1,551 research outputs found

    Human Research Program Human Health Countermeasures Element Sensorimotor Risk Standing Review Panel (SRP) Final Report

    Get PDF
    The Sensorimotor Risk Standing Review Panel (SRP) met at the NASA Johnson Space Center on October 4-6, 2009 to discuss the areas of future research targeted by the Human Health Countermeasures (HHC) Element of the Human Research Program (HRP). Using evidence-based knowledge as a background for risks, NASA had identified gaps in knowledge to address those risks. Ongoing and proposed tasks were presented to address the gaps. The charge to the Sensorimotor Risk SRP was to review the gaps, evaluate whether the tasks addressed these gaps and to make recommendations to NASA s HRP Science Management Office regarding the SRP's review. The SRP was requested to evaluate the practicality of the proposed efforts in light of the realistic demands placed on the HRP. In short, all tasks presented in the Integrated Research Plan (IRP) should address specific risks related to the challenges faced by the astronauts as a result of prolonged exposure to microgravity. All tasks proposed to fill the gaps in knowledge should provide applied, translational data necessary to address the specific risks. Several presentations were made to the SRP during the site visit and the SRP spent sufficient time to address the panel charge, either as a group or in separate sessions. The SRP made a final debriefing to the HRP Program Scientist. Taking the evidence and the risk as givens, the SRP reached the following conclusions: 1) the panel is very supportive of and endorses the present activities of the Sensorimotor Risk; and the panel is likewise supportive of the gaps and associated tasks in the IRP; 2) overall, the tasks addressed the gaps in the IRP; 3) there were some gaps and tasks that merit further enhancement and some new gaps/tasks that the SRP recommends

    Grain Reserves: Issues and Policy Choices.

    Get PDF
    2 p

    From Helplessness To Hope: The Seminal Career Of Martin Seligman

    Get PDF
    Provides a background to the history of research on learned helplessness and learned optimism, as well as M. Seligman\u27s own involvement in these areas. The development of research in this area also illustrates two other important lessons in how science actually proceeds. First, it is often difficult to predict at the outset where research will lead. Work on learned helplessness began in the animal laboratory and for several years was directed at deep theoretical issues in the psychology of learning and not at depression, academic achievement, and other significant human phenomenon. And second, the history of learned helplessness research demonstrates the continuity between basic and applied research in the way that it has moved effortlessly between fundamental issues in learning, cognition, and motivation on the one hand, and attempts to deal with problems of human adaptation and obstacles to achievement of human potential on the other

    Clinical observations associated with proven and unproven cases in the ESCRS study of prophylaxis of postoperative endophthalmitis after cataract surgery

    Get PDF
    Aims to describe cases of postoperative endophthalmitis in the European Society of Cataract and Refractive Surgeons (ESCRS) study of the prophylaxis of endophthalmitis, compare characteristics of unproven cases and cases proven by culture or polymerase chain reaction, and compare the characteristics with those in other reported series. Twenty-four ophthalmology units in Austria, Belgium, Germany, Italy, Poland, Portugal, Spain, Turkey, and the United Kingdom. Univariable and multivariable logistic regression models were used to analyze data forstatistical association of signs and symptoms in cases with proven or unproven endophthalmitis. Specific data describing characteristics of the cases were compared between the 2 types of cases. Data from 29 endophthalmitis cases were analyzed. Swollen lids and pain were statistically associated with proven cases of endophthalmitis on univariable regression analysis. Multivariable analysis indicated that swollen lids and an opaque vitreous were associated with proven cases. Five cases of endophthalmitis occurred in the cefuroxime-treated groups. No case of streptococcal infection occurred in the cefuroxime-treated groups. However, cases of infection due to streptococci showed striking differences in visual acuity and were associated with earlier onset. Characteristics in the 29 cases parallel results in previous studies, such as the Endophthalmitis Vitrectomy Study, although the addition of a control group in the ESCRS study elicited additional findings. Swollen lids, pain, and an opaque vitreous were statistically associated with proven endophthalmitis cases in the ESCRS study

    Action Plan for the International Year of Rangelands and Pastoralists (IYRP): The Case for the United States, Canada, and Mexico

    Get PDF
    The GAP analysis (A Case of Benign Neglect: Knowledge gaps about sustainability in rangelands and pastoralism) points to several gaps that are relevant to the US, Canada and Mexico. North American rangelands span the ecological continuum of polar to hot deserts and arid to humid climates that exhibit highly variable ecological and forage production potential across time and space. Although there is a great deal of rangeland research, extension, and inventory capacity in all three countries, a weak link is the dissemination of information to North American pastoralists (conventionally referred to as ranchers or producers). Although the extension system in the US and Canada are similar, there are distinct differences. Public lands in the US are managed at the national level by federal agencies (e.g., Bureau of Land Management and Forest Service) while private land management assistance is provided by the Natural Resource Conservation Service. In Canada, Crown land is managed by departments within each province and there is no national extension service. In Mexico, the majority of the lands are managed by local communities or ejidos, 15% are privately owned and managed and the remaining 5% is government owned. The three countries support national research organizations and have a well-developed system of colleges and universities that have range management or related disciplines containing staff that specialize in teaching and/or research (and cooperative extension at land grant universities within the US). All three countries must attempt to bridge gaps between an urban industrial society that is increasingly disconnected from extensive agricultural production on rangelands. Promoting ecological goods and services provided by rangelands is a relatively new paradigm for US, Canadian and Mexican research and extension. During the IYRP, the focus in the US, Canada and Mexico is likely to be in 2 directions; providing North American pastoralists/ranchers with the social license to continue to ranch or farm while educating the massive urban population about the sustainability, multiple uses, and benefits of ecological services produced on rangelands and native grasslands

