WorldWideScience

Sample records for authentication ldrd project

  1. Final report for the mobile node authentication LDRD project.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Lanzone, Andrew J.

    2005-09-01

    In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

  2. FY 2014 LDRD Annual Report Project Summaries

    Energy Technology Data Exchange (ETDEWEB)

    Tomchak, Dena [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-02-01

    The FY 2014 Laboratory Directed Research and Development (LDRD) Annual Report is a compendium of the diverse research performed to develop and ensure the INL's technical capabilities can support future DOE missions and national research priorities. LDRD is essential to INL - it provides a means for the laboratory to pursue novel scientific and engineering research in areas that are deemed too basic or risky for programmatic investments. This research enahnces technical capabilities at the laboratory, providing scientific and engineering staff with opportunities for skill building and partnership development.

  3. Idaho National Laboratory Annual Report FY 2013 LDRD Project Summaries

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2014-03-01

    The FY 2013 LDRD Annual Report is a compendium of the diverse research performed to develop and ensure the INL’s technical capabilities support the current and future DOE missions and national research priorities. LDRD is essential to INL—it provides a means for the Laboratory to maintain scientific and technical vitality while funding highly innovative, high-risk science and technology research and development (R&D) projects. The program enhances technical capabilities at the Laboratory, providing scientific and engineering staff with opportunities to explore proof-of-principle ideas, advanced studies of innovative concepts, and preliminary technical analyses. Established by Congress in 1991, the LDRD Program proves its benefit each year through new programs, intellectual property, patents, copyrights, national and international awards, and publications.

  4. LDRD project 151362 : low energy electron-photon transport.

    Energy Technology Data Exchange (ETDEWEB)

    Kensek, Ronald Patrick; Hjalmarson, Harold Paul; Magyar, Rudolph J.; Bondi, Robert James; Crawford, Martin James

    2013-09-01

    At sufficiently high energies, the wavelengths of electrons and photons are short enough to only interact with one atom at time, leading to the popular %E2%80%9Cindependent-atom approximation%E2%80%9D. We attempted to incorporate atomic structure in the generation of cross sections (which embody the modeled physics) to improve transport at lower energies. We document our successes and failures. This was a three-year LDRD project. The core team consisted of a radiation-transport expert, a solid-state physicist, and two DFT experts.

  5. THz transceiver characterization : LDRD project 139363 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Nordquist, Christopher Daniel; Wanke, Michael Clement; Cich, Michael Joseph; Reno, John Louis; Fuller, Charles T.; Wendt, Joel Robert; Lee, Mark; Grine, Albert D.

    2009-09-01

    LDRD Project 139363 supported experiments to quantify the performance characteristics of monolithically integrated Schottky diode + quantum cascade laser (QCL) heterodyne mixers at terahertz (THz) frequencies. These integrated mixers are the first all-semiconductor THz devices to successfully incorporate a rectifying diode directly into the optical waveguide of a QCL, obviating the conventional optical coupling between a THz local oscillator and rectifier in a heterodyne mixer system. This integrated mixer was shown to function as a true heterodyne receiver of an externally received THz signal, a breakthrough which may lead to more widespread acceptance of this new THz technology paradigm. In addition, questions about QCL mode shifting in response to temperature, bias, and external feedback, and to what extent internal frequency locking can improve stability have been answered under this project.

  6. Selected Examples of LDRD Projects Supporting Test Ban Treaty Verification and Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Al-Ayat, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Walter, W. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-02-23

    The Laboratory Directed Research and Development (LDRD) Program at the DOE National Laboratories was established to ensure the scientific and technical vitality of these institutions and to enhance the their ability to respond to evolving missions and anticipate national needs. LDRD allows the Laboratory directors to invest a percentage of their total annual budget in cutting-edge research and development projects within their mission areas. We highlight a selected set of LDRD-funded projects, in chronological order, that have helped provide capabilities, people and infrastructure that contributed greatly to our ability to respond to technical challenges in support of test ban treaty verification and nonproliferation.

  7. Final report on LDRD project : advanced optical trigger systems.

    Energy Technology Data Exchange (ETDEWEB)

    Roose, Lars D.; Hadley, G. Ronald; Mar, Alan; Serkland, Darwin Keith; Geib, Kent Martin; Sullivan, Charles Thomas; Keeler, Gordon Arthur; Bauer, Thomas M. (LMATA Government Services, LLC., Albuquerque, NM); Peake, Gregory Merwin; Loubriel, Guillermo Manuel; Montano, Victoria A. (LMATA Government Services, LLC., Albuquerque, NM)

    2008-09-01

    are difficult to scale and manufacture with the required uniformity. As a promising alternative to multiple discrete edge-emitting lasers, a single wafer of vertical-cavity surface-emitting lasers (VCSELs) can be lithographically patterned to achieve the desired layout of parallel line-shaped emitters, in which adjacent lasers utilize identical semiconductor material and thereby achieve a degree of intrinsic optical uniformity. Under this LDRD project, we have fabricated arrays of uncoupled circular-aperture VCSELs to approximate a line-shaped illumination pattern, achieving optical fill factors ranging from 2% to 30%. We have applied these VCSEL arrays to demonstrate single and dual parallel line-filament triggering of PCSS devices. Moreover, we have developed a better understanding of the illumination requirements for stable triggering of multiple-filament PCSS devices using VCSEL arrays. We have found that reliable triggering of multiple filaments requires matching of the turn-on time of adjacent VCSEL line-shaped-arrays to within approximately 1 ns. Additionally, we discovered that reliable triggering of PCSS devices at low voltages requires more optical power than we obtained with our first generation of VCSEL arrays. A second generation of higher-power VCSEL arrays was designed and fabricated at the end of this LDRD project, and testing with PCSS devices is currently underway (as of September 2008).

  8. Final report on LDRD project 52722 : radiation hardened optoelectronic components for space-based applications.

    Energy Technology Data Exchange (ETDEWEB)

    Hargett, Terry W. (L& M Technologies, Inc.); Serkland, Darwin Keith; Blansett, Ethan L.; Geib, Kent Martin; Sullivan, Charles Thomas; Hawkins, Samuel D.; Wrobel, Theodore Frank; Keeler, Gordon Arthur; Klem, John Frederick; Medrano, Melissa R.; Peake, Gregory Merwin; Karpen, Gary D.; Montano, Victoria A. (L& M Technologies, Inc.)

    2003-12-01

    This report describes the research accomplishments achieved under the LDRD Project 'Radiation Hardened Optoelectronic Components for Space-Based Applications.' The aim of this LDRD has been to investigate the radiation hardness of vertical-cavity surface-emitting lasers (VCSELs) and photodiodes by looking at both the effects of total dose and of single-event upsets on the electrical and optical characteristics of VCSELs and photodiodes. These investigations were intended to provide guidance for the eventual integration of radiation hardened VCSELs and photodiodes with rad-hard driver and receiver electronics from an external vendor for space applications. During this one-year project, we have fabricated GaAs-based VCSELs and photodiodes, investigated ionization-induced transient effects due to high-energy protons, and measured the degradation of performance from both high-energy protons and neutrons.

  9. FY05 LDRD Final Report Molecular Radiation Biodosimetry LDRD Project Tracking Code: 04-ERD-076

    Energy Technology Data Exchange (ETDEWEB)

    Jones, I M; A.Coleman, M; Lehmann, J; Manohar, C F; Marchetti, F; Mariella, R; Miles, R; Nelson, D O; Wyrobek, A J

    2006-02-03

    been, these methods are not suitable. The best current option for triage radiation biodosimetry is self-report of time to onset of emesis after the event, a biomarker that is subject to many false positives. The premise of this project is that greatly improved radiation dosimetry can be achieved by research and development directed toward detection of molecular changes induced by radiation in cells or other biological materials. Basic research on the responses of cells to radiation at the molecular level, particularly of message RNA and proteins, has identified biomolecules whose levels increase (or decrease) as part of cellular responses to radiation. Concerted efforts to identify markers useful for triage and clinical applications have not been reported as yet. Such studies would scan responses over a broad range of doses, below, at and above the threshold of clinical significance in the first weeks after exposure, and would collect global proteome and/or transcriptome information on all tissue samples accessible to either first responders or clinicians. For triage, the goal is to identify those needing medical treatment. Treatment will be guided by refined dosimetry. Achieving this goal entails determining whether radiation exposure was below or above the threshold of concern, using one sample collected within days of an event, with simple devices that first responders either use or distribute for self-testing. For the clinic, better resolution of dose and tissue damage is needed to determine the nature and time sensitivity of therapy, but multiple sampling times may be acceptable and clinical staff and equipment can be utilized. Two complementary areas of research and development are needed once candidate biomarkers are identified, validation of the biomarker responses and validation of devices/instrumentation for detection of responses. Validation of biomarkers per se is confirmation that the dose, time, and tissue specific responses meet the reporting

  10. FPGAs in High Perfomance Computing: Results from Two LDRD Projects.

    Energy Technology Data Exchange (ETDEWEB)

    Underwood, Keith D; Ulmer, Craig D.; Thompson, David; Hemmert, Karl Scott

    2006-11-01

    Field programmable gate arrays (FPGAs) have been used as alternative computational de-vices for over a decade; however, they have not been used for traditional scientific com-puting due to their perceived lack of floating-point performance. In recent years, there hasbeen a surge of interest in alternatives to traditional microprocessors for high performancecomputing. Sandia National Labs began two projects to determine whether FPGAs wouldbe a suitable alternative to microprocessors for high performance scientific computing and,if so, how they should be integrated into the system. We present results that indicate thatFPGAs could have a significant impact on future systems. FPGAs have thepotentialtohave order of magnitude levels of performance wins on several key algorithms; however,there are serious questions as to whether the system integration challenge can be met. Fur-thermore, there remain challenges in FPGA programming and system level reliability whenusing FPGA devices.4 AcknowledgmentArun Rodrigues provided valuable support and assistance in the use of the Structural Sim-ulation Toolkit within an FPGA context. Curtis Janssen and Steve Plimpton provided valu-able insights into the workings of two Sandia applications (MPQC and LAMMPS, respec-tively).5

  11. FY08 LDRD Final Report A New Method for Wave Propagation in Elastic Media LDRD Project Tracking Code: 05-ERD-079

    Energy Technology Data Exchange (ETDEWEB)

    Petersson, A

    2009-01-29

    The LDRD project 'A New Method for Wave Propagation in Elastic Media' developed several improvements to the traditional finite difference technique for seismic wave propagation, including a summation-by-parts discretization which is provably stable for arbitrary heterogeneous materials, an accurate treatment of non-planar topography, local mesh refinement, and stable outflow boundary conditions. This project also implemented these techniques in a parallel open source computer code called WPP, and participated in several seismic modeling efforts to simulate ground motion due to earthquakes in Northern California. This research has been documented in six individual publications which are summarized in this report. Of these publications, four are published refereed journal articles, one is an accepted refereed journal article which has not yet been published, and one is a non-refereed software manual. The report concludes with a discussion of future research directions and exit plan.

  12. Authentication Projects for Historical Fiction: Do You Believe It?

    Science.gov (United States)

    McTigue, Erin; Thornton, Elaine; Wiese, Patricia

    2013-01-01

    Authentication projects, particularly for historical fiction, provide a means for students to explore literature and history while practicing critical literacy skills. The authors 1) present benefits and cautions for historical fiction use in elementary classrooms, 2) introduce authentication projects as a means to mitigate risks and enhance…

  13. Final report on LDRD project: Simulation/optimization tools for system variability analysis

    Energy Technology Data Exchange (ETDEWEB)

    R. L. Bierbaum; R. F. Billau; J. E. Campbell; K. D. Marx; R. J. Sikorski; B. M. Thompson; S. D. Wix

    1999-10-01

    >This work was conducted during FY98 (Proposal Number 98-0036) and FY99 (Proposal Number 99-0818) under the auspices of the Sandia National Laboratories Laboratory-Directed Research and Development (LDRD) program. Electrical simulation typically treats a single data point in the very large input space of component properties. For electrical simulation to reach its full potential as a design tool, it must be able to address the unavoidable variability and uncertainty in component properties. Component viability is strongly related to the design margin (and reliability) of the end product. During the course of this project, both tools and methodologies were developed to enable analysis of variability in the context of electrical simulation tools. Two avenues to link relevant tools were also developed, and the resultant toolset was applied to a major component.

  14. Final LDRD Report for Projects # 52797 and # 93362: Rational Understanding and Control of the Magnetic Behavior of Nanoparticles.

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Z. John

    2006-11-01

    This is the final LDRD report for projects # 52797 and # 93362 that funded a five year research program directed by Prof. Z. John Zhang at the Georgia Institute of Technology Chemistry Department. Prof. Zhang was awarded this funding after winning a Presidential Early Career Award in Science and Engineering (PECASE) in 2001 with Sandia as the DOE sponsoring lab. The project PI was Blake Simmons and the PM was Alfredo Morales. The page intentionally left blank

  15. Final Report for LDRD Project on Rapid Problem Setup for Mesh-Based Simulation (Rapsodi)

    Energy Technology Data Exchange (ETDEWEB)

    Brown, D L; Henshaw, W; Petersson, N A; Fast, P; Chand, K

    2003-02-07

    Under LLNL Exploratory Research LDRD funding, the Rapsodi project developed rapid setup technology for computational physics and engineering problems that require computational representations of complex geometry. Many simulation projects at LLNL involve the solution of partial differential equations in complex 3-D geometries. A significant bottleneck in carrying out these simulations arises in converting some specification of a geometry, such as a computer-aided design (CAD) drawing to a computationally appropriate 3-D mesh that can be used for simulation and analysis. Even using state-of-the-art mesh generation software, this problem setup step typically has required weeks or months, which is often much longer than required to carry out the computational simulation itself. The Rapsodi project built computational tools and designed algorithms that help to significantly reduce this setup time to less than a day for many realistic problems. The project targeted rapid setup technology for computational physics and engineering problems that use mixed-element unstructured meshes, overset meshes or Cartesian-embedded boundary (EB) meshes to represent complex geometry. It also built tools that aid in constructing computational representations of geometry for problems that do not require a mesh. While completely automatic mesh generation is extremely difficult, the amount of manual labor required can be significantly reduced. By developing novel, automated, component-based mesh construction procedures and automated CAD geometry repair and cleanup tools, Rapsodi has significantly reduced the amount of hand crafting required to generate geometry and meshes for scientific simulation codes.

  16. A configuration space toolkit for automated spatial reasoning: Technical results and LDRD project final report

    Energy Technology Data Exchange (ETDEWEB)

    Xavier, P.G.; LaFarge, R.A.

    1997-02-01

    A robot`s configuration space (c-space) is the space of its kinematic degrees of freedom, e.g., the joint-space of an arm. Sets in c-space can be defined that characterize a variety of spatial relationships, such as contact between the robot and its environment. C-space techniques have been fundamental to research progress in areas such as motion planning and physically-based reasoning. However, practical progress has been slowed by the difficulty of implementing the c-space abstraction inside each application. For this reason, we proposed a Configuration Space Toolkit of high-performance algorithms and data structures meeting these needs. Our intent was to develop this robotics software to provide enabling technology to emerging applications that apply the c-space abstraction, such as advanced motion planning, teleoperation supervision, mechanism functional analysis, and design tools. This final report presents the research results and technical achievements of this LDRD project. Key results and achievements included (1) a hybrid Common LISP/C prototype that implements the basic C-Space abstraction, (2) a new, generic, algorithm for constructing hierarchical geometric representations, and (3) a C++ implementation of an algorithm for fast distance computation, interference detection, and c-space point-classification. Since the project conclusion, motion planning researchers in Sandia`s Intelligent Systems and Robotics Center have been using the CSTk libcstk.so C++ library. The code continues to be used, supported, and improved by projects in the ISRC.

  17. RF/microwave properties of nanotubes and nanowires : LDRD Project 105876 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Scrymgeour, David; Lee, Mark; Hsu, Julia W. P.; Highstrete, Clark

    2009-09-01

    LDRD Project 105876 was a research project whose primary goal was to discover the currently unknown science underlying the basic linear and nonlinear electrodynamic response of nanotubes and nanowires in a manner that will support future efforts aimed at converting forefront nanoscience into innovative new high-frequency nanodevices. The project involved experimental and theoretical efforts to discover and understand high frequency (MHz through tens of GHz) electrodynamic response properties of nanomaterials, emphasizing nanowires of silicon, zinc oxide, and carbon nanotubes. While there is much research on DC electrical properties of nanowires, electrodynamic characteristics still represent a major new frontier in nanotechnology. We generated world-leading insight into how the low dimensionality of these nanomaterials yields sometimes desirable and sometimes problematic high-frequency properties that are outside standard model electron dynamics. In the cases of silicon nanowires and carbon nanotubes, evidence of strong disorder or glass-like charge dynamics was measured, indicating that these materials still suffer from serious inhomogeneities that limit there high frequency performance. Zinc oxide nanowires were found to obey conventional Drude dynamics. In all cases, a significant practical problem involving large impedance mismatch between the high intrinsic impedance of all nanowires and nanotubes and high-frequency test equipment had to be overcome.

  18. Authentication for Propulsion Test Streaming Video Project

    Data.gov (United States)

    National Aeronautics and Space Administration — An application was developed that could enforce two-factor authentication for NASA access to the Propulsion Test Streaming Video System.  To gain access to the...

  19. Multimedia Data Hiding and Authentication via Halftoning and Coordinate Projection

    Directory of Open Access Journals (Sweden)

    Wu Chai Wah

    2002-01-01

    Full Text Available We present image data hiding and authentication schemes based on halftoning and coordinate projection. The proposed data hiding scheme can embed images of the same size and similar bit depth into the cover image and robustness against compression is demonstrated. The image authentication scheme is based on the data hiding scheme and can detect, localize, and repair the tampered area of the image. Furthermore, the self-repairing feature of the authentication scheme has a hologram-like quality; any portion of the image can be used to reconstruct the entire image, with a greater quality of reconstruction as the portion size increases.

  20. Final Report for LDRD Project 02-FS-009 Gigapixel Surveillance Camera

    Energy Technology Data Exchange (ETDEWEB)

    Marrs, R E; Bennett, C L

    2010-04-20

    The threats of terrorism and proliferation of weapons of mass destruction add urgency to the development of new techniques for surveillance and intelligence collection. For example, the United States faces a serious and growing threat from adversaries who locate key facilities underground, hide them within other facilities, or otherwise conceal their location and function. Reconnaissance photographs are one of the most important tools for uncovering the capabilities of adversaries. However, current imaging technology provides only infrequent static images of a large area, or occasional video of a small area. We are attempting to add a new dimension to reconnaissance by introducing a capability for large area video surveillance. This capability would enable tracking of all vehicle movements within a very large area. The goal of our project is the development of a gigapixel video surveillance camera for high altitude aircraft or balloon platforms. From very high altitude platforms (20-40 km altitude) it would be possible to track every moving vehicle within an area of roughly 100 km x 100 km, about the size of the San Francisco Bay region, with a gigapixel camera. Reliable tracking of vehicles requires a ground sampling distance (GSD) of 0.5 to 1 m and a framing rate of approximately two frames per second (fps). For a 100 km x 100 km area the corresponding pixel count is 10 gigapixels for a 1-m GSD and 40 gigapixels for a 0.5-m GSD. This is an order of magnitude beyond the 1 gigapixel camera envisioned in our LDRD proposal. We have determined that an instrument of this capacity is feasible.

  1. Authentic Leadership: An Emerging Issue in Project Management

    Directory of Open Access Journals (Sweden)

    Saif Ur Rehman Khan

    2014-09-01

    Full Text Available Leadership has been a feature of general organizations but in project management much space is empty. New styles of leadership are being introduced and project leadership also can’t escape. With the advancement in project management project leadership requires new effective behaviors in organizations if it is to remain relevant. Interestingly, still project leadership has no separate wing of theory under the subject of project management but striving to strengthen the concept as distinct branch of knowledge. The reason behind that is project management and project managers have long been considered as a part of technical field rather being a part of social sciences. Different leadership styles have been discussed with some empirical support and there is need to adopt the new styles like authentic leadership in project management. Although authentic leadership is at its initial stages but produced positive results in studies discussed so far. In this study importance of authentic leadership has been discussed theoretically as compared to other contemporary theories.

  2. Final report on LDRD project : coupling strategies for multi-physics applications.

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Matthew Morgan; Moffat, Harry K.; Carnes, Brian; Hooper, Russell Warren; Pawlowski, Roger P.

    2007-11-01

    Many current and future modeling applications at Sandia including ASC milestones will critically depend on the simultaneous solution of vastly different physical phenomena. Issues due to code coupling are often not addressed, understood, or even recognized. The objectives of the LDRD has been both in theory and in code development. We will show that we have provided a fundamental analysis of coupling, i.e., when strong coupling vs. a successive substitution strategy is needed. We have enabled the implementation of tighter coupling strategies through additions to the NOX and Sierra code suites to make coupling strategies available now. We have leveraged existing functionality to do this. Specifically, we have built into NOX the capability to handle fully coupled simulations from multiple codes, and we have also built into NOX the capability to handle Jacobi Free Newton Krylov simulations that link multiple applications. We show how this capability may be accessed from within the Sierra Framework as well as from outside of Sierra. The critical impact from this LDRD is that we have shown how and have delivered strategies for enabling strong Newton-based coupling while respecting the modularity of existing codes. This will facilitate the use of these codes in a coupled manner to solve multi-physic applications.

  3. LDRD Annual Report FY2006

    Energy Technology Data Exchange (ETDEWEB)

    Sketchley, J A; Kotta, P; De Yoreo, J; Jackson, K; van Bibber, K

    2007-03-20

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Laboratory Science and Technology Office, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration in national security, energy security, environmental management, bioscience and technology to improve human health, and breakthroughs in fundamental science and technology. The accomplishments described in this Annual Report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $92 million for FY2006 sponsored 188 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the

  4. Final report on LDRD Project: Quantum confinement and light emission in silicon nanostructures

    Energy Technology Data Exchange (ETDEWEB)

    Guilinger, T.R.; Kelly, M.J.; Follstaedt, D.M. [and others

    1995-02-01

    Electrochemically formed porous silicon (PS) was reported in 1991 to exhibit visible photoluminescence. This discovery could lead to the use of integrated silicon-based optoelectronic devices. This LDRD addressed two general goals for optical emission from Si: (1) investigate the mechanisms responsible for light emission, and (2) tailor the microstructure and composition of the Si to obtain photoemission suitable for working devices. PS formation, composition, morphology, and microstructure have been under investigation at Sandia for the past ten years for applications in silicon-on-insulator microelectronics, micromachining, and chemical sensors. The authors used this expertise to form luminescent PS at a variety of wavelengths and have used analytical techniques such as in situ Raman and X-ray reflectivity to investigate the luminescence mechanism and quantify the properties of the porous silicon layer. Further, their experience with ion implantation in Si lead to an investigation into alternate methods of producing Si nanostructures that visibly luminesce.

  5. Human pluripotent stem cell differentiation into authentic striatal projection neurons.

    Science.gov (United States)

    Delli Carri, Alessia; Onorati, Marco; Castiglioni, Valentina; Faedo, Andrea; Camnasio, Stefano; Toselli, Mauro; Biella, Gerardo; Cattaneo, Elena

    2013-08-01

    Here we present the principles and steps of a protocol that we have recently developed for the differentiation of hES/iPS cells into the authentic human striatal projection medium spiny neurons (MSNs) that die in Huntington's Disease (HD). Authenticity is judged by the convergence of multiple features within individual cells. Our procedure lasts 80 days and couples neural induction via BMP/TGF-β inhibition with exposure to the developmental factors sonic hedgehog (SHH) and dickkopf1 (DKK-1) to drive ventral telencephalic specification, followed by terminal differentiation [1]. Authenticity of the resulting neuronal population is monitored by the appearance of FOXG1(+)/GSX2(+) progenitor cells of the lateral ganglionic eminence (LGE) at day 15-25 of differentiation, followed by appearance of CTIP2-, FOXP1- and FOXP2-positive cells at day 45. These precursor cells then mature into MAP2(+)/GABA(+) neurons with 20 % of them ultimately co-expressing the DARPP-32 and CTIP2 diagnostic markers and carrying electrophysiological properties expected for fully functional MSNs.The protocol is characterized by its replicability in at least three human pluripotent cell lines. Altogether this protocol defines a useful platform for in vitro developmental neurobiology studies, drug screening, and regenerative medicine approaches.

  6. Investigation of Factors Mediating the Effectiveness of Authentic Projects in the Teaching of Elementary Statistics

    Science.gov (United States)

    Spence, Dianna J.; Sharp, Julia L.; Sinn, Robb

    2011-01-01

    Four instructors used authentic research projects and related curriculum materials when teaching elementary statistics in secondary and undergraduate settings. Projects were authentic in that students selected their own variables, defined their own research questions, and collected and analyzed their own data. Classes using these projects were…

  7. LDRD project final report : hybrid AI/cognitive tactical behavior framework for LVC.

    Energy Technology Data Exchange (ETDEWEB)

    Djordjevich, Donna D.; Xavier, Patrick Gordon; Brannon, Nathan Gregory; Hart, Brian E.; Hart, Derek H.; Little, Charles Quentin; Oppel, Fred John III; Linebarger, John Michael; Parker, Eric Paul

    2012-01-01

    This Lab-Directed Research and Development (LDRD) sought to develop technology that enhances scenario construction speed, entity behavior robustness, and scalability in Live-Virtual-Constructive (LVC) simulation. We investigated issues in both simulation architecture and behavior modeling. We developed path-planning technology that improves the ability to express intent in the planning task while still permitting an efficient search algorithm. An LVC simulation demonstrated how this enables 'one-click' layout of squad tactical paths, as well as dynamic re-planning for simulated squads and for real and simulated mobile robots. We identified human response latencies that can be exploited in parallel/distributed architectures. We did an experimental study to determine where parallelization would be productive in Umbra-based force-on-force (FOF) simulations. We developed and implemented a data-driven simulation composition approach that solves entity class hierarchy issues and supports assurance of simulation fairness. Finally, we proposed a flexible framework to enable integration of multiple behavior modeling components that model working memory phenomena with different degrees of sophistication.

  8. Final report for LDRD project 11-0783 : directed robots for increased military manpower effectiveness.

    Energy Technology Data Exchange (ETDEWEB)

    Rohrer, Brandon Robinson; Rothganger, Fredrick H.; Wagner, John S.; Xavier, Patrick Gordon; Morrow, James Dan

    2011-09-01

    The purpose of this LDRD is to develop technology allowing warfighters to provide high-level commands to their unmanned assets, freeing them to command a group of them or commit the bulk of their attention elsewhere. To this end, a brain-emulating cognition and control architecture (BECCA) was developed, incorporating novel and uniquely capable feature creation and reinforcement learning algorithms. BECCA was demonstrated on both a mobile manipulator platform and on a seven degree of freedom serial link robot arm. Existing military ground robots are almost universally teleoperated and occupy the complete attention of an operator. They may remove a soldier from harm's way, but they do not necessarily reduce manpower requirements. Current research efforts to solve the problem of autonomous operation in an unstructured, dynamic environment fall short of the desired performance. In order to increase the effectiveness of unmanned vehicle (UV) operators, we proposed to develop robots that can be 'directed' rather than remote-controlled. They are instructed and trained by human operators, rather than driven. The technical approach is modeled closely on psychological and neuroscientific models of human learning. Two Sandia-developed models are utilized in this effort: the Sandia Cognitive Framework (SCF), a cognitive psychology-based model of human processes, and BECCA, a psychophysical-based model of learning, motor control, and conceptualization. Together, these models span the functional space from perceptuo-motor abilities, to high-level motivational and attentional processes.

  9. Final report and recommendations of the ESnet Authentication Pilot Project

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

    1995-01-01

    To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

  10. LDRD FY 2014 Program Plan

    Energy Technology Data Exchange (ETDEWEB)

    Anita Gianotto; Dena Tomchak

    2013-08-01

    As required by DOE Order 413.2B the FY 2014 Program Plan is written to communicate ares of investment and approximate amounts being requested for the upcoming fiscal year. The program plan also includes brief highlights of current or previous LDRD projects that have an opportunity to impact our Nation's current and future energy challenges.

  11. Final report for the Multiprotocol Label Switching (MPLS) control plane security LDRD project.

    Energy Technology Data Exchange (ETDEWEB)

    Torgerson, Mark Dolan; Michalski, John T.; Tarman, Thomas David; Black, Stephen P.; Pierson, Lyndon George

    2003-09-01

    As rapid Internet growth continues, global communications becomes more dependent on Internet availability for information transfer. Recently, the Internet Engineering Task Force (IETF) introduced a new protocol, Multiple Protocol Label Switching (MPLS), to provide high-performance data flows within the Internet. MPLS emulates two major aspects of the Asynchronous Transfer Mode (ATM) technology. First, each initial IP packet is 'routed' to its destination based on previously known delay and congestion avoidance mechanisms. This allows for effective distribution of network resources and reduces the probability of congestion. Second, after route selection each subsequent packet is assigned a label at each hop, which determines the output port for the packet to reach its final destination. These labels guide the forwarding of each packet at routing nodes more efficiently and with more control than traditional IP forwarding (based on complete address information in each packet) for high-performance data flows. Label assignment is critical in the prompt and accurate delivery of user data. However, the protocols for label distribution were not adequately secured. Thus, if an adversary compromises a node by intercepting and modifying, or more simply injecting false labels into the packet-forwarding engine, the propagation of improperly labeled data flows could create instability in the entire network. In addition, some Virtual Private Network (VPN) solutions take advantage of this 'virtual channel' configuration to eliminate the need for user data encryption to provide privacy. VPN's relying on MPLS require accurate label assignment to maintain user data protection. This research developed a working distributive trust model that demonstrated how to deploy confidentiality, authentication, and non-repudiation in the global network label switching control plane. Simulation models and laboratory testbed implementations that demonstrated this concept

  12. Dynamic compression of synthetic diamond windows (final report for LDRD project 93531).

    Energy Technology Data Exchange (ETDEWEB)

    Dolan, Daniel H.,

    2008-09-01

    Diamond is an attractive dynamic compression window for many reasons: high elastic limit,large mechanical impedance, and broad transparency range. Natural diamonds, however, aretoo expensive to be used in destructive experiments. Chemical vapor deposition techniquesare now able to produce large single-crystal windows, opening up many potential dynamiccompression applications. This project studied the behavior of synthetic diamond undershock wave compression. The results suggest that synthetic diamond could be a usefulwindow in this field, though complete characterization proved elusive.3

  13. Coordinating robot motion, sensing, and control in plans. LDRD project final report

    Energy Technology Data Exchange (ETDEWEB)

    Xavier, P.G.; Brown, R.G.; Watterberg, P.A. [Sandia National Labs., Albuquerque, NM (United States). Intelligent Systems and Robotics Center

    1997-08-01

    The goal of this project was to develop a framework for robotic planning and execution that provides a continuum of adaptability with respect to model incompleteness, model error, and sensing error. For example, dividing robot motion into gross-motion planning, fine-motion planning, and sensor-augmented control had yielded productive research and solutions to individual problems. Unfortunately, these techniques could only be combined by hand with ad hoc methods and were restricted to systems where all kinematics are completely modeled in planning. The original intent was to develop methods for understanding and autonomously synthesizing plans that coordinate motion, sensing, and control. The project considered this problem from several perspectives. Results included (1) theoretical methods to combine and extend gross-motion and fine-motion planning; (2) preliminary work in flexible-object manipulation and an implementable algorithm for planning shortest paths through obstacles for the free-end of an anchored cable; (3) development and implementation of a fast swept-body distance algorithm; and (4) integration of Sandia`s C-Space Toolkit geometry engine and SANDROS motion planer and improvements, which yielded a system practical for everyday motion planning, with path-segment planning at interactive speeds. Results (3) and (4) have either led to follow-on work or are being used in current projects, and they believe that (2) will eventually be also.

  14. Characterizing the emissivity of materials under dynamic compression (final report for LDRD project 79877).

    Energy Technology Data Exchange (ETDEWEB)

    Dolan, Daniel H.

    2007-10-01

    Temperature measurements are crucial to equation of state development, but difficult to perform reliably. In the case of infrared pyrometry, a large uncertainty comes from the fact that sample emissivity (the deviation from a blackbody) is unknown. In this project, a method for characterizing the emissivity of shocked materials was developed. By coupling infrared radiation from the National Synchrotron Light Source to a gas gun system, broad spectrum emissivity changes were studied to a peak stress of 8 GPa. Emissivity measurements were performed on standard metals (Al, Cr, Cu, and Pt) as well as a high emissivity coating developed at Sandia.

  15. FY2014 LBNL LDRD Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Ho, Darren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-06-01

    Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE’s National Laboratory System, Berkeley Lab supports DOE’s missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation. The LDRD program supports Berkeley Lab’s mission in many ways. First, because LDRD funds can be allocated within a relatively short time frame, Berkeley Lab researchers can support the mission of the Department of Energy (DOE) and serve the needs of the nation by quickly responding to forefront scientific problems. Second, LDRD enables Berkeley Lab to attract and retain highly qualified scientists and to support their efforts to carry out worldleading research. In addition, the LDRD program also supports new projects that involve graduate students and postdoctoral fellows, thus contributing to the education mission of Berkeley Lab.

  16. Final LDRD report :

    Energy Technology Data Exchange (ETDEWEB)

    Clark, Blythe G.; Rajasekhara, Shreyas; Enos, David George; Dingreville, Remi Philippe Michel; Doyle, Barney Lee; Hattar, Khalid Mikhiel; Weiner, Ruth F.

    2013-09-01

    We present the results of a three-year LDRD project focused on understanding microstructural evolution and related property changes in Zr-based nuclear cladding materials towards the development of high fidelity predictive simulations for long term dry storage. Experiments and modeling efforts have focused on the effects of hydride formation and accumulation of irradiation defects. Key results include: determination of the influence of composition and defect structures on hydride formation; measurement of the electrochemical property differences between hydride and parent material for understanding and predicting corrosion resistance; in situ environmental transmission electron microscope observation of hydride formation; development of a predictive simulation for mechanical property changes as a function of irradiation dose; novel test method development for microtensile testing of ionirradiated material to simulate the effect of neutron irradiation on mechanical properties; and successful demonstration of an Idaho National Labs-based sample preparation and shipping method for subsequent Sandia-based analysis of post-reactor cladding.

  17. Final report on LDRD project : single-photon-sensitive imaging detector arrays at 1600 nm.

    Energy Technology Data Exchange (ETDEWEB)

    Childs, Kenton David; Serkland, Darwin Keith; Geib, Kent Martin; Hawkins, Samuel D.; Carroll, Malcolm S.; Klem, John Frederick; Sheng, Josephine Juin-Jye; Patel, Rupal K.; Bolles, Desta; Bauer, Tom M.; Koudelka, Robert

    2006-11-01

    The key need that this project has addressed is a short-wave infrared light detector for ranging (LIDAR) imaging at temperatures greater than 100K, as desired by nonproliferation and work for other customers. Several novel device structures to improve avalanche photodiodes (APDs) were fabricated to achieve the desired APD performance. A primary challenge to achieving high sensitivity APDs at 1550 nm is that the small band-gap materials (e.g., InGaAs or Ge) necessary to detect low-energy photons exhibit higher dark counts and higher multiplication noise compared to materials like silicon. To overcome these historical problems APDs were designed and fabricated using separate absorption and multiplication (SAM) regions. The absorption regions used (InGaAs or Ge) to leverage these materials 1550 nm sensitivity. Geiger mode detection was chosen to circumvent gain noise issues in the III-V and Ge multiplication regions, while a novel Ge/Si device was built to examine the utility of transferring photoelectrons in a silicon multiplication region. Silicon is known to have very good analog and GM multiplication properties. The proposed devices represented a high-risk for high-reward approach. Therefore one primary goal of this work was to experimentally resolve uncertainty about the novel APD structures. This work specifically examined three different designs. An InGaAs/InAlAs Geiger mode (GM) structure was proposed for the superior multiplication properties of the InAlAs. The hypothesis to be tested in this structure was whether InAlAs really presented an advantage in GM. A Ge/Si SAM was proposed representing the best possible multiplication material (i.e., silicon), however, significant uncertainty existed about both the Ge material quality and the ability to transfer photoelectrons across the Ge/Si interface. Finally a third pure germanium GM structure was proposed because bulk germanium has been reported to have better dark count properties. However, significant

  18. LDRD Final Report - Investigations of the impact of the process integration of deposited magnetic films for magnetic memory technologies on radiation-hardened CMOS devices and circuits - LDRD Project (FY99)

    Energy Technology Data Exchange (ETDEWEB)

    MYERS,DAVID R.; JESSING,JEFFREY R.; SPAHN,OLGA B.; SHANEYFELT,MARTY R.

    2000-01-01

    This project represented a coordinated LLNL-SNL collaboration to investigate the feasibility of developing radiation-hardened magnetic non-volatile memories using giant magnetoresistance (GMR) materials. The intent of this limited-duration study was to investigate whether giant magnetoresistance (GMR) materials similar to those used for magnetic tunnel junctions (MTJs) were process compatible with functioning CMOS circuits. Sandia's work on this project demonstrated that deposition of GMR materials did not affect the operation nor the radiation hardness of Sandia's rad-hard CMOS technology, nor did the integration of GMR materials and exposure to ionizing radiation affect the magnetic properties of the GMR films. Thus, following deposition of GMR films on rad-hard integrated circuits, both the circuits and the films survived ionizing radiation levels consistent with DOE mission requirements. Furthermore, Sandia developed techniques to pattern deposited GMR films without degrading the completed integrated circuits upon which they were deposited. The present feasibility study demonstrated all the necessary processing elements to allow fabrication of the non-volatile memory elements onto an existing CMOS chip, and even allow the use of embedded (on-chip) non-volatile memories for system-on-a-chip applications, even in demanding radiation environments. However, funding agencies DTRA, AIM, and DARPA did not have any funds available to support the required follow-on technology development projects that would have been required to develop functioning prototype circuits, nor were such funds available from LDRD nor from other DOE program funds.

  19. Evaluation of authentic science projects on climate change in secondary schools : a focus on gender differences

    NARCIS (Netherlands)

    Dijkstra, Elma; Goedhart, Martin

    2011-01-01

    Background and purpose: This study examines secondary-school students' opinions on participating in authentic science projects, which are part of an international EU project on climate change research in seven countries. Partnerships between schools and research institutes result in student projects

  20. 1999 LDRD Laboratory Directed Research and Development

    Energy Technology Data Exchange (ETDEWEB)

    Rita Spencer; Kyle Wheeler

    2000-06-01

    This is the FY 1999 Progress Report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes work done on individual research projects, relates the projects to major Laboratory program sponsors, and provides an index to the principal investigators. Project summaries are grouped by their LDRD component: Competency Development, Program Development, and Individual Projects. Within each component, they are further grouped into nine technical categories: (1) materials science, (2) chemistry, (3) mathematics and computational science, (4) atomic, molecular, optical, and plasma physics, fluids, and particle beams, (5) engineering science, (6) instrumentation and diagnostics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) bioscience.

  1. Tiger LDRD final report

    Energy Technology Data Exchange (ETDEWEB)

    Steich, D J; Brugger, S T; Kallman, J S; White, D A

    2000-02-01

    This final report describes our efforts on the Three-Dimensional Massively Parallel CEM Technologies LDRD project (97-ERD-009). Significant need exists for more advanced time domain computational electromagnetics modeling. Bookkeeping details and modifying inflexible software constitute a vast majority of the effort required to address such needs. The required effort escalates rapidly as problem complexity increases. For example, hybrid meshes requiring hybrid numerics on massively parallel platforms (MPPs). This project attempts to alleviate the above limitations by investigating flexible abstractions for these numerical algorithms on MPPs using object-oriented methods, providing a programming environment insulating physics from bookkeeping. The three major design iterations during the project, known as TIGER-I to TIGER-III, are discussed. Each version of TIGER is briefly discussed along with lessons learned during the development and implementation. An Application Programming Interface (API) of the object-oriented interface for Tiger-III is included in three appendices. The three appendices contain the Utilities, Entity-Attribute, and Mesh libraries developed during the project. The API libraries represent a snapshot of our latest attempt at insulated the physics from the bookkeeping.

  2. Final report for LDRD project {open_quotes}A new approach to protein function and structure prediction{close_quotes}

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, C.A.

    1997-03-01

    This report describes the research performed under the laboratory-Directed Research and Development (LDRD) grant {open_quotes}A new approach to protein function and structure prediction{close_quotes}, funded FY94-6. We describe the goals of the research, motivate and list our improvements to the state of the art in multiple sequence alignment and phylogeny (evolutionary tree) construction, but leave technical details to the six publications resulting from this work. At least three algorithms for phylogeny construction or tree consensus have been implemented and used by researchers outside of Sandia.

  3. Authentic Project-Based Design of Professional Development for Teachers Studying Online and Blended Teaching

    Science.gov (United States)

    Dabner, Nicki; Davis, Niki; Zaka, Pinelopi

    2012-01-01

    Online learning and teaching is rapidly increasing in many countries, including high schools in the USA and teacher education worldwide. Online and blended approaches to professional and organizational development are, therefore, becoming essential to enable effective and equitable education. Authentic project-based learning to support the…

  4. 2007 LDRD ANNUAL REPORT

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-16

    I am pleased to present the fiscal year 2007 Laboratory Directed Research and Development (LDRD) annual report. This represents the first year that SRNL has been eligible for LDRD participation and our results to date demonstrate we are off to an excellent start. SRNL became a National Laboratory in 2004, and was designated the 'Corporate Laboratory' for the DOE Office of Environmental Management (EM) in 2006. As you will see, we have made great progress since these designations. The LDRD program is one of the tools SRNL is using to enable achievement of our strategic goals for the DOE. The LDRD program allows the laboratory to blend a strong basic science component into our applied technical portfolio. This blending of science with applied technology provides opportunities for our scientists to strengthen our capabilities and delivery. The LDRD program is vital to help SRNL attract and retain leading scientists and engineers who will help build SRNL's future and achieve DOE mission objectives. This program has stimulated our research staff creativity, while realizing benefits from their participation. This investment will yield long term dividends to the DOE in its Environmental Management, Energy, and National Security missions.

  5. Authentic research projects: Students' perspectives on the process, ownership, and benefits of doing research

    Science.gov (United States)

    Bernard, Warren

    2005-11-01

    Authentic research projects are one type of inquiry activity as defined by the American Association for the Advancement of Science (1993) and are a core component in science education reform movements. The purpose of this study was to examine high school students' perspectives of an authentic research project. The context for this study was a local Science and Engineering Fair (SEF) that involved students from a Metro-Atlanta public high school. This study provided information about this type of activity from the student's perspective, an emic viewpoint. In this qualitative study, demographic information was used for the purposeful selection of fourteen students making up the study sample. In this descriptive ethnography, data were collected via an open-ended survey, three individual interviews, a web log, and a group interview. Interviews were audio taped and conducted according to the protocol established by Lincoln and Guba (1998). Transcripts of the interviews, web logs, and survey responses were coded and analyzed by the constant comparative method as described by Glaser and Strauss (1965). Reliability and validity were achieved through member checks and triangulation. Using Gowin's Vee diagram (1981) as a theoretical framework for analysis, themes emerged describing the students' research experience. The themes included the students' initial reactions, difficulty getting started, accepting ownership of their project, growing interest, acknowledged benefits of the research experience, and a reflective look back at their experience. Overall, students described the authentic research experience as a worthwhile activity. The implications of the study are two-fold. At the practitioner level, teachers should engage students in research, but should do so in a manner that maximizes authenticity. Examples may include having students present a formal prospectus and work with a scientist mentor. For Science Educators in teacher preparation programs, there should be an

  6. Final report for LDRD project 11-0029 : high-interest event detection in large-scale multi-modal data sets : proof of concept.

    Energy Technology Data Exchange (ETDEWEB)

    Rohrer, Brandon Robinson

    2011-09-01

    Events of interest to data analysts are sometimes difficult to characterize in detail. Rather, they consist of anomalies, events that are unpredicted, unusual, or otherwise incongruent. The purpose of this LDRD was to test the hypothesis that a biologically-inspired anomaly detection algorithm could be used to detect contextual, multi-modal anomalies. There currently is no other solution to this problem, but the existence of a solution would have a great national security impact. The technical focus of this research was the application of a brain-emulating cognition and control architecture (BECCA) to the problem of anomaly detection. One aspect of BECCA in particular was discovered to be critical to improved anomaly detection capabilities: it's feature creator. During the course of this project the feature creator was developed and tested against multiple data types. Development direction was drawn from psychological and neurophysiological measurements. Major technical achievements include the creation of hierarchical feature sets created from both audio and imagery data.

  7. Modelling in cross-disciplinary authentic student research projects

    NARCIS (Netherlands)

    A. Heck

    2010-01-01

    In the Dutch secondary education system, students must carry out at the end of their school career a rather large research or design project to demonstrate their ability to apply acquired knowledge and skills while pursuing a research question or design goal in some depth. They are encouraged to cho

  8. Authentic student research projects on physics and the human body

    NARCIS (Netherlands)

    A. Heck; T. Ellermeijer; E. Kędzierska

    2008-01-01

    Students in Dutch senior secondary education are obliged to perform their own research project of approximately 80 hours. They are stimulated to choose the topic themselves (preferably with relations to two subjects, like physics and mathematics) and have a lot of freedom in the design of the resear

  9. 2013 SRNL LDRD Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    McWhorter, S.

    2014-03-07

    This report demonstrates the execution of our LDRD program within the objectives and guidelines outlined by the Department of Energy (DOE) through the DOE Order 413.2b. The projects described within the report align purposefully with SRNL’s strategic vision and provide great value to the DOE. The diversity exhibited in the research and development projects underscores the DOE Office of Environmental Management (DOE-EM) mission and enhances that mission by developing the technical capabilities and human capital necessary to support future DOE-EM national needs. As a multiprogram national laboratory, SRNL is applying those capabilities to achieve tangible results for the nation in National Security, Environmental Stewardship, Clean Energy and Nuclear Materials Management.

  10. LDRD Report: Scheduling Irregular Algorithms

    Energy Technology Data Exchange (ETDEWEB)

    Boman, Erik G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-10-01

    This LDRD project was a campus exec fellowship to fund (in part) Donald Nguyen’s PhD research at UT-Austin. His work has focused on parallel programming models, and scheduling irregular algorithms on shared-memory systems using the Galois framework. Galois provides a simple but powerful way for users and applications to automatically obtain good parallel performance using certain supported data containers. The naïve user can write serial code, while advanced users can optimize performance by advanced features, such as specifying the scheduling policy. Galois was used to parallelize two sparse matrix reordering schemes: RCM and Sloan. Such reordering is important in high-performance computing to obtain better data locality and thus reduce run times.

  11. Final Report for LDRD Project 05-ERD-050: "Developing a Reactive Chemistry Capability for the NARAC Operational Model (LODI)"

    Energy Technology Data Exchange (ETDEWEB)

    Cameron-Smith, P; Grant, K; Connell, P

    2008-02-11

    In support of the National Security efforts of LLNL, this project addressed the existing imbalance between dispersion and chemical capabilities of LODI (Lagrangian Operational Dispersion Integrator--the NARAC operational dispersion model). We have demonstrated potentially large effects of atmospheric chemistry on the impact of chemical releases (e.g., industrial chemicals and nerve agents). Prior to our work, LODI could only handle chains of first-order losses (exponential decays) that were independent of time and space, limiting NARAC's capability to respond when reactive chemistry is important. We significantly upgraded the chemistry and aerosol capability of LODI to handle (1) arbitrary networks of chemical reactions, (2) mixing and reactions with ambient species, (3) evaporation and condensation of aerosols, and (4) heat liberated from chemical reactions and aerosol condensation (which can cause a cold and dense plume hugging the ground to rise into the atmosphere, then descend to the ground again as droplets). When this is made operational, it will significantly improve NARAC's ability to respond to terrorist attacks and industrial accidents that involve reactive chemistry, including many chemical agents and toxic industrial chemicals (TICS). As a dual-use, the resulting model also has the potential to be a state-of-the-art air-quality model. Chemical releases are the most common type of airborne hazardous release and many operational applications involve such scenarios. The new capability we developed is therefore relevant to the needs of the Department of Energy (DOE), Department of Homeland Security (DHS) and Department of Defense (DoD).

