WorldWideScience

Sample records for authentication ldrd project

  1. Final report for the mobile node authentication LDRD project.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Lanzone, Andrew J.

    2005-09-01

    In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

  2. FY 2014 LDRD Annual Report Project Summaries

    Energy Technology Data Exchange (ETDEWEB)

    Tomchak, Dena [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-02-01

    The FY 2014 Laboratory Directed Research and Development (LDRD) Annual Report is a compendium of the diverse research performed to develop and ensure the INL's technical capabilities can support future DOE missions and national research priorities. LDRD is essential to INL - it provides a means for the laboratory to pursue novel scientific and engineering research in areas that are deemed too basic or risky for programmatic investments. This research enahnces technical capabilities at the laboratory, providing scientific and engineering staff with opportunities for skill building and partnership development.

  3. Idaho National Laboratory Annual Report FY 2013 LDRD Project Summaries

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2014-03-01

    The FY 2013 LDRD Annual Report is a compendium of the diverse research performed to develop and ensure the INL’s technical capabilities support the current and future DOE missions and national research priorities. LDRD is essential to INL—it provides a means for the Laboratory to maintain scientific and technical vitality while funding highly innovative, high-risk science and technology research and development (R&D) projects. The program enhances technical capabilities at the Laboratory, providing scientific and engineering staff with opportunities to explore proof-of-principle ideas, advanced studies of innovative concepts, and preliminary technical analyses. Established by Congress in 1991, the LDRD Program proves its benefit each year through new programs, intellectual property, patents, copyrights, national and international awards, and publications.

  4. LDRD project 151362 : low energy electron-photon transport.

    Energy Technology Data Exchange (ETDEWEB)

    Kensek, Ronald Patrick; Hjalmarson, Harold Paul; Magyar, Rudolph J.; Bondi, Robert James; Crawford, Martin James

    2013-09-01

    At sufficiently high energies, the wavelengths of electrons and photons are short enough to only interact with one atom at time, leading to the popular %E2%80%9Cindependent-atom approximation%E2%80%9D. We attempted to incorporate atomic structure in the generation of cross sections (which embody the modeled physics) to improve transport at lower energies. We document our successes and failures. This was a three-year LDRD project. The core team consisted of a radiation-transport expert, a solid-state physicist, and two DFT experts.

  5. THz transceiver characterization : LDRD project 139363 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Nordquist, Christopher Daniel; Wanke, Michael Clement; Cich, Michael Joseph; Reno, John Louis; Fuller, Charles T.; Wendt, Joel Robert; Lee, Mark; Grine, Albert D.

    2009-09-01

    LDRD Project 139363 supported experiments to quantify the performance characteristics of monolithically integrated Schottky diode + quantum cascade laser (QCL) heterodyne mixers at terahertz (THz) frequencies. These integrated mixers are the first all-semiconductor THz devices to successfully incorporate a rectifying diode directly into the optical waveguide of a QCL, obviating the conventional optical coupling between a THz local oscillator and rectifier in a heterodyne mixer system. This integrated mixer was shown to function as a true heterodyne receiver of an externally received THz signal, a breakthrough which may lead to more widespread acceptance of this new THz technology paradigm. In addition, questions about QCL mode shifting in response to temperature, bias, and external feedback, and to what extent internal frequency locking can improve stability have been answered under this project.

  6. Selected Examples of LDRD Projects Supporting Test Ban Treaty Verification and Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Al-Ayat, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Walter, W. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-02-23

    The Laboratory Directed Research and Development (LDRD) Program at the DOE National Laboratories was established to ensure the scientific and technical vitality of these institutions and to enhance the their ability to respond to evolving missions and anticipate national needs. LDRD allows the Laboratory directors to invest a percentage of their total annual budget in cutting-edge research and development projects within their mission areas. We highlight a selected set of LDRD-funded projects, in chronological order, that have helped provide capabilities, people and infrastructure that contributed greatly to our ability to respond to technical challenges in support of test ban treaty verification and nonproliferation.

  7. Selected Examples of LDRD Projects Supporting Test Ban Treaty Verification and Nonproliferation

    International Nuclear Information System (INIS)

    The Laboratory Directed Research and Development (LDRD) Program at the DOE National Laboratories was established to ensure the scientific and technical vitality of these institutions and to enhance the their ability to respond to evolving missions and anticipate national needs. LDRD allows the Laboratory directors to invest a percentage of their total annual budget in cutting-edge research and development projects within their mission areas. We highlight a selected set of LDRD-funded projects, in chronological order, that have helped provide capabilities, people and infrastructure that contributed greatly to our ability to respond to technical challenges in support of test ban treaty verification and nonproliferation.

  8. Final report on LDRD project "proliferation-resistant fuel cycles"

    Energy Technology Data Exchange (ETDEWEB)

    Brown, N W; Hassberger, J A

    1999-02-25

    This report provides a summary of LDRD work completed during 1997 and 1998 to develop the ideas and concepts that lead to the Secure, Transportable, Autonomous Reactor (STAR) program proposals to the DOE Nuclear Energy Research Initiative (NERI). The STAR program consists of a team of three national laboratories (LLNL, ANL, and LANL), three universities, (UC Berkeley, TAMU, and MIT) and the Westinghouse Research Center. Based on the LLNL work and their own efforts on related work this team prepared and integrated a package of twelve proposals that will carry the LDRD work outlined here into the next phase of development. We are proposing to develop a new nuclear system that meets stringent requirements for a high degree of safety and proliferation resistance, and also deals directly with the related nuclear waste and spent fuel management issues.

  9. FY05 LDRD Final Report Molecular Radiation Biodosimetry LDRD Project Tracking Code: 04-ERD-076

    Energy Technology Data Exchange (ETDEWEB)

    Jones, I M; A.Coleman, M; Lehmann, J; Manohar, C F; Marchetti, F; Mariella, R; Miles, R; Nelson, D O; Wyrobek, A J

    2006-02-03

    been, these methods are not suitable. The best current option for triage radiation biodosimetry is self-report of time to onset of emesis after the event, a biomarker that is subject to many false positives. The premise of this project is that greatly improved radiation dosimetry can be achieved by research and development directed toward detection of molecular changes induced by radiation in cells or other biological materials. Basic research on the responses of cells to radiation at the molecular level, particularly of message RNA and proteins, has identified biomolecules whose levels increase (or decrease) as part of cellular responses to radiation. Concerted efforts to identify markers useful for triage and clinical applications have not been reported as yet. Such studies would scan responses over a broad range of doses, below, at and above the threshold of clinical significance in the first weeks after exposure, and would collect global proteome and/or transcriptome information on all tissue samples accessible to either first responders or clinicians. For triage, the goal is to identify those needing medical treatment. Treatment will be guided by refined dosimetry. Achieving this goal entails determining whether radiation exposure was below or above the threshold of concern, using one sample collected within days of an event, with simple devices that first responders either use or distribute for self-testing. For the clinic, better resolution of dose and tissue damage is needed to determine the nature and time sensitivity of therapy, but multiple sampling times may be acceptable and clinical staff and equipment can be utilized. Two complementary areas of research and development are needed once candidate biomarkers are identified, validation of the biomarker responses and validation of devices/instrumentation for detection of responses. Validation of biomarkers per se is confirmation that the dose, time, and tissue specific responses meet the reporting

  10. Final report of LDRD project: Electromagnetic impulse radar for detection of underground structures

    Energy Technology Data Exchange (ETDEWEB)

    Loubriel, G.; Aurand, J.; Buttram, M.; Zutavern, F.; Brown, D.; Helgeson, W.

    1998-03-01

    This report provides a summary of the LDRD project titled: Electromagnetic impulse radar for the detection of underground structures. The project met all its milestones even with a tight two year schedule and total funding of $400 k. The goal of the LDRD was to develop and demonstrate a ground penetrating radar (GPR) that is based on high peak power, high repetition rate, and low center frequency impulses. The idea of this LDRD is that a high peak power, high average power radar based on the transmission of short impulses can be utilized effect can be utilized for ground penetrating radar. This direct time-domain system the authors are building seeks to increase penetration depth over conventional systems by using: (1) high peak power, high repetition rate operation that gives high average power, (2) low center frequencies that better penetrate the ground, and (3) short duration impulses that allow for the use of downward looking, low flying platforms that increase the power on target relative to a high flying platform. Specifically, chirped pulses that are a microsecond in duration require (because it is difficult to receive during transmit) platforms above 150 m (and typically 1 km) while this system, theoretically could be at 10 m above the ground. The power on target decays with distance squared so the ability to use low flying platforms is crucial to high penetration. Clutter is minimized by time gating the surface clutter return. Short impulses also allow gating (out) the coupling of the transmit and receive antennas.

  11. Predicting Function of Biological Macromolecules: A Summary of LDRD Activities: Project 10746

    Energy Technology Data Exchange (ETDEWEB)

    FRINK, LAURA J. D.; REMPE, SUSAN L.; MEANS, SHAWN A.; STEVENS, MARK J.; CROZIER, PAUL S.; MARTIN, MARCUS G.; SEARS, MARK P.; HJALMARSON, HAROLD P.

    2002-11-01

    This LDRD project has involved the development and application of Sandia's massively parallel materials modeling software to several significant biophysical systems. They have been successful in applying the molecular dynamics code LAMMPS to modeling DNA, unstructured proteins, and lipid membranes. They have developed and applied a coupled transport-molecular theory code (Tramonto) to study ion channel proteins with gramicidin A as a prototype. they have used the Towhee configurational bias Monte-Carlo code to perform rigorous tests of biological force fields. they have also applied the MP-Sala reacting-diffusion code to model cellular systems. Electroporation of cell membranes has also been studied, and detailed quantum mechanical studies of ion solvation have been performed. In addition, new molecular theory algorithms have been developed (in FasTram) that may ultimately make protein solvation calculations feasible on workstations. Finally, they have begun implementation of a combined molecular theory and configurational bias Monte-Carlo code. They note that this LDRD has provided a basis for several new internal (e.g. several new LDRD) and external (e.g. 4 NIH proposals and a DOE/Genomes to Life) proposals.

  12. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    Science.gov (United States)

    Damousis, Ioannis G.; Tzovaras, Dimitrios; Bekiaris, Evangelos

    2008-12-01

    Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO) (2007) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  13. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    Directory of Open Access Journals (Sweden)

    Evangelos Bekiaris

    2008-03-01

    Full Text Available Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO (2007 is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  14. FPGAs in High Perfomance Computing: Results from Two LDRD Projects.

    Energy Technology Data Exchange (ETDEWEB)

    Underwood, Keith D; Ulmer, Craig D. [Sandia National Laboratories, Livermore, CA; Thompson, David [Sandia National Laboratories, Livermore, CA; Hemmert, Karl Scott [Sandia National Laboratories, Albuquerque, NM

    2006-11-01

    Field programmable gate arrays (FPGAs) have been used as alternative computational de-vices for over a decade; however, they have not been used for traditional scientific com-puting due to their perceived lack of floating-point performance. In recent years, there hasbeen a surge of interest in alternatives to traditional microprocessors for high performancecomputing. Sandia National Labs began two projects to determine whether FPGAs wouldbe a suitable alternative to microprocessors for high performance scientific computing and,if so, how they should be integrated into the system. We present results that indicate thatFPGAs could have a significant impact on future systems. FPGAs have thepotentialtohave order of magnitude levels of performance wins on several key algorithms; however,there are serious questions as to whether the system integration challenge can be met. Fur-thermore, there remain challenges in FPGA programming and system level reliability whenusing FPGA devices.4 AcknowledgmentArun Rodrigues provided valuable support and assistance in the use of the Structural Sim-ulation Toolkit within an FPGA context. Curtis Janssen and Steve Plimpton provided valu-able insights into the workings of two Sandia applications (MPQC and LAMMPS, respec-tively).5

  15. Validated modeling of distributed energy resources at distribution voltages : LDRD project 38672.

    Energy Technology Data Exchange (ETDEWEB)

    Ralph, Mark E.; Ginn, Jerry W.

    2004-03-01

    A significant barrier to the deployment of distributed energy resources (DER) onto the power grid is uncertainty on the part of utility engineers regarding impacts of DER on their distribution systems. Because of the many possible combinations of DER and local power system characteristics, these impacts can most effectively be studied by computer simulation. The goal of this LDRD project was to develop and experimentally validate models of transient and steady state source behavior for incorporation into utility distribution analysis tools. Development of these models had not been prioritized either by the distributed-generation industry or by the inverter industry. A functioning model of a selected inverter-based DER was developed in collaboration with both the manufacturer and industrial power systems analysts. The model was written in the PSCAD simulation language, a variant of the ElectroMagnetic Transients Program (EMTP), a code that is widely used and accepted by utilities. A stakeholder team was formed and a methodology was established to address the problem. A list of detailed DER/utility interaction concerns was developed and prioritized. The list indicated that the scope of the problem significantly exceeded resources available for this LDRD project. As this work progresses under separate funding, the model will be refined and experimentally validated. It will then be incorporated in utility distribution analysis tools and used to study a variety of DER issues. The key next step will be design of the validation experiments.

  16. Authentication for Propulsion Test Streaming Video Project

    Data.gov (United States)

    National Aeronautics and Space Administration — An application was developed that could enforce two-factor authentication for NASA access to the Propulsion Test Streaming Video System.  To gain access to the...

  17. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    OpenAIRE

    Evangelos Bekiaris; Dimitrios Tzovaras; Ioannis G. Damousis

    2008-01-01

    Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO) (2007) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each ind...

  18. FY08 LDRD Final Report A New Method for Wave Propagation in Elastic Media LDRD Project Tracking Code: 05-ERD-079

    Energy Technology Data Exchange (ETDEWEB)

    Petersson, A

    2009-01-29

    The LDRD project 'A New Method for Wave Propagation in Elastic Media' developed several improvements to the traditional finite difference technique for seismic wave propagation, including a summation-by-parts discretization which is provably stable for arbitrary heterogeneous materials, an accurate treatment of non-planar topography, local mesh refinement, and stable outflow boundary conditions. This project also implemented these techniques in a parallel open source computer code called WPP, and participated in several seismic modeling efforts to simulate ground motion due to earthquakes in Northern California. This research has been documented in six individual publications which are summarized in this report. Of these publications, four are published refereed journal articles, one is an accepted refereed journal article which has not yet been published, and one is a non-refereed software manual. The report concludes with a discussion of future research directions and exit plan.

  19. Multimedia Data Hiding and Authentication via Halftoning and Coordinate Projection

    Directory of Open Access Journals (Sweden)

    Chai Wah Wu

    2002-02-01

    Full Text Available We present image data hiding and authentication schemes based on halftoning and coordinate projection. The proposed data hiding scheme can embed images of the same size and similar bit depth into the cover image and robustness against compression is demonstrated. The image authentication scheme is based on the data hiding scheme and can detect, localize, and repair the tampered area of the image. Furthermore, the self-repairing feature of the authentication scheme has a hologram-like quality; any portion of the image can be used to reconstruct the entire image, with a greater quality of reconstruction as the portion size increases.

  20. Final report on LDRD project: Simulation/optimization tools for system variability analysis

    Energy Technology Data Exchange (ETDEWEB)

    R. L. Bierbaum; R. F. Billau; J. E. Campbell; K. D. Marx; R. J. Sikorski; B. M. Thompson; S. D. Wix

    1999-10-01

    >This work was conducted during FY98 (Proposal Number 98-0036) and FY99 (Proposal Number 99-0818) under the auspices of the Sandia National Laboratories Laboratory-Directed Research and Development (LDRD) program. Electrical simulation typically treats a single data point in the very large input space of component properties. For electrical simulation to reach its full potential as a design tool, it must be able to address the unavoidable variability and uncertainty in component properties. Component viability is strongly related to the design margin (and reliability) of the end product. During the course of this project, both tools and methodologies were developed to enable analysis of variability in the context of electrical simulation tools. Two avenues to link relevant tools were also developed, and the resultant toolset was applied to a major component.

  1. Final Report for LDRD Project on Rapid Problem Setup for Mesh-Based Simulation (Rapsodi)

    Energy Technology Data Exchange (ETDEWEB)

    Brown, D L; Henshaw, W; Petersson, N A; Fast, P; Chand, K

    2003-02-07

    Under LLNL Exploratory Research LDRD funding, the Rapsodi project developed rapid setup technology for computational physics and engineering problems that require computational representations of complex geometry. Many simulation projects at LLNL involve the solution of partial differential equations in complex 3-D geometries. A significant bottleneck in carrying out these simulations arises in converting some specification of a geometry, such as a computer-aided design (CAD) drawing to a computationally appropriate 3-D mesh that can be used for simulation and analysis. Even using state-of-the-art mesh generation software, this problem setup step typically has required weeks or months, which is often much longer than required to carry out the computational simulation itself. The Rapsodi project built computational tools and designed algorithms that help to significantly reduce this setup time to less than a day for many realistic problems. The project targeted rapid setup technology for computational physics and engineering problems that use mixed-element unstructured meshes, overset meshes or Cartesian-embedded boundary (EB) meshes to represent complex geometry. It also built tools that aid in constructing computational representations of geometry for problems that do not require a mesh. While completely automatic mesh generation is extremely difficult, the amount of manual labor required can be significantly reduced. By developing novel, automated, component-based mesh construction procedures and automated CAD geometry repair and cleanup tools, Rapsodi has significantly reduced the amount of hand crafting required to generate geometry and meshes for scientific simulation codes.

  2. RF/microwave properties of nanotubes and nanowires : LDRD Project 105876 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Scrymgeour, David; Lee, Mark; Hsu, Julia W. P.; Highstrete, Clark

    2009-09-01

    LDRD Project 105876 was a research project whose primary goal was to discover the currently unknown science underlying the basic linear and nonlinear electrodynamic response of nanotubes and nanowires in a manner that will support future efforts aimed at converting forefront nanoscience into innovative new high-frequency nanodevices. The project involved experimental and theoretical efforts to discover and understand high frequency (MHz through tens of GHz) electrodynamic response properties of nanomaterials, emphasizing nanowires of silicon, zinc oxide, and carbon nanotubes. While there is much research on DC electrical properties of nanowires, electrodynamic characteristics still represent a major new frontier in nanotechnology. We generated world-leading insight into how the low dimensionality of these nanomaterials yields sometimes desirable and sometimes problematic high-frequency properties that are outside standard model electron dynamics. In the cases of silicon nanowires and carbon nanotubes, evidence of strong disorder or glass-like charge dynamics was measured, indicating that these materials still suffer from serious inhomogeneities that limit there high frequency performance. Zinc oxide nanowires were found to obey conventional Drude dynamics. In all cases, a significant practical problem involving large impedance mismatch between the high intrinsic impedance of all nanowires and nanotubes and high-frequency test equipment had to be overcome.

  3. A configuration space toolkit for automated spatial reasoning: Technical results and LDRD project final report

    Energy Technology Data Exchange (ETDEWEB)

    Xavier, P.G.; LaFarge, R.A.

    1997-02-01

    A robot`s configuration space (c-space) is the space of its kinematic degrees of freedom, e.g., the joint-space of an arm. Sets in c-space can be defined that characterize a variety of spatial relationships, such as contact between the robot and its environment. C-space techniques have been fundamental to research progress in areas such as motion planning and physically-based reasoning. However, practical progress has been slowed by the difficulty of implementing the c-space abstraction inside each application. For this reason, we proposed a Configuration Space Toolkit of high-performance algorithms and data structures meeting these needs. Our intent was to develop this robotics software to provide enabling technology to emerging applications that apply the c-space abstraction, such as advanced motion planning, teleoperation supervision, mechanism functional analysis, and design tools. This final report presents the research results and technical achievements of this LDRD project. Key results and achievements included (1) a hybrid Common LISP/C prototype that implements the basic C-Space abstraction, (2) a new, generic, algorithm for constructing hierarchical geometric representations, and (3) a C++ implementation of an algorithm for fast distance computation, interference detection, and c-space point-classification. Since the project conclusion, motion planning researchers in Sandia`s Intelligent Systems and Robotics Center have been using the CSTk libcstk.so C++ library. The code continues to be used, supported, and improved by projects in the ISRC.

  4. Integrated computer control system CORBA-based simulator FY98 LDRD project final summary report

    International Nuclear Information System (INIS)

    The CORBA-based Simulator was a Laboratory Directed Research and Development (LDRD) project that applied simulation techniques to explore critical questions about distributed control architecture. The simulator project used a three-prong approach comprised of a study of object-oriented distribution tools, computer network modeling, and simulation of key control system scenarios. This summary report highlights the findings of the team and provides the architectural context of the study. For the last several years LLNL has been developing the Integrated Computer Control System (ICCS), which is an abstract object-oriented software framework for constructing distributed systems. The framework is capable of implementing large event-driven control systems for mission-critical facilities such as the National Ignition Facility (NIF). Tools developed in this project were applied to the NIF example architecture in order to gain experience with a complex system and derive immediate benefits from this LDRD. The ICCS integrates data acquisition and control hardware with a supervisory system, and reduces the amount of new coding and testing necessary by providing prebuilt components that can be reused and extended to accommodate specific additional requirements. The framework integrates control point hardware with a supervisory system by providing the services needed for distributed control such as database persistence, system start-up and configuration, graphical user interface, status monitoring, event logging, scripting language, alert management, and access control. The design is interoperable among computers of different kinds and provides plug-in software connections by leveraging a common object request brokering architecture (CORBA) to transparently distribute software objects across the network of computers. Because object broker distribution applied to control systems is relatively new and its inherent performance is roughly threefold less than traditional point

  5. Diode Laser Diagnostics for Gas Species and Soot in Large Fires: LDRD Project Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Christopher R. Shaddix; Sarah W. Allendorf; Gary L. Hubbard; David K. Ottesen; Louis A. Gritzo

    2001-06-01

    The thermal hazard posed by a fire to a weapon or other engineered system is a consequence of combined radiation and convection from high-temperature soot and gases. The development of advanced, predictive models of this hazard requires detailed knowledge of the transient chemical structure and soot distributions within real-scale fires. At present, there are no measurements, and hence limited understanding, of transient gaseous species generation and transport in large, fully turbulent fires. As part of a Laboratory Directed Research and Development (LDRD) project to develop such an experimental capability, near-infrared tunable diode laser absorption spectroscopy (TDLAS) has been identified as the most promising diagnostic technique for making these measurements. In order to develop this capability, significant efforts were applied to choosing optimal species and transitions for detection, to developing an effective multiplexing strategy for several lasers undergoing wavelength modulation spectroscopy with fast laser ramp scans, to developing a methodology for multipassing the TDL beams across a small probe volume, and finally, to designing a water-cooled, fiber-coupled probe for performing these measurements locally within large pool fires. All of these challenges were surmounted during the course of this project, and in the end a preliminary, unique dataset of combined water vapor, acetylene, and soot concentrations was obtained from a 1-m diameter JP-8 pool fire.

  6. Authentic Leadership: An Emerging Issue in Project Management

    Directory of Open Access Journals (Sweden)

    Saif Ur Rehman Khan

    2014-09-01

    Full Text Available Leadership has been a feature of general organizations but in project management much space is empty. New styles of leadership are being introduced and project leadership also can’t escape. With the advancement in project management project leadership requires new effective behaviors in organizations if it is to remain relevant. Interestingly, still project leadership has no separate wing of theory under the subject of project management but striving to strengthen the concept as distinct branch of knowledge. The reason behind that is project management and project managers have long been considered as a part of technical field rather being a part of social sciences. Different leadership styles have been discussed with some empirical support and there is need to adopt the new styles like authentic leadership in project management. Although authentic leadership is at its initial stages but produced positive results in studies discussed so far. In this study importance of authentic leadership has been discussed theoretically as compared to other contemporary theories.

