807 research outputs found

    Report from C.O. Mailloux to Ogden Goelet, Esq., page 1

    Get PDF
    https://digitalcommons.salve.edu/ochre-court/1169/thumbnail.jp

    Receipt from C. O. Mailloux to Ogden Goelet

    Get PDF
    https://digitalcommons.salve.edu/ochre-court/1170/thumbnail.jp

    The Effects of Early Intervention on the Expressive Language Outcomes of Children with Autism Spectrum Disorder: A Systematic Review

    Get PDF
    Background: Autism Spectrum Disorder (ASD) is characterized by persistent challenges in social communication as well as restricted and repetitive behaviors and is often observable in early childhood. Expressive language delays are common in young children diagnosed with ASD. Expressive language includes any form of communicative output, such as verbal language, sign language, and the use of alternative and augmentative communication (AAC). Early intervention, for the purpose of this systematic review, is defined as speech and language services provided before a child is 5 years (60 months) of age. Evidence suggests that early intervention can lead to positive outcomes in the symptoms of children with ASD. Objective: To determine whether early intervention of ASD in children between 0-59 months of age has positive effects on expressive language development. Methods: A systematic search of the PsychINFO, PubMED, CINAHL, ERIC, and LLBA database was conducted, followed by a qualitative analysis of relevant articles. Studies included monolingual (i.e., English) children who were diagnosed with ASD. Studies were systematically graded and processed using inter-rater procedures. Results: Fourteen articles were included based upon inclusionary criteria. The overall quality of the studies was moderate. The most widely used early intervention techniques included the Early Start Denver Model (ESDM) and Pivotal Response Training (PRT). Conclusions: Consistent high-interval (i.e., 25 hours per week), behaviorally-based early intervention (i.e., before 40 months) may lead to positive outcomes in expressive language development. Clinicians working with young children with ASD should implement behaviorally-based, empirically-supported interventions, such as ESDM or PRT. Future research should prioritize high-quality study designs (e.g., randomized control trials) with larger sample sizes of children diagnosed with ASD, which is necessary to discern a direct relationship between behaviorally-based early intervention and expressive language outcomes for children with ASD.https://scholarworks.uvm.edu/csdms/1008/thumbnail.jp

    Letter from C. O. Mailloux to E. E. Gilbert, General Electric Company

    Get PDF
    https://digitalcommons.salve.edu/ochre-court/1168/thumbnail.jp

    Modeling Quantum Optical Components, Pulses and Fiber Channels Using OMNeT++

    Full text link
    Quantum Key Distribution (QKD) is an innovative technology which exploits the laws of quantum mechanics to generate and distribute unconditionally secure cryptographic keys. While QKD offers the promise of unconditionally secure key distribution, real world systems are built from non-ideal components which necessitates the need to model and understand the impact these non-idealities have on system performance and security. OMNeT++ has been used as a basis to develop a simulation framework to support this endeavor. This framework, referred to as "qkdX" extends OMNeT++'s module and message abstractions to efficiently model optical components, optical pulses, operating protocols and processes. This paper presents the design of this framework including how OMNeT++'s abstractions have been utilized to model quantum optical components, optical pulses, fiber and free space channels. Furthermore, from our toolbox of created components, we present various notional and real QKD systems, which have been studied and analyzed.Comment: Published in: A. F\"orster, C. Minkenberg, G. R. Herrera, M. Kirsche (Eds.), Proc. of the 2nd OMNeT++ Community Summit, IBM Research - Zurich, Switzerland, September 3-4, 201

    Invoice from The Safety Insulated Wire & Cable Co.

    Get PDF
    https://digitalcommons.salve.edu/ochre-court/1164/thumbnail.jp

    Cybersecurity Architectural Analysis for Complex Cyber-Physical Systems

    Get PDF
    In the modern military’s highly interconnected and technology-reliant operational environment, cybersecurity is rapidly growing in importance. Moreover, as a number of highly publicized attacks have occurred against complex cyber-physical systems such as automobiles and airplanes, cybersecurity is no longer limited to traditional computer systems and IT networks. While architectural analysis approaches are critical to improving cybersecurity, these approaches are often poorly understood and applied in ad hoc fashion. This work addresses these gaps by answering the questions: 1. “What is cybersecurity architectural analysis?” and 2. “How can architectural analysis be used to more effectively support cybersecurity decision making for complex cyber-physical systems?” First, a readily understandable description of key architectural concepts and definitions is provided which culminates in a working definition of “cybersecurity architectural analysis,” since none is available in the literature. Next, we survey several architectural analysis approaches to provide the reader with an understanding of the various approaches being used across government and industry. Based on our proposed definition, the previously introduced key concepts, and our survey results, we establish desirable characteristics for evaluating cybersecurity architectural analysis approaches. Lastly, each of the surveyed approaches is assessed against the characteristics and areas of future work are identified

    Quantum Key Distribution: Boon or Bust

    Get PDF
    Quantum Key Distribution (QKD) is an emerging cybersecurity technology which provides the means for two geographically separated parties to grow “unconditionally secure” symmetric cryptographic keying material. Unlike traditional key distribution techniques, the security of QKD rests on the laws of quantum mechanics and not computational complexity. This unique aspect of QKD is due to the fact that any unauthorized eavesdropping on the key distribution channel necessarily introduces detectable errors (Gisin, Ribordy, Tittel, & Zbinden, 2002). This attribute makes QKD desirable for high-security environments such as banking, government, and military applications. However, QKD is a nascent technology where implementation non-idealities can negatively impact system performance and security (Mailloux, Grimaila, Hodson, Baumgartner, & McLaughlin, 2015). While the QKD community is making progress towards the viability of QKD solutions, it is clear that more work is required to quantify the impact of such non-idealities in real-world QKD systems (Scarani & Kurtsiefer, 2009)

    Quantification of the Impact of Photon Distinguishability on Measurement-Device- Independent Quantum Key Distribution

    Get PDF
    Measurement-Device-Independent Quantum Key Distribution (MDI-QKD) is a two-photon protocol devised to eliminate eavesdropping attacks that interrogate or control the detector in realized quantum key distribution systems. In MDI-QKD, the measurements are carried out by an untrusted third party, and the measurement results are announced openly. Knowledge or control of the measurement results gives the third party no information about the secret key. Error-free implementation of the MDI-QKD protocol requires the crypto-communicating parties, Alice and Bob, to independently prepare and transmit single photons that are physically indistinguishable, with the possible exception of their polarization states. In this paper, we apply the formalism of quantum optics and Monte Carlo simulations to quantify the impact of small errors in wavelength, bandwidth, polarization and timing between Alice’s photons and Bob’s photons on the MDI-QKD quantum bit error rate (QBER). Using published single-photon source characteristics from two-photon interference experiments as a test case, our simulations predict that the finite tolerances of these sources contribute (4.04±20/√Nsifted )% to the QBER in an MDI-QKD implementation generating an Nsifted-bit sifted key
    corecore