    Prefrontal Neurons Coding Suppression of Specific Saccades

    Get PDF
    AbstractThe prefrontal cortex has been implicated in the suppression of unwanted behavior, based upon observations of humans and monkeys with prefrontal lesions. Despite this, there has been little direct neurophysiological evidence for a mechanism that suppresses specific behavior. In this study, we used an oculomotor delayed match/nonmatch-to-sample task in which monkeys had to remember a stimulus location either as a marker of where to look or as a marker of where not to look. We found a group of neurons in both the frontal eye field and the caudal prefrontal cortex that carried signals selective for the forbidden stimulus. The activity of these “don't look” neurons correlated with the monkeys' success or failure on the task. These results demonstrate a frontal signal that is related to the active suppression of one action while the subject performs another

    Large-scale Cooperative Task Distribution on Peer-to-Peer Networks

    Get PDF
    Large-scale systems are part of a growing trend in distributed computing, and coordinating control of them is an increasing challenge. This paper presents a cooperative agent system that scales to one million or more nodes in which agents form coalitions to complete global task objectives. This approach uses the large-scale Command and Control (C2) capabilities of the Resource Clustered Chord (RC-Chord) Hierarchical Peer-to-Peer (HP2P) design. Tasks are submitted that require access to processing, data, or hardware resources, and a distributed agent search is performed to recruit agents to satisfy the distributed task. This approach differs from others by incorporating design elements to accommodate large-scale systems into the resource location algorithm. Peersim simulations demonstrate that the distributed coalition formation algorithm is as effective as an omnipotent central algorithm in a one million agent system

    Structured P2P Technologies for Distributed Command and Control

    Get PDF
    The utility of Peer-to-Peer (P2P) systems extends far beyond traditional file sharing. This paper provides an overview of how P2P systems are capable of providing robust command and control for Distributed Multi-Agent Systems (DMASs). Specifically, this article presents the evolution of P2P architectures to date by discussing supporting technologies and applicability of each generation of P2P systems. It provides a detailed survey of fundamental design approaches found in modern large-scale P2P systems highlighting design considerations for building and deploying scalable P2P applications. The survey includes unstructured P2P systems, content retrieval systems, communications structured P2P systems, flat structured P2P systems and finally Hierarchical Peer-to-Peer (HP2P) overlays. It concludes with a presentation of design tradeoffs and opportunities for future research into P2P overlay systems

    RC-Chord: Resource Clustering in a Large-Scale Hierarchical Peer-to-Peer System

    Get PDF
    Conducting data fusion and Command and Control (C2) in large-scale systems requires more than the presently available Peer-to-Peer (P2P) technologies provide. Resource Clustered Chord (RC-Chord) is an extension to the Chord protocol that incorporates elements of a hierarchical peer-to-peer architecture to facilitate coalition formation algorithms in large-scale systems. Each cluster in this hierarchy represents a particular resource available for allocation, and RC-Chord provides the capabilities to locate agents of a particular resource. This approach improves upon other strategies by including support for abundant resources, or those resources that most or all agents in the system possess. This scenario exists in large-scale coalition formation problems, and applies directly to the United States Air Force\u27s CyberCraft project. Simulations demonstrate that RC-Chord scales to systems of one million or more agents, and can be adapted to serve as a deployment environment for CyberCraft

    Developing Cyberspace Data Understanding Using CRISP-DM for Host-based IDS Feature Mining

    Get PDF
    Current intrusion detection systems (IDS) generate a large number of specific alerts, but typically do not provide actionable information. Compounding this problem is the fact that many alerts are false positive alerts. This paper applies the Cross Industry Standard Process for Data Mining (CRISP-DM) to develop an understanding of a host environment under attack. Data is generated by launching scans and exploits at a machine outfitted with a set of host-based forensic data collectors. Through knowledge discovery, features are selected to project human understanding of the attack process into the IDS model. By discovering relationships between the data collected and controlled events, false positive alerts were reduced by over 91% when compared to a leading open source IDS. This method of searching for hidden forensic evidence relationships enhances understanding of novel attacks and vulnerabilities, bolstering ones ability to defend the cyberspace domain. The methodology presented can be used to further host-based intrusion detection research
    corecore