  7. Learning in Authentic Contexts: Projects Integrating Spatial Technologies and Fieldwork

    Science.gov (United States)

    Huang, Kuo-Hung

    2011-01-01

    In recent years, professional practice has been an issue of concern in higher education. The purpose of this study is to design students' projects to facilitate collaborative learning in authentic contexts. Ten students majoring in Management Information Systems conducted fieldwork with spatial technologies to collect data and provided information…

  8. LDRD LW Project Final Report:Resolving the Earthquake Source Scaling Problem

    Energy Technology Data Exchange (ETDEWEB)

    Mayeda, K; Felker, S; Gok, R; O' Boyle, J; Walter, W R; Ruppert, S

    2004-02-10

    The scaling behavior of basic earthquake source parameters such as the energy release per unit area of fault slip, quantitatively measured as the apparent stress, is currently in dispute. There are compelling studies that show apparent stress is constant over a wide range of moments (e.g. Choy and Boatwright, 1995; McGarr, 1999; Ide and Beroza, 2001, Ide et al. 2003). Other equally compelling studies find the apparent stress increases with moment (e.g. Kanamori et al., 1993; Abercrombie, 1995; Mayeda and Walter, 1996; Izutani and Kanamori, 2001; Richardson and Jordan, 2002). The resolution of this issue is complicated by the difficulty of accurately accounting for attenuation, radiation inhomogeneities, bandwidth and determining the seismic energy radiated by earthquakes over a wide range of event sizes in a consistent manner. As one part of our LDRD project we convened a one-day workshop on July 24, 2003 in Livermore to review the current state of knowledge on this topic and discuss possible methods of resolution with many of the world's foremost experts.

  9. A Case Study in Competitive Technical and Market Intelligence Support and Lessons Learned for the uChemLab LDRD Grand Challenge Project; TOPICAL

    International Nuclear Information System (INIS)

    The(mu)ChemLab(trademark) Laboratory Directed Research and Development (LDRD) Grand Challenge project began in October 1996 and ended in September 2000. The technical managers of the(mu)ChemLab(trademark) project and the LDRD office, with the support of a consultant, conducted a competitive technical and market demand intelligence analysis of the(mu)ChemLab(trademark). The managers used this knowledge to make project decisions and course adjustments. CTI/MDI positively impacted the project's technology development, uncovered potential technology partnerships, and supported eventual industry partner contacts. CTI/MDI analysis is now seen as due diligence and the(mu)ChemLab(trademark) project is now the model for other Sandia LDRD Grand Challenge undertakings. This document describes the CTI/MDI analysis and captures the more important ''lessons learned'' of this Grand Challenge project, as reported by the project's management team

  10. RF/Microwave properties and applications of directly assembled nanotubes and nanowires: LDRD project 102662 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, Theresa (The Pennyslvania State University, University Park, PA 16802); Vallett, Aaron (The Pennyslvania State University, University Park, PA 16802); Lee, Mark; Shaner, Eric Arthur; Jones, Frank E.; Talin, Albert Alec; Highstrete, Clark

    2006-11-01

    LDRD Project 102662 provided support to pursue experiments aimed at measuring the basic electrodynamic response and possible applications of carbon nanotubes and silicon nanowires at radiofrequency to microwave frequencies, approximately 0.01 to 50 GHz. Under this project, a method was developed to integrate these nanomaterials onto high-frequency compatible co-planar waveguides. The complex reflection and transmission coefficients of the nanomaterials was studied as a function of frequency. From these data, the high-frequency loss characteristics of the nanomaterials were deduced. These data are useful to predict frequency dependence and power dissipation characteristics in new rf/microwave devices incorporating new nanomaterials.

  11. Final Report for LDRD Project 02-FS-009 Gigapixel Surveillance Camera

    Energy Technology Data Exchange (ETDEWEB)

    Marrs, R E; Bennett, C L

    2010-04-20

    The threats of terrorism and proliferation of weapons of mass destruction add urgency to the development of new techniques for surveillance and intelligence collection. For example, the United States faces a serious and growing threat from adversaries who locate key facilities underground, hide them within other facilities, or otherwise conceal their location and function. Reconnaissance photographs are one of the most important tools for uncovering the capabilities of adversaries. However, current imaging technology provides only infrequent static images of a large area, or occasional video of a small area. We are attempting to add a new dimension to reconnaissance by introducing a capability for large area video surveillance. This capability would enable tracking of all vehicle movements within a very large area. The goal of our project is the development of a gigapixel video surveillance camera for high altitude aircraft or balloon platforms. From very high altitude platforms (20-40 km altitude) it would be possible to track every moving vehicle within an area of roughly 100 km x 100 km, about the size of the San Francisco Bay region, with a gigapixel camera. Reliable tracking of vehicles requires a ground sampling distance (GSD) of 0.5 to 1 m and a framing rate of approximately two frames per second (fps). For a 100 km x 100 km area the corresponding pixel count is 10 gigapixels for a 1-m GSD and 40 gigapixels for a 0.5-m GSD. This is an order of magnitude beyond the 1 gigapixel camera envisioned in our LDRD proposal. We have determined that an instrument of this capacity is feasible.

  12. Scrape-Off-Layer Flow Studies in Tokamaks: Final Report of LDRD Project 09-ERD-025

    Energy Technology Data Exchange (ETDEWEB)

    Rognlien, T D; Allen, S L; Ellis, R M; Porter, G D; Nam, S K; Weber, T R; Umansky, M V; Howard, J

    2011-11-21

    A summary is given of the work carried out under the LDRD project 09-ERD-025 entitled Scrape-Off-Layer Flow Studies in Tokamaks. This project has lead to implementation of the new prototype Fourier Transform Spectrometer edge plasma flow diagnostic on the DIII-D National Fusion Facility at General Atomics, acquisition of carbon impurity concentration and flow data, and demonstration that the resulting data compare reasonably well with LLNL's edge plasma transport code UEDGE. Details of the work are contained in attached published papers, while the most recent results that are being written-up for publication are summarized in the report. Boundary plasma flows in tokamak fusion devices are key in determining the distribution of fuel and impurity ions, with tritium build-up in the walls an especially critical operational issue. The intrusion of impurity ions to the hot plasma core region can result in serious energy-loss owing to line radiation. However, flow diagnostic capability has been severely limited in fusion-relevant hot edge plasmas where Langmuir-type probes cannot withstand the high heat flux and traditional Doppler spectroscopy has limited resolution and signal strength. Thus, new edge plasma flow diagnostic capabilities need to be developed that can be used in existing and future devices such as ITER. The understanding of such flows requires simulation with 2-dimensional transport codes owing to the geometrical complexity of the edge region in contact with material surfaces and the large number of interaction physical processes including plasma flow along and across the magnetic field, and coupling between impurity and neutral species. The characteristics of edge plasma flows are substantially affected by cross-magnetic-field drifts (ExB/B{sup 2} and BxVB/B{sup 2}), which are known to introduce substantial convergence difficulty for some cases. It is important that these difficulties be overcome so that drifts can be included in transport models

  13. Development of a cryogenic EOS capability for the Z Pulsed Radiation Source: Goals and accomplishments of FY97 LDRD project

    International Nuclear Information System (INIS)

    Experimental cryogenic capabilities are essential for the study of ICF high-gain target and weapons effects issues involving dynamic materials response at low temperatures. This report describes progress during the period 2/97-11/97 on the FY97 LDRD project ''Cryogenic EOS Capabilities on Pulsed Radiation Sources (Z Pinch)''. The goal of this project is the development of a general purpose cryogenic target system for precision EOS and shock physics measurements at liquid helium temperatures on the Z accelerator Z-pinch pulsed radiation source. Activity during the FY97 LDRD phase of this project has focused on development of a conceptual design for the cryogenic target system based on consideration of physics, operational, and safety issues, design and fabrication of principal system components, construction and instrumentation of a cryogenic test facility for off-line thermal and optical testing at liquid helium temperatures, initial thermal testing of a cryogenic target assembly, and the design of a cryogenic system interface to the Z pulsed radiation source facility. The authors discuss these accomplishments as well as elements of the project that require further work

  14. Reduced order models for thermal analysis : final report : LDRD Project No. 137807.

    Energy Technology Data Exchange (ETDEWEB)

    Hogan, Roy E., Jr.; Gartling, David K.

    2010-09-01

    This LDRD Senior's Council Project is focused on the development, implementation and evaluation of Reduced Order Models (ROM) for application in the thermal analysis of complex engineering problems. Two basic approaches to developing a ROM for combined thermal conduction and enclosure radiation problems are considered. As a prerequisite to a ROM a fully coupled solution method for conduction/radiation models is required; a parallel implementation is explored for this class of problems. High-fidelity models of large, complex systems are now used routinely to verify design and performance. However, there are applications where the high-fidelity model is too large to be used repetitively in a design mode. One such application is the design of a control system that oversees the functioning of the complex, high-fidelity model. Examples include control systems for manufacturing processes such as brazing and annealing furnaces as well as control systems for the thermal management of optical systems. A reduced order model (ROM) seeks to reduce the number of degrees of freedom needed to represent the overall behavior of the large system without a significant loss in accuracy. The reduction in the number of degrees of freedom of the ROM leads to immediate increases in computational efficiency and allows many design parameters and perturbations to be quickly and effectively evaluated. Reduced order models are routinely used in solid mechanics where techniques such as modal analysis have reached a high state of refinement. Similar techniques have recently been applied in standard thermal conduction problems e.g. though the general use of ROM for heat transfer is not yet widespread. One major difficulty with the development of ROM for general thermal analysis is the need to include the very nonlinear effects of enclosure radiation in many applications. Many ROM methods have considered only linear or mildly nonlinear problems. In the present study a reduced order model is

  15. Final report and recommendations of the ESnet Authentication Pilot Project

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

    1995-01-01

    To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

  16. Final report on LDRD project : coupling strategies for multi-physics applications.

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Matthew Morgan; Moffat, Harry K.; Carnes, Brian; Hooper, Russell Warren; Pawlowski, Roger P.

    2007-11-01

    Many current and future modeling applications at Sandia including ASC milestones will critically depend on the simultaneous solution of vastly different physical phenomena. Issues due to code coupling are often not addressed, understood, or even recognized. The objectives of the LDRD has been both in theory and in code development. We will show that we have provided a fundamental analysis of coupling, i.e., when strong coupling vs. a successive substitution strategy is needed. We have enabled the implementation of tighter coupling strategies through additions to the NOX and Sierra code suites to make coupling strategies available now. We have leveraged existing functionality to do this. Specifically, we have built into NOX the capability to handle fully coupled simulations from multiple codes, and we have also built into NOX the capability to handle Jacobi Free Newton Krylov simulations that link multiple applications. We show how this capability may be accessed from within the Sierra Framework as well as from outside of Sierra. The critical impact from this LDRD is that we have shown how and have delivered strategies for enabling strong Newton-based coupling while respecting the modularity of existing codes. This will facilitate the use of these codes in a coupled manner to solve multi-physic applications.

  17. LDRD Annual Report FY2006

    Energy Technology Data Exchange (ETDEWEB)

    Sketchley, J A; Kotta, P; De Yoreo, J; Jackson, K; van Bibber, K

    2007-03-20

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Laboratory Science and Technology Office, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration in national security, energy security, environmental management, bioscience and technology to improve human health, and breakthroughs in fundamental science and technology. The accomplishments described in this Annual Report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $92 million for FY2006 sponsored 188 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the

  18. LDRD Annual Report FY2006

    International Nuclear Information System (INIS)

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Laboratory Science and Technology Office, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration in national security, energy security, environmental management, bioscience and technology to improve human health, and breakthroughs in fundamental science and technology. The accomplishments described in this Annual Report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $92 million for FY2006 sponsored 188 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest

  19. Final report for LDRD project 11-0783 : directed robots for increased military manpower effectiveness.

    Energy Technology Data Exchange (ETDEWEB)

    Rohrer, Brandon Robinson; Rothganger, Fredrick H.; Wagner, John S.; Xavier, Patrick Gordon; Morrow, James Dan

    2011-09-01

    The purpose of this LDRD is to develop technology allowing warfighters to provide high-level commands to their unmanned assets, freeing them to command a group of them or commit the bulk of their attention elsewhere. To this end, a brain-emulating cognition and control architecture (BECCA) was developed, incorporating novel and uniquely capable feature creation and reinforcement learning algorithms. BECCA was demonstrated on both a mobile manipulator platform and on a seven degree of freedom serial link robot arm. Existing military ground robots are almost universally teleoperated and occupy the complete attention of an operator. They may remove a soldier from harm's way, but they do not necessarily reduce manpower requirements. Current research efforts to solve the problem of autonomous operation in an unstructured, dynamic environment fall short of the desired performance. In order to increase the effectiveness of unmanned vehicle (UV) operators, we proposed to develop robots that can be 'directed' rather than remote-controlled. They are instructed and trained by human operators, rather than driven. The technical approach is modeled closely on psychological and neuroscientific models of human learning. Two Sandia-developed models are utilized in this effort: the Sandia Cognitive Framework (SCF), a cognitive psychology-based model of human processes, and BECCA, a psychophysical-based model of learning, motor control, and conceptualization. Together, these models span the functional space from perceptuo-motor abilities, to high-level motivational and attentional processes.

  20. LDRD project final report : hybrid AI/cognitive tactical behavior framework for LVC.

    Energy Technology Data Exchange (ETDEWEB)

    Djordjevich, Donna D.; Xavier, Patrick Gordon; Brannon, Nathan Gregory; Hart, Brian E.; Hart, Derek H.; Little, Charles Quentin; Oppel, Fred John III; Linebarger, John Michael; Parker, Eric Paul

    2012-01-01

    This Lab-Directed Research and Development (LDRD) sought to develop technology that enhances scenario construction speed, entity behavior robustness, and scalability in Live-Virtual-Constructive (LVC) simulation. We investigated issues in both simulation architecture and behavior modeling. We developed path-planning technology that improves the ability to express intent in the planning task while still permitting an efficient search algorithm. An LVC simulation demonstrated how this enables 'one-click' layout of squad tactical paths, as well as dynamic re-planning for simulated squads and for real and simulated mobile robots. We identified human response latencies that can be exploited in parallel/distributed architectures. We did an experimental study to determine where parallelization would be productive in Umbra-based force-on-force (FOF) simulations. We developed and implemented a data-driven simulation composition approach that solves entity class hierarchy issues and supports assurance of simulation fairness. Finally, we proposed a flexible framework to enable integration of multiple behavior modeling components that model working memory phenomena with different degrees of sophistication.

  1. LDRD FY 2014 Program Plan

    Energy Technology Data Exchange (ETDEWEB)

    Anita Gianotto; Dena Tomchak

    2013-08-01

    As required by DOE Order 413.2B the FY 2014 Program Plan is written to communicate ares of investment and approximate amounts being requested for the upcoming fiscal year. The program plan also includes brief highlights of current or previous LDRD projects that have an opportunity to impact our Nation's current and future energy challenges.

  2. Evaluation of authentic science projects on climate change in secondary schools : a focus on gender differences

    NARCIS (Netherlands)

    Dijkstra, Elma; Goedhart, Martin

    2011-01-01

    Background and purpose: This study examines secondary-school students' opinions on participating in authentic science projects, which are part of an international EU project on climate change research in seven countries. Partnerships between schools and research institutes result in student projects

  3. Evaluation of Authentic Science Projects on Climate Change in Secondary Schools: A Focus on Gender Differences

    Science.gov (United States)

    Dijkstra, Elma; Goedhart, Martin

    2011-01-01

    Background and purpose: This study examines secondary-school students' opinions on participating in authentic science projects which are part of an international EU project on climate change research in seven countries. Partnerships between schools and research institutes result in student projects, in which students work with and learn from…

  4. Final report for the Multiprotocol Label Switching (MPLS) control plane security LDRD project.

    Energy Technology Data Exchange (ETDEWEB)

    Torgerson, Mark Dolan; Michalski, John T.; Tarman, Thomas David; Black, Stephen P.; Pierson, Lyndon George

    2003-09-01

    As rapid Internet growth continues, global communications becomes more dependent on Internet availability for information transfer. Recently, the Internet Engineering Task Force (IETF) introduced a new protocol, Multiple Protocol Label Switching (MPLS), to provide high-performance data flows within the Internet. MPLS emulates two major aspects of the Asynchronous Transfer Mode (ATM) technology. First, each initial IP packet is 'routed' to its destination based on previously known delay and congestion avoidance mechanisms. This allows for effective distribution of network resources and reduces the probability of congestion. Second, after route selection each subsequent packet is assigned a label at each hop, which determines the output port for the packet to reach its final destination. These labels guide the forwarding of each packet at routing nodes more efficiently and with more control than traditional IP forwarding (based on complete address information in each packet) for high-performance data flows. Label assignment is critical in the prompt and accurate delivery of user data. However, the protocols for label distribution were not adequately secured. Thus, if an adversary compromises a node by intercepting and modifying, or more simply injecting false labels into the packet-forwarding engine, the propagation of improperly labeled data flows could create instability in the entire network. In addition, some Virtual Private Network (VPN) solutions take advantage of this 'virtual channel' configuration to eliminate the need for user data encryption to provide privacy. VPN's relying on MPLS require accurate label assignment to maintain user data protection. This research developed a working distributive trust model that demonstrated how to deploy confidentiality, authentication, and non-repudiation in the global network label switching control plane. Simulation models and laboratory testbed implementations that demonstrated this concept

  5. LDRD Final Report - Investigations of the impact of the process integration of deposited magnetic films for magnetic memory technologies on radiation hardened CMOS devices and circuits - LDRD Project (FY99)

    International Nuclear Information System (INIS)

    This project represented a coordinated LLNL-SNL collaboration to investigate the feasibility of developing radiation-hardened magnetic non-volatile memories using giant magnetoresistance (GMR) materials. The intent of this limited-duration study was to investigate whether giant magnetoresistance (GMR) materials similar to those used for magnetic tunnel junctions (MTJs) were process compatible with functioning CMOS circuits. Sandia's work on this project demonstrated that deposition of GMR materials did not affect the operation nor the radiation hardness of Sandia's rad-hard CMOS technology, nor did the integration of GMR materials and exposure to ionizing radiation affect the magnetic properties of the GMR films. Thus, following deposition of GMR films on rad-hard integrated circuits, both the circuits and the films survived ionizing radiation levels consistent with DOE mission requirements. Furthermore, Sandia developed techniques to pattern deposited GMR films without degrading the completed integrated circuits upon which they were deposited. The present feasibility study demonstrated all the necessary processing elements to allow fabrication of the non-volatile memory elements onto an existing CMOS chip, and even allow the use of embedded (on-chip) non-volatile memories for system-on-a-chip applications, even in demanding radiation environments. However, funding agencies DTRA, AIM, and DARPA did not have any funds available to support the required follow-on technology development projects that would have been required to develop functioning prototype circuits, nor were such funds available from LDRD nor from other DOE program funds

  6. Three-dimensional gyrokinetic particle-in-cell simulation of plasmas on a massively parallel computer: Final report on LDRD Core Competency Project, FY 1991--FY 1993

    International Nuclear Information System (INIS)

    One of the programs of the Magnetic fusion Energy (MFE) Theory and computations Program is studying the anomalous transport of thermal energy across the field lines in the core of a tokamak. We use the method of gyrokinetic particle-in-cell simulation in this study. For this LDRD project we employed massively parallel processing, new algorithms, and new algorithms, and new formal techniques to improve this research. Specifically, we sought to take steps toward: researching experimentally-relevant parameters in our simulations, learning parallel computing to have as a resource for our group, and achieving a 100 x speedup over our starting-point Cray2 simulation code's performance

  7. Dynamic compression of synthetic diamond windows (final report for LDRD project 93531).

    Energy Technology Data Exchange (ETDEWEB)

    Dolan, Daniel H.,

    2008-09-01

    Diamond is an attractive dynamic compression window for many reasons: high elastic limit,large mechanical impedance, and broad transparency range. Natural diamonds, however, aretoo expensive to be used in destructive experiments. Chemical vapor deposition techniquesare now able to produce large single-crystal windows, opening up many potential dynamiccompression applications. This project studied the behavior of synthetic diamond undershock wave compression. The results suggest that synthetic diamond could be a usefulwindow in this field, though complete characterization proved elusive.3

  8. Coordinating robot motion, sensing, and control in plans. LDRD project final report

    Energy Technology Data Exchange (ETDEWEB)

    Xavier, P.G.; Brown, R.G.; Watterberg, P.A. [Sandia National Labs., Albuquerque, NM (United States). Intelligent Systems and Robotics Center

    1997-08-01

    The goal of this project was to develop a framework for robotic planning and execution that provides a continuum of adaptability with respect to model incompleteness, model error, and sensing error. For example, dividing robot motion into gross-motion planning, fine-motion planning, and sensor-augmented control had yielded productive research and solutions to individual problems. Unfortunately, these techniques could only be combined by hand with ad hoc methods and were restricted to systems where all kinematics are completely modeled in planning. The original intent was to develop methods for understanding and autonomously synthesizing plans that coordinate motion, sensing, and control. The project considered this problem from several perspectives. Results included (1) theoretical methods to combine and extend gross-motion and fine-motion planning; (2) preliminary work in flexible-object manipulation and an implementable algorithm for planning shortest paths through obstacles for the free-end of an anchored cable; (3) development and implementation of a fast swept-body distance algorithm; and (4) integration of Sandia`s C-Space Toolkit geometry engine and SANDROS motion planer and improvements, which yielded a system practical for everyday motion planning, with path-segment planning at interactive speeds. Results (3) and (4) have either led to follow-on work or are being used in current projects, and they believe that (2) will eventually be also.

  9. Characterizing the emissivity of materials under dynamic compression (final report for LDRD project 79877)

    International Nuclear Information System (INIS)

    Temperature measurements are crucial to equation of state development, but difficult to perform reliably. In the case of infrared pyrometry, a large uncertainty comes from the fact that sample emissivity (the deviation from a blackbody) is unknown. In this project, a method for characterizing the emissivity of shocked materials was developed. By coupling infrared radiation from the National Synchrotron Light Source to a gas gun system, broad spectrum emissivity changes were studied to a peak stress of 8 GPa. Emissivity measurements were performed on standard metals (Al, Cr, Cu, and Pt) as well as a high emissivity coating developed at Sandia

  10. Characterizing the emissivity of materials under dynamic compression (final report for LDRD project 79877).

    Energy Technology Data Exchange (ETDEWEB)

    Dolan, Daniel H.

    2007-10-01

    Temperature measurements are crucial to equation of state development, but difficult to perform reliably. In the case of infrared pyrometry, a large uncertainty comes from the fact that sample emissivity (the deviation from a blackbody) is unknown. In this project, a method for characterizing the emissivity of shocked materials was developed. By coupling infrared radiation from the National Synchrotron Light Source to a gas gun system, broad spectrum emissivity changes were studied to a peak stress of 8 GPa. Emissivity measurements were performed on standard metals (Al, Cr, Cu, and Pt) as well as a high emissivity coating developed at Sandia.

  11. Intelligent tools and process development for robotic edge finishing: LDRD project final report

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, C.L.

    1997-08-01

    This report describes a project undertaken to develop an agile automated, high-precision edge finishing system, for fabricating precision parts. The project involved re-designing and adding additional capabilities to an existing finishing work-cell. The resulting work-cell may serve as prototype for production systems to be integrated in highly flexible automated production lines. The system removes burrs formed in the machining process and produces precision chamfers. The system uses an expert system to predict the burr size from the machining history. Within the CAD system, tool paths are generated for burr removal and chamfer formation. Then, the optimal grinding process is automatically selected from a database of processes. The tool trajectory and the selected process definition is then downloaded to a robotic control system to execute the operation. The robotic control system implements a hybrid fuzzy logic-classical control scheme to achieve the desired performance goals regardless of tolerance and fixturing errors. This report describes the system architecture and the system`s performance.