  12. Final report on grand challenge LDRD project : a revolution in lighting : building the science and technology base for ultra-efficient solid-state lighting.

    Energy Technology Data Exchange (ETDEWEB)

    Copeland, Robert Guild; Mitchell, Christine Charlotte; Follstaedt, David Martin; Lee, Stephen Roger; Shul, Randy John; Fischer, Arthur Joseph; Chow, Weng Wah Dr.; Myers, Samuel Maxwell, Jr.; Thoma, Steven George; Gee, James Martin; Coltrin, Michael Elliott; Burdick, Brent A.; Salamone, Angelo, L., Jr.; Hadley, G. Ronald; Elliott, Russell D.; Campbell, Jonathan M.; Abrams, Billie Lynn; Wendt, Joel Robert; Pawlowski, Roger Patrick; Simpson, Regina Lynn; Kurtz, Steven Ross; Cole, Phillip James; Fullmer, Kristine Wanta; Seager, Carleton Hoover; Bogart, Katherine Huderle Andersen; Biefeld, Robert Malcolm; Kerley, Thomas M.; Norman, Adam K.; Tallant, David Robert; Woessner, Stephen Matthew; Figiel, Jeffrey James; Moffat, Harry K.; Provencio, Paula Polyak; Emerson, John Allen; Kaplar, Robert James; Wilcoxon, Jess Patrick; Waldrip, Karen Elizabeth; Rohwer, Lauren Elizabeth Shea; Cross, Karen Charlene; Wright, Alan Francis; Gonzales, Rene Marie; Salinger, Andrew Gerhard; Crawford, Mary Hagerott; Garcia, Marie L.; Allen, Mark S.; Southwell, Edwin T. (Perspectives, Sedona, AZ); Bauer, Tom M.; Monson, Mary Ann; Tsao, Jeffrey Yeenien; Creighton, James Randall; Allerman, Andrew Alan; Simmons, Jerry A.; Boyack, Kevin W.; Jones, Eric Daniel; Moran, Michael P.; Pinzon, Marcia J. (Perspectives, Sedona, AZ); Pinson, Ariane O. (Perspectives, Sedona, AZ); Miksovic, Ann E. (Perspectives, Sedona, AZ); Wang, George T.; Ashby, Carol Iris Hill; Missert, Nancy A.; Koleske, Daniel David; Rahal, Nabeel M.

    2004-06-01

    This SAND report is the final report on Sandia's Grand Challenge LDRD Project 27328, 'A Revolution in Lighting -- Building the Science and Technology Base for Ultra-Efficient Solid-state Lighting.' This project, which for brevity we refer to as the SSL GCLDRD, is considered one of Sandia's most successful GCLDRDs. As a result, this report reviews not only technical highlights, but also the genesis of the idea for Solid-state Lighting (SSL), the initiation of the SSL GCLDRD, and the goals, scope, success metrics, and evolution of the SSL GCLDRD over the course of its life. One way in which the SSL GCLDRD was different from other GCLDRDs was that it coincided with a larger effort by the SSL community - primarily industrial companies investing in SSL, but also universities, trade organizations, and other Department of Energy (DOE) national laboratories - to support a national initiative in SSL R&D. Sandia was a major player in publicizing the tremendous energy savings potential of SSL, and in helping to develop, unify and support community consensus for such an initiative. Hence, our activities in this area, discussed in Chapter 6, were substantial: white papers; SSL technology workshops and roadmaps; support for the Optoelectronics Industry Development Association (OIDA), DOE and Senator Bingaman's office; extensive public relations and media activities; and a worldwide SSL community website. Many science and technology advances and breakthroughs were also enabled under this GCLDRD, resulting in: 55 publications; 124 presentations; 10 book chapters and reports; 5 U.S. patent applications including 1 already issued; and 14 patent disclosures not yet applied for. Twenty-six invited talks were given, at prestigious venues such as the American Physical Society Meeting, the Materials Research Society Meeting, the AVS International Symposium, and the Electrochemical Society Meeting. This report contains a summary of these science and technology

  13. The UCLan community engagement and service user support (Comensus) project: valuing authenticity, making space for emergence

    Science.gov (United States)

    Downe, Soo; McKeown, Mick; Johnson, Eileen; Koloczek, Lidia; Grunwald, Angela; Malihi‐Shoja, Lisa

    2007-01-01

    Abstract Objective  To develop and evaluate service user, carer and community involvement in health and social care education. Background  Despite the high policy profile of involvement issues, there appear to be no published accounts of schemes that have used a systematic whole‐faculty approach to community engagement in health and social care higher education. Focus of this paper  The set up and early development of a faculty‐wide community engagement project. Setting and participants  Staff from the faculty of health in one University, local service users and carers and community group project workers and local National Health Service (NHS) and public sector staff. Design  Participatory action research including document review, field notes, questionnaires and interviews. Analysis  Thematic analysis. The emerging themes were tested by seeking disconfirming data, and through verification with stake‐holders. Results  Prior to the study, there were examples of community engagement in the participating faculty, but they occurred in specific departments, and scored low on the ‘ladder of involvement’. Some previous attempts at engagement were perceived to have failed, resulting in resistance from staff and the community. Despite this, an advisory group was successfully formed, and project framing and development evolved with all stake‐holders over the subsequent year. The four themes identified in this phase were: building accessibility; being ‘proper’ service users/carers;moving from suspicion to trust: mutually respectful partnerships as a basis for sustainable change; and responses to challenge and emergence. Conclusions  Successful and sustainable engagement requires authenticity. Many problems and solutions arising from authentic engagement are emergent, and potentially challenging to organizations. PMID:17986075

  14. Computational Biology: A Strategic Initiative LDRD

    Energy Technology Data Exchange (ETDEWEB)

    Barksy, D; Colvin, M

    2002-02-07

    The goal of this Strategic Initiative LDRD project was to establish at LLNL a new core capability in computational biology, combining laboratory strengths in high performance computing, molecular biology, and computational chemistry and physics. As described in this report, this project has been very successful in achieving this goal. This success is demonstrated by the large number of referred publications, invited talks, and follow-on research grants that have resulted from this project. Additionally, this project has helped build connections to internal and external collaborators and funding agencies that will be critical to the long-term vitality of LLNL programs in computational biology. Most importantly, this project has helped establish on-going research groups in the Biology and Biotechnology Research Program, the Physics and Applied Technology Directorate, and the Computation Directorate. These groups include three laboratory staff members originally hired as post-doctoral researchers for this strategic initiative.

  15. LDRD 2014 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, Diane [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2015-03-01

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2014, as required. In FY 2014, the BNL LDRD Program funded 40 projects, 8 of which were new starts, at a total cost of $9.6M.

  16. SRNL LDRD ANNUAL REPORT 2008

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-29

    The Laboratory Director is pleased to have the opportunity to present the 2008 Laboratory Directed Research and Development (LDRD) annual report. This is my first opportunity to do so, and only the second such report that has been issued. As will be obvious, SRNL has built upon the excellent start that was made with the LDRD program last year, and researchers have broken new ground in some important areas. In reviewing the output of this program this year, it is clear that the researchers implemented their ideas with creativity, skill and enthusiasm. It is gratifying to see this level of participation, because the LDRD program remains a key part of meeting SRNL's and DOE's strategic goals, and helps lay a solid scientific foundation for SRNL as the premier applied science laboratory. I also believe that the LDRD program's results this year have demonstrated SRNL's value as the EM Corporate Laboratory, having advanced knowledge in a spectrum of areas, including reduction of the technical risks of cleanup, separations science, packaging and transportation of nuclear materials, and many others. The research in support of Energy Security and National and Homeland Security has been no less notable. SRNL' s researchers have shown again that the nascent LDRD program is a sound investment for DOE that will pay off handsomely for the nation as time goes on.

  17. Impact of problem finding on the quality of authentic open inquiry science research projects

    Science.gov (United States)

    Labanca, Frank

    2008-11-01

    Problem finding is a creative process whereby individuals develop original ideas for study. Secondary science students who successfully participate in authentic, novel, open inquiry studies must engage in problem finding to determine viable and suitable topics. This study examined problem finding strategies employed by students who successfully completed and presented the results of their open inquiry research at the 2007 Connecticut Science Fair and the 2007 International Science and Engineering Fair. A multicase qualitative study was framed through the lenses of creativity, inquiry strategies, and situated cognition learning theory. Data were triangulated by methods (interviews, document analysis, surveys) and sources (students, teachers, mentors, fair directors, documents). The data demonstrated that the quality of student projects was directly impacted by the quality of their problem finding. Effective problem finding was a result of students using resources from previous, specialized experiences. They had a positive self-concept and a temperament for both the creative and logical perspectives of science research. Successful problem finding was derived from an idiosyncratic, nonlinear, and flexible use and understanding of inquiry. Finally, problem finding was influenced and assisted by the community of practicing scientists, with whom the students had an exceptional ability to communicate effectively. As a result, there appears to be a juxtaposition of creative and logical/analytical thought for open inquiry that may not be present in other forms of inquiry. Instructional strategies are suggested for teachers of science research students to improve the quality of problem finding for their students and their subsequent research projects.

  18. Contextual Student Learning through Authentic Asteroid Research Projects using a Robotic Telescope Network

    Science.gov (United States)

    Hoette, Vivian L.; Puckett, Andrew W.; Linder, Tyler R.; Heatherly, Sue Ann; Rector, Travis A.; Haislip, Joshua B.; Meredith, Kate; Caughey, Austin L.; Brown, Johnny E.; McCarty, Cameron B.; Whitmore, Kevin T.

    2015-11-01

    Skynet is a worldwide robotic telescope network operated by the University of North Carolina at Chapel Hill with active observing sites on 3 continents. The queue-based observation request system is simple enough to be used by middle school students, but powerful enough to supply data for research scientists. The Skynet Junior Scholars program, funded by the NSF, has teamed up with professional astronomers to engage students from middle school to undergraduates in authentic research projects, from target selection through image analysis and publication of results. Asteroid research is a particularly fruitful area for youth collaboration that reinforces STEM education standards and can allow students to make real contributions to scientific knowledge, e.g., orbit refinement through astrometric submissions to the Minor Planet Center. We have created a set of projects for youth to: 1. Image an asteroid, make a movie, and post it to a gallery; 2. Measure the asteroid’s apparent motion using the Afterglow online image processor; and 3. Image asteroids from two or more telescopes simultaneously to demonstrate parallax. The apparent motion and parallax projects allow students to estimate the distance to their asteroid, as if they were the discoverer of a brand new object in the solar system. Older students may take on advanced projects, such as analyzing uncertainties in asteroid orbital parameters; studying impact probabilities of known objects; observing time-sensitive targets such as Near Earth Asteroids; and even discovering brand new objects in the solar system.Images are acquired from among seven Skynet telescopes in North Carolina, California, Wisconsin, Canada, Australia, and Chile, as well as collaborating observatories such as WestRock in Columbus, Georgia; Stone Edge in El Verano, California; and Astronomical Research Institute in Westfield, Illinois.

  19. LDRD 149045 final report distinguishing documents.

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Scott A.

    2010-09-01

    This LDRD 149045 final report describes work that Sandians Scott A. Mitchell, Randall Laviolette, Shawn Martin, Warren Davis, Cindy Philips and Danny Dunlavy performed in 2010. Prof. Afra Zomorodian provided insight. This was a small late-start LDRD. Several other ongoing efforts were leveraged, including the Networks Grand Challenge LDRD, and the Computational Topology CSRF project, and the some of the leveraged work is described here. We proposed a sentence mining technique that exploited both the distribution and the order of parts-of-speech (POS) in sentences in English language documents. The ultimate goal was to be able to discover 'call-to-action' framing documents hidden within a corpus of mostly expository documents, even if the documents were all on the same topic and used the same vocabulary. Using POS was novel. We also took a novel approach to analyzing POS. We used the hypothesis that English follows a dynamical system and the POS are trajectories from one state to another. We analyzed the sequences of POS using support vector machines and the cycles of POS using computational homology. We discovered that the POS were a very weak signal and did not support our hypothesis well. Our original goal appeared to be unobtainable with our original approach. We turned our attention to study an aspect of a more traditional approach to distinguishing documents. Latent Dirichlet Allocation (LDA) turns documents into bags-of-words then into mixture-model points. A distance function is used to cluster groups of points to discover relatedness between documents. We performed a geometric and algebraic analysis of the most popular distance functions and made some significant and surprising discoveries, described in a separate technical report.

  20. Inspiring students through an authentic polar science expedition: the RESEt Project

    Science.gov (United States)

    Cattadori, Matteo

    2016-04-01

    RESEt (Research and Education Svalbard Experience www.resetsvalbard.it) is an ongoing educational project focusing mainly on polar and climate system topics. It started in 2014 and will end in 2017 with the high school diploma of the 22 students (16 y. o.) making the participant class. This class attend a school (Liceo Filzi, Rovereto, Trento. Italy) with a primary focus on disciplines like philosophy and education, rather then STEM (Science, Technology, Engineering, and Mathematics). Nevertheless their science curricula include climate topics that are rather challenging to grasp and, at the same time, crucial for their scientific citizenship. Some questions arise: How to foster their interest in geosciences topics? How to engage them in authentic scientific knowledge? How to increase their interest in scientific university courses during their post-secondary career? RESEt project will attempt to answer these questions through the development of integrated activities distributed over the last three years of their high school cycle. The most important moment will be an educational scientific expedition at the Svalbard, an archipelago located in the Arctic. The expedition be entirely organized, planned, and directed by students. In Svalbard, students will visit the main scientific facilities devoted to climate studies including those of Italian CNR (National Research Council) and they will perform some environmental measurement using data-loggers. Students are even involved in the fundraising process to raise more than ten thousand Euros needed to for travel expenses. This work is aimed mainly at presenting some of the preliminary data collected during the RESEt project, including the fundraising aspects. The management of the RESEt project strongly relies on the experience and network gained by the abstract author during the participation to the Education and Public Outreach (EPO) program of International Polar Year (IPY) 2007-2009 as well as the support of Polar

  1. Neurons to algorithms LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Rothganger, Fredrick H.; Aimone, James Bradley; Warrender, Christina E.; Trumbo, Derek

    2013-09-01

    Over the last three years the Neurons to Algorithms (N2A) LDRD project teams has built infrastructure to discover computational structures in the brain. This consists of a modeling language, a tool that enables model development and simulation in that language, and initial connections with the Neuroinformatics community, a group working toward similar goals. The approach of N2A is to express large complex systems like the brain as populations of a discrete part types that have specific structural relationships with each other, along with internal and structural dynamics. Such an evolving mathematical system may be able to capture the essence of neural processing, and ultimately of thought itself. This final report is a cover for the actual products of the project: the N2A Language Specification, the N2A Application, and a journal paper summarizing our methods.

  2. Final report for %22High performance computing for advanced national electric power grid modeling and integration of solar generation resources%22, LDRD Project No. 149016.

    Energy Technology Data Exchange (ETDEWEB)

    Reno, Matthew J.; Riehm, Andrew Charles; Hoekstra, Robert John; Munoz-Ramirez, Karina; Stamp, Jason Edwin; Phillips, Laurence R.; Adams, Brian M.; Russo, Thomas V.; Oldfield, Ron A.; McLendon, William Clarence, III; Nelson, Jeffrey Scott; Hansen, Clifford W.; Richardson, Bryan T.; Stein, Joshua S.; Schoenwald, David Alan; Wolfenbarger, Paul R.

    2011-02-01

    Design and operation of the electric power grid (EPG) relies heavily on computational models. High-fidelity, full-order models are used to study transient phenomena on only a small part of the network. Reduced-order dynamic and power flow models are used when analysis involving thousands of nodes are required due to the computational demands when simulating large numbers of nodes. The level of complexity of the future EPG will dramatically increase due to large-scale deployment of variable renewable generation, active load and distributed generation resources, adaptive protection and control systems, and price-responsive demand. High-fidelity modeling of this future grid will require significant advances in coupled, multi-scale tools and their use on high performance computing (HPC) platforms. This LDRD report demonstrates SNL's capability to apply HPC resources to these 3 tasks: (1) High-fidelity, large-scale modeling of power system dynamics; (2) Statistical assessment of grid security via Monte-Carlo simulations of cyber attacks; and (3) Development of models to predict variability of solar resources at locations where little or no ground-based measurements are available.

  3. The Strategy Project: Promoting Self-Regulated Learning through an Authentic Assignment

    Science.gov (United States)

    Steiner, Hillary H.

    2016-01-01

    Success in college requires the development of self-regulated learning strategies that move beyond high school skills. First-year students of all ability levels benefit when given instruction in how to use these strategies in an authentic context. This paper presents an instructional method that requires deliberate practice of self-regulated…

  4. "Applying anatomy to something i care about": Authentic inquiry learning and student experiences of an inquiry project.

    Science.gov (United States)

    Anstey, Lauren M

    2017-04-04

    Despite advances to move anatomy education away from its didactic history, there is a continued need for students to contextualize their studies to make learning more meaningful. This article investigates authentic learning in the context of an inquiry-based approach to learning human gross anatomy. Utilizing a case-study design with three groups of students (n = 18) and their facilitators (n = 3), methods of classroom observations, interviews, and artifact collection were utilized to investigate students' experiences of learning through an inquiry project. Qualitative data analysis through open and selective coding produced common meaningful themes of group and student experiences. Overall results demonstrate how the project served as a unique learning experience where learners engaged in the opportunity to make sense of anatomy in context of their interests and wider interdisciplinary considerations through collaborative, group-based investigation. Results were further considered in context of theoretical frameworks of inquiry-based and authentic learning. Results from this study demonstrate how students can engage anatomical understandings to inquire and apply disciplinary considerations to their personal lives and the world around them. Anat Sci Educ. © 2017 American Association of Anatomists.

  5. Final LDRD report :

    Energy Technology Data Exchange (ETDEWEB)

    Ambrosini, Andrea; Miller, James Edward; Allendorf, Mark D.; Coker, Eric Nicholas; Ermanoski, Ivan; Hogan, Roy E.,; McDaniel, Anthony H.

    2014-01-01

    Despite rapid progress, solar thermochemistry remains high risk; improvements in both active materials and reactor systems are needed. This claim is supported by studies conducted both prior to and as part of this project. Materials offer a particular large opportunity space as, until recently, very little effort apart from basic thermodynamic analysis was extended towards understanding this most fundamental component of a metal oxide thermochemical cycle. Without this knowledge, system design was hampered, but more importantly, advances in these crucial materials were rare and resulted more from intuition rather than detailed insight. As a result, only two basic families of potentially viable solid materials have been widely considered, each of which has significant challenges. Recent efforts towards applying an increased level of scientific rigor to the study of thermochemical materials have provided a much needed framework and insights toward developing the next generation of highly improved thermochemically active materials. The primary goal of this project was to apply this hard-won knowledge to rapidly advance the field of thermochemistry to produce a material within 2 years that is capable of yielding CO from CO2 at a 12.5 % reactor efficiency. Three principal approaches spanning a range of risk and potential rewards were pursued: modification of known materials, structuring known materials, and identifying/developing new materials for the application. A newly developed best-of-class material produces more fuel (9x more H2, 6x more CO) under milder conditions than the previous state of the art. Analyses of thermochemical reactor and system efficiencies and economics were performed and a new hybrid concept was reported. The larger case for solar fuels was also further refined and documented.

  6. Transportation Energy Pathways LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Barter, Garrett.; Reichmuth, David.; Westbrook, Jessica; Malczynski, Leonard A.; Yoshimura, Ann S.; Peterson, Meghan B.; West, Todd H.; Manley, Dawn Kataoka; Guzman, Katherine Dunphy; Edwards, Donna M.; Hines, Valerie Ann-Peters

    2012-09-01

    This report presents a system dynamics based model of the supply-demand interactions between the USlight-duty vehicle (LDV) fleet, its fuels, and the corresponding primary energy sources through the year2050. An important capability of our model is the ability to conduct parametric analyses. Others have reliedupon scenario-based analysis, where one discrete set of values is assigned to the input variables and used togenerate one possible realization of the future. While these scenarios can be illustrative of dominant trendsand tradeoffs under certain circumstances, changes in input values or assumptions can have a significantimpact on results, especially when output metrics are associated with projections far into the future. Thistype of uncertainty can be addressed by using a parametric study to examine a range of values for the inputvariables, offering a richer source of data to an analyst.The parametric analysis featured here focuses on a trade space exploration, with emphasis on factors thatinfluence the adoption rates of electric vehicles (EVs), the reduction of GHG emissions, and the reduction ofpetroleum consumption within the US LDV fleet. The underlying model emphasizes competition between13 different types of powertrains, including conventional internal combustion engine (ICE) vehicles, flex-fuel vehicles (FFVs), conventional hybrids(HEVs), plug-in hybrids (PHEVs), and battery electric vehicles(BEVs).We find that many factors contribute to the adoption rates of EVs. These include the pace of technologicaldevelopment for the electric powertrain, battery performance, as well as the efficiency improvements inconventional vehicles. Policy initiatives can also have a dramatic impact on the degree of EV adoption. Theconsumer effective payback period, in particular, can significantly increase the market penetration rates ifextended towards the vehicle lifetime.Widespread EV adoption can have noticeable impact on petroleum consumption and greenhouse gas

  7. Enhanced Micellar Catalysis LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Betty, Rita G.; Tucker, Mark D; Taggart, Gretchen; Kinnan, Mark K.; Glen, Crystal Chanea; Rivera, Danielle; Sanchez, Andres; Alam, Todd Michael

    2012-12-01

    The primary goals of the Enhanced Micellar Catalysis project were to gain an understanding of the micellar environment of DF-200, or similar liquid CBW surfactant-based decontaminants, as well as characterize the aerosolized DF-200 droplet distribution and droplet chemistry under baseline ITW rotary atomization conditions. Micellar characterization of limited surfactant solutions was performed externally through the collection and measurement of Small Angle X-Ray Scattering (SAXS) images and Cryo-Transmission Electron Microscopy (cryo-TEM) images. Micellar characterization was performed externally at the University of Minnesotas Characterization Facility Center, and at the Argonne National Laboratory Advanced Photon Source facility. A micellar diffusion study was conducted internally at Sandia to measure diffusion constants of surfactants over a concentration range, to estimate the effective micelle diameter, to determine the impact of individual components to the micellar environment in solution, and the impact of combined components to surfactant phase behavior. Aerosolized DF-200 sprays were characterized for particle size and distribution and limited chemical composition. Evaporation rates of aerosolized DF-200 sprays were estimated under a set of baseline ITW nozzle test system parameters.

  8. LDRD final report : autotuning for scalable linear algebra.

    Energy Technology Data Exchange (ETDEWEB)

    Heroux, Michael Allen; Marker, Bryan (University of Texas at Austin, Austin, TX)

    2011-09-01

    This report summarizes the progress made as part of a one year lab-directed research and development (LDRD) project to fund the research efforts of Bryan Marker at the University of Texas at Austin. The goal of the project was to develop new techniques for automatically tuning the performance of dense linear algebra kernels. These kernels often represent the majority of computational time in an application. The primary outcome from this work is a demonstration of the value of model driven engineering as an approach to accurately predict and study performance trade-offs for dense linear algebra computations.

  9. ICF Program: LDRD-ER Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Glenzer, S H

    2004-02-05

    In the 01-ERD-107 LDRD-ER project, we have performed novel Thomson scattering experiments at the Trident and Omega laser facilities and provided high quality spectral data. These results have led to the development of the first quantitative understanding of laser-plasma interactions for NIF plasmas. For this purpose an green/ultraviolet probe laser, built for Nova in 1998 [1] and successfully used to measure both temperature and plasma wave amplitudes [2], has been deployed on Omega. The Thomson scattering diagnostics has been used twofold: (1) it provided independent measurements of the plasma electron and ion temperature, the plasma flow velocity, or the electron distribution function; (2) it provided measurements of the primary plasma wave and their secondary non-linear decay wave products. These experiments at Omega provide definitive quantitative results on the nonlinear saturation of stimulated Raman scattering for green (2{omega}) beams. In addition, the experiments on the Trident laser have led to a quantitative understanding of the stimulated Brillouin scattering in low-Z plasmas. A nonlinear frequency detuning model has successfully explained all the experimental observable including the SBS reflectivity. This model has been implemented into the laser-plasma interaction code pF3D as a tool to design and optimize NIF target experiments with SBS and SRS losses included. The development of quantitative models for SBS and SRS for various regimes has now been adopted as part of the WBS1 project within the ICF program.

  10. Data Authentication Using Cryptography

    Directory of Open Access Journals (Sweden)

    Sagar Chouksey

    2013-06-01

    Full Text Available We present a novel approach using cryptographyfor data authentication. The key idea is to provide aencoded quantized data projection as authenticationdata. This can be correctly decoded with the help ofan authentic data using as side information.Cryptography source coding provides the desiredrobustness against legitimate variations whiledetecting illegitimate modification. Additionaladjustments might not change the meaning of thecontent, but could be misclassified as tampering.Users might also beinterested in localizingtampered regions. Distinguishing legitimateencodings with possible adjustments fromtampering and localizing tampering are thechallenges addressed in this paper. We applycryptography source coding and statistical methodsto solve the data authentication problem.Experimental results have been presented for dataauthentication.

  11. Advancing the Fundamental Understanding of Fission: 2014 LDRD 20120077DR Review

    Energy Technology Data Exchange (ETDEWEB)

    White, Morgan C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Tovesson, Fredrik K. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Sierk, Arnold John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-02-06

    The following slides were presented as part of the LDRD 20120077DR Progress Appraisal Review held Tuesday, February 4, 2014. This is part of an ongoing project assessment the previous of which was documented in LA-UR-13-21182. This presentation documents the progress made against the goals agreed to as part of the 2013 review.

  12. A Collectibles Project: Engaging Students in Authentic Multimodal Research and Writing

    Science.gov (United States)

    Moynihan, Karen E.

    2007-01-01

    High school teacher Karen E. Moynihan creates a multimodal project inspired by the creative nonfiction style of "The Orchid Thief" by Susan Orlean. Students choose a collectible item and immerse themselves in the subculture of the collectors. The project includes participation in library and field research, interviews, photography and graphic…

  13. Exploring the Relationship between Authentic Leadership and Project Outcomes and Job Satisfaction with Information Technology Professionals

    Science.gov (United States)

    Fischer, Mark A.

    2014-01-01

    One of the most important issues for organizations and information technology (IT) professionals is measuring the success or failure of information technology projects. How we understand the value and usefulness of IT projects is critical to how information technology executives evaluate and decide on technology investments. In a 2009 CHAOS…

  14. Authenticity and "Standing Out:" Situating the Project Approach in Contemporary Early Schooling

    Science.gov (United States)

    Blank, Jolyn; Damjanovic, Victoria; Peixoto da Silva, Anna Paula; Weber, Susan

    2014-01-01

    In this multi-case study, we describe early childhood teachers' experiences implementing project work in contemporary, standards-based classrooms. Focus is given to understanding how teachers interpreted work in context; that is, how they were responsive to both expanding professional knowledge about the project approach and to the existing…

  15. Final report on LDRD project : elucidating performance of proton-exchange-membrane fuel cells via computational modeling with experimental discovery and validation.

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Chao Yang (Pennsylvania State University, University Park, PA); Pasaogullari, Ugur (Pennsylvania State University, University Park, PA); Noble, David R.; Siegel, Nathan P.; Hickner, Michael A.; Chen, Ken Shuang

    2006-11-01

    In this report, we document the accomplishments in our Laboratory Directed Research and Development project in which we employed a technical approach of combining experiments with computational modeling and analyses to elucidate the performance of hydrogen-fed proton exchange membrane fuel cells (PEMFCs). In the first part of this report, we document our focused efforts on understanding water transport in and removal from a hydrogen-fed PEMFC. Using a transparent cell, we directly visualized the evolution and growth of liquid-water droplets at the gas diffusion layer (GDL)/gas flow channel (GFC) interface. We further carried out a detailed experimental study to observe, via direct visualization, the formation, growth, and instability of water droplets at the GDL/GFC interface using a specially-designed apparatus, which simulates the cathode operation of a PEMFC. We developed a simplified model, based on our experimental observation and data, for predicting the onset of water-droplet instability at the GDL/GFC interface. Using a state-of-the-art neutron imaging instrument available at NIST (National Institute of Standard and Technology), we probed liquid-water distribution inside an operating PEMFC under a variety of operating conditions and investigated effects of evaporation due to local heating by waste heat on water removal. Moreover, we developed computational models for analyzing the effects of micro-porous layer on net water transport across the membrane and GDL anisotropy on the temperature and water distributions in the cathode of a PEMFC. We further developed a two-phase model based on the multiphase mixture formulation for predicting the liquid saturation, pressure drop, and flow maldistribution across the PEMFC cathode channels. In the second part of this report, we document our efforts on modeling the electrochemical performance of PEMFCs. We developed a constitutive model for predicting proton conductivity in polymer electrolyte membranes and compared

  16. Final Report for LDRD Project 02-ERD-069: Discovering the Unknown Mechanism(s) of Virulence in a BW, Class A Select Agent

    Energy Technology Data Exchange (ETDEWEB)

    Chain, P; Garcia, E

    2003-02-06

    The goal of this proposed effort was to assess the difficulty in identifying and characterizing virulence candidate genes in an organism for which very limited data exists. This was accomplished by first addressing the finishing phase of draft-sequenced F. tularensis genomes and conducting comparative analyses to determine the coding potential of each genome; to discover the differences in genome structure and content, and to identify potential genes whose products may be involved in the F. tularensis virulence process. The project was divided into three parts: (1) Genome finishing: This part involves determining the order and orientation of the consensus sequences of contigs obtained from Phrap assemblies of random draft genomic sequences. This tedious process consists of linking contig ends using information embedded in each sequence file that relates the sequence to the original cloned insert. Since inserts are sequenced from both ends, we can establish a link between these paired-ends in different contigs and thus order and orient contigs. Since these genomes carry numerous copies of insertion sequences, these repeated elements ''confuse'' the Phrap assembly program. It is thus necessary to break these contigs apart at the repeated sequences and individually join the proper flanking regions using paired-end information, or using results of comparisons against a similar genome. Larger repeated elements such as the small subunit ribosomal RNA operon require verification with PCR. Tandem repeats require manual intervention and typically rely on single nucleotide polymorphisms to be resolved. Remaining gaps require PCR reactions and sequencing. Once the genomes have been ''closed'', low quality regions are addressed by resequencing reactions. (2) Genome analysis: The final consensus sequences are processed by combining the results of three gene modelers: Glimmer, Critica and Generation. The final gene models are submitted to

  17. SpaceScience@Home: Authentic Research Projects that Use Citizen Scientists

    Science.gov (United States)

    Méndez, B. J. H.

    2008-06-01

    In recent years, several space science research projects have enlisted the help of large numbers of non-professional volunteers, ``citizen scientists'', to aid in performing tasks that are critical to a project, but require more person-time (or computing time) than a small professional research team can practically perform themselves. Examples of such projects include SETI@home, which uses time from volunteers computers to process radio-telescope observation looking for signals originating from extra-terrestrial intelligences; Clickworkers, which asks volunteers to review images of the surface of Mars to identify craters; Spacewatch, which used volunteers to review astronomical telescopic images of the sky to identify streaks made by possible Near Earth Asteroids; and Stardust@home, which asks volunteers to review ``focus movies'' taken of the Stardust interstellar dust aerogel collector to search for possible impacts from interstellar dust particles. We shall describe these and other similar projects and discuss lessons learned from carrying out such projects, including the educational opportunities they create.

  18. Efficient Probability of Failure Calculations for QMU using Computational Geometry LDRD 13-0144 Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Scott A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ebeida, Mohamed Salah [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Romero, Vicente J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Swiler, Laura Painton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rushdi, Ahmad A. [Univ. of Texas, Austin, TX (United States); Abdelkader, Ahmad [Univ. of Maryland, College Park, MD (United States)

    2015-09-01

    This SAND report summarizes our work on the Sandia National Laboratory LDRD project titled "Efficient Probability of Failure Calculations for QMU using Computational Geometry" which was project #165617 and proposal #13-0144. This report merely summarizes our work. Those interested in the technical details are encouraged to read the full published results, and contact the report authors for the status of the software and follow-on projects.

  19. Final report for the network authentication investigation and pilot.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  20. Geospatial Authentication

    Science.gov (United States)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.

  1. Project NAME: Native American Mathematics Education. Recommended Lesson Activities with Authentic Assessments.

    Science.gov (United States)

    2001

    A project sought to improve mathematics instruction at the Winnebago Public School (WPS) on the Winnebago Indian Reservation (Nebraska) and to provide purposeful interactions between preservice teachers from Wayne State College and Native American children. WPS educators, grades K-6, improved their mathematics instructional ability by attending…

  2. Drama at the Heart of the Secondary School: Projects to Promote Authentic Learning

    Science.gov (United States)

    Rainer, John; Lewis, Martin

    2012-01-01

    "Drama at the Heart of the Secondary School" provides a rationale for the curricular centrality of drama together with rich and detailed examples of cross-phase thematic projects which are drama-led, but which promote learning across a wide range of curriculum areas, from the humanities and other arts, to English and literacy, science and PSHE.…

  3. Developing Second Language Writing through Scaffolding in the ZPD: A Magazine Project for an Authentic Audience

    Science.gov (United States)

    Schwieter, John W.

    2010-01-01

    In the present study, Vygotsky's (1978, 1986) sociocultural framework of the zone of proximal development (ZPD) and scaffolding writing (Bodrova & Leong, 1995, 1996; Ross, 1976) are used as the theoretical basis to study the development of second language writing. A course project is presented in which advanced English language learners of Spanish…

  4. Nanoporous Silica Templated HeteroEpitaxy: Final LDRD Report.

    Energy Technology Data Exchange (ETDEWEB)

    Burckel, David Bruce; Koleske, Daniel; Rowen, Adam M.; Williams, John Dalton; Fan, Hongyou; Arrington, Christian Lew

    2006-11-01

    This one-year out-of-the-box LDRD was focused on exploring the use of porous growth masks as a method for defect reduction during heteroepitaxial crystal growth. Initially our goal was to investigate porous silica as a growth mask, however, we expanded the scope of the research to include several other porous growth masks on various size scales, including mesoporous carbon, and the UV curable epoxy, SU-8. Use of SU-8 as a growth mask represents a new direction, unique in the extensive literature of patterned epitaxial growth, and presents the possibility of providing a single step growth mask. Additional research included investigation of pore viability via electrochemical deposition into high aspect ratio photoresist patterns and pilot work on using SU-8 as a DUV negative resist, another significant potential result. While the late start nature of this project pushed some of the initial research goals out of the time table, significant progress was made. 3 Acknowledgements This work was performed in part at the Nanoscience @ UNM facility, a member of the National Nanotechnology Infrastructure Network, which is supported by the National Science Foundation (Grant ECS 03-35765). Sandia is multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United Stated Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. This work was supported under the Sandia LDRD program (Project 99405). 4

  5. The UCLan Engagement and Service User Support (Comensus) project: Valuing authenticity making space for emergence.

    OpenAIRE

    2007-01-01

    Objective  To develop and evaluate service user, carer and community involvement in health and social care education.\\ud \\ud Background  Despite the high policy profile of involvement issues, there appear to be no published accounts of schemes that have used a systematic whole-faculty approach to community engagement in health and social care higher education.\\ud \\ud Focus of this paper  The set up and early development of a faculty-wide community engagement project.\\ud \\ud Setting and partic...

  6. Tools for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-09

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  7. Speaker Authentication

    CERN Document Server

    Li, Qi (Peter)

    2012-01-01

    This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker’s identity based on his/her voice characteristics while the VIV approach validates a speaker’s identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications. The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speake...

  8. Final LDRD report : advanced plastic scintillators for neutron detection.

    Energy Technology Data Exchange (ETDEWEB)

    Vance, Andrew L.; Mascarenhas, Nicholas; O' Bryan, Greg; Mrowka, Stanley

    2010-09-01

    This report summarizes the results of a one-year, feasibility-scale LDRD project that was conducted with the goal of developing new plastic scintillators capable of pulse shape discrimination (PSD) for neutron detection. Copolymers composed of matrix materials such as poly(methyl methacrylate) (PMMA) and blocks containing trans-stilbene (tSB) as the scintillator component were prepared and tested for gamma/neutron response. Block copolymer synthesis utilizing tSBMA proved unsuccessful so random copolymers containing up to 30% tSB were prepared. These copolymers were found to function as scintillators upon exposure to gamma radiation; however, they did not exhibit PSD when exposed to a neutron source. This project, while falling short of its ultimate goal, demonstrated the possible utility of single-component, undoped plastics as scintillators for applications that do not require PSD.

  9. Authenticating cache.

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Tyler Barratt; Urrea, Jorge Mario

    2012-06-01

    The aim of the Authenticating Cache architecture is to ensure that machine instructions in a Read Only Memory (ROM) are legitimate from the time the ROM image is signed (immediately after compilation) to the time they are placed in the cache for the processor to consume. The proposed architecture allows the detection of ROM image modifications during distribution or when it is loaded into memory. It also ensures that modified instructions will not execute in the processor-as the cache will not be loaded with a page that fails an integrity check. The authenticity of the instruction stream can also be verified in this architecture. The combination of integrity and authenticity assurance greatly improves the security profile of a system.

  10. Tracking of Nuclear Production using Indigenous Species: Final LDRD Report

    Energy Technology Data Exchange (ETDEWEB)

    Alam, Todd Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Dept. of Electronic and Nanostructured Materials; Alam, Mary Kathleen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Energetics Characterization Dept.; McIntyre, Sarah K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Dept. of Electronic and Nanostructured Materials; Volk, David [Univ. of Texas, Galveston, TX (United States). Medical Branch; Neerathilingam, Muniasamy [Univ. of Texas, Galveston, TX (United States). Medical Branch; Luxon, Bruce A. [Univ. of Texas, Galveston, TX (United States). Medical Branch; Ansari, G. A. Shakeel [Univ. of Texas, Galveston, TX (United States). Medical Branch

    2009-10-01

    Our LDRD research project sought to develop an analytical method for detection of chemicals used in nuclear materials processing. Our approach is distinctly different than current research involving hardware based sensors. By utilizing the response of indigenous species of plants and/or animals surrounding (or within) a nuclear processing facility, we propose tracking 'suspicious molecules' relevant to nuclear materials processing. As proof of concept, we have examined TBP, tributylphosphate, used in uranium enrichment as well as plutonium extraction from spent nuclear fuels. We will compare TBP to the TPP (triphenylphosphate) analog to determine the uniqueness of the metabonomic response. We show that there is a unique metabonomic response within our animal model to TBP. The TBP signature can further be delineated from that of TPP. We have also developed unique methods of instrumental transfer for metabonomic data sets.

  11. Tracking of Nuclear Production using Indigenous Species: Final LDRD Report

    Energy Technology Data Exchange (ETDEWEB)

    Alam, Todd Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Dept. of Electronic and Nanostructured Materials; Alam, Mary Kathleen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Energetics Characterization Dept.; McIntyre, Sarah K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Dept. of Electronic and Nanostructured Materials; Volk, David [Univ. of Texas, Galveston, TX (United States). Medical Branch; Neerathilingam, Muniasamy [Univ. of Texas, Galveston, TX (United States). Medical Branch; Luxon, Bruce A. [Univ. of Texas, Galveston, TX (United States). Medical Branch; Ansari, G. A. Shakeel [Univ. of Texas, Galveston, TX (United States). Medical Branch

    2009-10-01

    Our LDRD research project sought to develop an analytical method for detection of chemicals used in nuclear materials processing. Our approach is distinctly different than current research involving hardware-based sensors. By utilizing the response of indigenous species of plants and/or animals surrounding (or within) a nuclear processing facility, we propose tracking 'suspicious molecules' relevant to nuclear materials processing. As proof of concept, we have examined TBP, tributylphosphate, used in uranium enrichment as well as plutonium extraction from spent nuclear fuels. We will compare TBP to the TPP (triphenylphosphate) analog to determine the uniqueness of the metabonomic response. We show that there is a unique metabonomic response within our animal model to TBP. The TBP signature can further be delineated from that of TPP. We have also developed unique methods of instrumental transfer for metabonomic data sets.

  12. LDRD Highlights at the National Laboratories

    Energy Technology Data Exchange (ETDEWEB)

    Alayat, R. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-10-10

    To meet the nation’s critical challenges, the Department of Energy (DOE) national laboratories have always pushed the boundaries of science, technology, and engineering. The Atomic Energy Act of 1954 provided the basis for these laboratories to engage in the cutting edge of science and technology and respond to technological surprises, while retaining the best scientific and technological minds. To help re-energize this commitment, in 1991 the U.S. Congress authorized the national laboratories to devote a relatively small percentage of their budget to creative and innovative work that serves to maintain their vitality in disciplines relevant to DOE missions. Since then, this effort has been formally called the Laboratory Directed Research and Development (LDRD) Program. LDRD has been an essential mechanism to enable the laboratories to address DOE’s current and future missions with leading-edge research proposed independently by laboratory technical staff, evaluated through expert peer-review committees, and funded by the individual laboratories consistent with the authorizing legislation and the DOE LDRD Order 413.2C.

  13. LDRD final report : robust analysis of large-scale combinatorial applications.

    Energy Technology Data Exchange (ETDEWEB)

    Carr, Robert D.; Morrison, Todd (University of Colorado, Denver, CO); Hart, William Eugene; Benavides, Nicolas L. (Santa Clara University, Santa Clara, CA); Greenberg, Harvey J. (University of Colorado, Denver, CO); Watson, Jean-Paul; Phillips, Cynthia Ann

    2007-09-01

    Discrete models of large, complex systems like national infrastructures and complex logistics frameworks naturally incorporate many modeling uncertainties. Consequently, there is a clear need for optimization techniques that can robustly account for risks associated with modeling uncertainties. This report summarizes the progress of the Late-Start LDRD 'Robust Analysis of Largescale Combinatorial Applications'. This project developed new heuristics for solving robust optimization models, and developed new robust optimization models for describing uncertainty scenarios.

  14. Multi-attribute criteria applied to electric generation energy system analysis LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Kuswa, Glenn W.; Tsao, Jeffrey Yeenien; Drennen, Thomas E.; Zuffranieri, Jason V.; Paananen, Orman Henrie; Jones, Scott A.; Ortner, Juergen G. (DLR, German Aerospace, Cologne); Brewer, Jeffrey D.; Valdez, Maximo M.

    2005-10-01

    This report began with a Laboratory-Directed Research and Development (LDRD) project to improve Sandia National Laboratories multidisciplinary capabilities in energy systems analysis. The aim is to understand how various electricity generating options can best serve needs in the United States. The initial product is documented in a series of white papers that span a broad range of topics, including the successes and failures of past modeling studies, sustainability, oil dependence, energy security, and nuclear power. Summaries of these projects are included here. These projects have provided a background and discussion framework for the Energy Systems Analysis LDRD team to carry out an inter-comparison of many of the commonly available electric power sources in present use, comparisons of those options, and efforts needed to realize progress towards those options. A computer aid has been developed to compare various options based on cost and other attributes such as technological, social, and policy constraints. The Energy Systems Analysis team has developed a multi-criteria framework that will allow comparison of energy options with a set of metrics that can be used across all technologies. This report discusses several evaluation techniques and introduces the set of criteria developed for this LDRD.

  15. FY07 LDRD Final Report Precision, Split Beam, Chirped-Pulse, Seed Laser Technology

    Energy Technology Data Exchange (ETDEWEB)

    Dawson, J W; Messerly, M J; Phan, H H; Crane, J K; Beach, R J; Siders, C W; Barty, C J

    2009-11-12

    The goal of this LDRD ER was to develop a robust and reliable technology to seed high-energy laser systems with chirped pulses that can be amplified to kilo-Joule energies and recompressed to sub-picosecond pulse widths creating extremely high peak powers suitable for petawatt class physics experiments. This LDRD project focused on the development of optical fiber laser technologies compatible with the current long pulse National Ignition Facility (NIF) seed laser. New technologies developed under this project include, high stability mode-locked fiber lasers, fiber based techniques for reduction of compressed pulse pedestals and prepulses, new compact stretchers based on chirped fiber Bragg gratings (CFBGs), new techniques for manipulation of chirped pulses prior to amplification and new high-energy fiber amplifiers. This project was highly successful and met virtually all of its goals. The National Ignition Campaign has found the results of this work to be very helpful. The LDRD developed system is being employed in experiments to engineer the Advanced Radiographic Capability (ARC) front end and the fully engineered version of the ARC Front End will employ much of the technology and techniques developed here.

  16. System and method for authentication

    Energy Technology Data Exchange (ETDEWEB)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  17. Laser Spray Fabrication for Net-Shape Rapid Product Realization LDRD

    Energy Technology Data Exchange (ETDEWEB)

    Atwood, C.L.; Ensz, M.T.; Greene, D.L.; Griffith, M.L.; Harwell, L.D.; Jeantette, F.P.; Keicher, D.M.; Oliver, M.S.; Reckaway, D.E.; Romero, J.A.; Schlienger, M.E.; Smugeresky, J.D.

    1999-04-01

    The primary purpose of this LDRD project was to characterize the laser deposition process and determine the feasibility of fabricating complex near-net shapes directly from a CAD solid model. Process characterization provided direction in developing a system to fabricate complex shapes directly from a CAD solid model. Our goal for this LDRD was to develop a system that is robust and provides a significant advancement to existing technologies (e.g., polymeric-based rapid prototyping, laser welding). Development of the process will allow design engineers to produce functional models of their designs directly from CAD files. The turnaround time for complex geometrical shaped parts will be hours instead of days and days instead of months. With reduced turnaround time, more time can be spent on the product-design phase to ensure that the best component design is achieved. Maturation of this technology will revolutionize the way the world produces structural components.

  18. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    . In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post...

  19. Designing Pu600 for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-10

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work.

  20. Tibetan Interpretations of Authenticity

    DEFF Research Database (Denmark)

    Sobisch, Jan-Ulrich

    2015-01-01

    The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions....

  1. 2014 SRNL LDRD Annual Report, Rev. 0

    Energy Technology Data Exchange (ETDEWEB)

    Mcwhorter, S. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-03-15

    Laboratory Directed Research and Development is a congressionally authorized program that provides the ‘innovation inspiration’ from which many of the Laboratory’s multi-discipline advancements are made in both science and engineering technology. The program is the backbone for insuring that scientific, technical and engineering capabilities can meet current and future needs. It is an important tool in reducing the probability of technological surprise by allowing laboratory technical staff room to innovate and keep abreast of scientific breakthroughs. Drawing from the synergism among the EM and NNSA missions, and work from other federal agencies ensures that LDRD is the key element in maintaining the vitality of SRNL’s technical programs. The LDRD program aims to position the Laboratory for new business in clean energy, national security, nuclear materials management and environmental stewardship by leveraging the unique capabilities of the Laboratory to yield foundational scientific research in core business areas, while aligning with SRS strategic initiatives and maintaining a vision for ultimate DOE applications.

  2. AIS authentication

    CERN Document Server

    2006-01-01

    Users are invited to use the NICE password for AIS authentication. As announced in CNL June-August 2006 (see http://www.cerncourier.com/articles/cnl/3/6/14/1) it is possible to use the NICE username and password to log on to AIS. The procedure is now fully operational and users can themselves reset the AIS password such that the NICE password will be used for authentication required by AIS applications. We strongly recommend CERN users who have a NICE account (this is the case of most users) to do this, with the objective to reduce the number of passwords they need to remember. This can be achieved very easily, directly from the Change Password option on the AIS login (https://aislogin.cern.ch/). Users should just select the '[Change Password]' option displayed at the bottom of the page, provide the 'Old Password' and then click on the button 'Use Nice password' followed by 'Submit'. Change Password option on the AIS login windowSetting the AIS password - Use Nice Password It should be noted that the proce...

