1,044 research outputs found

    Data base formation and assessment of biotic and abiotic parameters associated with artificial reefs

    Get PDF
    There is a critical need for accurate data in order to make decisions regarding the construction, emplacement, and further development of artificial reefs in the State of Florida. This study looked a biotic and abiotic parameters of articifial reefs. A data matrix listing reefs on the vertical axis and the associated biotic and a biotic data or attributes available from published and non-pub1ished sources on the horizontal axis created: 1) a compilation of what data were available; 2) an indication of the completeness and extensiveness of the data; 3) a summary of the descriptive statistics of the data; 4) a preliminary analysis of the relationship among the biotic and abiotic parameters through correlation analysis; 5) some preliminary modeling of the artificial reefs to form the basis of prediction through stepwise and multiple linear regression analysis. (29pp.

    The Voting Age Should Be Eighteen

    Get PDF
    Non-fiction by Bob Doya

    Human Need and the Right of Patients to Privacy

    Get PDF

    The Guardian Ad Litem as the Child\u27s Privilege Holder

    Get PDF
    Children in therapy have a strong interest in maintaining the confidentiality of communications with their therapists. Without the assurance of confidential communications, children may not be as open with their therapists, which can make therapy less effective. Although children have privilege rights to their psychotherapist-patient communications just as adults do, their parents generally hold and exercise that privilege. Many courts have recognized that a parent should not hold a child\u27s privilege when the parent and child have divergent interests. This raises the question of who should hold the privilege in the parent\u27s place. In L.A.N. v. L.M.B., the Colorado Supreme Court decided the child\u27s guardian ad litem (GAL) should hold the child\u27s privilege. The court reasoned that the GAL\u27s expertise with the particular child and general duties toward the child\u27s best interests made the GAL the appropriate privilege holder. Although other jurisdictions have also ruled this way, some states have instead allowed the trial court to make decisions regarding a child\u27s privilege. Awarding the privilege to the court raises issues of impartiality, expertise, and judicial economy. Designating the GAL as the privilege holder is a better solution because it ensures that the child receives an advocate on the privilege issue whose only goal is representing the child\u27s best interests.

    Privacy preservation using spherical chord

    Get PDF
    Structured overlay networks are primarily used in data storage and data lookup, but they are vulnerable against many kinds of attacks. Within the realm of security, overlay networks have demonstrated applicability in providing privacy, availability, integrity, along with scalability. The thesis first analyses the Chord and the SALSA protocols which are organized in structured overlays to provide data with a certain degree of privacy, and then defines a new protocol called Spherical Chord which provides data lookup with privacy, while also being scalable, and addresses critical existing weaknesses in Chord and SALSA protocols. Spherical Chord is a variant of the Chord, and utilizes the concept of distributed hash table (DHT). Chord sends packets uni-directionally over a virtual id space in the overlay. While this feature provides lower latencies, it can be used by attackers to misroute and drop packets. Spherical Chord protocol introduces additional connections in the structured overlay and increases the path length and the number of paths for sending messages, hence making it more resilient to routing attacks. A new protocol focusing for constructing the Spherical Chord, followed by a new lookup protocol is defined in this thesis. The protocols are analyzed and it is demonstrated using both theoretical analysis and simulations that improved path availability helps in maintaining privacy, while also limiting the impact of routing attacks. --Abstract, page iii

    Morgan H. Looney and his Gilmer School 1861-1871

    Get PDF

    Balloon-borne three-meter telescope for far-infrared and submillimeter astronomy

    Get PDF
    The scientific objectives, engineering analysis and design, results of technology development, and focal-plane instrumentation for a two-meter balloon-borne telescope for far-infrared and submillimeter astronomy are presented. The unique capabilities of balloon-borne observations are discussed. A program summary emphasizes the development of the two-meter design. The relationship of the Large Deployable Reflector (LDR) is also discussed. Detailed treatment is given to scientific objectives, gondola design, the mirror development program, experiment accommodations, ground support equipment requirements, NSBF design drivers and payload support requirements, the implementation phase summary development plan, and a comparison of three-meter and two-meter gondola concepts
    • …
    corecore