  12. Final report on LDRD project : single-photon-sensitive imaging detector arrays at 1600 nm.

    Energy Technology Data Exchange (ETDEWEB)

    Childs, Kenton David; Serkland, Darwin Keith; Geib, Kent Martin; Hawkins, Samuel D.; Carroll, Malcolm S.; Klem, John Frederick; Sheng, Josephine Juin-Jye; Patel, Rupal K.; Bolles, Desta; Bauer, Tom M.; Koudelka, Robert

    2006-11-01

    The key need that this project has addressed is a short-wave infrared light detector for ranging (LIDAR) imaging at temperatures greater than 100K, as desired by nonproliferation and work for other customers. Several novel device structures to improve avalanche photodiodes (APDs) were fabricated to achieve the desired APD performance. A primary challenge to achieving high sensitivity APDs at 1550 nm is that the small band-gap materials (e.g., InGaAs or Ge) necessary to detect low-energy photons exhibit higher dark counts and higher multiplication noise compared to materials like silicon. To overcome these historical problems APDs were designed and fabricated using separate absorption and multiplication (SAM) regions. The absorption regions used (InGaAs or Ge) to leverage these materials 1550 nm sensitivity. Geiger mode detection was chosen to circumvent gain noise issues in the III-V and Ge multiplication regions, while a novel Ge/Si device was built to examine the utility of transferring photoelectrons in a silicon multiplication region. Silicon is known to have very good analog and GM multiplication properties. The proposed devices represented a high-risk for high-reward approach. Therefore one primary goal of this work was to experimentally resolve uncertainty about the novel APD structures. This work specifically examined three different designs. An InGaAs/InAlAs Geiger mode (GM) structure was proposed for the superior multiplication properties of the InAlAs. The hypothesis to be tested in this structure was whether InAlAs really presented an advantage in GM. A Ge/Si SAM was proposed representing the best possible multiplication material (i.e., silicon), however, significant uncertainty existed about both the Ge material quality and the ability to transfer photoelectrons across the Ge/Si interface. Finally a third pure germanium GM structure was proposed because bulk germanium has been reported to have better dark count properties. However, significant

  13. FY2014 LBNL LDRD Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Ho, Darren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-06-01

    Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE’s National Laboratory System, Berkeley Lab supports DOE’s missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation. The LDRD program supports Berkeley Lab’s mission in many ways. First, because LDRD funds can be allocated within a relatively short time frame, Berkeley Lab researchers can support the mission of the Department of Energy (DOE) and serve the needs of the nation by quickly responding to forefront scientific problems. Second, LDRD enables Berkeley Lab to attract and retain highly qualified scientists and to support their efforts to carry out worldleading research. In addition, the LDRD program also supports new projects that involve graduate students and postdoctoral fellows, thus contributing to the education mission of Berkeley Lab.

  14. LDRD Final Report - Investigations of the impact of the process integration of deposited magnetic films for magnetic memory technologies on radiation-hardened CMOS devices and circuits - LDRD Project (FY99)

    Energy Technology Data Exchange (ETDEWEB)

    MYERS,DAVID R.; JESSING,JEFFREY R.; SPAHN,OLGA B.; SHANEYFELT,MARTY R.

    2000-01-01

    This project represented a coordinated LLNL-SNL collaboration to investigate the feasibility of developing radiation-hardened magnetic non-volatile memories using giant magnetoresistance (GMR) materials. The intent of this limited-duration study was to investigate whether giant magnetoresistance (GMR) materials similar to those used for magnetic tunnel junctions (MTJs) were process compatible with functioning CMOS circuits. Sandia's work on this project demonstrated that deposition of GMR materials did not affect the operation nor the radiation hardness of Sandia's rad-hard CMOS technology, nor did the integration of GMR materials and exposure to ionizing radiation affect the magnetic properties of the GMR films. Thus, following deposition of GMR films on rad-hard integrated circuits, both the circuits and the films survived ionizing radiation levels consistent with DOE mission requirements. Furthermore, Sandia developed techniques to pattern deposited GMR films without degrading the completed integrated circuits upon which they were deposited. The present feasibility study demonstrated all the necessary processing elements to allow fabrication of the non-volatile memory elements onto an existing CMOS chip, and even allow the use of embedded (on-chip) non-volatile memories for system-on-a-chip applications, even in demanding radiation environments. However, funding agencies DTRA, AIM, and DARPA did not have any funds available to support the required follow-on technology development projects that would have been required to develop functioning prototype circuits, nor were such funds available from LDRD nor from other DOE program funds.

  15. Authentic Leadership: An Emerging Issue in Project Management

    OpenAIRE

    Saif Ur Rehman Khan; Choi Sang Long; Syed Muhammad Javed Iqbal

    2014-01-01

    Leadership has been a feature of general organizations but in project management much space is empty. New styles of leadership are being introduced and project leadership also can’t escape. With the advancement in project management project leadership requires new effective behaviors in organizations if it is to remain relevant. Interestingly, still project leadership has no separate wing of theory under the subject of project management but striving to strengthen the concept as distinct bran...

  16. 1999 LDRD Laboratory Directed Research and Development

    Energy Technology Data Exchange (ETDEWEB)

    Rita Spencer; Kyle Wheeler

    2000-06-01

    This is the FY 1999 Progress Report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes work done on individual research projects, relates the projects to major Laboratory program sponsors, and provides an index to the principal investigators. Project summaries are grouped by their LDRD component: Competency Development, Program Development, and Individual Projects. Within each component, they are further grouped into nine technical categories: (1) materials science, (2) chemistry, (3) mathematics and computational science, (4) atomic, molecular, optical, and plasma physics, fluids, and particle beams, (5) engineering science, (6) instrumentation and diagnostics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) bioscience.

  17. Final report for LDRD project {open_quotes}A new approach to protein function and structure prediction{close_quotes}

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, C.A.

    1997-03-01

    This report describes the research performed under the laboratory-Directed Research and Development (LDRD) grant {open_quotes}A new approach to protein function and structure prediction{close_quotes}, funded FY94-6. We describe the goals of the research, motivate and list our improvements to the state of the art in multiple sequence alignment and phylogeny (evolutionary tree) construction, but leave technical details to the six publications resulting from this work. At least three algorithms for phylogeny construction or tree consensus have been implemented and used by researchers outside of Sandia.

  18. Tiger LDRD final report

    Energy Technology Data Exchange (ETDEWEB)

    Steich, D J; Brugger, S T; Kallman, J S; White, D A

    2000-02-01

    This final report describes our efforts on the Three-Dimensional Massively Parallel CEM Technologies LDRD project (97-ERD-009). Significant need exists for more advanced time domain computational electromagnetics modeling. Bookkeeping details and modifying inflexible software constitute a vast majority of the effort required to address such needs. The required effort escalates rapidly as problem complexity increases. For example, hybrid meshes requiring hybrid numerics on massively parallel platforms (MPPs). This project attempts to alleviate the above limitations by investigating flexible abstractions for these numerical algorithms on MPPs using object-oriented methods, providing a programming environment insulating physics from bookkeeping. The three major design iterations during the project, known as TIGER-I to TIGER-III, are discussed. Each version of TIGER is briefly discussed along with lessons learned during the development and implementation. An Application Programming Interface (API) of the object-oriented interface for Tiger-III is included in three appendices. The three appendices contain the Utilities, Entity-Attribute, and Mesh libraries developed during the project. The API libraries represent a snapshot of our latest attempt at insulated the physics from the bookkeeping.

  19. Hardness Assurance for Low-Energy Proton-Induced Single-Event Effects: Final report for LDRD Project 173134

    Energy Technology Data Exchange (ETDEWEB)

    Dodds, Nathaniel Anson [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-08-01

    This report briefly summarizes three publications that resulted from a two-year LDRD. The three publications address a recently emerging reliability issue: namely, that low-energy protons (LEPs) can cause single-event effects (SEEs) in highly scaled microelectronics. These publications span from low to high technology readiness levels. In the first, novel experiments were used to prove that proton direct ionization is the dominant mechanism for LEP-induced SEEs. In the second, a simple method was developed to calculate expected on-orbit error rates for LEP effects. This simplification was enabled by creating (and characterizing) an accelerated space-like LEP environment in the laboratory. In the third publication, this new method was applied to many memory circuits from the 20-90 nm technology nodes to study the general importance of LEP effects, in terms of their contribution to the total on-orbit SEE rate.

  20. Microwave to millimeter-wave electrodynamic response and applications of semiconductor nanostructures: LDRD project 67025 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Shaner, Eric Arthur; Lee, Mark; Averitt, R. D. (Los Alamos National Laboratory); Highstrete, Clark; Taylor, A. J. (Los Alamos National Laboratory); Padilla, W. J. (Los Alamos National Laboratory); Reno, John Louis; Wanke, Michael Clement; Allen, S. James (University of California Santa Barbara)

    2006-11-01

    Solid-state lighting (SSL) technologies, based on semiconductor light emitting devices, have the potential to reduce worldwide electricity consumption by more than 10%, which could significantly reduce U.S. dependence on imported energy and improve energy security. The III-nitride (AlGaInN) materials system forms the foundation for white SSL and could cover a wide spectral range from the deep UV to the infrared. For this LDRD program, we have investigated the synthesis of single-crystalline III-nitride nanowires and heterostructure nanowires, which may possess unique optoelectronic properties. These novel structures could ultimately lead to the development of novel and highly efficient SSL nanodevice applications. GaN and III-nitride core-shell heterostructure nanowires were successfully synthesized by metal organic chemical vapor deposition (MOCVD) on two-inch wafer substrates. The effect of process conditions on nanowire growth was investigated, and characterization of the structural, optical, and electrical properties of the nanowires was also performed.

  1. 2007 LDRD ANNUAL REPORT

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-16

    I am pleased to present the fiscal year 2007 Laboratory Directed Research and Development (LDRD) annual report. This represents the first year that SRNL has been eligible for LDRD participation and our results to date demonstrate we are off to an excellent start. SRNL became a National Laboratory in 2004, and was designated the 'Corporate Laboratory' for the DOE Office of Environmental Management (EM) in 2006. As you will see, we have made great progress since these designations. The LDRD program is one of the tools SRNL is using to enable achievement of our strategic goals for the DOE. The LDRD program allows the laboratory to blend a strong basic science component into our applied technical portfolio. This blending of science with applied technology provides opportunities for our scientists to strengthen our capabilities and delivery. The LDRD program is vital to help SRNL attract and retain leading scientists and engineers who will help build SRNL's future and achieve DOE mission objectives. This program has stimulated our research staff creativity, while realizing benefits from their participation. This investment will yield long term dividends to the DOE in its Environmental Management, Energy, and National Security missions.

  2. Final report for LDRD project 11-0029 : high-interest event detection in large-scale multi-modal data sets : proof of concept.

    Energy Technology Data Exchange (ETDEWEB)

    Rohrer, Brandon Robinson

    2011-09-01

    Events of interest to data analysts are sometimes difficult to characterize in detail. Rather, they consist of anomalies, events that are unpredicted, unusual, or otherwise incongruent. The purpose of this LDRD was to test the hypothesis that a biologically-inspired anomaly detection algorithm could be used to detect contextual, multi-modal anomalies. There currently is no other solution to this problem, but the existence of a solution would have a great national security impact. The technical focus of this research was the application of a brain-emulating cognition and control architecture (BECCA) to the problem of anomaly detection. One aspect of BECCA in particular was discovered to be critical to improved anomaly detection capabilities: it's feature creator. During the course of this project the feature creator was developed and tested against multiple data types. Development direction was drawn from psychological and neurophysiological measurements. Major technical achievements include the creation of hierarchical feature sets created from both audio and imagery data.

  3. 2013 SRNL LDRD Annual Report

    International Nuclear Information System (INIS)

    This report demonstrates the execution of our LDRD program within the objectives and guidelines outlined by the Department of Energy (DOE) through the DOE Order 413.2b. The projects described within the report align purposefully with SRNL's strategic vision and provide great value to the DOE. The diversity exhibited in the research and development projects underscores the DOE Office of Environmental Management (DOE-EM) mission and enhances that mission by developing the technical capabilities and human capital necessary to support future DOE-EM national needs. As a multiprogram national laboratory, SRNL is applying those capabilities to achieve tangible results for the nation in National Security, Environmental Stewardship, Clean Energy and Nuclear Materials Management

  4. 2013 SRNL LDRD Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    McWhorter, S.

    2014-03-07

    This report demonstrates the execution of our LDRD program within the objectives and guidelines outlined by the Department of Energy (DOE) through the DOE Order 413.2b. The projects described within the report align purposefully with SRNL’s strategic vision and provide great value to the DOE. The diversity exhibited in the research and development projects underscores the DOE Office of Environmental Management (DOE-EM) mission and enhances that mission by developing the technical capabilities and human capital necessary to support future DOE-EM national needs. As a multiprogram national laboratory, SRNL is applying those capabilities to achieve tangible results for the nation in National Security, Environmental Stewardship, Clean Energy and Nuclear Materials Management.

  5. Implementing an authentic research project on eastern coyotes at an urban high school

    Directory of Open Access Journals (Sweden)

    David L. Eatough

    2008-01-01

    Full Text Available The need for inquiry oriented authentic activities is imperative to engage high school students in the active involvement and associated learning of science. Herein, we describe our experience of involving high school students in the process of studying wild coyotes in and around the communities where they live. We found that many became aware and familiar with the program but few participated to the point of being contributing members of the scientific community. To make this project sustainable in the long-run three important things must happen: one, there must be reliable point person (such as a graduate student who can focus on the ecology side of the coyote project while others can focus on the educational components of the collaboration; two, mechanisms must be put in place to provide incentives for participants; and three, funding must be reliable and substantial over time.

  6. Google Classroom and Open Clusters: An Authentic Science Research Project for High School Students

    Science.gov (United States)

    Johnson, Chelen H.; Linahan, Marcella; Cuba, Allison Frances; Dickmann, Samantha Rose; Hogan, Eleanor B.; Karos, Demetra N.; Kozikowski, Kendall G.; Kozikowski, Lauren Paige; Nelson, Samantha Brooks; O'Hara, Kevin Thomas; Ropinski, Brandi Lucia; Scarpa, Gabriella; Garmany, Catharine D.

    2016-01-01

    STEM education is about offering unique opportunities to our students. For the past three years, students from two high schools (Breck School in Minneapolis, MN, and Carmel Catholic High School in Mundelein, IL) have collaborated on authentic astronomy research projects. This past year they surveyed archival data of open clusters to determine if a clear turnoff point could be unequivocally determined. Age and distance to each open cluster were calculated. Additionally, students requested time on several telescopes to obtain original data to compare to the archival data. Students from each school worked in collaborative teams, sharing and verifying results through regular online hangouts and chats. Work papers were stored in a shared drive and on a student-designed Google site to facilitate dissemination of documents between the two schools.

  7. Writing the Book…Literally: The Convergence of Authentic Intellectual Work (AIW) and Project-Based Learning (PBL)

    Science.gov (United States)

    Buckmiller, Tom M.; Kruse, Jerrid W.

    2015-01-01

    Using the Project-Based Learning (PBL) and Authentic Intellectual Work (AIW) models, we sought to create coursework that had value beyond the classroom. Refinements in the self-publishing book industry provide the opportunity to present student work to a larger audience and in a different, more engaging format. With the help of free software, our…

  8. Contextual Student Learning through Authentic Asteroid Research Projects using a Robotic Telescope Network

    Science.gov (United States)

    Hoette, Vivian L.; Puckett, Andrew W.; Linder, Tyler R.; Heatherly, Sue Ann; Rector, Travis A.; Haislip, Joshua B.; Meredith, Kate; Caughey, Austin L.; Brown, Johnny E.; McCarty, Cameron B.; Whitmore, Kevin T.

    2015-11-01

    Skynet is a worldwide robotic telescope network operated by the University of North Carolina at Chapel Hill with active observing sites on 3 continents. The queue-based observation request system is simple enough to be used by middle school students, but powerful enough to supply data for research scientists. The Skynet Junior Scholars program, funded by the NSF, has teamed up with professional astronomers to engage students from middle school to undergraduates in authentic research projects, from target selection through image analysis and publication of results. Asteroid research is a particularly fruitful area for youth collaboration that reinforces STEM education standards and can allow students to make real contributions to scientific knowledge, e.g., orbit refinement through astrometric submissions to the Minor Planet Center. We have created a set of projects for youth to: 1. Image an asteroid, make a movie, and post it to a gallery; 2. Measure the asteroid’s apparent motion using the Afterglow online image processor; and 3. Image asteroids from two or more telescopes simultaneously to demonstrate parallax. The apparent motion and parallax projects allow students to estimate the distance to their asteroid, as if they were the discoverer of a brand new object in the solar system. Older students may take on advanced projects, such as analyzing uncertainties in asteroid orbital parameters; studying impact probabilities of known objects; observing time-sensitive targets such as Near Earth Asteroids; and even discovering brand new objects in the solar system.Images are acquired from among seven Skynet telescopes in North Carolina, California, Wisconsin, Canada, Australia, and Chile, as well as collaborating observatories such as WestRock in Columbus, Georgia; Stone Edge in El Verano, California; and Astronomical Research Institute in Westfield, Illinois.

  9. Final report on grand challenge LDRD project : a revolution in lighting : building the science and technology base for ultra-efficient solid-state lighting.

    Energy Technology Data Exchange (ETDEWEB)

    Copeland, Robert Guild; Mitchell, Christine Charlotte; Follstaedt, David Martin; Lee, Stephen Roger; Shul, Randy John; Fischer, Arthur Joseph; Chow, Weng Wah Dr.; Myers, Samuel Maxwell, Jr.; Thoma, Steven George; Gee, James Martin; Coltrin, Michael Elliott; Burdick, Brent A.; Salamone, Angelo, L., Jr.; Hadley, G. Ronald; Elliott, Russell D.; Campbell, Jonathan M.; Abrams, Billie Lynn; Wendt, Joel Robert; Pawlowski, Roger Patrick; Simpson, Regina Lynn; Kurtz, Steven Ross; Cole, Phillip James; Fullmer, Kristine Wanta; Seager, Carleton Hoover; Bogart, Katherine Huderle Andersen; Biefeld, Robert Malcolm; Kerley, Thomas M.; Norman, Adam K.; Tallant, David Robert; Woessner, Stephen Matthew; Figiel, Jeffrey James; Moffat, Harry K.; Provencio, Paula Polyak; Emerson, John Allen; Kaplar, Robert James; Wilcoxon, Jess Patrick; Waldrip, Karen Elizabeth; Rohwer, Lauren Elizabeth Shea; Cross, Karen Charlene; Wright, Alan Francis; Gonzales, Rene Marie; Salinger, Andrew Gerhard; Crawford, Mary Hagerott; Garcia, Marie L.; Allen, Mark S.; Southwell, Edwin T. (Perspectives, Sedona, AZ); Bauer, Tom M.; Monson, Mary Ann; Tsao, Jeffrey Yeenien; Creighton, James Randall; Allerman, Andrew Alan; Simmons, Jerry A.; Boyack, Kevin W.; Jones, Eric Daniel; Moran, Michael P.; Pinzon, Marcia J. (Perspectives, Sedona, AZ); Pinson, Ariane O. (Perspectives, Sedona, AZ); Miksovic, Ann E. (Perspectives, Sedona, AZ); Wang, George T.; Ashby, Carol Iris Hill; Missert, Nancy A.; Koleske, Daniel David; Rahal, Nabeel M.

    2004-06-01

    This SAND report is the final report on Sandia's Grand Challenge LDRD Project 27328, 'A Revolution in Lighting -- Building the Science and Technology Base for Ultra-Efficient Solid-state Lighting.' This project, which for brevity we refer to as the SSL GCLDRD, is considered one of Sandia's most successful GCLDRDs. As a result, this report reviews not only technical highlights, but also the genesis of the idea for Solid-state Lighting (SSL), the initiation of the SSL GCLDRD, and the goals, scope, success metrics, and evolution of the SSL GCLDRD over the course of its life. One way in which the SSL GCLDRD was different from other GCLDRDs was that it coincided with a larger effort by the SSL community - primarily industrial companies investing in SSL, but also universities, trade organizations, and other Department of Energy (DOE) national laboratories - to support a national initiative in SSL R&D. Sandia was a major player in publicizing the tremendous energy savings potential of SSL, and in helping to develop, unify and support community consensus for such an initiative. Hence, our activities in this area, discussed in Chapter 6, were substantial: white papers; SSL technology workshops and roadmaps; support for the Optoelectronics Industry Development Association (OIDA), DOE and Senator Bingaman's office; extensive public relations and media activities; and a worldwide SSL community website. Many science and technology advances and breakthroughs were also enabled under this GCLDRD, resulting in: 55 publications; 124 presentations; 10 book chapters and reports; 5 U.S. patent applications including 1 already issued; and 14 patent disclosures not yet applied for. Twenty-six invited talks were given, at prestigious venues such as the American Physical Society Meeting, the Materials Research Society Meeting, the AVS International Symposium, and the Electrochemical Society Meeting. This report contains a summary of these science and technology

  10. Inspiring students through an authentic polar science expedition: the RESEt Project

    Science.gov (United States)

    Cattadori, Matteo

    2016-04-01

    RESEt (Research and Education Svalbard Experience www.resetsvalbard.it) is an ongoing educational project focusing mainly on polar and climate system topics. It started in 2014 and will end in 2017 with the high school diploma of the 22 students (16 y. o.) making the participant class. This class attend a school (Liceo Filzi, Rovereto, Trento. Italy) with a primary focus on disciplines like philosophy and education, rather then STEM (Science, Technology, Engineering, and Mathematics). Nevertheless their science curricula include climate topics that are rather challenging to grasp and, at the same time, crucial for their scientific citizenship. Some questions arise: How to foster their interest in geosciences topics? How to engage them in authentic scientific knowledge? How to increase their interest in scientific university courses during their post-secondary career? RESEt project will attempt to answer these questions through the development of integrated activities distributed over the last three years of their high school cycle. The most important moment will be an educational scientific expedition at the Svalbard, an archipelago located in the Arctic. The expedition be entirely organized, planned, and directed by students. In Svalbard, students will visit the main scientific facilities devoted to climate studies including those of Italian CNR (National Research Council) and they will perform some environmental measurement using data-loggers. Students are even involved in the fundraising process to raise more than ten thousand Euros needed to for travel expenses. This work is aimed mainly at presenting some of the preliminary data collected during the RESEt project, including the fundraising aspects. The management of the RESEt project strongly relies on the experience and network gained by the abstract author during the participation to the Education and Public Outreach (EPO) program of International Polar Year (IPY) 2007-2009 as well as the support of Polar

  11. FY02 Engineering Technology Reports Volume 2: LDRD

    Energy Technology Data Exchange (ETDEWEB)

    Minichino, C; Meeker, D

    2003-05-19

    This report summarizes the science and technology research and development efforts in Lawrence Livermore National Laboratory's Engineering Directorate for FY2002, and exemplifies Engineering's 50-year history of developing the technologies needed to support the Laboratory's missions. Engineering has been a partner in every major program and project at the Laboratory throughout its existence and has prepared for this role with a skilled workforce and the technical resources developed through venues like the Laboratory Directed Research and Development Program (LDRD). This accomplishment is well summarized by Engineering's mission: ''To make programs succeed today and to ensure the vitality of the Laboratory tomorrow.'' Engineering's investment in new technologies is carried out through two programs, the ''Tech Base'' program (Volume I) and the LDRD program (Volume II). This report summarizes the LDRD portion of Engineering's Technology Program. LDRD is the vehicle for researching and developing those technologies and competencies that are cutting edge, or that require a significant level of research, or contain some unknown that needs to be fully understood. Tech Base is used to apply those technologies, or adapt them to a Laboratory need. The term commonly used for Tech Base projects is ''reduction to practice.'' Therefore, the LDRD report covered here has a strong research emphasis. Areas that are presented all fall into those needed to accomplish our mission. For FY2002, Engineering's LDRD projects were focused on mesoscale target fabrication and characterization, development of engineering computational capability, material studies and modeling, remote sensing and communications, and microtechnology for national security applications.