  3. LDRD Final Report: Surrogate Nuclear Reactions and the Origin of the Heavy Elements (04-ERD-057)

    Energy Technology Data Exchange (ETDEWEB)

    Escher, J E; Bernstein, L A; Bleuel, D; Burke, J; Church, J A; Dietrich, F S; Forssen, C; Gueorguiev, V; Hoffman, R D

    2007-02-23

    Research carried out in the framework of the LDRD project ''Surrogate Nuclear Reactions and the Origin of the Heavy Elements'' (04-ERD-057) is summarized. The project was designed to address the challenge of determining cross sections for nuclear reactions involving unstable targets, with a particular emphasis on reactions that play a key role in the production of the elements between Iron and Uranium. This report reviews the motivation for the research, introduces the approach employed to address the problem, and summarizes the resulting scientific insights, technical findings, and related accomplishments.

  4. Authenticating the Leader

    DEFF Research Database (Denmark)

    Johnsen, Christian Garmann

    of authentication within discourse of authentic leadership. If authentic leadership is to make any sense, it is necessary to be able to distinguish the authentic from the inauthentic leader – in other words, it is necessary to authenticate the leader. This paper uses Gilles Deleuze’s reading of Plato as the point...... of departure for discussing the problem of authentication – separating the authentic leader form the inauthentic one – in the leadership guru Bill George’s model of authentic leadership. By doing so, the paper offers a way of conceptualizing the problem of authenticating leaders, as well as challenging...... procedure of separating the authentic from the inauthentic leader underlying the discourse on authentic leadership....

  5. Authenticating Performances

    DEFF Research Database (Denmark)

    Rudolph, Michael

    2015-01-01

    Adherents of performance theory emphasize the constitutive and transformative potential of rituals with respect to patterns of social organization and authority. For them, rituals “not only mean something, but also do something, particularly the way they construct and inscribe power relationships......” (Bell 1997). This contribution focuses on the role of ritual in postcolonial identity constitution and the performative authentication of political power and social authority in Taiwan. Since the middle of the 1990s, traditionalist performances have been on the rise on the island. Generously subsidized...... at the contemporary rituals of the Taroko and Ami, which are characterized by the above mentioned dynamics, I argue that rituals publicly performed by aborigines today amalgamate different levels of meaning. While they articulate and negotiate the identity needs and social exigencies of the respective social group...

  6. Small space object imaging : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Ackermann, Mark R.; Valley, Michael T.; Kearney, Sean Patrick

    2009-10-01

    We report the results of an LDRD effort to investigate new technologies for the identification of small-sized (mm to cm) debris in low-earth orbit. This small-yet-energetic debris presents a threat to the integrity of space-assets worldwide and represents significant security challenge to the international community. We present a nonexhaustive review of recent US and Russian efforts to meet the challenges of debris identification and removal and then provide a detailed description of joint US-Russian plans for sensitive, laser-based imaging of small debris at distances of hundreds of kilometers and relative velocities of several kilometers per second. Plans for the upcoming experimental testing of these imaging schemes are presented and a preliminary path toward system integration is identified.

  7. Should Teachers Be Authentic?

    Science.gov (United States)

    Bialystok, Lauren

    2015-01-01

    Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…

  8. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations...... in theoretical understanding of the meanings of authentication. We provide a new insight in this direction and formalize it in CFPS (Common Framework for authentication Protocols' Specifications). CFPS provides a precise scope of definition for authentication protocols, which could make the design and analysis...

  9. Transparent User Authentication

    CERN Document Server

    Clarke, Nathan

    2011-01-01

    This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication -- where authentication credentials are captured during a user's normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discu

  10. Obstacle detection for autonomous navigation : an LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Padilla, Denise D.

    2004-03-01

    This report summarizes the analytical and experimental efforts for the Laboratory Directed Research and Development (LDRD) project entitled 'Obstacle Detection for Autonomous Navigation'. The principal goal of this project was to develop a mathematical framework for obstacle detection. The framework provides a basis for solutions to many complex obstacle detection problems critical to successful autonomous navigation. Another goal of this project was to characterize sensing requirements in terms of physical characteristics of obstacles, vehicles, and terrain. For example, a specific vehicle traveling at a specific velocity over a specific terrain requires a sensor with a certain range of detection, resolution, field-of-view, and sufficient sensitivity to specific obstacle characteristics. In some cases, combinations of sensors were required to distinguish between different hazardous obstacles and benign terrain. In our framework, the problem was posed as a multidimensional, multiple-hypothesis, pattern recognition problem. Features were extracted from selected sensors that allow hazardous obstacles to be distinguished from benign terrain and other types of obstacles. Another unique thrust of this project was to characterize different terrain classes with respect to both positive (e.g., rocks, trees, fences) and negative (e.g., holes, ditches, drop-offs) obstacles. The density of various hazards per square kilometer was statistically quantified for different terrain categories (e.g., high desert, ponderosa forest, and prairie). This quantification reflects the scale, or size, and mobility of different types of vehicles. The tradeoffs between obstacle detection, position location, path planning, and vehicle mobility capabilities were also to be characterized.

  11. Authenticating the Leader

    DEFF Research Database (Denmark)

    Garmann Johnsen, Christian

    2015-01-01

    In the wake of a series of corporate scandals, there has been a growing call for authentic leadership in order to ensure ethical conduct in contemporary organizations. Authentic leadership, however, depends upon the ability to draw a distinction between the authentic and inauthentic leader....... This paper uses Deleuze’s discussion of Platonism as a point of departure for critically scrutinizing the problem of authenticating the leader - drawing a distinction between authentic and inauthentic leaders. This will be done through a reading of Bill George’s book Authentic Leadership. Informed by Deleuze......’s inverted Platonism, the paper challenges the practice by which authentic leaders are distinguished from inauthentic leaders. In conclusion, the paper suggests that an adequate concept of authentic leadership should consider how ethics can occur when the authentic leader is able to critically reflect his...

  12. Self organizing software research : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Osbourn, Gordon Cecil

    2004-01-01

    We have made progress in developing a new statistical mechanics approach to designing self organizing systems that is unique to SNL. The primary application target for this ongoing research has been the development of new kinds of nanoscale components and hardware systems. However, this research also enables an out of the box connection to the field of software development. With appropriate modification, the collective behavior physics ideas for enabling simple hardware components to self organize may also provide design methods for a new class of software modules. Our current physics simulations suggest that populations of these special software components would be able to self assemble into a variety of much larger and more complex software systems. If successful, this would provide a radical (disruptive technology) path to developing complex, high reliability software unlike any known today. This high risk, high payoff opportunity does not fit well into existing SNL funding categories, as it is well outside of the mainstreams of both conventional software development practices and the nanoscience research area that spawned it. This LDRD effort was aimed at developing and extending the capabilities of self organizing/assembling software systems, and to demonstrate the unique capabilities and advantages of this radical new approach for software development.

  13. Precision guided parachute LDRD final report

    Energy Technology Data Exchange (ETDEWEB)

    Gilkey, J.C. [Sandia National Labs., Albuquerque, NM (United States). Aided Navigation and Remote Sensing Dept.

    1996-07-01

    This report summarizes the results of the Precision Guided Parachute LDRD, a two year program at Sandia National Laboratories which developed a Global Positioning System (GPS) guided parachute capable of autonomous flight and landings. A detailed computer model of a gliding parachute was developed for software only simulations. A hardware in-the-loop simulator was developed and used for flight package system integration and design validation. Initial parachute drop tests were conducted at Sandia`s Coyote Canyon Cable Facility, followed by a series of airdrops using Ross Aircraft`s Twin Otter at the Burris Ranch Drop Zone. Final flights demonstrated in-flight wind estimation and the capability to fly a commanded heading. In the past, the cost and logistical complexity of an initial navigation system ruled out actively guiding a parachute. The advent of the low-cost, light-weight Global Positioning System (GPS) has eliminated this barrier. By using GPS position and velocity measurements, a guided parachute can autonomously steer itself to a targeted point on the ground through the use of control drums attached to the control lanyards of the parachute. By actively correcting for drop point errors and wind drift, the guidance accuracy of this system should be on the order of GPS position errors. This would be a significant improvement over unguided airdrops which may have errors of a mile or more.

  14. Developing Young Researchers: 15 Years of Authentic Science Experiences for K-12 with NASA's S'COOL Project

    Science.gov (United States)

    Chambers, L. H.; Crecelius, S.; Rogerson, T.; Lewis, P. M.; Moore, S.; Madigan, J. J.; Deller, C.; Taylor, J.

    2012-12-01

    In late 1996, members of the Atmospheric Science Directorate at NASA's Langley Research Center decided that there had to be a better way to share the excitement of our research than black and white, text-heavy Fact Sheets. We invited a group of local teachers to a half-day session on Center to help guide an improved approach. We suggested a variety of approaches to them, and asked for feedback. They were eager for anything other than black and white Fact Sheets! Fortunately, one local middle school science teacher took us up on the offer to stick around and talk over lunch. In that conversation, she said that anything that would connect the science her kids studied in the classroom to the outside world - especially to NASA! - would be very motivating to her students. From that conversation was born the Students' Cloud Observations On-Line (S'COOL Project), now a nearly 16-year experiment in K-12 science, technology, engineering, and math (STEM) engagement. S'COOL is the Education and Public Outreach (EPO) arm of the Clouds and the Earth's Radiant Energy System (CERES) project, and involves K-12 students as a source of ground truth for satellite cloud retrievals. It was designed from the beginning as a 2-way project, with communication of information from the students to NASA, but also from NASA back to the students. With technology evolution since the project began, we have continued to enhance this focus on 2-way interaction. S'COOL involves students with observation skills, math skills (to compute cloud cover from multiple observers or convert units), geography skills (locating their school on a map and comparing to satellite imagery), and exposes them to cutting edge engineering in the form of a series of NASA satellites. As a priority Earth Observing Instrument, CERES currently flies on Terra, Aqua and NPP, with an additional instrument in development for JPSS. Students are involved in occasional Intensive Observing Periods (as with the launch of NPP), and are

  15. LDRD final report : a lightweight operating system for multi-core capability class supercomputers.

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, Suzanne Marie; Hudson, Trammell B. (OS Research); Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Levenhagen, Michael J.; Brightwell, Ronald Brian

    2010-09-01

    The two primary objectives of this LDRD project were to create a lightweight kernel (LWK) operating system(OS) designed to take maximum advantage of multi-core processors, and to leverage the virtualization capabilities in modern multi-core processors to create a more flexible and adaptable LWK environment. The most significant technical accomplishments of this project were the development of the Kitten lightweight kernel, the co-development of the SMARTMAP intra-node memory mapping technique, and the development and demonstration of a scalable virtualization environment for HPC. Each of these topics is presented in this report by the inclusion of a published or submitted research paper. The results of this project are being leveraged by several ongoing and new research projects.

  16. Authenticity in Adult Learning

    Science.gov (United States)

    Ashton, Sam

    2010-01-01

    This paper is concerned with the relationship between authenticity and adult learning and prompted by some studies in which adult "authentic learning" is a central concept. The implication revealed by them is that real-worldness of learning contexts, learning content and learning tasks is perceived as conferring authenticity on learning. Here,…

  17. Authentic Assessment, Professional's Guide.

    Science.gov (United States)

    Ryan, Concetta Doti

    Authentic assessment is the process of gathering evidence and documenting student learning and growth in an authentic context. Authentic assessment can do a better job than more traditional forms of assessment in informing educators and parents about a student's real achievement. The first chapter of this book presents an overview of authentic…

  18. Building more powerful less expensive supercomputers using Processing-In-Memory (PIM) LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Murphy, Richard C.

    2009-09-01

    This report details the accomplishments of the 'Building More Powerful Less Expensive Supercomputers Using Processing-In-Memory (PIM)' LDRD ('PIM LDRD', number 105809) for FY07-FY09. Latency dominates all levels of supercomputer design. Within a node, increasing memory latency, relative to processor cycle time, limits CPU performance. Between nodes, the same increase in relative latency impacts scalability. Processing-In-Memory (PIM) is an architecture that directly addresses this problem using enhanced chip fabrication technology and machine organization. PIMs combine high-speed logic and dense, low-latency, high-bandwidth DRAM, and lightweight threads that tolerate latency by performing useful work during memory transactions. This work examines the potential of PIM-based architectures to support mission critical Sandia applications and an emerging class of more data intensive informatics applications. This work has resulted in a stronger architecture/implementation collaboration between 1400 and 1700. Additionally, key technology components have impacted vendor roadmaps, and we are in the process of pursuing these new collaborations. This work has the potential to impact future supercomputer design and construction, reducing power and increasing performance. This final report is organized as follow: this summary chapter discusses the impact of the project (Section 1), provides an enumeration of publications and other public discussion of the work (Section 1), and concludes with a discussion of future work and impact from the project (Section 1). The appendix contains reprints of the refereed publications resulting from this work.

  19. LDRD Final Report: Global Optimization for Engineering Science Problems

    Energy Technology Data Exchange (ETDEWEB)

    HART,WILLIAM E.

    1999-12-01

    For a wide variety of scientific and engineering problems the desired solution corresponds to an optimal set of objective function parameters, where the objective function measures a solution's quality. The main goal of the LDRD ''Global Optimization for Engineering Science Problems'' was the development of new robust and efficient optimization algorithms that can be used to find globally optimal solutions to complex optimization problems. This SAND report summarizes the technical accomplishments of this LDRD, discusses lessons learned and describes open research issues.

  20. Authentic And Concurrent Evaluation-refining

    DEFF Research Database (Denmark)

    Eriksson, Carina Ihlström; Åkesson, Maria; Kautz, Karlheinz

    2011-01-01

    This paper addresses the need for more detailed accounts for evaluation in design science research literature. By revisiting a design project regarding the future e-newspaper we give detailed descriptions of its authentic and concurrent evaluation approach by illustrating the what, why and how...... as well as decisions on strategic levels. We emphasize a holistic and concurrent approach to evaluation compared to the general design science research thinking and argue that reflecting on how to seek authenticity is important. By authenticity we refer to the notion of how closely an evaluation captures...

  1. Interface physics in microporous media : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Yaklin, Melissa A.; Knutson, Chad E.; Noble, David R.; Aragon, Alicia R.; Chen, Ken Shuang; Giordano, Nicholas J. (Purdue University, West Lafayette, IN); Brooks, Carlton, F.; Pyrak-Nolte, Laura J. (Purdue University, West Lafayette, IN); Liu, Yihong (Purdue University, West Lafayette, IN)

    2008-09-01

    This document contains a summary of the work performed under the LDRD project entitled 'Interface Physics in Microporous Media'. The presence of fluid-fluid interfaces, which can carry non-zero stresses, distinguishes multiphase flows from more readily understood single-phase flows. In this work the physics active at these interfaces has been examined via a combined experimental and computational approach. One of the major difficulties of examining true microporous systems of the type found in filters, membranes, geologic media, etc. is the geometric uncertainty. To help facilitate the examination of transport at the pore-scale without this complication, a significant effort has been made in the area of fabrication of both two-dimensional and three-dimensional micromodels. Using these micromodels, multiphase flow experiments have been performed for liquid-liquid and liquid-gas systems. Laser scanning confocal microscopy has been utilized to provide high resolution, three-dimensional reconstructions as well as time resolved, two-dimensional reconstructions. Computational work has focused on extending lattice Boltzmann (LB) and finite element methods for probing the interface physics at the pore scale. A new LB technique has been developed that provides over 100x speed up for steady flows in complex geometries. A new LB model has been developed that allows for arbitrary density ratios, which has been a significant obstacle in applying LB to air-water flows. A new reduced order model has been developed and implemented in finite element code for examining non-equilibrium wetting in microchannel systems. These advances will enhance Sandia's ability to quantitatively probe the rich interfacial physics present in microporous systems.

  2. Multi-factor authentication

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  3. Idaho National Laboratory LDRD Annual Report FY 2012

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2013-03-01

    This report provides a glimpse into our diverse research and development portfolio, wwhich encompasses both advanced nuclear science and technology and underlying technologies. IN keeping with the mission, INL's LDRD program fosters technical capabilities necessary to support current and future DOE-Office of Nuclear Energy research and development needs.

  4. Multi-target camera tracking, hand-off and display LDRD 158819 final report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn't lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identifies individual moving targets from the background imagery, and then displays the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  5. Multi-Target Camera Tracking, Hand-off and Display LDRD 158819 Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Robotic and Security Systems Dept.

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn’t lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identify individual moving targets from the background imagery, and then display the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  6. Multi-Target Camera Tracking, Hand-off and Display LDRD 158819 Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Robotic and Security Systems Dept.

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn’t lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that takes live video imagery from multiple video cameras, identifies individual moving targets from the background imagery, and then displays the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of currently capability.

  7. Multi-target camera tracking, hand-off and display LDRD 158819 final report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn't lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that takes live video imagery from multiple video cameras, identifies individual moving targets from the background imagery, and then displays the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of currently capability.

  8. Authentication over Noisy Channels

    CERN Document Server

    Lai, Lifeng; Poor, H Vincent

    2008-01-01

    In this work, message authentication over noisy channels is studied. The model developed in this paper is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks, namely impersonation attacks and substitution attacks, are investigated for both single message and multiple message authentication scenarios. For each scenario, information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably, in both scenarios, lower and upper bounds are shown to match, and hence the fundamental limit of message authentication over noisy channels is fully characterized. The opponent's success probability is further shown to be smaller than that derived in the classic authentication model in which the channel is assumed to be noiseless. These results rely on a proposed novel authentication scheme in which key information is used to provide simultaneous protection again both types of attacks.

  9. Retrospective on the Seniors' Council Tier 1 LDRD portfolio.

    Energy Technology Data Exchange (ETDEWEB)

    Ballard, William Parker

    2012-04-01

    This report describes the Tier 1 LDRD portfolio, administered by the Seniors Council between 2003 and 2011. 73 projects were sponsored over the 9 years of the portfolio at a cost of $10.5 million which includes $1.9M of a special effort in directed innovation targeted at climate change and cyber security. Two of these Tier 1 efforts were the seeds for the Grand Challenge LDRDs in Quantum Computing and Next Generation Photovoltaic conversion. A few LDRDs were terminated early when it appeared clear that the research was not going to succeed. A great many more were successful and led to full Tier 2 LDRDs or direct customer sponsorship. Over a dozen patents are in various stages of prosecution from this work, and one project is being submitted for an R and D 100 award.

  10. LDRD final report on new homogeneous catalysts for direct olefin epoxidation (LDRD 52591).

    Energy Technology Data Exchange (ETDEWEB)

    Goldberg, Karen (University of Washington); Smythe, Nicole A. (University of Washington); Moore, Joshua T.; Stewart, Constantine A.; Kemp, Richard Alan; Miller, James Edward; Kornienko, Alexander (New Mexico Institute of Mining and Technology); Denney, Melanie C. (University of Washington); Cetto, Kara L. (University of Washington)

    2006-02-01

    This report summarizes our findings during the study of a novel homogeneous epoxidation catalyst system that uses molecular oxygen as the oxidant, a ''Holy Grail'' in catalysis. While olefins (alkenes) that do not contain allylic hydrogens can be epoxidized directly using heterogeneous catalysts, most olefins cannot, and so a general, atom-efficient route is desired. While most of the work performed on this LDRD has been on pincer complexes of late transition metals, we also scouted out metal/ligand combinations that were significantly different, and unfortunately, less successful. Most of the work reported here deals with phosphorus-ligated Pd hydrides [(PCP)Pd-H]. We have demonstrated that molecular oxygen gas can insert into the Pd-H bond, giving a structurally characterized Pd-OOH species. This species reacts with oxygen acceptors such as olefins to donate an oxygen atom, although in various levels of selectivity, and to generate a [(PCP)Pd-OH] molecule. We discovered that the active [(PCP)Pd-H] active catalyst can be regenerated by addition of either CO or hydrogen. The demonstration of each step of the catalytic cycle is quite significant. Extensions to the pincer-Pd chemistry by attaching a fluorinated tail to the pincer designed to be used in solvents with higher oxygen solubilities are also presented.

  11. Decolonizing Researcher Authenticity

    Science.gov (United States)

    Daza, Stephanie Lynn

    2008-01-01

    This article examines the ways in which researcher authenticity is negotiated along three axes of difference, ethno-linguistic affiliation, sexual orientation and race/skin color. Ultimately, it analyzes how researcher authenticity is produced and played out within research, via interactions between participants, researchers and others who…

  12. Single password authentication

    OpenAIRE

    Küpçü, Alptekin; Acar, Tolga; Belenkiy, Mira

    2013-01-01

    Single Password Authentication Tolga Acar∗ Intel Corporation, Bellevue, WA, USA Mira Belenkiy Microsoft Research, Redmond, WA, USA Alptekin K up c u† Ko c University, _Istanbul, TURKEY May 11, 2013 Abstract Users frequently reuse their passwords when authenticating to various online services. Com-bined with the use of weak passwords or honeypot/phishing attacks, this brings high risks to th...

  13. Authenticity and Imagination

    Science.gov (United States)

    Dirkx, John M.

    2006-01-01

    Central to development of authenticity in teaching is self-understanding and self-awareness. Using a Jungian perspective, the author suggests that the imaginative dimensions of the self play a critical role in our journey and experience as teachers, and in developing self-awareness and authenticity in our teaching.

  14. Authenticity at work

    NARCIS (Netherlands)

    van den Bosch, Ralph

    2016-01-01

    Authenticity at work, loosely defined as the degree to which an individual stays true to their core self, has impact on workers in the workplace. This thesis shows that authenticity at work can be measured with a reliable and valid instrument: the IAM Work. Furthermore, results of this thesis show t

  15. AUTHENTICITY IN THE BLOGOSPHERE

    Directory of Open Access Journals (Sweden)

    Waclaw Branicki

    2010-01-01

    Full Text Available The primary purpose of this article is to answer the question of whether writing a blog defined as a personal diary can help to better understand himself. Self-awareness is a prerequisite for authentic existence. In the first part analyzed the concept of authenticity. Pointed out the relationship of authenticity to the categories of freedom, truth and responsibility. The second part presents the relationship between authentic existence and the process of self-disclosure, which may take place in the blogosphere. In the third part presents the question whether a writing blog affects the level authenticity of existence. It was recognized that a key element of this phenomenon is the sense of responsibility.

  16. Digital Learning Playground: Supporting Authentic Learning Experiences in the Classroom

    Science.gov (United States)

    Chen, Gwo-Dong; Nurkhamid; Wang, Chin-Yeh; Yang, Su-Hang; Lu, Wei-Yuan; Chang, Chih-Kai

    2013-01-01

    This study proposes a platform to provide a near-authentic environment, context, and situation for task-based learning. The platform includes two projection screens (a vertical and a horizontal screen) combined for situated or authentic learning. The horizontal screen extends the vertical screen scene to form a space for learning activities and…

  17. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner\\'s signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  18. Precision formed micro magnets: LDRD project summary report

    Energy Technology Data Exchange (ETDEWEB)

    CHRISTENSON,TODD R.; GARINO,TERRY J.; VENTURINI,EUGENE L.

    2000-02-01

    A microfabrication process is described that provides for the batch realization of miniature rare earth based permanent magnets. Prismatic geometry with features as small as 5 microns, thicknesses up through several hundred microns and with submicron tolerances may be accommodated. The processing is based on a molding technique using deep x-ray lithography as a means to generate high aspect-ratio precision molds from PMMA (poly methyl methacrylate) used as an x-ray photoresist. Subsequent molding of rare-earth permanent magnet (REPM) powder combined with a thermosetting plastic binder may take place directly in the PMMA mold. Further approaches generate an alumina form replicated from the PMMA mold that becomes an intermediate mold for pressing higher density REPM material and allows for higher process temperatures. Maximum energy products of 3--8 MGOe (Mega Gauss Oersted, 1 MGOe = 100/4{pi} kJ/m{sup 3}) are obtained for bonded isotropic forms of REPM with dimensions on the scale of 100 microns and up to 23 MGOe for more dense anisotropic REPM material using higher temperature processing. The utility of miniature precision REPMs is revealed by the demonstration of a miniature multipole brushless DC motor that possesses a pole-anisotropic rotor with dimensions that would otherwise prohibit multipole magnetization using a multipole magnetizing fixture at this scale. Subsequent multipole assembly also leads to miniaturized Halbach arrays, efficient magnetic microactuators, and mechanical spring-like elements which can offset miniaturized mechanical scaling behavior.

  19. Nanoporous films for epitaxial growth of single crystal semiconductor materials : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Rowen, Adam M.; Koleske, Daniel David; Fan, Hongyou; Brinker, C. Jeffrey; Burckel, David Bruce; Williams, John Dalton; Arrington, Christian L.; Steen, William Arthur

    2007-10-01

    This senior council Tier 1 LDRD was focused on exploring the use of porous growth masks as a method for defect reduction during heteroepitaxial crystal growth. Initially our goal was to investigate porous silica as a growth mask, however, we expanded the scope of the research to include several other porous growth masks on various size scales, including mesoporous carbon, photolithographically patterned SU-8 and carbonized SU-8 structures. Use of photolithographically defined growth templates represents a new direction, unique in the extensive literature of patterned epitaxial growth, and presents the possibility of providing a single step growth mask. Additional research included investigation of pore viability via electrochemical deposition into high aspect ratio photoresist. This project was a small footprint research effort which, nonetheless, produced significant progress towards both the stated goal as well as unanticipated research directions.

  20. Final LDRD report : development of advanced UV light emitters and biological agent detection strategies.

    Energy Technology Data Exchange (ETDEWEB)

    Figiel, Jeffrey James; Crawford, Mary Hagerott; Banas, Michael Anthony; Farrow, Darcie; Armstrong, Andrew M.; Serkland, Darwin Keith; Allerman, Andrew Alan; Schmitt, Randal L.

    2007-12-01

    We present the results of a three year LDRD project which has focused on the development of novel, compact, ultraviolet solid-state sources and fluorescence-based sensing platforms that apply such devices to the sensing of biological and nuclear materials. We describe our development of 270-280 nm AlGaN-based semiconductor UV LEDs with performance suitable for evaluation in biosensor platforms as well as our development efforts towards the realization of a 340 nm AlGaN-based laser diode technology. We further review our sensor development efforts, including evaluation of the efficacy of using modulated LED excitation and phase sensitive detection techniques for fluorescence detection of bio molecules and uranyl-containing compounds.

  1. Final LDRD report :ultraviolet water purification systems for rural environments and mobile applications.

    Energy Technology Data Exchange (ETDEWEB)

    Banas, Michael Anthony; Crawford, Mary Hagerott; Ruby, Douglas Scott; Ross, Michael P.; Nelson, Jeffrey Scott; Allerman, Andrew Alan; Boucher, Ray

    2005-11-01

    We present the results of a one year LDRD program that has focused on evaluating the use of newly developed deep ultraviolet LEDs in water purification. We describe our development efforts that have produced an LED-based water exposure set-up and enumerate the advances that have been made in deep UV LED performance throughout the project. The results of E. coli inactivation with 270-295 nm LEDs are presented along with an assessment of the potential for applying deep ultraviolet LED-based water purification to mobile point-of-use applications as well as to rural and international environments where the benefits of photovoltaic-powered systems can be realized.

  2. LDRD final report : mesoscale modeling of dynamic loading of heterogeneous materials.

    Energy Technology Data Exchange (ETDEWEB)

    Robbins, Joshua; Dingreville, Remi Philippe Michel; Voth, Thomas Eugene; Furnish, Michael David

    2013-12-01

    Material response to dynamic loading is often dominated by microstructure (grain structure, porosity, inclusions, defects). An example critically important to Sandia's mission is dynamic strength of polycrystalline metals where heterogeneities lead to localization of deformation and loss of shear strength. Microstructural effects are of broad importance to the scientific community and several institutions within DoD and DOE; however, current models rely on inaccurate assumptions about mechanisms at the sub-continuum or mesoscale. Consequently, there is a critical need for accurate and robust methods for modeling heterogeneous material response at this lower length scale. This report summarizes work performed as part of an LDRD effort (FY11 to FY13; project number 151364) to meet these needs.

  3. Authentic e-Learning in a Multicultural Context: Virtual Benchmarking Cases from Five Countries

    Science.gov (United States)

    Leppisaari, Irja; Herrington, Jan; Vainio, Leena; Im, Yeonwook

    2013-01-01

    The implementation of authentic learning elements at education institutions in five countries, eight online courses in total, is examined in this paper. The International Virtual Benchmarking Project (2009-2010) applied the elements of authentic learning developed by Herrington and Oliver (2000) as criteria to evaluate authenticity. Twelve…

  4. LDRD final report on new homogeneous and supported oligomerization catalysts (LDRD 42461).

    Energy Technology Data Exchange (ETDEWEB)

    Hascall, Anthony G.; Kemp, Richard Alan

    2004-11-01

    The overall purpose of this LDRD is multifold. First, we are interested in preparing new homogeneous catalysts that can be used in the oligomerization of ethylene and in understanding commercially important systems better. Second, we are interested in attempting to support these new homogeneous catalysts in the pores of nano- or mesoporous materials in order to force new and unusual distributions of a-olefins to be formed during the oligomerization. Thus the overall purpose is to try to prepare new catalytic species and to possibly control the active site architecture in order to yield certain desired products during a catalytic reaction, much like nature does with enzymes. In order to rationally synthesize catalysts it is imperative to comprehend the function of the various components of the catalyst. In heterogeneous systems, it is of utmost importance to know how a support interacts with the active site of the catalyst. In fact, in the catalysis world this lack of fundamental understanding of the relationship between active site and support is the single largest reason catalysis is considered an 'empirical' or 'black box' science rather than a well-understood one. In this work we will be preparing novel ethylene oligomerization catalysts, which are normally P-O chelated homogeneous complexes, with new ligands that replace P with a stable carbene. We will also examine a commercially catalyst system and investigate the active site in it via X-ray crystallography. We will also attempt to support these materials inside the pores of nano- and mesoporous materials. Essentially, we will be tailoring the size and scale of the catalyst active site and its surrounding environment to match the size of the molecular product(s) we wish to make. The overall purpose of the study will be to prepare new homogeneous catalysts, and if successful in supporting them to examine the effects that steric constraints and pore structures can have on growing oligomer

  5. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  6. Risk assessment meta tool LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Bouchard, Ann Marie; Osbourn, Gordon Cecil

    2006-12-01

    The goal of this project was to develop a risk analysis meta tool--a tool that enables security analysts both to combine and analyze data from multiple other risk assessment tools on demand. Our approach was based on the innovative self-assembling software technology under development by the project team. This technology provides a mechanism for the user to specify his intentions at a very high level (e.g., equations or English-like text), and then the code self-assembles itself, taking care of the implementation details. The first version of the meta tool focused specifically in importing and analyzing data from Joint Conflict and Tactical Simulation (JCATS) force-on-force simulation. We discuss the problem, our approach, technical risk, and accomplishments on this project, and outline next steps to be addressed with follow-on funding.

  7. Authenticity in Anatomy Art.

    Science.gov (United States)

    Adkins, Jessica

    2017-01-12

    The aim of this paper is to observe the evolution and evaluate the 'realness' and authenticity in Anatomy Art, an art form I define as one which incorporates accurate anatomical representations of the human body with artistic expression. I examine the art of 17th century wax anatomical models, the preservations of Frederik Ruysch, and Gunther von Hagens' Body Worlds plastinates, giving consideration to authenticity of both body and art. I give extra consideration to the works of Body Worlds since the exhibit creator believes he has created anatomical specimens with more educational value and bodily authenticity than ever before. Ultimately, I argue that von Hagens fails to offer Anatomy Art 'real human bodies,' and that the lack of bodily authenticity of his plastinates results in his creations being less pedagogic than he claims.

  8. Quantum deniable authentication protocol

    Science.gov (United States)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  9. Persistent Authentication in Smart Environments

    DEFF Research Database (Denmark)

    Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D.

    2008-01-01

    Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based...... will not be installed unless it is absolutely necessary. The cost of installing and maintaining an authentication infrastructure and the inconvenience of repeatedly authenticating toward different location based service providers mean that new models of authentication are needed in smart environments. This paper...... defines a persistent authentication model for a smart environment, which tracks inhabitants in the smart environment from the point of authentication to the protected resource, thus rendering authentication persistent by correlating the initial authentication event with the access control request. We...

  10. Using Rose and Compass for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2009-07-09

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  11. ParaText : scalable solutions for processing and searching very large document collections : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Crossno, Patricia Joyce; Dunlavy, Daniel M.; Stanton, Eric T.; Shead, Timothy M.

    2010-09-01

    This report is a summary of the accomplishments of the 'Scalable Solutions for Processing and Searching Very Large Document Collections' LDRD, which ran from FY08 through FY10. Our goal was to investigate scalable text analysis; specifically, methods for information retrieval and visualization that could scale to extremely large document collections. Towards that end, we designed, implemented, and demonstrated a scalable framework for text analysis - ParaText - as a major project deliverable. Further, we demonstrated the benefits of using visual analysis in text analysis algorithm development, improved performance of heterogeneous ensemble models in data classification problems, and the advantages of information theoretic methods in user analysis and interpretation in cross language information retrieval. The project involved 5 members of the technical staff and 3 summer interns (including one who worked two summers). It resulted in a total of 14 publications, 3 new software libraries (2 open source and 1 internal to Sandia), several new end-user software applications, and over 20 presentations. Several follow-on projects have already begun or will start in FY11, with additional projects currently in proposal.

  12. Vapor-liquid phase behavior of the iodine-sulfur water-splitting process : LDRD final report for FY03.

    Energy Technology Data Exchange (ETDEWEB)

    Bradshaw, Robert W.; Larson, Richard S.; Lutz, Andrew E.

    2004-01-01

    This report summarizes the results of a one-year LDRD project that was undertaken to better understand the equilibrium behavior of the iodine-water-hydriodic acid system at elevated temperature and pressure. We attempted to extend the phase equilibrium database for this system in order to facilitate development of the iodine-sulfur water-splitting process to produce hydrogen to a commercial scale. The iodine-sulfur cycle for thermochemical splitting of water is recognized as the most efficient such process and is particularly well suited to coupling to a high-temperature source of process heat. This study intended to combine experimental measurements of vapor-liquid-liquid equilibrium and equation-of-state modeling of equilibrium solutions using Sandia's Chernkin software. Vapor-liquid equilibrium experiments were conducted to a limited extent. The Liquid Chernkin software that was developed as part of an earlier LDRD project was enhanced and applied to model the non-ideal behavior of the liquid phases.

  13. Password authentication in cloud

    Directory of Open Access Journals (Sweden)

    Indal Singh

    2015-09-01

    Full Text Available Cloud computing is an Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers [1]. Cloud Computing is a term used to describe both a platform and type of application. As a platform it supplies, configures and reconfigures servers, while the servers can be physical machines or virtual machines. On the other hand, Cloud Computing describes applications that are extended to be accessible through the internet and for this purpose large data centers and powerful servers are used to host the web applications and web services. Authentication is one the most important security primitive [6]. Password authentication is most widely used authentication mechanism. Password provides security mechanism for authentication and protection services against unwanted access to resource. In this paper, we applied a technique to preserve our password using graphical authentication.

  14. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review of the con......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review......, it becomes possible to specify employment relations parameters between the indirect and direct employer and employees in a manner that will ensure working conditions consistent with these traditions, substantially enhancing the prospect of authenticity in employment relations. This theology of the workplace...... analysis should complement and support corporate social responsibility, management spirituality, authentic leadership / authentic follower, and other secular research by offering a research methods bridge between empirically grounded theology and secular studies, with the common goal of improving workplace...

  15. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  16. Automated visual direction : LDRD 38623 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J.

    2005-01-01

    Mobile manipulator systems used by emergency response operators consist of an articulated robot arm, a remotely driven base, a collection of cameras, and a remote communications link. Typically the system is completely teleoperated, with the operator using live video feedback to monitor and assess the environment, plan task activities, and to conduct the operations via remote control input devices. The capabilities of these systems are limited, and operators rarely attempt sophisticated operations such as retrieving and utilizing tools, deploying sensors, or building up world models. This project has focused on methods to utilize this video information to enable monitored autonomous behaviors for the mobile manipulator system, with the goal of improving the overall effectiveness of the human/robot system. Work includes visual servoing, visual targeting, utilization of embedded video in 3-D models, and improved methods of camera utilization and calibration.

  17. Hardware authentication using transmission spectra modified optical fiber.

    Energy Technology Data Exchange (ETDEWEB)

    Grubbs, Robert K.; Romero, Juan A.

    2010-09-01

    The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

  18. Brand new authentic places

    DEFF Research Database (Denmark)

    Stender, Marie

    How are places and material surroundings ascribed with meaning when new residential neighbourhoods are designed, branded and taken into use? Existing research on housing, neighbourhoods and urban design tends to take the perspective of either the architect or the user rather than to explore...... the relation and interplay between the two. This study strives to fill this gap by ethnographically tracing the process from design to occupancy including the role of branding as a means to create authenticity. The concept of authenticity is often associated with old houses and neighbourhoods, but also in new...... neighbourhoods stories of authenticity seems to be of great importance giving value and identity to place and people. By way of design and branding new places are implied with notions of the real, the original and the unique referring to e.g. its historical past, architectural uniqueness, sustainability or sense...

  19. Haunted by the authentic

    DEFF Research Database (Denmark)

    d'Ambrosio, Luigi

    2013-01-01

    Research description and purpose: The purpose of this investigation is to explore Danish guests’ experience when consuming ‘authentic’ Italian food in Italian restaurants in Denmark. In this context, the aim of the research is to engage in a discussion of the concept of authenticity in ethnic food...... consumption, and the guests’ experience with and reaction to the authentic culinary experience in ethnic restaurants in the consumers’ home country. Design/Methodology: The paper methodology is based on the use of mixed methods. A collection of primary quantitative and qualitative data through a questionnaire...... its findings, but, in line with its exploratory nature, to investigate the behaviour of Danish guests in relation to consumption of Italian food in an authentic setting. Originality/value: This paper looks at the relationship between the guest and the experience of ethnic food from a new perspective...

  20. Real-time discriminatory sensors for water contamination events :LDRD 52595 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Borek, Theodore Thaddeus III (; ); Carrejo-Simpkins, Kimberly; Wheeler, David Roger; Adkins, Douglas Ray; Robinson, Alex Lockwood; Irwin, Adriane Nadine; Lewis, Patrick Raymond; Goodin, Andrew M.; Shelmidine, Gregory J.; Dirk, Shawn M.; Chambers, William Clayton; Mowry, Curtis Dale (1722 Micro-Total-Analytical Systems); Showalter, Steven Kedrick

    2005-10-01

    The gas-phase {mu}ChemLab{trademark} developed by Sandia can detect volatile organics and semi-volatiles organics via gas phase sampling . The goal of this three year Laboratory Directed Research and Development (LDRD) project was to adapt the components and concepts used by the {mu}ChemLab{trademark} system towards the analysis of water-borne chemicals of current concern. In essence, interfacing the gas-phase {mu}ChemLab{trademark} with water to bring the significant prior investment of Sandia and the advantages of microfabrication and portable analysis to a whole new world of important analytes. These include both chemical weapons agents and their hydrolysis products and disinfection by-products such as Trihalomethanes (THMs) and haloacetic acids (HAAs). THMs and HAAs are currently regulated by EPA due to health issues, yet water utilities do not have rapid on-site methods of detection that would allow them to adjust their processes quickly; protecting consumers, meeting water quality standards, and obeying regulations more easily and with greater confidence. This report documents the results, unique hardware and devices, and methods designed during the project toward the goal stated above. It also presents and discusses the portable field system to measure THMs developed in the course of this project.

  1. Robust Planning for Autonomous Navigation of Mobile Robots in Unstructured, Dynamic Environments: An LDRD Final Report

    Energy Technology Data Exchange (ETDEWEB)

    EISLER, G. RICHARD

    2002-08-01

    This report summarizes the analytical and experimental efforts for the Laboratory Directed Research and Development (LDRD) project entitled ''Robust Planning for Autonomous Navigation of Mobile Robots In Unstructured, Dynamic Environments (AutoNav)''. The project goal was to develop an algorithmic-driven, multi-spectral approach to point-to-point navigation characterized by: segmented on-board trajectory planning, self-contained operation without human support for mission duration, and the development of appropriate sensors and algorithms to navigate unattended. The project was partially successful in achieving gains in sensing, path planning, navigation, and guidance. One of three experimental platforms, the Minimalist Autonomous Testbed, used a repetitive sense-and-re-plan combination to demonstrate the majority of elements necessary for autonomous navigation. However, a critical goal for overall success in arbitrary terrain, that of developing a sensor that is able to distinguish true obstacles that need to be avoided as a function of vehicle scale, still needs substantial research to bring to fruition.

  2. Covert air vehicle 2003 LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Spletzer, Barry Louis; Callow, Diane Schafer; Salton, Jonathan Robert; Fischer, Gary John

    2003-11-01

    This report describes the technical work carried out under a 2003 Laboratory Directed Research and Development project to develop a covert air vehicle. A mesoscale air vehicle that mimics a bird offers exceptional mobility and the possibility of remaining undetected during flight. Although some such vehicles exist, they are lacking in key areas: unassisted landing and launching, true mimicry of bird flight to remain covert, and a flapping flight time of any real duration. Current mainstream technology does not have the energy or power density necessary to achieve bird like flight for any meaningful length of time; however, Sandia has unique combustion powered linear actuators with the unprecedented high energy and power density needed for bird like flight. The small-scale, high-pressure valves and small-scale ignition to make this work have been developed at Sandia. We will study the feasibility of using this to achieve vehicle takeoff and wing flapping for sustained flight. This type of vehicle has broad applications for reconnaissance and communications networks, and could prove invaluable for military and intelligence operations throughout the world. Initial tests were conducted on scaled versions of the combustion-powered linear actuator. The tests results showed that heat transfer and friction effects dominate the combustion process at 'bird-like' sizes. The problems associated with micro-combustion must be solved before a true bird-like ornithopter can be developed.

  3. Massive graph visualization : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Wylie, Brian Neil; Moreland, Kenneth D.

    2007-10-01

    Graphs are a vital way of organizing data with complex correlations. A good visualization of a graph can fundamentally change human understanding of the data. Consequently, there is a rich body of work on graph visualization. Although there are many techniques that are effective on small to medium sized graphs (tens of thousands of nodes), there is a void in the research for visualizing massive graphs containing millions of nodes. Sandia is one of the few entities in the world that has the means and motivation to handle data on such a massive scale. For example, homeland security generates graphs from prolific media sources such as television, telephone, and the Internet. The purpose of this project is to provide the groundwork for visualizing such massive graphs. The research provides for two major feature gaps: a parallel, interactive visualization framework and scalable algorithms to make the framework usable to a practical application. Both the frameworks and algorithms are designed to run on distributed parallel computers, which are already available at Sandia. Some features are integrated into the ThreatView{trademark} application and future work will integrate further parallel algorithms.

  4. Final Report for the Virtual Reliability Realization System LDRD

    Energy Technology Data Exchange (ETDEWEB)

    DELLIN, THEODORE A.; HENDERSON, CHRISTOPHER L.; O' TOOLE, EDWARD J.

    2000-12-01

    Current approaches to reliability are not adequate to keep pace with the need for faster, better and cheaper products and systems. This is especially true in high consequence of failure applications. The original proposal for the LDRD was to look at this challenge and see if there was a new paradigm that could make reliability predictions, along with a quantitative estimate of the risk in that prediction, in a way that was faster, better and cheaper. Such an approach would be based on the underlying science models that are the backbone of reliability predictions. The new paradigm would be implemented in two software tools: the Virtual Reliability Realization System (VRRS) and the Reliability Expert System (REX). The three-year LDRD was funded at a reduced level for the first year ($120K vs. $250K) and not renewed. Because of the reduced funding, we concentrated on the initial development of the expertise system. We developed an interactive semiconductor calculation tool needed for reliability analyses. We also were able to generate a basic functional system using Microsoft Siteserver Commerce Edition and Microsoft Sequel Server. The base system has the capability to store Office documents from multiple authors, and has the ability to track and charge for usage. The full outline of the knowledge model has been incorporated as well as examples of various types of content.

  5. Two-factor authentication

    CERN Document Server

    Stanislav, Mark

    2015-01-01

    During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market.

  6. Converse PUF-based authentication

    NARCIS (Netherlands)

    Kocabas, U.; Peter, A.; Katzenbeisser, S.; Sadeghi, A.

    2012-01-01

    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich

  7. Reading Authentic Texts

    DEFF Research Database (Denmark)

    Balling, Laura Winther

    2013-01-01

    Most research on cognates has focused on words presented in isolation that are easily defined as cognate between L1 and L2. In contrast, this study investigates what counts as cognate in authentic texts and how such cognates are read. Participants with L1 Danish read news articles in their highly...

  8. Low-bandwidth authentication.

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  9. Characterize and Model Final Waste Formulations and Offgas Solids from Thermal Treatment Processes - FY-98 Final Report for LDRD 2349

    Energy Technology Data Exchange (ETDEWEB)

    Kessinger, Glen Frank; Nelson, Lee Orville; Grandy, Jon Drue; Zuck, Larry Douglas; Kong, Peter Chuen Sun; Anderson, Gail

    1999-08-01

    The purpose of LDRD #2349, Characterize and Model Final Waste Formulations and Offgas Solids from Thermal Treatment Processes, was to develop a set of tools that would allow the user to, based on the chemical composition of a waste stream to be immobilized, predict the durability (leach behavior) of the final waste form and the phase assemblages present in the final waste form. The objectives of the project were: • investigation, testing and selection of thermochemical code • development of auxiliary thermochemical database • synthesis of materials for leach testing • collection of leach data • using leach data for leach model development • thermochemical modeling The progress toward completion of these objectives and a discussion of work that needs to be completed to arrive at a logical finishing point for this project will be presented.

  10. Advancements in sensing and perception using structured lighting techniques :an LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Novick, David Keith; Padilla, Denise D.; Davidson, Patrick A. Jr. (.; .); Carlson, Jeffrey J.

    2005-09-01

    This report summarizes the analytical and experimental efforts for the Laboratory Directed Research and Development (LDRD) project entitled ''Advancements in Sensing and Perception using Structured Lighting Techniques''. There is an ever-increasing need for robust, autonomous ground vehicles for counterterrorism and defense missions. Although there has been nearly 30 years of government-sponsored research, it is undisputed that significant advancements in sensing and perception are necessary. We developed an innovative, advanced sensing technology for national security missions serving the Department of Energy, the Department of Defense, and other government agencies. The principal goal of this project was to develop an eye-safe, robust, low-cost, lightweight, 3D structured lighting sensor for use in broad daylight outdoor applications. The market for this technology is wide open due to the unavailability of such a sensor. Currently available laser scanners are slow, bulky and heavy, expensive, fragile, short-range, sensitive to vibration (highly problematic for moving platforms), and unreliable for outdoor use in bright sunlight conditions. Eye-safety issues are a primary concern for currently available laser-based sensors. Passive, stereo-imaging sensors are available for 3D sensing but suffer from several limitations : computationally intensive, require a lighted environment (natural or man-made light source), and don't work for many scenes or regions lacking texture or with ambiguous texture. Our approach leveraged from the advanced capabilities of modern CCD camera technology and Center 6600's expertise in 3D world modeling, mapping, and analysis, using structured lighting. We have a diverse customer base for indoor mapping applications and this research extends our current technology's lifecycle and opens a new market base for outdoor 3D mapping. Applications include precision mapping, autonomous navigation, dexterous

  11. Automated Algorithms for Quantum-Level Accuracy in Atomistic Simulations: LDRD Final Report.

    Energy Technology Data Exchange (ETDEWEB)

    Thompson, Aidan Patrick; Schultz, Peter Andrew; Crozier, Paul; Moore, Stan Gerald; Swiler, Laura Painton; Stephens, John Adam; Trott, Christian Robert; Foiles, Stephen Martin; Tucker, Garritt J. (Drexel University)

    2014-09-01

    This report summarizes the result of LDRD project 12-0395, titled "Automated Algorithms for Quantum-level Accuracy in Atomistic Simulations." During the course of this LDRD, we have developed an interatomic potential for solids and liquids called Spectral Neighbor Analysis Poten- tial (SNAP). The SNAP potential has a very general form and uses machine-learning techniques to reproduce the energies, forces, and stress tensors of a large set of small configurations of atoms, which are obtained using high-accuracy quantum electronic structure (QM) calculations. The local environment of each atom is characterized by a set of bispectrum components of the local neighbor density projected on to a basis of hyperspherical harmonics in four dimensions. The SNAP coef- ficients are determined using weighted least-squares linear regression against the full QM training set. This allows the SNAP potential to be fit in a robust, automated manner to large QM data sets using many bispectrum components. The calculation of the bispectrum components and the SNAP potential are implemented in the LAMMPS parallel molecular dynamics code. Global optimization methods in the DAKOTA software package are used to seek out good choices of hyperparameters that define the overall structure of the SNAP potential. FitSnap.py, a Python-based software pack- age interfacing to both LAMMPS and DAKOTA is used to formulate the linear regression problem, solve it, and analyze the accuracy of the resultant SNAP potential. We describe a SNAP potential for tantalum that accurately reproduces a variety of solid and liquid properties. Most significantly, in contrast to existing tantalum potentials, SNAP correctly predicts the Peierls barrier for screw dislocation motion. We also present results from SNAP potentials generated for indium phosphide (InP) and silica (SiO 2 ). We describe efficient algorithms for calculating SNAP forces and energies in molecular dynamics simulations using massively parallel computers

  12. Secure Mobile Authentication for Linux Workstation log on

    OpenAIRE

    Habib, Usman

    2010-01-01

    Password based logon schemes have many security weaknesses. For secure environments smart card and biometric based authentication solutions are available as replacement for standard password based systems. Nevertheless, the cost of deployment and maintenance of these systems is quite high. On the other hand, mobile network operators have a huge base of deployed smart cards that can be reused to provide authentication in other spheres significantly reducing costs. In this project we present a ...

