677 research outputs found
Testing Peer Contagion in Youth Mental Health Services
The University Archives has determined that this item is of continuing value to OSU's history.Session 2. Presenter: Bethany R. Lee, Ph.D., Washington University in Saint Louis (2007) - "Testing Peer Contagion in Youth Mental Health Services".The Ohio State University College of Social Wor
Nicholas John Jones
Nicholas John Jones was born in Ireland in 1825. He came to Savannah, Georgia, in 1870, after havinq been in this country for some time. He was a private in the Savannah Police Force from 1870 through 1884. He was married twice; his first wife, Mary, died in 1887, and he married his second wife, Annie, the next year. He had no children. Nicholas was by no means a flamboyant man, but he was active in buying and selling property and was quite good at turning a sizeable profit. From 1888 until his death, he lived at 402 East Liberty Street, on the corner of Habersham. He died on
June 21, 1910, of kidney disease and is buried in the Catholic Cemetary.https://digitalcommons.georgiasouthern.edu/sav-bios-lane/1089/thumbnail.jp
Optimizing Cybersecurity Risk in Medical Cyber-Physical Devices
Medical devices are increasingly connected, both to cyber networks and to sensors collecting data from physical stimuli. These cyber-physical systems pose a new host of deadly security risks that traditional notions of cybersecurity struggle to take into account. Previously, we could predict how algorithms would function as they drew on defined inputs. But cyber-physical systems draw on unbounded inputs from the real world. Moreover, with wide networks of cyber-physical medical devices, a single cybersecurity breach could pose lethal dangers to masses of patients.
The U.S. Food and Drug Administration (FDA) is tasked with regulating medical devices to ensure safety and effectiveness, but its regulatory approach—designed decades ago to regulate traditional medical hardware—is ill-suited to the unique problems of cybersecurity. Because perfect cybersecurity is impossible and every cybersecurity improvement entails costs to affordability and health, designers need standards that balance costs and benefits to inform the optimal level of risk. The FDA, however, conducts limited cost-benefit analyses, believing that its authorizing statute forbids consideration of economic costs.
We draw on statutory text and case law to show that this belief is mistaken and that the FDA can and should conduct cost-benefit analyses to ensure safety and effectiveness, especially in the context of cybersecurity. We describe three approaches the FDA could take to implement this analysis as a practical matter. Of these three, we recommend an approach modeled after the Federal Trade Commission’s cost-benefit test. Regardless of the specific approach the FDA chooses, however, the critical point is that the agency must weigh costs and benefits to ensure the right level of cybersecurity. Until then, medical device designers will face continued uncertainty as cybersecurity threats become increasingly dangerous
Optimizing Cybersecurity Risk in Medical Cyber-Physical Devices
Medical devices are increasingly connected, both to cyber networks and to sensors collecting data from physical stimuli. These cyber-physical systems pose a new host of deadly security risks that traditional notions of cybersecurity struggle to take into account. Previously, we could predict how algorithms would function as they drew on defined inputs. But cyber-physical systems draw on unbounded inputs from the real world. Moreover, with wide networks of cyber-physical medical devices, a single cybersecurity breach could pose lethal dangers to masses of patients.
The U.S. Food and Drug Administration (FDA) is tasked with regulating medical devices to ensure safety and effectiveness, but its regulatory approach—designed decades ago to regulate traditional medical hardware—is ill-suited to the unique problems of cybersecurity. Because perfect cybersecurity is impossible and every cybersecurity improvement entails costs to affordability and health, designers need standards that balance costs and benefits to inform the optimal level of risk. The FDA, however, conducts limited cost-benefit analyses, believing that its authorizing statute forbids consideration of economic costs.
We draw on statutory text and case law to show that this belief is mistaken and that the FDA can and should conduct cost-benefit analyses to ensure safety and effectiveness, especially in the context of cybersecurity. We describe three approaches the FDA could take to implement this analysis as a practical matter. Of these three, we recommend an approach modeled after the Federal Trade Commission’s cost-benefit test. Regardless of the specific approach the FDA chooses, however, the critical point is that the agency must weigh costs and benefits to ensure the right level of cybersecurity. Until then, medical device designers will face continued uncertainty as cybersecurity threats become increasingly dangerous
Plant-Soil Feedback Systems in Invasive Grass: Microstegium vimineum
Japanese Stiltgrass (Microstegium vimenium) is an invasive grass that dominates many southeast woodland areas which grows best under sunny conditions but can also thrive in shady areas.
