159 research outputs found

    Hubble Space Telescope (HST): Emergency support

    Get PDF
    The Hubble Space Telescope (HST) is a national facility that consists of a 2.4-m aperture Ritchey-Chretien cassegrain telescope weighing approximately 9525 kg with various energy detectors designed for the observation of IR, visible, and UV wavelengths (0.12 to 1000 microns). The HST was deployed into a 28.5-degree inclination, circular orbit, which permits a mission lifetime of 15 years. The orbit is decaying circular between 594 and 400 km x 28.5 deg; the period = 95 minutes. Information is presented in tabular form on the following areas: Deep Space Network support, frequency assignments, telemetry, command, and tracking support responsibility

    The Applications of the Internet of things in the Medical Field

    Get PDF
    The Internet of Things (IoT) paradigm promises to make “things” include a more generic set of entities such as smart devices, sensors, human beings, and any other IoT objects to be accessible at anytime and anywhere. IoT varies widely in its applications, and one of its most beneficial uses is in the medical field. However, the large attack surface and vulnerabilities of IoT systems needs to be secured and protected. Security is a requirement for IoT systems in the medical field where the Health Insurance Portability and Accountability Act (HIPAA) applies. This work investigates various applications of IoT in healthcare and focuses on the security aspects of the two internet of medical things (IoMT) devices: the LifeWatch Mobile Cardiac Telemetry 3 Lead (MCT3L), and the remote patient monitoring system of the telehealth provider Vivify Health, as well as their implementations

    A mutual visibility computer program for communication satellites

    Get PDF
    Mutual visibility computer program for communications satellite

    Words of Wisdom, For Now ...The Constructivist Credo

    Get PDF
    In The Constructivist Credo, Yvonna S. Lincoln and Egon G. Guba present 133 conjectures they believe should guide researchers who use a constructivist approach. In addition, several chapters from a recent dissertation are included and annotated to show how the conjectures might be used in practice

    Coverage by eight Wisconsin newspapers of the 1956 and 1964 presidential campaigns.

    Get PDF
    This thesis document was issued under the authority of another institution, not NPS. At the time it was written, a copy was added to the NPS Library collection for reasons not now known.  It has been included in the digital archive for its historical value to NPS.  Not believed to be a CIVINS (Civilian Institutions) title.http://archive.org/details/coveragebyeightw1094540085Approved for public release; distribution is unlimited

    Medicare and the Affordable Care Act: Fraud Control Efforts and Results

    Get PDF
    Medicare fraud and abuse costs are estimated at 3%-10% of overall Medicare spending, which is expected to expand considerably until 2024 and as such the amount of fraud dollars would be expected to increase proportionally. The purpose of this research was to determine how recent reforms, especially the Patient Protection and Accountable Care Act, may affect Medicare fraud and abuse and to uncover the best strategies to combat Medicare fraud. The breadth of fraud and abuse within Medicare as well as recent reforms to fight fraud including legislative reforms, delivery system reforms, and other reforms including the formation of HEAT fraud fighting taskforces are examined. Legislative reforms are noted to be incompatible with the ACA’s new P4P delivery and reimbursement reforms. Medicare fraud requires comprehensive detection and prevention measures. Benefits of implementing this dual method of fraud fighting are discussed
    corecore