  13. Probabilistic authenticated quantum dialogue

    Science.gov (United States)

    Hwang, Tzonelih; Luo, Yi-Ping

    2015-12-01

    This work proposes a probabilistic authenticated quantum dialogue (PAQD) based on Bell states with the following notable features. (1) In our proposed scheme, the dialogue is encoded in a probabilistic way, i.e., the same messages can be encoded into different quantum states, whereas in the state-of-the-art authenticated quantum dialogue (AQD), the dialogue is encoded in a deterministic way; (2) the pre-shared secret key between two communicants can be reused without any security loophole; (3) each dialogue in the proposed PAQD can be exchanged within only one-step quantum communication and one-step classical communication. However, in the state-of-the-art AQD protocols, both communicants have to run a QKD protocol for each dialogue and each dialogue requires multiple quantum as well as classical communicational steps; (4) nevertheless, the proposed scheme can resist the man-in-the-middle attack, the modification attack, and even other well-known attacks.

  14. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  15. Towards authentic conversations. Authenticity in the patient-professional relationship.

    Science.gov (United States)

    Arnason, V

    1994-01-01

    The purpose of this paper is to evaluate the significance of the existential notion of authenticity for medical ethics. This is done by analyzing authenticity and examining its implications for the patient-professional relationship and for ethical decision-making in medical situations. It is argued that while authenticity implies important demand for individual responsibility, which has therapeutic significance, it perpetuates ideas which are antithetical both to authentic interaction between patients and professionals and to fruitful deliberation of moral dilemmas. In order to counteract these consequences, an alternative idea of authenticity is introduced. According to this idea, authenticity is not regarded primarily as individual sovereignty, but as an ability to participate in a dialogue in which the subjectivity of both partners is respected. Such practice, based on mutual trust and responsibility, would enhance common decision-making and overcome the alienation between patients and professionals.

  16. Authentication of vegetable oils.

    OpenAIRE

    Cunha, S.C.; Amaral, J S; Oliveira, M.B.P.P.

    2011-01-01

    Authenticity of vegetable oils continues to be a challenge and the target of many studies. Consumers expectancy on healthier products that conform to the labelled information, and the vast amount of legislation a bout the correct characterisation and classification of vegetable oils have boosted a number of scientific works on this subject. Analytical t echniques to face this challenge are, at least, as manifold as ar e the ways of adulteration, ranging fro...

  17. LDRD final report backside localization of open and shorted IC interconnections LDRD Project (FY98 and FY 99)

    Energy Technology Data Exchange (ETDEWEB)

    Cole, E.I. Jr.; Tangyunyong, P.; Benson, D.A.; Barton, D.L.

    2000-01-01

    Two new failure analysis techniques have been developed for backside and front side localization of open and shorted interconnections on ICs. These scanning optical microscopy techniques take advantage of the interactions between IC defects and localized heating using a focused infrared laser ({lambda} = 1,340 nm). Images are produced by monitoring the voltage changes across a constant current supply used to power the IC as the laser beam is scanned across the sample. The methods utilize the Seebeck Effect to localize open interconnections and Thermally-Induced Voltage Alteration (TIVA) to detect shorts. Initial investigations demonstrated the feasibility of TIVA and Seebeck Effect Imaging (SEI). Subsequent improvements have greatly increased the sensitivity of the TIVA/SEI system, reducing the acquisition times by more than 20X and localizing previously unobserved defects. The interaction physics describing the signal generation process and several examples demonstrating the localization of opens and shorts are described. Operational guidelines and limitations are also discussed. The system improvements, non-linear response of IC defects to heating, modeling of laser heating and examples using the improved system for failure analysis are presented.

  18. Soot formation, transport, and radiation in unsteady diffusion flames : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Suo-Anttila, Jill Marie (Sandia National Laboratories, Albuquerque, NM); Williams, Timothy C.; Shaddix, Christopher R.; Jensen, Kirk A. (Sandia National Laboratories, Albuquerque, NM); Blevins, Linda Gail; Kearney, Sean Patrick (Sandia National Laboratories, Albuquerque, NM); Schefer, Robert W.

    2004-10-01

    Fires pose the dominant risk to the safety and security of nuclear weapons, nuclear transport containers, and DOE and DoD facilities. The thermal hazard from these fires primarily results from radiant emission from high-temperature flame soot. Therefore, it is necessary to understand the local transport and chemical phenomena that determine the distributions of soot concentration, optical properties, and temperature in order to develop and validate constitutive models for large-scale, high-fidelity fire simulations. This report summarizes the findings of a Laboratory Directed Research and Development (LDRD) project devoted to obtaining the critical experimental information needed to develop such constitutive models. A combination of laser diagnostics and extractive measurement techniques have been employed in both steady and pulsed laminar diffusion flames of methane, ethylene, and JP-8 surrogate burning in air. For methane and ethylene, both slot and coannular flame geometries were investigated, as well as normal and inverse diffusion flame geometries. For the JP-8 surrogate, coannular normal diffusion flames were investigated. Soot concentrations, polycyclic aromatic hydrocarbon (PAH) laser-induced fluorescence (LIF) signals, hydroxyl radical (OH) LIF, acetylene and water vapor concentrations, soot zone temperatures, and the velocity field were all successfully measured in both steady and unsteady versions of these various flames. In addition, measurements were made of the soot microstructure, soot dimensionless extinction coefficient (&), and the local radiant heat flux. Taken together, these measurements comprise a unique, extensive database for future development and validation of models of soot formation, transport, and radiation.

  19. Quantitative adaptation analytics for assessing dynamic systems of systems: LDRD Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Gauthier, John H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). System Readiness & Sustainment Technologies (6133, M/S 1188); Miner, Nadine E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Military & Energy Systems Analysis (6114, M/S 1188); Wilson, Michael L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Resilience and Regulatory Effects (6921, M/S 1138); Le, Hai D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). System Readiness & Sustainment Technologies (6133, M/S 1188); Kao, Gio K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Networked System Survivability & Assurance (5629, M/S 0671); Melander, Darryl J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Software Systems R& D (9525, M/S 1188); Longsine, Dennis Earl [Sandia National Laboratories, Unknown, Unknown; Vander Meer, Jr., Robert C. [SAIC, Inc., Albuquerque, NM (United States)

    2015-01-01

    Our society is increasingly reliant on systems and interoperating collections of systems, known as systems of systems (SoS). These SoS are often subject to changing missions (e.g., nation- building, arms-control treaties), threats (e.g., asymmetric warfare, terrorism), natural environments (e.g., climate, weather, natural disasters) and budgets. How well can SoS adapt to these types of dynamic conditions? This report details the results of a three year Laboratory Directed Research and Development (LDRD) project aimed at developing metrics and methodologies for quantifying the adaptability of systems and SoS. Work products include: derivation of a set of adaptability metrics, a method for combining the metrics into a system of systems adaptability index (SoSAI) used to compare adaptability of SoS designs, development of a prototype dynamic SoS (proto-dSoS) simulation environment which provides the ability to investigate the validity of the adaptability metric set, and two test cases that evaluate the usefulness of a subset of the adaptability metrics and SoSAI for distinguishing good from poor adaptability in a SoS. Intellectual property results include three patents pending: A Method For Quantifying Relative System Adaptability, Method for Evaluating System Performance, and A Method for Determining Systems Re-Tasking.

  20. Identity Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-07-01

    Full Text Available Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy channels. Specifically, the authentication scenarios of single time and multiple times are investigated. For each scenario, the lower bound on the opponent’s success probability is derived, and it is smaller than the classical identity authentication’s. In addition, it can remain the same, even if the secret key is reused. Remarkably, the Cartesian authentication code proves to be helpful for hiding the secret key to maximize the secrecy performance. Finally, we show a potential application of this authentication technique.

  1. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    OpenAIRE

    Nebojsa Pavlovic

    2015-01-01

    This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The rese...

  2. Integrating identity-based cryptography in IMS service authentication

    CERN Document Server

    Abid, Mohamed; Moustafa, Hassnaa; Afifi, Hossam

    2010-01-01

    Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very important in the IMS global objectives, they observe little attention so far. Secure access to multimedia services is based on SIP and HTTP digest on top of IMS architecture. The standard deploys AKA-MD5 for the terminal authentication. The third Generation Partnership Project (3GPP) provided Generic Bootstrapping Architecture (GBA) to authenticate the subscriber before accessing multimedia services over HTTP. In this paper, we propose a new IMS Service Authentication scheme using Identity Based cryptography (IBC). This new scheme will lead to better performances when there are simultaneous authentication requests using Identity-based Batch Verification. We analyzed the security of our new protocol and we presented a performance evaluation of its cryptographi...

  3. Mobile authentication problems and solutions

    CERN Document Server

    Jakobsson, Markus

    2012-01-01

    Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes. The truth, of course, is somewhere in between, which is exactly what makes this topic so enticing. We cannot make progress with human-to-machine authentication with

  4. Films and Blogs: an authentic approach to improve the writing skill – An intercultural project-based framework in the Senior High State School

    Directory of Open Access Journals (Sweden)

    Christine Calogerakou

    2011-02-01

    Full Text Available This paper presents the implementation and the positive findings of a research involving a telecollaborative, e-twining project which linked two Senior State High school classes, one from Greece and one from Italy. The research aimed at investigating whether films and blogs in the English class can foster the development of writing skills, promote intercultural awareness and enhance the cultivation of new literacies. The research showed that the project succeeded in motivating the students who, through their on-line communication achieved cultural literacy and other new literacies to a large degree.

  5. Final LDRD report : development of sample preparation methods for ChIPMA-based imaging mass spectrometry of tissue samples.

    Energy Technology Data Exchange (ETDEWEB)

    Maharrey, Sean P.; Highley, Aaron M.; Behrens, Richard, Jr.; Wiese-Smith, Deneille

    2007-12-01

    The objective of this short-term LDRD project was to acquire the tools needed to use our chemical imaging precision mass analyzer (ChIPMA) instrument to analyze tissue samples. This effort was an outgrowth of discussions with oncologists on the need to find the cellular origin of signals in mass spectra of serum samples, which provide biomarkers for ovarian cancer. The ultimate goal would be to collect chemical images of biopsy samples allowing the chemical images of diseased and nondiseased sections of a sample to be compared. The equipment needed to prepare tissue samples have been acquired and built. This equipment includes an cyro-ultramicrotome for preparing thin sections of samples and a coating unit. The coating unit uses an electrospray system to deposit small droplets of a UV-photo absorbing compound on the surface of the tissue samples. Both units are operational. The tissue sample must be coated with the organic compound to enable matrix assisted laser desorption/ionization (MALDI) and matrix enhanced secondary ion mass spectrometry (ME-SIMS) measurements with the ChIPMA instrument Initial plans to test the sample preparation using human tissue samples required development of administrative procedures beyond the scope of this LDRD. Hence, it was decided to make two types of measurements: (1) Testing the spatial resolution of ME-SIMS by preparing a substrate coated with a mixture of an organic matrix and a bio standard and etching a defined pattern in the coating using a liquid metal ion beam, and (2) preparing and imaging C. elegans worms. Difficulties arose in sectioning the C. elegans for analysis and funds and time to overcome these difficulties were not available in this project. The facilities are now available for preparing biological samples for analysis with the ChIPMA instrument. Some further investment of time and resources in sample preparation should make this a useful tool for chemical imaging applications.

  6. Low-Altitude Airbursts and the Impact Threat - Final LDRD Report.

    Energy Technology Data Exchange (ETDEWEB)

    Boslough, Mark B.; Crawford, David A.

    2007-12-01

    The purpose of this nine-week project was to advance the understanding of low-altitude airbursts by developing the means to model them at extremely high resolution in order to span the scales of entry physics as well as blast wave and plume formation. Small asteroid impacts on Earth are a recognized hazard, but the full nature of the threat is still not well understood. We used shock physics codes to discover emergent phenomena associated with low-altitude airbursts such as the Siberian Tunguska event of 1908 and the Egyptian glass-forming event 29 million years ago. The planetary defense community is beginning to recognize the significant threat from such airbursts. Low-altitude airbursts are the only class of impacts that have a significant probability of occurring within a planning time horizon. There is roughly a 10% chance of a megaton-scale low-altitude airburst event in the next decade.The first part of this LDRD final project report is a preprint of our proceedings paper associated with the plenary presentation at the Hypervelocity Impact Society 2007 Symposium in Williamsburg, Virginia (International Journal of Impact Engineering, in press). The paper summarizes discoveries associated with a series of 2D axially-symmetric CTH simulations. The second part of the report contains slides from an invited presentation at the American Geophysical Union Fall 2007 meeting in San Francisco. The presentation summarizes the results of a series of 3D oblique impact simulations of the 1908 Tunguska explosion. Because of the brevity of this late-start project, the 3D results have not yet been written up for a peer-reviewed publication. We anticipate the opportunity to eventually run simulations that include the actual topography at Tunguska, at which time these results will be published.3

  7. Authentic Oral Language Production and Interaction in CALL: An Evolving Conceptual Framework for the Use of Learning Analytics within the SpeakApps Project

    Science.gov (United States)

    Nic Giolla Mhichíl, Mairéad; van Engen, Jeroen; Ó Ciardúbháin, Colm; Ó Cléircín, Gearóid; Appel, Christine

    2014-01-01

    This paper sets out to construct and present the evolving conceptual framework of the SpeakApps projects to consider the application of learning analytics to facilitate synchronous and asynchronous oral language skills within this CALL context. Drawing from both the CALL and wider theoretical and empirical literature of learner analytics, the…

  8. Anonymous authenticated communications

    Science.gov (United States)

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  9. Molecular authentication of geo-authentic Scrophularia ningpoensis

    Institute of Scientific and Technical Information of China (English)

    Chuan CHEN; Li-na DUAN; Xiao-long ZHOU; Bing-long CHEN; Cheng-xin FU

    2011-01-01

    Scrophularia ningpoensis has long been used in the Chinese Materia Medica for inflammation. Like other herbal medicines, S. ningpoensis collected from different localities may considerably differ in their therapeutic efficacy,and the one grown in Zhejiang Province is recognized as geo-authentic. However, it is difficult to confirm the geographical authenticity by similar morphological characteristics. In the present study, inter-simple sequence repeat (ISSR) markers were conducted to detect S. ningpoensis from different origins. A 1259-bp fragment amplified by primer UBC874 was found only in geo-authentic ones. By cloning and sequencing that specific band, sequence characterized amplified region (SCAR) markers were designed to distinguish geo-authentic S. ningpoensis from others.This is a rapid and easy method that can be used to identify the geographical authenticity of S. ningpoensis.

  10. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  11. Authenticity, Culture and Language Learning

    Science.gov (United States)

    MacDonald, Malcolm N.; Badger, Richard; Dasli, Maria

    2006-01-01

    In philosophy, authenticity has been used with two meanings: one entails the notion of correspondence; the other entails the notion of genesis (Cooper, 1983: 15). As in certain branches of philosophy, language teaching has perhaps clung too long to the first of these notions of authenticity at the expense of the other. This paper reviews four key…

  12. Reading Authentic Polish, Volume II.

    Science.gov (United States)

    Walczynski, Waldemar

    The second volume on reading authentic Polish is the continuation of a supplementary textbook to be used either in the classroom or in independent study. The materials included in it are unaltered authentic texts from Polish newspapers, magazines, and other mass media that provide exposure to the context and format of everyday reading matter. The…

  13. Spatial and temporal resolution of fluid flows: LDRD final report

    Energy Technology Data Exchange (ETDEWEB)

    Tieszen, S.R.; O`Hern, T.J.; Schefer, R.W.; Perea, L.D.

    1998-02-01

    This report describes a Laboratory Directed Research and Development (LDRD) activity to develop a diagnostic technique for simultaneous temporal and spatial resolution of fluid flows. The goal is to obtain two orders of magnitude resolution in two spatial dimensions and time simultaneously. The approach used in this study is to scale up Particle Image Velocimetry (PIV) and Planar Laser Induced Fluorescence (PLIF) to acquire meter-size images at up to 200 frames/sec. Experiments were conducted in buoyant, fully turbulent, non-reacting and reacting plumes with a base diameter of one meter. The PIV results were successful in the ambient gas for all flows, and in the plume for non-reacting helium and reacting methane, but not reacting hydrogen. No PIV was obtained in the hot combustion product region as the seed particles chosen vaporized. Weak signals prevented PLIF in the helium. However, in reacting methane flows, PLIF images speculated to be from Poly-Aromatic-Hydrocarbons were obtained which mark the flame sheets. The results were unexpected and very insightful. A natural fluorescence from the seed particle vapor was also noted in the hydrogen tests.

  14. Message Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-01-01

    Full Text Available The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent’s success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication.

  15. Chemiresistor microsensors for in-situ monitoring of volatile organic compounds : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Michael Loren; Hughes, Robert Clark; Kooser, Ara S.; McGrath, Lucas K.; Ho, Clifford Kuofei; Wright, Jerome L.; Davis, Chad Edward

    2003-09-01

    This report provides a summary of the three-year LDRD (Laboratory Directed Research and Development) project aimed at developing microchemical sensors for continuous, in-situ monitoring of volatile organic compounds. A chemiresistor sensor array was integrated with a unique, waterproof housing that allows the sensors to be operated in a variety of media including air, soil, and water. Numerous tests were performed to evaluate and improve the sensitivity, stability, and discriminatory capabilities of the chemiresistors. Field tests were conducted in California, Nevada, and New Mexico to further test and develop the sensors in actual environments within integrated monitoring systems. The field tests addressed issues regarding data acquisition, telemetry, power requirements, data processing, and other engineering requirements. Significant advances were made in the areas of polymer optimization, packaging, data analysis, discrimination, design, and information dissemination (e.g., real-time web posting of data; see www.sandia.gov/sensor). This project has stimulated significant interest among commercial and academic institutions. A CRADA (Cooperative Research and Development Agreement) was initiated in FY03 to investigate manufacturing methods, and a Work for Others contract was established between Sandia and Edwards Air Force Base for FY02-FY04. Funding was also obtained from DOE as part of their Advanced Monitoring Systems Initiative program from FY01 to FY03, and a DOE EMSP contract was awarded jointly to Sandia and INEEL for FY04-FY06. Contracts were also established for collaborative research with Brigham Young University to further evaluate, understand, and improve the performance of the chemiresistor sensors.

  16. From Idea to Innovation: The Role of LDRD Investments in Sandia's Recent Successful B61 Experiments.

    Energy Technology Data Exchange (ETDEWEB)

    Arrowsmith, Marie Danielle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    The Laboratory Directed Research and Development (LDRD) program, authorized by U.S. Congress in 1991, enables Department of Energy (DOE) laboratories to devote a small portion of their research funding to high-risk and potentially high-payoff research. Because it is high-risk, LDRD-supported research may not lead to immediate mission impacts; however, many successes at DOE labs can be traced back to investments in LDRD. LDRD investments have a history of enabling significant payoffs for long-running DOE and NNSA missions and for providing anticipatory new technologies that ultimately become critical to future missions. Many of Sandia National Laboratories’ successes can be traced back to investments in LDRD. Capabilities from three LDRDs were critical to recent tests of the B61-12 gravity bomb—tests that would previously have only been performed experimentally.

  17. Authentic Learning Environments in Higher Education

    Directory of Open Access Journals (Sweden)

    Reviewed by Dr. Adnan BOYACI

    2006-01-01

    Full Text Available Over the last decade the use of the authentic cases, problems and projects as a starting point for learning has won ground in higher education. Usually, these cases refer complex, ill–defined or open ended problems and often require multidisciplinary approaches. Students start with analysis of the cases, which involvesgathering information, constructing and testing possible solutions. In short they supposedly develop competencies needed to deal withproblems and issues that arise in a professional academic practice. This approach to learning may contrast with the common practice whichhas students working individually, grasping the knowledge from their teachers and text books using artificial problems (Berge and others,2005.In other words authentic learning experiences are those situated in certain appropriate social context and inevitably relevant from learner’s perspective. In planning for authentic learning to realize, a tension can appear between providing real world ‘natural’experiences and the nature of experiences that are possible offer within institution which can be often artificial and seen as inauthentic by the student. Bridging the gap between the learning taking place within the institution and learning within the real lifecommunities of practice can be difficult for university teacher (Stein and others, 2004. In that sense the purpose of this is to construct that bridge book by providing examples of good practice.

  18. Authentic, Original, and Valuable

    DEFF Research Database (Denmark)

    Tupasela, Aaro Mikael; Tamminen, Sakari

    2015-01-01

    The idea of genetic authenticity and origin has been an important issue within genetics for decades for scientific, political, and economic reasons. The question of where species and populations come from, as well as the linking of genetic traits to particular geographical locations, has resurfaced...... as both a scientific and political site of interest more recently through the study of population genetics in both humans and non-humans. This article explores the ways in which genetics and notions of ‘authentic’, ‘indigenous’, and ‘endemic’ have become intertwined with everyday practices in research....... Using the case of human and non-human genetics to compare and contrast the various facets associated with genetic identity, we seek to develop a broader picture of the ways in which genetics plays an important role in stabilizing categories of origin....

  19. [Problems of food authenticity].

    Science.gov (United States)

    Czerwiecki, Ludwik

    2004-01-01

    In this review the several data concerning food authenticity were presented. Typical examples of food adulteration were described. The most known are adulteration of vegetable and fruit products, adulteration of wine, honeys, olive oil etc. The modern analytical techniques for detection of food adulteration were discussed. Among physicochemical methods isotopic techniques (SCIRA, IRMS, SNIF-NMR) were cited. The main spectral methods are: IACPAES, PyMs, FTIR, NIR. The chromatographic techniques (GC, HPLC, HPAEC, HPTLC) with several kinds of detectors were described and the ELISA and PCR techniques are mentioned, too. The role of chemometrics as a way of several analytical data processing was highlighted. It was pointed out at the necessity of more rigorous control of food to support of all activity in area of fight with fraud in food industry.

  20. Short-term data collection projects: A means to increase teacher content knowledge and bring authentic research experiences into the classroom

    Science.gov (United States)

    Gaboardi, M.; Parker, W.; Rodriguez, D.

    2010-12-01

    Short-term field research projects were embedded into a two-week, Mathematics and Science Partnership-funded, teacher institute devoted to increasing content knowledge about the physical basis of climate change. Teams of four teachers were encouraged to ask any research question related to weather or climate, and create a data collection method that they thought might help answer their question. They were provided with a range of measurement devices, from simple immersible thermometers to light sensors, probeware, and carbon dioxide concentration sensors. Teams were expected to design data collection sites in a middle-school setting, present site designs to their peers, collect data, present initial results, and participate in peer-review about site design and data collected. Teachers were encouraged to generate research questions that could be replicated with their students at their schools. Design complexity ranged widely with some teachers deliberately choosing to model sites their students might design and others making full use of more sophisticated technology. On the third day of the institute, each group presented their research question and setup for data collection in poster format. Large gaps in understanding about testable questions and effective data collection methods were apparent. Instead of addressing errors as groups presented, facilitators encouraged participants to explore each groups’ presentation and make comments using post-it notes. Participants were then encouraged to respond to the comments and consider modifying their questions, site designs, or data collection methods. Teams gathered data up to three times daily and were fully responsible for choosing means of data organization; by the second week most were using and becoming familiar with Microsoft Excel. Final presentations were in Microsoft PowerPoint. Teams were expected to graphically report data, present possible interpretations, and discuss any problems related to their initial

  1. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2015-06-01

    Full Text Available This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The research included the use of an ALQ questionnaire for the estimation of leadership behavior. The components of authentic leadership are defined using factor analysis and other statistics techniques. The findings developed in this research indicated the fact that directors in educational institutions have a specific authentic leadership style. We suggest the concept of authentic leadership based on the four following factors: Communication-conformist, self-consciousness, self-discovery, and self-concept. Supporting these factors provides the directors with the possibility of obtaining a high level of authentic leadership.

  2. A new approach for UC security concurrent deniable authentication

    Institute of Scientific and Technical Information of China (English)

    FENG Tao; LI FengHua; MA JianFeng; SangJae MOON

    2008-01-01

    Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such au-thentication ever took place. When we consider an asynchronous multi-party net-work with open communications and an adversary that can adaptively corrupt as many parties as it wishes, we present a new approach to solve the problem of concurrent deniable authentication within the framework of universally compos-able (UC) security. We formulate a definition of an ideal functionality for deniable authentication. Our constructions rely on a modification of the verifiably smooth projective hashing (VSPH) with projection key function by trapdoor commitment. Our protocols are forward deniable and UC security against adaptive adversaries in the common reference string model. A new approach implies that security is pre-served under concurrent composition of an unbounded number of protocol execu-tions; it implies non-malleability with respect to arbitrary protocols and more. The novelty of our schemes is the use of witness indistinguishable protocols and the security is based on the decisional composite residuosity (DCR) assumption. This new approach is practically relevant as it leads to more efficient protocols and se-curity reductions.

  3. Is Authentic a thing of the Past?

    OpenAIRE

    Mac Con Iomaire, Máirtín

    2005-01-01

    This article is a review of the Oxford Symposium on Food and Cookery 2005 where the theme was Authenticity. It discusses the subject of Autheniticity in food and asks whether there is such a thing? What is Authenticity? Who can define what Authenticity means in the context of food? Is authenticity in food an indulgence of the rich which stiffles creativity and invention?

  4. Authenticity in CALL: Three Domains of "Realness"

    Science.gov (United States)

    Buendgens-Kosten, Judith

    2013-01-01

    This paper discusses the role of authenticity and authenticity claims in computer assisted language learning (CALL). It considers authenticity as the result of a social negotiation process rather than an innate feature of a text, object, person, or activity. From this basis, it argues that authenticity claims play an important role in both second…

  5. Integrated superhard and metallic coatings for MEMS : LDRD 57300 final report.

    Energy Technology Data Exchange (ETDEWEB)

    de Boer, Maarten Pieter; Maboudian, Roya (University of California at Berkeley, Berkeley, CA.)

    2004-12-01

    Two major research areas pertinent to microelectromechanical systems (MEMS) materials and material surfaces were explored and developed in this 5-year PECASE LDRD project carried out by Professor Roya Maboudian and her collaborators at the University of California at Berkeley. In the first research area, polycrystalline silicon carbide (poly-SiC) was developed as a structural material for MEMS. This material is potentially interesting for MEMS because compared to polycrystalline silicon (polysilicon), the structural material in Sandia National Laboratories' SUMMiTV process, it may exhibit high wear resistance, high temperature operation and a high Young's modulus to density ratio. Each of these characteristics may extend the usefulness of MEMS in Sandia National Laboratories' applications. For example, using polycrystalline silicon, wear is an important issue in microengines, temperature degradation is of concern in thermal actuators and the characteristics of resonators can be extended with the same lithography technology. Two methods of depositing poly-SiC from a 1,3-disilabutane source at 650 C to 800 C by low-pressure chemical vapor deposition (LPCVD) were demonstrated. These include a blanket method in which the material is made entirely out of poly-SiC and a method to coat previously released and fabricated polysilicon MEMS. This deposition method is much simpler to use than previous methods such as high temperature LPCVD and atmospheric CVD. Other major processing issues that were surmounted in this LDRD with the poly-SiC film include etching, doping, and residual strain control. SiC is inert and as such is notoriously difficult to etch. Here, an HBr-based chemistry was demonstrated for the first time to make highly selective etching of SiC at high etch rates. Nitrogen was incorporated from an NH3 gas source, resulting in high conductivity films. Residual strain and strain gradient were shown to depend on deposition parameters, and can be made

  6. Effects of Helping on State Authenticity Versus Recalled Authenticity

    OpenAIRE

    Allan, Clare M.

    2011-01-01

    This study focuses on the under-researched subject of “state authenticity”, the experience of expressing one’s true self. The 2 major hypotheses of the causes of state authenticity are tested: behavioural content versus consistency with personal traits. Investigations examine the proposal that behaviour expressing values, specifically “helping others” increases state authenticity, regardless of an individual’s own helpfulness-traits. Using a web-based survey, 238 participants were randomly as...

  7. Network discovery, characterization, and prediction : a grand challenge LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Kegelmeyer, W. Philip, Jr.

    2010-11-01

    This report is the final summation of Sandia's Grand Challenge LDRD project No.119351, 'Network Discovery, Characterization and Prediction' (the 'NGC') which ran from FY08 to FY10. The aim of the NGC, in a nutshell, was to research, develop, and evaluate relevant analysis capabilities that address adversarial networks. Unlike some Grand Challenge efforts, that ambition created cultural subgoals, as well as technical and programmatic ones, as the insistence on 'relevancy' required that the Sandia informatics research communities and the analyst user communities come to appreciate each others needs and capabilities in a very deep and concrete way. The NGC generated a number of technical, programmatic, and cultural advances, detailed in this report. There were new algorithmic insights and research that resulted in fifty-three refereed publications and presentations; this report concludes with an abstract-annotated bibliography pointing to them all. The NGC generated three substantial prototypes that not only achieved their intended goals of testing our algorithmic integration, but which also served as vehicles for customer education and program development. The NGC, as intended, has catalyzed future work in this domain; by the end it had already brought in, in new funding, as much funding as had been invested in it. Finally, the NGC knit together previously disparate research staff and user expertise in a fashion that not only addressed our immediate research goals, but which promises to have created an enduring cultural legacy of mutual understanding, in service of Sandia's national security responsibilities in cybersecurity and counter proliferation.

  8. Creating contextually authentic science in a low-performing urban elementary school

    Science.gov (United States)

    Buxton, Cory A.

    2006-09-01

    This article reports on a 2-year collaborate project to reform the teaching and learning of science in the context of Mae Jemison Elementary, the lowest performing elementary school in the state of Louisiana. I outline a taxonomy of authentic science inquiry experiences and then use the resulting framework to focus on how project participants interpreted and enacted ideas about collaboration and authenticity. The resulting contextually authentic science inquiry model links the strengths of a canonically authentic model of science inquiry (grounded in the Western scientific canon) with the strengths of a youth-centered model of authenticity (grounded in student-generated inquiry), thus bringing together relevant content standards and topics with critical social relevance. I address the question of how such enactments may or may not promote doing science together and consider the implications of this model for urban science education.

  9. Strengthening Software Authentication with the ROSE Software Suite

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2006-06-15

    Many recent nonproliferation and arms control software projects include a software authentication regime. These include U.S. Government-sponsored projects both in the United States and in the Russian Federation (RF). This trend toward requiring software authentication is only accelerating. Demonstrating assurance that software performs as expected without hidden ''backdoors'' is crucial to a project's success. In this context, ''authentication'' is defined as determining that a software package performs only its intended purpose and performs said purpose correctly and reliably over the planned duration of an agreement. In addition to visual inspections by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs, both to aid visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary and not extensible. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool has to be based on a complete language compiler. ROSE is precisely such a compiler infrastructure developed within the Department of Energy (DOE) and targeted at the optimization of scientific applications and user-defined libraries within large-scale applications (typically applications of a million lines of code). ROSE is a robust, source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C and C++ (handling the full C, C99, C++ languages and with current collaborations to support Fortran90). We propose to extend ROSE to address a number of security-specific requirements, and apply it to software authentication for nonproliferation and arms control projects.

  10. Research on Mixed Encryption Authentication

    Institute of Scientific and Technical Information of China (English)

    SUN Zhi-xin; WANG Ru-chuan; WANG Shao-di

    2003-01-01

    With the development of network techniques, the problem of network security is also arising as we enjoy its open convenience. There are many developed methods to overcome this problem. Identity authentication is one of these important measures. The authentication methods of traditional symmetric cryptogram systems and asymmetric cryptogram systems have both advantages and defects. This paper brings forward a Mixed Encryption Model for Authentication (MEMA), which has obvious advantages compared to the two traditional methods. MEMA model can be used widely in opening network environment such as mobile agent systems, multi-agents security safeguard systems and other situations in which identity authentication of users are needed. At last, the paper also presents the MEMA model's structure and implementation of an experimental system.

  11. Authenticity and commoditization at home

    DEFF Research Database (Denmark)

    Stender, Marie

    . The aim is to unfold how forces of commoditization and singularization intertwine as the house is transformed from an architectural expression into real estate for sale and eventually into somebody's home. What tensions are revealed in this process and how are interest and affect entangled? Authenticity......This paper investigates how interest and affect are entangled in the built environment of new Danish homes. The paper unfolds tensions and conflicts in the process from design through branding to occupancy of the house, and the relationship between authenticity and commoditization is explored....... In Denmark, the concept of authenticity is often associated with old houses. By way of design and branding, though, new neighbourhoods are made authentic, referring to their historical past, architectural uniqueness or sense of community. Based on a fieldwork in three new residential buildings in Copenhagen...

  12. Robustness of digital artist authentication

    DEFF Research Database (Denmark)

    Jacobsen, Robert; Nielsen, Morten

    In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...... is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection....

  13. Authentic Assessment: Testing in Reality

    Science.gov (United States)

    Svinicki, Marilla D.

    2004-01-01

    The new learning paradigm brings with it the need for a change in assessment practices as well. In this chapter, one of the assessment practices that is most consistent with this paradigm, authentic assessment, is discussed.

  14. Capillary electrophoresis in food authenticity.

    Science.gov (United States)

    Kvasnicka, Frantisek

    2005-06-01

    Food authenticity is a term which simply refers to whether the food purchased by the consumer matches its description. False description can occur in many forms, from the undeclared addition of water or other cheaper materials, or the wrong declaration of the amount of a particular ingredient in the product, to making false statements about the source of ingredients i.e., their geographic, plant, or animal origin. The aim of this review is to summarize applications of capillary electrophoresis in food authentication.

  15. 基于连续投影算法的油菜蜜近红外光谱真伪鉴别的研究%Authenticity of Brassica honey based on liner successive project algorithm and near infrared spectroscopy

    Institute of Scientific and Technical Information of China (English)

    李水芳; 单杨; 尹永; 周孜

    2012-01-01

    采用连续投影算法(successive project algorithm,SPA)对177个不同产地油菜蜜样本的近红外光谱做波长选择,然后以33个特征变量作线性识别分析(LDA)。同时,也采用了主成分分析(PCA)对变量进行压缩。比较了二次识别分析(QDA)和簇类独立软模式分类法(SIMCA)的鉴别结果。SPA-LDA模型预测集的鉴别准确率为97.7%,而PCA-LDA、全谱的SIMCA和SPA-QDA预测集的正确率分别为93.2%、95.4%和90.9%;上述四种方法ROC曲线下的面积分别为0.964、0.912、0.948和0.933。SPA-LDA性能比其他三种方法要好。该方法准确、可靠,为蜂蜜真实性的现场快速检测提供了一种新方法。%Near infrared spectroscopy combined with chemometrics methods were used to detect Brassica honey samples.For this purpose,successive project algorithm(SPA) was employed to choose thirty-three spectral variables,which were used as input of liner discriminative analysis(LDA) model.For comparison,principal components analysis(PCA) was used to compress the high-dimensional data.Quadratic discriminative analysis(QDA) and soft independent modeling of class analogy(SIMCA) were also employed to classify authentic and adulterated honey.The classification accuracy rates of SPA-LDA,PCA-LDA,SPA-QDA,and SIMCA were 97.7%,93.2%,90.9% and 95.4%,respectively.The area under receiver operation characteristic(ROC) curves of the above mentioned four methods could reach 0.964,0.912,0.933,and 0.948,respectively.The performance of SPA-LDA was better than other three methods.The results showed that SPA-LDA could be a useful means for detect adulterated honey owning to its rapid,accuracy,and generalization.

  16. Teaching Materials Should be Authentic

    Institute of Scientific and Technical Information of China (English)

    俞莹

    2008-01-01

    <正>In terms of the teaching materials,we hold the opinion that authentic materials should be adapted in the process of teaching,and students should have access to the original language. According to Richards(2001),authentic materials refer to the use in teaching of texts,photographs, video selections,and other teaching resources that were not specially prepared for pedagogical purposes.Created materials refer to textbooks and other specially developed instructional resources. The use of authentic materials in an EFL classroom is what many teachers involved in foreign language teaching have discussed in recent years.Most of the teachers throughout the world agree that authentic texts or materials are beneficial to the language learning process.Authentic materials enable learners to interact with the real language and content rather than the form.Learners feel that they are learning a target language as it is used outside the classroom.Exposing students to authentic materials can also help them better understand the target culture and envision how they might participate in this community.

  17. Unobtrusive behavioral and activity-related multimodal biometrics: The ACTIBIO Authentication concept.

    Science.gov (United States)

    Drosou, A; Ioannidis, D; Moustakas, K; Tzovaras, D

    2011-03-01

    Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.

  18. X.509 Authentication/Authorization in FermiCloud

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyunwoo [Fermilab; Timm, Steven [Fermilab

    2014-11-11

    We present a summary of how X.509 authentication and authorization are used with OpenNebula in FermiCloud. We also describe a history of why the X.509 authentication was needed in FermiCloud, and review X.509 authorization options, both internal and external to OpenNebula. We show how these options can be and have been used to successfully run scientific workflows on federated clouds, which include OpenNebula on FermiCloud and Amazon Web Services as well as other community clouds. We also outline federation options being used by other commercial and open-source clouds and cloud research projects.

  19. Communicating food safety, authenticity and consumer choice. Field experiences.

    Science.gov (United States)

    Syntesa, Heiner Lehr

    2013-04-01

    The paper reviews patented and non-patented technologies, methods and solutions in the area of food traceability. It pays special attention to the communication of food safety, authenticity and consumer choice. Twenty eight recent patents are reviewed in the areas of (secure) identification, product freshness indicators, meat traceability, (secure) transport of information along the supply chain, country/region/place of origin, automated authentication, supply chain management systems, consumer interaction systems. In addition, solutions and pilot projects are described in the areas of Halal traceability, traceability of bird's nests, cold chain management, general food traceability and other areas.

  20. For-LySa: UML for Authentication Analysis

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Montangero, Carlo; Perrone, Lara;

    2005-01-01

    The DEGAS project aims at enriching standard UML-centred development environments in such a way that the developers of global applications can exploit automated formal analyses with minimal overhead. In this paper, we present For-LySa, an instantiation of the DEGAS approach for authentication...... analysis, which exploits an existing analysis tool developed for the process calculus LySa. We discuss what information is needed for the analysis, and how to build the UML model of an authentication protocol in such a way that the needed information can be extracted from the model. We then present our...

  1. Sensor Based Process Control (SBPC) Laboratories Directed Research and Development (LDRD)

    Energy Technology Data Exchange (ETDEWEB)

    Wronosky, J.B.

    1993-03-01

    This report describes the activities and results of an LDRD entitled Sensor Based Process Control. This research examined the needs of the plating industry for monitor and control capabilities with particular emphasis on water effluent from rinse baths. A personal computer-based monitor and control development system was used as a test bed.

  2. High-efficiency high-energy Ka source for the critically-required maximum illumination of x-ray optics on Z using Z-petawatt-driven laser-breakout-afterburner accelerated ultrarelativistic electrons LDRD .

    Energy Technology Data Exchange (ETDEWEB)

    Sefkow, Adam B.; Bennett, Guy R.

    2010-09-01

    Under the auspices of the Science of Extreme Environments LDRD program, a <2 year theoretical- and computational-physics study was performed (LDRD Project 130805) by Guy R Bennett (formally in Center-01600) and Adam B. Sefkow (Center-01600): To investigate novel target designs by which a short-pulse, PW-class beam could create a brighter K{alpha} x-ray source than by simple, direct-laser-irradiation of a flat foil; Direct-Foil-Irradiation (DFI). The computational studies - which are still ongoing at this writing - were performed primarily on the RedStorm supercomputer at Sandia National Laboratories Albuquerque site. The motivation for a higher efficiency K{alpha} emitter was very clear: as the backlighter flux for any x-ray imaging technique on the Z accelerator increases, the signal-to-noise and signal-to-background ratios improve. This ultimately allows the imaging system to reach its full quantitative potential as a diagnostic. Depending on the particular application/experiment this would imply, for example, that the system would have reached its full design spatial resolution and thus the capability to see features that might otherwise be indiscernible with a traditional DFI-like x-ray source. This LDRD began FY09 and ended FY10.

  3. Noncontact surface thermometry for microsystems: LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Abel, Mark (Georgia Institute of Technology, Atlanta, GA); Beecham, Thomas (Georgia Institute of Technology, Atlanta, GA); Graham, Samuel (Georgia Institute of Technology, Atlanta, GA); Kearney, Sean Patrick; Serrano, Justin Raymond; Phinney, Leslie Mary

    2006-10-01

    We describe a Laboratory Directed Research and Development (LDRD) effort to develop and apply laser-based thermometry diagnostics for obtaining spatially resolved temperature maps on working microelectromechanical systems (MEMS). The goal of the effort was to cultivate diagnostic approaches that could adequately resolve the extremely fine MEMS device features, required no modifications to MEMS device design, and which did not perturb the delicate operation of these extremely small devices. Two optical diagnostics were used in this study: microscale Raman spectroscopy and microscale thermoreflectance. Both methods use a low-energy, nonperturbing probe laser beam, whose arbitrary wavelength can be selected for a diffraction-limited focus that meets the need for micron-scale spatial resolution. Raman is exploited most frequently, as this technique provides a simple and unambiguous measure of the absolute device temperature for most any MEMS semiconductor or insulator material under steady state operation. Temperatures are obtained from the spectral position and width of readily isolated peaks in the measured Raman spectra with a maximum uncertainty near {+-}10 K and a spatial resolution of about 1 micron. Application of the Raman technique is demonstrated for V-shaped and flexure-style polycrystalline silicon electrothermal actuators, and for a GaN high-electron-mobility transistor. The potential of the Raman technique for simultaneous measurement of temperature and in-plane stress in silicon MEMS is also demonstrated and future Raman-variant diagnostics for ultra spatio-temporal resolution probing are discussed. Microscale thermoreflectance has been developed as a complement for the primary Raman diagnostic. Thermoreflectance exploits the small-but-measurable temperature dependence of surface optical reflectivity for diagnostic purposes. The temperature-dependent reflectance behavior of bulk silicon, SUMMiT-V polycrystalline silicon films and metal surfaces is

  4. INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    Mohamed Abid

    2009-10-01

    Full Text Available Nowadays, the IP Multimedia Subsystem (IMS is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very important in the IMS global objectives, they observe little attention so far. Secure access to multimedia services is based on SIP and HTTP digest on top of IMS architecture. The standard deploys AKA-MD5 for the terminal authentication. The third Generation Partnership Project (3GPP provided Generic Bootstrapping Architecture (GBA toauthenticate the subscriber before accessing multimedia services over HTTP. In this paper, we propose a new IMS Service Authentication scheme using Identity Based cryptography (IBC. This new scheme willlead to better performances when there are simultaneous authentication requests using Identity-based Batch Verification. We analyzed the security of our new protocol and we presented a performance evaluation of its cryptographic operations.

  5. Efficient and secure source authentication scheme for multicast user authentication

    Institute of Scientific and Technical Information of China (English)

    JEONG; Yoon-su; LEE; Sang-hyuk; SHIN; Seung-soo

    2013-01-01

    Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video and online news. Because multicast current services provided to the group members are changed dynamically, data transferring by a group member is not used by the recipient. In order to verify the identity of the sender who sent the packet and to make sure that the data have not been tampered, an optimized source authentication scheme has been proposed to transfer the authentication information not to the next-door packet. The proposed method for multiple packets authenticates the source with a limited number of electronic signatures. The proposed method can reduce overhead compared to the method by adding a digital signature for every packet. In addition, by sending the generated electronic signature to the first packet and the last packet, it prevents the loss of consecutive packets, as well as a source authentication can be provided in real-time services.

  6. Laboratory Directed Research and Development (LDRD) on Mono-uranium Nitride Fuel Development for SSTAR and Space Applications

    Energy Technology Data Exchange (ETDEWEB)

    Choi, J; Ebbinghaus, B; Meiers, T; Ahn, J

    2006-02-09

    The US National Energy Policy of 2001 advocated the development of advanced fuel and fuel cycle technologies that are cleaner, more efficient, less waste-intensive, and more proliferation resistant. The need for advanced fuel development is emphasized in on-going DOE-supported programs, e.g., Global Nuclear Energy Initiative (GNEI), Advanced Fuel Cycle Initiative (AFCI), and GEN-IV Technology Development. The Directorates of Energy & Environment (E&E) and Chemistry & Material Sciences (C&MS) at Lawrence Livermore National Laboratory (LLNL) are interested in advanced fuel research and manufacturing using its multi-disciplinary capability and facilities to support a design concept of a small, secure, transportable, and autonomous reactor (SSTAR). The E&E and C&MS Directorates co-sponsored this Laboratory Directed Research & Development (LDRD) Project on Mono-Uranium Nitride Fuel Development for SSTAR and Space Applications. In fact, three out of the six GEN-IV reactor concepts consider using the nitride-based fuel, as shown in Table 1. SSTAR is a liquid-metal cooled, fast reactor. It uses nitride fuel in a sealed reactor vessel that could be shipped to the user and returned to the supplier having never been opened in its long operating lifetime. This sealed reactor concept envisions no fuel refueling nor on-site storage of spent fuel, and as a result, can greatly enhance proliferation resistance. However, the requirement for a sealed, long-life core imposes great challenges to research and development of the nitride fuel and its cladding. Cladding is an important interface between the fuel and coolant and a barrier to prevent fission gas release during normal and accidental conditions. In fabricating the nitride fuel rods and assemblies, the cladding material should be selected based on its the coolant-side corrosion properties, the chemical/physical interaction with the nitride fuel, as well as their thermal and neutronic properties. The US NASA space reactor, the

  7. Sequence Patterns of Identity Authentication Protocols

    Institute of Scientific and Technical Information of China (English)

    Tao Hongcai; He Dake

    2006-01-01

    From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

  8. FY07 LDRD Final Report Synthesis under High Pressure and Temperature of New Metal Nitrides

    Energy Technology Data Exchange (ETDEWEB)

    Crowhurst, J C; Sadigh, B; Aberg, D; Zaug, J M; Goncharov, A F

    2008-09-23

    The original aim of this LDRD was to determine with unprecedented precision the melting curve of iron to geophysically relevant pressures. In the course of developing much of the technology and techniques required to obtain this information we have encountered and studied novel chemical reactions some of whose products are stable or metastable under ambient conditions. Specifically we have synthesized nitrides of the platinum group metals including platinum, iridium, and palladium. We have also carried out in depth first principles theoretical investigations into the nature of these materials. We believed that the scientific impact of continuing this work would be greater than that of the original goals of this project. Indeed the work has led to a number of high profile publications with additional publications in preparation. While nitrides of the transition metals are generally of tremendous technological importance, those of the noble metals in particular have enjoyed much experimental and theoretical attention in the very short time since they were first synthesized. The field was and clearly remains open for further study. While the scientific motivation for this research is different from that originally proposed, many of the associated methods in which we have now gained experience are similar or identical. These include use of the diamond anvil cell combined with technologies to generate high temperatures, the in-situ technique of Raman scattering using our purpose-built, state-of-the-art system, analytical techniques for determining the composition of recovered samples such as x-ray photoelectron spectroscopy, and finally synchrotron-based techniques such as x-ray diffraction for structural and equation of state determinations. Close interactions between theorists and experimentalists has and will continue to allow our group to rapidly and reliably interpret complicated results on the structure and dynamics of these compounds and also additional novel

  9. PERSON AUTHENTICATION USING MULTIPLE SENSOR DATA FUSION

    Directory of Open Access Journals (Sweden)

    S. Vasuhi

    2011-04-01

    Full Text Available This paper proposes a real-time system for face authentication, obtained through fusion of Infra Red (IR and visible images. In order to identify the unknown person authentication in highly secured areas, multiple algorithms are needed. The four well known algorithms for face recognition, Block Independent Component Analysis(BICA, Kalman Filtering(KF method, Discrete Cosine Transform(DCT and Orthogonal Locality Preserving Projections (OLPP are used to extract the features. If the data base size is very large and the features are not distinct then ambiguity will exists in face recognition. Hence more than one sensor is needed for critical and/or highly secured areas. This paper deals with multiple fusion methodology using weighted average and Fuzzy Logic. The visible sensor output depends on the environmental condition namely lighting conditions, illumination etc., to overcome this problem use histogram technique to choose appropriate algorithm. DCT and Kalman filtering are holistic approaches, BICA follows feature based approach and OLPP preserves the Euclidean structure of face space. These recognizers are capable of considering the problem of dimensionality reduction by eliminating redundant features and reducing the feature space. The system can handle variations like illumination, pose, orientation, occlusion, etc. up to a significant level. The integrated system overcomes the drawbacks of individual recognizers. The proposed system is aimed at increasing the accuracy of the person authentication system and at the same time reducing the limitations of individual algorithms. It is tested on real time database and the results are found to be 96% accurate.

