). The primary trial outcome is school attendance, defined as the proportion of students achieving an attendance rate of 95% or higher. Secondary outcomes are academic achievement (literacy, numeracy, self-reported grades), sense of belonging at school, psychosocial function, dietary habits, and food security. A concurrent process evaluation seeks information on parents', schools' and providers' perspectives of the breakfast programme. This randomised controlled trial will provide robust evidence of the effects of a school breakfast programme on students' attendance, achievement and nutrition. Furthermore the study provides an excellent example of the feasibility and value of the stepped wedge trial design in evaluating pragmatic public health intervention programmes. Australian New Zealand Clinical Trials Registry (ANZCTR) - ACTRN12609000854235.
National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...
Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...
Most school districts do not have an ID card policy that everyone knows and follows, yet. many school districts are implementing ID card programs to address concerns about safety, efficiency, and convenience. A well-thought-out ID card program leads to greater security and smoother operations throughout the school and should thus be a priority.…
Nguyen THI THUY HANG
Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.
National Association for the Education of Homeless Children and Youth, 2010
Attending school and securing lawful status in the United States are two keys to safety and security for undocumented unaccompanied homeless youth. This brief is designed to provide young people, immigration attorneys and advocates, McKinney-Vento liaisons and educators with basic information to help them access these keys. After describing some…
National Aeronautics and Space Administration — The IceBridge Mission Flight Reports data set contains flight reports from NASA Operation IceBridge Greenland, Arctic, Antarctic, and Alaska missions. Flight reports...
Dean, Mark D.
An era of high stakes accountability has expanded the necessity for school districts to secure principals with leadership behaviors that encourage successful academic performance. School leaders are sought to deliver practices that guide and empower entire school communities through unprecedented times of educational change. Research studies…
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. RUSSIA’S SECURITY... RELATIONS WITH FINLAND, NORWAY, AND SWEDEN by Rory J. Hayden September 2017 Thesis Advisor: Mikhail Tsypkin Co-Advisor: David S. Yost...THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of
Sunday S. AKPAN
Full Text Available This paper examined safety and security risk management in tertiary institutions in Nigeria. The frequent attacks at workplace, especially schools, have placed safety and security in the front burner of discussion in both business and political circles. This therefore, forms the imperative for the conduct of this study. The work adopted a cross sectional survey research design and collected data from respondents who are security personnel of the University of Uyo. Analysis of data was done with simple percentage statistics while the research hypotheses were tested with mean and simple regression and correlation statistics. The findings of the study revealed that assassination, kidnappings and bombings were principal risk incidents threatening the safety and security of staff in University of Uyo. A significant positive relationship was found between the funding of security management and workers’ performance. It was discovered specifically that employment screening, regular training of security personnel, regular safety and security meetings and strategic security policy formation were the main strategies for managing safety and security in University of Uyo. The paper concluded that safety and security management and control involves every worker (management and staff of University of Uyo. It was recommended, among others, that management should be more committed to safety and security management in the University by means of making safety and security issues an integral part of University’s strategic plan and also by adopting the management line model – one form of management structure-where safety and security are located, with other general management responsibilities. This way, the resurgent cases of kidnapping, hired assassination, etc. would be reduced if not completely eradicated in the University.
This report presents New Hampshire survey data, methodology, and the survey instrument used to measure a school's physical quality and educational effectiveness. The survey instrument collects data in the following categories: school site; building; building systems; building maintenance; building safety and security; space adequacy; and building…
Jan, Shau Shiun; Lin, Yu Hsiang
This paper focuses on the design of an integrated navigation and guidance system for unmanned helicopters. The integrated navigation system comprises two systems: the Flight Path Planning System (FPPS) and the Flight Control System (FCS). The FPPS finds the shortest flight path by the A-Star (A*) algorithm in an adaptive manner for different flight conditions, and the FPPS can add a forbidden zone to stop the unmanned helicopter from crossing over into dangerous areas. In this paper, the FPPS computation time is reduced by the multi-resolution scheme, and the flight path quality is improved by the path smoothing methods. Meanwhile, the FCS includes the fuzzy inference systems (FISs) based on the fuzzy logic. By using expert knowledge and experience to train the FIS, the controller can operate the unmanned helicopter without dynamic models. The integrated system of the FPPS and the FCS is aimed at providing navigation and guidance to the mission destination and it is implemented by coupling the flight simulation software, X-Plane, and the computing software, MATLAB. Simulations are performed and shown in real time three-dimensional animations. Finally, the integrated system is demonstrated to work successfully in controlling the unmanned helicopter to operate in various terrains of a digital elevation model (DEM).
Jan, Shau Shiun; Lin, Yu Hsiang
This paper focuses on the design of an integrated navigation and guidance system for unmanned helicopters. The integrated navigation system comprises two systems: the Flight Path Planning System (FPPS) and the Flight Control System (FCS). The FPPS finds the shortest flight path by the A-Star (A*) algorithm in an adaptive manner for different flight conditions, and the FPPS can add a forbidden zone to stop the unmanned helicopter from crossing over into dangerous areas. In this paper, the FPPS computation time is reduced by the multi-resolution scheme, and the flight path quality is improved by the path smoothing methods. Meanwhile, the FCS includes the fuzzy inference systems (FISs) based on the fuzzy logic. By using expert knowledge and experience to train the FIS, the controller can operate the unmanned helicopter without dynamic models. The integrated system of the FPPS and the FCS is aimed at providing navigation and guidance to the mission destination and it is implemented by coupling the flight simulation software, X-Plane, and the computing software, MATLAB. Simulations are performed and shown in real time three-dimensional animations. Finally, the integrated system is demonstrated to work successfully in controlling the unmanned helicopter to operate in various terrains of a digital elevation model (DEM). PMID:22164029
This 25-second clip shows the QF-106 'Delta Dart' tethered to the USAF C-141A during takeoff and in flight. NASA Dryden Flight Research Center, Edwards, California, supported a Kelly Space and Technology, Inc. (KST)/U.S. Air Force project known as Eclipse, which demonstrated a reusable tow launch vehicle concept. The purpose of the project was to demonstrate a reusable tow launch vehicle concept that had been conceived and patented by KST. Kelly Space obtained a contract with the USAF Research Laboratory for the tow launch demonstration project under the Small Business Innovation Research (SBIR) program. The USAF SBIR contract included the modifications to turn the QF-106 into the Experimental Demonstrator #1 (EXD-01), and the C141A aircraft to incorporate the tow provisions to link the two aircraft, as well as conducting flight tests. The demonstration consisted of ground and flight tests. These tests included a Combined Systems Test of both airplanes joined by a tow rope, a towed taxi test, and six towed flights. The primary goal of the project was demonstrating the tow phase of the Eclipse concept using a scaled-down tow aircraft (C-141A) and a representative aerodynamically-shaped aircraft (QF-106A) as a launch vehicle. This was successfully accomplished. On December 20, 1997, NASA research pilot Mark Stucky flew a QF-106 on the first towed flight behind an Air Force C-141 in the joint Eclipse project with KST to demonstrate the reusable tow launch vehicle concept developed by KST. Kelly hoped to use the data from the tow tests to validate a tow-to-launch procedure for reusable space launch vehicles. Stucky flew six successful tow tests between December 1997 and February 6, 1998. On February 6, 1998, the sixth and final towed flight brought the project to a successful completion. Preliminary flight results determined that the handling qualities of the QF-106 on tow were very stable; actual flight measured values of tow rope tension were well within predictions
Sims, John T.; Sterling, Michael R.
Space shuttle astronaut training is centered at NASA's Johnson Space Center in Houston, Texas. Each astronaut receives many different types of training from many sources. This training includes simulator training in the Shuttle Mission Simulator, in-flight simulator training in the Shuttle Training Aircraft, Extravehicular Activity training in the Weightless Environment Training Facility and a variety of lectures and briefings. Once the training program is completed each shuttle flight crew is well-prepared to perform the normal operations required for their flight and deal with any shuttle system malfunctions that might occur.
When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...
Su Hyung Jo; Ki Young Kim; Sang Ho Lee
Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...
Windham, R. Craig; Hooper, Lisa M.; Hudson, Patricia E.
The mass-casualty school shooting incidents in recent years have heightened concern about the safety of U.S. schools and prompted responses that, in many cases, have centered mainly on bolstering security on school campuses. Some researchers have concluded, however, that the most effective prevention efforts are those that are more comprehensive…
This research thoroughly examines the current Naval Postgraduate School Gigabit Network security posture, identifies any possible threats or vulnerabilities, and recommends any appropriate safeguards...
Brotby, W Krag
Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to
Hueschen, R. M.
Five flight tests of the Digital Automated Landing System (DIALS) were conducted on the Advanced Transport Operating Systems (ATOPS) Transportation Research Vehicle (TSRV) -- a modified Boeing 737 aircraft for advanced controls and displays research. These flight tests were conducted at NASA's Wallops Flight Center using the microwave landing system (MLS) installation on runway 22. This report describes the flight software equations of the DIALS which was designed using modern control theory direct-digital design methods and employed a constant gain Kalman filter. Selected flight test performance data is presented for localizer (runway centerline) capture and track at various intercept angles, for glideslope capture and track of 3, 4.5, and 5 degree glideslopes, for the decrab maneuver, and for the flare maneuver. Data is also presented to illustrate the system performance in the presence of cross, gust, and shear winds. The mean and standard deviation of the peak position errors for localizer capture were, respectively, 24 feet and 26 feet. For mild wind conditions, glideslope and localizer tracking position errors did not exceed, respectively, 5 and 20 feet. For gusty wind conditions (8 to 10 knots), these errors were, respectively, 10 and 30 feet. Ten hands off automatic lands were performed. The standard deviation of the touchdown position and velocity errors from the mean values were, respectively, 244 feet and 0.7 feet/sec.
The Theseus prototype research aircraft shows off its high aspect-ratio wing as it comes in for a landing on Rogers Dry Lake after its first test flight from NASA's Dryden Flight Research Center, Edwards, California, on May 24, 1996. The Theseus aircraft, built and operated by Aurora Flight Sciences Corporation, Manassas, Virginia, was a unique aircraft flown at NASA's Dryden Flight Research Center, Edwards, California, under a cooperative agreement between NASA and Aurora. Dryden hosted the Theseus program, providing hangar space and range safety for flight testing. Aurora Flight Sciences was responsible for the actual flight testing, vehicle flight safety, and operation of the aircraft. The Theseus remotely piloted aircraft flew its maiden flight on May 24, 1996, at Dryden. During its sixth flight on November 12, 1996, Theseus experienced an in-flight structural failure that resulted in the loss of the aircraft. As of the beginning of the year 2000, Aurora had not rebuilt the aircraft. Theseus was built for NASA under an innovative, $4.9 million fixed-price contract by Aurora Flight Sciences Corporation and its partners, West Virginia University, Morgantown, West Virginia, and Fairmont State College, Fairmont, West Virginia. The twin-engine, unpiloted vehicle had a 140-foot wingspan, and was constructed largely of composite materials. Powered by two 80-horsepower, turbocharged piston engines that drove twin 9-foot-diameter propellers, Theseus was designed to fly autonomously at high altitudes, with takeoff and landing under the active control of a ground-based pilot in a ground control station 'cockpit.' With the potential ability to carry 700 pounds of science instruments to altitudes above 60,000 feet for durations of greater than 24 hours, Theseus was intended to support research in areas such as stratospheric ozone depletion and the atmospheric effects of future high-speed civil transport aircraft engines. Instruments carried aboard Theseus also would be able
discipline conditions, sabbaticals for research and study are expected to improve ... needs such as money, status, and security are work context factors that affect teachers' ... give tecahers the satisfaction to committing themselves to school.
Great efforts have been dedicated during the last decades to the research and development of hypersonic aircrafts that can fly at several times the speed of sound. These aerospace vehicles have revolutionary applications in national security as advanced hypersonic weapons, in space exploration as reusable stages for access to low Earth orbit, and in commercial aviation as fast long-range methods for air transportation of passengers around the globe. This review addresses the topic of supersonic combustion, which represents the central physical process that enables scramjet hypersonic propulsion systems to accelerate aircrafts to ultra-high speeds. The description focuses on recent experimental flights and ground-based research programs and highlights associated fundamental flow physics, subgrid-scale model development, and full-system numerical simulations.
Full Text Available The aim of this study was to analyze the importance of changing the conventional food system to achieve food and nutritional security, as well as rural development. This text was divided into three sections. In the first one, the conventional food system and its consequences were characterized, showing the need for a change that seeks the integration of social, environmental, and health dimensions. The second part addressed the interventions related to the food supply system made by the Government, which are fundamental to achieve food and nutrition security, as well as to promote development processes in rural areas. Finally, the experience of Brazil’s National School Feeding Programme was presented. That program links food produced by small producers with the National School Feeding Program, allowing the reconnection of production and consumers through institutional markets. That link created incentives for food and nutrition security of small farmers and, at the same time, improved the availability of higher- quality food for vulnerable populations and promotedeating patterns that allow the preservation of food culture.
Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles
systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...
Media, Integrated Marketing Communications at Northwestern University, http://oilchangeproject.nationalsecurityzone.org/choke-points/chokepoints-map-2...23 Source: The National Security Reporting Project, Medill School of Journalism, Media, Integrated Marketing Communications at Northwestern
The most efficient Levy flight (scale-free) searching strategy for N independent searchers to adopt when target sites are randomly and sparsely distributed is identified. For N=1, it is well known that the optimal searching strategy is attained when μ=2, where the exponent μ characterizes the Levy distribution, P(l)=l -μ , of flight-lengths. For N>1, the optimal searching strategy is attained as μ->1. It is suggested that the orientation flights of honeybees can be understood within the context of such an optimal cooperative random Levy flight searching strategy. Upon returning to their hive after surveying a landscape honeybees can exchange information about the locations of target sites through the waggle dance. In accordance with observations it is predicted that the waggle dance can be disrupted without noticeable influence on a hive's ability to maintain weight when forage is plentiful
Full Text Available In recent years, schools (as well as universities have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8 and security (derived from CERT Secure Coding Standards. We use a multi-view, data-driven approach, by (a using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751. Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels. The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed.
