933 resultados para Palm Kernel Meal


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Betty Perry in the Perry's Palm Beach Home. Betty Laird Perry was born Betty Laird in Ashland, Ohio. She attended Akron General Hospital School of Nursing, where she was the president of the Akron, Ohio TriCity Student Government Association. She received a 3 year diploma in nursing in 1960 and took her state board exams for licensure as an RN that same year. Ultimately, she became licensed in Ohio, Florida and Texas. She met Charles Perry in 1959 and the couple married on September 17, 1960, in Ashland, Ohio; the same week of her graduation. Betty began her nursing career at the Bowling Green State University campus Health Center while Charles worked on the Admissions staff. In 1974, Mrs. Perry received her BSN from Florida International University and in 1985 she earned a Master's Degree in Healthcare Policy and Planning from Georgia State University. Betty and Charles went on to start their own business , BC Golf, Ltd., in 1992. Betty was later recognized by Cambridge’s Who's Who for demonstrating dedication, leadership and excellence in business management. Betty’s passion for art is reflected in the Student Art Award at Florida International University which she and Charles Perry started in the 1970's. In 2010-2011, Betty made a generous donation to the Patricia & Phillip Frost Art Museum Building Fund at Florida International University where she has a gallery named in her honor that is dedicated to student, faculty, and alumni exhibitions.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objective was to develop and validate a method for estimating food intake of nursing home residents. The study was conducted with certified nursing assistants (CNAs) at a 180-bed nursing facility. CNAs assisted in the development of the new method by providing feedback on existing estimation methods. Four simulated resident trays were used to estimate both food intake and overall meal intake. Twelve CNAs' intake estimates for 34 simulated food items (n=384 estimates) were compared to weighed values. Eightyfive percent of the 384 intake estimates for the simulated food items were correct; Cohen's kappa was 0.80, p

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. ^ We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. ^ We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. ^ We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). ^ In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Historic landscapes are vital elements of our nation's cultural continuum and must be protected as a part of living fabric of the community. This thesis addressed the preservation of historic landscape gardens, focusing on design strategies that can make historic time legible in landscape. It proposed a landscape plan for the preservation of Palm Cottage Garden in Gotha, Florida, a significant historic landscape resource. To determine the criteria used to establish how and to what period the estate should be restored, the Secretary of the Interior's Guidelines for the Treatment of Cultural Landscapes was followed. This process involved documenting the current site conditions and evaluating natural and cultural resources. For the garden to continue to keep its historic fabric, rehabilitation was selected. The garden was designed to preserve existing features and make efficient contemporary use of the garden possible. The landscape plan focused on strategies that reveal the site's significant past through new design elements while adapting to current and future needs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this research is to develop an optimal kernel which would be used in a real-time engineering and communications system. Since the application is a real-time system, relevant real-time issues are studied in conjunction with kernel related issues. The emphasis of the research is the development of a kernel which would not only adhere to the criteria of a real-time environment, namely determinism and performance, but also provide the flexibility and portability associated with non-real-time environments. The essence of the research is to study how the features found in non-real-time systems could be applied to the real-time system in order to generate an optimal kernel which would provide flexibility and architecture independence while maintaining the performance needed by most of the engineering applications. Traditionally, development of real-time kernels has been done using assembly language. By utilizing the powerful constructs of the C language, a real-time kernel was developed which addressed the goals of flexibility and portability while still meeting the real-time criteria. The implementation of the kernel is carried out using the powerful 68010/20/30/40 microprocessor based systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this study was to investigate the efficacy of using monosodium glutamate (MSG) as a means to increase palatability and prospective consumption of vegetables at a congregate meal site with Cuban-American clients. Thirty to 32 subjects participated in hedonic testing each day. MSG-enhanced (2 g MSG/500 g vegetable) and non-enhanced beets, string beans, carrots and peas were evaluated for palatability, preference and prospective consumption. Results showed that MSG significantly increased both palatability and prospective consumption of string beans (ps < .05) but not of the other 3 vegetables tested. These findings provide some evidence that MSG can be used to increase the palatability of vegetables served at congregate meal sites. However, these results suggest that older adults may not find the palatability of some vegetables to be improved by MSG and that optimal flavor enhancement cannot be achieved by adding the same amount of MSG to every vegetable.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Acknowledgement We are grateful to the food manufacturers for answering queries and supplying missing nutritional information. Source of funding The study was funded by the Seafish and Interface Food and Drink as part of a Doctorate Scholarship undertaken at the University of Aberdeen. © 2015 John Wiley & Sons Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Acknowledgement We are grateful to the food manufacturers for answering queries and supplying missing nutritional information. Source of funding The study was funded by the Seafish and Interface Food and Drink as part of a Doctorate Scholarship undertaken at the University of Aberdeen. © 2015 John Wiley & Sons Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This data set contains profiles of atmospheric carbon monoxide (CO) concentrations retrieved from measurements made by the Kiruna Microwave Radiometer (KIMRA), housed at the Swedish Institute for Space Physics, Kiruna. The data is retrieved on a standard pressure grid that is 62 layers, spaced approximately equally in altitude between 2 km and 124 km. The current time range of the data is December 2008 to May 2015, with data gaps corresponding to Summer periods when the CO concentrations in the middle atmosphere drop to very low values, or to non-operation of the instrument. The profile information is considered useful between approximately 48 km and 86 km, specifically where the measurement response is above 0.8. If the CO profiles are being compared to another data set with significantly higher altitude resolution, the averaging kernel matrix should be used to smooth the higher resolution data. The error in the profile from statistical noise on the measured spectrum is also provided. This work has been funded by the German Federal Ministry of Education and Research through the research project: Role Of the Middle atmosphere in Climate (ROMIC, https://romic.iap-kborn.de).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Portikus presents the work of late British conceptual artist John Latham (1921-2006) and a new work by artist and researcher Neal White. By facilitating a dialogue between these two practices, the show decodes Latham’s expansive and hugely complex oeuvre and the conceptual legacy of art in relation to the ‘event’ as a structural entity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the past decade, several major food safety crises originated from problems with feed. Consequently, there is an urgent need for early detection of fraudulent adulteration and contamination in the feed chain. Strategies are presented for two specific cases, viz. adulterations of (i) soybean meal with melamine and other types of adulterants/contaminants and (ii) vegetable oils with mineral oil, transformer oil or other oils. These strategies comprise screening at the feed mill or port of entry with non-destructive spectroscopic methods (NIRS and Raman), followed by post-screening and confirmation in the laboratory with MS-based methods. The spectroscopic techniques are suitable for on-site and on-line applications. Currently they are suited to detect fraudulent adulteration at relatively high levels but not to detect low level contamination. The potential use of the strategies for non-targeted analysis is demonstrated.