  10. Biometric Authentication using Nonparametric Methods

    CERN Document Server

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy k-means classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based ...

  11. Improving Usability of Passphrase Authentication

    DEFF Research Database (Denmark)

    Nielsen, Glen; Vedel, Michael; Jensen, Christian D.

    2014-01-01

    The combination of user-names and passwords has become the predominant method of user authentication in computer systems. Most users have multiple accounts on different systems, which impose different constraints on the length and complexity of passwords that the user is allowed to select....... This is done to ensure an appropriate degree of security, but instead, it makes it difficult for users to remember their password, which results in passwords that are either insecure, but easy to remember, or written down on paper. In this paper we address the problem of usability in user authentication......, which accepts the most common typing mistakes. The proposed algorithm has been implemented in secure hardware and integrated into a standard Unix system. We present the design, implementation and preliminary evaluation of the developed passphrase authentication prototype....

  12. Biometric Authentication using Nonparametric Methods

    CERN Document Server

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy kmeans classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based o...

  13. FINGERPRINT IDENTIFICATION SYSTEM combined with "CRYPTOGRAPHY" for Authentication.

    Directory of Open Access Journals (Sweden)

    G.Prasanna Lakshmi

    2010-07-01

    Full Text Available Biometrics technology, which uses physical or behavioral characteristics to identify users, has come to attract increased attention as a means of reliable personal authentication that helps the identity of an actual user. Among various modalities of Biometrics, Fingerprints are known to have the longest history of actual use in law enforcement applications with proven performance. This project surveys the state of the art in fingerprint identification technology. In this project, a design schema of a security authentication system combined with fingerprint identification and public key cryptography is explored, and its specific security mechanism is discussed in detail. In our schema, fingerprint is added into user's private key and served a security parameter, such that user’s secret key is separated into secret key parameters and fingerprint, by secret splitting mechanism, which makes the secret key to be bounded with user's information. This will increase the security of secret key ultimately. In such an uthentication system, the diplex authentication technologies --- fingerprint and smart card --- are adopted, and the user fingerprint needn’t to be transmitted during the authentication process, whichcan protect user's privacy effectively.

  14. Authentic counterfeit in viral marketing

    OpenAIRE

    2016-01-01

    This master thesis deals with authentic fake, a phenomenon present in viral marketing. After a brief introduction into the issue and clarification of terms, the study aims to find out whether a seemingly authentic video recording of a catchy incident helps a marketing campaign to succeed, that is to say to achieve high sharing figures amongst internet users. In a theoretical part, the thesis elaborates information from technical books, publications and internet sources dealing with authentici...

  15. Quantified Trust Levels for Authentication

    Science.gov (United States)

    Thomas, Ivonne; Menzel, Michael; Meinel, Christoph

    Service-oriented Architectures (SOAs) facilitate applications to integrate seamlessly services from collaborating business partners regardless of organizational borders. In order to secure access to these services, mechanisms for authentication and authorisation must be deployed that control the access based on identity-related information. To enable a business partners’ users to access the provided services, an identity federation is often established that enables the brokering of identity information across organisational borders. The establishment of such a federation requires complex agreements and contracts that define common policies, obligations and procedures. Generally, this includes obligations on the authentication process as well.

  16. The Authentic Personality: A Theoretical and Empirical Conceptualization and the Development of the Authenticity Scale

    Science.gov (United States)

    Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen

    2008-01-01

    This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…

  17. Network Authentication Protocol Studies

    Science.gov (United States)

    2009-04-01

    Jambalaya tools [7], the Bauhaus group and its Bauhaus Toolkit [13], and the Software Engineering Research Laboratory with the Chimera, InfiniTe, and...Language, Feb. 2006. [11] The Graphviz: Graph visualization software, Mar. 2006. [12] KAON2, 2006. [13] Project Bauhaus , 2006. [14] RTCA website, Mar

  18. 28 CFR 68.46 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Authenticity. 68.46 Section 68.46... ALIENS, UNFAIR IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.46 Authenticity. The authenticity of all documents submitted as proposed exhibits in advance of the hearing shall be deemed...

  19. Authenticity, Autonomy and Altruism: Keys for Transformation

    Science.gov (United States)

    Clarken, Rodney

    2011-01-01

    The value of authentic knowing, autonomous behavior and altruistic motivation is presented. Authenticity, autonomy and altruism are primary human capacities and keys for individual and collective transformation. Realizing the full development of these three basic potentialities can serve as goals and standards for well-being. Authenticity,…

  20. 29 CFR 18.50 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Authenticity. 18.50 Section 18.50 Labor Office of the Secretary of Labor RULES OF PRACTICE AND PROCEDURE FOR ADMINISTRATIVE HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES General § 18.50 Authenticity. The authenticity of all documents submitted as...

  1. Authentic Montessori: The Teacher Makes the Difference

    Science.gov (United States)

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  2. LDRD final report on massively-parallel linear programming : the parPCx system.

    Energy Technology Data Exchange (ETDEWEB)

    Parekh, Ojas (Emory University, Atlanta, GA); Phillips, Cynthia Ann; Boman, Erik Gunnar

    2005-02-01

    This report summarizes the research and development performed from October 2002 to September 2004 at Sandia National Laboratories under the Laboratory-Directed Research and Development (LDRD) project ''Massively-Parallel Linear Programming''. We developed a linear programming (LP) solver designed to use a large number of processors. LP is the optimization of a linear objective function subject to linear constraints. Companies and universities have expended huge efforts over decades to produce fast, stable serial LP solvers. Previous parallel codes run on shared-memory systems and have little or no distribution of the constraint matrix. We have seen no reports of general LP solver runs on large numbers of processors. Our parallel LP code is based on an efficient serial implementation of Mehrotra's interior-point predictor-corrector algorithm (PCx). The computational core of this algorithm is the assembly and solution of a sparse linear system. We have substantially rewritten the PCx code and based it on Trilinos, the parallel linear algebra library developed at Sandia. Our interior-point method can use either direct or iterative solvers for the linear system. To achieve a good parallel data distribution of the constraint matrix, we use a (pre-release) version of a hypergraph partitioner from the Zoltan partitioning library. We describe the design and implementation of our new LP solver called parPCx and give preliminary computational results. We summarize a number of issues related to efficient parallel solution of LPs with interior-point methods including data distribution, numerical stability, and solving the core linear system using both direct and iterative methods. We describe a number of applications of LP specific to US Department of Energy mission areas and we summarize our efforts to integrate parPCx (and parallel LP solvers in general) into Sandia's massively-parallel integer programming solver PICO (Parallel Interger and

  3. The embodiment of authentic leadership.

    Science.gov (United States)

    Waite, Roberta; McKinney, Nicole; Smith-Glasgow, Mary Ellen; Meloy, Faye A

    2014-01-01

    Development of student leadership capacity and efficacy is critical to the nursing profession, and vital to this process is a strong foundation in critical thinking that includes a depth of understanding of self (i.e., authentic leadership development). This article will (a) present a theoretical overview of authentic leadership as compared with other popular leadership theories, (b) provide an overview of development/implementation of an authentic leadership course, the first in a series of six one-credit courses as an integral component of the Macy Undergraduate Leadership Fellows Program for upper-level nursing students, and (c) discuss related implications for nursing education. Findings from an investigator-developed quantitative pre-post survey and qualitative evaluation questions are provided. Student feedback regarding the comprehensive nature of the course was extremely positive and affirmed the value of introspection associated with authentic leadership in ongoing personal and professional development. Critical pedagogy and action-oriented learning strategies also proved beneficial to student engagement.

  4. Authenticity or School-only?

    DEFF Research Database (Denmark)

    Fougt, Simon Skov

    Challenging the apparent distinction among educational researchers between ‘authenticity’ outside schools and ‘school-only’ inside schools, this paper investigates the concept of meaningfulness from different perspectives with a focus on formal learning in schools, as it states that teaching...... and learning inside school also can be authentic....

  5. Authentic Supervision Reconciles the Irreconcilables.

    Science.gov (United States)

    Pajak, Edward F.; Seyfarth, John T.

    1983-01-01

    Successful supervisors share a characteristic of "authenticity," rather than a particular pattern of behavior. From a background of Gestalt psychology, four steps are offered to help supervisors become aware of their own needs and feelings and recognize the "shoulds" that prevent real contact with others. (MLF)

  6. Embodying Authenticity in Higher Education

    Science.gov (United States)

    Douglass, Laura

    2016-01-01

    Orienting to the community of higher education involves a learning experience that is authentic and embodied for one new college administrator. Reflecting on her experience, she articulates how her relationship to her body helps to understand and respond to the tensions of engaging with a scholarly community.

  7. Authenticity and Lesbian Health Educators

    Science.gov (United States)

    Weiler-Timmins, Rebecca A.

    2011-01-01

    This qualitative study used narrative inquiry to explore how lesbian health educators navigate authenticity in a heteronormative higher education setting. The study was grounded in a lesbian standpoint pedagogical viewpoint, which provided a lens with which to view the nine participants' experiences. Of particular interest was how the educators in…

  8. Improving Usability of Passphrase Authentication

    DEFF Research Database (Denmark)

    Nielsen, Glen; Vedel, Michael; Jensen, Christian D.

    2014-01-01

    . This is done to ensure an appropriate degree of security, but instead, it makes it difficult for users to remember their password, which results in passwords that are either insecure, but easy to remember, or written down on paper. In this paper we address the problem of usability in user authentication...

  9. Authenticity in a Digital Environment.

    Science.gov (United States)

    Cullen, Charles T.; Hirtle, Peter B.; Levy, David; Lynch, Clifford A.; Rothenberg, Jeff

    On January 24, 2000, the Council on Library and Information Resources (CLIR) convened a group of experts from different domains of the information resources community to address the question, "What is an authentic digital object?" Five writers--an archivist, a digital library expert, a documentary editor and special collections…

  10. Literacy Cafe: Making Writing Authentic

    Science.gov (United States)

    Daniels, Erika

    2007-01-01

    The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…

  11. Exploration of cloud computing late start LDRD #149630 : Raincoat. v. 2.1.

    Energy Technology Data Exchange (ETDEWEB)

    Echeverria, Victor T.; Metral, Michael David; Leger, Michelle A.; Gabert, Kasimir Georg; Edgett, Patrick Garrett; Thai, Tan Q.

    2010-09-01

    This report contains documentation from an interoperability study conducted under the Late Start LDRD 149630, Exploration of Cloud Computing. A small late-start LDRD from last year resulted in a study (Raincoat) on using Virtual Private Networks (VPNs) to enhance security in a hybrid cloud environment. Raincoat initially explored the use of OpenVPN on IPv4 and demonstrates that it is possible to secure the communication channel between two small 'test' clouds (a few nodes each) at New Mexico Tech and Sandia. We extended the Raincoat study to add IPSec support via Vyatta routers, to interface with a public cloud (Amazon Elastic Compute Cloud (EC2)), and to be significantly more scalable than the previous iteration. The study contributed to our understanding of interoperability in a hybrid cloud.

  12. Development of highly integrated magetically and electrostatically actuated micropumps : LDRD 64709 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Sosnowchik, Brian D. (Pennsylvania State University, University Park, PA); Galambos, Paul C.; Hendrix, Jason R. (Florida State University, Tallahassee, FL); Zwolinski, Andrew (Florida State University, Tallahassee, FL)

    2003-12-01

    The pump and actuator systems designed and built in the SUMMiT{trademark} process, Sandia's surface micromachining polysilicon MEMS (Micro-Electro-Mechanical Systems) fabrication technology, on the previous campus executive program LDRD (SAND2002-0704P) with FSU/FAMU (Florida State University/Florida Agricultural and Mechanical University) were characterized in this LDRD. These results demonstrated that the device would pump liquid against the flow resistance of a microfabricated channel, but the devices were determined to be underpowered for reliable pumping. As a result a new set of SUMMiT{trademark} pumps with actuators that generate greater torque will be designed and submitted for fabrication. In this document we will report details of dry actuator/pump assembly testing, wet actuator/pump testing, channel resistance characterization, and new pump/actuator design recommendations.

  13. Final LDRD report : infrared detection and power generation using self-assembled quantum dots.

    Energy Technology Data Exchange (ETDEWEB)

    Cederberg, Jeffrey George; Ellis, Robert; Shaner, Eric Arthur

    2008-02-01

    Alternative solutions are desired for mid-wavelength and long-wavelength infrared radiation detection and imaging arrays. We have investigated quantum dot infrared photodetectors (QDIPs) as a possible solution for long-wavelength infrared (8 to 12 {mu}m) radiation sensing. This document provides a summary for work done under the LDRD 'Infrared Detection and Power Generation Using Self-Assembled Quantum Dots'. Under this LDRD, we have developed QDIP sensors and made efforts to improve these devices. While the sensors fabricated show good responsivity at 80 K, their detectivity is limited by high noise current. Following efforts concentrated on how to reduce or eliminate this problem, but with no clear path was identified to the desired performance improvements.

  14. Final LDRD report : science-based solutions to achieve high-performance deep-UV laser diodes.

    Energy Technology Data Exchange (ETDEWEB)

    Armstrong, Andrew M.; Miller, Mary A.; Crawford, Mary Hagerott; Alessi, Leonard J.; Smith, Michael L.; Henry, Tanya A.; Westlake, Karl R.; Cross, Karen Charlene; Allerman, Andrew Alan; Lee, Stephen Roger

    2011-12-01

    We present the results of a three year LDRD project that has focused on overcoming major materials roadblocks to achieving AlGaN-based deep-UV laser diodes. We describe our growth approach to achieving AlGaN templates with greater than ten times reduction of threading dislocations which resulted in greater than seven times enhancement of AlGaN quantum well photoluminescence and 15 times increase in electroluminescence from LED test structures. We describe the application of deep-level optical spectroscopy to AlGaN epilayers to quantify deep level energies and densities and further correlate defect properties with AlGaN luminescence efficiency. We further review our development of p-type short period superlattice structures as an approach to mitigate the high acceptor activation energies in AlGaN alloys. Finally, we describe our laser diode fabrication process, highlighting the development of highly vertical and smooth etched laser facets, as well as characterization of resulting laser heterostructures.

  15. Injection-locked composite lasers for mm-wave modulation : LDRD 117819 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Wendt, Joel Robert; Vawter, Gregory Allen; Raring, James; Tauke-Pedretti, Anna; Alford, Charles Fred (Sandia Staffing Alliance, LLC, Albuquerque, NM); Skogen, Erik J.; Chow, Weng Wah; Cajas, Florante G. (LMATA Government Services, LLC, Albuquerque, NM); Overberg, Mark E.; Torres, David L. (LMATA Government Services, LLC, Albuquerque, NM); Peake, Gregory Merwin

    2010-09-01

    This report summarizes a 3-year LDRD program at Sandia National Laboratories exploring mutual injection locking of composite-cavity lasers for enhanced modulation responses. The program focused on developing a fundamental understanding of the frequency enhancement previously demonstrated for optically injection locked lasers. This was then applied to the development of a theoretical description of strongly coupled laser microsystems. This understanding was validated experimentally with a novel 'photonic lab bench on a chip'.

  16. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  17. Authenticity as an aim of psychoanalysis.

    Science.gov (United States)

    Neri, Claudio

    2008-12-01

    This paper will present a series of predominantly clinical observations concerning the lengthy work a patient carries out, with the help of the analyst, in order to achieve greater personal authenticity. When this work is drawing to a close and the patient has gained a degree of authenticity, this authenticity remains within him, almost without his realizing it. The power of authenticity is instead revealed through the patient's most intimate and important relationships. In the long term, the patient's authenticity also alters his perception of himself and of his role in the world. He feels more alive and less overcome by a sense of futility, if earlier this had been the case.

  18. Authentication Method for Privacy Protection in Smart Grid Environment

    Directory of Open Access Journals (Sweden)

    Do-Eun Cho

    2014-01-01

    Full Text Available Recently, the interest in green energy is increasing as a means to resolve problems including the exhaustion of the energy source and, effective management of energy through the convergence of various fields. Therefore, the projects of smart grid which is called intelligent electrical grid for the accomplishment of low carbon green growth are being carried out in a rush. However, as the IT is centered upon the electrical grid, the shortage of IT also appears in smart grid and the complexity of convergence is aggravating the problem. Also, various personal information and payment information within the smart grid are gradually becoming big data and target for external invasion and attack; thus, there is increase in concerns for this matter. The purpose of this study is to analyze the security vulnerabilities and security requirement within smart grid and the authentication and access control method for privacy protection within home network. Therefore, we propose a secure access authentication and remote control method for user’s home device within home network environment, and we present their security analysis. The proposed access authentication method blocks the unauthorized external access and enables secure remote access to home network and its devices with a secure message authentication protocol.

  19. Information fusion for palmprint authentication

    Science.gov (United States)

    Wu, Xiangqian; Wang, Kuanquan; Zhang, David

    2006-04-01

    A palmprint can be represented using different features and the different representations reflect the different characteristic of a palmprint. Fusion of multiple palmprint features may enhance the performance of a palmprint authentication system. This paper investigates the fusion of two types of palmprint information: the phase (called PalmCode) and the orientation (called OrientationCode). The PalmCode is extracted using the 2-D Gabor filters based algorithm and the OrientationCode is computed using several directional templates. Then several fusion strategies are investigated and compared. The experimental results show that the fusion of the PalmCode and OrientationCode using the Product, Sum and Weighted Sum strategies can greatly improve the accuracy of palmprint authentication, which is up to 99.6%.

  20. Food authentication by molecular methods

    OpenAIRE

    Oliveira, B; Mafra, I; J. COSTA; Amaral, J.S.; FARIA, M.; Fernandes, T.J.R.; Soares, S.

    2011-01-01

    Quality and authenticity evaluation of foods encompasses many issues, such as the entire or partial fraudulent substitution of higher commercial value constituents by others with lower value and the presence of undeclared constituents/ingredients. To protect consumers from misleading labeling, regulations issued across the world have implemented specific guidelines and listed particular foods that sh ould be declared on the label. Particularly in the case of genetically modi...

  1. Lightweight query authentication on streams

    OpenAIRE

    2014-01-01

    We consider a stream outsourcing setting, where a data owner delegates the management of a set of disjoint data streams to an untrusted server. The owner authenticates his streams via signatures. The server processes continuous queries on the union of the streams for clients trusted by the owner. Along with the results, the server sends proofs of result correctness derived from the owner's signatures, which are easily verifiable by the clients. We design novel constructions for a collection o...

  2. LDRD final report on a unified linear reference system

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J. Jr.; Mackoy, R.D. [Sandia National Labs., Albuquerque, NM (United States). Decision Support Systems Software Engineering Dept.; Fletcher, D.R. [Univ. of New Mexico, Albuquerque, NM (United States). Alliance for Transportation Research

    1997-06-01

    The purpose of the project was to describe existing deficiencies in Geographic Information Systems for transportation (GIS-T) applications and prescribe solutions that would benefit the transportation community in general. After an in-depth literature search and much consultation with noted transportation experts, the need for a common linear reference system that integrated and supported the planning and operational needs of the transportation community became very apparent. The focus of the project was set on a unified linear reference system and how to go about its requirements definition, design, implementation, and promulgation to the transportation community.

  3. Authentic subjectivity and social transformation

    Directory of Open Access Journals (Sweden)

    Michael O'Sullivan

    2016-05-01

    Full Text Available Holiness in the Christian tradition has often been understood in a way that devalues embodiment and practical engagement with the world of one’s time. The latter understanding, for example, led to Marx’s critique and repudiation of Christianity. Both interpretations of holiness can be understood as mistaken efforts to express the dynamism for authenticity in contextualised human subjectivity. Vatican 2 opposed both views by addressing itself to all people of good will, declaring that everyone was called to holiness, and that authentic Christian identity involved solidarity with the world of one’s time, especially those who are poor. Vatican 2, therefore, provided an authoritative faith foundation for holiness expressed through social commitment and for viewing social commitment on the part of people of good will in whatever state of life as a form of holiness. This vision was also the conviction of leading spirituality writers of the period, like Thomas Merton, and inspired liberation theologians and the Latin American Catholic bishops at their conference in Medellín a few years after the Council. The argument of this article is that the emergence and development of a non-dualist Christian spirituality is grounded methodologically in the correct appropriation of the common innate dynamism for authenticity in concrete human persons and lived spiritual experiences consistent with and capable of enhancing this dynamism.

  4. Authenticity assessment of dairy products.

    Science.gov (United States)

    de la Fuente, Miguel Angel; Juárez, Manuela

    2005-01-01

    The authenticity of dairy products has become a focal point, attracting the attention of scientists, producers, consumers, and policymakers. Among many others, some of the practices not allowed in milk and milk products are the substitution of part of the fat or proteins, admixtures of milk of different species, additions of low-cost dairy products (mainly whey derivatives), or mislabeling of products protected by denomination of origin. A range of analytical methods to detect frauds have been developed, modified, and continually reassessed to be one step ahead of manufacturers who pursue these illegal activities. Traditional procedures to assess the authenticity of dairy products include chromatographic, electrophoretic, and immunoenzymatic methods. New approaches such as capillary electrophoresis, polymerase chain reaction, and isotope ratio mass spectrometry have also emerged alongside the latest developments in the former procedures. This work intends to provide an updated and extensive overview since 1991 on the principal applications of all these techniques together with their advantages and disadvantages for detecting the authenticity of dairy products. The scope and limits of different tools are also discussed.

  5. A New Authentication Method for Vertical and Horizontal Handover in 3G-WLAN Interworking Architecture

    Directory of Open Access Journals (Sweden)

    Younes El Hajjaji El Idrissi

    2014-01-01

    Full Text Available The interworking of the 3G and the WLAN technique provides a perfect connectivity solution in terms of data rate, service cost and area coverage. However the Vertical Handover (VH from the 3G to WLAN and the Horizontal Handover (HH between WLAN domains present an additional security challenge. The V/H handover must be fast and secure without impacting the security in both networks. Several authentication methods have been proposed to secure the VH and HH. The Extensible Authentication Protocol Key Agreement (EAP-AKA is the authentication protocol adopted by the 3rd Generation Partnership Project (3GPP to authenticate User Equipment by the 3G Home Networks. The EAP-AKA protocol suffers from several weaknesses, such as user identity display and high authentication delay. In this study we propose a new simplify authentication method and key agreement for vertical and horizontal handovers based on the existed method EAP-AKA. Performances analysis of the proposed method show superior results in comparison to the existing EAP-AKA method in terms of bandwidth consumption, signaling cost and authentication delay. The security property of the new method is verified by using the formal security analyzer Automated Validation of Internet Security Protocols and Applications (AVISPA which has a high talent in finding potential attacks automatically in security protocols.

  6. Advances in radiation modeling in ALEGRA :a final report for LDRD-67120, efficient implicit mulitgroup radiation calculations.

    Energy Technology Data Exchange (ETDEWEB)

    Mehlhorn, Thomas Alan; Kurecka, Christopher J. (University of Michigan, Ann Arbor, MI); McClarren, Ryan (University of Michigan, Ann Arbor, MI); Brunner, Thomas A.; Holloway, James Paul (University of Michigan, Ann Arbor, MI)

    2005-11-01

    The original LDRD proposal was to use a nonlinear diffusion solver to compute estimates for the material temperature that could then be used in a Implicit Monte Carlo (IMC) calculation. At the end of the first year of the project, it was determined that this was not going to be effective, partially due to the concept, and partially due to the fact that the radiation diffusion package was not as efficient as it could be. The second, and final year, of the project focused on improving the robustness and computational efficiency of the radiation diffusion package in ALEGRA. To this end, several new multigroup diffusion methods have been developed and implemented in ALEGRA. While these methods have been implemented, their effectiveness of reducing overall simulation run time has not been fully tested. Additionally a comprehensive suite of verification problems has been developed for the diffusion package to ensure that it has been implemented correctly. This process took considerable time, but exposed significant bugs in both the previous and new diffusion packages, the linear solve packages, and even the NEVADA Framework's parser. In order to manage this large suite of problem, a new tool called Tampa has been developed. It is a general tool for automating the process of running and analyzing many simulations. Ryan McClarren, at the University of Michigan has been developing a Spherical Harmonics capability for unstructured meshes. While still in the early phases of development, this promises to bridge the gap in accuracy between a full transport solution using IMC and the diffusion approximation.

  7. FY04 LDRD Final Report Stroke Sensor Development Using Microdot Sensor Arrays

    Energy Technology Data Exchange (ETDEWEB)

    Carter, J C; Wilson, T S; Alvis, R M; Paulson, C N; Setlur, U S; McBride, M T; Brown, S B; Bearinger, J P; Colston, B W

    2005-11-15

    major thrust area for the Medical Technology Program (M-division). Through MTP, LLNL has a sizable investment and recognizable expertise in stroke treatment research. The proposed microdot array sensor for stroke will complement this existing program in which mechanical devices are being designed for removing the thrombus. The following list of stroke projects and their relative status shows that MTP has a proven track record of taking ideas to industry: The goal of this LDRD funded project was to develop and demonstrate a minimally invasive optical fiber-based sensor for rapid and in-vivo measurements of multiple stroke biomarkers (e.g. pH and enzyme). The development of this sensor also required the development of a new fabrication technology for attaching indicator chemistries to optical fibers. A benefit of this work is to provide clinicians with a tool to assess vascular integrity of the region beyond the thrombus to determine whether or not it is safe to proceed with the removal of the clot. Such an assessment could extend the use of thrombolytic drug treatment to acute stroke victims outside the current rigid temporal limitation of 3 hours. Furthermore, this sensor would also provide a tool for use with emerging treatments involving the use of mechanical devices for removing the thrombus. The sensor effectively assesses the risk for reperfusion injury.

  8. An Examination of Career Indecision and Application to Dispositional Authenticity

    Science.gov (United States)

    White, Nathan J.; Tracey, Terence J. G.

    2011-01-01

    Authenticity has been viewed as a dimension related to life satisfaction, but we propose that authenticity is related to career outcomes. In this study, we examined the relation between authenticity and career indecision. Authenticity was assessed by the Authenticity Scale and it was found to be moderately related to different indices of career…

  9. Quantum Communication Complexity of Quantum Authentication Protocols

    CERN Document Server

    Guedes, Elloá B

    2011-01-01

    In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the channel is subject to eavesdropping. However, even in face of the various existing definitions of quantum authentication protocols in the literature, little is known about them in this perspective, and this lack of knowledge may unfavor comparisons and wise choices. In the attempt to overcome this limitation, in the present work we aim at showing an approach to evaluate quantum authentication protocols based on the determination of their quantum communication complexity. Based on our investigation, no similar methods to analyze quantum authentication protocols were found in the literature. Pursuing this further, our approa...

  10. Identity-based authentication protocol for grid

    Institute of Scientific and Technical Information of China (English)

    Li Hon; Sun Shixin; Yang Homiao

    2008-01-01

    Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authentication process is very complicated,and therefore,the grid user is in a heavily loaded point both in computation and in communication.Based on identity-based architecture for grid(IBAG)and corre-sponding encryption and signature schemes,an identity-based authentication protocol for grid is proposed.Being certificate-free,the authentication protocol aligns well with the demands of grid computing.Through simulation testing,it is seen that the authentication protocol is more lightweight and efficient than SAP,especially the more lightweight user side.This contributes to the larger grid scalability.

  11. Autonomy and authenticity of enhanced personality traits.

    Science.gov (United States)

    Bublitz, Jan Christoph; Merkel, Reinhard

    2009-07-01

    There is concern that the use of neuroenhancements to alter character traits undermines consumer's authenticity. But the meaning, scope and value of authenticity remain vague. However, the majority of contemporary autonomy accounts ground individual autonomy on a notion of authenticity. So if neuroenhancements diminish an agent's authenticity, they may undermine his autonomy. This paper clarifies the relation between autonomy, authenticity and possible threats by neuroenhancements. We present six neuroenhancement scenarios and analyse how autonomy accounts evaluate them. Some cases are considered differently by criminal courts; we demonstrate where academic autonomy theories and legal reasoning diverge and ascertain whether courts should reconsider their concept of autonomy. We argue that authenticity is not an appropriate condition for autonomy and that new enhancement technologies pose no unique threats to personal autonomy.

  12. Creating Contextually Authentic Science in a "Low-Performing" Urban Elementary School

    Science.gov (United States)

    Buxton, Cory A.

    2006-01-01

    This article reports on a 2 1/2-year collaborate project to reform the teaching and learning of science in the context of Mae Jemison Elementary, the lowest performing elementary school in the state of Louisiana. I outline a taxonomy of authentic science inquiry experiences and then use the resulting framework to focus on how project participants…

  13. Authentic Performance in the Instrumental Analysis Laboratory: Building a Visible Spectrophotometer Prototype

    Science.gov (United States)

    Wilson, Mark V.; Wilson, Erin

    2017-01-01

    In this work we describe an authentic performance project for Instrumental Analysis in which students designed, built, and tested spectrophotometers made from simple components. The project addressed basic course content such as instrument design principles, UV-vis spectroscopy, and spectroscopic instrument components as well as skills such as…

  14. Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity.

    NARCIS (Netherlands)

    Gulikers, Judith; Bastiaens, Theo; Kirschner, Paul A.; Kester, Liesbeth

    2008-01-01

    Gulikers, J. T. M., Bastiaens, Th. J., Kirschner, P. A., & Kester, L. (2008). Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity. Journal of Vocational Education and Training, 60(4)

  15. E-Labs - Learning with Authentic Data

    Energy Technology Data Exchange (ETDEWEB)

    Bardeen, Marjorie G. [Fermilab; Wayne, Mitchell [Notre Dame U.

    2016-01-01

    the success teachers have had providing an opportunity for students to: • Organize and conduct authentic research. • Experience the environment of scientific collaborations. • Possibly make real contributions to a burgeoning scientific field. We've created projects that are problem-based, student driven and technology dependent. Students reach beyond classroom walls to explore data with other students and experts and share results, publishing original work to a worldwide audience. Students can discover and extend the research of other students, modeling the processes of modern, large-scale research projects. From start to finish e-Labs are student-led, teacher-guided projects. Students need only a Web browser to access computing techniques employed by professional researchers. A Project Map with milestones allows students to set the research plan rather than follow a step-by-step process common in other online projects. Most importantly, e-Labs build the learning experience around the students' own questions and let them use the very tools that scientists use. Students contribute to and access shared data, most derived from professional research databases. They use common analysis tools, store their work and use metadata to discover, replicate and confirm the research of others. This is where real scientific collaboration begins. Using online tools, students correspond with other research groups, post comments and questions, prepare summary reports, and in general participate in the part of scientific research that is often left out of classroom experiments. Teaching tools such as student and teacher logbooks, pre- and post-tests and an assessment rubric aligned with learner outcomes help teachers guide student work. Constraints on interface designs and administrative tools such as registration databases give teachers the "one-stop-shopping" they seek for multiple e-Labs. Teaching and administrative tools also allow us to track usage and assess the

  16. Quantum Key Distribution Protocol with User Authentication

    CERN Document Server

    Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

    2005-01-01

    We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

  17. Authentication Methods in Cloud Computing: A Survey

    Directory of Open Access Journals (Sweden)

    Mahnoush Babaeizadeh

    2015-03-01

    Full Text Available This study presents a review on the various methods of authentication in cloud environment. Authentication plays an important role in security of Cloud Computing (CC. It protects Cloud Service Providers (CSP against various types of attacks, where the aim is to verify a user’s identity when a user wishes to request services from cloud servers. There are multiple authentication technologies that verify the identity of a user before granting access to resources.

  18. Quantum Secure Direct Communication Based on Authentication

    Institute of Scientific and Technical Information of China (English)

    WANG Min-Jie; PAN Wei

    2008-01-01

    We propose two schemes of quantum secure direct communication (QSDC) combined ideas of user authentication [Phys. Rev. A 73 (2006) 042305] and direct communication with dense coding [Phys. Rev. A. 68 (2003) 042317]. In these protocols, the privacy of authentication keys and the properties of the EPR pairs not only ensure the realization of identity authentication but also further improve the security of communication, and no secret messages are leaked even if the messages were broken.

  19. Behavior-aware decision support systems : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Hirsch, Gary B.; Homer, Jack (Homer Consulting); Chenoweth, Brooke N.; Backus, George A.; Strip, David R.

    2007-11-01

    As Sandia National Laboratories serves its mission to provide support for the security-related interests of the United States, it is faced with considering the behavioral responses that drive problems, mitigate interventions, or lead to unintended consequences. The effort described here expands earlier works in using healthcare simulation to develop behavior-aware decision support systems. This report focuses on using qualitative choice techniques and enhancing two analysis models developed in a sister project.

  20. ARE AUTHENTIC LEADERS SATISFIED WITH THEIR JOB?

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2016-06-01

    Full Text Available A crisis in management has led to the appearance of Authentic leadership. The aim of this work is to determine the characteristics of Authentic leadership in educational institutions and to respond to the question as to whether authentic leaders are satisfied with their job. The third aim is to determine differences among the researched regions. The sample included 227 randomly selected directors from primary and secondary schools in Serbia, Montenegro and the Republika Srpska. The research used an ALQ questionnaire for the estimation of leadership behaviour. Descriptions for the results prediction and multiple linear regressions were used. A multivariance analysis of variance was used to compare the groups. The research results showed that every fourth director is an authentic leader. Authentic leadership has a significant influence on job satisfaction through two aspects: internalised perspective and balanced processing. There are no differences in Authentic leadership in the researched areas. The results could be useful for educational institutions in countries where the research was conducted. Further research could be carried out in other countries while cultural differences should be taken into account. One limiting factor consists of the fact that the analysed data are obtained only from school directors. Leaders of educational institutions should provide management through the development of their own authenticity and the authenticity of their followers. The characteristics of Authentic leadership were reviewed and tested practically in the West-Balkan environment.

  1. User Authentication based on Continuous Touch Biometrics

    Directory of Open Access Journals (Sweden)

    Christina J Kroeze

    2016-12-01

    Full Text Available Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, leaving the device vulnerable if stolen. This paper investigates the possibility of unobtrusive, continuous authentication for smartphones based on biometric data collected using a touchscreen. The possibility of authenticating users on a smartphone was evaluated by conducting an experiment simulating real-world touch interaction. Touch data was collected from 30 participants during normal phone use. The touch features were analysed in terms of the information provided for authentication. It was found that features such as finger pressure, location of touch interaction and shape of the finger were important discriminators for authentication. The touch data was also analysed using two classification algorithms to measure the authentication accuracy. The results show that touch data is sufficiently distinct between users to be used in authentication without disrupting normal touch interaction. It is also shown that the raw touch data was more effective in authentication than the aggregated gesture data.

  2. A compression tolerant scheme for image authentication

    Institute of Scientific and Technical Information of China (English)

    刘宝锋; 张文军; 余松煜

    2004-01-01

    Image authentication techniques used to protect the recipients against malicious forgery. In this paper, we propose a new image authentication technique based on digital signature. The authentication is verified by comparing the features of the each block in tested image with the corresponding features of the block recorded in the digital signature. The proposed authentication scheme is capable of distinguishing visible but non-malicious changes due to common processing operations from malicious changes. At last our experimental results show that the proposed scheme is not only efficient to protect integrity of image, but also with low computation,which are feasible for practical applications.

  3. Staging constructions of authenticity in organizational change

    DEFF Research Database (Denmark)

    Dupret, Katia

    2015-01-01

    Authenticity in organizations has gained increased focus in recent years. Authentic management and leadership are ways to motivate and make sustainable changes in the organization. But authenticity is also strategically worked with in order to serve social and political functions that are emotion....... The paper explores how staged organizational change where authentic role-play and scripts from everyday life combined with meta-reflection and feedback construct new forms of reflection where its ethical side-effects should be discussed.......Authenticity in organizations has gained increased focus in recent years. Authentic management and leadership are ways to motivate and make sustainable changes in the organization. But authenticity is also strategically worked with in order to serve social and political functions...... that are emotionally charged. Through a socio-material perspective this paper seeks to explore how change processes in organizations challenges the idea of authentic leadership as a merely individual ability or personality trait and suggest that the authentic leader is distributed into the practices of change...

  4. Authentic leadership: develop the leader within.

    Science.gov (United States)

    Yasinski, Lesia

    2014-03-01

    Great leadership usually starts with a willing heart, a positive attitude, and a desire to make a difference. Strong leadership is important, in today's health care climate, to ensure optimal patient outcomes and the fostering of future generations of knowledgeable, motivated and enthusiastic perioperative nurses. This article will explore key elements necessary for the development of authentic leadership. While highlighting the role that personal development plays in leadership skills, this article will also discuss ways to cultivate authenticity in leadership. The following questions will be addressed: What is authentic leadership? How does one become an authentic leader?

  5. Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol

    NARCIS (Netherlands)

    Pavlovic, Dusko; Meadows, Catherine; Mislove, M.; Selinger, P.

    2010-01-01

    As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g., location authentication. Many interesting protocols have been proposed and implemented to provide such strengthened forms of authe

  6. FY05 LDRD Final Report, A Revolution in Biological Imaging

    Energy Technology Data Exchange (ETDEWEB)

    Chapman, H N; Bajt, S; Balhorn, R; Barty, A; Barsky, D; Bogan, M; Chung, S; Frank, M; Hau-Riege, S; Ishii, H; London, R; Marchesini, S; Noy, A; Segelke, B; Szoke, A; Szoke, H; Trebes, J; Wootton, A; Hajdu, J; Bergh, M; Caleman, C; Huldt, G; Lejon, S; der Spoel, D v; Howells, M; He, H; Spence, J; Nugent, K; Ingerman, E

    2006-01-20

    X-ray free-electron lasers (XFELs) are currently under development and will provide a peak brightness more than 10 orders of magnitude higher than modern synchrotrons. The goal of this project was to perform the fundamental research to evaluate the possibility of harnessing these unique x-ray sources to image single biological particles and molecules at atomic resolution. Using a combination of computational modeling and experimental verification where possible, they showed that it should indeed be possible to record coherent scattering patterns from single molecules with pulses that are shorter than the timescales for the degradation of the structure due to the interaction with those pulses. They used these models to determine the effectiveness of strategies to allow imaging using longer XFEL pulses and to design validation experiments to be carried out at interim ultrafast sources. They also developed and demonstrated methods to recover three-dimensional (3D) images from coherent diffraction patterns, similar to those expected from XFELs. The images of micron-sized test objects are the highest-resolution 3D images of any noncrystalline material ever formed with x-rays. The project resulted in 14 publications in peer-reviewed journals and four records of invention.

  7. Authentic Learning and Alien Worlds

    Science.gov (United States)

    Watt, Sara D.; Watt, Keith; Gleim, Brian

    2015-01-01

    Glendale Community College has developed a laboratory course and observing program which provides non-science majors with opportunities to perform authentic science in a community college setting. The program is designed around experiential learning which allows students to meaningfully construct concepts within contexts that involve real-world problems that are relevant to the learner. Students learn observational astronomy and data analysis techniques by observing exoplanet transits using 8-inch Celestron telescopes. The exoplanet data gathered and analyzed by the students is contributed to the exoplanet database. This poster presents an overview of the program and highlights early educational results.

  8. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Bork Petersen, Franziska

    2013-01-01

    In this thesis I investigate what ‘authenticity’ means in a contemporary popular context and how it is used in the staging of bodies. Furthermore, I analyse works of dance and fashion from the past fifteen years with a focus on their strategies of challenging the notion of ‘bodily authenticity...... and by a depiction of 'working hard'. But various techniques also mask the hard work, for example by showing a participant ‘having fun’ performing it. Contemporary works of dance and fashion challenge the problematic implications in the notion of ‘bodily authenticity’. I analyse three strategies of undermining...

  9. LDRD final report on continuous wave intersubband terahertz sources.

    Energy Technology Data Exchange (ETDEWEB)

    Samora, Sally; Mangan, Michael A.; Foltynowicz, Robert J.; Young, Erik W.; Fuller, Charles T.; Stephenson, Larry L.; Reno, John Louis; Wanke, Michael Clement; Hudgens, James J.

    2005-02-01

    There is a general lack of compact electromagnetic radiation sources between 1 and 10 terahertz (THz). This a challenging spectral region lying between optical devices at high frequencies and electronic devices at low frequencies. While technologically very underdeveloped the THz region has the promise to be of significant technological importance, yet demonstrating its relevance has proven difficult due to the immaturity of the area. While the last decade has seen much experimental work in ultra-short pulsed terahertz sources, many applications will require continuous wave (cw) sources, which are just beginning to demonstrate adequate performance for application use. In this project, we proposed examination of two potential THz sources based on intersubband semiconductor transitions, which were as yet unproven. In particular we wished to explore quantum cascade lasers based sources and electronic based harmonic generators. Shortly after the beginning of the project, we shifted our emphasis to the quantum cascade lasers due to two events; the publication of the first THz quantum cascade laser by another group thereby proving feasibility, and the temporary shut down of the UC Santa Barbara free-electron lasers which were to be used as the pump source for the harmonic generation. The development efforts focused on two separate cascade laser thrusts. The ultimate goal of the first thrust was for a quantum cascade laser to simultaneously emit two mid-infrared frequencies differing by a few THz and to use these to pump a non-linear optical material to generate THz radiation via parametric interactions in a specifically engineered intersubband transition. While the final goal was not realized by the end of the project, many of the completed steps leading to the goal will be described in the report. The second thrust was to develop direct THz QC lasers operating at terahertz frequencies. This is simpler than a mixing approach, and has now been demonstrated by a few groups

  10. Bluetooth-based authentication system for ambient intelligence

    Institute of Scientific and Technical Information of China (English)

    Jian HE; Hui LI; Yong ZHANG; Zhang-qin HUANG

    2008-01-01

    According to the requirement of natural human-computer interaction for Ambient Intelligence (AmI), a Bluetooth-based authentication technique is provided. An authentication network combining advantages of Bluetooth ad hoc network with the Ethernet is introduced first in detail. Then we propose a Bluetooth badge for storing the user's identification information. Finally, the authentication system based on Bluetooth badge and authentication network is introduced. It is demonstrated experimentally that the Bluetooth-based authentication technique can authenticate the user automatically.

  11. Authentication Model Based Bluetooth-enabled Mobile Phone

    OpenAIRE

    Rania Abdelhameed; Sabira Khatun; Borhanuddin M. Ali; Abdul R. Ramli

    2005-01-01

    Authentication is a mechanism to establish proof of identities, the authentication process ensure that who a particular user is. Current PC, laptop user authentication systems are always done once and hold until it explicitly revoked by the user, or asking the user to frequently reestablish his identity which encouraging him to disable authentication. Zero-Interaction Authentication (ZIA) provides solution to this problem. In ZIA, a user wears a small authentication token ...

  12. Autonomous intelligent assembly systems LDRD 105746 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J.

    2013-04-01

    This report documents a three-year to develop technology that enables mobile robots to perform autonomous assembly tasks in unstructured outdoor environments. This is a multi-tier problem that requires an integration of a large number of different software technologies including: command and control, estimation and localization, distributed communications, object recognition, pose estimation, real-time scanning, and scene interpretation. Although ultimately unsuccessful in achieving a target brick stacking task autonomously, numerous important component technologies were nevertheless developed. Such technologies include: a patent-pending polygon snake algorithm for robust feature tracking, a color grid algorithm for uniquely identification and calibration, a command and control framework for abstracting robot commands, a scanning capability that utilizes a compact robot portable scanner, and more. This report describes this project and these developed technologies.

  13. Test-Task Authenticity: The Multiple Perspectives

    Science.gov (United States)

    Gan, Zhengdong

    2012-01-01

    Leung and Lewkowicz remind us that the debate over the past two decades that is most relevant to ELT (English languge teaching) pedagogy and curriculum concerns test-task authenticity. This paper first reviews how the authenticity debate in the literature of second language acquisition, pedagogy and testing has evolved. Drawing on a body of…

  14. Difference packing arrays and systematic authentication codes

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    In this paper, a type of combinatorial design (called difference packing array)is proposed and used to give a construction of systematic authentication codes. Taking advantage of this construction, some new series of systematic authentication codes are obtainable in terms of existing difference packing arrays.

  15. Teacher Authenticity: A Theoretical and Empirical Investigation

    Science.gov (United States)

    Akoury, Paul N.

    2013-01-01

    This study builds on a small, under-acknowledged body of educational works that speak to the problem of an overly technical focus on teaching, which negates a more authentic consideration of what it means to teach, including an exploration of the spiritual and moral dimensions. A need for educational change and the teacher's authentic way of…

  16. Research on Secure Authentication Mechanism of Grid

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Based on the analysis on the security mechanism of grid, this paper discusses the advantages of latest techniques of grid security, and presents a secure authentication scheme of grid based on elliptic curve cryptosystem (ECC). The secure authentication scheme may provide reference value for the further application of grid.

  17. Making it Real: Authenticity, Process and Pedagogy

    Science.gov (United States)

    Badger, Richard; MacDonald, Malcolm

    2010-01-01

    Authenticity has been a part of the intellectual resources of language teaching since the 1890s but its precise meaning and implications are contested. This commentary argues for a view of authenticity which recognizes the limits of the concept as a guide for pedagogic practice and acknowledges the fact that texts are processes rather than…

  18. Efficient Quantum Secure Direct Communication with Authentication

    Institute of Scientific and Technical Information of China (English)

    LIU Wen-Jie; CHEN Han-Wu; LI Zhi-Qiang; LIU Zhi-Hao

    2008-01-01

    Two protocols of quantum direct communication with authentication [Phys. Rev. A 73 (2006) 042305] were recently indicated to be insecure against the authenticator Trent attacks [Phys. Rev. A 75 (2007) 026301]. We present two efficient protocols by using four Pauli operations, which are secure against inner Trent attacks as well as outer Eve attacks. Finally, we generalize them to multiparty quantum direction communication.