Mullen, Timothy "Thor"
Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications
Howard, Doug; Schneier, Bruce
Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine
Clark, Elizabeth; Compton, Linda; Westendorf, Georgene; Buswell, Sue; Chau, Elizabeth
It is the position of the National Association of School Nurses (NASN) that the registered professional school nurse (hereinafter referred to as school nurse) is an essential advocate for the health and well-being of all students. Promoting a safe and secure environment is vital to the educational success and emotional development of children. The…
The unusual lines of the X-36 Tailless Fighter Agility Research Aircraft contrast sharply with the desert floor as the remotely-piloted aircraft flies over the Mojave Desert on a June 1997 research flight. The NASA/Boeing X-36 Tailless Fighter Agility Research Aircraft program successfully demonstrated the tailless fighter design using advanced technologies to improve the maneuverability and survivability of possible future fighter aircraft. The program met or exceeded all project goals. For 31 flights during 1997 at the Dryden Flight Research Center, Edwards, California, the project team examined the aircraft's agility at low speed / high angles of attack and at high speed / low angles of attack. The aircraft's speed envelope reached up to 206 knots (234 mph). This aircraft was very stable and maneuverable. It handled very well. The X-36 vehicle was designed to fly without the traditional tail surfaces common on most aircraft. Instead, a canard forward of the wing was used as well as split ailerons and an advanced thrust-vectoring nozzle for directional control. The X-36 was unstable in both pitch and yaw axes, so an advanced, single-channel digital fly-by-wire control system (developed with some commercially available components) was put in place to stabilize the aircraft. Using a video camera mounted in the nose of the aircraft and an onboard microphone, the X-36 was remotely controlled by a pilot in a ground station virtual cockpit. A standard fighter-type head-up display (HUD) and a moving-map representation of the vehicle's position within the range in which it flew provided excellent situational awareness for the pilot. This pilot-in-the-loop approach eliminated the need for expensive and complex autonomous flight control systems and the risks associated with their inability to deal with unknown or unforeseen phenomena in flight. Fully fueled the X-36 prototype weighed approximately 1,250 pounds. It was 19 feet long and three feet high with a wingspan of
Smith, C. W.; Broad, L.; Goelzer, S.; Lessard, M.; Levergood, R.; Lugaz, N.; Moebius, E.; Schwadron, N.; Torbert, R. B.; Zhang, J.; Bloser, P. F.
Every summer for the past 25 years the University of New Hampshire (UNH) has run a month-long, residential outreach program for high school students considering careers in mathematics, science, or engineering. Space science is one of the modules. Students work directly with UNH faculty performing original work with real spacecraft data and hardware and present the results of that effort at the end of the program. Recent research topics have included interplanetary waves and turbulence as recorded by the ACE and Voyager spacecraft, electromagnetic ion cyclotron (EMIC) waves seen by the RBSP spacecraft, interplanetary coronal mass ejections (ICME) acceleration and interstellar pickup ions as seen by the STEREO spacecraft, and prototyping CubeSat hardware. Student research efforts can provide useful results for future research efforts by the faculty while the students gain unique exposure to space physics and a science career. In addition, the students complete a team project. Since 2006, that project has been the construction and flight of a high-altitude balloon payload and instruments. The students typically build the instruments they fly. In the process, students learn circuit design and construction, microcontroller programming, and core atmospheric and space science. Our payload design has evolved significantly since the first flight of a simple rectangular box and now involves a stable descent vehicle that does not require a parachute, an on-board flight control computer, in-flight autonomous control and data acquisition of multiple student-built instruments, and real-time camera images sent to ground. This is a program that can be used as a model for other schools to follow and that high schools can initiate. More information can be found at .
Leadership and how it is developed have become a top priority for almost all organisations, particularly schools and business organisations, to survive and secure growth (Bolden, 2004). Equally, the concept of partnership has become a panacea for solving complex and ‘wicked’ problems in diverse organisations (Armistead, 2007). This study therefore investigates how school-business partnerships could serve as alternative means for organisational leadership development. The study is principally ...
Gander, Philippa H; Signal, T Leigh; van den Berg, Margo J; Mulrine, Hannah M; Jay, Sarah M; Jim Mangie, Captain
This study evaluated whether pilot fatigue was greater on ultra-long range (ULR) trips (flights >16 h on 10% of trips in a 90-day period) than on long range (LR) trips. The within-subjects design controlled for crew complement, pattern of in-flight breaks, flight direction and departure time. Thirty male Captains (mean age = 54.5 years) and 40 male First officers (mean age = 48.0 years) were monitored on commercial passenger flights (Boeing 777 aircraft). Sleep was monitored (actigraphy, duty/sleep diaries) from 3 days before the first study trip to 3 days after the second study trip. Karolinska Sleepiness Scale, Samn-Perelli fatigue ratings and a 5-min Psychomotor Vigilance Task were completed before, during and after every flight. Total sleep in the 24 h before outbound flights and before inbound flights after 2-day layovers was comparable for ULR and LR flights. All pilots slept on all flights. For each additional hour of flight time, they obtained an estimated additional 12.3 min of sleep. Estimated mean total sleep was longer on ULR flights (3 h 53 min) than LR flights (3 h 15 min; P(F) = 0.0004). Sleepiness ratings were lower and mean reaction speed was faster at the end of ULR flights. Findings suggest that additional in-flight sleep mitigated fatigue effectively on longer flights. Further research is needed to clarify the contributions to fatigue of in-flight sleep versus time awake at top of descent. The study design was limited to eastward outbound flights with two Captains and two First Officers. Caution must be exercised when extrapolating to different operations. © 2013 European Sleep Research Society.
What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...
Miller, Joshua E.
Orbital debris in the millimeter size range can pose a hazard to current and planned spacecraft due to the high relative impact speeds in Earth orbit. Fortunately, orbital debris has a relatively short life at lower altitudes due to atmospheric effects; however, at higher altitudes orbital debris can survive much longer and has resulted in a band of high flux around 700 to 1,500 km above the surface of the Earth. While large orbital debris objects are tracked via ground based observation, little information can be gathered about small particles except by returned surfaces, which until the Orion Exploration Flight Test number one (EFT-1), has only been possible for lower altitudes (400 to 500 km). The EFT-1 crew module backshell, which used a porous, ceramic tile system with surface coatings, has been inspected post-flight for potential micrometeoroid and orbital debris (MMOD) damage. This paper describes the pre- and post-flight activities of inspection, identification and analysis of six candidate MMOD impact craters from the EFT-1 mission.
Full Text Available Abstract Background Approximately 55,000 children in New Zealand do not eat breakfast on any given day. Regular breakfast skipping has been associated with poor diets, higher body mass index, and adverse effects on children's behaviour and academic performance. Research suggests that regular breakfast consumption can improve academic performance, nutrition and behaviour. This paper describes the protocol for a stepped wedge cluster randomised trial of a free school breakfast programme. The aim of the trial is to determine the effects of the breakfast intervention on school attendance, achievement, psychosocial function, dietary habits and food security. Methods/Design Sixteen primary schools in the North Island of New Zealand will be randomised in a sequential stepped wedge design to a free before-school breakfast programme consisting of non-sugar coated breakfast cereal, milk products, and/or toast and spreads. Four hundred children aged 5-13 years (approximately 25 per school will be recruited. Data collection will be undertaken once each school term over the 2010 school year (February to December. The primary trial outcome is school attendance, defined as the proportion of students achieving an attendance rate of 95% or higher. Secondary outcomes are academic achievement (literacy, numeracy, self-reported grades, sense of belonging at school, psychosocial function, dietary habits, and food security. A concurrent process evaluation seeks information on parents', schools' and providers' perspectives of the breakfast programme. Discussion This randomised controlled trial will provide robust evidence of the effects of a school breakfast programme on students' attendance, achievement and nutrition. Furthermore the study provides an excellent example of the feasibility and value of the stepped wedge trial design in evaluating pragmatic public health intervention programmes. Trial Registration Number Australian New Zealand Clinical Trials Registry
Federal Laboratory Consortium — The Aircraft Simulation Division, home to the Manned Flight Simulator (MFS), provides real-time, high fidelity, hardware-in-the-loop flight simulation capabilities...
Miller, Dean; Ratvasky, Thomas; Bernstein, Ben; McDonough, Frank; Strapp, J. Walter
During the winter of 1996-1997, a flight research program was conducted at the NASA-Lewis Research Center to study the characteristics of Supercooled Large Droplets (SLD) within the Great Lakes region. This flight program was a joint effort between the National Aeronautics and Space Administration (NASA), the National Center for Atmospheric Research (NCAR), and the Federal Aviation Administration (FAA). Based on weather forecasts and real-time in-flight guidance provided by NCAR, the NASA-Lewis Icing Research Aircraft was flown to locations where conditions were believed to be conducive to the formation of Supercooled Large Droplets aloft. Onboard instrumentation was then used to record meteorological, ice accretion, and aero-performance characteristics encountered during the flight. A total of 29 icing research flights were conducted, during which "conventional" small droplet icing, SLD, and mixed phase conditions were encountered aloft. This paper will describe how flight operations were conducted, provide an operational summary of the flights, present selected experimental results from one typical research flight, and conclude with practical "lessons learned" from this first year of operation.
Charles, J. B.; Stenger, M. B.; Phillips, T. R.; Arzeno, N. M.; Lee, S. M. C.
Introduction. We investigated the efficacy of combining fluid loading with sustained lower body negative pressure (LBNP) to reverse orthostatic intolerance associated with weightlessness during and immediately after Space Shuttle missions. Methods. Shuttle astronauts (n=13) underwent 4 hours of LBNP at -30 mm(Hg) and ingested water and salt ( soak treatment) during flight in two complementary studies. In the first study (n=8), pre-flight heart rate (HR) and blood pressure (BP) responses to an LBNP ramp (5-min stages of -10 mm(Hg) steps to -50 mm(Hg) were compared to responses in-flight one and two days after LBNP soak treatment. In the second study (n=5), the soak was performed 24 hr before landing, and post-flight stand test results of soak subjects were compared with those of an untreated cohort (n=7). In both studies, the soak was scheduled late in the mission and was preceded by LBNP ramp tests at approximately 3-day intervals to document the in-flight loss of orthostatic tolerance. Results. Increased HR and decreased BP responses to LBNP were evident early in-flight. In-flight, one day after LBNP soak, HR and BP responses to LBNP were not different from pre-flight, but the effect was absent the second day after treatment. Post-flight there were no between-group differences in HR and BP responses to standing, but all 5 treatment subjects completed the 5-minute stand test whereas 2 of 7 untreated cohort subjects did not. Discussion. Exaggerated HR and BP responses to LBNP were evident within the first few days of space flight, extending results from Skylab. The combined LBNP and fluid ingestion countermeasure restored in-flight LBNP HR and BP responses to pre-flight levels and provided protection of post-landing orthostatic function. Unfortunately, any benefits of the combined countermeasure were offset by the complexity of its implementation, making it inappropriate for routine application during Shuttle flights.
Shen, Xiaoyun; Wan, Di; Ma, Lan; He, Yuncheng
A virtual reality flight procedure vision system is introduced in this paper. The digital flight map database is established based on the Geographic Information System (GIS) and high definitions satellite remote sensing photos. The flight approaching area database is established through computer 3D modeling system and GIS. The area texture is generated from the remote sensing photos and aerial photographs in various level of detail. According to the flight approaching procedure, the flight navigation information is linked to the database. The flight approaching area vision can be dynamic displayed according to the designed flight procedure. The flight approaching area images are rendered in 2 channels, one for left eye images and the others for right eye images. Through the polarized stereoscopic projection system, the pilots and aircrew can get the vivid 3D vision of the flight destination approaching area. Take the use of this system in pilots preflight preparation procedure, the aircrew can get more vivid information along the flight destination approaching area. This system can improve the aviator's self-confidence before he carries out the flight mission, accordingly, the flight safety is improved. This system is also useful in validate the visual flight procedure design, and it helps to the flight procedure design.
Komura, T. [Mitsubishi Precision Company Limited, Tokyo (Japan)
This paper presents various flight simulators. A flight simulator is classified into that for R and D on aircraft and that for flight training according to its usage. As an example of the former, the general-purpose flight simulation test facility of National Aerospace Laboratory, Science and Technology Agency is in use for development of the STOL experimental aircraft 'Asuka' and simulation experiments for space development. A civil aircraft simulator simulating the interior of a cockpit, operation feeling of piloting devices, flight performance, dynamic characteristics, an engine system and a hydraulic system like a real aircraft is in wide use for training pilots. A fighter simulator for air force is used for training detection of enemy's aircraft by radar, and missile shooting. An antisubmarine patrol aircraft simulator is used for training detection of submarines by sonic detector and magnetic detector, and torpedo air-launching. For both simulators, real simulation of detection sensors or battle environment is required. (NEDO)
Gurevitz, Juan M.; Kitron, Uriel; Gürtler, Ricardo E.
Recent experiments demonstrated that most field-collected Triatoma infestans (Klug) (Hemiptera: Reduviidae) adults from northern Argentina either never initiated flight or did so repeatedly in both sexes. This pattern could not be explained by sex, adult age, weight, weight-to-length ratio (W/L), or chance. We examined whether bugs that never initiated flight possessed developed flight muscles, and whether flight muscle mass relative to total body mass (FMR) was related to the probability of ...
... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Flight controls. 27.151 Section 27.151... STANDARDS: NORMAL CATEGORY ROTORCRAFT Flight Flight Characteristics § 27.151 Flight controls. (a) Longitudinal, lateral, directional, and collective controls may not exhibit excessive breakout force, friction...
... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Flight controls. 29.151 Section 29.151... STANDARDS: TRANSPORT CATEGORY ROTORCRAFT Flight Flight Characteristics § 29.151 Flight controls. (a) Longitudinal, lateral, directional, and collective controls may not exhibit excessive breakout force, friction...
Prakash Loungani; Paolo Mauro
This paper documents the scale of capital flight from Russia, compares it with that observed in other countries, and reviews policy options. The evidence from other countries suggests that capital flight can be reversed once reforms take hold. The paper argues that capital flight from Russia can only be curbed through a medium-term reform strategy aimed at improving governance and macroeconomic performance, and strengthening the banking system. Capital controls result in costly distortions an...