  12. Brand new authentic places

    DEFF Research Database (Denmark)

    Stender, Marie

    relation and interplay between the two. This study strives to fill this gap by ethnographically tracing the process from design to occupancy including the role of branding as a means to create authenticity. The concept of authenticity is often associated with old houses and neighbourhoods, but also in new...... neighbourhoods stories of authenticity seems to be of great importance giving value and identity to place and people. By way of design and branding new places are implied with notions of the real, the original and the unique referring to e.g. its historical past, architectural uniqueness, sustainability or sense...... of community. The project explores the inherent paradox of such staging of authenticity by way of three research questions: 1) How are new houses and areas made authentic through stories told through material design and branding? 2) What different concepts of authenticity are at stake? 3) How are the...

  13. Computational Biology: A Strategic Initiative LDRD

    Energy Technology Data Exchange (ETDEWEB)

    Barksy, D; Colvin, M

    2002-02-07

    The goal of this Strategic Initiative LDRD project was to establish at LLNL a new core capability in computational biology, combining laboratory strengths in high performance computing, molecular biology, and computational chemistry and physics. As described in this report, this project has been very successful in achieving this goal. This success is demonstrated by the large number of referred publications, invited talks, and follow-on research grants that have resulted from this project. Additionally, this project has helped build connections to internal and external collaborators and funding agencies that will be critical to the long-term vitality of LLNL programs in computational biology. Most importantly, this project has helped establish on-going research groups in the Biology and Biotechnology Research Program, the Physics and Applied Technology Directorate, and the Computation Directorate. These groups include three laboratory staff members originally hired as post-doctoral researchers for this strategic initiative.

  14. SRNL LDRD ANNUAL REPORT 2008

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-29

    The Laboratory Director is pleased to have the opportunity to present the 2008 Laboratory Directed Research and Development (LDRD) annual report. This is my first opportunity to do so, and only the second such report that has been issued. As will be obvious, SRNL has built upon the excellent start that was made with the LDRD program last year, and researchers have broken new ground in some important areas. In reviewing the output of this program this year, it is clear that the researchers implemented their ideas with creativity, skill and enthusiasm. It is gratifying to see this level of participation, because the LDRD program remains a key part of meeting SRNL's and DOE's strategic goals, and helps lay a solid scientific foundation for SRNL as the premier applied science laboratory. I also believe that the LDRD program's results this year have demonstrated SRNL's value as the EM Corporate Laboratory, having advanced knowledge in a spectrum of areas, including reduction of the technical risks of cleanup, separations science, packaging and transportation of nuclear materials, and many others. The research in support of Energy Security and National and Homeland Security has been no less notable. SRNL' s researchers have shown again that the nascent LDRD program is a sound investment for DOE that will pay off handsomely for the nation as time goes on.

  15. Impact of Problem Finding on the Quality of Authentic Open Inquiry Science Research Projects

    Science.gov (United States)

    LaBanca, Frank

    2008-01-01

    Problem finding is a creative process whereby individuals develop original ideas for study. Secondary science students who successfully participate in authentic, novel, open inquiry studies must engage in problem finding to determine viable and suitable topics. This study examined problem finding strategies employed by students who successfully…

  16. LDRD 149045 final report distinguishing documents.

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Scott A.

    2010-09-01

    This LDRD 149045 final report describes work that Sandians Scott A. Mitchell, Randall Laviolette, Shawn Martin, Warren Davis, Cindy Philips and Danny Dunlavy performed in 2010. Prof. Afra Zomorodian provided insight. This was a small late-start LDRD. Several other ongoing efforts were leveraged, including the Networks Grand Challenge LDRD, and the Computational Topology CSRF project, and the some of the leveraged work is described here. We proposed a sentence mining technique that exploited both the distribution and the order of parts-of-speech (POS) in sentences in English language documents. The ultimate goal was to be able to discover 'call-to-action' framing documents hidden within a corpus of mostly expository documents, even if the documents were all on the same topic and used the same vocabulary. Using POS was novel. We also took a novel approach to analyzing POS. We used the hypothesis that English follows a dynamical system and the POS are trajectories from one state to another. We analyzed the sequences of POS using support vector machines and the cycles of POS using computational homology. We discovered that the POS were a very weak signal and did not support our hypothesis well. Our original goal appeared to be unobtainable with our original approach. We turned our attention to study an aspect of a more traditional approach to distinguishing documents. Latent Dirichlet Allocation (LDA) turns documents into bags-of-words then into mixture-model points. A distance function is used to cluster groups of points to discover relatedness between documents. We performed a geometric and algebraic analysis of the most popular distance functions and made some significant and surprising discoveries, described in a separate technical report.

  17. WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)

    International Nuclear Information System (INIS)

    The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements

  18. Neurons to algorithms LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Rothganger, Fredrick H.; Aimone, James Bradley; Warrender, Christina E.; Trumbo, Derek

    2013-09-01

    Over the last three years the Neurons to Algorithms (N2A) LDRD project teams has built infrastructure to discover computational structures in the brain. This consists of a modeling language, a tool that enables model development and simulation in that language, and initial connections with the Neuroinformatics community, a group working toward similar goals. The approach of N2A is to express large complex systems like the brain as populations of a discrete part types that have specific structural relationships with each other, along with internal and structural dynamics. Such an evolving mathematical system may be able to capture the essence of neural processing, and ultimately of thought itself. This final report is a cover for the actual products of the project: the N2A Language Specification, the N2A Application, and a journal paper summarizing our methods.

  19. Final report for %22High performance computing for advanced national electric power grid modeling and integration of solar generation resources%22, LDRD Project No. 149016.

    Energy Technology Data Exchange (ETDEWEB)

    Reno, Matthew J.; Riehm, Andrew Charles; Hoekstra, Robert John; Munoz-Ramirez, Karina; Stamp, Jason Edwin; Phillips, Laurence R.; Adams, Brian M.; Russo, Thomas V.; Oldfield, Ron A.; McLendon, William Clarence, III; Nelson, Jeffrey Scott; Hansen, Clifford W.; Richardson, Bryan T.; Stein, Joshua S.; Schoenwald, David Alan; Wolfenbarger, Paul R.

    2011-02-01

    Design and operation of the electric power grid (EPG) relies heavily on computational models. High-fidelity, full-order models are used to study transient phenomena on only a small part of the network. Reduced-order dynamic and power flow models are used when analysis involving thousands of nodes are required due to the computational demands when simulating large numbers of nodes. The level of complexity of the future EPG will dramatically increase due to large-scale deployment of variable renewable generation, active load and distributed generation resources, adaptive protection and control systems, and price-responsive demand. High-fidelity modeling of this future grid will require significant advances in coupled, multi-scale tools and their use on high performance computing (HPC) platforms. This LDRD report demonstrates SNL's capability to apply HPC resources to these 3 tasks: (1) High-fidelity, large-scale modeling of power system dynamics; (2) Statistical assessment of grid security via Monte-Carlo simulations of cyber attacks; and (3) Development of models to predict variability of solar resources at locations where little or no ground-based measurements are available.

  20. Data Authentication Using Cryptography

    Directory of Open Access Journals (Sweden)

    Sagar Chouksey

    2013-06-01

    Full Text Available We present a novel approach using cryptographyfor data authentication. The key idea is to provide aencoded quantized data projection as authenticationdata. This can be correctly decoded with the help ofan authentic data using as side information.Cryptography source coding provides the desiredrobustness against legitimate variations whiledetecting illegitimate modification. Additionaladjustments might not change the meaning of thecontent, but could be misclassified as tampering.Users might also beinterested in localizingtampered regions. Distinguishing legitimateencodings with possible adjustments fromtampering and localizing tampering are thechallenges addressed in this paper. We applycryptography source coding and statistical methodsto solve the data authentication problem.Experimental results have been presented for dataauthentication.

  1. A Multi-Unit Project for Building Scientific Confidence via Authentic Research in Identification of Environmental Bacterial Isolates

    Directory of Open Access Journals (Sweden)

    Christa Chatfield

    2014-08-01

    Full Text Available This authentic research project is designed to identify environmental isolates by metabolic phenotypes and 16s sequence analysis and with an investigation of biofilm growth is presented as implemented in an upper-level microbiology lab course. Three units were used in the lab: one for basic metabolic identification, one for the 16s rDNA sequencing and a third for biofilm growth analysis. Assessment was by weekly notebook entries detailing the outcomes of each day in lab, providing relatively on-time feedback on student understanding and learning to both the student and the instructor. The intent for these units was for each to increase the uncertainty of the project outcomes and to challenge students to design projects with open-ended results. All student groups have been able to obtain DNA sequence data in the limited 6-7 weeks of the lab project. Students report increased confidence in their abilities and a general excitement about the project methods and results. The data produced by the students can be incorporated into larger research questions posed by the faculty running the course as determined by the source of the unknown bacterial isolates.

  2. Geospatial Authentication

    Science.gov (United States)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.

  3. Final report for the network authentication investigation and pilot.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  4. Final LDRD report :

    Energy Technology Data Exchange (ETDEWEB)

    Ambrosini, Andrea; Miller, James Edward; Allendorf, Mark D.; Coker, Eric Nicholas; Ermanoski, Ivan; Hogan, Roy E.,; McDaniel, Anthony H.

    2014-01-01

    Despite rapid progress, solar thermochemistry remains high risk; improvements in both active materials and reactor systems are needed. This claim is supported by studies conducted both prior to and as part of this project. Materials offer a particular large opportunity space as, until recently, very little effort apart from basic thermodynamic analysis was extended towards understanding this most fundamental component of a metal oxide thermochemical cycle. Without this knowledge, system design was hampered, but more importantly, advances in these crucial materials were rare and resulted more from intuition rather than detailed insight. As a result, only two basic families of potentially viable solid materials have been widely considered, each of which has significant challenges. Recent efforts towards applying an increased level of scientific rigor to the study of thermochemical materials have provided a much needed framework and insights toward developing the next generation of highly improved thermochemically active materials. The primary goal of this project was to apply this hard-won knowledge to rapidly advance the field of thermochemistry to produce a material within 2 years that is capable of yielding CO from CO2 at a 12.5 % reactor efficiency. Three principal approaches spanning a range of risk and potential rewards were pursued: modification of known materials, structuring known materials, and identifying/developing new materials for the application. A newly developed best-of-class material produces more fuel (9x more H2, 6x more CO) under milder conditions than the previous state of the art. Analyses of thermochemical reactor and system efficiencies and economics were performed and a new hybrid concept was reported. The larger case for solar fuels was also further refined and documented.

  5. Exploring the Relationship between Authentic Leadership and Project Outcomes and Job Satisfaction with Information Technology Professionals

    Science.gov (United States)

    Fischer, Mark A.

    2014-01-01

    One of the most important issues for organizations and information technology (IT) professionals is measuring the success or failure of information technology projects. How we understand the value and usefulness of IT projects is critical to how information technology executives evaluate and decide on technology investments. In a 2009 CHAOS…

  6. Transportation Energy Pathways LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Barter, Garrett; Reichmuth, David; Westbrook, Jessica; Malczynski, Leonard A. [Sandia National Laboratories, Albuquerque, NM; Yoshimura, Ann S.; Peterson, Meghan; West, Todd H.; Manley, Dawn Kataoka; Guzman, Katherine Dunphy; Edwards, Donna M.; Hines, Valerie Ann-Peters

    2012-09-01

    This report presents a system dynamics based model of the supply-demand interactions between the USlight-duty vehicle (LDV) fleet, its fuels, and the corresponding primary energy sources through the year2050. An important capability of our model is the ability to conduct parametric analyses. Others have reliedupon scenario-based analysis, where one discrete set of values is assigned to the input variables and used togenerate one possible realization of the future. While these scenarios can be illustrative of dominant trendsand tradeoffs under certain circumstances, changes in input values or assumptions can have a significantimpact on results, especially when output metrics are associated with projections far into the future. Thistype of uncertainty can be addressed by using a parametric study to examine a range of values for the inputvariables, offering a richer source of data to an analyst.The parametric analysis featured here focuses on a trade space exploration, with emphasis on factors thatinfluence the adoption rates of electric vehicles (EVs), the reduction of GHG emissions, and the reduction ofpetroleum consumption within the US LDV fleet. The underlying model emphasizes competition between13 different types of powertrains, including conventional internal combustion engine (ICE) vehicles, flex-fuel vehicles (FFVs), conventional hybrids(HEVs), plug-in hybrids (PHEVs), and battery electric vehicles(BEVs).We find that many factors contribute to the adoption rates of EVs. These include the pace of technologicaldevelopment for the electric powertrain, battery performance, as well as the efficiency improvements inconventional vehicles. Policy initiatives can also have a dramatic impact on the degree of EV adoption. Theconsumer effective payback period, in particular, can significantly increase the market penetration rates ifextended towards the vehicle lifetime.Widespread EV adoption can have noticeable impact on petroleum consumption and greenhouse gas

  7. Enhanced Micellar Catalysis LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Betty, Rita G.; Tucker, Mark David; Taggart, Gretchen; Kinnan, Mark K.; Glen, Crystal Chanea; Rivera, Danielle; Sanchez, Andres; Alam, Todd Michael

    2012-12-01

    The primary goals of the Enhanced Micellar Catalysis project were to gain an understanding of the micellar environment of DF-200, or similar liquid CBW surfactant-based decontaminants, as well as characterize the aerosolized DF-200 droplet distribution and droplet chemistry under baseline ITW rotary atomization conditions. Micellar characterization of limited surfactant solutions was performed externally through the collection and measurement of Small Angle X-Ray Scattering (SAXS) images and Cryo-Transmission Electron Microscopy (cryo-TEM) images. Micellar characterization was performed externally at the University of Minnesota's Characterization Facility Center, and at the Argonne National Laboratory Advanced Photon Source facility. A micellar diffusion study was conducted internally at Sandia to measure diffusion constants of surfactants over a concentration range, to estimate the effective micelle diameter, to determine the impact of individual components to the micellar environment in solution, and the impact of combined components to surfactant phase behavior. Aerosolized DF-200 sprays were characterized for particle size and distribution and limited chemical composition. Evaporation rates of aerosolized DF-200 sprays were estimated under a set of baseline ITW nozzle test system parameters.

  8. The Berlin project: a marriage between professional competences and authentic language acquisition

    OpenAIRE

    De Pau, Carine; Paelman, Beatrijs; Michels, Peter

    2011-01-01

    This project aims at increasing the German communicative skills of our Flemish students (professional Bachelor Communication), resulting in a 4 days’ stay in Berlin. The project concentrates on intercultural communication, learning to work in team, providing the students with professional competences and last but not least increasing the students’ knowledge of German with respect to oral fluency and basic vocabulary and grammar. Preparing for the trip to Berlin, the students have tasks rangin...

  9. SpaceScience@Home: Authentic Research Projects that Use Citizen Scientists

    Science.gov (United States)

    Méndez, B. J. H.

    2008-06-01

    In recent years, several space science research projects have enlisted the help of large numbers of non-professional volunteers, ``citizen scientists'', to aid in performing tasks that are critical to a project, but require more person-time (or computing time) than a small professional research team can practically perform themselves. Examples of such projects include SETI@home, which uses time from volunteers computers to process radio-telescope observation looking for signals originating from extra-terrestrial intelligences; Clickworkers, which asks volunteers to review images of the surface of Mars to identify craters; Spacewatch, which used volunteers to review astronomical telescopic images of the sky to identify streaks made by possible Near Earth Asteroids; and Stardust@home, which asks volunteers to review ``focus movies'' taken of the Stardust interstellar dust aerogel collector to search for possible impacts from interstellar dust particles. We shall describe these and other similar projects and discuss lessons learned from carrying out such projects, including the educational opportunities they create.

  10. Speaker Authentication

    CERN Document Server

    Li, Qi (Peter)

    2012-01-01

    This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker’s identity based on his/her voice characteristics while the VIV approach validates a speaker’s identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications. The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speake...

  11. Drama at the Heart of the Secondary School: Projects to Promote Authentic Learning

    Science.gov (United States)

    Rainer, John; Lewis, Martin

    2012-01-01

    "Drama at the Heart of the Secondary School" provides a rationale for the curricular centrality of drama together with rich and detailed examples of cross-phase thematic projects which are drama-led, but which promote learning across a wide range of curriculum areas, from the humanities and other arts, to English and literacy, science and PSHE.…

  12. Tools for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-09

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  13. Tools for Authentication

    International Nuclear Information System (INIS)

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work

  14. Authenticating cache.

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Tyler Barratt; Urrea, Jorge Mario

    2012-06-01

    The aim of the Authenticating Cache architecture is to ensure that machine instructions in a Read Only Memory (ROM) are legitimate from the time the ROM image is signed (immediately after compilation) to the time they are placed in the cache for the processor to consume. The proposed architecture allows the detection of ROM image modifications during distribution or when it is loaded into memory. It also ensures that modified instructions will not execute in the processor-as the cache will not be loaded with a page that fails an integrity check. The authenticity of the instruction stream can also be verified in this architecture. The combination of integrity and authenticity assurance greatly improves the security profile of a system.

  15. The final LDRD report for the project entitled: {open_quotes}Enhanced analysis of complex gas mixtures by pattern recognition of microsensor array signals{close_quotes}

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, R.C.; Osbourn, G.C.

    1996-09-01

    Microsensors do not have the selectivity to chemical species available in large laboratory instruments. This project employed arrays of catalytically gated silicon microsensors with different catalysts to create data streams which can be analyzed by pattern recognition programs. One of the most significant accomplishments of the program was the demonstration of that mixtures of H{sub 2} with the oxidants NO{sub x} and O{sub 2} could distinguished from one another by the use of different catalytic metals on the Sandia Robust Hydrogen (SRH) sensors and the newly developed pattern recognition algorithm. This sensor system could be used to identify explosive gas mixtures and analyze exhaust streams for pollution control.

  16. Final Report for LDRD Project 02-ERD-069: Discovering the Unknown Mechanism(s) of Virulence in a BW, Class A Select Agent

    Energy Technology Data Exchange (ETDEWEB)

    Chain, P; Garcia, E

    2003-02-06

    The goal of this proposed effort was to assess the difficulty in identifying and characterizing virulence candidate genes in an organism for which very limited data exists. This was accomplished by first addressing the finishing phase of draft-sequenced F. tularensis genomes and conducting comparative analyses to determine the coding potential of each genome; to discover the differences in genome structure and content, and to identify potential genes whose products may be involved in the F. tularensis virulence process. The project was divided into three parts: (1) Genome finishing: This part involves determining the order and orientation of the consensus sequences of contigs obtained from Phrap assemblies of random draft genomic sequences. This tedious process consists of linking contig ends using information embedded in each sequence file that relates the sequence to the original cloned insert. Since inserts are sequenced from both ends, we can establish a link between these paired-ends in different contigs and thus order and orient contigs. Since these genomes carry numerous copies of insertion sequences, these repeated elements ''confuse'' the Phrap assembly program. It is thus necessary to break these contigs apart at the repeated sequences and individually join the proper flanking regions using paired-end information, or using results of comparisons against a similar genome. Larger repeated elements such as the small subunit ribosomal RNA operon require verification with PCR. Tandem repeats require manual intervention and typically rely on single nucleotide polymorphisms to be resolved. Remaining gaps require PCR reactions and sequencing. Once the genomes have been ''closed'', low quality regions are addressed by resequencing reactions. (2) Genome analysis: The final consensus sequences are processed by combining the results of three gene modelers: Glimmer, Critica and Generation. The final gene models are submitted to

  17. Final report on LDRD project : elucidating performance of proton-exchange-membrane fuel cells via computational modeling with experimental discovery and validation.

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Chao Yang (Pennsylvania State University, University Park, PA); Pasaogullari, Ugur (Pennsylvania State University, University Park, PA); Noble, David R.; Siegel, Nathan P.; Hickner, Michael A.; Chen, Ken Shuang

    2006-11-01

    In this report, we document the accomplishments in our Laboratory Directed Research and Development project in which we employed a technical approach of combining experiments with computational modeling and analyses to elucidate the performance of hydrogen-fed proton exchange membrane fuel cells (PEMFCs). In the first part of this report, we document our focused efforts on understanding water transport in and removal from a hydrogen-fed PEMFC. Using a transparent cell, we directly visualized the evolution and growth of liquid-water droplets at the gas diffusion layer (GDL)/gas flow channel (GFC) interface. We further carried out a detailed experimental study to observe, via direct visualization, the formation, growth, and instability of water droplets at the GDL/GFC interface using a specially-designed apparatus, which simulates the cathode operation of a PEMFC. We developed a simplified model, based on our experimental observation and data, for predicting the onset of water-droplet instability at the GDL/GFC interface. Using a state-of-the-art neutron imaging instrument available at NIST (National Institute of Standard and Technology), we probed liquid-water distribution inside an operating PEMFC under a variety of operating conditions and investigated effects of evaporation due to local heating by waste heat on water removal. Moreover, we developed computational models for analyzing the effects of micro-porous layer on net water transport across the membrane and GDL anisotropy on the temperature and water distributions in the cathode of a PEMFC. We further developed a two-phase model based on the multiphase mixture formulation for predicting the liquid saturation, pressure drop, and flow maldistribution across the PEMFC cathode channels. In the second part of this report, we document our efforts on modeling the electrochemical performance of PEMFCs. We developed a constitutive model for predicting proton conductivity in polymer electrolyte membranes and compared

  18. Advancing the Fundamental Understanding of Fission: 2014 LDRD 20120077DR Review

    Energy Technology Data Exchange (ETDEWEB)

    White, Morgan C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Tovesson, Fredrik K. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Sierk, Arnold John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-02-06

    The following slides were presented as part of the LDRD 20120077DR Progress Appraisal Review held Tuesday, February 4, 2014. This is part of an ongoing project assessment the previous of which was documented in LA-UR-13-21182. This presentation documents the progress made against the goals agreed to as part of the 2013 review.

  19. System and method for authentication

    Science.gov (United States)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  20. Authenticating Performances

    DEFF Research Database (Denmark)

    Rudolph, Michael

    2015-01-01

    ” (Bell 1997). This contribution focuses on the role of ritual in postcolonial identity constitution and the performative authentication of political power and social authority in Taiwan. Since the middle of the 1990s, traditionalist performances have been on the rise on the island. Generously subsidized...... competition. In other words, while these rituals may in many cases have efficacy with regard to the constitution of society and identity, the traditionalist rituals in particular frequently serve the authentication exigencies of various elites. Finally, I suggest that if one wants to provide the culture...... of common people with greater opportunities for representation, one should not focus too much on the display of ‘authentic’ old traditions in order to highlight Taiwanese subjectivity, but should also acknowledge those hybridized new traditions which aboriginal society has generated over the course...

  1. Efficient Probability of Failure Calculations for QMU using Computational Geometry LDRD 13-0144 Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Scott A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ebeida, Mohamed Salah [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Romero, Vicente J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Swiler, Laura Painton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rushdi, Ahmad A. [Univ. of Texas, Austin, TX (United States); Abdelkader, Ahmad [Univ. of Maryland, College Park, MD (United States)

    2015-09-01

    This SAND report summarizes our work on the Sandia National Laboratory LDRD project titled "Efficient Probability of Failure Calculations for QMU using Computational Geometry" which was project #165617 and proposal #13-0144. This report merely summarizes our work. Those interested in the technical details are encouraged to read the full published results, and contact the report authors for the status of the software and follow-on projects.

  2. Nanoporous Silica Templated HeteroEpitaxy: Final LDRD Report.

    Energy Technology Data Exchange (ETDEWEB)

    Burckel, David Bruce; Koleske, Daniel; Rowen, Adam M. [Sandia National Laboratories, Livermore, CA; Williams, John Dalton; Fan, Hongyou; Arrington, Christian L.

