38 research outputs found

    Topics in construction safety and health : silica in construction : an interdisciplinary annotated bibliography

    Get PDF
    "These referenced articles provide literature about silica in the construction industry and the possible health effects workers experience from these exposures." - NIOSHTIC-2NIOSHTIC no. 20068256Production of this document was supported by cooperative agreement OH 009762 from the National Institute for Occupational Safety and Health (NIOSH). The contents are solely the responsibility of the authors and do not necessarily represent the official views of NIOSH.Silica-annotated-bibliography.pdfcooperative agreement OH 009762 from the National Institute for Occupational Safety and Healt

    Area Efficient Implementation of MTI Processing Module on a Reconfigurable Platform

    Get PDF

    Department of Radiology-Annual Executive Summary Report-July 1, 2009 to June 30, 2010

    Get PDF
    86 page Annual Executive Summary Report from Department of Radiology, Thomas Jefferson University Hospital, Philadelphia, Pennsylvania, United States Table of Contents: Department of Radiology Chairman, Vice Chairmen 1 Divisions and Directors 1 Committees and Chairmen 1 Radiology Department Faculty Rank 2 Faculty with Secondary Appointments 3 Clinical Divisions 4 Radiology Residents and Fellows 5 Department Organizational Chart 6 Department Administration Chart 7 State of the Department 8 Appendix I: Publications Journal Articles 21 Books and Book Chapters 28 Abstracts 30 Appendix II: Formal Scientific Presentations 39 Appendix III: Honors, Editorial Activities, Service to Regional or National Organizations 59 Appendix IV: Active Grants 73 Appendix V: Pending Grants 7

    Geometric intersection problems

    Full text link

    Broadband facts, fiction and urban myths

    Full text link

    The Application of Hydraulic and Sediment Transport Models in Fluvial Geomorphology

    Get PDF
    After publishing the famous “Fluvial Processes in Geomorphology” in the early 1960s, the work of Luna Leopold, Gordon Wolman, and John Miller became a key for opening the door to understanding rivers and streams. They first illustrated the problem to geomorphologists and geographers. Later, Chang, in his “Fluvial Processes in River Engineering”, provided a basis for engineers, showing this group of professionals how to deal with rivers and how to understand them. Since then, more informative studies have been published. Many of the authors started to combine fluvial geomorphology knowledge and river engineering needs, such as “Tools in Fluvial Geomorphology” by G. Mathias Kondolf and Hervé Piégay, or focused more on river engineering tasks, such as “Stream Restoration in Dynamic Fluvial Systems: Scientific Approaches” by Andrew Simon, Sean Bennett, and Janine Castro. Finally, Luna Leopold summarized river and stream morphologies in the beautiful “A view of the river”. It appears that we continue to explore this subject in the right direction. We better understand rivers and streams, and as engineers and fluvial geomorphologists, we can establish tools to help bring rivers alive. However, there is still a hunger for more scientific tools that we could use to further understand rivers and to support the development of healthy streams and rivers with high biodiversity in the present world, which has started to face water scarcity

    General Undergraduate Catalog, 2008-2009

    Get PDF
    Marshall University Undergraduate Catalog for the 2008-2009 academic year.https://mds.marshall.edu/catalog_2000-2009/1004/thumbnail.jp

    General Undergraduate Catalog, 2007-2008

    Get PDF
    Marshall University Undergraduate Catalog for the 2007-2008 academic year.https://mds.marshall.edu/catalog_2000-2009/1003/thumbnail.jp

    General Undergraduate Catalog, 2006-2007 (Interim Online Edition)

    Get PDF
    Marshall University Undergraduate Catalog for the 2006-2007 academic year.https://mds.marshall.edu/catalog_2000-2009/1002/thumbnail.jp

    On Lattice-Based Signatures with Advanced Functionalities

    Get PDF
    Lattice-based cryptography is a prominent class of cryptographic systems that has been emerged as one of the main candidates replacing classical cryptography in future computing environments such as quantum computing. Quantum computers exploit quantum mechanical phenomena to solve computational problems, on which the security of currently deployed (classical) cryptographic systems is based. While these computational problems, e.g., factoring integers and computing discrete logarithms, are intractable for conventional (classical) computers, it is meanwhile known that they can be easily solved on quantum computers (Shor 1997). However, lattice problems, such as finding short non-zero vectors, seem to withstand attacks having quantum computing power. In the last two decades we have seen many cryptographic proposals based on lattices. In particular, lattice-based (ordinary) signature schemes were greatly improved with respect to efficiency and security. This can be observed from the post-quantum standardization process initiated by the National Institute of Standards and Technology (NIST). In fact, from the five signature schemes that have been submitted to this process, there are currently three finalists, where two of them are lattice-based submissions. In this thesis, we are specifically interested in lattice-based signature schemes with advanced functionalities. In addition to the basic security goals that an ordinary signature scheme ensures, i.e., authentication, non-repudiation, and integrity, these schemes provide features that are application-specific. While ordinary signature schemes based on lattices are ready to be deployed in practice, this statement cannot be made for lattice-based signature schemes with advanced functionalities. This thesis makes a significant progress towards deploying the aforementioned type of signature schemes in practice. With focus on privacy-preserving applications in future computing environments, we particularly facilitate the protection of secret keys in cryptocurrencies such as Bitcoin and Ethereum. We provide practical solutions to anonymous e-cash, anonymous credentials, smart contracts, and e-voting. We believe that our techniques can be used to develop further advanced signature schemes to be deployed in other application scenarios. For instance, in information security systems that perform critical operations such as distributed key generation, anonymization of medical data, and updating reliable routing information
    corecore