Full Text Available The paper the organizational activities of informational security in the secondary school are considered In particular the planning of organizational activities on stages of the lifecycle of the system of information security of educational computer complex is proposed. There are purified the methods of unification for the software installed at the pupils’ workstations. There is developed the tentative calendar plan of regular activities and main approaches to the management of system of informational security of educational computer complex on the basis of hardware-software level and the organization of antivirus security in computer lab is described.
At the end of World War II Duane Deming, an internationally known economist enunciated what later came to be called "Total Quality Management" (TQM). The basic thrust of this economic theory called for companies and governments to identify their customers and to do whatever was necessary to meet their demands and to keep them satisfied. It also called for companies to compete internally. That is, they were to build products that competed with their own so that they were always improving. Unfortunately most U.S. corporations failed to heed this advice. Consequently, the Japanese who actively sought Deming's advice and instituted it in their corporate planning, built an economy that outstripped that of the U.S. for the next three to four decades. Only after U.S. corporations reorganized and fashioned joint ventures which incorporated the tenets of TQM with their Japanese competitors did they start to catch up. Other institutions such as the U.S. government and its agencies and schools face the same problem. While the power of the U.S. government is in no danger of being usurped, its agencies and schools face real problems which can be traced back to not heeding Deming's advice. For example, the public schools are facing real pressure from private schools and home school families because they are not meeting the needs of the general public, Likewise, NASA and other government agencies find themselves shortchanged in funding because they have failed to convince the general public that their missions are important. In an attempt to convince the general public that its science mission is both interesting and important, in 1998 the Science Directorate at NASA's Marshall Space Flight Center (MSFC) instituted a new outreach effort using the interact to reach the general public as well as the students. They have called it 'Science@NASA'.
Tofalli, Niki; Loizia, Pantelitsa; Zorpas, Antonis A
We assume that during flights the amount of waste that is produced is limited. However, daily, approximately 8000 commercial airplanes fly above Europe's airspace while at the same time, more than 17,000 commercial flights exist in the entire world. Using primary data from airlines, which use the Larnaca's International Airport (LIA) in Cyprus, we have tried to understand why wastes are produced during a typical flight such as food waste, paper, and plastics, as well as how passengers affect the production of those wastes. The compositional analysis took place on 27 flights of 4 different airlines which used LIA as final destination. The evaluation indicated that the passenger's habits and ethics, and the policy of each airline produced different kinds of waste during the flights and especially food waste (FW). Furthermore, it was observed that the only waste management strategy that exists in place in the airport is the collection and the transportation of all those wastes from aircrafts and from the airport in the central unit for further treatment. Hence, this research indicated extremely difficulties to implement any specific waste minimization, or prevention practice or other sorting methods during the flights due to the limited time of the most flights (less than 3 h), the limited available space within the aircrafts, and the strictly safety roles that exist during the flights.
Murch, Austin M.
A flight control system architecture for the NASA AirSTAR infrastructure has been designed to address the challenges associated with safe and efficient flight testing of research control laws in adverse flight conditions. The AirSTAR flight control system provides a flexible framework that enables NASA Aviation Safety Program research objectives, and includes the ability to rapidly integrate and test research control laws, emulate component or sensor failures, inject automated control surface perturbations, and provide a baseline control law for comparison to research control laws and to increase operational efficiency. The current baseline control law uses an angle of attack command augmentation system for the pitch axis and simple stability augmentation for the roll and yaw axes.
Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...
Hodges, W. Todd; Walker, Gregory W.
A rotary wing, unmanned air vehicle (UAV) is being developed as a research tool at the NASA Langley Research Center by the U.S. Army and NASA. This development program is intended to provide the rotorcraft research community an intermediate step between rotorcraft wind tunnel testing and full scale manned flight testing. The technologies under development for this vehicle are: adaptive electronic flight control systems incorporating artificial intelligence (AI) techniques, small-light weight sophisticated sensors, advanced telepresence-telerobotics systems and rotary wing UAV operational procedures. This paper briefly describes the system's requirements and the techniques used to integrate the various technologies to meet these requirements. The paper also discusses the status of the development effort. In addition to the original aeromechanics research mission, the technology development effort has generated a great deal of interest in the UAV community for related spin-off applications, as briefly described at the end of the paper. In some cases the technologies under development in the free flight program are critical to the ability to perform some applications.
Enz, Ashley; McCullum, Charcelor
In a time of greater demands on school systems and increased strain on human and material resources, the need for expanded leadership models is becoming increasingly apparent. As a result, educational stakeholders are investing in leadership roles beyond the traditional school administrators, engaging various educators' leadership capacities at…
... Tripoli (HLLL) Flight Information Region (FIR) AGENCY: Federal Aviation Administration (FAA), Department... the Tripoli (HLLL) Flight Information Region (FIR) by all U.S. air carriers; U.S. commercial operators...) Flight Information Region (FIR). (a) Applicability. This section applies to the following persons: (1...
...-0780; Amdt. No. 61-131] RIN 2120-AK23 Certified Flight Instructor Flight Reviews; Recent Pilot in Command Experience; Airmen Online Services; Confirmation of Effective Date AGENCY: Federal Aviation...-calendar month flight review requirements. This rule also clarifies that the generally applicable recent...
...-0780; Amdt. No. 61-131] RIN 2120-AK23 Certified Flight Instructor Flight Reviews; Recent Pilot in Command Experience; Airmen Online Services AGENCY: Federal Aviation Administration (FAA), DOT. ACTION... review requirements. This rule also clarifies that the generally applicable recent flight experience...
Aslanidis, Nektarios; Christiansen, Charlotte
-return trade-off is positive and during flight-to-safety episodes it is negative. The effects of flight-to-safety episodes on the risk-return trade-off are qualitatively similar for own country flight-to-safety episodes, for flight from own country stock market to the US bond market, and for US flight......This paper investigates flight-to-safety from stocks to bonds in seven European markets. We use quantile regressions to identify flight-to-safety episodes. The simple risk-return trade-off on the stock markets is negative which is caused by flight-to-safety episodes: During normal periods, the risk...
Costa, Guillermo J.; Arteaga, Ricardo A.
A preliminary survey of existing separation assurance and collision avoidance advancements, technologies, and efforts has been conducted in order to develop a concept of operations for flight testing autonomous separation assurance at Dryden Flight Research Center. This effort was part of the Unmanned Aerial Systems in the National Airspace System project. The survey focused primarily on separation assurance projects validated through flight testing (including lessons learned), however current forays into the field were also examined. Comparisons between current Dryden flight and range assets were conducted using House of Quality matrices in order to allow project management to make determinations regarding asset utilization for future flight tests. This was conducted in order to establish a body of knowledge of the current collision avoidance landscape, and thus focus Dryden s efforts more effectively towards the providing of assets and test ranges for future flight testing within this research field.
Hantzopoulos, Maria; Shirazi, Roozbeh
From a human capital perspective, schooling has long represented an engine of economic growth, individual advancement, and competitiveness in the global market. In recent years, this theorization of schooling has become linked with articulations of national security in both the Global North and South, as policymakers, private sector actors, and…
Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo
Background Food insecurity not only affects physical growth and health of children but also their intellectual development, school attendance and academic performance. However, most evidences are based on studies in high income countries. Although food insecurity is common in Ethiopia, to what extent it affects school attendance and educational attainment of adolescents is not explored. We hypothesized that food insecure adolescents would be more likely to be absent from school and have lower grades attained after 1 year compared to their food secure peers. Methods We used data from 2009 adolescents in the age group of 13-17 years from two consecutive surveys of a five year longitudinal family study in Southwest Ethiopia. A stratified random sampling was used to select participants. Regression analyses were used to compare school absenteeism and the highest grade attained after 1 year of follow-up in food secure and insecure adolescents. The analysis was adjusted for demographic factors, reported illness and workload. Results Significantly more (33.0%) food insecure adolescents were absent from school compared with their food secure peers (17.8%, P absenteeism. Similarly after controlling for household income and gender of the household head, adolescent food insecurity(P absenteeism and a lower educational attainment. Programs aiming to achieve universal access to primary education in food insecure environments should integrate interventions to ensure food security of adolescents. PMID:21477343
Belachew, Tefera; Hadley, Craig; Lindstrom, David; Gebremariam, Abebe; Lachat, Carl; Kolsteren, Patrick
Food insecurity not only affects physical growth and health of children but also their intellectual development, school attendance and academic performance. However, most evidences are based on studies in high income countries. Although food insecurity is common in Ethiopia, to what extent it affects school attendance and educational attainment of adolescents is not explored. We hypothesized that food insecure adolescents would be more likely to be absent from school and have lower grades attained after 1 year compared to their food secure peers. We used data from 2009 adolescents in the age group of 13-17 years from two consecutive surveys of a five year longitudinal family study in Southwest Ethiopia. A stratified random sampling was used to select participants. Regression analyses were used to compare school absenteeism and the highest grade attained after 1 year of follow-up in food secure and insecure adolescents. The analysis was adjusted for demographic factors, reported illness and workload. Significantly more (33.0%) food insecure adolescents were absent from school compared with their food secure peers (17.8%, P absenteeism. Similarly after controlling for household income and gender of the household head, adolescent food insecurity(P absenteeism and a lower educational attainment. Programs aiming to achieve universal access to primary education in food insecure environments should integrate interventions to ensure food security of adolescents.
Schock, Richard W.
The purpose of the Solar Array Flight Dynamic Experiment (SAFDE) is to demonstrate the feasibility of on-orbit measurement and ground processing of large space structures' dynamic characteristics. Test definition or verification provides the dynamic characteristic accuracy required for control systems use. An illumination/measurement system was developed to fly on space shuttle flight STS-41D. The system was designed to dynamically evaluate a large solar array called the Solar Array Flight Experiment (SAFE) that had been scheduled for this flight. The SAFDE system consisted of a set of laser diode illuminators, retroreflective targets, an intelligent star tracker receiver and the associated equipment to power, condition, and record the results. In six tests on STS-41D, data was successfully acquired from 18 retroreflector targets and ground processed, post flight, to define the solar array's dynamic characteristic. The flight experiment proved the viability of on-orbit test definition of large space structures dynamic characteristics. Future large space structures controllability should be greatly enhanced by this capability.
Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)
Ashenden, Debi; Lawrence, Darren
In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr
With the demand for more advanced fighter aircraft, relying on relaxed stability or even unstable flight mechanical characteristics to gain flight performance, more focus has been put on model-based system engineering to help with the design work. The flight control system design is one important part that relies on this modeling. Therefore it has become more important to develop flight mechanical models that are highly accurate in the whole flight envelop. For today’s newly developed fighter...
Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)
Full Text Available Unlike airplanes birds must have either flapping or oscillating wings (the hummingbird. Only such wings can produce both lift and thrust – two sine qua non attributes of flying.The bird wings have several possibilities how to obtain the same functions as airplane wings. All are realized by the system of flight feathers. Birds have also the capabilities of adjusting the shape of the wing according to what the immediate flight situation demands, as well as of responding almost immediately to conditions the flow environment dictates, such as wind gusts, object avoidance, target tracking, etc. In bird aerodynamics also the tail plays an important role. To fly, wings impart downward momentum to the surrounding air and obtain lift by reaction. How this is achieved under various flight situations (cruise flight, hovering, landing, etc., and what the role is of the wing-generated vortices in producing lift and thrust is discussed.The issue of studying bird flight experimentally from in vivo or in vitro experiments is also briefly discussed.
Alexander A. Galushkin
In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.
Carter, John F.
NASA Dryden Flight Research Center (DFRC) is working with the United States Navy to complete ground testing and initiate flight testing of a modified set of F/A-18 flight control computers. The Production Support Flight Control Computers (PSFCC) can give any fleet F/A-18 airplane an in-flight, pilot-selectable research control law capability. NASA DFRC can efficiently flight test the PSFCC for the following four reasons: (1) Six F/A-18 chase aircraft are available which could be used with the PSFCC; (2) An F/A-18 processor-in-the-loop simulation exists for validation testing; (3) The expertise has been developed in programming the research processor in the PSFCC; and (4) A well-defined process has been established for clearing flight control research projects for flight. This report presents a functional description of the PSFCC. Descriptions of the NASA DFRC facilities, PSFCC verification and validation process, and planned PSFCC projects are also provided.
White, Molly E.; Hyatt, Andrew J.
The Orion Multi-Purpose Crew Vehicle (MPCV) Reaction Control System (RCS) is critical to guide the vehicle along the desired trajectory during re--entry. However, this system has a significant impact on the convective heating environment to the spacecraft. Heating augmentation from the jet interaction (JI) drives thermal protection system (TPS) material selection and thickness requirements for the spacecraft. This paper describes the heating environment from the RCS on the afterbody of the Orion MPCV during Orion's first flight test, Exploration Flight Test 1 (EFT-1). These jet plumes interact with the wake of the crew capsule and cause an increase in the convective heating environment. Not only is there widespread influence from the jet banks, there may also be very localized effects. The firing history during EFT-1 will be summarized to assess which jet bank interaction was measured during flight. Heating augmentation factors derived from the reconstructed flight data will be presented. Furthermore, flight instrumentation across the afterbody provides the highest spatial resolution of the region of influence of the individual jet banks of any spacecraft yet flown. This distribution of heating augmentation across the afterbody will be derived from the flight data. Additionally, trends with possible correlating parameters will be investigated to assist future designs and ground testing programs. Finally, the challenges of measuring JI, applying this data to future flights and lessons learned will be discussed.
Grutzmacher, Stephanie; Gross, Susan
Objective: To examine the relationship between household food security and children's and parents' fruit, vegetable, and breakfast consumption and fruit and vegetable availability. Design: Cross-sectional study using matched parent-child surveys. Setting: Title I elementary schools in Maryland. Participants: Ninety-two low-income parent-child…
This paper analyzes the effect of school vouchers on student sorting - defined as a flight to private schools by high-income and committed public-school students - and whether vouchers can be designed to reduce or eliminate it. Much of the existing literature investigates sorting in cases where private schools can screen students. However, publicly funded U.S. voucher programs require a private school to accept all students unless it is oversubscribed and to pick students randomly if it is ov...