    2006-11-01

    This one-year out-of-the-box LDRD was focused on exploring the use of porous growth masks as a method for defect reduction during heteroepitaxial crystal growth. Initially our goal was to investigate porous silica as a growth mask, however, we expanded the scope of the research to include several other porous growth masks on various size scales, including mesoporous carbon, and the UV curable epoxy, SU-8. Use of SU-8 as a growth mask represents a new direction, unique in the extensive literature of patterned epitaxial growth, and presents the possibility of providing a single step growth mask. Additional research included investigation of pore viability via electrochemical deposition into high aspect ratio photoresist patterns and pilot work on using SU-8 as a DUV negative resist, another significant potential result. While the late start nature of this project pushed some of the initial research goals out of the time table, significant progress was made. 3 Acknowledgements This work was performed in part at the Nanoscience %40 UNM facility, a member of the National Nanotechnology Infrastructure Network, which is supported by the National Science Foundation (Grant ECS 03-35765). Sandia is multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United Stated Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. This work was supported under the Sandia LDRD program (Project 99405). 4

  3. Tibetan Interpretations of Authenticity

    DEFF Research Database (Denmark)

    Sobisch, Jan-Ulrich

    2015-01-01

    The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions.......The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions....

  4. Designing Pu600 for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-10

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work.

  5. Designing Pu600 for Authentication

    International Nuclear Information System (INIS)

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work

  6. AIS authentication

    CERN Multimedia

    2006-01-01

    Users are invited to use the NICE password for AIS authentication. As announced in CNL June-August 2006 (see http://www.cerncourier.com/articles/cnl/3/6/14/1) it is possible to use the NICE username and password to log on to AIS. The procedure is now fully operational and users can themselves reset the AIS password such that the NICE password will be used for authentication required by AIS applications. We strongly recommend CERN users who have a NICE account (this is the case of most users) to do this, with the objective to reduce the number of passwords they need to remember. This can be achieved very easily, directly from the Change Password option on the AIS login (https://aislogin.cern.ch/). Users should just select the '[Change Password]' option displayed at the bottom of the page, provide the 'Old Password' and then click on the button 'Use Nice password' followed by 'Submit'. Change Password option on the AIS login windowSetting the AIS password - Use Nice Password It should be noted that the proce...

  7. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session. In this...... paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post......-session authentication, although a new term, is not a new concept; it is the basis of at least a few practical schemes. We, for the first time, systematically study it and present the underlying authentication model. Further, we show that an important class of problems is solvable using post-session authentication as...

  8. Should Teachers Be Authentic?

    Science.gov (United States)

    Bialystok, Lauren

    2015-01-01

    Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…

  9. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations in...... theoretical understanding of the meanings of authentication. We provide a new insight in this direction and formalize it in CFPS (Common Framework for authentication Protocols' Specifications). CFPS provides a precise scope of definition for authentication protocols, which could make the design and analysis...

  10. Authenticating the Leader

    DEFF Research Database (Denmark)

    Johnsen, Christian Garmann

    As authentic leadership, with its dictum of being true to the self, has become increasingly influential among practitioners and mainstream leadership scholars, critical writers have drawn attention to the negative consequences of this development. Yet, few scholars have investigated the problem...... of authentication within discourse of authentic leadership. If authentic leadership is to make any sense, it is necessary to be able to distinguish the authentic from the inauthentic leader – in other words, it is necessary to authenticate the leader. This paper uses Gilles Deleuze’s reading of Plato as the point...... of departure for discussing the problem of authentication – separating the authentic leader form the inauthentic one – in the leadership guru Bill George’s model of authentic leadership. By doing so, the paper offers a way of conceptualizing the problem of authenticating leaders, as well as challenging...

  11. Transparent User Authentication

    CERN Document Server

    Clarke, Nathan

    2011-01-01

    This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication -- where authentication credentials are captured during a user's normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discu

  12. Authentic Leadership Kepala Sekolah dalam Menanamkan Sistem Nilai

    OpenAIRE

    Aan Komariah

    2013-01-01

    Abstract: The Authentic Leadership of School Principals in Inculcating Value System. The present article reports on a research project aimed at examining the extent to which “ authentic ladership” is important as an alternative leadership model to apply at schools to inculcate value and character systems of the school community. It was also aimed at examining the dimensionality of the authentic leaderhip . Delphi Survey method was implemented to assess the importance of authentic leadership. ...

  13. Authenticating the Leader

    DEFF Research Database (Denmark)

    Garmann Johnsen, Christian

    2015-01-01

    In the wake of a series of corporate scandals, there has been a growing call for authentic leadership in order to ensure ethical conduct in contemporary organizations. Authentic leadership, however, depends upon the ability to draw a distinction between the authentic and inauthentic leader....... This paper uses Deleuze’s discussion of Platonism as a point of departure for critically scrutinizing the problem of authenticating the leader - drawing a distinction between authentic and inauthentic leaders. This will be done through a reading of Bill George’s book Authentic Leadership. Informed by Deleuze......’s inverted Platonism, the paper challenges the practice by which authentic leaders are distinguished from inauthentic leaders. In conclusion, the paper suggests that an adequate concept of authentic leadership should consider how ethics can occur when the authentic leader is able to critically reflect his...

  14. LDRD final report : robust analysis of large-scale combinatorial applications.

    Energy Technology Data Exchange (ETDEWEB)

    Carr, Robert D.; Morrison, Todd (University of Colorado, Denver, CO); Hart, William Eugene; Benavides, Nicolas L. (Santa Clara University, Santa Clara, CA); Greenberg, Harvey J. (University of Colorado, Denver, CO); Watson, Jean-Paul; Phillips, Cynthia Ann

    2007-09-01

    Discrete models of large, complex systems like national infrastructures and complex logistics frameworks naturally incorporate many modeling uncertainties. Consequently, there is a clear need for optimization techniques that can robustly account for risks associated with modeling uncertainties. This report summarizes the progress of the Late-Start LDRD 'Robust Analysis of Largescale Combinatorial Applications'. This project developed new heuristics for solving robust optimization models, and developed new robust optimization models for describing uncertainty scenarios.

  15. Testing and demonstrating speaker verification technology in Iraqi-Arabic as part of the Iraqi Enrollment via Voice Authentication Project (IEVAP) in support of the Global War on Terrorism (GWOT)

    OpenAIRE

    Pena, Edwin D.

    2007-01-01

    This thesis documents the findings of an Iraqi-Arabic language test and concept of operations for speaker this verification technology as part of the Iraqi Banking System in support of the Iraqi Enrollment via Voice Authentication Project (IEVAP). IEVAP is an Office of the Secretary of Defense (OSD) sponsored research project commissioned to study the feasibility of speaker verification technology in support security requirements of the Global War on Terrorism (GWOT). The intent of this ...

  16. FY07 LDRD Final Report Precision, Split Beam, Chirped-Pulse, Seed Laser Technology

    Energy Technology Data Exchange (ETDEWEB)

    Dawson, J W; Messerly, M J; Phan, H H; Crane, J K; Beach, R J; Siders, C W; Barty, C J

    2009-11-12

    The goal of this LDRD ER was to develop a robust and reliable technology to seed high-energy laser systems with chirped pulses that can be amplified to kilo-Joule energies and recompressed to sub-picosecond pulse widths creating extremely high peak powers suitable for petawatt class physics experiments. This LDRD project focused on the development of optical fiber laser technologies compatible with the current long pulse National Ignition Facility (NIF) seed laser. New technologies developed under this project include, high stability mode-locked fiber lasers, fiber based techniques for reduction of compressed pulse pedestals and prepulses, new compact stretchers based on chirped fiber Bragg gratings (CFBGs), new techniques for manipulation of chirped pulses prior to amplification and new high-energy fiber amplifiers. This project was highly successful and met virtually all of its goals. The National Ignition Campaign has found the results of this work to be very helpful. The LDRD developed system is being employed in experiments to engineer the Advanced Radiographic Capability (ARC) front end and the fully engineered version of the ARC Front End will employ much of the technology and techniques developed here.

  17. Multi-attribute criteria applied to electric generation energy system analysis LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Kuswa, Glenn W.; Tsao, Jeffrey Yeenien; Drennen, Thomas E.; Zuffranieri, Jason V.; Paananen, Orman Henrie; Jones, Scott A.; Ortner, Juergen G. (DLR, German Aerospace, Cologne); Brewer, Jeffrey D.; Valdez, Maximo M.

    2005-10-01

    This report began with a Laboratory-Directed Research and Development (LDRD) project to improve Sandia National Laboratories multidisciplinary capabilities in energy systems analysis. The aim is to understand how various electricity generating options can best serve needs in the United States. The initial product is documented in a series of white papers that span a broad range of topics, including the successes and failures of past modeling studies, sustainability, oil dependence, energy security, and nuclear power. Summaries of these projects are included here. These projects have provided a background and discussion framework for the Energy Systems Analysis LDRD team to carry out an inter-comparison of many of the commonly available electric power sources in present use, comparisons of those options, and efforts needed to realize progress towards those options. A computer aid has been developed to compare various options based on cost and other attributes such as technological, social, and policy constraints. The Energy Systems Analysis team has developed a multi-criteria framework that will allow comparison of energy options with a set of metrics that can be used across all technologies. This report discusses several evaluation techniques and introduces the set of criteria developed for this LDRD.

  18. The Recognizability of Authenticity

    OpenAIRE

    Henderson, Madeleine; Gabora, Liane

    2013-01-01

    The goals of this research were to (1) determine if there is agreement both amongst viewers, and between viewers and the performer, about the extent to which performances are authentic, and (2) ascertain whether or not performers and/or viewers can distinguish between authenticity and skill. An authentic performance is one that is natural or genuine, while an inauthentic performance feels faked, forced, or imitative. Study participants were asked to rate the authenticity and skill level of a ...

  19. Laser Spray Fabrication for Net-Shape Rapid Product Realization LDRD

    Energy Technology Data Exchange (ETDEWEB)

    Atwood, C.L.; Ensz, M.T.; Greene, D.L.; Griffith, M.L.; Harwell, L.D.; Jeantette, F.P.; Keicher, D.M.; Oliver, M.S.; Reckaway, D.E.; Romero, J.A.; Schlienger, M.E.; Smugeresky, J.D.

    1999-04-01

    The primary purpose of this LDRD project was to characterize the laser deposition process and determine the feasibility of fabricating complex near-net shapes directly from a CAD solid model. Process characterization provided direction in developing a system to fabricate complex shapes directly from a CAD solid model. Our goal for this LDRD was to develop a system that is robust and provides a significant advancement to existing technologies (e.g., polymeric-based rapid prototyping, laser welding). Development of the process will allow design engineers to produce functional models of their designs directly from CAD files. The turnaround time for complex geometrical shaped parts will be hours instead of days and days instead of months. With reduced turnaround time, more time can be spent on the product-design phase to ensure that the best component design is achieved. Maturation of this technology will revolutionize the way the world produces structural components.

  20. Authentic Assessment, Professional's Guide.

    Science.gov (United States)

    Ryan, Concetta Doti

    Authentic assessment is the process of gathering evidence and documenting student learning and growth in an authentic context. Authentic assessment can do a better job than more traditional forms of assessment in informing educators and parents about a student's real achievement. The first chapter of this book presents an overview of authentic…

  1. Authentication Assurance Levels

    International Nuclear Information System (INIS)

    This Common Criteria approach has been applied to create a definition of Authentication Assurance Levels that can quantify the level of assurance reached for a system subject to a set of authentication procedures. The arms-control authentication application of the Common Criteria expands on more typical information security evaluations in that it must contend with information barriers and preclude sophisticated intentional subversion attempts.

  2. Authenticity in Adult Learning

    Science.gov (United States)

    Ashton, Sam

    2010-01-01

    This paper is concerned with the relationship between authenticity and adult learning and prompted by some studies in which adult "authentic learning" is a central concept. The implication revealed by them is that real-worldness of learning contexts, learning content and learning tasks is perceived as conferring authenticity on learning. Here,…

  3. Multi-factor authentication

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  4. Authentic And Concurrent Evaluation-refining

    DEFF Research Database (Denmark)

    Eriksson, Carina Ihlström; Åkesson, Maria; Kautz, Karlheinz

    2011-01-01

    This paper addresses the need for more detailed accounts for evaluation in design science research literature. By revisiting a design project regarding the future e-newspaper we give detailed descriptions of its authentic and concurrent evaluation approach by illustrating the what, why and how...... as well as decisions on strategic levels. We emphasize a holistic and concurrent approach to evaluation compared to the general design science research thinking and argue that reflecting on how to seek authenticity is important. By authenticity we refer to the notion of how closely an evaluation captures...

  5. Developing Young Researchers: 15 Years of Authentic Science Experiences for K-12 with NASA's S'COOL Project

    Science.gov (United States)

    Chambers, L. H.; Crecelius, S.; Rogerson, T.; Lewis, P. M.; Moore, S.; Madigan, J. J.; Deller, C.; Taylor, J.

    2012-12-01

    In late 1996, members of the Atmospheric Science Directorate at NASA's Langley Research Center decided that there had to be a better way to share the excitement of our research than black and white, text-heavy Fact Sheets. We invited a group of local teachers to a half-day session on Center to help guide an improved approach. We suggested a variety of approaches to them, and asked for feedback. They were eager for anything other than black and white Fact Sheets! Fortunately, one local middle school science teacher took us up on the offer to stick around and talk over lunch. In that conversation, she said that anything that would connect the science her kids studied in the classroom to the outside world - especially to NASA! - would be very motivating to her students. From that conversation was born the Students' Cloud Observations On-Line (S'COOL Project), now a nearly 16-year experiment in K-12 science, technology, engineering, and math (STEM) engagement. S'COOL is the Education and Public Outreach (EPO) arm of the Clouds and the Earth's Radiant Energy System (CERES) project, and involves K-12 students as a source of ground truth for satellite cloud retrievals. It was designed from the beginning as a 2-way project, with communication of information from the students to NASA, but also from NASA back to the students. With technology evolution since the project began, we have continued to enhance this focus on 2-way interaction. S'COOL involves students with observation skills, math skills (to compute cloud cover from multiple observers or convert units), geography skills (locating their school on a map and comparing to satellite imagery), and exposes them to cutting edge engineering in the form of a series of NASA satellites. As a priority Earth Observing Instrument, CERES currently flies on Terra, Aqua and NPP, with an additional instrument in development for JPSS. Students are involved in occasional Intensive Observing Periods (as with the launch of NPP), and are

  6. LDRD Final Report: Surrogate Nuclear Reactions and the Origin of the Heavy Elements (04-ERD-057)

    Energy Technology Data Exchange (ETDEWEB)

    Escher, J E; Bernstein, L A; Bleuel, D; Burke, J; Church, J A; Dietrich, F S; Forssen, C; Gueorguiev, V; Hoffman, R D

    2007-02-23

    Research carried out in the framework of the LDRD project ''Surrogate Nuclear Reactions and the Origin of the Heavy Elements'' (04-ERD-057) is summarized. The project was designed to address the challenge of determining cross sections for nuclear reactions involving unstable targets, with a particular emphasis on reactions that play a key role in the production of the elements between Iron and Uranium. This report reviews the motivation for the research, introduces the approach employed to address the problem, and summarizes the resulting scientific insights, technical findings, and related accomplishments.

  7. LDRD Final Report: Surrogate Nuclear Reactions and the Origin of the Heavy Elements (04-ERD-057)

    International Nuclear Information System (INIS)

    Research carried out in the framework of the LDRD project ''Surrogate Nuclear Reactions and the Origin of the Heavy Elements'' (04-ERD-057) is summarized. The project was designed to address the challenge of determining cross sections for nuclear reactions involving unstable targets, with a particular emphasis on reactions that play a key role in the production of the elements between Iron and Uranium. This report reviews the motivation for the research, introduces the approach employed to address the problem, and summarizes the resulting scientific insights, technical findings, and related accomplishments

  8. Microdiagnostic Lab on a Chip - LDRD Final Report; TOPICAL

    International Nuclear Information System (INIS)

    Polycrystalline silicon (polysilicon) surface micromachining is a new technology for building micrometer ((micro)m) scale mechanical devices on silicon wafers using techniques and process tools borrowed from the manufacture of integrated circuits. Sandia National Laboratories has invested a significant effort in demonstrating the viability of polysilicon surface micromachining and has developed the Sandia Ultraplanar Micromachining Technology (SUMMiT V(trademark) ) process, which consists of five structural levels of polysilicon. A major advantage of polysilicon surface micromachining over other micromachining methods is that thousands to millions of thin film mechanical devices can be built on multiple wafers in a single fabrication lot and will operate without post-processing assembly. However, if thin film mechanical or surface properties do not lie within certain tightly set bounds, micromachined devices will fail and yield will be low. This results in high fabrication costs to attain a certain number of working devices. An important factor in determining the yield of devices in this parallel-processing method is the uniformity of these properties across a wafer and from wafer to wafer. No metrology tool exists that can routinely and accurately quantify such properties. Such a tool would enable micromachining process engineers to understand trends and thereby improve yield of micromachined devices. In this LDRD project, we demonstrated the feasibility of and made significant progress towards automatically mapping mechanical and surface properties of thin films across a wafer. The MEMS parametrics measurement team has implemented a subset of this platform, and approximately 30 wafer lots have been characterized. While more remains to be done to achieve routine characterization of all these properties, we have demonstrated the essential technologies. These include: (1) well-understood test structures fabricated side-by-side with MEMS devices, (2) well

  9. Small space object imaging : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Ackermann, Mark R.; Valley, Michael T.; Kearney, Sean Patrick

    2009-10-01

    We report the results of an LDRD effort to investigate new technologies for the identification of small-sized (mm to cm) debris in low-earth orbit. This small-yet-energetic debris presents a threat to the integrity of space-assets worldwide and represents significant security challenge to the international community. We present a nonexhaustive review of recent US and Russian efforts to meet the challenges of debris identification and removal and then provide a detailed description of joint US-Russian plans for sensitive, laser-based imaging of small debris at distances of hundreds of kilometers and relative velocities of several kilometers per second. Plans for the upcoming experimental testing of these imaging schemes are presented and a preliminary path toward system integration is identified.

  10. Sport and Authenticity

    OpenAIRE

    Bednář, Miloš

    2014-01-01

    This article focuses on the concept of authenticity as understood by Heidegger, Taylor, and Ferrara and its relationship to sport. I divide Heidegger’s unusual terms (existentiales) from “Being and time” into the categories of authenticity and inauthenticity and provide examples of each from the field of sport. In further I analyse the ethical standpoint of authenticity which is in the centre of both ethical and sociological discourse today. Taylor´s conceptions of moral ideal and culture of ...

  11. SECURE REMOTE CLIENT AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    K.Pradeep,

    2010-10-01

    Full Text Available This paper discusses an application of Secure Remote Client Authentication. It presents a Smart Cards and Digitally certification from third party vendors, Smart cards are based on algorithm to provide secure Remote client Authentication. These schemes vary significantly.In relation to today’s security challenges, which includephishing, man-in-the-middle attacks and malicious software. Secure Remote Client authentication plays a key role.

  12. SECURE REMOTE CLIENT AUTHENTICATION

    OpenAIRE

    K.Pradeep,; R.Usha Rani; E.Ravi Kumar; K.Nikhila,; Vijay Sankar

    2010-01-01

    This paper discusses an application of Secure Remote Client Authentication. It presents a Smart Cards and Digitally certification from third party vendors, Smart cards are based on algorithm to provide secure Remote client Authentication. These schemes vary significantly.In relation to today’s security challenges, which includephishing, man-in-the-middle attacks and malicious software. Secure Remote Client authentication plays a key role.

  13. ESnet authentication services and trust federations

    International Nuclear Information System (INIS)

    ESnet provides authentication services and trust federation support for SciDAC projects, collaboratories, and other distributed computing applications. The ESnet ATF team operates the DOEGrids Certificate Authority, available to all DOE Office of Science programs, plus several custom CAs, including one for the National Fusion Collaboratory and one for NERSC. The secure hardware and software environment developed to support CAs is suitable for supporting additional custom authentication and authorization applications that your program might require. Seamless, secure interoperation across organizational and international boundaries is vital to collaborative science. We are fostering the development of international PKI federations by founding the TAGPMA, the American regional PMA, and the worldwide IGTF Policy Management Authority (PMA), as well as participating in European and Asian regional PMAs. We are investigating and prototyping distributed authentication technology that will allow us to support the 'roaming scientist' (distributed wireless via eduroam), as well as more secure authentication methods (one-time password tokens)

  14. Semifragile Watermarking Schemes for Image Authentication- A Survey

    OpenAIRE

    Archana Tiwari; Manisha Sharma

    2012-01-01

    Digital images are very easy to manipulate, store, publish and secondary creation this juggle will lead to serious consequence in some applications such as military image, medical image. So, integrity of digital image must be authenticated. Tools that help us establish the authenticity and integrity of digital media are thus essential and can prove vital whenever questions are raised about the origin of an image and its content. To project authenticity of images semi fragile watermarking is v...

  15. Assessing Authentic Learning via Storyboarding: A Malaysian Perspective

    OpenAIRE

    Hazrati Husnin; Rosseni Din; Aidah Karim; Helmi Norman; Analisa Hamdan

    2013-01-01

    Authentic learning provides an alternative way of delivering knowledge in a meaningful way. Therefore, authentic learning environment is seen as an important approach to promote meaningful learning. This study explores the learning process involved in the development of storyboard that occurs in pre-production phase which helps to identify whether authentic learning has taken place in the Educational Technology course at the Faculty of Education, Universiti Kebangsaan Malaysia. Project-orient...

  16. Obstacle detection for autonomous navigation : an LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Padilla, Denise D.

    2004-03-01

    This report summarizes the analytical and experimental efforts for the Laboratory Directed Research and Development (LDRD) project entitled 'Obstacle Detection for Autonomous Navigation'. The principal goal of this project was to develop a mathematical framework for obstacle detection. The framework provides a basis for solutions to many complex obstacle detection problems critical to successful autonomous navigation. Another goal of this project was to characterize sensing requirements in terms of physical characteristics of obstacles, vehicles, and terrain. For example, a specific vehicle traveling at a specific velocity over a specific terrain requires a sensor with a certain range of detection, resolution, field-of-view, and sufficient sensitivity to specific obstacle characteristics. In some cases, combinations of sensors were required to distinguish between different hazardous obstacles and benign terrain. In our framework, the problem was posed as a multidimensional, multiple-hypothesis, pattern recognition problem. Features were extracted from selected sensors that allow hazardous obstacles to be distinguished from benign terrain and other types of obstacles. Another unique thrust of this project was to characterize different terrain classes with respect to both positive (e.g., rocks, trees, fences) and negative (e.g., holes, ditches, drop-offs) obstacles. The density of various hazards per square kilometer was statistically quantified for different terrain categories (e.g., high desert, ponderosa forest, and prairie). This quantification reflects the scale, or size, and mobility of different types of vehicles. The tradeoffs between obstacle detection, position location, path planning, and vehicle mobility capabilities were also to be characterized.

  17. Decolonizing Researcher Authenticity

    Science.gov (United States)

    Daza, Stephanie Lynn

    2008-01-01

    This article examines the ways in which researcher authenticity is negotiated along three axes of difference, ethno-linguistic affiliation, sexual orientation and race/skin color. Ultimately, it analyzes how researcher authenticity is produced and played out within research, via interactions between participants, researchers and others who…

  18. Single password authentication

    OpenAIRE

    Küpçü, Alptekin; Acar, Tolga; Belenkiy, Mira

    2013-01-01

    Single Password Authentication Tolga Acar∗ Intel Corporation, Bellevue, WA, USA Mira Belenkiy Microsoft Research, Redmond, WA, USA Alptekin K up c u† Ko c University, _Istanbul, TURKEY May 11, 2013 Abstract Users frequently reuse their passwords when authenticating to various online services. Com-bined with the use of weak passwords or honeypot/phishing attacks, this brings high risks to th...

  19. Authenticity and Imagination

    Science.gov (United States)

    Dirkx, John M.

