677 research outputs found

    Testing Peer Contagion in Youth Mental Health Services

    Get PDF
    The University Archives has determined that this item is of continuing value to OSU's history.Session 2. Presenter: Bethany R. Lee, Ph.D., Washington University in Saint Louis (2007) - "Testing Peer Contagion in Youth Mental Health Services".The Ohio State University College of Social Wor

    Nicholas John Jones

    Get PDF
    Nicholas John Jones was born in Ireland in 1825. He came to Savannah, Georgia, in 1870, after havinq been in this country for some time. He was a private in the Savannah Police Force from 1870 through 1884. He was married twice; his first wife, Mary, died in 1887, and he married his second wife, Annie, the next year. He had no children. Nicholas was by no means a flamboyant man, but he was active in buying and selling property and was quite good at turning a sizeable profit. From 1888 until his death, he lived at 402 East Liberty Street, on the corner of Habersham. He died on June 21, 1910, of kidney disease and is buried in the Catholic Cemetary.https://digitalcommons.georgiasouthern.edu/sav-bios-lane/1089/thumbnail.jp

    Optimizing Cybersecurity Risk in Medical Cyber-Physical Devices

    Get PDF
    Medical devices are increasingly connected, both to cyber networks and to sensors collecting data from physical stimuli. These cyber-physical systems pose a new host of deadly security risks that traditional notions of cybersecurity struggle to take into account. Previously, we could predict how algorithms would function as they drew on defined inputs. But cyber-physical systems draw on unbounded inputs from the real world. Moreover, with wide networks of cyber-physical medical devices, a single cybersecurity breach could pose lethal dangers to masses of patients. The U.S. Food and Drug Administration (FDA) is tasked with regulating medical devices to ensure safety and effectiveness, but its regulatory approach—designed decades ago to regulate traditional medical hardware—is ill-suited to the unique problems of cybersecurity. Because perfect cybersecurity is impossible and every cybersecurity improvement entails costs to affordability and health, designers need standards that balance costs and benefits to inform the optimal level of risk. The FDA, however, conducts limited cost-benefit analyses, believing that its authorizing statute forbids consideration of economic costs. We draw on statutory text and case law to show that this belief is mistaken and that the FDA can and should conduct cost-benefit analyses to ensure safety and effectiveness, especially in the context of cybersecurity. We describe three approaches the FDA could take to implement this analysis as a practical matter. Of these three, we recommend an approach modeled after the Federal Trade Commission’s cost-benefit test. Regardless of the specific approach the FDA chooses, however, the critical point is that the agency must weigh costs and benefits to ensure the right level of cybersecurity. Until then, medical device designers will face continued uncertainty as cybersecurity threats become increasingly dangerous

    Optimizing Cybersecurity Risk in Medical Cyber-Physical Devices

    Full text link
    Medical devices are increasingly connected, both to cyber networks and to sensors collecting data from physical stimuli. These cyber-physical systems pose a new host of deadly security risks that traditional notions of cybersecurity struggle to take into account. Previously, we could predict how algorithms would function as they drew on defined inputs. But cyber-physical systems draw on unbounded inputs from the real world. Moreover, with wide networks of cyber-physical medical devices, a single cybersecurity breach could pose lethal dangers to masses of patients. The U.S. Food and Drug Administration (FDA) is tasked with regulating medical devices to ensure safety and effectiveness, but its regulatory approach—designed decades ago to regulate traditional medical hardware—is ill-suited to the unique problems of cybersecurity. Because perfect cybersecurity is impossible and every cybersecurity improvement entails costs to affordability and health, designers need standards that balance costs and benefits to inform the optimal level of risk. The FDA, however, conducts limited cost-benefit analyses, believing that its authorizing statute forbids consideration of economic costs. We draw on statutory text and case law to show that this belief is mistaken and that the FDA can and should conduct cost-benefit analyses to ensure safety and effectiveness, especially in the context of cybersecurity. We describe three approaches the FDA could take to implement this analysis as a practical matter. Of these three, we recommend an approach modeled after the Federal Trade Commission’s cost-benefit test. Regardless of the specific approach the FDA chooses, however, the critical point is that the agency must weigh costs and benefits to ensure the right level of cybersecurity. Until then, medical device designers will face continued uncertainty as cybersecurity threats become increasingly dangerous