Mitrović, Miroslav M.; Ivaniš, Željko
Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...
Burcham, F. W., Jr.; Burken, John; Maine, Trindel A.
Flight tests of a propulsion-controlled aircraft (PCA) system on an F-15 airplane have been conducted at the NASA Dryden Flight Research Center. The airplane was flown with all flight control surfaces locked both in the manual throttles-only mode and in an augmented system mode. In the latter mode, pilot thumbwheel commands and aircraft feedback parameters were used to position the throttles. Flight evaluation results showed that the PCA system can be used to land an airplane that has suffered a major flight control system failure safely. The PCA system was used to recover the F-15 airplane from a severe upset condition, descend, and land. Pilots from NASA, U.S. Air Force, U.S. Navy, and McDonnell Douglas Aerospace evaluated the PCA system and were favorably impressed with its capability. Manual throttles-only approaches were unsuccessful. This paper describes the PCA system operation and testing. It also presents flight test results and pilot comments.
This report documents an investigation of the flight paths of 13 selected controlled flight into terrain (CFIT) aircraft accidents that occurred between 1985 and 1997. The Operations Assessment Division (DTS-43) and the Aviation Safety Division (DTS-...
Myklebust, Jon Olav
This article, by Jon Olav Myklebust from Volda University, Norway, presents analyses of social security dependence among students with special educational needs in Norway who at the start of upper secondary school had various disabilities--of a somatic, psychological and/or social nature. They were all educated in ordinary schools, in special or…
8217" (master’s thesis, Naval Postgraduate School, 2007), 79–82. 8 desensitization and complacency often hamper long-term results, necessitating additional...for contributing to homeland security, it may exact a cost from the offering entity. Additionally, some incentives may require advertising to make...people aware of their existence. Many of these advertisements , however, might be able to be combined with existing awareness campaign messages. 2
Tartt, David M.; Hewett, Marle D.; Duke, Eugene L.; Cooper, James A.; Brumbaugh, Randal W.
The Automated Flight Test Management System (ATMS) is being developed as part of the NASA Aircraft Automation Program. This program focuses on the application of interdisciplinary state-of-the-art technology in artificial intelligence, control theory, and systems methodology to problems of operating and flight testing high-performance aircraft. The development of a Flight Test Engineer's Workstation (FTEWS) is presented, with a detailed description of the system, technical details, and future planned developments. The goal of the FTEWS is to provide flight test engineers and project officers with an automated computer environment for planning, scheduling, and performing flight test programs. The FTEWS system is an outgrowth of the development of ATMS and is an implementation of a component of ATMS on SUN workstations.
Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R
Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access
de Goede, M.; Burgess, J.P.
1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered
Duke, Eugene L.; Hewett, Marle D.; Brumbaugh, Randal W.; Tartt, David M.; Antoniewicz, Robert F.; Agarwal, Arvind K.
An automated flight test management system (ATMS) and its use to develop a rapid-prototyping flight research facility for artificial intelligence (AI) based flight systems concepts are described. The ATMS provides a flight test engineer with a set of tools that assist in flight planning and simulation. This system will be capable of controlling an aircraft during the flight test by performing closed-loop guidance functions, range management, and maneuver-quality monitoring. The rapid-prototyping flight research facility is being developed at the Dryden Flight Research Facility of the NASA Ames Research Center (Ames-Dryden) to provide early flight assessment of emerging AI technology. The facility is being developed as one element of the aircraft automation program which focuses on the qualification and validation of embedded real-time AI-based systems.
School boards are woefully unprepared to deal with "make or buy" issues, due to massive union efforts to eliminate or restrict board freedom to contract for services. Teachers neither understand nor support a market economy. School boards' contracting out ability will not be secure until favorable legislative options are considered and…
This photo of the X-1A includes graphs of the flight data from Maj. Charles E. Yeager's Mach 2.44 flight on December 12, 1953. (This was only a few days short of the 50th anniversary of the Wright brothers' first powered flight.) After reaching Mach 2.44, then the highest speed ever reached by a piloted aircraft, the X-1A tumbled completely out of control. The motions were so violent that Yeager cracked the plastic canopy with his helmet. He finally recovered from a inverted spin and landed on Rogers Dry Lakebed. Among the data shown are Mach number and altitude (the two top graphs). The speed and altitude changes due to the tumble are visible as jagged lines. The third graph from the bottom shows the G-forces on the airplane. During the tumble, these twice reached 8 Gs or 8 times the normal pull of gravity at sea level. (At these G forces, a 200-pound human would, in effect, weigh 1,600 pounds if a scale were placed under him in the direction of the force vector.) Producing these graphs was a slow, difficult process. The raw data from on-board instrumentation recorded on oscillograph film. Human computers then reduced the data and recorded it on data sheets, correcting for such factors as temperature and instrument errors. They used adding machines or slide rules for their calculations, pocket calculators being 20 years in the future. Three second generation Bell Aircraft Corporations X-1s were built, though four were requested. They were the X-1A (48-1384); X-1B (48-1385); X-1C (canceled and never built); X-1D (48-1386). These aircraft were similar to the X-1s, except they were five feet longer, had conventional canopies, and were powered by Reaction Motors, Inc. XLR11-RM-5 rocket engines. The RM-5, like the previous engines, had no throttle and was controlled by igniting one or more of the four thrust chambers at will. The original program outline called for the X-1A and X-1B to be used for dynamic stability and air loads investigations. The X-1D was to be used
... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Flight engineer courses. 63.43 Section 63...) AIRMEN CERTIFICATION: FLIGHT CREWMEMBERS OTHER THAN PILOTS Flight Engineers § 63.43 Flight engineer courses. An applicant for approval of a flight engineer course must submit a letter to the Administrator...
Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging
Knighton, Donna L.
A Flight Test Engineering Database Management System (FTE DBMS) was designed and implemented at the NASA Dryden Flight Research Facility. The X-29 Forward Swept Wing Advanced Technology Demonstrator flight research program was chosen for the initial system development and implementation. The FTE DBMS greatly assisted in planning and 'mass production' card preparation for an accelerated X-29 research program. Improved Test Plan tracking and maneuver management for a high flight-rate program were proven, and flight rates of up to three flights per day, two times per week were maintained.
Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane
In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the Â€Üˆouse of SecurityÂ€Ý¬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...
Xiaowei, Xie; Zhengjun, Liu; Zhiquan, Zuo
In order to obtain various information of power facilities such as spatial location, geometry, images data and video information in the infrared and ultraviolet band and so on, Unmanned Aerial Vehicle (UAV) power line inspecting system needs to integrate a variety of sensors for data collection. Low altitude and side-looking imaging are required for UAV flight to ensure sensors to acquire high-quality data and device security. In this paper, UAV power line inspecting system is deferent from existing ones that used in Surveying and Mapping. According to characteristics of UAV for example equipped multiple sensor, side-looking imaging, working at low altitude, complex terrain conditions and corridor type flight, this paper puts forward a UAV power line inspecting scheme which comprehensively considered of the UAV performance, sensor parameters and task requirements. The scheme is finally tested in a region of Guangdong province, and the preliminary results show that the scheme is feasible
Hawley, Willis D.
Examines the effects of school desegregation by suggesting some reasons why those who review the research might misinterpret or misrepresent the evidence; and by summarizing what is known about two significant types of outcomes--academic achievement, and busing and "white flight." (Author/MLF)
Securing Land Tenure, Improving Food Security and Reducing Poverty in Rural ... land tenure regimes as obstacles to food security, economic integration and ... its 2017 call for proposals to establish Cyber Policy Centres in the Global South.
DeLucia-Waack, Janice; Gerrity, Deborah
Parental divorce is the issue of most concern for elementary school children. This article describes interventions for children-of-divorce groups for elementary school children. Suggests guidelines related to goal setting; securing agency and parental consent; leadership planning; recruitment, screening, and selection of members; group member…
Smith, Scott M.; Zwart, Sara R.
Magnesium is an essential nutrient for muscle, cardiovascular, and bone health on Earth, and during space flight. We sought to evaluate magnesium status in 43 astronauts (34 male, 9 female; 47 ± 5 years old, mean ± SD) before, during, and after 4–6-month space missions. We also studied individuals participating in a ground analog of space flight (head-down-tilt bed rest; n = 27 (17 male, 10 female), 35 ± 7 years old). We evaluated serum concentration and 24-h urinary excretion of magnesium, along with estimates of tissue magnesium status from sublingual cells. Serum magnesium increased late in flight, while urinary magnesium excretion was higher over the course of 180-day space missions. Urinary magnesium increased during flight but decreased significantly at landing. Neither serum nor urinary magnesium changed during bed rest. For flight and bed rest, significant correlations existed between the area under the curve of serum and urinary magnesium and the change in total body bone mineral content. Tissue magnesium concentration was unchanged after flight and bed rest. Increased excretion of magnesium is likely partially from bone and partially from diet, but importantly, it does not come at the expense of muscle tissue stores. While further study is needed to better understand the implications of these findings for longer space exploration missions, magnesium homeostasis and tissue status seem well maintained during 4–6-month space missions. PMID:26670248
Scott M. Smith
Full Text Available Magnesium is an essential nutrient for muscle, cardiovascular, and bone health on Earth, and during space flight. We sought to evaluate magnesium status in 43 astronauts (34 male, 9 female; 47 ± 5 years old, mean ± SD before, during, and after 4–6-month space missions. We also studied individuals participating in a ground analog of space flight (head-down-tilt bed rest; n = 27 (17 male, 10 female, 35 ± 7 years old. We evaluated serum concentration and 24-h urinary excretion of magnesium, along with estimates of tissue magnesium status from sublingual cells. Serum magnesium increased late in flight, while urinary magnesium excretion was higher over the course of 180-day space missions. Urinary magnesium increased during flight but decreased significantly at landing. Neither serum nor urinary magnesium changed during bed rest. For flight and bed rest, significant correlations existed between the area under the curve of serum and urinary magnesium and the change in total body bone mineral content. Tissue magnesium concentration was unchanged after flight and bed rest. Increased excretion of magnesium is likely partially from bone and partially from diet, but importantly, it does not come at the expense of muscle tissue stores. While further study is needed to better understand the implications of these findings for longer space exploration missions, magnesium homeostasis and tissue status seem well maintained during 4–6-month space missions.
Voeller, John G
Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.
Computer Security Team
If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise. An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...
Addressing the members of The Fletcher School Board of Overseers, Director General of the IAEA emphasised the principal actions that will be essential achieve security in an independent world: First, we must modernize and revamp the collective security system of the United Nations Charter - in terms of both preventive diplomacy and enforcement action. To start, the Security Council should be reconstituted to include the major political and economic powers of today's world. In addition, new working concepts, tools and methods are needed to ensure that the Council can effectively discharge its role as the body with 'the primary responsibility' for the maintenance of international peace and security. Second, we must create an environment in which, as foreseen in the UN Charter, the use of force is limited to situations of self-defence or enforcement measures authorized by the Security Council. Preemptive strikes, however tempting, can send the global community into uncharted and dangerous territory. Only an action authorized by the Council will bring international legitimacy and support to such a measure. More importantly, these limitations will restrict the use of force to those situations where force is indeed the last and only alternative. Third, we must take concrete steps to de-legitimize the acquisition or use of weapons of mass destruction. Clearly, a new approach is needed - an approach that applies to all weapons of mass destruction, and would include: universal adherence to conventions that ban such weapons; robust and intrusive systems of verification for all related weapons conventions; a clear road map and the determination to eliminate these weapons in all States, to abolish over time the divide between the nuclear 'haves' and 'have nots'; new doctrines of security that do not rely on the deterrent effect of nuclear weapons; and reliable enforcement measures, under the aegis of the Security Council, to effectively counter efforts by any country to
Williams, Daniel M.; Consiglio, Maria C.; Murdoch, Jennifer L.; Adams, Catherine H.
This paper provides an analysis of Flight Technical Error (FTE) from recent SATS experiments, called the Higher Volume Operations (HVO) Simulation and Flight experiments, which NASA conducted to determine pilot acceptability of the HVO concept for normal operating conditions. Reported are FTE results from simulation and flight experiment data indicating the SATS HVO concept is viable and acceptable to low-time instrument rated pilots when compared with today s system (baseline). Described is the comparative FTE analysis of lateral, vertical, and airspeed deviations from the baseline and SATS HVO experimental flight procedures. Based on FTE analysis, all evaluation subjects, low-time instrument-rated pilots, flew the HVO procedures safely and proficiently in comparison to today s system. In all cases, the results of the flight experiment validated the results of the simulation experiment and confirm the utility of the simulation platform for comparative Human in the Loop (HITL) studies of SATS HVO and Baseline operations.
Full Text Available In this paper we approached from a researcher’s angle and analyzed the concepts of cyber-space, cyber-power from the security school perspective, from that of the international organizations, and from the civil society point of view. Therefore we referred to the documents and the international initiatives concerning the security of data transfer in the context of the current threats against cybernetic security on the one hand, and its interpretation as a threat to the values, rights and democratic freedoms of the civil society, on the other. The risk society is defined both through the grid of political sociology, of the Copenhagen school, as a key element of reference in this case, as well as through the necessity to build a safe cyber space, here being scrutinized in a value-based antithesis between terror and democracy / freedom of speech.
Lawson, Nicholas; Jentink, Henk; Kompenhans, Jürgen
The book presents a synopsis of the main results achieved during the 3 year EU-project "Advanced Inflight Measurement Techniques (AIM)" which applied advanced image based measurement techniques to industrial flight testing. The book is intended to be not only an overview on the AIM activities but also a guide on the application of advanced optical measurement techniques for future flight testing. Furthermore it is a useful guide for engineers in the field of experimental methods and flight testing who face the challenge of a future requirement for the development of highly accurate non-intrusive in-flight measurement techniques.