    2006-01-01

    Central to development of authenticity in teaching is self-understanding and self-awareness. Using a Jungian perspective, the author suggests that the imaginative dimensions of the self play a critical role in our journey and experience as teachers, and in developing self-awareness and authenticity in our teaching.

  20. AUTHENTICITY IN THE BLOGOSPHERE

    Directory of Open Access Journals (Sweden)

    Waclaw Branicki

    2010-01-01

    Full Text Available The primary purpose of this article is to answer the question of whether writing a blog defined as a personal diary can help to better understand himself. Self-awareness is a prerequisite for authentic existence. In the first part analyzed the concept of authenticity. Pointed out the relationship of authenticity to the categories of freedom, truth and responsibility. The second part presents the relationship between authentic existence and the process of self-disclosure, which may take place in the blogosphere. In the third part presents the question whether a writing blog affects the level authenticity of existence. It was recognized that a key element of this phenomenon is the sense of responsibility.

  1. Implementing Project-Based Learning to Create "Authentic" Sources: The Egyptological Excavation and Imperial Scrapbook Projects at the Cape Cod Lighthouse Charter School

    Science.gov (United States)

    Garran, Daniella K.

    2008-01-01

    Chartered in 1994 and opened in 1996, the Cape Cod Lighthouse Charter School (CCLCS) was among the first charter schools in Massachusetts. CCLCS strives to foster "intellectual development, academic achievement, project based learning, interdisciplinary studies, community partnerships, environmental studies, global awareness, and an ethical…

  2. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner\\'s signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  3. Discovering your authentic leadership.

    Science.gov (United States)

    George, Bill; Sims, Peter; McLean, Andrew N; Mayer, Diana

    2007-02-01

    The ongoing problems in business leadership over the past five years have underscored the need for a new kind of leader in the twenty-first century: the authentic leader. Author Bill George, a Harvard Business School professor and the former chairman and CEO of Medtronic, and his colleagues, conducted the largest leadership development study ever undertaken. They interviewed 125 business leaders from different racial, religious, national, and socioeconomic backgrounds to understand how leaders become and remain authentic. Their interviews showed that you do not have to be born with any particular characteristics or traits to lead. You also do not have to be at the top of your organization. Anyone can learn to be an authentic leader. The journey begins with leaders understanding their life stories. Authentic leaders frame their stories in ways that allow them to see themselves not as passive observers but as individuals who learn from their experiences. These leaders make time to examine their experiences and to reflect on them, and in doing so they grow as individuals and as leaders. Authentic leaders also work hard at developing self-awareness through persistent and often courageous self-exploration. Denial can be the greatest hurdle that leaders face in becoming self-aware, but authentic leaders ask for, and listen to, honest feedback. They also use formal and informal support networks to help them stay grounded and lead integrated lives. The authors argue that achieving business results over a sustained period of time is the ultimate mark of authentic leadership. It may be possible to drive short-term outcomes without being authentic, but authentic leadership is the only way to create long-term results. PMID:17345686

  4. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  5. Authentic e-Learning in a Multicultural Context: Virtual Benchmarking Cases from Five Countries

    Science.gov (United States)

    Leppisaari, Irja; Herrington, Jan; Vainio, Leena; Im, Yeonwook

    2013-01-01

    The implementation of authentic learning elements at education institutions in five countries, eight online courses in total, is examined in this paper. The International Virtual Benchmarking Project (2009-2010) applied the elements of authentic learning developed by Herrington and Oliver (2000) as criteria to evaluate authenticity. Twelve…

  6. LDRD final report : a lightweight operating system for multi-core capability class supercomputers.

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, Suzanne Marie; Hudson, Trammell B. (OS Research); Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Levenhagen, Michael J.; Brightwell, Ronald Brian

    2010-09-01

    The two primary objectives of this LDRD project were to create a lightweight kernel (LWK) operating system(OS) designed to take maximum advantage of multi-core processors, and to leverage the virtualization capabilities in modern multi-core processors to create a more flexible and adaptable LWK environment. The most significant technical accomplishments of this project were the development of the Kitten lightweight kernel, the co-development of the SMARTMAP intra-node memory mapping technique, and the development and demonstration of a scalable virtualization environment for HPC. Each of these topics is presented in this report by the inclusion of a published or submitted research paper. The results of this project are being leveraged by several ongoing and new research projects.

  7. STUDENTS’ POTENTIAL FOR AUTHENTIC LEADERSHIP

    OpenAIRE

    Djurdja Solesa-Grijak; Dragan Solesa; Nedjo Kojic

    2015-01-01

    To know yourself and to act accordingly has been seen as a moral imperative throughout history. The aim of this research was to determine potential of students for authentic leadership and relation between their authentic personality and potential for authentic leadership. The sample consisted of students (N=133) from Serbia (male – 59% and female – 41%). The average age of students was M=21.9. Instruments used were Authenticity Scale (Wood et al., 2008) and Authentic Leadership Self-Assessme...

  8. LDRD Final Report: Global Optimization for Engineering Science Problems

    Energy Technology Data Exchange (ETDEWEB)

    HART,WILLIAM E.

    1999-12-01

    For a wide variety of scientific and engineering problems the desired solution corresponds to an optimal set of objective function parameters, where the objective function measures a solution's quality. The main goal of the LDRD ''Global Optimization for Engineering Science Problems'' was the development of new robust and efficient optimization algorithms that can be used to find globally optimal solutions to complex optimization problems. This SAND report summarizes the technical accomplishments of this LDRD, discusses lessons learned and describes open research issues.

  9. Biometric Authentication: A Review

    OpenAIRE

    Debnath Bhattacharyya; Rahul Ranjan; Farkhod Alisherov; Minkyu Choi

    2009-01-01

    Advances in the field of Information Technology also make Information Security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the biometric authentication techniques and some future possibilities in this field. In biometrics, a human being needs to be identified based on some characteristic physiological parameters. A wide variety of systems require reliable personal recognition schemes to either confirm or de...

  10. National Authentication Systems

    OpenAIRE

    Sandnes, Are Haugen

    2012-01-01

    Information security has to adapt to an ever-changing environment. Recently there has been a significant increase in the use of smartphones and other mobile devices to access services on the Internet that originally is designed for desktop computers.This thesis examines authentication systems on the Internet aimed at large user groups in light of the evolving threats due to increased use of mobile devices. It examines these authentication systems from the perspective of the end user and inves...

  11. Authentication of quantum messages.

    Energy Technology Data Exchange (ETDEWEB)

    Barnum, Howard; Crépeau, Jean-Claude; Gottesman, D. (Daniel); Smith, A. (Adam); Tapp, Alan

    2001-01-01

    Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

  12. Enhancing usability of privacy-respecting authentication and authorization in mobile social settings by using Idemix : (in the context of the EU FP7 di.me Project)

    OpenAIRE

    Bourimi, Mohamed; Heupel, Marcel; Kesdogan, Dogan; Fielenbach, Thomas; Arbeitsgruppe IT-Sicherheitsmanagement

    2011-01-01

    Authentication and authorization are an essential part of any system allowing for information sharing and social interaction. Especially in such social settings where mobile devices with restricted capabilities and new possibilities (e.g. screen size, ease of localization) are used, there is an increasing need for providing privacy-respecting integrity and access permission mechanisms by considering trade-offs related to usability aspects. In this paper we show how the usability of authe...

  13. Building more powerful less expensive supercomputers using Processing-In-Memory (PIM) LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Murphy, Richard C.

    2009-09-01

    This report details the accomplishments of the 'Building More Powerful Less Expensive Supercomputers Using Processing-In-Memory (PIM)' LDRD ('PIM LDRD', number 105809) for FY07-FY09. Latency dominates all levels of supercomputer design. Within a node, increasing memory latency, relative to processor cycle time, limits CPU performance. Between nodes, the same increase in relative latency impacts scalability. Processing-In-Memory (PIM) is an architecture that directly addresses this problem using enhanced chip fabrication technology and machine organization. PIMs combine high-speed logic and dense, low-latency, high-bandwidth DRAM, and lightweight threads that tolerate latency by performing useful work during memory transactions. This work examines the potential of PIM-based architectures to support mission critical Sandia applications and an emerging class of more data intensive informatics applications. This work has resulted in a stronger architecture/implementation collaboration between 1400 and 1700. Additionally, key technology components have impacted vendor roadmaps, and we are in the process of pursuing these new collaborations. This work has the potential to impact future supercomputer design and construction, reducing power and increasing performance. This final report is organized as follow: this summary chapter discusses the impact of the project (Section 1), provides an enumeration of publications and other public discussion of the work (Section 1), and concludes with a discussion of future work and impact from the project (Section 1). The appendix contains reprints of the refereed publications resulting from this work.

  14. Interface physics in microporous media : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Yaklin, Melissa A.; Knutson, Chad E.; Noble, David R.; Aragon, Alicia R.; Chen, Ken Shuang; Giordano, Nicholas J. (Purdue University, West Lafayette, IN); Brooks, Carlton, F.; Pyrak-Nolte, Laura J. (Purdue University, West Lafayette, IN); Liu, Yihong (Purdue University, West Lafayette, IN)

    2008-09-01

    This document contains a summary of the work performed under the LDRD project entitled 'Interface Physics in Microporous Media'. The presence of fluid-fluid interfaces, which can carry non-zero stresses, distinguishes multiphase flows from more readily understood single-phase flows. In this work the physics active at these interfaces has been examined via a combined experimental and computational approach. One of the major difficulties of examining true microporous systems of the type found in filters, membranes, geologic media, etc. is the geometric uncertainty. To help facilitate the examination of transport at the pore-scale without this complication, a significant effort has been made in the area of fabrication of both two-dimensional and three-dimensional micromodels. Using these micromodels, multiphase flow experiments have been performed for liquid-liquid and liquid-gas systems. Laser scanning confocal microscopy has been utilized to provide high resolution, three-dimensional reconstructions as well as time resolved, two-dimensional reconstructions. Computational work has focused on extending lattice Boltzmann (LB) and finite element methods for probing the interface physics at the pore scale. A new LB technique has been developed that provides over 100x speed up for steady flows in complex geometries. A new LB model has been developed that allows for arbitrary density ratios, which has been a significant obstacle in applying LB to air-water flows. A new reduced order model has been developed and implemented in finite element code for examining non-equilibrium wetting in microchannel systems. These advances will enhance Sandia's ability to quantitatively probe the rich interfacial physics present in microporous systems.

  15. Idaho National Laboratory LDRD Annual Report FY 2012

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2013-03-01

    This report provides a glimpse into our diverse research and development portfolio, wwhich encompasses both advanced nuclear science and technology and underlying technologies. IN keeping with the mission, INL's LDRD program fosters technical capabilities necessary to support current and future DOE-Office of Nuclear Energy research and development needs.

  16. Active Image Authentication System (AIAS

    Directory of Open Access Journals (Sweden)

    S. B. Nikam

    2013-09-01

    Full Text Available Today’s networking age provides greater importance to the authentication mechanism for security. Authentication is the process of identification of user or client respect to service parameters. These service parameters consist of unique combination of password associated with username or userid. Graphical based authentication mechanism had provided strong alternative for knowledge based, token based {&} biometric authentication mechanism. In this paper we are going to propose new graphical based authentication mechanism. This Active Image Authentication System (AIAS provides strong solution on guessing attack using random positioning of Active Points (AP with respect to time domain

  17. Using Rose and Compass for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2009-07-09

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  18. Using Rose and Compass for Authentication

    International Nuclear Information System (INIS)

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work

  19. Password authentication in cloud

    Directory of Open Access Journals (Sweden)

    Indal Singh

    2015-09-01

    Full Text Available Cloud computing is an Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers [1]. Cloud Computing is a term used to describe both a platform and type of application. As a platform it supplies, configures and reconfigures servers, while the servers can be physical machines or virtual machines. On the other hand, Cloud Computing describes applications that are extended to be accessible through the internet and for this purpose large data centers and powerful servers are used to host the web applications and web services. Authentication is one the most important security primitive [6]. Password authentication is most widely used authentication mechanism. Password provides security mechanism for authentication and protection services against unwanted access to resource. In this paper, we applied a technique to preserve our password using graphical authentication.

  20. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  1. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review of the con......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review......, it becomes possible to specify employment relations parameters between the indirect and direct employer and employees in a manner that will ensure working conditions consistent with these traditions, substantially enhancing the prospect of authenticity in employment relations. This theology of the workplace...... analysis should complement and support corporate social responsibility, management spirituality, authentic leadership / authentic follower, and other secular research by offering a research methods bridge between empirically grounded theology and secular studies, with the common goal of improving workplace...

  2. Multi-target camera tracking, hand-off and display LDRD 158819 final report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldnt lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that takes live video imagery from multiple video cameras, identifies individual moving targets from the background imagery, and then displays the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of currently capability.

  3. Multi-target camera tracking, hand-off and display LDRD 158819 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J.

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldnt lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that takes live video imagery from multiple video cameras, identifies individual moving targets from the background imagery, and then displays the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of currently capability.

  4. Information barriers and authentication

    International Nuclear Information System (INIS)

    Acceptance of nuclear materials into a monitoring regime is complicated if the materials are in classified shapes or have classified composition. An attribute measurement system with an information barrier can be emplo,yed to generate an unclassified display from classified measurements. This information barrier must meet two criteria: (1) classified information cannot be released to the monitoring party, and (2) the monitoring party must be convinced that the unclassified output accurately represents the classified input. Criterion 1 is critical to the host country to protect the classified information. Criterion 2 is critical to the monitoring party and is often termed the 'authentication problem.' Thus, the necessity for authentication of a measurement system with an information barrier stems directly from the description of a useful information barrier. Authentication issues must be continually addressed during the entire development lifecycle of the measurement system as opposed to being applied only after the system is built.

  5. Haunted by the authentic

    DEFF Research Database (Denmark)

    d'Ambrosio, Luigi

    2013-01-01

    Research description and purpose: The purpose of this investigation is to explore Danish guests’ experience when consuming ‘authentic’ Italian food in Italian restaurants in Denmark. In this context, the aim of the research is to engage in a discussion of the concept of authenticity in ethnic food...... consumption, and the guests’ experience with and reaction to the authentic culinary experience in ethnic restaurants in the consumers’ home country. Design/Methodology: The paper methodology is based on the use of mixed methods. A collection of primary quantitative and qualitative data through a questionnaire...... its findings, but, in line with its exploratory nature, to investigate the behaviour of Danish guests in relation to consumption of Italian food in an authentic setting. Originality/value: This paper looks at the relationship between the guest and the experience of ethnic food from a new perspective...

  6. QKD Quantum Channel Authentication

    CERN Document Server

    Kosloski, J T

    2006-01-01

    Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

  7. [Inheritance and innovation of traditional Chinese medicinal authentication].

    Science.gov (United States)

    Zhao, Zhong-zhen; Chen, Hu-biao; Xiao, Pei-gen; Guo, Ping; Liang, Zhi-tao; Hung, Fanny; Wong, Lai-lai; Brand, Eric; Liu, Jing

    2015-09-01

    Chinese medicinal authentication is fundamental for the standardization and globalization of Chinese medicine. The discipline of authentication addresses difficult issues that have remained unresolved for thousands of years, and is essential for preserving safety. Chinese medicinal authentication has both scientific and traditional cultural connotations; the use of scientific methods to elucidate traditional experience-based differentiation carries the legacy of Chinese medicine forward, and offers immediate practical significance and long-term scientific value. In this paper, a path of inheritance and innovation is explored through the scientific exposition of Chinese medicinal authentication, featuring a review of specialized publications, the establishment of a Chinese medicine specimen center and Chinese medicinal image databases, the expansion of authentication technologies, and the formation of a cultural project dedicated to the Compedium of Materia Medica. PMID:26978977

  8. Hardware authentication using transmission spectra modified optical fiber

    International Nuclear Information System (INIS)

    The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

  9. Hardware authentication using transmission spectra modified optical fiber.

    Energy Technology Data Exchange (ETDEWEB)

    Grubbs, Robert K.; Romero, Juan A.

    2010-09-01

    The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

  10. Two-factor authentication

    CERN Document Server

    Stanislav, Mark

    2015-01-01

    During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market.

  11. Mega Key Authentication Mechanism

    OpenAIRE

    Kloss, Guy

    2016-01-01

    For secure communication it is not just sufficient to use strong cryptography with good and strong keys, but to actually have the assurance, that the keys in use for it are authentic and from the contact one is expecting to communicate with. Without that, it is possible to be subject to impersonation or man-in-the-middle (MitM) attacks. Mega meets this problem by providing a hierarchical authentication mechanism for contacts and their keys. To avoid any hassle when using multiple types of key...

  12. Retrospective on the Seniors' Council Tier 1 LDRD portfolio.

    Energy Technology Data Exchange (ETDEWEB)

    Ballard, William Parker

    2012-04-01

    This report describes the Tier 1 LDRD portfolio, administered by the Seniors Council between 2003 and 2011. 73 projects were sponsored over the 9 years of the portfolio at a cost of $10.5 million which includes $1.9M of a special effort in directed innovation targeted at climate change and cyber security. Two of these Tier 1 efforts were the seeds for the Grand Challenge LDRDs in Quantum Computing and Next Generation Photovoltaic conversion. A few LDRDs were terminated early when it appeared clear that the research was not going to succeed. A great many more were successful and led to full Tier 2 LDRDs or direct customer sponsorship. Over a dozen patents are in various stages of prosecution from this work, and one project is being submitted for an R and D 100 award.

  13. Reading Authentic Texts

    DEFF Research Database (Denmark)

    Balling, Laura Winther

    2013-01-01

    Most research on cognates has focused on words presented in isolation that are easily defined as cognate between L1 and L2. In contrast, this study investigates what counts as cognate in authentic texts and how such cognates are read. Participants with L1 Danish read news articles in their highly...

  14. Low-bandwidth authentication.

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  15. Facilitating Authentic Becoming

    Science.gov (United States)

    Eriksen, Matthew

    2012-01-01

    A "Model of Authentic Becoming" that conceptualizes learning as a continuous and ongoing embodied and relational process, and uses social constructionism assumptions as well as Kolb's experiential learning model as its point of departure, is presented. Through a focus on the subjective, embodied, and relational nature of organizational life, the…

  16. A video authentication technique

    International Nuclear Information System (INIS)

    Unattended video surveillance systems are particularly vulnerable to the substitution of false video images into the cable that connects the camera to the video recorder. New technology has made it practical to insert a solid state video memory into the video cable, freeze a video image from the camera, and hold this image as long as desired. Various techniques, such as line supervision and sync detection, have been used to detect video cable tampering. The video authentication technique described in this paper uses the actual video image from the camera as the basis for detecting any image substitution made during the transmission of the video image to the recorder. The technique, designed for unattended video systems, can be used for any video transmission system where a two-way digital data link can be established. The technique uses similar microprocessor circuitry at the video camera and at the video recorder to select sample points in the video image for comparison. The gray scale value of these points is compared at the recorder controller and if the values agree within limits, the image is authenticated. If a significantly different image was substituted, the comparison would fail at a number of points and the video image would not be authenticated. The video authentication system can run as a stand-alone system or at the request of another system

  17. LDRD final report on new homogeneous catalysts for direct olefin epoxidation (LDRD 52591).

    Energy Technology Data Exchange (ETDEWEB)

    Goldberg, Karen (University of Washington); Smythe, Nicole A. (University of Washington); Moore, Joshua T.; Stewart, Constantine A.; Kemp, Richard Alan; Miller, James Edward; Kornienko, Alexander (New Mexico Institute of Mining and Technology); Denney, Melanie C. (University of Washington); Cetto, Kara L. (University of Washington)

    2006-02-01

    This report summarizes our findings during the study of a novel homogeneous epoxidation catalyst system that uses molecular oxygen as the oxidant, a ''Holy Grail'' in catalysis. While olefins (alkenes) that do not contain allylic hydrogens can be epoxidized directly using heterogeneous catalysts, most olefins cannot, and so a general, atom-efficient route is desired. While most of the work performed on this LDRD has been on pincer complexes of late transition metals, we also scouted out metal/ligand combinations that were significantly different, and unfortunately, less successful. Most of the work reported here deals with phosphorus-ligated Pd hydrides [(PCP)Pd-H]. We have demonstrated that molecular oxygen gas can insert into the Pd-H bond, giving a structurally characterized Pd-OOH species. This species reacts with oxygen acceptors such as olefins to donate an oxygen atom, although in various levels of selectivity, and to generate a [(PCP)Pd-OH] molecule. We discovered that the active [(PCP)Pd-H] active catalyst can be regenerated by addition of either CO or hydrogen. The demonstration of each step of the catalytic cycle is quite significant. Extensions to the pincer-Pd chemistry by attaching a fluorinated tail to the pincer designed to be used in solvents with higher oxygen solubilities are also presented.

  18. Precision formed micro magnets: LDRD project summary report

    Energy Technology Data Exchange (ETDEWEB)

    CHRISTENSON,TODD R.; GARINO,TERRY J.; VENTURINI,EUGENE L.

    2000-02-01

    A microfabrication process is described that provides for the batch realization of miniature rare earth based permanent magnets. Prismatic geometry with features as small as 5 microns, thicknesses up through several hundred microns and with submicron tolerances may be accommodated. The processing is based on a molding technique using deep x-ray lithography as a means to generate high aspect-ratio precision molds from PMMA (poly methyl methacrylate) used as an x-ray photoresist. Subsequent molding of rare-earth permanent magnet (REPM) powder combined with a thermosetting plastic binder may take place directly in the PMMA mold. Further approaches generate an alumina form replicated from the PMMA mold that becomes an intermediate mold for pressing higher density REPM material and allows for higher process temperatures. Maximum energy products of 3--8 MGOe (Mega Gauss Oersted, 1 MGOe = 100/4{pi} kJ/m{sup 3}) are obtained for bonded isotropic forms of REPM with dimensions on the scale of 100 microns and up to 23 MGOe for more dense anisotropic REPM material using higher temperature processing. The utility of miniature precision REPMs is revealed by the demonstration of a miniature multipole brushless DC motor that possesses a pole-anisotropic rotor with dimensions that would otherwise prohibit multipole magnetization using a multipole magnetizing fixture at this scale. Subsequent multipole assembly also leads to miniaturized Halbach arrays, efficient magnetic microactuators, and mechanical spring-like elements which can offset miniaturized mechanical scaling behavior.

  19. Controlled mutual quantum entity authentication using entanglement swapping

    Science.gov (United States)

    Min-Sung, Kang; Chang-Ho, Hong; Jino, Heo; Jong-In, Lim; Hyung-Jin, Yang

    2015-09-01

    In this paper, we suggest a controlled mutual quantum entity authentication protocol by which two users mutually certify each other on a quantum network using a sequence of Greenberger-Horne-Zeilinger (GHZ)-like states. Unlike existing unidirectional quantum entity authentication, our protocol enables mutual quantum entity authentication utilizing entanglement swapping; moreover, it allows the managing trusted center (TC) or trusted third party (TTP) to effectively control the certification of two users using the nature of the GHZ-like state. We will also analyze the security of the protocol and quantum channel. Project supported by the Research Foundation of Korea University.

  20. Authentication Issues in Multi-Service Residential Access Networks

    OpenAIRE

    Rossebo, Judith; Ronan, John; Walsh, Kristian

    2003-01-01

    Multi-service residential access networks allow residential customers to choose amongst a variety of service offerings, over a range of Core Networks and subject to user requirements such as QoS, mobility, cost and availability. These issues place requirements on authentication for network access, with a need for mutual authentication of the residential gateway (RG) to the local access point (LAP). The EU-IST project TORRENT is building a testbed providing for multi-service residential access...