    Plant-Soil Feedback Systems in Invasive Grass: Microstegium vimineum

    Get PDF
    Japanese Stiltgrass (Microstegium vimenium) is an invasive grass that dominates many southeast woodland areas which grows best under sunny conditions but can also thrive in shady areas. We hypothesized that M. vimenium in invaded soils would have higher germination rates as compared to M. vimenium in native soils

    Soils Associated with the Invasive Grass: Microstegium vimineum Increases Growth of Native Trees

    Get PDF
    Soil biota are composed of the animals, plants and microorganisms that interact and share resources and nutrients in the soil. When an invasive species is introduced to this complex web of soil interactions, plants and other biota can exhibit chemical or physical change and potentially inhibit or enhance growth of plant species. By testing five native tree species in a black box experiment, we can see if there is a change in biomass in above ground (AG) or below ground (BG) structures of the tree between invaded soils - which previously hosted an invasive grass, Microstegium vimineum - and native soils that experienced no invasion. There were 6 soils to be tested - from three field sites that held both a native and invaded soil - along with a control soil, resulting in 7 total trial conditions. Invaded soils were found to have significantly more biomass in their aboveground growth through stems and leaves. All of the trials in invaded soils found a higher mean leaf mass than in the native soils trials. We can conclude that the invaded species is altering the biota in the soil. This change could be in nutrient uptake, physical distribution, or chemical interactions of the soil biota. While we don’t know the specific mechanisms behind this, we do know that native tree species will experience more aboveground biomass in soils that experienced invasion, than in soils that did not experience invasion.https://ir.library.louisville.edu/uars/1059/thumbnail.jp

    Layer-Resolved Ultrafast XUV Measurement of Hole Transport in a Ni-TiO2-Si Photoanode

    Get PDF
    Metal-oxide-semiconductor junctions are central to most electronic and optoelectronic devices. Here, the element-specificity of broadband extreme ultraviolet (XUV) ultrafast pulses is used to measure the charge transport and recombination kinetics in each layer of a Ni-TiO2-Si junction. After photoexcitation of silicon, holes are inferred to transport from Si to Ni ballistically in ~100 fs, resulting in spectral shifts in the Ni M2,3 XUV edge that are characteristic of holes and the absence of holes initially in TiO2. Meanwhile, the electrons are observed to remain on Si. After picoseconds, the transient hole population on Ni is observed to back-diffuse through the TiO2, shifting the Ti spectrum to higher oxidation state, followed by electron-hole recombination at the Si-TiO2 interface and in the Si bulk. Electrical properties, such as the hole diffusion constant in TiO2 and the initial hole mobility in Si, are fit from these transient spectra and match well with values reported previously

    Digital pathology access and usage in the UK: results from a national survey on behalf of the National Cancer Research Institute's CM-Path initiative.

    Get PDF
    Aim To canvass the UK pathology community to ascertain current levels of digital pathology usage in clinical and academic histopathology departments, and prevalent attitudes to digital pathology. Methods A 15-item survey was circulated to National Health Service and academic pathology departments across the UK using the SurveyMonkey online survey tool. Responses were sought at a departmental or institutional level. Where possible, departmental heads were approached and asked to complete the survey, or forward it to the most relevant individual in their department. Data were collected over a 6-month period from February to July 2017. Results 41 institutes from across the UK responded to the survey. 60% (23/39) of institutions had access to a digital pathology scanner, and 60% (24/40) had access to a digital pathology workstation. The most popular applications of digital pathology in current use were undergraduate and postgraduate teaching, research and quality assurance. Investigating the deployment of digital pathology in their department was identified as a high or highest priority by 58.5% of institutions, with improvements in efficiency, turnaround times, reporting times and collaboration in their institution anticipated by the respondents. Access to funding for initial hardware, software and staff outlay, pathologist training and guidance from the Royal College of Pathologists were identified as factors that could enable respondent institutions to increase their digital pathology usage. Conclusion Interest in digital pathology adoption in the UK is high, with usage likely to increase in the coming years. In light of this, pathologists are seeking more guidance on safe usage
    • …
    corecore