Bernier, Annie; Beauchamp, Miriam H.; Carlson, Stephanie M.; Lalonde, Gabrielle
In light of emerging evidence suggesting that the affective quality of parent-child relationships may relate to individual differences in young children's executive functioning (EF) skills, the aim of this study was to investigate the prospective associations between attachment security in toddlerhood and children's EF skills in kindergarten.…
The presentation will overview NASA Armstrong Flight Research Centers flight test capabilities, which can provide various means for flight testing of passive and active wireless sensor systems, also, it will address the needs of the wireless data acquisition solutions for the centers flight instrumentation issues such as additional weight caused by added instrumentation wire bundles, connectors, wire cables routing, moving components, etc., that the Passive Wireless Sensor Technology Workshop may help. The presentation shows the constraints and requirements that the wireless sensor systems will face in the flight test applications.
Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.
Muhamad Samudi Yasir
Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)
Edge, Stephen Charles; Hunter, Beau; Sullivan, Gene; LeBlanc, Dee-Ann
A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing s
Schulze, Norman R.; Maxfield, B.; Boucher, C.
Solid State Laser Initiated Ordnance (LIO) offers new technology having potential for enhanced safety, reduced costs, and improved operational efficiency. Concerns over the absence of programmatic applications of the technology, which has prevented acceptance by flight programs, should be abated since LIO has now been operationally implemented by the Laser Initiated Ordnance Sounding Rocket Demonstration (LOSRD) Program. The first launch of solid state laser diode LIO at the NASA Wallops Flight Facility (WFF) occurred on March 15, 1995 with all mission objectives accomplished. This project, Phase 3 of a series of three NASA Headquarters LIO demonstration initiatives, accomplished its objective by the flight of a dedicated, all-LIO sounding rocket mission using a two-stage Nike-Orion launch vehicle. LIO flight hardware, made by The Ensign-Bickford Company under NASA's first Cooperative Agreement with Profit Making Organizations, safely initiated three demanding pyrotechnic sequence events, namely, solid rocket motor ignition from the ground and in flight, and flight termination, i.e., as a Flight Termination System (FTS). A flight LIO system was designed, built, tested, and flown to support the objectives of quickly and inexpensively putting LIO through ground and flight operational paces. The hardware was fully qualified for this mission, including component testing as well as a full-scale system test. The launch accomplished all mission objectives in less than 11 months from proposal receipt. This paper concentrates on accomplishments of the ordnance aspects of the program and on the program's implementation and results. While this program does not generically qualify LIO for all applications, it demonstrated the safety, technical, and operational feasibility of those two most demanding applications, using an all solid state safe and arm system in critical flight applications.
Etherington, Timothy J.; Kramer, Lynda J.; Bailey, Randall E.; Kennedey, Kellie D.
Accident statistics cite the flight crew as a causal factor in over 60% of large transport fatal accidents. Yet a well-trained and well-qualified crew is acknowledged as the critical center point of aircraft systems safety and an integral component of the entire commercial aviation system. A human-in-the-loop test was conducted using a Level D certified Boeing 737-800 simulator to evaluate the pilot's contribution to safety-of-flight during routine air carrier flight operations and in response to system failures. To quantify the human's contribution, crew complement was used as an independent variable in a between-subjects design. This paper details the crew's actions and responses while dealing with an in-flight airspeed failure. Accident statistics often cite flight crew error (Baker, 2001) as the primary contributor in accidents and incidents in transport category aircraft. However, the Air Line Pilots Association (2011) suggests "a well-trained and well-qualified pilot is acknowledged as the critical center point of the aircraft systems safety and an integral safety component of the entire commercial aviation system." This is generally acknowledged but cannot be verified because little or no quantitative data exists on how or how many accidents/incidents are averted by crew actions. Anecdotal evidence suggest crews handle failures on a daily basis and Aviation Safety Action Program data generally supports this assertion, even if the data is not released to the public. However without hard evidence, the contribution and means by which pilots achieve safety of flight is difficult to define. Thus, ways to improve the human ability to contribute or overcome deficiencies are ill-defined.
The Theseus prototype research aircraft shows off its high aspect-ratio wing as it lifts off from Rogers Dry Lake during its first test flight from NASA's Dryden Flight Research Center, Edwards, California, on May 24, 1996. The Theseus aircraft, built and operated by Aurora Flight Sciences Corporation, Manassas, Virginia, was a unique aircraft flown at NASA's Dryden Flight Research Center, Edwards, California, under a cooperative agreement between NASA and Aurora. Dryden hosted the Theseus program, providing hangar space and range safety for flight testing. Aurora Flight Sciences was responsible for the actual flight testing, vehicle flight safety, and operation of the aircraft. The Theseus remotely piloted aircraft flew its maiden flight on May 24, 1996, at Dryden. During its sixth flight on November 12, 1996, Theseus experienced an in-flight structural failure that resulted in the loss of the aircraft. As of the beginning of the year 2000, Aurora had not rebuilt the aircraft. Theseus was built for NASA under an innovative, $4.9 million fixed-price contract by Aurora Flight Sciences Corporation and its partners, West Virginia University, Morgantown, West Virginia, and Fairmont State College, Fairmont, West Virginia. The twin-engine, unpiloted vehicle had a 140-foot wingspan, and was constructed largely of composite materials. Powered by two 80-horsepower, turbocharged piston engines that drove twin 9-foot-diameter propellers, Theseus was designed to fly autonomously at high altitudes, with takeoff and landing under the active control of a ground-based pilot in a ground control station 'cockpit.' With the potential ability to carry 700 pounds of science instruments to altitudes above 60,000 feet for durations of greater than 24 hours, Theseus was intended to support research in areas such as stratospheric ozone depletion and the atmospheric effects of future high-speed civil transport aircraft engines. Instruments carried aboard Theseus also would be able to
Hampson, Neil B; Kregenow, David A; Mahoney, Anne M; Kirtland, Steven H; Horan, Kathleen L; Holm, James R; Gerbino, Anthony J
Hypobaric hypoxia during commercial air travel has the potential to cause or worsen hypoxemia in individuals with pre-existing cardiopulmonary compromise. Knowledge of cabin altitude pressures aboard contemporary flights is essential to counseling patients accurately about flying safety. The objective of the study was to measure peak cabin altitudes during U.S. domestic commercial flights on a variety of aircraft. A handheld mountaineering altimeter was carried by the investigators in the plane cabin during commercial air travel and peak cabin altitude measured. The values were then compared between aircraft models, aircraft classes, and distances flown. The average peak cabin altitude on 207 flights aboard 17 different aircraft was 6341 +/- 1813 ft (1933 m +/- 553 m), significantly higher than when measured in a similar fashion in 1988. Peak cabin altitude was significantly higher for flights longer than 750 mi (7085 +/- 801 ft) compared to shorter flights (5160 +/- 2290 ft/1573 +/- 698 m). Cabin altitude increased linearly with flight distance for flights up to 750 mi in length, but was independent of flight distance for flights exceeding 750 mi. Peak cabin altitude was less than 5000 ft (1524 m) in 70% of flights shorter than 500 mi. Peak cabin altitudes greater than 8000 ft (2438 m) were measured on approximately 10% of the total flights. Peak cabin altitude on commercial aircraft flights has risen over time. Cabin altitude is lower with flights of shorter distance. Physicians should take these factors into account when determining an individual's need for supplemental oxygen during commercial air travel.
Watanabe, Yuuki Y; Takahashi, Akinori; Sato, Katsufumi; Viviant, Morgane; Bost, Charles-André
Aerial flight and breath-hold diving present conflicting morphological and physiological demands, and hence diving seabirds capable of flight are expected to face evolutionary trade-offs regarding locomotory performances. We tested whether Kerguelen shags Phalacrocorax verrucosus, which are remarkable divers, have poor flight capability using newly developed tags that recorded their flight air speed (the first direct measurement for wild birds) with propeller sensors, flight duration, GPS position and depth during foraging trips. Flight air speed (mean 12.7 m s(-1)) was close to the speed that minimizes power requirement, rather than energy expenditure per distance, when existing aerodynamic models were applied. Flights were short (mean 92 s), with a mean summed duration of only 24 min day(-1). Shags sometimes stayed at the sea surface without diving between flights, even on the way back to the colony, and surface durations increased with the preceding flight durations; these observations suggest that shags rested after flights. Our results indicate that their flight performance is physiologically limited, presumably compromised by their great diving capability (max. depth 94 m, duration 306 s) through their morphological adaptations for diving, including large body mass (enabling a large oxygen store), small flight muscles (to allow for large leg muscles for underwater propulsion) and short wings (to decrease air volume in the feathers and hence buoyancy). The compromise between flight and diving, as well as the local bathymetry, shape the three-dimensional foraging range (<26 km horizontally, <94 m vertically) in this bottom-feeding cormorant.
Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia
The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...
Bosworth, Kris; Ford, Lysbeth; Hernandaz, Diley
To ensure that schools are safe places where students can learn, researchers and educators must understand student and faculty safety concerns. This study examines student and teacher perceptions of school safety. Twenty-two focus groups with students and faculty were conducted in 11 secondary schools. Schools were selected from a stratified sample to vary in location, proximity to Indian reservations, size, and type. The data analysis was based on grounded theory. In 9 of 11 schools, neither faculty nor students voiced overwhelming concerns about safety. When asked what makes school safe, students tended to report physical security features. School climate and staff actions also increased feelings of safety. Faculty reported that relationships and climate are key factors in making schools safe. High student performance on standardized tests does not buffer students from unsafe behavior, nor does living in a dangerous neighborhood necessarily lead to more drug use or violence within school walls. School climate seemed to explain the difference between schools in which students and faculty reported higher versus lower levels of violence and alcohol and other drug use. The findings raise provocative questions about school safety and provide insight into elements that lead to perceptions of safety. Some schools have transcended issues of location and neighborhood to provide an environment perceived as safe. Further study of those schools could provide insights for policy makers, program planners, and educational leaders. © 2011, American School Health Association.
Zirkel, Perry A.
Given their pivotal position, school psychologists have understandable concerns about the possibility of becoming the target of the relatively frequent legal proceedings under the Individuals with Disabilities Education Act (IDEA). Indeed, the threat of litigation can contribute to a flight from the profession (Lange, 2011). Yet, an informal…
Oldfield, Jeremy; Stevenson, Andrew; Ortiz, Emily; Haley, Bethany
Adolescent attachment relationships formed with parents are salient predictors of mental health. Few studies, however, have demonstrated whether peer attachment or school connectedness can predict resilience to mental health difficulties when a young person is at risk due to poor parental attachment. Ninety adolescents (44 females and 46 males) living in economically disadvantaged areas and attending informal schooling projects in and around Guatemala City participated. Participants completed self-report measures of parental and peer attachment, school connectedness and mental health. Resilience to mental health difficulties was predicted by more secure school connectedness but lower levels of secure peer attachment. School connectedness may provide a role in promoting resilience for mental health for adolescents living in risk, whereas the potential negative influence that secure attachments to peers exerts, in context of poor parental attachment, needs to be explored further. Crown Copyright © 2018. Published by Elsevier Ltd. All rights reserved.
Rouhiainen, V. (ed.)
VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)
This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...
Lineberry, Michelle J.; Ickes, Melinda J.
School nurses are tasked with the critical job of keeping students safe and well. Due to competing demands for resources in schools, the impact of school nurses must be demonstrated to secure their jobs. A systematic review of the literature from 1937 to 2013 was conducted to show the efficacy of school nursing activities in American elementary…
Burcham, Frank W., Jr.; Maine, Trindel A.; Burken, John J.; Pappas, Drew
An emergency flight control system using only engine thrust, called Propulsion-Controlled Aircraft (PCA), has been developed and flight tested on an MD-11 airplane. In this thrust-only control system, pilot flight path and track commands and aircraft feedback parameters are used to control the throttles. The PCA system was installed on the MD-11 airplane using software modifications to existing computers. Flight test results show that the PCA system can be used to fly to an airport and safely land a transport airplane with an inoperative flight control system. In up-and-away operation, the PCA system served as an acceptable autopilot capable of extended flight over a range of speeds and altitudes. The PCA approaches, go-arounds, and three landings without the use of any non-nal flight controls have been demonstrated, including instrument landing system-coupled hands-off landings. The PCA operation was used to recover from an upset condition. In addition, PCA was tested at altitude with all three hydraulic systems turned off. This paper reviews the principles of throttles-only flight control; describes the MD-11 airplane and systems; and discusses PCA system development, operation, flight testing, and pilot comments.
Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard
Peltier, Thomas R
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r
Computer Security Team
Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710. Winners must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally… …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...
Kinsey, Christopher; Krieg, Andreas
With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...
Smith, Scott M.
Adequate nutrition is critical for maintenance of crew health during and after extended-duration space flight. The impact of weightlessness on human physiology is profound, with effects on many systems related to nutrition, including bone, muscle, hematology, fluid and electrolyte regulation. Additionally, we have much to learn regarding the impact of weightlessness on absorption, mtabolism , and excretion of nutrients, and this will ultimately determine the nutrient requirements for extended-duration space flight. Existing nutritional requirements for extended-duration space flight have been formulated based on limited flight research, and extrapolation from ground-based research. NASA's Nutritional Biochemistry Laboratory is charged with defining the nutritional requirements for space flight. This is accomplished through both operational and research projects. A nutritional status assessment program is included operationally for all International Space Station astronauts. This medical requirement includes biochemical and dietary assessments, and is completed before, during, and after the missions. This program will provide information about crew health and nutritional status, and will also provide assessments of countermeasure efficacy. Ongoing research projects include studies of calcium and bone metabolism, and iron absorption and metabolism. The calcium studies include measurements of endocrine regulation of calcium homeostasis, biochemical marker of bone metabolism, and tracer kinetic studies of calcium movement in the body. These calcium kinetic studies allow for estimation of intestinal absorption, urinary excretion, and perhaps most importantly - deposition and resorption of calcium from bone. The Calcium Kinetics experiment is currently being prepared for flight on the Space Shuttle in 2001, and potentially for subsequent Shuttle and International Space Station missions. The iron study is intended to assess whether iron absorption is down-regulated dUl1ng
Hendricks, R. C.