  1. Final LDRD report :ultraviolet water purification systems for rural environments and mobile applications.

    Energy Technology Data Exchange (ETDEWEB)

    Banas, Michael Anthony; Crawford, Mary Hagerott; Ruby, Douglas Scott; Ross, Michael P.; Nelson, Jeffrey Scott; Allerman, Andrew Alan; Boucher, Ray

    2005-11-01

    We present the results of a one year LDRD program that has focused on evaluating the use of newly developed deep ultraviolet LEDs in water purification. We describe our development efforts that have produced an LED-based water exposure set-up and enumerate the advances that have been made in deep UV LED performance throughout the project. The results of E. coli inactivation with 270-295 nm LEDs are presented along with an assessment of the potential for applying deep ultraviolet LED-based water purification to mobile point-of-use applications as well as to rural and international environments where the benefits of photovoltaic-powered systems can be realized.

  2. LDRD final report on new homogeneous and supported oligomerization catalysts (LDRD 42461).

    Energy Technology Data Exchange (ETDEWEB)

    Hascall, Anthony G.; Kemp, Richard Alan

    2004-11-01

    The overall purpose of this LDRD is multifold. First, we are interested in preparing new homogeneous catalysts that can be used in the oligomerization of ethylene and in understanding commercially important systems better. Second, we are interested in attempting to support these new homogeneous catalysts in the pores of nano- or mesoporous materials in order to force new and unusual distributions of a-olefins to be formed during the oligomerization. Thus the overall purpose is to try to prepare new catalytic species and to possibly control the active site architecture in order to yield certain desired products during a catalytic reaction, much like nature does with enzymes. In order to rationally synthesize catalysts it is imperative to comprehend the function of the various components of the catalyst. In heterogeneous systems, it is of utmost importance to know how a support interacts with the active site of the catalyst. In fact, in the catalysis world this lack of fundamental understanding of the relationship between active site and support is the single largest reason catalysis is considered an 'empirical' or 'black box' science rather than a well-understood one. In this work we will be preparing novel ethylene oligomerization catalysts, which are normally P-O chelated homogeneous complexes, with new ligands that replace P with a stable carbene. We will also examine a commercially catalyst system and investigate the active site in it via X-ray crystallography. We will also attempt to support these materials inside the pores of nano- and mesoporous materials. Essentially, we will be tailoring the size and scale of the catalyst active site and its surrounding environment to match the size of the molecular product(s) we wish to make. The overall purpose of the study will be to prepare new homogeneous catalysts, and if successful in supporting them to examine the effects that steric constraints and pore structures can have on growing oligomer

  3. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  4. Challenge Measurements For Authentication

    International Nuclear Information System (INIS)

    Authentication of systems with an information barrier that protects sensitive information is difficult; in particular, the information barrier can allow a hidden switch to be implemented by the system fabricator and operator. The hidden switch is the operator's ability to subvert the measurement system and force it to produce a desired and false result. It is usually discussed in the context of an attribute measurement in which a faked item is presented in place of a real item regulated by an agreement, with the driving motivation being the ability to preserve a stock of valuable items. In simple terms, the hidden switch enables a shell game with assets, and the information barrier protects the switch. This presentation outlines challenge measurements that could be used to detect the implementation of a hidden switch and assist the authentication process.

  5. Probabilistic authenticated quantum dialogue

    Science.gov (United States)

    Hwang, Tzonelih; Luo, Yi-Ping

    2015-12-01

    This work proposes a probabilistic authenticated quantum dialogue (PAQD) based on Bell states with the following notable features. (1) In our proposed scheme, the dialogue is encoded in a probabilistic way, i.e., the same messages can be encoded into different quantum states, whereas in the state-of-the-art authenticated quantum dialogue (AQD), the dialogue is encoded in a deterministic way; (2) the pre-shared secret key between two communicants can be reused without any security loophole; (3) each dialogue in the proposed PAQD can be exchanged within only one-step quantum communication and one-step classical communication. However, in the state-of-the-art AQD protocols, both communicants have to run a QKD protocol for each dialogue and each dialogue requires multiple quantum as well as classical communicational steps; (4) nevertheless, the proposed scheme can resist the man-in-the-middle attack, the modification attack, and even other well-known attacks.

  6. Abusing SIP authentication

    OpenAIRE

    Abdelnur H.; Avanesov T.; Rusinowitch M.; State R.

    2009-01-01

    International audience The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. In this paper, we will present a new attack against the authentication mechanism of SIP. This attack allows to perform toll fraud and call hijacking. We will detail the formal specification method that allowed to detect this vulnerability, highlight a simple usage case and propose a mitigati...

  7. International safeguards data authentication

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  8. International safeguards data authentication

    International Nuclear Information System (INIS)

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software

  9. Authentication and Authorization Models

    Directory of Open Access Journals (Sweden)

    More V.N

    2011-04-01

    Full Text Available In computer science distributed systems could be more secured with a distributed trust model based on either PKIor Kerberos. However, it becomes difficult to establish trust relationship across heterogeneous domains due todifferent actual trust mechanism and security policy as well as the intrinsic flaw of each trust model. Since Internethas been used commonly in information systems technologies, many applications need some security capabilitiesto protect against threats to the communication of information. Two critical procedures of these capabilities areauthentication and authorization. This report presents a strong authentication and authorization model using threestandard frameworks. They are PKI, PMI, and Directory. The trust in this approach is enabled by the use of publickey infrastructure (PKI which is applied for client two-factor authentication and secures the infrastructure. Weintroduce the preventive activity-based authorization policy for dynamic user privilege controls. It helps preventsuccessive unauthorized requests in a formal manner. At the core, we apply An Improved Trust Model to facilitatethe authentication with the different keys with work flow of model efficiently. Also describes the X.509 standard todefine the directory schemas of PKI and PMI to find the object classes and optional attributes.

  10. Risk assessment meta tool LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Bouchard, Ann Marie; Osbourn, Gordon Cecil

    2006-12-01

    The goal of this project was to develop a risk analysis meta tool--a tool that enables security analysts both to combine and analyze data from multiple other risk assessment tools on demand. Our approach was based on the innovative self-assembling software technology under development by the project team. This technology provides a mechanism for the user to specify his intentions at a very high level (e.g., equations or English-like text), and then the code self-assembles itself, taking care of the implementation details. The first version of the meta tool focused specifically in importing and analyzing data from Joint Conflict and Tactical Simulation (JCATS) force-on-force simulation. We discuss the problem, our approach, technical risk, and accomplishments on this project, and outline next steps to be addressed with follow-on funding.

  11. Adolescent Perspectives on Authentic Writing Instruction

    Science.gov (United States)

    Behizadeh, Nadia

    2014-01-01

    Researchers and educators support the idea of providing authentic literacy experiences to students. However, a critical misconception of the locus of authenticity exists; the focus has generally been on making tasks authentic to college, careers, or researcher-determined notions of authenticity rather than making tasks authentic to students and…

  12. Identity Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-07-01

    Full Text Available Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy channels. Specifically, the authentication scenarios of single time and multiple times are investigated. For each scenario, the lower bound on the opponent’s success probability is derived, and it is smaller than the classical identity authentication’s. In addition, it can remain the same, even if the secret key is reused. Remarkably, the Cartesian authentication code proves to be helpful for hiding the secret key to maximize the secrecy performance. Finally, we show a potential application of this authentication technique.

  13. Persistent Authentication in Smart Environments

    DEFF Research Database (Denmark)

    Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D.

    Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based...... information, e.g., it is common to have swipe card terminals placed next to doors to restricted areas. This means that all access to protected resources must have individual means of authenticating users, which makes the access control system more expensive and less flexible, because access controls will not...... be installed unless it is absolutely necessary. The cost of installing and maintaining an authentication infrastructure and the inconvenience of repeatedly authenticating toward different location based service providers mean that new models of authentication are needed in smart environments. This...

  14. Persistent Authentication in Smart Environments

    DEFF Research Database (Denmark)

    Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D.

    2008-01-01

    Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based...... information, e.g., it is common to have swipe card terminals placed next to doors to restricted areas. This means that all access to protected resources must have individual means of authenticating users, which makes the access control system more expensive and less flexible, because access controls...... will not be installed unless it is absolutely necessary. The cost of installing and maintaining an authentication infrastructure and the inconvenience of repeatedly authenticating toward different location based service providers mean that new models of authentication are needed in smart environments. This paper...

  15. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    OpenAIRE

    Nebojsa Pavlovic

    2015-01-01

    This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The rese...

  16. Two Factor Authentication Made Easy

    OpenAIRE

    Chen, Alex Q. and Goh, Weihan

    2015-01-01

    Authentication on the Web is a challenge that can have a negative effect on user experience if it becomes overly complicated and cumbersome. This experience is even more crucial for older and visually impaired users due to their functional abilities. Web applications typically authenticate users by requesting for information that only the user knows (e.g. password). To enhance security, two-factor authentication (2FA) are increasingly implemented, which require the user to manually transfer i...

  17. Mobile authentication problems and solutions

    CERN Document Server

    Jakobsson, Markus

    2012-01-01

    Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes. The truth, of course, is somewhere in between, which is exactly what makes this topic so enticing. We cannot make progress with human-to-machine authentication with

  18. Integrating identity-based cryptography in IMS service authentication

    CERN Document Server

    Abid, Mohamed; Moustafa, Hassnaa; Afifi, Hossam

    2010-01-01

    Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very important in the IMS global objectives, they observe little attention so far. Secure access to multimedia services is based on SIP and HTTP digest on top of IMS architecture. The standard deploys AKA-MD5 for the terminal authentication. The third Generation Partnership Project (3GPP) provided Generic Bootstrapping Architecture (GBA) to authenticate the subscriber before accessing multimedia services over HTTP. In this paper, we propose a new IMS Service Authentication scheme using Identity Based cryptography (IBC). This new scheme will lead to better performances when there are simultaneous authentication requests using Identity-based Batch Verification. We analyzed the security of our new protocol and we presented a performance evaluation of its cryptographi...

  19. Semifragile Watermarking Schemes for Image Authentication- A Survey

    Directory of Open Access Journals (Sweden)

    Archana Tiwari

    2012-03-01

    Full Text Available Digital images are very easy to manipulate, store, publish and secondary creation this juggle will lead to serious consequence in some applications such as military image, medical image. So, integrity of digital image must be authenticated. Tools that help us establish the authenticity and integrity of digital media are thus essential and can prove vital whenever questions are raised about the origin of an image and its content. To project authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in content authentication. Semifragile watermarking aim to monitor contents of images not its representations. In present paper various semi fragile water marking algorithm are studied using some image quality matrices, insertion methods used, verification method . Finally some observations are given based on literature survey of algorithms and techniques of semifragile watermarking techniques

  20. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  1. Molecular authentication of geo-authentic Scrophularia ningpoensis

    Institute of Scientific and Technical Information of China (English)

    Chuan CHEN; Li-na DUAN; Xiao-long ZHOU; Bing-long CHEN; Cheng-xin FU

    2011-01-01

    Scrophularia ningpoensis has long been used in the Chinese Materia Medica for inflammation. Like other herbal medicines, S. ningpoensis collected from different localities may considerably differ in their therapeutic efficacy,and the one grown in Zhejiang Province is recognized as geo-authentic. However, it is difficult to confirm the geographical authenticity by similar morphological characteristics. In the present study, inter-simple sequence repeat (ISSR) markers were conducted to detect S. ningpoensis from different origins. A 1259-bp fragment amplified by primer UBC874 was found only in geo-authentic ones. By cloning and sequencing that specific band, sequence characterized amplified region (SCAR) markers were designed to distinguish geo-authentic S. ningpoensis from others.This is a rapid and easy method that can be used to identify the geographical authenticity of S. ningpoensis.

  2. Anonymous authenticated communications

    Science.gov (United States)

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  3. Authentic, Original, and Valuable

    DEFF Research Database (Denmark)

    Tupasela, Aaro Mikael; Tamminen, Sakari

    2015-01-01

    The idea of genetic authenticity and origin has been an important issue within genetics for decades for scientific, political, and economic reasons. The question of where species and populations come from, as well as the linking of genetic traits to particular geographical locations, has resurfaced...... as both a scientific and political site of interest more recently through the study of population genetics in both humans and non-humans. This article explores the ways in which genetics and notions of ‘authentic’, ‘indigenous’, and ‘endemic’ have become intertwined with everyday practices in research...

  4. QKD Quantum Channel Authentication

    OpenAIRE

    Kosloski, J. T.

    2006-01-01

    Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and c...

  5. Authenticity, Culture and Language Learning

    Science.gov (United States)

    MacDonald, Malcolm N.; Badger, Richard; Dasli, Maria

    2006-01-01

    In philosophy, authenticity has been used with two meanings: one entails the notion of correspondence; the other entails the notion of genesis (Cooper, 1983: 15). As in certain branches of philosophy, language teaching has perhaps clung too long to the first of these notions of authenticity at the expense of the other. This paper reviews four key…

  6. Creating an Authentic Learning Environment in the Foreign Language Classroom

    Directory of Open Access Journals (Sweden)

    Larisa Nikitina

    2011-01-01

    Full Text Available Theatrical activities are widely used by language educators to promote and facilitate language learning. Involving students in production of their own video or a short movie in the target language allows a seamless fusion of language learning, art, and popular culture. The activity is also conducive for creating an authentic learning situation where the real world becomes a part of the educational experience and necessitates the use of an authentic language by the learners. This article describes a video project carried out by Russian language learners at Universiti Malaysia Sabah (UMS. It examines how the work on the project created and supported authenticity of the learning experience. Though the article focuses on the video project done in the context of language learning and teaching this activity could be successfully implemented in teaching various subjects at both secondary and tertiary levels.

  7. ParaText : scalable solutions for processing and searching very large document collections : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Crossno, Patricia Joyce; Dunlavy, Daniel M.; Stanton, Eric T.; Shead, Timothy M.

    2010-09-01

    This report is a summary of the accomplishments of the 'Scalable Solutions for Processing and Searching Very Large Document Collections' LDRD, which ran from FY08 through FY10. Our goal was to investigate scalable text analysis; specifically, methods for information retrieval and visualization that could scale to extremely large document collections. Towards that end, we designed, implemented, and demonstrated a scalable framework for text analysis - ParaText - as a major project deliverable. Further, we demonstrated the benefits of using visual analysis in text analysis algorithm development, improved performance of heterogeneous ensemble models in data classification problems, and the advantages of information theoretic methods in user analysis and interpretation in cross language information retrieval. The project involved 5 members of the technical staff and 3 summer interns (including one who worked two summers). It resulted in a total of 14 publications, 3 new software libraries (2 open source and 1 internal to Sandia), several new end-user software applications, and over 20 presentations. Several follow-on projects have already begun or will start in FY11, with additional projects currently in proposal.

  8. Automated visual direction : LDRD 38623 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J.

    2005-01-01

    Mobile manipulator systems used by emergency response operators consist of an articulated robot arm, a remotely driven base, a collection of cameras, and a remote communications link. Typically the system is completely teleoperated, with the operator using live video feedback to monitor and assess the environment, plan task activities, and to conduct the operations via remote control input devices. The capabilities of these systems are limited, and operators rarely attempt sophisticated operations such as retrieving and utilizing tools, deploying sensors, or building up world models. This project has focused on methods to utilize this video information to enable monitored autonomous behaviors for the mobile manipulator system, with the goal of improving the overall effectiveness of the human/robot system. Work includes visual servoing, visual targeting, utilization of embedded video in 3-D models, and improved methods of camera utilization and calibration.

  9. Films and Blogs: an authentic approach to improve the writing skill – An intercultural project-based framework in the Senior High State School

    OpenAIRE

    Christine Calogerakou; Kosmas Vlachos

    2011-01-01

    This paper presents the implementation and the positive findings of a research involving a telecollaborative, e-twining project which linked two Senior State High school classes, one from Greece and one from Italy. The research aimed at investigating whether films and blogs in the English class can foster the development of writing skills, promote intercultural awareness and enhance the cultivation of new literacies. The research showed that the project succeeded in motivating the students wh...

  10. AVNG authentication features

    International Nuclear Information System (INIS)

    Any verification measurement performed on potentially classified nuclear material must satisfy two seemingly contradictory constraints. First and foremost, no classified information can be released. At the same time, the monitoring party must have confidence in the veracity of the measurement (called authentication). An information barrier (IB) is included in the measurement system to protect the potentially classified information. To achieve both goals, the IB allows only very limited, previously agreed-on information to be displayed to the monitoring party. In addition to this limited information from the potentially classified measurement, other measurements are performed and procedures are put in place for the monitoring party to gain confidence that the material being measured is consistent with the host's declarations concerning that material. In this presentation, we will discuss the techniques used in the AVNG attribute measuring system to facilitate authentication of the verification measurements by the monitors. These techniques include measuring unclassified items while allowing more information to be displayed; having the monitor understand the system function, design, and implementation; and randomly selecting the order of measurements.

  11. Message Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-01-01

    Full Text Available The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent’s success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication.

  12. Authenticity and commoditization at home

    DEFF Research Database (Denmark)

    Stender, Marie

    This paper investigates how interest and affect are entangled in the built environment of new Danish homes. The paper unfolds tensions and conflicts in the process from design through branding to occupancy of the house, and the relationship between authenticity and commoditization is explored....... In Denmark, the concept of authenticity is often associated with old houses. By way of design and branding, though, new neighbourhoods are made authentic, referring to their historical past, architectural uniqueness or sense of community. Based on a fieldwork in three new residential buildings in Copenhagen......, the paper explores the inherent paradox of the staging of authenticity. Rather than viewing the house solely from the perspective of the resident, the study ethnographically traces the entire process from design to occupancy in order to investigate how notions of value and authenticity are negotiated...

  13. Massive graph visualization : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Wylie, Brian Neil; Moreland, Kenneth D.

    2007-10-01

    Graphs are a vital way of organizing data with complex correlations. A good visualization of a graph can fundamentally change human understanding of the data. Consequently, there is a rich body of work on graph visualization. Although there are many techniques that are effective on small to medium sized graphs (tens of thousands of nodes), there is a void in the research for visualizing massive graphs containing millions of nodes. Sandia is one of the few entities in the world that has the means and motivation to handle data on such a massive scale. For example, homeland security generates graphs from prolific media sources such as television, telephone, and the Internet. The purpose of this project is to provide the groundwork for visualizing such massive graphs. The research provides for two major feature gaps: a parallel, interactive visualization framework and scalable algorithms to make the framework usable to a practical application. Both the frameworks and algorithms are designed to run on distributed parallel computers, which are already available at Sandia. Some features are integrated into the ThreatView{trademark} application and future work will integrate further parallel algorithms.

  14. Covert air vehicle 2003 LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Spletzer, Barry Louis; Callow, Diane Schafer; Salton, Jonathan Robert; Fischer, Gary John

    2003-11-01

    This report describes the technical work carried out under a 2003 Laboratory Directed Research and Development project to develop a covert air vehicle. A mesoscale air vehicle that mimics a bird offers exceptional mobility and the possibility of remaining undetected during flight. Although some such vehicles exist, they are lacking in key areas: unassisted landing and launching, true mimicry of bird flight to remain covert, and a flapping flight time of any real duration. Current mainstream technology does not have the energy or power density necessary to achieve bird like flight for any meaningful length of time; however, Sandia has unique combustion powered linear actuators with the unprecedented high energy and power density needed for bird like flight. The small-scale, high-pressure valves and small-scale ignition to make this work have been developed at Sandia. We will study the feasibility of using this to achieve vehicle takeoff and wing flapping for sustained flight. This type of vehicle has broad applications for reconnaissance and communications networks, and could prove invaluable for military and intelligence operations throughout the world. Initial tests were conducted on scaled versions of the combustion-powered linear actuator. The tests results showed that heat transfer and friction effects dominate the combustion process at 'bird-like' sizes. The problems associated with micro-combustion must be solved before a true bird-like ornithopter can be developed.

  15. Final Report for the Virtual Reliability Realization System LDRD

    Energy Technology Data Exchange (ETDEWEB)

    DELLIN, THEODORE A.; HENDERSON, CHRISTOPHER L.; O' TOOLE, EDWARD J.

    2000-12-01

    Current approaches to reliability are not adequate to keep pace with the need for faster, better and cheaper products and systems. This is especially true in high consequence of failure applications. The original proposal for the LDRD was to look at this challenge and see if there was a new paradigm that could make reliability predictions, along with a quantitative estimate of the risk in that prediction, in a way that was faster, better and cheaper. Such an approach would be based on the underlying science models that are the backbone of reliability predictions. The new paradigm would be implemented in two software tools: the Virtual Reliability Realization System (VRRS) and the Reliability Expert System (REX). The three-year LDRD was funded at a reduced level for the first year ($120K vs. $250K) and not renewed. Because of the reduced funding, we concentrated on the initial development of the expertise system. We developed an interactive semiconductor calculation tool needed for reliability analyses. We also were able to generate a basic functional system using Microsoft Siteserver Commerce Edition and Microsoft Sequel Server. The base system has the capability to store Office documents from multiple authors, and has the ability to track and charge for usage. The full outline of the knowledge model has been incorporated as well as examples of various types of content.

  16. Films and Blogs: an authentic approach to improve the writing skill – An intercultural project-based framework in the Senior High State School

    Directory of Open Access Journals (Sweden)

    Christine Calogerakou

    2011-02-01

    Full Text Available This paper presents the implementation and the positive findings of a research involving a telecollaborative, e-twining project which linked two Senior State High school classes, one from Greece and one from Italy. The research aimed at investigating whether films and blogs in the English class can foster the development of writing skills, promote intercultural awareness and enhance the cultivation of new literacies. The research showed that the project succeeded in motivating the students who, through their on-line communication achieved cultural literacy and other new literacies to a large degree.

  17. FY08 LDRD Final Report Regional Climate

    Energy Technology Data Exchange (ETDEWEB)

    Bader, D C; Chin, H; Caldwell, P M

    2009-05-19

    An integrated, multi-model capability for regional climate change simulation is needed to perform original analyses to understand and prepare for the impacts of climate change on the time and space scales that are critical to California's future environmental quality and economic prosperity. Our intent was to develop a very high resolution regional simulation capability to address consequences of climate change in California to complement the global modeling capability that is supported by DOE at LLNL and other institutions to inform national and international energy policies. The California state government, through the California Energy Commission (CEC), institutionalized the State's climate change assessment process through its biennial climate change reports. The bases for these reports, however, are global climate change simulations for future scenarios designed to inform international policy negotiations, and are primarily focused on the global to continental scale impacts of increasing emissions of greenhouse gases. These simulations do not meet the needs of California public and private officials who will make major decisions in the next decade that require an understanding of climate change in California for the next thirty to fifty years and its effects on energy use, water utilization, air quality, agriculture and natural ecosystems. With the additional development of regional dynamical climate modeling capability, LLNL will be able to design and execute global simulations specifically for scenarios important to the state, then use those results to drive regional simulations of the impacts of the simulated climate change for regions as small as individual cities or watersheds. Through this project, we systematically studied the strengths and weaknesses of downscaling global model results with a regional mesoscale model to guide others, particularly university researchers, who are using the technique based on models with less complete

  18. Authentic Oral Language Production and Interaction in CALL: An Evolving Conceptual Framework for the Use of Learning Analytics within the SpeakApps Project

    Science.gov (United States)

    Nic Giolla Mhichíl, Mairéad; van Engen, Jeroen; Ó Ciardúbháin, Colm; Ó Cléircín, Gearóid; Appel, Christine

    2014-01-01

    This paper sets out to construct and present the evolving conceptual framework of the SpeakApps projects to consider the application of learning analytics to facilitate synchronous and asynchronous oral language skills within this CALL context. Drawing from both the CALL and wider theoretical and empirical literature of learner analytics, the…

  19. Real-time discriminatory sensors for water contamination events :LDRD 52595 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Borek, Theodore Thaddeus III (; ); Carrejo-Simpkins, Kimberly; Wheeler, David Roger; Adkins, Douglas Ray; Robinson, Alex Lockwood; Irwin, Adriane Nadine; Lewis, Patrick Raymond; Goodin, Andrew M.; Shelmidine, Gregory J.; Dirk, Shawn M.; Chambers, William Clayton; Mowry, Curtis Dale (1722 Micro-Total-Analytical Systems); Showalter, Steven Kedrick

    2005-10-01

    The gas-phase {mu}ChemLab{trademark} developed by Sandia can detect volatile organics and semi-volatiles organics via gas phase sampling . The goal of this three year Laboratory Directed Research and Development (LDRD) project was to adapt the components and concepts used by the {mu}ChemLab{trademark} system towards the analysis of water-borne chemicals of current concern. In essence, interfacing the gas-phase {mu}ChemLab{trademark} with water to bring the significant prior investment of Sandia and the advantages of microfabrication and portable analysis to a whole new world of important analytes. These include both chemical weapons agents and their hydrolysis products and disinfection by-products such as Trihalomethanes (THMs) and haloacetic acids (HAAs). THMs and HAAs are currently regulated by EPA due to health issues, yet water utilities do not have rapid on-site methods of detection that would allow them to adjust their processes quickly; protecting consumers, meeting water quality standards, and obeying regulations more easily and with greater confidence. This report documents the results, unique hardware and devices, and methods designed during the project toward the goal stated above. It also presents and discusses the portable field system to measure THMs developed in the course of this project.

