6,712 research outputs found

    Anomalous event diagnosis for environmental satellite systems

    Get PDF
    The National Oceanic and Atmospheric Administration's (NOAA) National Environmental Satellite, Data, and Information Service (NESDIS) is responsible for the operation of the NOAA geostationary and polar orbiting satellites. NESDIS provides a wide array of operational meteorological and oceanographic products and services and operates various computer and communication systems on a 24-hour, seven days per week schedule. The Anomaly Reporting System contains a database of anomalous events regarding the operations of the Geostationary Operational Environmental Satellite (GOES), communication, or computer systems that have degraded or caused the loss of GOES imagery. Data is currently entered manually via an automated query user interface. There are 21 possible symptoms (e.g., No Data), and 73 possible causes (e.g., Sectorizer - World Weather Building) of an anomalous event. The determination of an event's cause(s) is made by the on-duty computer operator, who enters the event in a paper based daily log, and by the analyst entering the data into the reporting system. The determination of the event's cause(s) impacts both the operational status of these systems, and the performance evaluation of the on-site computer and communication operations contractor

    Data DNA: The Next Generation of Statistical Metadata

    Get PDF
    Describes the components of a complete statistical metadata system and suggests ways to create and structure metadata for better access and understanding of data sets by diverse users

    Functional dynamics of the folded ankyrin repeats of I kappa B alpha revealed by nuclear magnetic resonance.

    Get PDF
    Inhibition of nuclear factor kappaB (NF-kappaB) is mainly accomplished by IkappaB alpha, which consists of a signal response sequence at the N-terminus, a six-ankyrin repeat domain (ARD) that binds NF-kappaB, and a C-terminal PEST sequence. Previous studies with the ARD revealed that the fifth and sixth repeats are only partially folded in the absence of NF-kappaB. Here we report NMR studies of a truncated version of IkappaB alpha, containing only the first four ankyrin repeats, IkappaB alpha(67-206). This four-repeat segment is well-structured in the free state, enabling full resonance assignments to be made. H-D exchange, backbone dynamics, and residual dipolar coupling (RDC) experiments reveal regions of flexibility. In addition, regions consistent with the presence of micro- to millisecond motions occur periodically throughout the repeat structure. Comparison of the RDCs with the crystal structure gave only moderate agreement, but an ensemble of structures generated by accelerated molecular dynamics gave much better agreement with the measured RDCs. The regions showing flexibility correspond to those implicated in entropic compensation for the loss of flexibility in ankyrin repeats 5 and 6 upon binding to NF-kappaB. The regions showing micro- to millisecond motions in the free protein are the ends of the beta-hairpins that directly interact with NF-kappaB in the complex

    The Rise of Mobile and the Diffusion of Technology-Facilitated Trafficking

    Get PDF
    In this report, researchers at the USC Annenberg Center on Communication Leadership & Policy (CCLP) reveal how those involved in human trafficking have been quick to adapt to the 21st-century global landscape. While the rapid diffusion of digital technologies such as mobile phones, social networking sites, and the Internet has provided significant benefits to society, new channels and opportunities for exploitation have also emerged. Increasingly, the business of human trafficking is taking place online and over mobile phones. But the same technologies that are being used for trafficking can become a powerful tool to combat trafficking. The precise role that digital technologies play in human trafficking still remains unclear, however, and a closer examination of the phenomenon is vital to identify and respond to new threats and opportunities.This investigation indicates that mobile devices and networks have risen in prominence and are now of central importance to the sex trafficking of minors in the United States. While online platforms such as online classifieds and social networking sites remain a potential venue for exploitation, this research suggests that technology facilitated trafficking is more diffuse and adaptive than initially thought. This report presents a review of current literature, trends, and policies; primary research based on mobile phone data collected from online classified sites; a series of firsthand interviews with law enforcement; and key recommendations to policymakers and stakeholders moving forward

    Combined monitoring, decision and control model for the human operator in a command and control desk

    Get PDF
    A report is given on the ongoing efforts to mode the human operator in the context of the task during the enroute/return phases in the ground based control of multiple flights of remotely piloted vehicles (RPV). The approach employed here uses models that have their analytical bases in control theory and in statistical estimation and decision theory. In particular, it draws heavily on the modes and the concepts of the optimal control model (OCM) of the human operator. The OCM is being extended into a combined monitoring, decision, and control model (DEMON) of the human operator by infusing decision theoretic notions that make it suitable for application to problems in which human control actions are infrequent and in which monitoring and decision-making are the operator's main activities. Some results obtained with a specialized version of DEMON for the RPV control problem are included
    • …
    corecore