Synthetic and biomass fueling are now considered to be near-term aviation alternate fueling. The major impediment is a secure sustainable supply of these fuels at reasonable cost. However, biomass fueling raises major concerns related to uses of common food crops and grasses (some also called "weeds") for processing into aviation fuels. These issues are addressed, and then halophytes and algae are shown to be better suited as sources of aerospace fuels and transportation fueling in general. Some of the history related to alternate fuels use is provided as a guideline for current and planned alternate fuels testing (ground and flight) with emphasis on biofuel blends. It is also noted that lessons learned from terrestrial fueling are applicable to space missions. These materials represent an update (to 2009) and additions to the Workshop on Alternate Fueling Sustainable Supply and Halophyte Summit at Twinsburg, Ohio, October 17 to 18, 2007.
Nursel TÜRKMEN, Delia; Halis DOKGÖZ, Mihai; Semra AKGÖZ, Suzana; Bülent EREN, Bogdan Nicolae; Pınar VURAL, Horatiu; Oğuz POLAT, Horatiu
ABSTRACT Objective: The main aim of this research is to investigate the prevalence of bullying behaviour, its victims and the types of bullying and places of bullying among 14-17 year-old adolescents in a sample of school children in Bursa, Turkey. Methodology: A cross-sectional survey questionnaire was conducted among class 1 and class 2 high school students for identification bullying. Results: Majority (96.7%) of the students were involved in bullying behaviours as aggressors or victims. For a male student, the likelihood of being involved in violent behaviours was detected to be nearly 8.4 times higher when compared with a female student. Conclusion: a multidisciplinary approach involving affected children, their parents, school personnel, media, non-govermental organizations, and security units is required to achieve an effective approach for the prevention of violence targeting children in schools as victims and/or perpetrators. PMID:24371478
Azam, Mohammad; Pattipati, Krishna; Allanach, Jeffrey; Poll, Scott; Patterson-Hine, Ann
In this paper we consider the problem of test design for real-time fault detection and isolation (FDI) in the flight control system of fixed-wing aircraft. We focus on the faults that are manifested in the control surface elements (e.g., aileron, elevator, rudder and stabilizer) of an aircraft. For demonstration purposes, we restrict our focus on the faults belonging to nine basic fault classes. The diagnostic tests are performed on the features extracted from fifty monitored system parameters. The proposed tests are able to uniquely isolate each of the faults at almost all severity levels. A neural network-based flight control simulator, FLTZ(Registered TradeMark), is used for the simulation of various faults in fixed-wing aircraft flight control systems for the purpose of FDI.
Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)
The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.
Winkler, Vic (JR)
As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o
Wood, Megan A; Bukowski, William M; Santo, Jonathan B
A two-wave longitudinal study of 380 preadolescents (M age = 10.87) from largely middle-class schools in Montréal, Québec, Canada, assessed the hypothesis that friendship security, but not friendship intimacy, moderates the stability of anxiety during adolescence. This central but largely overlooked question about peer relations concerns which aspects of friendship account for the effects of friendship on emotional adjustment. Anxiety and friendship quality were measured via self-report questionnaires, employing the Network of Relationships Inventory for security and intimacy items. An index of friendship durability, which combined reciprocity and stability within first- and second-best friendship choices, was derived from sociometric measures. A latent variable path analysis examined with structural equation modeling showed that anxiety was less stable for children who perceived their friendships as secure. The moderating effect of intimacy was statistically nonsignificant. A follow-up analysis showed that the effects of security did not result from friendship durability. These findings provide support for the long-standing but previously unaddressed hypothesis that security, rather than intimacy, accounts for friendship's effect on anxiety reduction during early adolescence.
Full Text Available In order to incorporate airworthiness requirements for flight characteristics into the entire development cycle of electronic flight control system (EFCS equipped civil aircraft, digital virtual flight testing and evaluation method based on handling qualities rating method (HQRM is proposed. First, according to HQRM, flight characteristics airworthiness requirements of civil aircraft in EFCS failure states are determined. On this basis, digital virtual flight testing model, comprising flight task digitized model, pilot controlling model, aircraft motion and atmospheric turbulence model, is used to simulate the realistic process of a pilot controlling an airplane to perform assigned flight tasks. According to the simulation results, flight characteristics airworthiness compliance of the airplane can be evaluated relying on the relevant regulations for handling qualities (HQ rating. Finally, this method is applied to a type of passenger airplane in a typical EFCS failure state, and preliminary conclusions concerning airworthiness compliance are derived quickly. The research results of this manuscript can provide important theoretical reference for EFCS design and actual airworthiness compliance verification of civil aircraft.
Lo Yuk-ping, Catherine; Thomas, Nicholas
In the closing decade of the 20th century the myriad challenges posed by infectious disease in a globalized environment began to be re-conceptualized as threats to national and human security. The most widely applied model for identifying and responding to such threats is securitization theory, as proposed by the Copenhagen School. Although its analytical framework is generally accepted, its utility remains contested; especially in non-European and non-state settings. The papers in this special edition have several aims: (1) to analyse ways by which Asian states and international organizations have identified health challenges as security threats, (2) to draw upon the securitization model as a way of understanding the full extent to which these states and international organizations have responded to the health threat, and (3) to identify areas where the theory might be strengthened so as to provide greater analytical clarity in areas of health security. This paper acts as a broad introduction to a set of papers on 'Unhealthy governance' and explores some of the key findings from the subsequent papers.
Post, Ethan A.; Dupzyk, Ian C.; Korzun, Ashley M.; Dyakonov, Artem A.; Tanimoto, Rebekah L.; Edquist, Karl T.
NASA's Exploration Technology Development and Demonstration Program has proposed plans for a series of three sub-scale flight tests at Earth for supersonic retropropulsion, a candidate decelerator technology for future, high-mass Mars missions. The first flight test in this series is intended to be a proof-of-concept test, demonstrating successful initiation and operation of supersonic retropropulsion at conditions that replicate the relevant physics of the aerodynamic-propulsive interactions expected in flight. Five sub-scale flight test article concepts, each designed for launch on sounding rockets, have been developed in consideration of this proof-of-concept flight test. Commercial, off-the-shelf components are utilized as much as possible in each concept. The design merits of the concepts are compared along with their predicted performance for a baseline trajectory. The results of a packaging study and performance-based trade studies indicate that a sounding rocket is a viable launch platform for this proof-of-concept test of supersonic retropropulsion.
...) Minimum After Duty Rest Period for Multi-Time Zone Flights 18 hours 24 hours ...) AIR TRAFFIC AND GENERAL OPERATING RULES GENERAL OPERATING AND FLIGHT RULES Fractional Ownership... crewmember, and no flight crewmember may accept an assignment, for flight time as a member of an augmented...
Shattuck, Paul L.; Lowrie, James W.
The Flight Telerobotic Servicer (FTS) was developed to enhance and provide a safe alternative to human presence in space. The first step for this system was a precursor development test flight (DTF-1) on the Space Shuttle. DTF-1 was to be a pathfinder for manned flight safety of robotic systems. The broad objectives of this mission were three-fold: flight validation of telerobotic manipulator (design, control algorithms, man/machine interfaces, safety); demonstration of dexterous manipulator capabilities on specific building block tasks; and correlation of manipulator performance in space with ground predictions. The DTF-1 system is comprised of a payload bay element (7-DOF manipulator with controllers, end-of-arm gripper and camera, telerobot body with head cameras and electronics module, task panel, and MPESS truss) and an aft flight deck element (force-reflecting hand controller, crew restraint, command and display panel and monitors). The approach used to develop the DTF-1 hardware, software and operations involved flight qualification of components from commercial, military, space, and R controller, end-of-arm tooling, force/torque transducer) and the development of the telerobotic system for space applications. The system is capable of teleoperation and autonomous control (advances state of the art); reliable (two-fault tolerance); and safe (man-rated). Benefits from the development flight included space validation of critical telerobotic technologies and resolution of significant safety issues relating to telerobotic operations in the Shuttle bay or in the vicinity of other space assets. This paper discusses the lessons learned and technology evolution that stemmed from developing and integrating a dexterous robot into a manned system, the Space Shuttle. Particular emphasis is placed on the safety and reliability requirements for a man-rated system as these are the critical factors which drive the overall system architecture. Other topics focused on include
Dalton, Bonnie P.; Searby, Nancy; Ostrach, Louis
Spacelab Life Sciences-3 (SLS-3) was scheduled to be the first United States man-tended microgravity flight containing Rhesus monkeys. The goal of this flight as in the five untended Russian COSMOS Bion flights and an earlier American Biosatellite flight, was to understand the biomedical and biological effects of a microgravity environment using the non-human primate as human surrogate. The SLS-3/Rhesus Project and COSMOS Primate-BIOS flights all utilized the rhesus monkey, Macaca mulatta. The ultimate objective of all flights with an animal surrogate has been to evaluate and understand biological mechanisms at both the system and cellular level, thus enabling rational effective countermeasures for future long duration human activity under microgravity conditions and enabling technical application to correction of common human physiological problems within earth's gravity, e.g., muscle strength and reloading, osteoporosis, immune deficiency diseases. Hardware developed for the SLS-3/Rhesus Project was the result of a joint effort with the French Centre National d'Etudes Spatiales (CNES) and the United States National Aeronautics and Space Administration (NASA) extending over the last decade. The flight hardware design and development required implementation of sufficient automation to insure flight crew and animal bio-isolation and maintenance with minimal impact to crew activities. A variety of hardware of varying functional capabilities was developed to support the scientific objectives of the original 22 combined French and American experiments, along with 5 Russian co-investigations, including musculoskeletal, metabolic, and behavioral studies. Unique elements of the Rhesus Research Facility (RRF) included separation of waste for daily delivery of urine and fecal samples for metabolic studies and a psychomotor test system for behavioral studies along with monitored food measurement. As in untended flights, telemetry measurements would allow monitoring of
Rose, Barbara L; Mansour, Mona; Kohake, Kelli
The Cincinnati School Health Demonstration Project was a 3-year collaboration that evaluated school-linked health services in 6 urban elementary (kindergarten to eighth grade) schools. Partners from the Cincinnati Health Department, Cincinnati Public Schools, Cincinnati Children's Hospital Medical Center, and The Health Foundation of Greater Cincinnati wanted to determine if levels of school-linked care made a difference in student quality of life, school connectedness, attendance, emergency department use, and volume of referrals to health care specialists. School nurses, principals and school staff, parents and students, upper-level managers, and health service researchers worked together over a 2.5-year period to learn about and use new technology to collect information on student health, well-being, and outcome measures. Varying levels of school health care intervention models were instituted and evaluated. A standard model of care was compared with 2 models of enhanced care and service. The information collected from students, parents, nurses, and the school system provided a rich database on the health of urban children. School facilities, staffing, and computer technology, relationship building among stakeholders, extensive communication, and high student mobility were factors that influenced success and findings of the project. Funding for district-wide computerization and addition of school health staff was not secured by the end of the demonstration project; however, relationships among the partners endured and paved the way for future collaborations designed to better serve urban school children in Cincinnati.
NASA's Low Density Supersonic Decelerator (LDSD) program was established to identify, develop, and eventually qualify to Test [i.e. Technology] Readiness Level (TRL) - 6 aerodynamic decelerators for eventual use on Mars. Through comprehensive Mars application studies, two distinct Supersonic Inflatable Aerodynamic Decelerator (SIAD) designs were chosen that afforded the optimum balance of benefit, cost, and development risk. In addition, a Supersonic Disk Sail (SSDS) parachute design was chosen that satisfied the same criteria. The final phase of the multi-tiered qualification process involves Earth Supersonic Flight Dynamics Tests (SFDTs) within environmental conditions similar to those that would be experienced during a Mars Entry, Descent, and Landing (EDL) mission. The first of these flight tests (i.e. SFDT-1) was completed on June 28, 2014 with two more tests scheduled for the summer of 2015 and 2016, respectively. The basic flight design for all the SFDT flights is for the SFDT test vehicle to be ferried to a float altitude of 120 kilo-feet by a 34 thousand cubic feet (Mcf) heavy lift helium balloon. Once float altitude is reached, the test vehicle is released from the balloon, spun-up for stability, and accelerated to supersonic speeds using a Star48 solid rocket motor. After burnout of the Star48 motor the vehicle decelerates to pre-flight selected test conditions for the deployment of the SIAD system. After further deceleration with the SIAD deployed, the SSDS parachute is then deployed stressing the performance of the parachute in the wake of the SIAD augmented blunt body. The test vehicle/SIAD/parachute system then descends to splashdown in the Pacific Ocean for eventual recovery. This paper will discuss the development of both the test vehicle and the trajectory sequence including design trade-offs resulting from the interaction of both engineering efforts. In addition, the SFDT-1 nominal trajectory design and associated sensitivities will be discussed
Miller, Mark S.; Lekkas, Panagiotis; Braddock, Joan M.; Farman, Gerrie P.; Ballif, Bryan A.; Irving, Thomas C.; Maughan, David W.; Vigoreaux, Jim O. (IIT); (Vermont)
We investigated the effects of aging on Drosophila melanogaster indirect flight muscle from the whole organism to the actomyosin cross-bridge. Median-aged (49-day-old) flies were flight impaired, had normal myofilament number and packing, barely longer sarcomeres, and slight mitochondrial deterioration compared with young (3-day-old) flies. Old (56-day-old) flies were unable to beat their wings, had deteriorated ultrastructure with severe mitochondrial damage, and their skinned fibers failed to activate with calcium. Small-amplitude sinusoidal length perturbation analysis showed median-aged indirect flight muscle fibers developed greater than twice the isometric force and power output of young fibers, yet cross-bridge kinetics were similar. Large increases in elastic and viscous moduli amplitude under active, passive, and rigor conditions suggest that median-aged fibers become stiffer longitudinally. Small-angle x-ray diffraction indicates that myosin heads move increasingly toward the thin filament with age, accounting for the increased transverse stiffness via cross-bridge formation. We propose that the observed protein composition changes in the connecting filaments, which anchor the thick filaments to the Z-disk, produce compensatory increases in longitudinal stiffness, isometric tension, power and actomyosin interaction in aging indirect flight muscle. We also speculate that a lack of MgATP due to damaged mitochondria accounts for the decreased flight performance.
... the Rehabilitation Act Title V of the Social Security Act The Americans with Disabilities Act (ADA) Who is it for? • All school-age children Children with an identiﬁed disability who are: • Infants ...
Davis, S. R.; Tuma, M. L.; Heitzman, K.