  19. Authenticated communication from quantum readout of PUFs

    NARCIS (Netherlands)

    Skoric, Boris; Pinkse, Pepijn W.H.; Mosk, Allard P.

    2016-01-01

    Quantum Readout of Physical Unclonable Functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: a verifier can check if received classical data was sent by the PUF holder. We call this modific

  20. Authentication of digital video evidence

    Science.gov (United States)

    Beser, Nicholas D.; Duerr, Thomas E.; Staisiunas, Gregory P.

    2003-11-01

    In response to a requirement from the United States Postal Inspection Service, the Technical Support Working Group tasked The Johns Hopkins University Applied Physics Laboratory (JHU/APL) to develop a technique tha will ensure the authenticity, or integrity, of digital video (DV). Verifiable integrity is needed if DV evidence is to withstand a challenge to its admissibility in court on the grounds that it can be easily edited. Specifically, the verification technique must detect additions, deletions, or modifications to DV and satisfy the two-part criteria pertaining to scientific evidence as articulated in Daubert et al. v. Merrell Dow Pharmaceuticals Inc., 43 F3d (9th Circuit, 1995). JHU/APL has developed a prototype digital video authenticator (DVA) that generates digital signatures based on public key cryptography at the frame level of the DV. Signature generation and recording is accomplished at the same time as DV is recorded by the camcorder. Throughput supports the consumer-grade camcorder data rate of 25 Mbps. The DVA software is implemented on a commercial laptop computer, which is connected to a commercial digital camcorder via the IEEE-1394 serial interface. A security token provides agent identification and the interface to the public key infrastructure (PKI) that is needed for management of the public keys central to DV integrity verification.

  1. FY07 LDRD Final Report Neutron Capture Cross-Section Measurements at DANCE

    Energy Technology Data Exchange (ETDEWEB)

    Parker, W; Agvaanluvsan, U; Wilk, P; Becker, J; Wang, T

    2008-02-08

    We have measured neutron capture cross sections intended to address defense science problems including mix and the Quantification of Margins and Uncertainties (QMU), and provide details about statistical decay of excited nuclei. A major part of this project included developing the ability to produce radioactive targets. The cross-section measurements were made using the white neutron source at the Los Alamos Neutron Science Center, the detector array called DANCE (The Detector for Advanced Neutron Capture Experiments) and targets important for astrophysics and stockpile stewardship. DANCE is at the leading edge of neutron capture physics and represents a major leap forward in capability. The detector array was recently built with LDRD money. Our measurements are a significant part of the early results from the new experimental DANCE facility. Neutron capture reactions are important for basic nuclear science, including astrophysics and the statistics of the {gamma}-ray cascades, and for applied science, including stockpile science and technology. We were most interested in neutron capture with neutron energies in the range between 1 eV and a few hundred keV, with targets important to basic science, and the s-process in particular. Of particular interest were neutron capture cross-section measurements of rare isotopes, especially radioactive isotopes. A strong collaboration between universities and Los Alamos due to the Academic Alliance was in place at the start of our project. Our project gave Livermore leverage in focusing on Livermore interests. The Lawrence Livermore Laboratory did not have a resident expert in cross-section measurements; this project allowed us to develop this expertise. For many radionuclides, the cross sections for destruction, especially (n,{gamma}), are not well known, and there is no adequate model that describes neutron capture. The modeling problem is significant because, at low energies where capture reactions are important, the neutron

  2. Combined Analysis of Stable Isotope, (1)H NMR, and Fatty Acid To Verify Sesame Oil Authenticity.

    Science.gov (United States)

    Kim, Jeongeun; Jin, Gyungsu; Lee, Yunhee; Chun, Hyang Sook; Ahn, Sangdoo; Kim, Byung Hee

    2015-10-14

    The aim of this study was to verify the authenticity of sesame oils using combined analysis of stable isotope ratio, (1)H NMR spectroscopy, and fatty acid profiles of the oils. Analytical data were obtained from 35 samples of authentic sesame oils and 29 samples of adulterated sesame oils currently distributed in Korea. The orthogonal projection to latent structure discriminant analysis technique was used to select variables that most effectively verify the sesame oil authenticity. The variables include δ(13)C value, integration values of NMR peaks that signify the CH3 of n-3 fatty acids, CH2 between two C═C, protons from sesamin/sesamolin, and 18:1n-9, 18:3n-3, 18:2t, and 18:3t content values. The authenticity of 65 of 70 blind samples was correctly verified by applying the range of the eight variables found in the authentic sesame oil samples, suggesting that triple analysis is a useful approach to verify sesame oil authenticity.

  3. Two dimensional point of use fuel cell : a final LDRD project report.

    Energy Technology Data Exchange (ETDEWEB)

    Zavadil, Kevin Robert; Hickner, Michael A. (Pennsylvania State University, University Park, PA); Gross, Matthew L. (Pennsylvania State University, University Park, PA)

    2011-03-01

    The Proliferation Assessment (program area - Things Thin) within the Defense Systems and Assessment Investment Area desires high energy density and long-lived power sources with moderate currents (mA) that can be used as building blocks in platforms for the continuous monitoring of chemical, biological, and radiological agents. Fuel cells can be an optimum choice for a power source because of the high energy densities that are possible with liquid fuels. Additionally, power generation and fuel storage can be decoupled in a fuel cell for independent control of energy and power density for customized, application-driven power solutions. Direct methanol fuel cells (DMFC) are explored as a possible concept to develop into ultrathin or two-dimensional power sources. New developments in nanotechnology, advanced fabrication techniques, and materials science are exploited to create a planar DMFC that could be co-located with electronics in a chip format. Carbon nanotubes and pyrolyzed polymers are used as building block electrodes - porous, mechanically compliant current collectors. Directed assembly methods including surface functionalization and layer-by-layer deposition with polyelectrolytes are used to pattern, build, and add functionality to these electrodes. These same techniques are used to incorporate nanoscale selective electrocatalyst into the carbon electrodes to provide a high density of active electron transfer sites for the methanol oxidation and oxygen reduction reactions. The resulting electrodes are characterized in terms of their physical properties, electrocatalytic function, and selectivity to better understand how processing impacts their performance attributes. The basic function of a membrane electrode assembly is demonstrated for several prototype devices.

  4. Final report : LDRD project 79824 carbon nanotube sorting via DNA-directed self-assembly.

    Energy Technology Data Exchange (ETDEWEB)

    Robinson, David B; Leung, Kevin; Rempe, Susan B.; Dossa, Paul D.; Frischknecht, Amalie Lucile; Martin, Marcus Gary

    2007-10-01

    Single-wall carbon nanotubes (SWNTs) have shown great promise in novel applications in molecular electronics, biohazard detection, and composite materials. Commercially synthesized nanotubes exhibit a wide dispersion of geometries and conductivities, and tend to aggregate. Hence the key to using these materials is the ability to solubilize and sort carbon nanotubes according to their geometric/electronic properties. One of the most effective dispersants is single-stranded DNA (ssDNA), but there are many outstanding questions regarding the interaction between nucleic acids and SWNTs. In this work we focus on the interactions of SWNTs with single monomers of nucleic acids, as a first step to answering these outstanding questions. We use atomistic molecular dynamics simulations to calculate the binding energy of six different nucleotide monophosphates (NMPs) to a (6,0) single-wall carbon nanotube in aqueous solution. We find that the binding energies are generally favorable, of the order of a few kcal/mol. The binding energies of the different NMPs were very similar in salt solution, whereas we found a range of binding energies for NMPs in pure water. The binding energies are sensitive to the details of the association of the sodium ions with the phosphate groups and also to the average conformations of the nucleotides. We use electronic structure (Density Functional Theory (DFT) and Moller-Plesset second order perturbation to uncorrelated Hartree Fock theory (MP2)) methods to complement the classical force field study. With judicious choices of DFT exchange correlation functionals, we find that DFT, MP2, and classical force field predictions are in qualitative and even quantitative agreement; all three methods should give reliable and valid predictions. However, in one important case, the interactions between ions and metallic carbon nanotubes--the SWNT polarization-induced affinity for ions, neglected in most classical force field studies, is found to be extremely large (on the order of electron volts) and may have important consequences for various SWNT applications. Finally, the adsorption of NMPs onto single-walled carbon nanotubes were studied experimentally. The nanotubes were sonicated in the presence of the nucleotides at various weight fractions and centrifuged before examining the ultraviolet absorbance of the resulting supernatant. A distinct Langmuir adsorption isotherm was obtained for each nucleotide. All of the nucleotides differ in their saturation value as well as their initial slope, which we attribute to differences both in nucleotide structure and in the binding ability of different types or clusters of tubes. Results from this simple system provide insights toward development of dispersion and separation methods for nanotubes: strongly binding nucleotides are likely to help disperse, whereas weaker ones may provide selectivity that may be beneficial to a separation process.

  5. Final report LDRD project 105816 : model reduction of large dynamic systems with localized nonlinearities.

    Energy Technology Data Exchange (ETDEWEB)

    Lehoucq, Richard B.; Segalman, Daniel Joseph; Hetmaniuk, Ulrich L. (University of Washington, Seattle, WA); Dohrmann, Clark R.

    2009-10-01

    Advanced computing hardware and software written to exploit massively parallel architectures greatly facilitate the computation of extremely large problems. On the other hand, these tools, though enabling higher fidelity models, have often resulted in much longer run-times and turn-around-times in providing answers to engineering problems. The impediments include smaller elements and consequently smaller time steps, much larger systems of equations to solve, and the inclusion of nonlinearities that had been ignored in days when lower fidelity models were the norm. The research effort reported focuses on the accelerating the analysis process for structural dynamics though combinations of model reduction and mitigation of some factors that lead to over-meshing.

  6. Final report for LDRD Project 93633 : new hash function for data protection.

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, Timothy John; Dautenhahn, Nathan; Schroeppel, Richard Crabtree; Tolk, Keith Michael; Orman, Hilarie (PurpleStreak, Inc.); Walker, Andrea Mae; Malone, Sean; Lee, Eric; Neumann, William Douglas; Cordwell, William R.; Torgerson, Mark Dolan; Anderson, Eric; Lanzone, Andrew J.; Collins, Michael Joseph; McDonald, Timothy Scott; Caskey, Susan Adele

    2009-03-01

    The security of the widely-used cryptographic hash function SHA1 has been impugned. We have developed two replacement hash functions. The first, SHA1X, is a drop-in replacement for SHA1. The second, SANDstorm, has been submitted as a candidate to the NIST-sponsored SHA3 Hash Function competition.

  7. Molecular dynamics of gases and vapors in nanoporous solids. Final LDRD project report

    Energy Technology Data Exchange (ETDEWEB)

    Pohl, P.I.

    1996-08-01

    This report provides a study of gases in microporous solids using molecular modeling. The theory of gas transport in porous materials as well as the molecular modeling literature is briefly reviewed. Work complete is described and analyzed with retard to the prevailing theory. The work covers two simple subjects, construction of porous solid models and diffusion of He, H{sub 2}, Ar and CH{sub 4} down a pressure gradient across the material models as in typical membrane permeation experiments. The broader objective is to enhance our capability to efficiently and accurately develop, produce and apply microporous materials.

  8. FY09 Final Report for LDRD Project: Understanding Viral Quasispecies Evolution through Computation and Experiment

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, C

    2009-11-12

    In FY09 they will (1) complete the implementation, verification, calibration, and sensitivity and scalability analysis of the in-cell virus replication model; (2) complete the design of the cell culture (cell-to-cell infection) model; (3) continue the research, design, and development of their bioinformatics tools: the Web-based structure-alignment-based sequence variability tool and the functional annotation of the genome database; (4) collaborate with the University of California at San Francisco on areas of common interest; and (5) submit journal articles that describe the in-cell model with simulations and the bioinformatics approaches to evaluation of genome variability and fitness.

  9. Geomechanics of penetration : experimental and computational approaches : final report for LDRD project 38718.

    Energy Technology Data Exchange (ETDEWEB)

    Hardy, Robert Douglas; Holcomb, David Joseph; Gettemy, Glen L.; Fossum, Arlo Frederick; Rivas, Raul R.; Bronowski, David R.; Preece, Dale S.

    2004-10-01

    The purpose of the present work is to increase our understanding of which properties of geomaterials most influence the penetration process with a goal of improving our predictive ability. Two primary approaches were followed: development of a realistic, constitutive model for geomaterials and designing an experimental approach to study penetration from the target's point of view. A realistic constitutive model, with parameters based on measurable properties, can be used for sensitivity analysis to determine the properties that are most important in influencing the penetration process. An immense literature exists that is devoted to the problem of predicting penetration into geomaterials or similar man-made materials such as concrete. Various formulations have been developed that use an analytic or more commonly, numerical, solution for the spherical or cylindrical cavity expansion as a sort of Green's function to establish the forces acting on a penetrator. This approach has had considerable success in modeling the behavior of penetrators, both as to path and depth of penetration. However the approach is not well adapted to the problem of understanding what is happening to the material being penetrated. Without a picture of the stress and strain state imposed on the highly deformed target material, it is not easy to determine what properties of the target are important in influencing the penetration process. We developed an experimental arrangement that allows greater control of the deformation than is possible in actual penetrator tests, yet approximates the deformation processes imposed by a penetrator. Using explosive line charges placed in a central borehole, we loaded cylindrical specimens in a manner equivalent to an increment of penetration, allowing the measurement of the associated strains and accelerations and the retrieval of specimens from the more-or-less intact cylinder. Results show clearly that the deformation zone is highly concentrated near the borehole, with almost no damage occurring beyond 1/2 a borehole diameter. This implies penetration is not strongly influenced by anything but the material within a diameter or so of the penetration. For penetrator tests, target size should not matter strongly once target diameters exceed some small multiple of the penetrator diameter. Penetration into jointed rock should not be much affected unless a discontinuity is within a similar range. Accelerations measured at several points along a radius from the borehole are consistent with highly-concentrated damage and energy absorption; At the borehole wall, accelerations were an order of magnitude higher than at 1/2 a diameter, but at the outer surface, 8 diameters away, accelerations were as expected for propagation through an elastic medium. Accelerations measured at the outer surface of the cylinders increased significantly with cure time for the concrete. As strength increased, less damage was observed near the explosively-driven borehole wall consistent with the lower energy absorption expected and observed for stronger concrete. As it is the energy absorbing properties of a target that ultimately stop a penetrator, we believe this may point the way to a more readily determined equivalent of the S number.

  10. LDRD Project 52523 final report :Atomic layer deposition of highly conformal tribological coatings.

    Energy Technology Data Exchange (ETDEWEB)

    Jungk, John Michael (University of Minnesota); Dugger, Michael Thomas; George, Steve M. (University of Colorado); Prasad, Somuri V.; Grubbs, Robert K.; Moody, Neville Reid; Mayer, Thomas Michael; Scharf, Thomas W.; Goeke, Ronald S.; Gerberich, William W. (University of Minnesota)

    2005-10-01

    Friction and wear are major concerns in the performance and reliability of micromechanical (MEMS) devices. While a variety of lubricant and wear resistant coatings are known which we might consider for application to MEMS devices, the severe geometric constraints of many micromechanical systems (high aspect ratios, shadowed surfaces) make most deposition methods for friction and wear-resistance coatings impossible. In this program we have produced and evaluate highly conformal, tribological coatings, deposited by atomic layer deposition (ALD), for use on surface micromachined (SMM) and LIGA structures. ALD is a chemical vapor deposition process using sequential exposure of reagents and self-limiting surface chemistry, saturating at a maximum of one monolayer per exposure cycle. The self-limiting chemistry results in conformal coating of high aspect ratio structures, with monolayer precision. ALD of a wide variety of materials is possible, but there have been no studies of structural, mechanical, and tribological properties of these films. We have developed processes for depositing thin (<100 nm) conformal coatings of selected hard and lubricious films (Al2O3, ZnO, WS2, W, and W/Al{sub 2}O{sub 3} nanolaminates), and measured their chemical, physical, mechanical and tribological properties. A significant challenge in this program was to develop instrumentation and quantitative test procedures, which did not exist, for friction, wear, film/substrate adhesion, elastic properties, stress, etc., of extremely thin films and nanolaminates. New scanning probe and nanoindentation techniques have been employed along with detailed mechanics-based models to evaluate these properties at small loads characteristic of microsystem operation. We emphasize deposition processes and fundamental properties of ALD materials, however we have also evaluated applications and film performance for model SMM and LIGA devices.

  11. Final report on LDRD project : narrow-linewidth VCSELs for atomic microsystems.

    Energy Technology Data Exchange (ETDEWEB)

    Chow, Weng Wah; Geib, Kent Martin; Peake, Gregory Merwin; Serkland, Darwin Keith

    2011-09-01

    Vertical-cavity surface-emitting lasers (VCSELs) are well suited for emerging photonic microsystems due to their low power consumption, ease of integration with other optical components, and single frequency operation. However, the typical VCSEL linewidth of 100 MHz is approximately ten times wider than the natural linewidth of atoms used in atomic beam clocks and trapped atom research, which degrades or completely destroys performance in those systems. This report documents our efforts to reduce VCSEL linewidths below 10 MHz to meet the needs of advanced sub-Doppler atomic microsystems, such as cold-atom traps. We have investigated two complementary approaches to reduce VCSEL linewidth: (A) increasing the laser-cavity quality factor, and (B) decreasing the linewidth enhancement factor (alpha) of the optical gain medium. We have developed two new VCSEL devices that achieved increased cavity quality factors: (1) all-semiconductor extended-cavity VCSELs, and (2) micro-external-cavity surface-emitting lasers (MECSELs). These new VCSEL devices have demonstrated linewidths below 10 MHz, and linewidths below 1 MHz seem feasible with further optimization.

  12. Development of efficient, integrated cellulosic biorefineries : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Teh, Kwee-Yan; Hecht, Ethan S.; Shaddix, Christopher R.; Buffleben, George M.; Dibble, Dean C.; Lutz, Andrew E.

    2010-09-01

    Cellulosic ethanol, generated from lignocellulosic biomass sources such as grasses and trees, is a promising alternative to conventional starch- and sugar-based ethanol production in terms of potential production quantities, CO{sub 2} impact, and economic competitiveness. In addition, cellulosic ethanol can be generated (at least in principle) without competing with food production. However, approximately 1/3 of the lignocellulosic biomass material (including all of the lignin) cannot be converted to ethanol through biochemical means and must be extracted at some point in the biochemical process. In this project we gathered basic information on the prospects for utilizing this lignin residue material in thermochemical conversion processes to improve the overall energy efficiency or liquid fuel production capacity of cellulosic biorefineries. Two existing pretreatment approaches, soaking in aqueous ammonia (SAA) and the Arkenol (strong sulfuric acid) process, were implemented at Sandia and used to generated suitable quantities of residue material from corn stover and eucalyptus feedstocks for subsequent thermochemical research. A third, novel technique, using ionic liquids (IL) was investigated by Sandia researchers at the Joint Bioenergy Institute (JBEI), but was not successful in isolating sufficient lignin residue. Additional residue material for thermochemical research was supplied from the dilute-acid simultaneous saccharification/fermentation (SSF) pilot-scale process at the National Renewable Energy Laboratory (NREL). The high-temperature volatiles yields of the different residues were measured, as were the char combustion reactivities. The residue chars showed slightly lower reactivity than raw biomass char, except for the SSF residue, which had substantially lower reactivity. Exergy analysis was applied to the NREL standard process design model for thermochemical ethanol production and from a prototypical dedicated biochemical process, with process data

  13. Abstract: Lightweight Authentication for HIP

    Science.gov (United States)

    Heer, Tobias

    In recent years numerous solutions for overcoming the architectural constraints of the Internet have emerged. One of the most promising among them is the Host Identity Protocol (HIP) [2], which was recently approved as an experimental standard by the IETF. HIP adds an additional protocol layer between TCP and IP to implement the Identifier/Locator split. Apart from mobility and multihoming, HIP supports host authentication, payload encryption, and a cryptographic namespace without requiring changes to the network infrastructure or network applications. However, especially mobile devices with tightly limited CPU resources are slowed down by HIP. Its poor performance on these mobile devices is a result of the extensive use of public-key (PK) cryptography for securing the main protocol functions.

  14. Parallelizable and Authenticated Online Ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Luykx, Atul;

    2013-01-01

    Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which only depend on the preceding plaintext blocks. All online ciphers proposed so far are essentially serial, which significantly limits their performance on parallel architectures such as modern general......-purpose CPUs or dedicated hardware.We propose the first parallelizable online cipher, COPE. It performs two calls to the underlying block cipher per plaintext block and is fully parallelizable in both encryption and decryption. COPE is proven secure against chosenplaintext attacks assuming the underlying block...... cipher is a strong PRP. We then extend COPE to create COPA, the first parallelizable, online authenticated cipher with nonce-misuse resistance. COPA only requires two extra block cipher calls to provide integrity. The privacy and integrity of the scheme is proven secure assuming the underlying block...

  15. Towards distortion-free robust image authentication

    Energy Technology Data Exchange (ETDEWEB)

    Coltuc, D [EE Department, Valahia University Targoviste (Romania)

    2007-07-15

    This paper investigates a general framework for distortion-free robust image authentication by multiple marking. First, by robust watermarking a subsampled version of image edges is embedded. Then, by reversible watermarking the information needed to recover the original image is inserted, too. The hiding capacity of the reversible watermarking is the essential requirement for this approach. Thus in case of no attacks not only image is authenticated but also the original is exactly recovered. In case of attacks, reversibility is lost, but image can still be authenticated. Preliminary results providing very good robustness against JPEG compression are presented.

  16. Authentication Systems in Internet of Things

    Directory of Open Access Journals (Sweden)

    Tuhin Borgohain

    2015-01-01

    Full Text Available This paper analyzes the various authentication systems implemented for enhanced security and private reposition of an individual’s login credentials. The first part of the paper describes the multi-factor authentication (MFA systems, which, though not applicable to the field of Internet of Things, provides great security to a user’s credentials. MFA is followed by a brief description of the working mechanism of interaction of third party clients with private resources over the OAuth protocol framework and a study of the delegation based authentication system in IP-based IoT.

  17. Authenticated Key Agreement in Group Settings

    Institute of Scientific and Technical Information of China (English)

    LI Ming; WANG Yong; GU Da-wu; BAI Ying-cai

    2006-01-01

    An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.

  18. Authentication-secrecy code based on conies over finite fields

    Institute of Scientific and Technical Information of China (English)

    裴定一; 王学理

    1996-01-01

    An authentication-secrecy code based on the rational normal curves over finite fields was constructed,whose probabilities of successful deception achieve their information-theoretic bounds.The set of encoding rules for this code is a representation system for cosets of a certain subgroup in the projective transformation group.A special case is studied,i.e.the rational normal curves are the conies over finite fields.The representation system for the cosets which determines the set of encoding rules will be given.

  19. Permutation-based Homogeneous Block Content Authentication for Watermarking

    Directory of Open Access Journals (Sweden)

    S.Maruthuperumal

    2013-02-01

    Full Text Available In modern days, digital watermarking has become an admired technique for hitting data in digital images to help guard against copyright infringement. The proposed Permutation-based Homogeneous Block Content authentication (PHBC methods develop a secure and excellence strong watermarking algorithm that combines the reward of permutation-based Homogeneous block (PHB with that of significant and insignificant bit values with X0R encryption function using Max coefficient of least coordinate value for embedding the watermark. In the projected system uses the relationship between the permutation blocks to embed many data into Homogeneous blocks without causing solemn distortion to the watermarked image. The experimental results show that the projected system is very efficient in achieving perceptual invisibility with an increase in the Peak Signal to Noise Ratio (PSNR. Moreover, the projected system is robust to a variety of signal processing operations, such as image Cropping, Rotation, Resizing, Adding noise, Filtering , Blurring and Motion blurring.

  20. The Effect of Authentic versus Non-Authentic Texts on Upper Intermediate Iranian EFL Learners' Vocabulary Retention

    Science.gov (United States)

    Nematollahi, Shirin; Maghsoudi, Mojtaba

    2015-01-01

    In this current study the researchers have tried to investigate the possible effect of authentic and non-authentic texts on Iranian EFL learners' vocabulary retention. Despite the great deal of studies conducted in the area of EFL/ESL learning, the effect of authentic versus non-authentic texts have almost gained little attention and been…

  1. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Directory of Open Access Journals (Sweden)

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  2. The Brisbane Media Map: Participatory Design and Authentic Learning to Link Students and Industry

    Science.gov (United States)

    Collis, Christy; Foth, Marcus; Schroeter, Ronald

    2009-01-01

    The Brisbane Media Map is both an online resource and a tertiary-level authentic learning project. The Brisbane Media Map is an online database which provides a detailed overview of about 600 media industry organizations in Brisbane, Australia. In addition to providing contact details and synopses for each organization's profile, the Brisbane…

  3. Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept

    Directory of Open Access Journals (Sweden)

    A. Drosou

    2011-01-01

    Full Text Available Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.

  4. Authentic Research Experience and "Big Data" Analysis in the Classroom: Maize Response to Abiotic Stress

    Science.gov (United States)

    Makarevitch, Irina; Frechette, Cameo; Wiatros, Natalia

    2015-01-01

    Integration of inquiry-based approaches into curriculum is transforming the way science is taught and studied in undergraduate classrooms. Incorporating quantitative reasoning and mathematical skills into authentic biology undergraduate research projects has been shown to benefit students in developing various skills necessary for future…

  5. Developing More Authentic e-Courses by Integrating Working Life Mentoring and Social Media

    Science.gov (United States)

    Leppisaari, Irja; Kleimola, Riina; Herrington, Jan; Maunula, Markus; Hohenthal, Tuula

    2014-01-01

    Studies show that affordances of social media have not yet been fully exploited in the promotion of authentic e-learning in higher education. The e-Learning of the Future project (2009-2011) has met these challenges through working life mentoring using social media. In this paper, we examine the planning and implementation of social media in nine…

  6. Laptop Computers in the Elementary Classroom: Authentic Instruction with At-Risk Students

    Science.gov (United States)

    Kemker, Kate; Barron, Ann E.; Harmes, J. Christine

    2007-01-01

    This case study investigated the integration of laptop computers into an elementary classroom in a low socioeconomic status (SES) school. Specifically, the research examined classroom management techniques and aspects of authentic learning relative to the student projects and activities. A mixed methods approach included classroom observations,…

  7. Constructing authentic houses of God: religious politics and creative iconographies in Dutch mosque design

    NARCIS (Netherlands)

    Roose, E.R.

    2012-01-01

    Modern mosques in the West are all too often considered to be anachronistic pastiches of authentic historical examples that are literally out of place in the Muslim diaspora. Whereas this perspective has usually led to projections of nostalgia onto generalized communities, in this article I will tak

  8. Affordances and Constraints of Using the Socio-Political Debate for Authentic Summative Assessment

    Science.gov (United States)

    Anker-Hansen, Jens; Andrée, Maria

    2015-01-01

    This article reports from an empirical study on the affordances and constraints for using staged socio-political debates for authentic summative assessment of scientific literacy. The article focuses on conditions for student participation and what purposes emerge in student interaction in a socio-political debate. As part of the research project,…

  9. Incorporating an Authentic Learning Strategy into Undergraduate Apparel and Merchandising Curriculum

    Science.gov (United States)

    Ma, Yoon Jin; Lee, Hyun-Hwa

    2012-01-01

    An authentic learning strategy fostering students' active learning was studied using the scenario of a real-world project. Students from two different classes at two different universities worked as clients or consultants to develop an apparel sourcing strategy. Quantitative and qualitative data were gathered from 44 undergraduates enrolled in…

  10. Authentication Schemes Using Polynomials Over Non-Commutative Rings

    OpenAIRE

    Valluri, Maheswara Rao

    2013-01-01

    Authentication is a process by which an entity,which could be a person or intended computer,establishes its identity to another entity.In private and public computer networks including the Internet,authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic.Internet business and many other transactions require a more stringent authentication process. The aim of this paper is to propose two authentication sche...

  11. Guap-A strong user authentication protocol for GSM

    OpenAIRE

    Aydemir, Özer

    2005-01-01

    Cataloged from PDF version of article. Traditionally, the authentication protocols for cellular phone networks have been designed for device authentication rather than user authentication, which brings limitations and restrictions on the functionality of the system. In this thesis we propose a user authentication protocol for GSM (Global System for Mobile) based cellular phone networks. Our protocol permits the use of weak secrets (e.g. passwords or PINs) for authentication ...

  12. Authenticating Devices in Ubiquitous Computing Environment

    Directory of Open Access Journals (Sweden)

    Kamarularifin Abd Jalil

    2015-05-01

    Full Text Available The deficient of a good authentication protocol in a ubiquitous application environment has made it a good target for adversaries. As a result, all the devices which are participating in such environment are said to be exposed to attacks such as identity impostor, man-in-the-middle attacks and also unauthorized attacks. Thus, this has created skeptical among the users and has resulted them of keeping their distance from such applications. For this reason, in this paper, we are proposing a new authentication protocol to be used in such environment. Unlike other authentication protocols which can be adopted to be used in such environment, our proposed protocol could avoid a single point of failures, implements trust level in granting access and also promotes decentralization. It is hoped that the proposed authentication protocol can reduce or eliminate the problems mentioned.

  13. Hardware device binding and mutual authentication

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  14. Athos: Efficient Authentication of Outsourced File Systems

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Goodrich, Michael T.; Papamanthou, Charalampos

    2008-01-01

    outsourced storage. Using light-weight cryptographic primitives and efficient data-structuring techniques, we design authentication schemes that allow a client to efficiently verify that the file system is fully consistent with the exact history of updates and queries requested by the client. In Athos, file-system......We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system's integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated...... operations are verified in time that is logarithmic in the size of the file system using optimal storage complexity-constant storage overhead at the client and asymptotically no extra overhead at the server. We provide a prototype implementation of Athos validating its performance and its authentication...

  15. Intrinsic-surface-tag image authentication

    Energy Technology Data Exchange (ETDEWEB)

    Palm, R.G.; DeVolpi, A.

    1991-12-01

    The objective of this work is to further the development of a unique treaty limited item (TLI) intrinsic surface tag for arms control applications. This tag's unique feature is the ability to capture the sub-micron scale topography of the TLI surface. The surface topography is captured by plastic castings of the surface as digitally imaged by an electron microscope. Tag authentication is accomplished by comparing digital castings images obtained in two different inspections. Surface replication experiments are described, as these experiments from the basis for the authentication algorithm. Both the experiments and the authentication algorithm are analyzed using the modulation transfer function. Recommendations for future improvements in tag authentication are also suggested by the modulation transfer function analysis. 4 refs.

  16. Intrinsic-surface-tag image authentication

    Energy Technology Data Exchange (ETDEWEB)

    Palm, R.G.; DeVolpi, A.

    1991-12-01

    The objective of this work is to further the development of a unique treaty limited item (TLI) intrinsic surface tag for arms control applications. This tag`s unique feature is the ability to capture the sub-micron scale topography of the TLI surface. The surface topography is captured by plastic castings of the surface as digitally imaged by an electron microscope. Tag authentication is accomplished by comparing digital castings images obtained in two different inspections. Surface replication experiments are described, as these experiments from the basis for the authentication algorithm. Both the experiments and the authentication algorithm are analyzed using the modulation transfer function. Recommendations for future improvements in tag authentication are also suggested by the modulation transfer function analysis. 4 refs.

  17. Adapting Authentic Materials for Language Teaching.

    Science.gov (United States)

    Darian, Steven

    2001-01-01

    Illustrates the process of adapting authentic materials for use in the English-as-a-Second-language classroom. Focuses on four areas: semantic elements, lexical elements, syntactic elements, and discourse elements.(Author/VWL)

  18. Developing Listening Skills with Authentic Materials.

    Science.gov (United States)

    Miller, Lindsay

    2003-01-01

    Discusses how to help English-as-a-Second-Language learners develop effective listening skills. Suggests a process for helping ESL learners develop their listening skills and makes suggestions for how this might be achieved with authentic materials. (VWL)

  19. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    that fusion of two remote biometric modalities, facial recognition and appearance analysis, gives a significant improvement over each of the individual experts. Furthermore, the experimental results show that using remote biometrics increases the performance of tracking in persistent authentication...

  20. Robust audio hashing for audio authentication watermarking

    Science.gov (United States)

    Zmudzinski, Sascha; Steinebach, Martin

    2008-02-01

    Current systems and protocols based on cryptographic methods for integrity and authenticity verification of media data do not distinguish between legitimate signal transformation and malicious tampering that manipulates the content. Furthermore, they usually provide no localization or assessment of the relevance of such manipulations with respect to human perception or semantics. We present an algorithm for a robust message authentication code in the context of content fragile authentication watermarking to verify the integrity of audio recodings by means of robust audio fingerprinting. Experimental results show that the proposed algorithm provides both a high level of distinction between perceptually different audio data and a high robustness against signal transformations that do not change the perceived information. Furthermore, it is well suited for the integration in a content-based authentication watermarking system.

  1. IPCT: A scheme for mobile authentication

    Directory of Open Access Journals (Sweden)

    Vishnu Shankar

    2016-09-01

    Full Text Available Mobile is becoming a part of everyone's life and as their power of computation and storage is rising and cost is coming down. Most of mobile phone users have a lot of private data which they want to protect from others (La Polla et al., 2013. It means user must be authenticated properly for accessing the mobile resources. Normally user is authenticated using text passwords, PIN, face recognition or patterns etc. All these methods are used but they have some shortcomings. In this paper we have seen various existing methods of mobile authentications and proposed our improved mobile authentication IPCT scheme. We have compared our Image Pass Code with tapping scheme with existing techniques and shown that our scheme is better than existing techniques.

  2. Design of Anonymous Attribute Authentication Mechanism

    Science.gov (United States)

    Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki

    Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication.In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.

  3. Authentic professional competence in clinical neuropsychology.

    Science.gov (United States)

    Denney, Robert L

    2010-08-01

    Authentic Professional Competence in Clinical Neuropsychology was Dr Denney's 2009 presidential address at the Annual Conference of the National Academy of Neuropsychology. In his address, he highlighted the need for clinical neuropsychologists to strive for authentic professional competence rather than a mere pretense of expertise. Undisputed credibility arises from authentic professional competence. Achieving authentic professional competence includes the completion of a thorough course of training within the defined specialty area and validation of expertise by one's peers through the board certification process. Included in the address were survey results regarding what the consumer believes about board certification as well as survey results regarding the experiences of recent neuropsychology diplomates. It is important for neuropsychologists to realize that the board certification process enhances public perception and credibility of the field as well as personal growth for the neuropsychologist. Lastly, he urged all neuropsychologists to support the unified training model and pursue board certification.

  4. Bioagent detection using miniaturized NMR and nanoparticle amplification : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Clewett, C. F. M.; Adams, David Price; Fan, Hongyou; Williams, John D.; Sillerud, Laurel O.; Alam, Todd Michael; Aldophi, Natalie L. (New Mexico Resonance, Albuquerque, NM); McDowell, Andrew F. (New Mexico Resonance, Albuquerque, NM)

    2006-11-01

    This LDRD program was directed towards the development of a portable micro-nuclear magnetic resonance ({micro}-NMR) spectrometer for the detection of bioagents via induced amplification of solvent relaxation based on superparamagnetic nanoparticles. The first component of this research was the fabrication and testing of two different micro-coil ({micro}-coil) platforms: namely a planar spiral NMR {micro}-coil and a cylindrical solenoid NMR {micro}-coil. These fabrication techniques are described along with the testing of the NMR performance for the individual coils. The NMR relaxivity for a series of water soluble FeMn oxide nanoparticles was also determined to explore the influence of the nanoparticle size on the observed NMR relaxation properties. In addition, The use of commercially produced superparamagnetic iron oxide nanoparticles (SPIONs) for amplification via NMR based relaxation mechanisms was also demonstrated, with the lower detection limit in number of SPIONs per nanoliter (nL) being determined.

  5. Transmissive infrared frequency selective surfaces and infrared antennas : final report for LDRD 105749.

    Energy Technology Data Exchange (ETDEWEB)

    Wendt, Joel Robert; Hadley, G. Ronald; Samora, Sally; Loui, Hung; Cruz-Cabrera, Alvaro Augusto; Davids, Paul; Kemme, Shanalyn A.; Basilio, Lorena I.; Johnson, William Arthur; Peters, David William

    2009-09-01

    Plasmonic structures open up new opportunities in photonic devices, sometimes offering an alternate method to perform a function and sometimes offering capabilities not possible with standard optics. In this LDRD we successfully demonstrated metal coatings on optical surfaces that do not adversely affect the transmission of those surfaces at the design frequency. This technology could be applied as an RF noise blocking layer across an optical aperture or as a method to apply an electric field to an active electro-optic device without affecting optical performance. We also demonstrated thin optical absorbers using similar patterned surfaces. These infrared optical antennas show promise as a method to improve performance in mercury cadmium telluride detectors. Furthermore, these structures could be coupled with other components to lead to direct rectification of infrared radiation. This possibility leads to a new method for infrared detection and energy harvesting of infrared radiation.

  6. Keystroke Dynamics Authentication For Collaborative Systems

    OpenAIRE

    Giot, Romain; El-Abed, Mohamad; Rosenberger, Christophe

    2009-01-01

    International audience; We present in this paper a study on the ability and the benefits of using a keystroke dynamics authentication method for collaborative systems. Authentication is a challenging issue in order to guarantee the security of use of collaborative systems during the access control step. Many solutions exist in the state of the art such as the use of one time passwords or smart-cards. We focus in this paper on biometric based solutions that do not necessitate any additional se...

  7. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  8. Dual Authentication For Bluetooth Connection

    Directory of Open Access Journals (Sweden)

    Diallo Alhassane Saliou

    2014-07-01

    Full Text Available Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN. This is because the radio frequency (RF waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS. These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. Bluetooth technology started with a form of pairing called legacy pairing prior to any communication. However, due to the serious security issues found in the legacy pairing, a secure and simple pairing called SPP was announced with Bluetooth 2.1 and later since 2007. SPP has solved the main security issue which is the weaknesses of the PIN code in the legacy pairing, however it has been found with some vulnerabilities such as eavesdropping and man-in-the-middle (MITM attacks. Since the discovery of these vulnerabilities, some enhancements have been proposed to the Bluetooth Specification Interest Group (SIG which is the regulatory body of Bluetooth technology; nevertheless, some proposed enhancements are ineffective or are not yet implemented by Manufacturers. Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC algorithm with Secure Hash Algorithm (SHA-256. The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE as software and a Bluetooth (BT Shield connected to an Arduino Uno R3 boards as hardware. The result was verified on a Graphical User Interface (GUI built in Microsoft Visual Studio 2010 with C sharp as default environment. It has shown that the proposed scheme works perfectly with the used hardware and software. In addition, the

  9. Main group adducts of carbon dioxide and related chemistry (LDRD 149938).

    Energy Technology Data Exchange (ETDEWEB)

    Barry, Brian M. (University of New Mexico, Albuquerque, NM); Kemp, Richard Alan; Stewart, Constantine A.; Dickie, Diane A. (University of New Mexico, Albuquerque, NM)

    2010-11-01

    This late-start LDRD was broadly focused on the synthetic attempts to prepare novel ligands as complexing agents for main group metals for the sequestration of CO{sub 2}. In prior work we have shown that certain main group (p block elements) metals such as tin and zinc, when ligated to phosphinoamido- ligands, can bind CO{sub 2} in a novel fashion. Rather than simple insertion into the metal-nitrogen bonds to form carbamates, we have seen the highly unusual complexation of CO{sub 2} in a mode that is more similar to a chemical 'adduct' rather than complexation schemes that have been observed previously. The overarching goal in this work is to prepare more of these complexes that can (a) sequester (or bind) CO{sub 2} easily in this adduct form, and (b) be stable to chemical or electrochemical reduction designed to convert the CO{sub 2} to useful fuels or fuel precursors. The currently used phosphinoamido- ligands appear at this point to be less-stable than desired under electrochemical reduction conditions. This instability is believed due to the more delicate, reactive nature of the ligand framework system. In order to successfully capture and convert CO{sub 2} to useful organics, this instability must be addressed and solved. Work described in the late-start LDRD was designed to screen a variety of ligand/metal complexes that a priori are believed to be more stable to polar solvents and possible mild hydrolytic conditions than are the phosphinoamido-ligands. Results from ligand syntheses and metal complexation studies are reported.

  10. Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity

    NARCIS (Netherlands)

    Gulikers, J.T.M.; Bastiaens, Th.J.; Kirschner, P.A.; Kester, L.

    2008-01-01

    In vocational education and training (VET) in the Netherlands, learning and working are integrated from the start. Authentic assessments are used during competence-based VET curricula to achieve correspondence between learning and working. The premise behind this study is that authenticity is subjec

  11. Perceptions of Leadership Coaches Regarding Leader Authenticity and Authenticity Development Strategies

    Science.gov (United States)

    Stone, Anne H.

    2012-01-01

    Purpose: The purpose of this study was to identify what leadership coaches perceive to be the benefits of authenticity to their clients' success. Another purpose was to identify what barriers leadership coaches perceive as preventing their clients from developing authenticity. A final purpose of this study was to identify which strategies…

  12. Authenticity Is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity

    Science.gov (United States)

    Gulikers, Judith T. M.; Bastiaens, Theo J.; Kirschner, Paul A.; Kester, Liesbeth

    2008-01-01

    In vocational education and training (VET) in the Netherlands, learning and working are integrated from the start. Authentic assessments are used during competence-based VET curricula to achieve correspondence between learning and working. The premise behind this study is that authenticity is subjective and that perceptions of assessment…

  13. Designing Authentic Learning Environments in Chemistry Lessons: Paving the Way in Pre-Service Teacher Education

    Science.gov (United States)

    Schumacher, Andrea; Reiners, Christiane S.

    2013-09-01

    Authenticity has recently become a popular term in science education. A study focusing on authenticity in the sense of making chemistry lessons better resemble chemistry practice is carried out at the University of Cologne in the Institute of Chemical Education, where prospective chemistry teachers are trained. In the long run an innovative module shall be developed, which challenges teacher students' pre-conceptions about characteristics of chemistry practice and supports them in translating their conceptions into authentic learning environments. This paper presents the first part of the project in which course elements to stimulate reflection on students' attitudes were evaluated. Moreover the students were given an opportunity for teacher students to create a practical activity for pupils in order to detect aspects in which the students need more support, for example possible ways for this transformation or more experience with inquiry-based learning.

  14. Robust image authentication in the presence of noise

    CERN Document Server

    2015-01-01

    This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.    Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:   Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the pre...

  15. Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs

    Institute of Scientific and Technical Information of China (English)

    Rajeev Singh; Teek Parval Sharma

    2015-01-01

    Authentication per frame is an implicit necessity for security in wireless local area networks (WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames. It utilizes the sequence number of the frame along with the authentication stream generators for authentication. Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation.

  16. Authentication Model Based Bluetooth-enabled Mobile Phone

    Directory of Open Access Journals (Sweden)

    Rania Abdelhameed

    2005-01-01

    Full Text Available Authentication is a mechanism to establish proof of identities, the authentication process ensure that who a particular user is. Current PC, laptop user authentication systems are always done once and hold until it explicitly revoked by the user, or asking the user to frequently reestablish his identity which encouraging him to disable authentication. Zero-Interaction Authentication (ZIA provides solution to this problem. In ZIA, a user wears a small authentication token that communicates with a laptop over a short-range, wireless link. ZIA combine authentication with a file encryption. Here we proposed a Laptop-user Authentication Based Mobile phone (LABM, in our model of authentication, a user uses his Bluetooth-enabled mobile phone, which work as an authentication token that provides the authentication for laptop over a Bluetooth wireless link, in the concept of transient authentication with out combining it with encryption file system. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range, wireless link.

  17. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    Science.gov (United States)

    Kent, Alexander Dale

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  18. Computer Security: Cryptography and authentication (2/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Remi Mollon studied computer security at University and he first worked on Grids, with the EGEE project, for a French Bioinformatics institute. Information security being crucial in that field, he developed an encrypted file management system on top of Grid middleware, and he contributed in integrating legacy applications with Grids. Then, he was hired by CERN as a Grid Data Management developer, and he joined the Grid Operational Security Coordination Team. Remi has now moved to CERN Computer Security Team. Remi is involved in the daily security operations, in addition to be responsible to design Team's computer infrastructure, and to participate to several projects, like multi-factor authentication at CERN. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have s...

  19. Stereo Image Reversible Watermarking for Authentication

    Science.gov (United States)

    Luo, Ting; Jiang, Gangyi; Peng, Zongju; Shao, Feng; Yu, Mei

    2015-03-01

    To authenticate stereo image, this paper proposes a stereo image reversible watermarking method for three dimensional television systems. The proposed method can recover the original stereo image without any distortion if stereo image is not tampered. Otherwise, it can authenticate stereo image with the capability of locating tamper. Difference expansion is used to embed authentication bits reversibly into each block for locating tamper. Pixel pairs without resulting in overflow/underflow after expansion are chosen as candidates of embedding locations. In order to avoid transmit big size of embedding location map, the same embedding locations for each block are decided in advance, which adaptively determines the block size. Moreover, in order to resist collage attack, authentication bits generated from each block embedded into its mapping blocks, so that authentication of each block is not independent. Experimental results demonstrate that stereo image can be totally recovered if watermarked stereo image is not modified. Moreover, it proves suitability and stability of the proposed method for tamper location with relationships of stereo images.

  20. IMAGE AUTHENTICATION TECHNIQUES AND ADVANCES SURVEY

    Directory of Open Access Journals (Sweden)

    Derroll David

    2015-10-01

    Full Text Available With the advanced technologies in the area of Engineering the World has become a smaller place and communication is in our finger tips. The multimedia sharing traffic through electronic media has increased tremendously in the recent years with the higher use of social networking sites. The statistics of amount of images uploaded in the internet per day is very huge. Digital Image security has become vulnerable due to increase transmission over non-secure channel and needs protection. Digital Images play a crucial role in medical and military images etc. and any tampering of them is a serious issue. Several approaches are introduced to authenticate multimedia images. These approaches can be categorized into fragile and semi-fragile watermarking, conventional cryptography and digital signatures based on the image content. The aim of this paper is to provide a comparative study and also a survey of emerging techniques for image authentication. The important requirements for an efficient image authentication system design are discussed along with the classification of image authentication into tamper detection, localization and reconstruction and robustness against image processing operation. Furthermore, the concept of image content based authentication is enlightened.

  1. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  2. SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    RAVIKIRAN PEELUKHANA,

    2011-04-01

    Full Text Available The cloud virtualization technology improves the economy of scale for data centers through server consolidation, application consolidation and resources consolidation. Virtualization allows the provider to move Virtual Images from more congested host to less-congested hosts, as required. Enterprises also get improved server reliability, which in turn increases application performance. Despite these benefits, it includes major security challenges with the portability of Virtual Images between different cloud providers.The security and integrity of Virtual images is the foundation for the overall security of the cloud. Many of the Virtual images are intended to be shared by diverse and unrelated users. Unfortunately, existing approaches to cloud security built by cloud practitioners fall short when dealing with Virtual images. Secure transmission of virtual Images can bepossible by providing authentication using Blind Authentication protocol (BAP. The proposed approach authenticates the allocation of virtual images using Blind authentication protocol. It provides provable protection against replay and client side attacks even if the keys of the user are compromised. The encryption also provides template protection, revocability and alleviates the concerns on privacy in widespread use of biometrics. Carrying out the authentication in the encrypted domain is a secure process, while the encryption key acts as an additional layer of security.

  3. Authentication: science and art at odds?

    Science.gov (United States)

    Chartier, Duane R.; Notehelfer, Fred G.

