9,175 research outputs found

    The MacGuffin block cipher algorithm

    Full text link

    Flexible Session Management in a Distributed Environment

    Full text link
    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems

    Quantum Bound States with Zero Binding Energy

    Full text link
    After reviewing the general properties of zero-energy quantum states, we give the explicit solutions of the \seq with E=0E=0 for the class of potentials V=γ/rνV=-|\gamma|/r^{\nu}, where 2-\infty 2, these solutions are normalizable and correspond to bound states, if the angular momentum quantum number l>0l>0. [These states are normalizable, even for l=0l=0, if we increase the space dimension, DD, beyond 4; i.e. for D>4D>4.] For ν<2\nu <-2 the above solutions, although unbound, are normalizable. This is true even though the corresponding potentials are repulsive for all rr. We discuss the physics of these unusual effects.Comment: 11 pages, 4 figures which can be generated from Mathematica commands given at the end of the file. Latex, REVISED--Fig. 4 Mathematica command improved and correcte

    Report on the City of Tampa, Florida

    Get PDF
    Fire Prevention and Regulations May, 1927 with supplements and map

    Guidelines for conducting birth defects surveillance

    Get PDF
    "In January of 1999, the National Birth Defects Prevention Network (NBDPN) established a Surveillance Guidelines and Standards Committee (SGSC) in order to develop and promote the use of standards and guidelines for birth defects surveillance programs in the United States. This set of guidelines is designed to serve as an important first step in the documentation of this process and as the vehicle for dissemination of the committee's findings. The Guidelines for Conducting Birth Defects Surveillance (henceforth referred to as The Surveillance Guidelines) were developed with three major long-term objectives in mind: To improve the quality of state birth defects surveillance data, including accuracy, comparability, completeness, and timeliness; To enhance the utility of state birth defects surveillance data for research on the distribution and etiology of birth defects; To encourage and promote the use of state birth defects surveillance data for the purposes of linking affected children with services and evaluation of those services. The technical guidelines that make up this document provide a way of improving the quality of birth defects surveillance data, which in turn enhances their use in support of the latter two objectives. Fundamental to quality is ensuring that procedures for all aspects of data definition, collection, management, and analysis are established and followed. Because state-based surveillance systems operate with different objectives and data needs, it is clear that, with respect to procedures and standards, 'one size does not fit all.' It is also clear, however, that common guidelines can provide a basis for the development of system-specific operating procedures and supporting manuals." - p. iIntroduction -- -- Chapter 1. The Whys and Hows of Birth Defects Surveillance - Using Data -- -- Chapter 2. Legislation -- Appendix 2.1. Sample State Legislation -- Appendix 2.2. Table of Birth Defects Legislation -- Appendix 2.3. Definitions Used to Determine Covered Entity Status Under the Privacy Rule -- Appendix 2.4. Office of Civil Rights (OCR) HIPAA Privacy Regulation Text -- -- Chapter 3.Case Definition -- Appendix 3.1. Birth Defects Included in the Case Definition of the National Birth Defects Prevention Network -- Appendix 3.2. NBDPN Abstractor's Instructions -- Appendix 3.3. Examples of Conditions Considered to Be Minor Anomalies -- Appendix 3.4. Conditions Related to Prematurity in Infants Born at Less Than 36 Weeks Gestation -- -- Chapter 4. Data Variables -- Appendix 4.1. Descriptions of Minimum (Core) Data Variables -- Appendix 4.2. Descriptions of Recommended Data Variables -- -- Chapter 5. Classification and Coding -- Appendix 5.1. Texas Disease Index -- Appendix 5.2. 6-Digit CDC Codes (updated 8/2007) -- -- Chapter 6. Case Ascertainment Methods -- Appendix 6.1. Data Source Described in Detail - Vital Records -- Appendix 6.2. Data Source Described in Detail - Hospital Data Sets -- Appendix 6.3. Data Source Described in Detail - Hospital and Patient Services Logs -- Appendix 6.4. Data Source Described in Detail - Genetic Services -- -- Chapter 7. Data Quality Management -- Appendix 7.1. Data Sources Descriptive Assessment Tool -- -- Chapter 8. Statistical Methods -- -- Chapter 9. Data Management and Security -- -- Chapter 10. Data Collaboration and Dissemination through the NBDPN -- -- Chapter 11. Data Presentation -- Appendix 11.1. Data Suppression -- Appendix 11.2. Use of Geographic Information Systems (GIS) to Map Data -- Appendix 11.3. Data Users Matrix -- Appendix 11.4. What Type of Chart or Graph Should I Use?edited by Lowell E. Sever."June 2004."Support for development, production, and distribution of these guidelines was provided by the Birth Defects State Research Partnerships Team, National Center on Birth Defects and Developmental Disabilities, Centers for Disease Control and Prevention.Title from title caption (viewed on Jan. 6, 2012).Mode of access: Internet from the CDC web site as an Acrobat .pdf file ((7.6 MB, 627 p.).System requirements: Adobe Acrobat Reader.Includes bibliographical references.Text in PDF format.National Birth Defects Prevention Network (NBDPN). Guidelines for Conducting Birth Defects Surveillance. Sever, LE, ed. Atlanta, GA: National Birth Defects Prevention Network, Inc., June 2004

    The Ten Essential Shared Capabilities: a framework for mental health practice

    Get PDF
    The 10 Essential Shared Capabilities (ESC) are a description of the core aspects of practice that support effective implementation and delivery of mental health care. The ESC have been derived directly from work with users, carers and mental health personnel. To support their introduction a learning pack was developed giving examples of the 10 ESC as they relate to current practice. A pilot programme across England was developed to test the acceptability and potential utility of these materials and this paper reports on the evaluation of that pilot programme. Facilitators (n=75) and learners (n=579) were asked to rate each of the seven modules contained in the learning pack. A number of recommendations have been made to improve the materials that are being acted upon

    Four Principles of Explainable Artificial Intelligence (2021)

    Get PDF

    Lifting the lid: a clinical audit on commode cleaning

    Get PDF
    Many healthcare-associated infections (HCAIs) are preventable by infection control procedures designed to interrupt the transmission of organisms from a source. Commodes are in use constantly throughout healthcare facilities. Therefore commode surfaces are constantly handled, and any pathogens present have the potential to be transferred to not only other surfaces but also, more importantly, to patients, thus compromising patient safety. In order to examine the effectiveness and thoroughness of cleaning commodes an audit was undertaken to assess compliance with evidence-based practice. This audit demonstrates a cycle which includes defining best practice, implementing best practice, monitoring best practice and taking action to improve practice. The audit results confirmed an issue that the authors had long suspected. That is, that commodes allocated to individual patients are not always cleaned after every use. Using adenosine triphosphate (ATP) bioluminescence as an indicator of organic soiling also demonstrated that commodes that were considered clean were not always cleaned to a high standard. Implementing the audit recommendations improves staff knowledge through education, standardises cleaning procedures and ultimately improves patient safety
    corecore