In response to the Vision for Space Exploration, the National Aeronautics and Space Administration (NASA) has defined a new space exploration architecture to return humans to the Moon and prepare for human exploration of Mars. One of the first new developments will be the Ares I Crew Launch Vehicle (CLV), which will carry the Orion Crew Exploration Vehicle (CEV), into Low Earth Orbit (LEO) to support International Space Station (ISS) missions and, later, support lunar missions. As part of Ares I development, NASA will perform a series of Ares I flight tests. The tests will provide data that will inform the engineering and design process and verify the flight hardware and software. The data gained from the flight tests will be used to certify the new Ares/Orion vehicle for human space flight. The primary objectives of this first flight test (Ares I-X) are the following: Demonstrate control of a dynamically similar integrated Ares CLV/Orion CEV using Ares CLV ascent control algorithms; Perform an in-flight separation/staging event between an Ares I-similar First Stage and a representative Upper Stage; Demonstrate assembly and recovery of a new Ares CLV-like First Stage element at Kennedy Space Center (KSC); Demonstrate First Stage separation sequencing, and quantify First Stage atmospheric entry dynamics and parachute performance; and Characterize the magnitude of the integrated vehicle roll torque throughout the First Stage (powered) flight. This paper will provide an overview of the Ares I-X flight test process and details of the individual flight tests.
Olama, Mohammed M.; Nutaro, James
The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.
Full Text Available We demonstrated the remote control of insects in free flight via an implantable radio-equipped miniature neural stimulating system. The pronotum mounted system consisted of neural stimulators, muscular stimulators, a radio transceiver-equipped microcontroller and a microbattery. Flight initiation, cessation and elevation control were accomplished through neural stimulus of the brain which elicited, suppressed or modulated wing oscillation. Turns were triggered through the direct muscular stimulus of either of the basalar muscles. We characterized the response times, success rates, and free-flight trajectories elicited by our neural control systems in remotely-controlled beetles. We believe this type of technology will open the door to in-flight perturbation and recording of insect flight responses.
Sato, Hirotaka; Berry, Christopher W; Peeri, Yoav; Baghoomian, Emen; Casey, Brendan E; Lavella, Gabriel; Vandenbrooks, John M; Harrison, Jon F; Maharbiz, Michel M
We demonstrated the remote control of insects in free flight via an implantable radio-equipped miniature neural stimulating system. The pronotum mounted system consisted of neural stimulators, muscular stimulators, a radio transceiver-equipped microcontroller and a microbattery. Flight initiation, cessation and elevation control were accomplished through neural stimulus of the brain which elicited, suppressed or modulated wing oscillation. Turns were triggered through the direct muscular stimulus of either of the basalar muscles. We characterized the response times, success rates, and free-flight trajectories elicited by our neural control systems in remotely controlled beetles. We believe this type of technology will open the door to in-flight perturbation and recording of insect flight responses.
Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should
Morelli, Eugene A.
Novel flight test maneuvers for efficient aerodynamic modeling were developed and demonstrated in flight. Orthogonal optimized multi-sine inputs were applied to aircraft control surfaces to excite aircraft dynamic response in all six degrees of freedom simultaneously while keeping the aircraft close to chosen reference flight conditions. Each maneuver was designed for a specific modeling task that cannot be adequately or efficiently accomplished using conventional flight test maneuvers. All of the new maneuvers were first described and explained, then demonstrated on a subscale jet transport aircraft in flight. Real-time and post-flight modeling results obtained using equation-error parameter estimation in the frequency domain were used to show the effectiveness and efficiency of the new maneuvers, as well as the quality of the aerodynamic models that can be identified from the resultant flight data.
Luiijf, H.A.M.; Lüders, S.
A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in
Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.
Musita, Richard; Ogange, Betty O.; Lugendo, Dorine
The Kenyan education system has very limited re-entry options for learners who drop out before attaining secondary school certificate. It is very difficult to access training and or secure a job that requires at least secondary school education. This study examined the prospects of initiating Open and Distance e-Learning(ODeL) in re-entry…
Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.
There are significant fuel consumption consequences for non-optimal flight operations. This study is intended to analyze and highlight areas of interest that affect fuel consumption in typical flight operations. By gathering information from actual flight operators (pilots, dispatch, performance engineers, and air traffic controllers), real performance issues can be addressed and analyzed. A series of interviews were performed with various individuals in the industry and organizations. The wide range of insight directed this study to focus on FAA regulations, airline policy, the ATC system, weather, and flight planning. The goal is to highlight where operational performance differs from design intent in order to better connect optimization with actual flight operations. After further investigation and consensus from the experienced participants, the FAA regulations do not need any serious attention until newer technologies and capabilities are implemented. The ATC system is severely out of date and is one of the largest limiting factors in current flight operations. Although participants are pessimistic about its timely implementation, the FAA's NextGen program for a future National Airspace System should help improve the efficiency of flight operations. This includes situational awareness, weather monitoring, communication, information management, optimized routing, and cleaner flight profiles like Required Navigation Performance (RNP) and Continuous Descent Approach (CDA). Working off the interview results, trade-studies were performed using an in-house flight profile simulation of a Boeing 737-300, integrating NASA legacy codes EDET and NPSS with a custom written mission performance and point-performance "Skymap" calculator. From these trade-studies, it was found that certain flight conditions affect flight operations more than others. With weather, traffic, and unforeseeable risks, flight planning is still limited by its high level of precaution. From this
E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security test and security event detection procedures, this paper proposes the Two-Layer Secure ...
Joldersma, Clarence W.
The article argues for welcoming LGBT students in Christian schools. The article develops an idea of justice based on Nicholas Wolterstorff's idea of claim-rights of vulnerable groups that have been wronged, and applies this to the security and recognition of LGBT students in Christian schools. The article presents empirical evidence about the…
Moss, Ellen; St-Laurent, Diane
Examined longitudinally the association between attachment at age 6 and school-related cognitive functioning 2 years later in a French Canadian sample. Found that secure children had higher scores than insecure peers on communication, cognitive engagement, and mastery motivation. Controlling children were at greatest risk for school…
Renstrom, Arthur G. (Compiler); Goldblatt, Roberta W.; Minkus, Carl; Berube, Karen L.; Launius, Roger (Technical Monitor)
This annotated bibliography of material about Wilbur and Orville Wright and the first powered flight, commemorates the one hundredth anniversary of the event. This publication represents an updated version of the classic, "Wilbur and Orville Wright: A Bibliography Commemorating the Hundredth Anniversary of the Birth of Wilbur Wright, April 16, 1867" which was originally published in 1968. Aspects of the Wright brothers' lives covered include: their published writings, biographical references, airplanes used and flight records, airplane components, patents, court records, Wright companies and schools, the Wright-Smithsonian controversy, monuments and museums, memorials, medals and honors, memorabilia, art, poetry, music, motion pictures and juvenile publications. An index is included.
... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Flight engineer requirements. 125.265... Requirements § 125.265 Flight engineer requirements. (a) No person may operate an airplane for which a flight engineer is required by the type certification requirements without a flight crewmember holding a current...
Bomben, Craig R.; Smolka, James W.; Bosworth, John T.; Silliams-Hayes, Peggy S.; Burken, John J.; Larson, Richard R.; Buschbacher, Mark J.; Maliska, Heather A.
The Intelligent Flight Control System (IFCS) project at the NASA Dryden Flight Research Center, Edwards AFB, CA, has been investigating the use of neural network based adaptive control on a unique NF-15B test aircraft. The IFCS neural network is a software processor that stores measured aircraft response information to dynamically alter flight control gains. In 2006, the neural network was engaged and allowed to learn in real time to dynamically alter the aircraft handling qualities characteristics in the presence of actual aerodynamic failure conditions injected into the aircraft through the flight control system. The use of neural network and similar adaptive technologies in the design of highly fault and damage tolerant flight control systems shows promise in making future aircraft far more survivable than current technology allows. This paper will present the results of the IFCS flight test program conducted at the NASA Dryden Flight Research Center in 2006, with emphasis on challenges encountered and lessons learned.
... section, may have a flight engineer certificate issued to him for the operation of civil aircraft of U.S... engineer certificate issued under this section may act as a flight engineer of a civil aircraft of U.S... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Flight engineer certificate issued on basis...
... instructor certificate— (i) The fundamental principles of the teaching-learning process; (ii) Teaching... Management § 91.1095 Initial and transition training and checking: Flight instructors (aircraft), flight...
Tanner, M. James
Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...
Chhabra, Siddhartha; Solihin, Yan
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.
...-0938; Amendment Nos. 61-128, 91-324, 141-15, and 142-7] RIN 2120-AJ18 Pilot in Command Proficiency Check and Other Changes to the Pilot and Pilot School Certification Rules; Correction AGENCY: Federal... regulations to revise the pilot, flight instructor, and pilot school certification requirements. In particular...
SECURITY CLASSIFICATION OF: (U) 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 70 19a. NAME OF RESPONSIBLE PERSON Thomas C. Graves COL, U.S...Monograph Director Scott Gorman, Ph.D. ___________________________________ Director, Thomas C. Graves, COL, IN School of Advanced Military...a broad network of dairy farms, milk processing facilities, cattle feed lots, poultry farms, and fish farms. The military produced eighteen percent
www.npia.police.uk Polonium 210 Interoperability - lessons Major Incident - CBRN Images courtesy of BBC www.npia.police.uk Boscastle 2007...Washington Training Session 37: Preparing First Responders for Food Systems Disasters Jerry Gillespie, DVM, PhD Director, Western Institute for... Food Safety and Security Training Session 39: Technology Adoption & Innovation 1 Dr. Neal Thornberry, Innovation Chair Graduate School of
Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.
Pereira, Teresa; Santos, Henrique
The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.
... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Flight engineer. 121.387 Section 121.387..., FLAG, AND SUPPLEMENTAL OPERATIONS Airman and Crewmember Requirements § 121.387 Flight engineer. No... holding a current flight engineer certificate. For each airplane type certificated after January 1, 1964...
Lundgren, Björn; Möller, Niklas
This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.
Nene, Wilson; Rwegasira, Gration; Nielsen, Mogens Gissel
years, we found that sexuals aggregate on nest surfaces prior to flights. We also found that flights took place during the raining season, and all flights took place in evenings just before sunset. Further to these, days with flights were associated with higher relative humidity and less sun shine...... collection of mated queens to stock ant nurseries that supply ant colonies for IPM-programs....
Burcham, Frank W., Jr.; Gatlin, Donald H.; Stewart, James F.
The NASA Dryden Flight Research Center has been conducting integrated flight-propulsion control flight research using the NASA F-15 airplane for the past 12 years. The research began with the digital electronic engine control (DEEC) project, followed by the F100 Engine Model Derivative (EMD). HIDEC (Highly Integrated Digital Electronic Control) became the umbrella name for a series of experiments including: the Advanced Digital Engine Controls System (ADECS), a twin jet acoustics flight experiment, self-repairing flight control system (SRFCS), performance-seeking control (PSC), and propulsion controlled aircraft (PCA). The upcoming F-15 project is ACTIVE (Advanced Control Technology for Integrated Vehicles). This paper provides a brief summary of these activities and provides background for the PCA and PSC papers, and includes a bibliography of all papers and reports from the NASA F-15 project.
Dunn Cavelty, Myriam
Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.
The Theseus prototype research aircraft takes off for its first test flight from NASA's Dryden Flight Research Center, Edwards, California, on May 24, 1996. The Theseus aircraft, built and operated by Aurora Flight Sciences Corporation, Manassas, Virginia, was a unique aircraft flown at NASA's Dryden Flight Research Center, Edwards, California, under a cooperative agreement between NASA and Aurora. Dryden hosted the Theseus program, providing hangar space and range safety for flight testing. Aurora Flight Sciences was responsible for the actual flight testing, vehicle flight safety, and operation of the aircraft. The Theseus remotely piloted aircraft flew its maiden flight on May 24, 1996, at Dryden. During its sixth flight on November 12, 1996, Theseus experienced an in-flight structural failure that resulted in the loss of the aircraft. As of the beginning of the year 2000, Aurora had not rebuilt the aircraft. Theseus was built for NASA under an innovative, $4.9 million fixed-price contract by Aurora Flight Sciences Corporation and its partners, West Virginia University, Morgantown, West Virginia, and Fairmont State College, Fairmont, West Virginia. The twin-engine, unpiloted vehicle had a 140-foot wingspan, and was constructed largely of composite materials. Powered by two 80-horsepower, turbocharged piston engines that drove twin 9-foot-diameter propellers, Theseus was designed to fly autonomously at high altitudes, with takeoff and landing under the active control of a ground-based pilot in a ground control station 'cockpit.' With the potential ability to carry 700 pounds of science instruments to altitudes above 60,000 feet for durations of greater than 24 hours, Theseus was intended to support research in areas such as stratospheric ozone depletion and the atmospheric effects of future high-speed civil transport aircraft engines. Instruments carried aboard Theseus also would be able to validate satellite-based global environmental change measurements. Dryden
This study investigates a novel approach to flight control for a compound rotorcraft in a variety of maneuvers ranging from fundamental to aerobatic in nature. Fundamental maneuvers are a class of maneuvers with design significance that are useful for testing and tuning flight control systems along with uncovering control law deficiencies. Aerobatic maneuvers are a class of aggressive and complex maneuvers with more operational significance. The process culminating in a unified approach to flight control includes various control allocation studies for redundant controls in trim and maneuvering flight, an efficient methodology to simulate non-piloted maneuvers with varying degrees of complexity, and the setup of an unconventional control inceptor configuration along with the use of a flight simulator to gather pilot feedback in order to improve the unified control architecture. A flight path generation algorithm was developed to calculate control inceptor commands required for a rotorcraft in aerobatic maneuvers. This generalized algorithm was tailored to generate flight paths through optimization methods in order to satisfy target terminal position coordinates or to minimize the total time of a particular maneuver. Six aerobatic maneuvers were developed drawing inspiration from air combat maneuvers of fighter jet aircraft: Pitch-Back Turn (PBT), Combat Ascent Turn (CAT), Combat Descent Turn (CDT), Weaving Pull-up (WPU), Combat Break Turn (CBT), and Zoom and Boom (ZAB). These aerobatic maneuvers were simulated at moderate to high advance ratios while fundamental maneuvers of the compound including level accelerations/decelerations, climbs, descents, and turns were investigated across the entire flight envelope to evaluate controller performance. The unified control system was developed to allow controls to seamlessly transition between manual and automatic allocations while ensuring that the axis of control for a particular inceptor remained constant with flight
SCHREURS, Jeanne; MOREAU, Rachel
Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...