    1998-05-01

    Contrary to popular belief, there is a very great difference between the detection of forgery versus the authentication of works of art. Sciences is generally very good at producing evidence of falsification but often is equally poor at proving authenticity. The primary reason for these gross differences is that connoisseurship and art history are more strongly involved in the process of authentication than are scientific testing and analysis. There is also a pronounced lack of substantive interaction between art conservation professionals, scientists and art historians. The case of a recently discovered painting by John Constable will be used to illustrate the difficulties and opportunities of a balanced and systematic approach to the process of authentication. There is much more than science involved in such endeavors and this would not surprise anyone who has attempted to introduce works of art through non-traditional channels. Great problems arise when the curatorial community is asked to consider works that do not so easily 'fit' into a neat art historical period or stylistic pigeonhole. Connoisseurs often will only accept the best works of an artist and discount the inevitable products of the artist's evolution -- less accomplished works. Scientific principles and technical evidence can and must be used in order to elevate the practice of authentication.

  4. Authenticity: is it real or is it marketing?

    Science.gov (United States)

    Weinberger, David

    2008-03-01

    Marty Echt, the new head of marketing at Hunsk Engines, is determined to bring the motorcycle maker back to its roots. He says it's not enough to project authenticity to customers--employees must personally subscribe to the brand's values. Should the company's CEO support Marty's "real deal" vision? Five experts comment on this fictional case study. Bruce Weindruch, the founder and CEO of the History Factory, says that an authenticity-based campaign can be effective--but only if it's truly drawn from history. Marketers like Marty often remember their organization's past in a golden haze. Weindruch recommends exploring old engineering drawings, ads, and product photos in order to understand what customers and employees really valued back in the day. Gillian Arnold, a consultant to luxury fashion and fine jewelry brands, thinks Marty's approach is right: People in key marketing posts must be passionate about their products and know them inside and out. She argues that the CEO needs to commit more fully to the new campaign and address the significant gap between the staff and the brand. James H. Gilmore and B. Joseph Pine II, the cofounders of Strategic Horizons, point out that Hunsk needs to manage customers' perceptions rather than trying to be a "real company" or forming a management team whose personal interests match the brand. People purchase a product if it conforms to their self-image; that alone determines the brand's authenticity. Glenn Brackett of Sweetgrass Rods, a maker of bamboo fly-fishing rods, says Marty seems to be one of the few people who understand Hunsk motorcycles. If employees bring blood, sweat, heart, and soul to a product, it will manifest that spirit, and customers will line up for it.

  5. An Investigation of the Effects of Authentic Science Experiences Among Urban High School Students

    Science.gov (United States)

    Chapman, Angela

    Providing equitable learning opportunities for all students has been a persistent issue for some time. This is evident by the science achievement gap that still exists between male and female students as well as between White and many non-White student populations (NCES, 2007, 2009, 2009b) and an underrepresentation of female, African-American, Hispanic, and Native Americans in many science, technology, engineering, and mathematics (STEM) related careers (NCES, 2009b). In addition to gender and ethnicity, socioeconomic status and linguistic differences are also factors that can marginalize students in the science classroom. One factor attributed to the achievement gap and low participation in STEM career is equitable access to resources including textbooks, laboratory equipment, qualified science teachers, and type of instruction. Extensive literature supports authentic science as one way of improving science learning. However, the majority of students do not have access to this type of resource. Additionally, extensive literature posits that culturally relevant pedagogy is one way of improving education. This study examines students' participation in an authentic science experience and argues that this is one way of providing culturally relevant pedagogy in science classrooms. The purpose of this study was to better understand how marginalized students were affected by their participation in an authentic science experience, within the context of an algae biofuel project. Accordingly, an interpretivist approach was taken. Data were collected from pre/post surveys and tests, semi-structured interviews, student journals, and classroom observations. Data analysis used a mixed methods approach. The data from this study were analyzed to better understand whether students perceived the experience to be one of authentic science, as well as how students science identities, perceptions about who can do science, attitudes toward science, and learning of science practices

  6. A lightweight authentication scheme with user untraceability

    Institute of Scientific and Technical Information of China (English)

    Kuo-Hui YEH

    2015-01-01

    With the rapid growth of electronic commerce and associated demands on variants of Internet based applications, application systems providing network resources and business services are in high demand around the world. To guarantee ro-bust security and computational efficiency for service retrieval, a variety of authentication schemes have been proposed. How-ever, most of these schemes have been found to be lacking when subject to a formal security analysis. Recently, Changet al. (2014) introduced a formally provable secure authentication protocol with the property of user-untraceability. Unfortunately, based on our analysis, the proposed scheme fails to provide the property of user-untraceability as claimed, and is insecure against user impersonation attack, server counterfeit attack, and man-in-the-middle attack. In this paper, we demonstrate the details of these malicious attacks. A security enhanced authentication scheme is proposed to eliminate all identified weaknesses.

  7. CRYPTOGRAPHIC PROTOCOL DEPENDING ON BIOMETRIC AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    SANJUKTA PAL

    2013-02-01

    Full Text Available In modern age, security is the most challenging issue for using the secure data used by computer. This cryptographic protocol on biometric authentication is nothing but the combination of cryptography and biometric authentication. Here the same idea of cryptography is working (i.e. using key, conversion of plain textinto cipher text called encryption and the reverse, means cipher text to plain text called decryption. Here the most promising method fingerprint geometry of biometric authentication is used as the key for encryption and decryption. Here this cryptographic protocol is just an algorithm for matching the key means matching of stored fingerprint images say DB Images with further given fingerprint image say Final Image. For matching purpose we used binary conversion of images. This algorithm is suitable for any type of data (means text data, multimedia data etc.

  8. Authenticating Tripartite Key Agreement Protocol with Pairings

    Institute of Scientific and Technical Information of China (English)

    Sheng-Li Liu; Fang-Guo Zhang; Ke-Fei Chen

    2004-01-01

    In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.

  9. Authentic moral conflicts and students' moral development

    Institute of Scientific and Technical Information of China (English)

    Fu Wei-li

    2006-01-01

    This research deals with the different psychological processes people undergo when they experience firsthand authentic moral conflicts.It also discusses the value of authentic moral conflicts in students' moral development,and reasons for the ineffectiveness of moral education in China.The main reason for the unsatisfactory effects of moral education in China over a period of time lies in the predominance of virtual moral education.In authentic situations,the proper arrangement of moral conflicts requires careful analysis of values hidden in the prearranged or generated moral conflicts so as to utilize,guide,and control them properly.Such arrangement of moral conflicts should be adapted to students' life experience for deepening their understanding of the moral aspects of life.Also,special attention should be attached to students' varied requirements,thus leaving enough options and space for their independent participation in activities of moral education.

  10. Enhanced Authentication Mechanism Using Multilevel Security Model

    Directory of Open Access Journals (Sweden)

    Abdulameer Hussain

    2009-06-01

    Full Text Available This paper presents a proposed multilevel authentication method which is implemented especially in sensitive applications where they contain multilevel secure and confidential data. The proposed method divides the system into multiple sensitive levels and tests users against different authentication methods for each level. Most levels are subdivided further into secure sublevels. Each sublevel contains its own privileges and data types which are managed by an Identity Manager (IM whose responsibility is to transit users to other higher sublevels. The transition’s decision is done by assigning different weights to each authentication method .After a series of tests, the IM must generate a status report describing the results and the decision made to each user’s activity. This technique permits granting only the required privileges for a selected group of users and limits the configuration functions of those that users in a particular user group can perform.

  11. Approximate Public Key Authentication with Information Hiding

    Energy Technology Data Exchange (ETDEWEB)

    THOMAS,EDWARD V.; DRAELOS,TIMOTHY J.

    2000-10-01

    This paper describes a solution for the problem of authenticating the shapes of statistically variant gamma spectra while simultaneously concealing the shapes and magnitudes of the sensitive spectra. The shape of a spectrum is given by the relative magnitudes and positions of the individual spectral elements. Class-specific linear orthonormal transformations of the measured spectra are used to produce output that meet both the authentication and concealment requirements. For purposes of concealment, the n-dimensional gamma spectra are transformed into n-dimensional output spectra that are effectively indistinguishable from Gaussian white noise (independent of the class). In addition, the proposed transformations are such that statistical authentication metrics computed on the transformed spectra are identical to those computed on the original spectra.

  12. Filtered Rayleigh scattering diagnostic for multi-parameter thermal-fluids measurements : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Beresh, Steven Jay; Grasser, Thomas W.; Kearney, Sean Patrick; Schefer, Robert W.

    2004-01-01

    Simulation-based life-cycle-engineering and the ASCI program have resulted in models of unprecedented size and fidelity. The validation of these models requires high-resolution, multi-parameter diagnostics. Within the thermal-fluids disciplines, the need for detailed, high-fidelity measurements exceeds the limits of current engineering sciences capabilities and severely tests the state of the art. The focus of this LDRD is the development and application of filtered Rayleigh scattering (FRS) for high-resolution, nonintrusive measurement of gas-phase velocity and temperature. With FRS, the flow is laser-illuminated and Rayleigh scattering from naturally occurring sources is detected through a molecular filter. The filtered transmission may be interpreted to yield point or planar measurements of three-component velocities and/or thermodynamic state. Different experimental configurations may be employed to obtain compromises between spatial resolution, time resolution, and the quantity of simultaneously measured flow variables. In this report, we present the results of a three-year LDRD-funded effort to develop FRS combustion thermometry and Aerosciences velocity measurement systems. The working principles and details of our FRS opto-electronic system are presented in detail. For combustion thermometry we present 2-D, spatially correlated FRS results from nonsooting premixed and diffusion flames and from a sooting premixed flame. The FRS-measured temperatures are accurate to within {+-}50 K (3%) in a premixed CH4-air flame and within {+-}100 K for a vortex-strained diluted CH4-air diffusion flame where the FRS technique is severely tested by large variation in scattering cross section. In the diffusion flame work, FRS has been combined with Raman imaging of the CH4 fuel molecule to correct for the local light scattering properties of the combustion gases. To our knowledge, this is the first extension of FRS to nonpremixed combustion and the first use of joint FRS

  13. Android Based Total Security for System Authentication

    Directory of Open Access Journals (Sweden)

    Mithil Vasani

    2015-04-01

    Full Text Available In this Paper [5], A highly severe menace to any computing device is the impersonation of an authenticate user. The most frequent computer authentication scheme is to use alphanumerical usernames and passwords. But the textual passwords are prone to dictionary attacks, eves dropping, shoulder surfing and social engineering. As such, graphical passwords have been introduced as an alternative to the traditional authentication process. Though the graphical password schemes provide a way of making more user friendly passwords, while increasing the level of security, they are vulnerable to shoulder surfing. To address this problem, text can be used in combination with the colors and images to generate the session passwords, thereby making a stronger authentication means. In general, session passwords are those that can be used only once and for every new session, a new password is engendered. This paper [7] describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner. The proposed system involves using a mobile phone as a software token for One Time Password generation. The generated One Time Password is valid for only a short user defined period of time and is generated by factors that are unique to both, the user and the mobile device itself. Additionally, an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization. The proposed method has been implemented and tested. Initial results show the success of the proposed method.

  14. Facelock: familiarity-based graphical authentication

    Directory of Open Access Journals (Sweden)

    Rob Jenkins

    2014-06-01

    Full Text Available Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate, even after a one-year delay (86.1% success rate. Zero-acquaintance attackers were reduced to guessing (<1% success rate. Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate. In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate. Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  15. Fingerprint Recognition on Various Authentication Sensors

    Institute of Scientific and Technical Information of China (English)

    A.Tirupathi Rao; N.Pattabhi Ramaiah; C.Krishna Mohan

    2014-01-01

    Fingerprint is a very popular and an ancient biometric technology to uniquely identify a person. In this paper, a fingerprint matcher is proposed which uses the global and local adaptive binarization and global minutia features. The fingerprint data is collected using three different authentication devices based on optical sensors. The experimental results are compared with the National Institute of Standards and Technology (NIST) Bozorth algorithm and various authentication fingerprint sensors. The accuracy of the proposed algorithm has been improved significantly compared with that of the NIST Bozorth algorithm.

  16. Designing authentic assessment: strategies for nurse educators.

    Science.gov (United States)

    Poindexter, Kathleen; Hagler, Debra; Lindell, Deborah

    2015-01-01

    Increased emphasis on health care safety requires renewed attention to teaching and learning processes for future health care professionals. When presented with problems situated in a clinical context, learners have rich opportunities to demonstrate integration of concepts. Authentic assessment is an approach to evaluation of learning through which students can demonstrate acquired knowledge, skills, and attitudes in the context of real-world or realistic nursing practice activities. This article describes features, approaches, and examples of authentic assessment processes in the context of classroom, clinical, and online nursing education.

  17. Biometrics Identity Authentication in Secure Electronic Transactions

    Directory of Open Access Journals (Sweden)

    Deepu Saini

    2012-06-01

    Full Text Available There are so many ways by which a person can be identified, but authentication of a person by biometric methods is assumed to be more secure. There are many reasons behind this e.g. in this world each person is having different biometric features, even thetwins in this world having different biometrics features. In electronic transactions, biometric method is used from very early days but now a day’s it is supposed to be the best and secure method for electronic transactions. In this paper the concepts regarding biometric identity authentication are explained.

  18. Multimedia encryption and authentication techniques and applications

    CERN Document Server

    Furht, Borko

    2006-01-01

    Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for thos

  19. Entity Authentication:Analysis using Structured Intuition

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    In this paper, we propose a new method for the analysis that uses intuition of the analyst in a structured way. First we define entity authentication in terms of fine level authentication goals (FLAGs). Then we use some relevant structures in protocol narrations and use them to justify FLAGs...... for the protocol. All along this process, we discover vulnerabilities and unstated assumptions of the protocol. As the method is intuition based, the quality of results depends on the expertise of the security analyst, however, the structured intuition has two major advantages: Firstly we get a precise...

  20. ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    Amit Rana

    2012-09-01

    Full Text Available The Internet Engineering Task Force (IETF has proposednew protocols for highly secured wireless networking. Thepurpose of this paper is to implement one such proposedsecurity protocol - PEAP (Protected ExtensibleAuthentication Protocol [1]. PEAP was jointly developedby Microsoft, Cisco and RSA security. The protocolimplementation is done on the server end of a Client/Servernetwork model on a RADIUS server (RemoteAuthentication Dial-in User Service. The proposedprotocol - PEAP provides for Client identity protection andkey generation thus preventing unauthorized user accessand protecting or encrypting the data against maliciousactivities.

  1. Color Based Authentication Scheme for Publically Disclosable Entities

    Directory of Open Access Journals (Sweden)

    A. S. Syed Shahul Hameed

    2015-01-01

    Full Text Available Traditional password authentication system are not strong enough to cope up with the current age of cybercrime. It’s high time that new password authentication schemes are explored and studied. This paper aims to provide an authentication system based on color recognition which would provide a way to encrypt both the username and password. The Color based authentication system would provide an efficient way to encrypt account details for sensitive applications like defense and banking.

  2. A study of user authentication using mobile phone

    OpenAIRE

    Hallsteinsen, Steffen Gullikstad

    2007-01-01

    The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentication scheme is based on usernames and passwords which are neither secure nor user-friendly. Hence, better solutions for simplified, yet secure authentication, is required in the future. This thesis present an authentication scheme based on a One-Time Password (OTP) MIDlet running on a mobile phone for unified authenti...

  3. The role of authenticity in electoral social media campaigns

    OpenAIRE

    Grow, Gabrielle; Ward, Janelle

    2013-01-01

    textabstractAuthenticity is a popular buzzword in electoral politics: Electoral candidates and politicians are expected to be authentic in their public interactions. Since 2008, campaigning via social media has become an integral part of elections in the United States, and continues to gain importance. In such an environment, this paper presents research into the role of authenticity in electoral social media campaigns. Using Gilpin, et al.'s (2010) definition of authenticity as the theoretic...

  4. Final Report on Institutional Computing Project s15_hilaserion, “Kinetic Modeling of Next-Generation High-Energy, High-Intensity Laser-Ion Accelerators as an Enabling Capability”

    Energy Technology Data Exchange (ETDEWEB)

    Albright, Brian James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Yin, Lin [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Stark, David James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-06

    This proposal sought of order 1M core-hours of Institutional Computing time intended to enable computing by a new LANL Postdoc (David Stark) working under LDRD ER project 20160472ER (PI: Lin Yin) on laser-ion acceleration. The project was “off-cycle,” initiating in June of 2016 with a postdoc hire.

  5. Reconciling Divisions in the Field of Authentic Education

    Science.gov (United States)

    Sarid, Ariel

    2015-01-01

    The aim of this article is twofold: first, to identify and address three central divisions in the field of authentic education that introduce ambiguity and at times inconsistencies within the field of authentic education. These divisions concern a) the relationship between autonomy and authenticity; b) the division between the two basic attitudes…

  6. Robust authentication through stochastic femtosecond laser filament induced scattering surfaces

    Science.gov (United States)

    Zhang, Haisu; Tzortzakis, Stelios

    2016-05-01

    We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.

  7. Claims-Based Authentication for a Web-Based Enterprise

    Science.gov (United States)

    2013-07-01

    Processing Standards Publication. “Entity Authentication Using Public Key Cryptography”, February 18, 1997 b. FIPS 197, Advanced Encryption Standard ( AES ...provided by a trusted entity and can be verified and validated. Of the many authentication protocols, including self-attestation, username/ password ...authentication and Active Entity B retrieving content from a passive entity. Figure 1 Communication between Active Entities III. CREDENTIALING IN THE

  8. Children's and Adolescents' Perception of the Authenticity of Smiles

    Science.gov (United States)

    Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula

    2009-01-01

    Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six…

  9. Toward Developing Authentic Leadership: Team-Based Simulations

    Science.gov (United States)

    Shapira-Lishchinsky, Orly

    2014-01-01

    Although there is a consensus that authentic leadership should be an essential component in educational leadership, no study to date has ever tried to find whether team-based simulations may promote authentic leadership. The purpose of this study was to identify whether principal trainees can develop authentic leadership through ethical decision…

  10. Teachers' Development Model to Authentic Assessment by Empowerment Evaluation Approach

    Science.gov (United States)

    Charoenchai, Charin; Phuseeorn, Songsak; Phengsawat, Waro

    2015-01-01

    The purposes of this study were 1) Study teachers authentic assessment, teachers comprehension of authentic assessment and teachers needs for authentic assessment development. 2) To create teachers development model. 3) Experiment of teachers development model. 4) Evaluate effectiveness of teachers development model. The research is divided into 4…

  11. Quantum-secure authentication of a physical unclonable key

    NARCIS (Netherlands)

    Goorden, S.A.; Horstmann, M.; Mosk, A.P.; Skoric, B.; Pinkse, P.W.H.

    2014-01-01

    Authentication of persons and objects is a crucial aspect of security. We experimentally demonstrate quantumsecure authentication (QSA) of a classical multiplescattering key. The key is authenticated by illuminating it with a light pulse containing fewer photons than spatial degrees of freedom and v

  12. Authentic Assessment for Student Learning: An Ontological Conceptualisation

    Science.gov (United States)

    Vu, Thuy T.; Dall'Alba, Gloria

    2014-01-01

    Authentic assessment has been proposed as having potential to enhance student learning for a changing world. Conventionally, assessment is seen to be authentic when the tasks are real-to-life or have real-life value. Drawing on Martin Heidegger's work, we challenge this conceptualisation as narrow and limited. We argue that authenticity need…

  13. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission....

  14. School Principals' Authentic Leadership and Teachers' Psychological Capital: Teachers' Perspectives

    Science.gov (United States)

    Feng, Feng-I

    2016-01-01

    This study examined teachers' perceptions of principals' authentic leadership and the relationship of authentic leadership to teachers' psychological capital in Taiwan. A total of 1,429 elementary and secondary school teachers were surveyed. The results showed that teachers perceived their principals' authentic leadership as moderate and that the…

  15. Biomimetic air sampling for detection of low concentrations of molecules and bioagents : LDRD 52744 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Robert Clark

    2003-12-01

    Present methods of air sampling for low concentrations of chemicals like explosives and bioagents involve noisy and power hungry collectors with mechanical parts for moving large volumes of air. However there are biological systems that are capable of detecting very low concentrations of molecules with no mechanical moving parts. An example is the silkworm moth antenna which is a highly branched structure where each of 100 branches contains about 200 sensory 'hairs' which have dimensions of 2 microns wide by 100 microns long. The hairs contain about 3000 pores which is where the gas phase molecules enter the aqueous (lymph) phase for detection. Simulations of diffusion of molecules indicate that this 'forest' of hairs is 'designed' to maximize the extraction of the vapor phase molecules. Since typical molecules lose about 4 decades in diffusion constant upon entering the liquid phase, it is important to allow air diffusion to bring the molecule as close to the 'sensor' as possible. The moth acts on concentrations as low as 1000 molecules per cubic cm. (one part in 1e16). A 3-D collection system of these dimensions could be fabricated by micromachining techniques available at Sandia. This LDRD addresses the issues involved with extracting molecules from air onto micromachined structures and then delivering those molecules to microsensors for detection.

  16. Analytical strategies to confirm Scotch whisky authenticity. Part II: Mobile brand authentication.

    Science.gov (United States)

    MacKenzie, W M; Aylott, R I

    2004-07-01

    Whilst the authentication of Scotch whisky brands using laboratory based gas chromatography is well established, there is a need for authentication methods for use under field test conditions. The UV/visible absorbance spectra of specific brands of Scotch whisky were found to produce consistent absorbance ranges which allowed the development of a faster, cheaper and more mobile test method. Test samples with spectra outside the acceptable ranges for genuine reference samples were therefore deemed suspect, enabling their authenticity to be later confirmed in the laboratory by GC. This novel application allowed brand authenticity analyses to be undertaken at remote sites where gas chromatography was unavailable and has also allowed the introduction of field testing using a small portable hand held spectrophotometer.

  17. In Search of Authentic Learning in Kazakhstan

    Science.gov (United States)

    Cua, Francisco Chia; Reames, Stephen A.

    2012-01-01

    The foreign faculty in Kazakhstan faced the challenge of designing a total authentic learning curricula for undergraduate students used to a traditional approach to learning. Students were asked to submit reflective learning journeys at the end of the spring 2011 semester. This study uses their stories as a springboard to explore their perspective…

  18. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Qian; Veldhuis, Raymond

    2010-01-01

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information fu

  19. Authenticating the writings of Julius Caesar

    NARCIS (Netherlands)

    Kestemont, Mike; Stover, Justin; Koppel, Moshe; Karsdorp, F.B.; Daelemans, Walter

    2016-01-01

    In this paper, we shed new light on the authenticity of the Corpus Caesarianum, a group of five commentaries describing the campaigns of Julius Caesar (100–44 BC), the founder of the Roman empire. While Caesar himself has authored at least part of these commentaries, the authorship of the rest of th

  20. Handwritten Text Image Authentication using Back Propagation

    CERN Document Server

    Chakravarthy, A S N; Avadhani, P S

    2011-01-01

    Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle attacks), and is often wrapped up with authenticating identity. Literary can involve imitating the style of a famous author. If an original manuscript, typewritten text, or recording is available, then the medium itself (or its packaging - anything from a box to e-mail headers) can help prove or disprove the authenticity of the document. The use of digital images of handwritten historical documents has become more popular in recent years. Volunteers around the world now read thousands of these images as part of their indexing process. Handwritten text images of old documents are sometimes difficult to read or noisy du...

  1. Authentic Scientific Inquiry and School Science

    Science.gov (United States)

    Hume, Anne

    2009-01-01

    Scientific literacy goals feature strongly in the rhetoric of most forward-looking science curricula. Many science educators believe that a key means of attaining these goals is through the engagement of students in "authentic scientific inquiry". For students to experience such learning it is critical that teachers understand and appreciate what…

  2. Progress in authentication of food and wine

    Science.gov (United States)

    Authentication of foods, wines and beverages for varietal, country- (or region-) of-origin, and processing conditions is becoming of increasing concern to consumers and regulators both in the U.S. and internationally. As markets become more globalized and foods and beverages are sourced from many lo...

  3. Supporting Authentic Learning Contexts Beyond Classroom Walls

    Science.gov (United States)

    Herrington, Jan; Specht, Marcus; Brickell, Gwyn; Harper, Barry

    At the classroom level, contexts for learning are often limited in the experiential component. Teachers and trainers feel overwhelmed by the difficulty of inventing authentic learning contexts, and creating tasks that truly reflect the way knowledge would be used in the real world (Herrington et al. 2004). However, there are growing numbers of examples of how such authentic learning environments are being used in schools, higher education, and professional development in a variety of contexts and discipline areas, such as in literacy education (Ferry et al. 2006), in physical activity fitness and health (Rice et al. 1999), in Indigenous education (Marshall et al. 2001), in evaluation (Agostinho 2006), in multimedia and ICT (Bennett et al. 2001), in literature (Fitzsimmons 2006), and in business writing (Pennell et al. 1997). Teachers and trainers who subscribe to this approach to learning can be very inventive in developing learner perceptions of authentic contexts, but often financial, situational and time constraints limit the experiential elements of authentic learning settings.

  4. Rugged Practices: Embodying Authenticity in Outdoor Recreation

    Science.gov (United States)

    Senda-Cook, Samantha

    2012-01-01

    When people recreate outdoors, they value the quality of the experience. This study examines rhetorical practices that sustain or undermine perceived authentic outdoor recreation experiences. I conducted a rhetorical analysis of my fieldnotes gathered through participant observation and interview transcripts of online and in-person interviews. I…

  5. Elemental Scanning Devices Authenticate Works of Art

    Science.gov (United States)

    2013-01-01

    To better detect aluminum compounds, Marshall Space Flight Center partnered with KeyMaster Inc. (later acquired by Madison, Wisconsin-based Bruker AXS Inc.) to develop a vacuum pump system that could be attached to X-ray fluorescence (XRF) scanners. The resulting technology greatly expanded XRF scanner capabilities, and hundreds of museums now use them to authenticate artifacts and works of art.

  6. Active Authentication Using Covert Cognitive Interrogation Games

    Science.gov (United States)

    2013-06-01

    cognitive fingerprint detection methods and could be used to help increase the overall accuracy of a system of combined biometric modalities. The technical...Authentication, Game Theory, Cognitive fingerprint detection 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES...contextual analysis or explicit communicative behavior. This approach complements many other cognitive fingerprint detection methods and could be

  7. Capturing Cognitive Processing Time for Active Authentication

    Science.gov (United States)

    2014-02-01

    Description Physical biometrics relies on physical characteristics, such as fingerprints or retinal patterns. The behavioral biometric of keystroke...cognitive fingerprint for continuous authentication. Its effectiveness has been verified through a campus-wide experiment at Iowa State University...typing rhythm (CTR), Support Vector Machine (SVM), Behavioral Biometrics 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF

  8. Semiotic and semantic implications of "authenticity".

    Science.gov (United States)

    Giannini, A James

    2010-04-01

    The concept of transgenerational authenticity was examined in a Japanese cohort by Ito, et al. Reviewing that study, it was noted the eldest generation was distinguished from succeeding ones as this group grew up under U.S. military occupation. The possibility of resultant semantic and semiotic disruptions was considered.

  9. Towards an ethics of authentic practice.

    Science.gov (United States)

    Murray, Stuart J; Holmes, Dave; Perron, Amélie; Rail, Geneviève

    2008-10-01

    This essay asks how we might best elaborate an ethics of authentic practice. Will we be able to agree on a set of shared terms through which ethical practice will be understood? How will we define ethics and the subject's relation to authoritative structures of power and knowledge? We begin by further clarifying our critique of evidence-based medicine (EBM), reflecting on the intimate relation between theory and practice. We challenge the charge that our position amounts to no more than 'subjectivism' and 'antiauthoritarian' theory. We argue that an ethical practice ought to question the authority of EBM without falling into the trap of dogmatic antiauthoritarianism. In this, we take up the work of Hannah Arendt, who offers terms to help understand our difficult political relation to authority in an authentic ethical practice. We continue with a discussion of Michel Foucault's use of 'free speech' or parrhesia, which he adopts from Ancient Greek philosophy. Foucault demonstrates that authentic ethical practice demands that we 'speak truth to power.' We conclude with a consideration of recent biotechnologies, and suggest that these biomedical practices force us to re-evaluate our theoretical understanding of the ethical subject. We believe that we are at a crucial juncture: we must develop an ethics of authentic practice that will be commensurable with new and emergent biomedical subjectivities.

  10. Community Engagement as Authentic Learning with Reflection

    Science.gov (United States)

    Power, Anne

    2010-01-01

    Authentic learning in teacher education is deeply connected with students' future professional practice. This paper describes coaching and mentoring strands of a unit in the preparation of pre-service teachers and critically evaluates reflections made in terms of Professional Teacher Standards. (Contains 1 table.)

  11. Two-Factor Cancelable Biometrics Authenticator

    Institute of Scientific and Technical Information of China (English)

    Ying-Han Pang; Andrew T. B. J; David N. C. L

    2007-01-01

    Biometrics-based authentication system offers advantages of providing high reliability and accuracy.However,the contemporary authentication system is impuissance to compromise.If a biometrics data is compromised, it cannot be replaced and rendered unusable.In this paper, a cancelable biometrics-based authenticator is proposed to solve this irrevocability issue.The proposed approach is a two-factor authentication system, which requires both of the random data and facial feature in order to access the system.In this system, tokenized pseudo-random data is coupled with moment-based facial feature via inner product algorithm.The output of the product is then discretized to generate a set of private binary code, coined as 2factor-Hashing code, which is acted as verification key.If this biometrics-based verification key is compromised, a new one can be issued by replacing a different set of random number via token replacement.Then, the compromised one is rendered completely useless.This feature offers an extra protection layer against biometrics fabrication since the verification code is replaceable.Experimental results demonstrate that the proposed system provides zero Equal Error Rate in which there is a clear separation in between the genuine and the imposter distribution populations.

  12. What Do You Mean by "Authentic"? A Comparative Review of the Literature on Conceptions of Authenticity in Teaching

    Science.gov (United States)

    Kreber, Carolin; Klampfleitner, Monika; McCune, Velda; Bayne, Sian; Knottenbelt, Miesbeth

    2007-01-01

    "Authenticity in teaching" has been recognized as an important yet under-researched phenomenon. To gain greater insight into the meaning of authenticity in teaching in adult and higher education settings, the authors delved into some of the philosophical and educational literature on authenticity, giving particular attention, but not confining…

  13. Authenticity and integrity of digital mammography images.

    Science.gov (United States)

    Zhou, X Q; Huang, H K; Lou, S L

    2001-08-01

    Data security becomes more and more important in telemammography which uses a public high-speed wide area network connecting the examination site with the mammography expert center. Generally, security is characterized in terms of privacy, authenticity and integrity of digital data. Privacy is a network access issue and is not considered in this paper. We present a method, authenticity and integrity of digital mammography, here which can meet the requirements of authenticity and integrity for mammography image (IM) transmission. The authenticity and integrity for mammography (AIDM) consists of the following four modules. 1) Image preprocessing: To segment breast pixels from background and extract patient information from digital imaging and communication in medicine (DICOM) image header. 2) Image hashing: To compute an image hash value of the mammogram using the MD5 hash algorithm. 3) Data encryption: To produce a digital envelope containing the encrypted image hash value (digital signature) and corresponding patient information. 4) Data embedding: To embed the digital envelope into the image. This is done by replacing the least significant bit of a random pixel of the mammogram by one bit of the digital envelope bit stream and repeating for all bits in the bit stream. Experiments with digital IMs demonstrate the following. 1) In the expert center, only the user who knows the private key can open the digital envelope and read the patient information data and the digital signature of the mammogram transmitted from the examination site. 2) Data integrity can be verified by matching the image hash value decrypted from the digital signature with that computed from the transmitted image. 3) No visual quality degradation is detected in the embedded image compared with the original. Our preliminary results demonstrate that AIDM is an effective method for image authenticity and integrity in telemammography application.

  14. Watermarking-Based Digital Audio Data Authentication

    Directory of Open Access Journals (Sweden)

    Jana Dittmann

    2003-09-01

    Full Text Available Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing. Existing concepts address mainly image data. Depending on the necessary security level and the sensitivity to detect changes in the media, we differentiate between fragile, semifragile, and content-fragile watermarking approaches for media authentication. Furthermore, invertible watermarking schemes exist while each bit change can be recognized by the watermark which can be extracted and the original data can be reproduced for high-security applications. Later approaches can be extended with cryptographic approaches like digital signatures. As we see from the literature, only few audio approaches exist and the audio domain requires additional strategies for time flow protection and resynchronization. To allow different security levels, we have to identify relevant audio features that can be used to determine content manipulations. Furthermore, in the field of invertible schemes, there are a bunch of publications for image and video data but no approaches for digital audio to ensure data authentication for high-security applications. In this paper, we introduce and evaluate two watermarking algorithms for digital audio data, addressing content integrity protection. In our first approach, we discuss possible features for a content-fragile watermarking scheme to allow several postproduction modifications. The second approach is designed for high-security applications to detect each bit change and reconstruct the original audio by introducing an invertible audio watermarking concept. Based on the invertible audio scheme, we combine digital signature schemes and digital watermarking to provide a public verifiable data authentication and a reproduction of the original, protected with a secret key.

  15. Authentication and Authorization in Server Systems for Bio-Informatics

    CERN Document Server

    Madhuri, K Lakshmi

    2010-01-01

    Authentication and authorization are two tightly coupled and interrelated concepts which are used to keep transactions secure and help in protecting confidential information. This paper proposes to evaluate the current techniques used for authentication and authorization also compares them with the best practices and universally accepted authentication and authorization methods. Authentication verifies user identity and provides reusable credentials while authorization services stores information about user access levels. These mechanisms by which a system checks what level of access a particular authenticated user should have to view secure resources is controlled by the system

  16. An Ancient Indian Board Game as a Tool for Authentication

    Directory of Open Access Journals (Sweden)

    Sreelatha Malempati

    2011-08-01

    Full Text Available User authentication is the first phase of information security. Users should remember their passwords and recall them for authentication. Text based passwords is the traditional method for authentication. Short and simple passwords are memorable and usable but not secure. Random and lengthy passwords are secure but not memorable and usable. Graphical password schemes are introduced as alternatives to text based schemes. Few grid based authentication techniques are also proposed. The purpose of this paper is to introduce a tool to enhance the memorability and security of passwords which also provides usability. The most popular ancient Indian board game “Snakes and Ladders” is used as a tool for authentication.

  17. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  18. Examining the relationship between authenticity and self-handicapping.

    Science.gov (United States)

    Akin, Ahmet; Akin, Umran

    2014-12-01

    Self-handicapping includes strategies of externalization in which people excuse failure and internalize success, but which also prevents them from behaving in an authentic way. The goal was to investigate the relation of authenticity with self-handicapping. The study was conducted with 366 university students (176 men, 190 women; M age = 20.2 yr.). Participants completed the Turkish version of the Authenticity Scale and the Self-handicapping Scale. Self-handicapping was correlated positively with two factors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor. A multiple regression analysis indicated that self-handicapping was predicted positively by self-alienation and accepting external influence and negatively by authentic living, accounting for 21% of the variance collectively. These results demonstrated the negative association of authenticity with self-handicapping.

  19. Vein matching using artificial neural network in vein authentication systems

    Science.gov (United States)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  20. CPK-based grid authentication: a step forward

    Institute of Scientific and Technical Information of China (English)

    WANG Hai-yan; WANG Ru-chuan

    2007-01-01

    Effective grid authentication plays a critical role in grid security, which has been recognized as a key issue in the designing and extension of grid technologies. At present, public key infrastructure (PKI) has been widely applied for grid authentication, and this article proposes a novel grid authentication mechanism, which is based on combined public key (CPK) employing elliptic curve cryptography (ECC). The designing structure of the new grid authentication mechanism and its implementation procedure are described in details.Property analysis of the new mechanism is also made in comparison with that of the globus security infrastructure (GSI) authentication, which leads to the conclusion that CPK-based grid authentication, may be applied as an optimized approach towards efficient and effective grid authentication.

  1. Multimodal person authentication on a smartphone under realistic conditions

    Science.gov (United States)

    Morris, Andrew C.; Jassim, Sabah; Sellahewa, Harin; Allano, Lorene; Ehlers, Johan; Wu, Dalei; Koreman, Jacques; Garcia-Salicetti, Sonia; Ly-Van, Bao; Dorizzi, Bernadette

    2006-05-01

    Verification of a person's identity by the combination of more than one biometric trait strongly increases the robustness of person authentication in real applications. This is particularly the case in applications involving signals of degraded quality, as for person authentication on mobile platforms. The context of mobility generates degradations of input signals due to the variety of environments encountered (ambient noise, lighting variations, etc.), while the sensors' lower quality further contributes to decrease in system performance. Our aim in this work is to combine traits from the three biometric modalities of speech, face and handwritten signature in a concrete application, performing non intrusive biometric verification on a personal mobile device (smartphone/PDA). Most available biometric databases have been acquired in more or less controlled environments, which makes it difficult to predict performance in a real application. Our experiments are performed on a database acquired on a PDA as part of the SecurePhone project (IST-2002-506883 project "Secure Contracts Signed by Mobile Phone"). This database contains 60 virtual subjects balanced in gender and age. Virtual subjects are obtained by coupling audio-visual signals from real English speaking subjects with signatures from other subjects captured on the touch screen of the PDA. Video data for the PDA database was recorded in 2 recording sessions separated by at least one week. Each session comprises 4 acquisition conditions: 2 indoor and 2 outdoor recordings (with in each case, a good and a degraded quality recording). Handwritten signatures were captured in one session in realistic conditions. Different scenarios of matching between training and test conditions are tested to measure the resistance of various fusion systems to different types of variability and different amounts of enrolment data.

  2. Kierkegaard and Sartre on God and Authenticity

    Directory of Open Access Journals (Sweden)

    Amirabbas Alizamani

    2014-09-01

    Full Text Available To evaluate and judge the notion of humanity, one has to use logic and logical criteria, since every notion's delimitation in logic requires an exact definition to be offered. And it is by definition that one can distinguish between one particular notion or extension and other notions and extensions. Different definitions have been suggested of the nature of humanity throughout the history of ideas every one of which casts light on an aspect of human existence. The intricate and deep nature of human being may have been the main obstacle in the way to an exact definition of human being. The past masters have defined man as a rational animal; i.e. man is inside the family of animals but an animal that have the power of thinking. Human rationality is not merely a matter of speaking, but rather it covers his all internal and external aspects. Since man is consisted of mind and body. Contemporary thinkers have left behind the traditional definition of man and approached him from different perspectives. In any case, what is important for us is human being's humanity.    On the other hand, the notion of humanity has always had an inseparable relationship with ethics. Needless to say, moral rules and maxims comprise a set of determinate oughts and ought-nots which should be adopted and followed by every human individual if s/he seeks to reach happiness. These moral rules are sometimes associated with religious and divine concepts which include a faith background and sometimes they go shoulder to shoulder with the rational rules where there is no occasion for extra-rational elements. One of the fundamental notions of ethics is authenticity, or to put it otherwise, how a man is authentic? What are the criteria of an authentic man? Authenticity can be verbally analyzed to the following notions: Authenticity in the sense of having a determinate family background. Authenticity in the sense of having a steady and impenetrable structure Authenticity in the

  3. A Brief Analysis of Features of Authentic Listening in EFL Teaching

    Institute of Scientific and Technical Information of China (English)

    GE Xiao-yan

    2016-01-01

    In recent decades, there is an increasing awareness among EFL teachers that listening is no longer being regarded as a receptive skill to assist other language skills. Instead, listening itself is viewed as an important communicative skill that is urgent-ly required in the real-world communication. This project aims to identify the main features of authentic listening that are re-quired in EFL teaching which are Purpose and Expectation, Environmental Background Clues and Informal Speech.

  4. Analysis of electromagnetic scattering by nearly periodic structures: an LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, William Arthur; Warne, Larry Kevin; Jorgenson, Roy Eberhardt; Wilton, Donald R. (University of Houston, Houston, TX); Basilio, Lorena I.; Peters, David William; Capolino, F. (University of Houston, Houston, TX)

    2006-10-01

    In this LDRD we examine techniques to analyze the electromagnetic scattering from structures that are nearly periodic. Nearly periodic could mean that one of the structure's unit cells is different from all the others--a defect. It could also mean that the structure is truncated, or butted up against another periodic structure to form a seam. Straightforward electromagnetic analysis of these nearly periodic structures requires us to grid the entire structure, which would overwhelm today's computers and the computers in the foreseeable future. In this report we will examine various approximations that allow us to continue to exploit some aspects of the structure's periodicity and thereby reduce the number of unknowns required for analysis. We will use the Green's Function Interpolation with a Fast Fourier Transform (GIFFT) to examine isolated defects both in the form of a source dipole over a meta-material slab and as a rotated dipole in a finite array of dipoles. We will look at the numerically exact solution of a one-dimensional seam. In order to solve a two-dimensional seam, we formulate an efficient way to calculate the Green's function of a 1d array of point sources. We next formulate ways of calculating the far-field due to a seam and due to array truncation based on both array theory and high-frequency asymptotic methods. We compare the high-frequency and GIFFT results. Finally, we use GIFFT to solve a simple, two-dimensional seam problem.

  5. A nuclear method to authenticate Buddha images

    Science.gov (United States)

    Khaweerat, S.; Ratanatongchai, W.; Channuie, J.; Wonglee, S.; Picha, R.; Promping, J.; Silva, K.; Liamsuwan, T.

    2015-05-01

    The value of Buddha images in Thailand varies dramatically depending on authentication and provenance. In general, people use their individual skills to make the justification which frequently leads to obscurity, deception and illegal activities. Here, we propose two non-destructive techniques of neutron radiography (NR) and neutron activation autoradiography (NAAR) to reveal respectively structural and elemental profiles of small Buddha images. For NR, a thermal neutron flux of 105 n cm-2s-1 was applied. NAAR needed a higher neutron flux of 1012 n cm-2 s-1 to activate the samples. Results from NR and NAAR revealed unique characteristic of the samples. Similarity of the profile played a key role in the classification of the samples. The results provided visual evidence to enhance the reliability of authenticity approval. The method can be further developed for routine practice which impact thousands of customers in Thailand.

  6. Biometric user authentication using Gray Wolf Optimization

    Directory of Open Access Journals (Sweden)

    V.Chandrasekar

    2015-08-01

    Full Text Available Major issue in computer security is the need to protect data and computer system from intruders. Hence user authentication is certainly an interesting option for standard security. Keystrokedynamics is a biometrics technique and it plays an important role in user authentication.It is based on the analysis of typing rhythm. In this paper the feature data values are recorded, Hausdroff timing values are calculated and stored as a dataset. Using the dataset the keystroke dynamics provide a more performance. The proposed Gray wolf optimization is used for feature selection. By providing sufficient training and testing the text length, number of dataset and same keyboard type, the keystroke biometric effectively identified the genuine user and impostor.

  7. Keystroke Dynamics Authentication For Collaborative Systems

    CERN Document Server

    Giot, Romain; Rosenberger, Christophe; 10.1109/CTS.2009.5067478

    2009-01-01

    We present in this paper a study on the ability and the benefits of using a keystroke dynamics authentication method for collaborative systems. Authentication is a challenging issue in order to guarantee the security of use of collaborative systems during the access control step. Many solutions exist in the state of the art such as the use of one time passwords or smart-cards. We focus in this paper on biometric based solutions that do not necessitate any additional sensor. Keystroke dynamics is an interesting solution as it uses only the keyboard and is invisible for users. Many methods have been published in this field. We make a comparative study of many of them considering the operational constraints of use for collaborative systems.

  8. User Authentication Based On Keystroke Dynamics

    Directory of Open Access Journals (Sweden)

    J.R Nisha

    2014-03-01

    Full Text Available The most common way to enforce access control is user authentication based on username and password. This form of access control has many flaws which make it vulnerable to hacking. Biometric authentication such as the keystroke dynamics is used in which the keyboard is used in order to identify users. Then the classifier is tailored to each user to find out whether the given user is genuine or not. The contribution of this approach is twofold: first it reduces the possibility of over fitting second it allows scalability to a high volume of users. Here, measured mean, median values, and standard deviation of keystroke features such as latency, dwell time, digraph and their combination are used. The algorithms used for feature subset selection are Particle Swarm Optimization (PSO, Genetic Algorithm (GA, Ant Colony Optimization (ACO and the proposed Renovated Artificial Bee Colony Optimization (RABCO algorithm. Back Propagation Neural Network (BPNN is used for classification.

  9. Authentication Without Identification using Anonymous Credential System

    CERN Document Server

    Damodaram, A

    2009-01-01

    Privacy and security are often intertwined. For example, identity theft is rampant because we have become accustomed to authentication by identification. To obtain some service, we provide enough information about our identity for an unscrupulous person to steal it (for example, we give our credit card number to Amazon.com). One of the consequences is that many people avoid e-commerce entirely due to privacy and security concerns. The solution is to perform authentication without identification. In fact, all on-line actions should be as anonymous as possible, for this is the only way to guarantee security for the overall system. A credential system is a system in which users can obtain credentials from organizations and demonstrate possession of these credentials. Such a system is anonymous when transactions carried out by the same user cannot be linked. An anonymous credential system is of significant practical relevance because it is the best means of providing privacy for users.

  10. Authenticated hash tables

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Papamanthou, Charalampos; Tamassia, Roberto

    2008-01-01

    fixed constants 0 1/ε, the server can provide a proof of integrity of the answer to a (non-)membership query in constant time, requiring O(nε/logκε--1 n) time to treat updates, yet keeping the communication and verification costs constant. This is the first construction......Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so that the client can save space or achieve load balancing. Authenticating the hash table functionality, i.e., verifying...... the correctness of queries answered by the server and ensuring the integrity of the stored data, is crucial because the server, lying outside the administrative control of the client, can be malicious. We design efficient and secure protocols for optimally authenticating membership queries on hash tables: for any...

  11. Location-assured, multifactor authentication on smartphones via LTE communication

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.

  12. Design and Implementation of Multitier Authentication Scheme in Cloud

    Directory of Open Access Journals (Sweden)

    Maninder Singh

    2012-09-01

    Full Text Available The purpose of this paper is to present the design of a secure and more advanced authentication scheme for executing secure financial transactions over Internet. There has been continuous change in technology day by day, so security mechanisms like authentication schemes are also required to be updated. The security measures have very crucial role in banking and financial sector. For any internet application which deals with personal and private information exchange, single tier authentication is inadequate. Authentication schemes that imply more than one tier for authentication are comparatively safer than single tier authentication scheme. Properly designed secure authentication mechanisms are more fraud deterrent. Various multi-tier authentication schemes have been proposed and implemented in various computing domains. The main drawback of these schemes is that most of them do not provide security against insider attacks. In case of Cloud Computing, another drawback is that the whole authentication control lies toward the server side. It is very hard to trust the third party server in Cloud Computing. This work proposes a scheme in which authentication process is carried out in two levels or two tiers. First tier uses simple username and password. Second tier is pre-determined series of steps. The advantage of this scheme is that it does not require any additional hardware and software. So this can be used and accessed from anywhere across the globe.

  13. Human Factors in Web-Authentication

    Science.gov (United States)

    2009-02-06

    a database , along with the associated user ID, an expiration time, and validity bit. When the user clicks on the registration link, if r is still...prediction, we simulated a MITM social engineering attack against her the next time she logged in. After she entered her username and password, we redi ...approach to resisting phishing attacks is better password management. Pass- words are still the dominant method of Web authentication. Password databases

  14. Mutual authentication in electronic commerce transactions.

    OpenAIRE

    2008-01-01

    Electronic commerce is a large and ever growing industry. Online transactions are returning ever-growing revenues to electronic merchants. The e-commerce industry is still facing a range of problems concerning the process of completion of online transactions. Such problems are connected to consumer fears dealing with the identity of online merchants, their security pre- cautions and methods for accepting online payments. This thesis develops and presents a Mutual Authentication Model (MAM), w...