We hypothesized that M. vimenium in invaded soils would have higher germination rates as compared to M. vimenium in native soils
Soils Associated with the Invasive Grass: Microstegium vimineum Increases Growth of Native Trees
Soil biota are composed of the animals, plants and microorganisms that interact and share resources and nutrients in the soil. When an invasive species is introduced to this complex web of soil interactions, plants and other biota can exhibit chemical or physical change and potentially inhibit or enhance growth of plant species. By testing five native tree species in a black box experiment, we can see if there is a change in biomass in above ground (AG) or below ground (BG) structures of the tree between invaded soils - which previously hosted an invasive grass, Microstegium vimineum - and native soils that experienced no invasion. There were 6 soils to be tested - from three field sites that held both a native and invaded soil - along with a control soil, resulting in 7 total trial conditions. Invaded soils were found to have significantly more biomass in their aboveground growth through stems and leaves. All of the trials in invaded soils found a higher mean leaf mass than in the native soils trials. We can conclude that the invaded species is altering the biota in the soil. This change could be in nutrient uptake, physical distribution, or chemical interactions of the soil biota. While we don’t know the specific mechanisms behind this, we do know that native tree species will experience more aboveground biomass in soils that experienced invasion, than in soils that did not experience invasion.https://ir.library.louisville.edu/uars/1059/thumbnail.jp
Recommended from our members
The Museum of Coming Apart
This dissertation comprises two parts: Part I, which discusses use of second person pronoun in contemporary American poetry; and Part II, The Museum of Coming Apart, which is a collection of poems. As confessional verse became a dominant mode in American poetry in the late 1950s and early 60s, so too did the use of the first-person pronoun. Due in part to the excesses of later confessionalism, however, many contemporary poets hesitate to use first person for fear that their work might be read as autobiography. The poetry of the 1990s and early 2000s has thus been characterized by distance, dissociation, and fracture as poets attempt to remove themselves from the overtly emotional and intimate style of the confessionals. However, other contemporary poets have sought to straddle the line between the earnestness and linearity of confessionalism and the intellectually playful yet emotionally detached poetry of the moment. One method for striking this balance is to employ the second person pronoun. Because "you" in English is ambiguous, it allows the poet to toy with the level of distance in a poem and create evolving relationships between the speaker and reader. Through the analysis of poems by C. Dale Young, Paul Guest, Richard Hugo, Nick Flynn, Carrie St. George Comer, and Moira Egan, this essay examines five common ways second person is employed in contemporary American poetry-the use of "you" in reference to a specific individual, the epistolary form, the direct address to the reader, the imperative voice, and the use of "you" as a substitute for "I"-and the ways that the second-person pronoun allows these poems to take the best of both the confessional and dissociative modes
Layer-Resolved Ultrafast XUV Measurement of Hole Transport in a Ni-TiO2-Si Photoanode
Metal-oxide-semiconductor junctions are central to most electronic and
optoelectronic devices. Here, the element-specificity of broadband extreme
ultraviolet (XUV) ultrafast pulses is used to measure the charge transport and
recombination kinetics in each layer of a Ni-TiO2-Si junction. After
photoexcitation of silicon, holes are inferred to transport from Si to Ni
ballistically in ~100 fs, resulting in spectral shifts in the Ni M2,3 XUV edge
that are characteristic of holes and the absence of holes initially in TiO2.
Meanwhile, the electrons are observed to remain on Si. After picoseconds, the
transient hole population on Ni is observed to back-diffuse through the TiO2,
shifting the Ti spectrum to higher oxidation state, followed by electron-hole
recombination at the Si-TiO2 interface and in the Si bulk. Electrical
properties, such as the hole diffusion constant in TiO2 and the initial hole
mobility in Si, are fit from these transient spectra and match well with values
reported previously
Digital pathology access and usage in the UK: results from a national survey on behalf of the National Cancer Research Institute's CM-Path initiative.
Aim To canvass the UK pathology community to ascertain current levels of digital pathology usage in clinical and academic histopathology departments, and prevalent attitudes to digital pathology. Methods A 15-item survey was circulated to National Health Service and academic pathology departments across the UK using the SurveyMonkey online survey tool. Responses were sought at a departmental or institutional level. Where possible, departmental heads were approached and asked to complete the survey, or forward it to the most relevant individual in their department. Data were collected over a 6-month period from February to July 2017. Results 41 institutes from across the UK responded to the survey. 60% (23/39) of institutions had access to a digital pathology scanner, and 60% (24/40) had access to a digital pathology workstation. The most popular applications of digital pathology in current use were undergraduate and postgraduate teaching, research and quality assurance. Investigating the deployment of digital pathology in their department was identified as a high or highest priority by 58.5% of institutions, with improvements in efficiency, turnaround times, reporting times and collaboration in their institution anticipated by the respondents. Access to funding for initial hardware, software and staff outlay, pathologist training and guidance from the Royal College of Pathologists were identified as factors that could enable respondent institutions to increase their digital pathology usage. Conclusion Interest in digital pathology adoption in the UK is high, with usage likely to increase in the coming years. In light of this, pathologists are seeking more guidance on safe usage
- …