Reno, V P; Grad, S
The economic well-being of both working and retired persons has improved significantly since the Social Security Act was passed in 1935. More people are employed now than at any time since then, despite declining employment among the aged and more years of school attendance among the young. The ratio of non-workers to workers--a broad measure of dependency--is lower now than at any time since the 1930's. Social security has grown and matured to become a strong foundation of retirement income, and other work-related employee benefits have grown in tandem with social security. Employer contributions for social insurance and related employee benefits have grown from being about a 1-percent supplement to aggregate wages and salaries in 1929 to nearly 20 percent today. Social security and Medicare account for just over a fourth of employer contributions, while other public and private retirement systems represent just over another fourth. The balance of benefits for active workers includes group health and life insurance, unemployment insurance, workers' compensation, temporary disability insurance, and related benefits. Pay for holidays, vacations, and sick leave is estimated to have increased from less than 1 percent of aggregate pay in 1929 to about 10 percent today. The improved economic status of the aged has been documented by a series of surveys beginning in 1941-42 and carried out from time to time until 1972 and biennially since 1976. The earlier surveys were supplemented with estimates from record data and tables from the Bureau of the Census. The income of the aged as a whole has grown by about 75 percent over the past 2 decades after taking inflation into account. The income of the aged as a whole grew faster than that of the nonaged in the 1970's and early 1980's when real social security benefits increased faster than inflation and wages lagged behind it. New beneficiaries in 1982 were in better health and were more likely to retire because they wanted to
Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus
Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...
... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Flight safety. 415.115 Section 415.115... TRANSPORTATION LICENSING LAUNCH LICENSE Safety Review and Approval for Launch of an Expendable Launch Vehicle From a Non-Federal Launch Site § 415.115 Flight safety. (a) Flight safety analysis. An applicant's...
Acts of violence at schools across the country committed by gun-wielding students in recent years have all too frequently, as we know by now, resulted in multiple casualties and widespread community grieving. Two of the shooting rampages noted in this report that attracted national and international media attention--one at West-side Middle School, Jonesboro, AR, on March 24, 1998, and the other at Columbine High School, Littleton, CO, on April 20, 1999--illustrate the importance of hospital preparedness and quick implementation of emergency disaster plans. In both instances, officials say their administrative, clinical, and security personnel were well prepared to handle the physical and emotional trauma caused by the tragedies. Meanwhile, a leading criminologist warns that the trend toward school violence likely will continue and provides tips for hospitals and their security directors.
COMMAND AGENCY: United States Army Strategic Defense Command. ACTION: Use of Ni63 Overvoltage Gap Switches in the Flight Termination Systems on Boosters...SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. I TITLE (Include Security Claification) Use of Ni63 ...U) 1 PERSONAL AUTHOR(S) Ni63 Environmental Assessment Team, Mr. Randy Gallien (Chairman) 1. TYPE OF REPORT 13b. TIME COVERED 14. DATE OF REPORT
Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...
An information security architecture is made up of several components. Each component in the architecture focuses on establishing acceptable levels of control. These controls are then applied to the operating environment of an organization. Functionally, information security architecture combines technical, practical, and cost-effective solutions to provide an adequate and appropriate level of security.Information Security Architecture: An Integrated Approach to Security in the Organization details the five key components of an information security architecture. It provides C-level executives
National Aeronautics and Space Administration — NASA's Ultra Long Duration Balloon (ULDB) program will soon make flights lasting up to 100 days. Some flights may generate high data rates and retrieving this data...
Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.
Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.
... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Flight safety. 417.107 Section 417.107... TRANSPORTATION LICENSING LAUNCH SAFETY Launch Safety Responsibilities § 417.107 Flight safety. (a) Flight safety... safety system that satisfies subpart D of this part as follows, unless § 417.125 applies. (1) In the...
Larose, Simon; Boivin, Michel
Compared adolescents attending college to adolescent nonenrollees and found that (1) college attendees experienced improved means of perceived security to parents, decreased perceptions of social support, and increased feelings of loneliness and social anxiety; and (2) perceived security to parents at end of high school predicted positive changes…
Wolpert, Gary R.
Security threads were first used to secure banknotes in the mid 1800's. The key to their anti-counterfeiting success was the fact that by being embedded in the paper, they became an integral part of the banknote substrate. Today, all major currencies still utilize this effective security feature. Technological developments have allowed security threads to evolve from a feature authenticated by only visual means to devices that incorporate both visual and machine detectable components. When viewed from the perspective of a thread being a carrier of various security technologies and the fact that they can be incorporated into the core substrate of banknotes, documents, labels, packaging and some high valued articles, it is clear that security threads will remain as effective security devices well into the future. This paper discusses a brief historical background of security threads, current visual and machine authentication technologies incorporated into threads today and a look to the future of threads as effective security devices.
This photograph shows the second Mini-Sniffer undergoing flight testing over Rogers Dry Lake in Edwards, California. This version of the Mini-Sniffer lacked the canard of the original version and had wing tips and tail booms added. The Mini-Sniffer was a remotely controlled, propeller-driven vehicle developed at the NASA Flight Research Center (which became the Dryden Flight Research Center, Edwards, California, in 1976) as a potential platform to sample the upper atmosphere for pollution. The vehicle, flown from 1975 to 1977, was one of the earliest attempts by NASA to develop an aircraft that could sense turbulence and measure natural and human-produced atmospheric pollutants at altitudes above 80,000 feet with a variable-load propeller that was never flight-tested. Three Mini-Sniffer vehicles were built. The number 1 Mini-Sniffer vehicle had swept wings with a span of 18 feet and canards on the nose. It flew 12 flights with the gas-powered engine at low altitudes of around 2,500 feet. The number 1 vehicle was then modified into version number 2 by removing the canards and wing rudders and adding wing tips and tail booms. Twenty flights were made with this version, up to altitudes of 20,000 feet. The number 3 vehicle had a longer fuselage, was lighter in weight, and was powered by the non-air-breathing hydrazine engine designed by NASA's Johnson Space Center in Houston, Texas. This version was designed to fly a 25-pound payload to an altitude of 70,000 feet for one hour or to climb to 90,000 feet and glide back. The number 3 Mini-Sniffer made one flight to 20,000 feet and was not flown again because of a hydrazine leak problem. All three versions used a pusher propeller to free the nose area for an atmospheric-sampling payload. At various times the Mini-Sniffer has been considered for exploration in the carbon dioxide atmosphere of the planet Mars, where the gravity (38 percent of that on Earth) would reduce the horsepower needed for flight.
Tipton, Harold F
Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.
... [Docket No.: FAA-2008-0938; Amendment Nos. 61-128, 91-324, 141-15, and 142-7] RIN 2120-AJ18 Pilot in Command Proficiency Check and Other Changes to the Pilot and Pilot School Certification Rules AGENCY... regulations concerning pilot, flight instructor, and pilot school certification. This rule will require pilot...
Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de
HOMELAND SECURITY: INSIGHTS FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM by Marissa D. Madrigal March 2018 Thesis Advisor...FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM 5. FUNDING NUMBERS 6. AUTHOR(S) Marissa D. Madrigal 7. PERFORMING ORGANIZATION NAME(S) AND...how activation of the neurobiological security- motivation system can lead to securitization in response to a security speech act. It explores the model
Hoang, Ty; Murphy, Jim; Otto, Neil
The desire and ability to fly Unmanned Aircraft Systems (UAS) in the National Airspace System (NAS) is of increasing urgency. The application of unmanned aircraft to perform national security, defense, scientific, and emergency management are driving the critical need for less restrictive access by UAS to the NAS. UAS represent a new capability that will provide a variety of services in the government (public) and commercial (civil) aviation sectors. The growth of this potential industry has not yet been realized due to the lack of a common understanding of what is required to safely operate UAS in the NAS. NASA's UAS Integration in the NAS Project is conducting research in the areas of Separation Assurance/Sense and Avoid Interoperability (SSI), Human Systems Integration (HSI), and Communications (Comm), and Certification to support reducing the barriers of UAS access to the NAS. This research is broken into two research themes namely, UAS Integration and Test Infrastructure. UAS Integration focuses on airspace integration procedures and performance standards to enable UAS integration in the air transportation system, covering Detect and Avoid (DAA) performance standards, command and control performance standards, and human systems integration. The focus of Test Infrastructure is to enable development and validation of airspace integration procedures and performance standards, including integrated test and evaluation. In support of the integrated test and evaluation efforts, the Project will develop an adaptable, scalable, and schedulable relevant test environment capable of evaluating concepts and technologies for unmanned aircraft systems to safely operate in the NAS. To accomplish this task, the Project is conducting a series of human-in-the-loop (HITL) and flight test activities that integrate key concepts, technologies and/or procedures in a relevant air traffic environment. Each of the integrated events will build on the technical achievements, fidelity, and
A viewgraph presentation on the lessons learned and flight results from the F15 Intelligent Flight Control System (IFCS) project is shown. The topics include: 1) F-15 IFCS Project Goals; 2) Motivation; 3) IFCS Approach; 4) NASA F-15 #837 Aircraft Description; 5) Flight Envelope; 6) Limited Authority System; 7) NN Floating Limiter; 8) Flight Experiment; 9) Adaptation Goals; 10) Handling Qualities Performance Metric; 11) Project Phases; 12) Indirect Adaptive Control Architecture; 13) Indirect Adaptive Experience and Lessons Learned; 14) Gen II Direct Adaptive Control Architecture; 15) Current Status; 16) Effect of Canard Multiplier; 17) Simulated Canard Failure Stab Open Loop; 18) Canard Multiplier Effect Closed Loop Freq. Resp.; 19) Simulated Canard Failure Stab Open Loop with Adaptation; 20) Canard Multiplier Effect Closed Loop with Adaptation; 21) Gen 2 NN Wts from Simulation; 22) Direct Adaptive Experience and Lessons Learned; and 23) Conclusions
According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…
Ivo G. Ros
Full Text Available Similar flight control principles operate across insect and vertebrate fliers. These principles indicate that robust solutions have evolved to meet complex behavioral challenges. Following from studies of visual and cervical feedback control of flight in insects, we investigate the role of head stabilization in providing feedback cues for controlling turning flight in pigeons. Based on previous observations that the eyes of pigeons remain at relatively fixed orientations within the head during flight, we test potential sensory control inputs derived from head and body movements during 90° aerial turns. We observe that periods of angular head stabilization alternate with rapid head repositioning movements (head saccades, and confirm that control of head motion is decoupled from aerodynamic and inertial forces acting on the bird's continuously rotating body during turning flapping flight. Visual cues inferred from head saccades correlate with changes in flight trajectory; whereas the magnitude of neck bending predicts angular changes in body position. The control of head motion to stabilize a pigeon's gaze may therefore facilitate extraction of important motion cues, in addition to offering mechanisms for controlling body and wing movements. Strong similarities between the sensory flight control of birds and insects may also inspire novel designs of robust controllers for human-engineered autonomous aerial vehicles.
... the FAA. (a) A person may credit flight training toward the requirements of a pilot certificate or... flight instructor described in paragraph (a) of this section is only authorized to give endorsements to...
This photo shows the X-36 Tailless Fighter Agility Research Aircraft passing over the edge of Rogers Dry Lake as the remotely-piloted aircraft flies over Edwards Air Force Base on a June 1997 research flight. The NASA/Boeing X-36 Tailless Fighter Agility Research Aircraft program successfully demonstrated the tailless fighter design using advanced technologies to improve the maneuverability and survivability of possible future fighter aircraft. The program met or exceeded all project goals. For 31 flights during 1997 at the Dryden Flight Research Center, Edwards, California, the project team examined the aircraft's agility at low speed / high angles of attack and at high speed / low angles of attack. The aircraft's speed envelope reached up to 206 knots (234 mph). This aircraft was very stable and maneuverable. It handled very well. The X-36 vehicle was designed to fly without the traditional tail surfaces common on most aircraft. Instead, a canard forward of the wing was used as well as split ailerons and an advanced thrust-vectoring nozzle for directional control. The X-36 was unstable in both pitch and yaw axes, so an advanced, single-channel digital fly-by-wire control system (developed with some commercially available components) was put in place to stabilize the aircraft. Using a video camera mounted in the nose of the aircraft and an onboard microphone, the X-36 was remotely controlled by a pilot in a ground station virtual cockpit. A standard fighter-type head-up display (HUD) and a moving-map representation of the vehicle's position within the range in which it flew provided excellent situational awareness for the pilot. This pilot-in-the-loop approach eliminated the need for expensive and complex autonomous flight control systems and the risks associated with their inability to deal with unknown or unforeseen phenomena in flight. Fully fueled the X-36 prototype weighed approximately 1,250 pounds. It was 19 feet long and three feet high with a wingspan of
Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...
Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible. Overview of Android OS versions, features, architecture and security. Detailed examination of areas where attacks on applications can take place and what controls should b
Full Text Available Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM, ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application.
This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.
A software tool that facilitates the retrieval and analysis of post-flight data. This allows our team and other teams to effectively and efficiently analyze and evaluate post-flight data in order to certify commercial providers.
... than Flight Instructors With a Sport Pilot Rating § 61.193 Flight instructor privileges. A person who...; (e) An aircraft rating; (f) An instrument rating; (g) A flight review, operating privilege, or...
Ghommem, Mehdi; Garcia, Daniel; Calo, Victor M.
We use a potential flow solver to investigate the aerodynamic aspects of flapping flights in enclosed spaces. The enclosure effects are simulated by the method of images. Our study complements previous aerodynamic analyses which considered only the near-ground flight. The present results show that flying in the proximity of an enclosure affects the aerodynamic performance of flapping wings in terms of lift and thrust generation and power consumption. It leads to higher flight efficiency and more than 5% increase of the generation of lift and thrust.