  15. Authentication of shankhpushpi by RAPD markers

    Directory of Open Access Journals (Sweden)

    Showkat Hussain Ganie

    2012-05-01

    Full Text Available Background: “Shankhpushpi”, an important indigenous drug of Ayurveda, an ancient system of Indian medicine, improves memory power and intellect. It is used in many Ayurvedic formulations, either singly or in combination with other herbs, meant for sleeplessness, epilepsy, hallucinations and anxiety. At least three different plant species viz., Clitoria ternatea, Convolvulus pluricaulis and Evolvulus alsinoides are as the source of this drug in the different parts of the country. Because of increased demand and high price, shankhpushpi is often adulterated in the trade by other related species. Therefore, a reliable authentication method is needed to facilitate differentiation/identification of the genuine material from its adulterants. The present study was aimed at developing RAPD-based markers for identification of C. pluricaulis, E. alsinoides and C. ternatea, and analyzing the market samples of the drug to ascertain their authenticity. Material and Methods: Fresh samples of source plants of shankhpushpi were collected from Ghaziabad and Delhi. The market samples were procured from the crude-drug markets of different geographical regions of India. The amplified polymorphic DNA (RAPD technique was employed for characterization of genuine and market samples. Twenty-five 11-mer oligonucleotide primers were used to amplify the DNA isolated. Results: Out of 25 primers, only four (OPN-03, OPN-04, OPN-05 and OPN-06 yielded amplification products that produced clear and reproducible bands, which were used to characterize the market samples. RAPD profile of some market samples did not match with the authentic samples, indicating that these samples were either adulterated or spurious. Conclusion: The RAPD markers developed in this study may provide guidance for the authentication of plant materials traded as shankhpushpi.

  16. An Authentication Technique Based on Classification

    Institute of Scientific and Technical Information of China (English)

    李钢; 杨杰

    2004-01-01

    We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different to the original watermark, and different kinds of modification lead to different extracted watermarks. In this paper, different kinds of modification are considered as classes, and we used classification algorithm to recognize the modifications with high probability. Simulation results show that the proposed method is potential and effective.

  17. Cost Effective RADIUS Authentication for Wireless Clients

    Directory of Open Access Journals (Sweden)

    Alexandru ENACEANU

    2010-12-01

    Full Text Available Network administrators need to keep administrative user information for each network device, but network devices usually support only limited functions for user management. WLAN security is a modern problem that needs to be solved and it requires a lot of overhead especially when applied to corporate wireless networks. Administrators can set up a RADIUS server that uses an external database server to handle authentication, authorization, and accounting for network security issues.

  18. The Bird Box Survey Project

    Science.gov (United States)

    Willis, Patrick

    2014-01-01

    When high school students are asked what's the best part of science class, many will say it's the field trips. Students enjoy engaging in authentic, community-based science outside the classroom. To capitalize on this, Patrick Willis created the Bird Box Survey Project for his introductory field biology class. The project takes students…

  19. Keystroke Biometric For User Authentication - A Review

    Directory of Open Access Journals (Sweden)

    Pallavi Yevale

    2013-11-01

    Full Text Available Conventionally, users are authenticated under the normal user name and password procedure. The latest trend in authentication is using Biometric as a feature for identifying users. By using biometrics as the integral part of authentication, the chances of imposters entering in a secured system becomes very low. Keystroke Biometric uses the behavioral typing pattern as a biometric for identifying a user. In this paper, a survey is carried out on three different approaches that implements keystroke biometric system. 1 Clustering Di-Graph (CDG: This method uses clustering digraphs based on temporal features. This method joins consecutive keystrokes for representing keystroke pattern. 2 Hamming Distance-like Filtering (HDF: In this method, the dissimilarity has their EER(Equal Error Rate depending upon filtering of predefined value of gathered data. It is based on resemblance to Hamming Distance. 3 Free Text and Euclidean Distance based Approach (FTED: In this method, keys are classified into two halves (left - right and four lines (total eight groups and then timing vectors (of flight time are obtained between these key groups. For distinguishing the legitimate user from imposters, Timing Vectors are used.

  20. Chemical composition analysis and authentication of whisky.

    Science.gov (United States)

    Wiśniewska, Paulina; Dymerski, Tomasz; Wardencki, Waldemar; Namieśnik, Jacek

    2015-08-30

    Whisky (whiskey) is one of the most popular spirit-based drinks made from malted or saccharified grains, which should mature for at least 3 years in wooden barrels. High popularity of products usually causes a potential risk of adulteration. Thus authenticity assessment is one of the key elements of food product marketing. Authentication of whisky is based on comparing the composition of this alcohol with other spirit drinks. The present review summarizes all information about the comparison of whisky and other alcoholic beverages, the identification of type of whisky or the assessment of its quality and finally the authentication of whisky. The article also presents the various techniques used for analyzing whisky, such as gas and liquid chromatography with different types of detectors (FID, AED, UV-Vis), electronic nose, atomic absorption spectroscopy and mass spectrometry. In some cases the application of chemometric methods is also described, namely PCA, DFA, LDA, ANOVA, SIMCA, PNN, k-NN and CA, as well as preparation techniques such SPME or SPE.

  1. Does Memory Modification Threaten Our Authenticity?

    Science.gov (United States)

    Erler, Alexandre

    2011-11-01

    One objection to enhancement technologies is that they might lead us to live inauthentic lives. Memory modification technologies (MMTs) raise this worry in a particularly acute manner. In this paper I describe four scenarios where the use of MMTs might be said to lead to an inauthentic life. I then undertake to justify that judgment. I review the main existing accounts of authenticity, and present my own version of what I call a "true self" account (intended as a complement, rather than a substitute, to existing accounts). I briefly describe current and prospective MMTs, distinguishing between memory enhancement and memory editing. Moving then to an assessment of the initial scenarios in the light of the accounts previously described, I argue that memory enhancement does not, by its very nature, raise serious concerns about authenticity. The main threat to authenticity posed by MMTs comes, I suggest, from memory editing. Rejecting as inadequate the worries about identity raised by the President's Council on Bioethics in Beyond Therapy, I argue instead that memory editing can cause us to live an inauthentic life in two main ways: first, by threatening its truthfulness, and secondly, by interfering with our disposition to respond in certain ways to some past events, when we have reasons to respond in such ways. This consideration allows us to justify the charge of inauthenticity in cases where existing accounts fail. It also gives us a significant moral reason not to use MMTs in ways that would lead to such an outcome.

  2. Authentication of Primary User in Cognitive Radio

    Directory of Open Access Journals (Sweden)

    Mr. Sudesh Gupta

    2012-03-01

    Full Text Available Cognitive Radio (CR or soft ware defined radio is a new concept for maximizing the utilization of the radio spectrum. The CR can sense the unused frequency spectrum at any time from the wide range of wireless radio spectrum. This gives the efficient use of radio resources. In cognitive radio environment, a primary licensed user (PU can share spectrum availability information with a secondary user, the secondary user will then be able to access available frequency spectrum. However, a secondary user should always need to verify the authenticity of the spectrum occupancy information whether it comes from the authentic primary users. Without the verification, a malicious user can give false information about the spectrum occupancy. This can result interference to the primary users and minimize available spectrum for the secondary usage. In this paper, we have develop an efficient technique to verify the source of the spectrum occupancy information is to be from the authentic primary user , by doing this we are maximizing the spectrum utilization efficiency and minimizing any interference to the primary licensed users.

  3. The authentic worker's well-being and performance: the relationship between authenticity at work, well-being, and work outcomes.

    Science.gov (United States)

    van den Bosch, Ralph; Taris, Toon W

    2014-01-01

    Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications.

  4. Modern Authentication Techniques in Smart Phones: Security and Usability Perspective

    Directory of Open Access Journals (Sweden)

    Usman Shafique

    2017-01-01

    Full Text Available A smartphone has more advanced computing ability and connectivity than basic featured phones. Presently, we are moving from the Internet society to a mobile society where more and more access to the information is required. This has resulted in a mobile security which is no longer immanent, but imperative. Smartphone authentication has received substantial attention of the research community for the past several years because there have been modern developments beyond the classical PINs and passwords making user authentication more challenging. In this paper, we critically analyze the attacks and the vulnerabilities in smartphones’ authentication mechanisms. A comparative analysis of different authentication techniques along with the usage of the different authentication methods is discussed which lead the end-user towards choosing the most suitable and customizable authentication technique.

  5. Authenticity, life satisfaction, and distress: a longitudinal analysis.

    Science.gov (United States)

    Boyraz, Güler; Waits, J Brandon; Felix, Victoria A

    2014-07-01

    The purpose of the present study was to examine the reciprocal relationships between authenticity and measures of life satisfaction and distress using a 2-wave panel study design. Data were collected from 232 college students attending 2 public universities. Structural equation modeling was used to analyze the data. The results of the cross-lagged panel analysis indicated that after controlling for temporal stability, initial authenticity (Time 1) predicted later distress and life satisfaction (Time 2). Specifically, higher levels of authenticity at Time 1 were associated with increased life satisfaction and decreased distress at Time 2. Neither distress nor life satisfaction at Time 1 significantly predicted authenticity at Time 2. However, the relationship between Time 1 distress and Time 2 authenticity was not significantly different from the relationship between Time 1 authenticity and Time 2 distress. Results are discussed in light of humanistic-existential theories and the empirical research on well-being.

  6. A Mixed Mechanism Mutual Authentication Protocol for TETRA

    Institute of Scientific and Technical Information of China (English)

    LI Hui; YANG Yi-xian

    2005-01-01

    The mutual authentication between the MS and Switching and Management Infrastructure (SwMI) in the TErrestrial Trunked RAdio (TETRA) system are analysed in this paper and theoretical analysis shows that some drawbacks exist when using the shared secrets in the Challenge-Response protocol: (1) It's difficult to store and maintain large amount of MS's authentication key in the SwMI when the network is large. (2) It's hard to support non-renouncement services when using the symmetrical cryptography. An authentication protocol for TETRA using Identity-based Public Keys for the SwMI to authenticate the MSs and an authentication protocol based on hash chain for the MSs to authenticate the SwMI are presented, which can effectively compensate the above-mentioned drawbacks.

  7. Engaging Students in Authentic Microbiology Research in an Introductory Biology Laboratory Course is Correlated with Gains in Student Understanding of the Nature of Authentic Research and Critical Thinking

    Directory of Open Access Journals (Sweden)

    Brittany J. Gasper

    2013-02-01

    Full Text Available Recent recommendations for biology education highlight the role of authentic research experiences early in undergraduate education as a means of increasing the number and quality of biology majors. These experiences will inform students on the nature of science, increase their confidence in doing science, as well as foster critical thinking skills, an area that has been lacking despite it being one of the desired outcomes at undergraduate institutions and with future employers. With these things in mind, we have developed an introductory biology laboratory course where students design and execute an authentic microbiology research project. Students in this course are assimilated into the community of researchers by engaging in scholarly activities such as participating in inquiry, reading scientific literature, and communicating findings in written and oral formats. After three iterations of a semester-long laboratory course, we found that students who took the course showed a significant increase in their understanding of the nature of authentic research and their level of critical thinking skills.

  8. Engaging Students in Authentic Microbiology Research in an Introductory Biology Laboratory Course is Correlated with Gains in Student Understanding of the Nature of Authentic Research and Critical Thinking.

    Science.gov (United States)

    Gasper, Brittany J; Gardner, Stephanie M

    2013-01-01

    Recent recommendations for biology education highlight the role of authentic research experiences early in undergraduate education as a means of increasing the number and quality of biology majors. These experiences will inform students on the nature of science, increase their confidence in doing science, as well as foster critical thinking skills, an area that has been lacking despite it being one of the desired outcomes at undergraduate institutions and with future employers. With these things in mind, we have developed an introductory biology laboratory course where students design and execute an authentic microbiology research project. Students in this course are assimilated into the community of researchers by engaging in scholarly activities such as participating in inquiry, reading scientific literature, and communicating findings in written and oral formats. After three iterations of a semester-long laboratory course, we found that students who took the course showed a significant increase in their understanding of the nature of authentic research and their level of critical thinking skills.

  9. Buddy enhanced return routability for authentication in mobile IPv6

    Science.gov (United States)

    Whitehead, Matthew E. N.; Medidi, Sirisha R.

    2004-08-01

    This paper proposes an improved form of authentication security for Mobile IPv6 called buddy enhanced return routability. Enhanced return routability builds on the foundation of return routability and extends that technique through the use of stochastic route selection for authentication messages. Theoretical work and simulation results show that enhanced return routability strengthens authentication security without adding restrictive overhead requirements or opening up new security holes.

  10. Continuous-variable quantum identity authentication based on quantum teleportation

    Science.gov (United States)

    Ma, Hongxin; Huang, Peng; Bao, Wansu; Zeng, Guihua

    2016-06-01

    A continuous-variable quantum identity authentication protocol, which is based on quantum teleportation, is presented by employing two-mode squeezed vacuum state and coherent state. The proposed protocol can verify user's identity efficiently with a new defined fidelity parameter. Update of authentication key can also be implemented in our protocol. Moreover, the analysis shows its feasibility and security under the general Gaussian-cloner attack on authentication key, which is guaranteed by quantum entanglement, insertion of decoy state and random displacement.

  11. Network-based Fingerprint Authentication System Using a Mobile Device

    OpenAIRE

    Zhang, Qihu

    2016-01-01

    Abstract— Fingerprint-based user authentication is highly effective in networked services such as electronic payment, but conventional authentication solutions have problems in cost, usability and security. To resolve these problems, we propose a touch-less fingerprint authentication solution, in which a mobile device's built-in camera is used to capture fingerprint image, and then it is sent to the server to determine the identity of the user. We designed and implemented a prototype as an a...

  12. Retrofitting mutual authentication to GSM using RAND hijacking

    OpenAIRE

    Khan, Mohammed Shafiul Alam; MITCHELL, CHRIS J.

    2016-01-01

    As has been widely discussed, the GSM mobile telephony system only offers unilateral authentication of the mobile phone to the network; this limitation permits a range of attacks. While adding support for mutual authentication would be highly beneficial, changing the way GSM serving networks operate is not practical. This paper proposes a novel modification to the relationship between a Subscriber Identity Module (SIM) and its home network which allows mutual authentication without changing a...

  13. Reducing Computational Time of Basic Encryption and Authentication Algorithms

    Directory of Open Access Journals (Sweden)

    Sandeep Kumar,

    2011-04-01

    Full Text Available Today most of data are sending via the internet for sharing, so the trust of data files is decreased. For the trust more security and authentication is needed, less security increase the liability ofattacks on data. Digital signature of the data is a solution to this security problem which provides the reliability, authenticity and accuracy. Most basic algorithm for security and authentication is RSA, DSA, algorithms which uses the different key of different sizes. This work presents ECDSA algorithm to encrypt the data, use parameterized hash algorithm to authenticate the data and also compare both RSA and ECDSA methods in respect of time parameters.

  14. Ninth Grade Student Responses to Authentic Science Instruction

    Science.gov (United States)

    Ellison, Michael Steven

    This mixed methods case study documents an effort to implement authentic science and engineering instruction in one teacher's ninth grade science classrooms in a science-focused public school. The research framework and methodology is a derivative of work developed and reported by Newmann and others (Newmann & Associates, 1996). Based on a working definition of authenticity, data were collected for eight months on the authenticity in the experienced teacher's pedagogy and in student performance. Authenticity was defined as the degree to which a classroom lesson, an assessment task, or an example of student performance demonstrates construction of knowledge through use of the meaning-making processes of science and engineering, and has some value to students beyond demonstrating success in school (Wehlage et al., 1996). Instruments adapted for this study produced a rich description of the authenticity of the teacher's instruction and student performance. The pedagogical practices of the classroom teacher were measured as moderately authentic on average. However, the authenticity model revealed the teacher's strategy of interspersing relatively low authenticity instructional units focused on building science knowledge with much higher authenticity tasks requiring students to apply these concepts and skills. The authenticity of the construction of knowledge and science meaning-making processes components of authentic pedagogy were found to be greater, than the authenticity of affordances for students to find value in classroom activities beyond demonstrating success in school. Instruction frequently included one aspect of value beyond school, connections to the world outside the classroom, but students were infrequently afforded the opportunity to present their classwork to audiences beyond the teacher. When the science instruction in the case was measured to afford a greater level of authentic intellectual work, a higher level of authentic student performance on

  15. The New Enhanced Simple Authenticated Key Agreement Algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Simple authenticated key agreement algorithm is one of the Diffie-Hellman key agreement variations. It prevents man-inthe-middle attack with only two more packets required to agree on the secret session key, but it has some weaknesses. In this paper, a new enhanced simple authenticated key agreement algorithm is proposed to overcome these weaknesses on the basis of analyzing the weaknesses of the related protocols. The new enhanced simple authenticated key agreement algorithm can get over replay attack and password guessing attack, provide perfect forward secrecy, and hold the merits of the simple authenticated key agreement algorithm.

  16. Research and improvement on the limitation of authentication test

    Institute of Scientific and Technical Information of China (English)

    Liu Jiafen; Zhou Mingtian

    2008-01-01

    This paper elaborated on the limitation of authentication test theorem, illustrated the fundamental cause of that limitation through examples, then enhanced authentication test to solve this problem, and also proved the soundness of that improvement with formal method.The enhaneed theory can deal with protocols with test component as proper subterm of other regular node's component under certain conditions, and extend the application scope of authentication test.With enhanced authentication test, the automatic protocol verification tools will be more efficient and convenient.

  17. Secure authentication of classical messages with single photons

    Institute of Scientific and Technical Information of China (English)

    Wang Tian-Yin; Wen Qiao-Yan; Zhu Fu-Chen

    2009-01-01

    This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function.The security analysis of this scheme is also given,which shows that anyone cannot forge valid message authentication codes (MACs).In addition,the lengths of the authentication key and the MACs are invariable and shorter,in comparison with those presented authentication schemes.Moreover,quantum data storage and entanglement are not required in this scheme.Therefore,this scheme is more efficient and economical.

  18. Teaching labs the Compass way: Engaging students in authentic research practices and regular self-reflection

    CERN Document Server

    Gandhi, Punit R; Zaniewski, Anna M; Reinholz, Daniel L; Dounas-Frazer, Dimitri R

    2014-01-01

    Aligning science instruction with authentic scientific practices is a national priority in education. In particular, undergraduate laboratory courses have been criticized as employing recipe-style activities with little emphasis on inquiry and design. This paper offers an alternative laboratory-style course, offered via the Compass Project at UC Berkeley. Using a model-based approach, undergraduate physics students engaged in authentic research practices by iteratively refining their experimental and theoretical designs. The course also promoted lifelong learning skills, such as persistence and organization, as a means of supporting students to learn productively. We document growth in students' understanding of scientific measurement and, drawing on student reflections, we suggest areas for future research focused on improving students' lifelong learning skills.

  19. The Impact of Authentic Materials and Tasks on Students’ Communicative Competence at a Colombian Language School

    Directory of Open Access Journals (Sweden)

    César Augusto Castillo Losada

    2017-01-01

    Full Text Available This article reports on a study carried out in a foreign language school at a Colombian public university. Its main purpose was to analyze the extent to which the use of authentic materials and tasks contributes to the enhancement of the communicative competence on an A2 level English course. A mixed study composed of a quasi-experimental and a descriptive-qualitative research design was implemented by means of a pre-test, a post-test, observations, semi-structured interviews, surveys, and diaries. The findings showed that the use of authentic materials and tasks, within the framework of a pedagogical project, had an impact on students’ communicative competence progress and on the teaching practices of the experimental group teacher.

  20. Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things.

    Science.gov (United States)

    Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido

    2016-01-07

    This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie-Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes.

  1. Philosophically Rooted Educational Authenticity as a Normative Ideal for Education: Is the International Baccalaureate's Primary Years Programme an Example of an Authentic Curriculum?

    Science.gov (United States)

    Lüddecke, Florian

    2016-01-01

    Whereas the importance of authenticity in relation to educational contexts has been highlighted, educational authenticity (EA) has mainly referred to a real-life/world convergence or the notion of teacher authenticity, implying that authenticity can be taught and learnt. This view, however, has largely overlooked philosophical considerations so…

  2. Eyeglass Large Aperture, Lightweight Space Optics FY2000 - FY2002 LDRD Strategic Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Hyde, R

    2003-02-10

    differences in their requirements and implementations, the fundamental difficulty in utilizing large aperture optics is the same for all of these applications: It is extremely difficult to design large aperture space optics which are both optically precise and can meet the practical requirements for launch and deployment in space. At LLNL we have developed a new concept (Eyeglass) which uses large diffractive optics to solve both of these difficulties; greatly reducing both the mass and the tolerance requirements for large aperture optics. During previous LDRD-supported research, we developed this concept, built and tested broadband diffractive telescopes, and built 50 cm aperture diffraction-limited diffractive lenses (the largest in the world). This work is fully described in UCRL-ID-136262, Eyeglass: A Large Aperture Space Telescope. However, there is a large gap between optical proof-of-principle with sub-meter apertures, and actual 50 meter space telescopes. This gap is far too large (both in financial resources and in spacecraft expertise) to be filled internally at LLNL; implementation of large aperture diffractive space telescopes must be done externally using non-LLNL resources and expertise. While LLNL will never become the primary contractor and integrator for large space optical systems, our natural role is to enable these devices by developing the capability of producing very large diffractive optics. Accordingly, the purpose of the Large Aperture, Lightweight Space Optics Strategic Initiative was to develop the technology to fabricate large, lightweight diffractive lenses. The additional purpose of this Strategic Initiative was, of course, to demonstrate this lens-fabrication capability in a fashion compellingly enough to attract the external support necessary to continue along the path to full-scale space-based telescopes. During this 3 year effort (FY2000-FY2002) we have developed the capability of optically smoothing and diffractively-patterning thin meter

  3. Relations between student perceptions of assessment authenticity, study approaches and learning outcome

    NARCIS (Netherlands)

    Gulikers, J.T.M.; Bastiaens, Th.J.; Kirschner, P.A.; Kester, L.

    2006-01-01

    This article examines the relationships between perceptions of authenticity and alignment on study approach and learning outcome. Senior students of a vocational training program performed an authentic assessment and filled in a questionnaire about the authenticity of various assessment characterist

  4. Pathways to Authenticity in Operatic Interpretation

    DEFF Research Database (Denmark)

    Grund, Cynthia M.; Westney, WIlliam

    ? Conventional pedagogy can often fall short here, and this is why non-traditional means have been developed by one of the presenters in his “Un-Master Class” workshop for performers. A principal hallmark of this workshop is the active involvement of the audience as part of a proposed “circuit of meaning,” both...... of the performer, as well as providing ways of assessing the degree to which authenticity of interpretation is experienced by the audience. During this process, loci for the emergence of musical meaning appear. In the course of the presentation we will identify and examine these and the role they play...

  5. New Semi-Fragile Authentication Watermarking

    Institute of Scientific and Technical Information of China (English)

    孙鑫; 易开祥; 等

    2002-01-01

    In this paper we propse a semi-fragile watermarking scheme,which can be used for image authentication.Let the original image be performed by l-level discrete wavelet transformation.An approximate wavelet coefficient matrix of the original image and real-value chaotic sequences are than used to generate the content-based and secure watermark.The watermark is embedded into original image by using by using HVS.The tamper detection can idantify the tampered region of the received watermarked image,Experimental results are given.

  6. Beating the forger: authenticating ceramic antiquities

    Science.gov (United States)

    Stoneham, Doreen; Stoneham, Marshall

    2010-09-01

    Today's forger may have skills to match the artists and craftsmen of the past. But can they be exposed by scientific methods? Ceramic antiquities - including pottery, porcelains, and bronzes with a casting core - have long been valued, and demonstrable antiquity is crucial. Thermoluminescence provides key evidence as to when the object was fired. We describe the basic ideas, the methods themselves, and some of the potential limitations. Examples illustrate the remarkable ingenuity of forgers, who are making determined efforts to beat the physics-based tests of authenticity.

  7. Simulation for Authentic Learning in Informal Education.

    Science.gov (United States)

    Dupuis, Jason; Ludwig-Palit, DeDee

    2016-01-01

    In 2011, the Museum of Science and Industry in Chicago, Illinois embarked on the creation of a program that allows middle and high school students to explore community health issues using human patient simulation. MedLab was created to engage students in an authentic exploration of medical science, biology, and human anatomy, with a particular focus on how these fields apply to learners' lives. The program content is made relevant through an emphasis on personal health, community health, and medical science career pathways. This article explores the development, implementation, use of technology, and outcomes of MedLab.

  8. ECAKP: Encrypt Collect Authenticate Kill Play

    CERN Document Server

    El-Khouly, Mahmoud Mohamed

    2011-01-01

    We are taught from a young age that plagiarism (copying other's work) is wrong. However, the problem of Illegal copies of multimedia data is exacerbated by the widespread availability of circumvention devices, which enable people to make infringing copies of multimedia data. Recently, Joint Video Compression and Encryption (JVCE) has gained increased attention to reduce the computational complexity of video compression, as well as provide encryption of multimedia data. In this paper, a novel protection method for multimedia data (ECAKP) is proposed. It combines encryption process and compression with authenticating process. The method had been implemented and the results are discussed in detail.

  9. Authentic texts in teaching French as a foreign language

    Directory of Open Access Journals (Sweden)

    Meta Lah

    2010-12-01

    Full Text Available The present paper is aimed at providing a ref lection on the use of authentic texts in French as a foreign language classroom. The author bases herself on an analysis of texts taken from four textbook sets (Le nouveau sans fronti`eres, Panorama, Campus and Rond point, which were or are still used in teaching French as a foreign language. Initially, a definition of authenticity and a survey of authentic material usage through history are provided. In the overview of the texts forming the corpus the texts are divided into authentic, adapted, apparently authentic and those for which no assumption can be made as to their authenticity. The authenticity analysis is also carried out by taking into account the analysis of/categorisation into text types (according to Adam. The author proceeds from two premises, i.e. firstly she foresees that authentic texts will be present in all text books analysed and secondly, considering the greater accessibility of materials, that their presence will be more pronounced in recent textbooks. However, none of the two hypo theses is confirmed, as authentic texts are found in the first three textbook sets, but not in the most recent one, while their presence is most pronounced in the oldest textbook set, i.e. in Le nouveau sans fronti`eres. The result of the analysis is thus somehow surprising given the overall accessibility of all kinds of authentic materials. In the author's opinion more authentic texts should be included into textbooks to thus enhance the purposeful ness of the foreign language classroom.

  10. Trigon-based Authentication Service Creation with Globus Middleware

    Directory of Open Access Journals (Sweden)

    Ruckmani V

    2010-09-01

    Full Text Available A Grid is built from multi-purpose protocols and interfaces that address fundamental issues as authentication, authorization, resource discovery, and resource access. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multi-domain. Authentication remains as the significant security challenge in grid environment. The proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these units are stored in two different servers, namely, Authentication Server and Backend Server. Only when the combined authentication scheme from both the servers authenticates the user, the privilege of accessing the requested resources is obtained by the user. The main advantage of utilizing the dual authentication protocol in grid computing is that an adversary user cannot attain the access privilege by compromising a single consolidated server because of the fact that the split password is stored in different servers. Grid service is stateful and transient web service, which can be invoked by clients, and is considered to be the mainstream of future internet. The creation of Web Services standards is an industry-led initiative, with some of the emerging standards in various states of progress through the World Wide Web Consortium (W3C. To achieve reuse of behaviors of this authentication concept, operations are often grouped together to form a trigon based authentication service.

  11. Supporting NGSS-aligned Study of Authentic Data about Climate

    Science.gov (United States)

    Zalles, D. R.

    2013-12-01

    The subject of climate change holds tremendous opportunity for students to learn how scientists use data to develop and test theories of how the natural world works and appreciate how climate change instantiates cross-cutting NGSS science themes like stability and change, energy and matter, and cause and effect. To do so, students and teachers need help seeing in authentic Earth system data complex climate interactions and generate plans for building greater understanding of the complexities through further data investigation. With ever-growing repositories of global and regional public data and user friendly tools for their display, K-12 educators are challenged to help students study data independently rather than through the usual pre-filtered didactic presentations of data found in textbooks. The paper will describe strategies for facilitating critical thinking about authentic climate-related data in two climate change education projects funded by NASA and NSF, as well as learning outcomes. Data Enhanced Investigations for Climate Change Education (dicce.sri.com) brings data from NASA satellite missions to classrooms. Studying Topography, Orographic Rainfall, and Ecosystems with Geospatial Information Technology (store.sri.com) provides recent climatological and vegetation data about certain study areas in California and New York plus geospatially distributed projected values of temperature, precipitation, and land cover in 2050 and 2099, derived from NCAR's A2 climate change model. Supportive resources help students move from naïve conceptions of simple linear relationships between variables into critical analysis of what other variables could be mediating those relationships. DICCE contains guides for how to interpret multiyear trends that are evident in the NASA mission data in relation to what we know about current climate change. If a learner plots a line of best fit across multiple months or years of regional data and notices that the line is either

  12. CONSTRUCTION OF AUTHENTICATION CODES WITH ARBITRATION FROM UNITARY GEOMETRY

    Institute of Scientific and Technical Information of China (English)

    LiRuihu; OuoLuobin

    1999-01-01

    A family of authentication codes with arbitration is constructed from unitary geome-try,the parameters and the probabilities of deceptions of the codes are also computed. In a spe-cial case a perfect authentication code with arbitration is ohtalned.

  13. Use of Authentic Materials in the ESP Classroom

    Science.gov (United States)

    Benavent, Gabriela Torregrosa; Penamaria, Sonsoles Sanchez-Reyes

    2011-01-01

    Authentic materials are especially important for ESP trainees, since they reproduce an immersion environment and provide a realistic context for tasks that relate to learners' needs. Realia and authentic materials increase learners' motivation but are difficult to adapt to the learner's level of language, especially at the beginning level. It is…

  14. The role of authenticity in electoral social media campaigns

    NARCIS (Netherlands)

    G. Grow (Gabrielle); J.R. Ward (Janelle)

    2013-01-01

    textabstractAuthenticity is a popular buzzword in electoral politics: Electoral candidates and politicians are expected to be authentic in their public interactions. Since 2008, campaigning via social media has become an integral part of elections in the United States, and continues to gain importan

  15. Authentic leaders creating healthy work environments for nursing practice.

    Science.gov (United States)

    Shirey, Maria R

    2006-05-01

    Implementation of authentic leadership can affect not only the nursing workforce and the profession but the healthcare delivery system and society as a whole. Creating a healthy work environment for nursing practice is crucial to maintain an adequate nursing workforce; the stressful nature of the profession often leads to burnout, disability, and high absenteeism and ultimately contributes to the escalating shortage of nurses. Leaders play a pivotal role in retention of nurses by shaping the healthcare practice environment to produce quality outcomes for staff nurses and patients. Few guidelines are available, however, for creating and sustaining the critical elements of a healthy work environment. In 2005, the American Association of Critical-Care Nurses released a landmark publication specifying 6 standards (skilled communication, true collaboration, effective decision making, appropriate staffing, meaningful recognition, and authentic leadership) necessary to establish and sustain healthy work environments in healthcare. Authentic leadership was described as the "glue" needed to hold together a healthy work environment. Now, the roles and relationships of authentic leaders in the healthy work environment are clarified as follows: An expanded definition of authentic leadership and its attributes (eg, genuineness, trustworthiness, reliability, compassion, and believability) is presented. Mechanisms by which authentic leaders can create healthy work environments for practice (eg, engaging employees in the work environment to promote positive behaviors) are described. A practical guide on how to become an authentic leader is advanced. A research agenda to advance the study of authentic leadership in nursing practice through collaboration between nursing and business is proposed.

  16. Authentication Assurance Level Application to the Inventory Sampling Measurement System

    Energy Technology Data Exchange (ETDEWEB)

    Devaney, Mike M.; Kouzes, Richard T.; Hansen, Randy R.; Geelhood, Bruce D.

    2001-09-06

    This document concentrates on the identification of a standardized assessment approach for the verification of security functionality in specific equipment, the Inspection Sampling Measurement System (ISMS) being developed for MAYAK. Specifically, an Authentication Assurance Level 3 is proposed to be reached in authenticating the ISMS.

  17. The surplus value of an authentic learning environment

    NARCIS (Netherlands)

    Gulikers, Judith; Bastiaens, Theo; Martens, Rob

    2007-01-01

    This article presents a study that provides insight in the effects of an authentic electronic learning environment on student performances and experiences. It is expected that learning in an authentic learning environment results in more active and deep learning and improves intrinsic motivation of

  18. A Framework for Authenticity in the Mathematics and Statistics Classroom

    Science.gov (United States)

    Garrett, Lauretta; Huang, Li; Charleton, Maria Calhoun

    2016-01-01

    Authenticity is a term commonly used in reference to pedagogical and curricular qualities of mathematics teaching and learning, but its use lacks a coherent framework. The work of researchers in engineering education provides such a framework. Authentic qualities of mathematics teaching and learning are fit within a model described by Strobel,…

  19. Authenticity and autochthonous traditions in archaic and Hellenistic poetry

    NARCIS (Netherlands)

    Klooster, Julia

    2016-01-01

    J.J.H. Klooster, ‘Authenticity and autochthonous traditions in archaic and Hellenistic poetry’. In E. Bakker (ed): Authorship, Authority and Authenticity in Archaic and Classical Greek Song. Proceedings of the Network for the Study of Archaic and Classical Greek Song, Vol. 2, Leiden: Brill

  20. Trusting Description: Authenticity, Accountability, and Archival Description Standards

    Science.gov (United States)

    MacNeil, Heather

    2009-01-01

    It has been suggested that one of the purposes of archival description is to establish grounds for presuming the authenticity of the records being described. The article examines the implications of this statement by examining the relationship between and among authenticity, archival description, and archival accountability, assessing how this…

  1. Formal and Implicit Conceptions of Authenticity in Teaching

    Science.gov (United States)

    Kreber, Carolin; McCune, Velda; Klampfleitner, Monika

    2010-01-01

    Recent literature in higher and adult education has identified "authenticity" in teaching as a significant yet under-researched phenomenon lacking a straight-forward definition. By exploring how academic teachers and their students, next to educational theorists and philosophers, understand the notion of authenticity in teaching we offer this…

  2. Girls' Relationship Authenticity and Self-Esteem across Adolescence

    Science.gov (United States)

    Impett, Emily A.; Sorsoli, Lynn; Schooler, Deborah; Henson, James M.; Tolman; Deborah L.

    2008-01-01

    Feminist psychologists have long posited that relationship authenticity (i.e., the congruence between what one thinks and feels and what one does and says in relational contexts) is integral to self-esteem and well-being. Guided by a feminist developmental framework, the authors investigated the role of relationship authenticity in promoting…

  3. HOW TO ACHIEVE AUTHENTICITY IN THE L2 CLASSROOM

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The first part of the essay deals with the term authenticity.Next,it proceeds to discuss how materials,course books,andthe activities are used in the classroom and also whichmethodology is chosen.Then it covers"true"authenticity andthe discussion of the possibility of the realization of themthrough the material,and activities and methodology.Finally aconclusion is drawn.

  4. Grid authentication from identity-based cryptography without random oracles

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    As a critical component of grid security, secure and efficient grid authentication needs to be well addressed. However, the most widely accepted and applied grid authentication is based on public key infrastructure (PKI) and X.509 certificates, which make the system have low processing efficiency and poor anti-attack capability. To accommodate the challenge of grid authentication, this article aims at designing a secure and efficient method for grid authentication by employing identity-based cryptography (IBC). Motivated by a recently proposed secure and efficient identity-based encryption (IBE) scheme without random oracles, an identity-based signature (IBS) scheme is first proposed for the generation of private key during grid authentication. Based on the proposed IBS and the former IBE schemes, the structure of a novel grid authentication model is given, followed by a grid authentication protocol described in detail. According to the theoretical analysis of the model and the protocol, it can be argued that the new system has improved both the security and efficiency of the grid authentication when compared with the traditional PKI-based and some current IBC-based models.

  5. Authentic Italian food as Mamma used to make it!

    DEFF Research Database (Denmark)

    Madsen, Jan Halberg; d'Ambrosio, Luigi

    2014-01-01

    The purpose of this investigation is to explore how Italian restaurants define authentic Italian culinary experiences and how these experiences are designed and rendered to the restaurants’ guests.......The purpose of this investigation is to explore how Italian restaurants define authentic Italian culinary experiences and how these experiences are designed and rendered to the restaurants’ guests....

  6. On Location Learning: Authentic Applied Science with Networked Augmented Realities

    Science.gov (United States)

    Rosenbaum, Eric; Klopfer, Eric; Perry, Judy

    2007-01-01

    The learning of science can be made more like the practice of science through authentic simulated experiences. We have created a networked handheld Augmented Reality environment that combines the authentic role-playing of Augmented Realities and the underlying models of Participatory Simulations. This game, known as Outbreak @ The Institute, is…

  7. Training Matters: The importance of Delivering Authentic CBT with Youth

    Directory of Open Access Journals (Sweden)

    Robert D Friedberg

    2014-12-01

    Full Text Available This short commentary discusses the problem of practitioners self-branding as cognitive behavioral therapists and authentic practice of CBT with youth. The adverse consequences of unmerited self-branding are described and training requirements for authentic CBT practice are delineated.

  8. 45 CFR 2.6 - Certification and authentication of records.

    Science.gov (United States)

    2010-10-01

    ... Certification and authentication of records. Upon request, DHHS agencies will certify, pursuant to 42 U.S.C. 3505, the authenticity of copies of records that are to be disclosed. Fees for copying and certification are set forth in 45 CFR 5.43....

  9. A Secure Public-key Image Authentication Plan

    Institute of Scientific and Technical Information of China (English)

    YANG Qing; CHEN Ke-fei

    2005-01-01

    Digital watermark can be used for image ownership verification or authentication. In this paper, we propose a new image authentication plan concentrating on its security performance. Digital watermark is first turbo coded, scaled and then processed in wavelet domain. To enhance security level, public key cryptosystem is utilized to replace traditional watermark key. Simulation results are finally given by experiment.

  10. Perceived Authenticity of the Visitor Experience in Museums

    DEFF Research Database (Denmark)

    Hede, Anne-Marie; Garma, Romana; Josiassen, Alexander;

    2014-01-01

    . To investigate authenticity in a model with two antecedents and two outcomes, an additional data set was collected. Hypotheses were tested using structural equation modelling. Findings -The results show that perceived authenticity of the museum, the visitor and the materials in the museum are dimensions...

  11. Single authentication: exposing weighted splining artifacts

    Science.gov (United States)

    Ciptasari, Rimba W.

    2016-05-01

    A common form of manipulation is to combine parts of the image fragment into another different image either to remove or blend the objects. Inspired by this situation, we propose a single authentication technique for detecting traces of weighted average splining technique. In this paper, we assume that image composite could be created by joining two images so that the edge between them is imperceptible. The weighted average technique is constructed from overlapped images so that it is possible to compute the gray level value of points within a transition zone. This approach works on the assumption that although splining process leaves the transition zone smoothly. They may, nevertheless, alter the underlying statistics of an image. In other words, it introduces specific correlation into the image. The proposed idea dealing with identifying these correlations is to generate an original model of both weighting function, left and right functions, as references to their synthetic models. The overall process of the authentication is divided into two main stages, which are pixel predictive coding and weighting function estimation. In the former stage, the set of intensity pairs {Il,Ir} is computed by exploiting pixel extrapolation technique. The least-squares estimation method is then employed to yield the weighted coefficients. We show the efficacy of the proposed scheme on revealing the splining artifacts. We believe that this is the first work that exposes the image splining artifact as evidence of digital tampering.

  12. On continuous user authentication via typing behavior.

    Science.gov (United States)

    Roth, Joseph; Liu, Xiaoming; Metaxas, Dimitris

    2014-10-01

    We hypothesize that an individual computer user has a unique and consistent habitual pattern of hand movements, independent of the text, while typing on a keyboard. As a result, this paper proposes a novel biometric modality named typing behavior (TB) for continuous user authentication. Given a webcam pointing toward a keyboard, we develop real-time computer vision algorithms to automatically extract hand movement patterns from the video stream. Unlike the typical continuous biometrics, such as keystroke dynamics (KD), TB provides a reliable authentication with a short delay, while avoiding explicit key-logging. We collect a video database where 63 unique subjects type static text and free text for multiple sessions. For one typing video, the hands are segmented in each frame and a unique descriptor is extracted based on the shape and position of hands, as well as their temporal dynamics in the video sequence. We propose a novel approach, named bag of multi-dimensional phrases, to match the cross-feature and cross-temporal pattern between a gallery sequence and probe sequence. The experimental results demonstrate a superior performance of TB when compared with KD, which, together with our ultrareal-time demo system, warrant further investigation of this novel vision application and biometric modality.

  13. Patterns-of-Life Aided Authentication

    Directory of Open Access Journals (Sweden)

    Nan Zhao

    2016-09-01

    Full Text Available Wireless Body Area Network (WBAN applications have grown immensely in the past few years. However, security and privacy of the user are two major obstacles in their development. The complex and very sensitive nature of the body-mounted sensors means the traditional network layer security arrangements are not sufficient to employ their full potential, and novel solutions are necessary. In contrast, security methods based on physical layers tend to be more suitable and have simple requirements. The problem of initial trust needs to be addressed as a prelude to the physical layer security key arrangement. This paper proposes a patterns-of-life aided authentication model to solve this issue. The model employs the wireless channel fingerprint created by the user’s behavior characterization. The performance of the proposed model is established through experimental measurements at 2.45 GHz. Experimental results show that high correlation values of 0.852 to 0.959 with the habitual action of the user in different scenarios can be used for auxiliary identity authentication, which is a scalable result for future studies.

  14. Patterns-of-Life Aided Authentication.

    Science.gov (United States)

    Zhao, Nan; Ren, Aifeng; Zhang, Zhiya; Zhu, Tianqiao; Rehman, Masood Ur; Yang, Xiaodong; Hu, Fangming

    2016-09-23

    Wireless Body Area Network (WBAN) applications have grown immensely in the past few years. However, security and privacy of the user are two major obstacles in their development. The complex and very sensitive nature of the body-mounted sensors means the traditional network layer security arrangements are not sufficient to employ their full potential, and novel solutions are necessary. In contrast, security methods based on physical layers tend to be more suitable and have simple requirements. The problem of initial trust needs to be addressed as a prelude to the physical layer security key arrangement. This paper proposes a patterns-of-life aided authentication model to solve this issue. The model employs the wireless channel fingerprint created by the user's behavior characterization. The performance of the proposed model is established through experimental measurements at 2.45 GHz. Experimental results show that high correlation values of 0.852 to 0.959 with the habitual action of the user in different scenarios can be used for auxiliary identity authentication, which is a scalable result for future studies.

  15. Digital authentication with copy-detection patterns

    Science.gov (United States)

    Picard, Justin

    2004-06-01

    Technologies for making high-quality copies of documents are getting more available, cheaper, and more efficient. As a result, the counterfeiting business engenders huge losses, ranging to 5% to 8% of worldwide sales of brand products, and endangers the reputation and value of the brands themselves. Moreover, the growth of the Internet drives the business of counterfeited documents (fake IDs, university diplomas, checks, and so on), which can be bought easily and anonymously from hundreds of companies on the Web. The incredible progress of digital imaging equipment has put in question the very possibility of verifying the authenticity of documents: how can we discern genuine documents from seemingly "perfect" copies? This paper proposes a solution based on creating digital images with specific properties, called a Copy-detection patterns (CDP), that is printed on arbitrary documents, packages, etc. CDPs make an optimal use of an "information loss principle": every time an imae is printed or scanned, some information is lost about the original digital image. That principle applies even for the highest quality scanning, digital imaging, printing or photocopying equipment today, and will likely remain true for tomorrow. By measuring the amount of information contained in a scanned CDP, the CDP detector can take a decision on the authenticity of the document.

  16. Probabilistic Adaptive Anonymous Authentication in Vehicular Networks

    Institute of Scientific and Technical Information of China (English)

    Yong Xi; Ke-Wei Sha; Wei-Song Shi; Loren Schwiebert; Tao Zhang

    2008-01-01

    Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on designing the media access and physical layer protocols.Privacy issues in vehicular systems have not been well addressed. We argue that privacy is a user-specific concept, and a good privacy protection mechanism should allow users to select the levels of privacy they wish to have. To address this requirement, we propose an adaptive anonymous authentication mechanism that can trade off the anonymity level with computational and communication overheads (resource usage). This mechanism, to our knowledge, is the first effort on adaptive anonymous authentication. The resources used by our protocol are few. A high traffic volume of 2000 vehicles per hour consumes about 60kbps bandwidth, which is less than one percent of the bandwidth of DSRC (Dedicated Short Range Communications). By using adaptive anonymity, the protocol response time can further be improved 2~4 times with lessthan 20% bandwidth overheads.

  17. Final LDRD report : enhanced spontaneous emission rate in visible III-nitride LEDs using 3D photonic crystal cavities.

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, Arthur Joseph; Subramania, Ganapathi S.; Coley, Anthony J.; Lee, Yun-Ju; Li, Qiming; Wang, George T.; Luk, Ting Shan; Koleske, Daniel David; Fullmer, Kristine Wanta

    2009-09-01

    The fundamental spontaneous emission rate for a photon source can be modified by placing the emitter inside a periodic dielectric structure allowing the emission to be dramatically enhanced or suppressed depending on the intended application. We have investigated the relatively unexplored realm of interaction between semiconductor emitters and three dimensional photonic crystals in the visible spectrum. Although this interaction has been investigated at longer wavelengths, very little work has been done in the visible spectrum. During the course of this LDRD, we have fabricated TiO{sub 2} logpile photonic crystal structures with the shortest wavelength band gap ever demonstrated. A variety of different emitters with emission between 365 nm and 700 nm were incorporated into photonic crystal structures. Time-integrated and time-resolved photoluminescence measurements were performed to measure changes to the spontaneous emission rate. Both enhanced and suppressed emission were demonstrated and attributed to changes to the photonic density of states.

  18. Simulations of the interaction of intense petawatt laser pulses with dense Z-pinch plasmas : final report LDRD 39670.

    Energy Technology Data Exchange (ETDEWEB)

    Welch, Dale Robert (Mission Research Corporation, Albuquerque, NM); MacFarlane, Joseph John (Prism Computational Sciences, Madison, WI); Mehlhorn, Thomas Alan; Campbell, Robert B.

    2004-11-01

    We have studied the feasibility of using the 3D fully electromagnetic implicit hybrid particle code LSP (Large Scale Plasma) to study laser plasma interactions with dense, compressed plasmas like those created with Z, and which might be created with the planned ZR. We have determined that with the proper additional physics and numerical algorithms developed during the LDRD period, LSP was transformed into a unique platform for studying such interactions. Its uniqueness stems from its ability to consider realistic compressed densities and low initial target temperatures (if required), an ability that conventional PIC codes do not possess. Through several test cases, validations, and applications to next generation machines described in this report, we have established the suitability of the code to look at fast ignition issues for ZR, as well as other high-density laser plasma interaction problems relevant to the HEDP program at Sandia (e.g. backlighting).

  19. Remark on the Regularities of Kato's Solutions to Navier-Stokes Equations with Initial Data in Ld(Rd)

    Institute of Scientific and Technical Information of China (English)

    Ping ZHANG

    2008-01-01

    Motivated by the results of J.Y.Chemin in "J.Anal.Math.,77,1999,27-50" and G.Furioli et al in "Revista Mat.Iberoamer.,16,2002,605-667",the author considers further regularities of the mild solutions to Navier-Stokes equation with initial data u0∈Ld(Rd).In particular,it is proved that if u∈C([0,T*); Ld(Rd)) is a mild solution of (NSv),then u(t,x) -evt△u0∈(L)∞ ((0,T); (B)1/d/2,∞)∩(L)1((0,T);(B)3/d/2,∞) for any T<T*.

  20. Development of anti-counterfeit consumer product authentication system

    Directory of Open Access Journals (Sweden)

    Olena V. Narimanova

    2015-06-01

    Full Text Available Aim of the research is to develop an anti-counterfeit consumer product authentication system. The main requirements for this system are formulated, the choice of method of consumer product authentication is substantiated. The scheme of anti-counterfeit consumer product authentication system is developed basing on previously proposed method of checking the QR-code integrity and authenticity. The proposed within the system consumer product authentication technology is simple, economical for implementation, does not require the external changes of product packaging, does not affect existing production process. The technology can be recommended for the use to private businesses and government institutions that are interested in the security of their products from counterfeiting, as well as tracking and removing from circulation the counterfeit consumer products.