  20. Authentic Learning Environments in Higher Education

    Directory of Open Access Journals (Sweden)

    Reviewed by Dr. Adnan BOYACI

    2006-01-01

    Full Text Available Over the last decade the use of the authentic cases, problems and projects as a starting point for learning has won ground in higher education. Usually, these cases refer complex, ill–defined or open ended problems and often require multidisciplinary approaches. Students start with analysis of the cases, which involvesgathering information, constructing and testing possible solutions. In short they supposedly develop competencies needed to deal withproblems and issues that arise in a professional academic practice. This approach to learning may contrast with the common practice whichhas students working individually, grasping the knowledge from their teachers and text books using artificial problems (Berge and others,2005.In other words authentic learning experiences are those situated in certain appropriate social context and inevitably relevant from learner’s perspective. In planning for authentic learning to realize, a tension can appear between providing real world ‘natural’experiences and the nature of experiences that are possible offer within institution which can be often artificial and seen as inauthentic by the student. Bridging the gap between the learning taking place within the institution and learning within the real lifecommunities of practice can be difficult for university teacher (Stein and others, 2004. In that sense the purpose of this is to construct that bridge book by providing examples of good practice.

  1. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2015-06-01

    Full Text Available This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The research included the use of an ALQ questionnaire for the estimation of leadership behavior. The components of authentic leadership are defined using factor analysis and other statistics techniques. The findings developed in this research indicated the fact that directors in educational institutions have a specific authentic leadership style. We suggest the concept of authentic leadership based on the four following factors: Communication-conformist, self-consciousness, self-discovery, and self-concept. Supporting these factors provides the directors with the possibility of obtaining a high level of authentic leadership.

  2. [Problems of food authenticity].

    Science.gov (United States)

    Czerwiecki, Ludwik

    2004-01-01

    In this review the several data concerning food authenticity were presented. Typical examples of food adulteration were described. The most known are adulteration of vegetable and fruit products, adulteration of wine, honeys, olive oil etc. The modern analytical techniques for detection of food adulteration were discussed. Among physicochemical methods isotopic techniques (SCIRA, IRMS, SNIF-NMR) were cited. The main spectral methods are: IACPAES, PyMs, FTIR, NIR. The chromatographic techniques (GC, HPLC, HPAEC, HPTLC) with several kinds of detectors were described and the ELISA and PCR techniques are mentioned, too. The role of chemometrics as a way of several analytical data processing was highlighted. It was pointed out at the necessity of more rigorous control of food to support of all activity in area of fight with fraud in food industry. PMID:15307611

  3. Authentic leadership: application to women leaders

    OpenAIRE

    Hopkins, Margaret M.; O’Neil, Deborah A.

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.

  4. Is Authentic a thing of the Past?

    OpenAIRE

    Mac Con Iomaire, Máirtín

    2005-01-01

    This article is a review of the Oxford Symposium on Food and Cookery 2005 where the theme was Authenticity. It discusses the subject of Autheniticity in food and asks whether there is such a thing? What is Authenticity? Who can define what Authenticity means in the context of food? Is authenticity in food an indulgence of the rich which stiffles creativity and invention?

  5. Authentic leadership: application to women leaders.

    Science.gov (United States)

    Hopkins, Margaret M; O'Neil, Deborah A

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women. PMID:26236254

  6. Authenticity in CALL: Three Domains of "Realness"

    Science.gov (United States)

    Buendgens-Kosten, Judith

    2013-01-01

    This paper discusses the role of authenticity and authenticity claims in computer assisted language learning (CALL). It considers authenticity as the result of a social negotiation process rather than an innate feature of a text, object, person, or activity. From this basis, it argues that authenticity claims play an important role in both second…

  7. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori;

    2015-01-01

    Recently companies have applied two-factor user authentication. Persistent Authentication is one of the interesting authentication mechanisms to establish security and usability of two-factor authentication systems. However, there is room to improve its feasibility and usability. In this paper, we...... propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  8. Effects of Helping on State Authenticity Versus Recalled Authenticity

    OpenAIRE

    Allan, Clare M.

    2011-01-01

    This study focuses on the under-researched subject of “state authenticity”, the experience of expressing one’s true self. The 2 major hypotheses of the causes of state authenticity are tested: behavioural content versus consistency with personal traits. Investigations examine the proposal that behaviour expressing values, specifically “helping others” increases state authenticity, regardless of an individual’s own helpfulness-traits. Using a web-based survey, 238 participants were randomly as...

  9. Robustness of digital artist authentication

    DEFF Research Database (Denmark)

    Jacobsen, Robert; Nielsen, Morten

    In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...... is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection....

  10. Research on Mixed Encryption Authentication

    Institute of Scientific and Technical Information of China (English)

    SUN Zhi-xin; WANG Ru-chuan; WANG Shao-di

    2003-01-01

    With the development of network techniques, the problem of network security is also arising as we enjoy its open convenience. There are many developed methods to overcome this problem. Identity authentication is one of these important measures. The authentication methods of traditional symmetric cryptogram systems and asymmetric cryptogram systems have both advantages and defects. This paper brings forward a Mixed Encryption Model for Authentication (MEMA), which has obvious advantages compared to the two traditional methods. MEMA model can be used widely in opening network environment such as mobile agent systems, multi-agents security safeguard systems and other situations in which identity authentication of users are needed. At last, the paper also presents the MEMA model's structure and implementation of an experimental system.

  11. Keystroke Dynamics for Authentication in Biomedicine

    Czech Academy of Sciences Publication Activity Database

    Schlenker, Anna

    Praha : Ústav informatiky AV ČR, v. v. i. & MATFYZPRESS, 2012 - (Kuželová, D.; Hakl, F.), s. 52-55 ISBN 978-80-7278-217-7. [Doktorandské dny 2012 Ústavu informatiky AV ČR, v. v. i.. Jizerka (CZ), 24.09.2012-26.09.2012] R&D Projects: GA MŠk LM2010005 Institutional support: RVO:67985807 Keywords : biometrics * anatomical-physiological biometrics * behavioral biometrics * multi-factor authentication * keystroke dynamics Subject RIV: IN - Informatics, Computer Science

  12. Quantum direct communication with authentication

    International Nuclear Information System (INIS)

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states

  13. Automated Algorithms for Quantum-Level Accuracy in Atomistic Simulations: LDRD Final Report.

    Energy Technology Data Exchange (ETDEWEB)

    Thompson, Aidan P.; Schultz, Peter A.; Crozier, Paul; Moore, Stan Gerald; Swiler, Laura Painton; Stephens, John Adam; Trott, Christian Robert; Foiles, Stephen M.; Tucker, Garritt J. (Drexel University)

    2014-09-01

    This report summarizes the result of LDRD project 12-0395, titled %22Automated Algorithms for Quantum-level Accuracy in Atomistic Simulations.%22 During the course of this LDRD, we have developed an interatomic potential for solids and liquids called Spectral Neighbor Analysis Poten- tial (SNAP). The SNAP potential has a very general form and uses machine-learning techniques to reproduce the energies, forces, and stress tensors of a large set of small configurations of atoms, which are obtained using high-accuracy quantum electronic structure (QM) calculations. The local environment of each atom is characterized by a set of bispectrum components of the local neighbor density projected on to a basis of hyperspherical harmonics in four dimensions. The SNAP coef- ficients are determined using weighted least-squares linear regression against the full QM training set. This allows the SNAP potential to be fit in a robust, automated manner to large QM data sets using many bispectrum components. The calculation of the bispectrum components and the SNAP potential are implemented in the LAMMPS parallel molecular dynamics code. Global optimization methods in the DAKOTA software package are used to seek out good choices of hyperparameters that define the overall structure of the SNAP potential. FitSnap.py, a Python-based software pack- age interfacing to both LAMMPS and DAKOTA is used to formulate the linear regression problem, solve it, and analyze the accuracy of the resultant SNAP potential. We describe a SNAP potential for tantalum that accurately reproduces a variety of solid and liquid properties. Most significantly, in contrast to existing tantalum potentials, SNAP correctly predicts the Peierls barrier for screw dislocation motion. We also present results from SNAP potentials generated for indium phosphide (InP) and silica (SiO 2 ). We describe efficient algorithms for calculating SNAP forces and energies in molecular dynamics simulations using massively parallel

  14. Advancements in sensing and perception using structured lighting techniques :an LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Novick, David Keith; Padilla, Denise D.; Davidson, Patrick A. Jr. (.; .); Carlson, Jeffrey J.

    2005-09-01

    This report summarizes the analytical and experimental efforts for the Laboratory Directed Research and Development (LDRD) project entitled ''Advancements in Sensing and Perception using Structured Lighting Techniques''. There is an ever-increasing need for robust, autonomous ground vehicles for counterterrorism and defense missions. Although there has been nearly 30 years of government-sponsored research, it is undisputed that significant advancements in sensing and perception are necessary. We developed an innovative, advanced sensing technology for national security missions serving the Department of Energy, the Department of Defense, and other government agencies. The principal goal of this project was to develop an eye-safe, robust, low-cost, lightweight, 3D structured lighting sensor for use in broad daylight outdoor applications. The market for this technology is wide open due to the unavailability of such a sensor. Currently available laser scanners are slow, bulky and heavy, expensive, fragile, short-range, sensitive to vibration (highly problematic for moving platforms), and unreliable for outdoor use in bright sunlight conditions. Eye-safety issues are a primary concern for currently available laser-based sensors. Passive, stereo-imaging sensors are available for 3D sensing but suffer from several limitations : computationally intensive, require a lighted environment (natural or man-made light source), and don't work for many scenes or regions lacking texture or with ambiguous texture. Our approach leveraged from the advanced capabilities of modern CCD camera technology and Center 6600's expertise in 3D world modeling, mapping, and analysis, using structured lighting. We have a diverse customer base for indoor mapping applications and this research extends our current technology's lifecycle and opens a new market base for outdoor 3D mapping. Applications include precision mapping, autonomous navigation, dexterous

  15. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  16. Teaching Materials Should be Authentic

    Institute of Scientific and Technical Information of China (English)

    俞莹

    2008-01-01

    <正>In terms of the teaching materials,we hold the opinion that authentic materials should be adapted in the process of teaching,and students should have access to the original language. According to Richards(2001),authentic materials refer to the use in teaching of texts,photographs, video selections,and other teaching resources that were not specially prepared for pedagogical purposes.Created materials refer to textbooks and other specially developed instructional resources. The use of authentic materials in an EFL classroom is what many teachers involved in foreign language teaching have discussed in recent years.Most of the teachers throughout the world agree that authentic texts or materials are beneficial to the language learning process.Authentic materials enable learners to interact with the real language and content rather than the form.Learners feel that they are learning a target language as it is used outside the classroom.Exposing students to authentic materials can also help them better understand the target culture and envision how they might participate in this community.

  17. Development of nature of science ideas through authentic scientific research

    Science.gov (United States)

    Burgin, Stephen Randall

    Understanding the ways in which scientific knowledge develops, or the epistemology of science, is believed to be a crucial component of scientific literacy. This construct is more formally known as Nature of Science (NOS) within the science education community. The merits of three different approaches to NOS teaching and learning in the context of authentic scientific research on high school student participants' NOS ideas were explored in this study. These approaches were an explicit/reflective approach, a reflective approach and an implicit approach. The effectiveness of explicit approaches over implicit approaches has been demonstrated in school contexts, but little is known regarding the merits of these approaches when the practices that learners engage in are highly authentic in the ways in which they model the work of professional scientists. If an implicit approach yields positive impacts in authentic contexts, then which specific factors within those contexts are influential in doing so? The Authentic Experiences in Science Program (AESP), a summer program designed for high school students offered at a major research university, offered a wonderful context for an investigation of these issues. In this program, high school students worked for an extended period of time in a research scientist's laboratory on an authentic research project. Additionally, seminars offered through the program provided a venue for the implementation of the three aforementioned NOS teaching and learning approaches. An open-ended questionnaire designed to assess respondent NOS ideas was administered to 30 participants of the AESP both at the beginning and again at the end of the program. From those thirty, six case study participants were selected, and through a series of observations and interviews, influential factors impacting their NOS ideas within their specific laboratory placements were identified. Results of categorical data analysis of the questionnaires revealed that the

  18. Strengthening Software Authentication with the ROSE Software Suite

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2006-06-15

    Many recent nonproliferation and arms control software projects include a software authentication regime. These include U.S. Government-sponsored projects both in the United States and in the Russian Federation (RF). This trend toward requiring software authentication is only accelerating. Demonstrating assurance that software performs as expected without hidden ''backdoors'' is crucial to a project's success. In this context, ''authentication'' is defined as determining that a software package performs only its intended purpose and performs said purpose correctly and reliably over the planned duration of an agreement. In addition to visual inspections by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs, both to aid visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary and not extensible. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool has to be based on a complete language compiler. ROSE is precisely such a compiler infrastructure developed within the Department of Energy (DOE) and targeted at the optimization of scientific applications and user-defined libraries within large-scale applications (typically applications of a million lines of code). ROSE is a robust, source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C and C++ (handling the full C, C99, C++ languages and with current collaborations to support Fortran90). We propose to extend ROSE to address a number of security-specific requirements, and apply it to software authentication for nonproliferation and arms control projects.

  19. Strengthening Software Authentication with the ROSE Software Suite

    International Nuclear Information System (INIS)

    Many recent nonproliferation and arms control software projects include a software authentication regime. These include U.S. Government-sponsored projects both in the United States and in the Russian Federation (RF). This trend toward requiring software authentication is only accelerating. Demonstrating assurance that software performs as expected without hidden ''backdoors'' is crucial to a project's success. In this context, ''authentication'' is defined as determining that a software package performs only its intended purpose and performs said purpose correctly and reliably over the planned duration of an agreement. In addition to visual inspections by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs, both to aid visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary and not extensible. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool has to be based on a complete language compiler. ROSE is precisely such a compiler infrastructure developed within the Department of Energy (DOE) and targeted at the optimization of scientific applications and user-defined libraries within large-scale applications (typically applications of a million lines of code). ROSE is a robust, source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C and C++ (handling the full C, C99, C++ languages and with current collaborations to support Fortran90). We propose to extend ROSE to address a number of security-specific requirements, and apply it to software authentication for nonproliferation and arms control projects

  20. Short-term data collection projects: A means to increase teacher content knowledge and bring authentic research experiences into the classroom

    Science.gov (United States)

    Gaboardi, M.; Parker, W.; Rodriguez, D.

    2010-12-01

    Short-term field research projects were embedded into a two-week, Mathematics and Science Partnership-funded, teacher institute devoted to increasing content knowledge about the physical basis of climate change. Teams of four teachers were encouraged to ask any research question related to weather or climate, and create a data collection method that they thought might help answer their question. They were provided with a range of measurement devices, from simple immersible thermometers to light sensors, probeware, and carbon dioxide concentration sensors. Teams were expected to design data collection sites in a middle-school setting, present site designs to their peers, collect data, present initial results, and participate in peer-review about site design and data collected. Teachers were encouraged to generate research questions that could be replicated with their students at their schools. Design complexity ranged widely with some teachers deliberately choosing to model sites their students might design and others making full use of more sophisticated technology. On the third day of the institute, each group presented their research question and setup for data collection in poster format. Large gaps in understanding about testable questions and effective data collection methods were apparent. Instead of addressing errors as groups presented, facilitators encouraged participants to explore each groups’ presentation and make comments using post-it notes. Participants were then encouraged to respond to the comments and consider modifying their questions, site designs, or data collection methods. Teams gathered data up to three times daily and were fully responsible for choosing means of data organization; by the second week most were using and becoming familiar with Microsoft Excel. Final presentations were in Microsoft PowerPoint. Teams were expected to graphically report data, present possible interpretations, and discuss any problems related to their initial

  1. Authenticity in art

    International Nuclear Information System (INIS)

    After a general introductory chapter, the subject is treated under three headings: paintings, ceramics and metals. The scientific tests for authenticity are described in their application to one or more of these branches of art. The traditional method of visual stylistic judgement is compared with and supplemented by scientific methods which (as well as 'wet' chemical analysis, optical microscopy, ultraviolet, infrared, electron and X-ray microscopy, X-ray crystallography and X-ray fluorescence, and direct age determination) include the following or more direct 'nuclear' interest: neutron (or proton, deuteron and high-energy photon) activation analysis for determining impurity and trace element content, gamma radiography for bronzes, neutron autoradiography or examining paintings, radiocarbon dating, other isotope dating (e.g. with lead isotopes and the radium-lead ratio), high temperature thermoluminescence for ceramics, and mass spectroscopy to determine isotope ratios indicative of particular sources of materials. As well as the reference in each chapter there is an additional bibliography. (U.K.)

  2. For-LySa: UML for Authentication Analysis

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Montangero, Carlo; Perrone, Lara;

    2005-01-01

    The DEGAS project aims at enriching standard UML-centred development environments in such a way that the developers of global applications can exploit automated formal analyses with minimal overhead. In this paper, we present For-LySa, an instantiation of the DEGAS approach for authentication...... analysis, which exploits an existing analysis tool developed for the process calculus LySa. We discuss what information is needed for the analysis, and how to build the UML model of an authentication protocol in such a way that the needed information can be extracted from the model. We then present our...

  3. Communicating food safety, authenticity and consumer choice. Field experiences.

    Science.gov (United States)

    Syntesa, Heiner Lehr

    2013-04-01

    The paper reviews patented and non-patented technologies, methods and solutions in the area of food traceability. It pays special attention to the communication of food safety, authenticity and consumer choice. Twenty eight recent patents are reviewed in the areas of (secure) identification, product freshness indicators, meat traceability, (secure) transport of information along the supply chain, country/region/place of origin, automated authentication, supply chain management systems, consumer interaction systems. In addition, solutions and pilot projects are described in the areas of Halal traceability, traceability of bird's nests, cold chain management, general food traceability and other areas. PMID:22857606

  4. X.509 Authentication/Authorization in FermiCloud

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyunwoo [Fermilab; Timm, Steven [Fermilab

    2014-11-11

    We present a summary of how X.509 authentication and authorization are used with OpenNebula in FermiCloud. We also describe a history of why the X.509 authentication was needed in FermiCloud, and review X.509 authorization options, both internal and external to OpenNebula. We show how these options can be and have been used to successfully run scientific workflows on federated clouds, which include OpenNebula on FermiCloud and Amazon Web Services as well as other community clouds. We also outline federation options being used by other commercial and open-source clouds and cloud research projects.

  5. LDRD final report backside localization of open and shorted IC interconnections LDRD Project (FY98 and FY 99)

    Energy Technology Data Exchange (ETDEWEB)

    Cole, E.I. Jr.; Tangyunyong, P.; Benson, D.A.; Barton, D.L.

    2000-01-01

    Two new failure analysis techniques have been developed for backside and front side localization of open and shorted interconnections on ICs. These scanning optical microscopy techniques take advantage of the interactions between IC defects and localized heating using a focused infrared laser ({lambda} = 1,340 nm). Images are produced by monitoring the voltage changes across a constant current supply used to power the IC as the laser beam is scanned across the sample. The methods utilize the Seebeck Effect to localize open interconnections and Thermally-Induced Voltage Alteration (TIVA) to detect shorts. Initial investigations demonstrated the feasibility of TIVA and Seebeck Effect Imaging (SEI). Subsequent improvements have greatly increased the sensitivity of the TIVA/SEI system, reducing the acquisition times by more than 20X and localizing previously unobserved defects. The interaction physics describing the signal generation process and several examples demonstrating the localization of opens and shorts are described. Operational guidelines and limitations are also discussed. The system improvements, non-linear response of IC defects to heating, modeling of laser heating and examples using the improved system for failure analysis are presented.

  6. FY04 LDRD Final Report Small Sample Heat Capacity Under High Pressure LDRD Project Tracking Code: 04-FS-020

    International Nuclear Information System (INIS)

    Specific heat provides a probe of bulk thermodynamic properties, including low energy excitations (phonons, magnons, etc), the electron density of states, and direct observation of phase transitions. The ability to measure specific heat as a function of pressure permits study of these properties as a function of lattice parameters. This in turn should allow construction of an equation of state for a given system. Previous measurements of specific heat under pressure done by adiabatic methods were limited to materials with extremely large heat capacities because it was difficult to decouple the sample heat capacity from the surrounding pressure cell. Starting in the late Seventies, Eichler and Gey[1] demonstrated an AC technique to measure heat capacity of relatively small samples (∼100's mg) in a piston pressure cylinder at pressures up to 2 GPa. More recently, this technique has been expanded to include work on significantly smaller samples (< 1mg) in large diamond anvil cells (DAC)[2]. However, these techniques require a relatively weak coupling of the sample to the surrounding thermal bath, which limits the base temperature, particularly for radioactive samples possessing significant self-heating such as plutonium. A different technique, sometimes referred to as the 3ω-technique, utilizes a two dimensional heat flow model to extract heat capacity, C, and κ, the thermal conductivity, from an oscillating heat input. One advantage of this method is that it does not require that the sample be thermally isolated from the heat bath, so lower base temperatures should be accessible to interesting self-heating samples. From an experimental perspective, the design requirements of the 3ω and AC techniques are quite similar. We focused on development of these techniques for a copper-beryllium (CuBe) pressure clamp for use on small samples at temperatures down to 1.7K and at pressures up to 1.6 GPa. The successful development of this capability will enable a new class of important physical property measurements on a variety of advanced and special materials, including plutonium

  7. Efficient and secure source authentication scheme for multicast user authentication

    Institute of Scientific and Technical Information of China (English)

    JEONG; Yoon-su; LEE; Sang-hyuk; SHIN; Seung-soo

    2013-01-01

    Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video and online news. Because multicast current services provided to the group members are changed dynamically, data transferring by a group member is not used by the recipient. In order to verify the identity of the sender who sent the packet and to make sure that the data have not been tampered, an optimized source authentication scheme has been proposed to transfer the authentication information not to the next-door packet. The proposed method for multiple packets authenticates the source with a limited number of electronic signatures. The proposed method can reduce overhead compared to the method by adding a digital signature for every packet. In addition, by sending the generated electronic signature to the first packet and the last packet, it prevents the loss of consecutive packets, as well as a source authentication can be provided in real-time services.

  8. Sequence Patterns of Identity Authentication Protocols

    Institute of Scientific and Technical Information of China (English)

    Tao Hongcai; He Dake

    2006-01-01

    From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

  9. Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept

    OpenAIRE

    Drosou, A.; Ioannidis, D.; Moustakas, K.; Tzovaras, D.

    2011-01-01

    Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of...

  10. 基于连续投影算法的油菜蜜近红外光谱真伪鉴别的研究%Authenticity of Brassica honey based on liner successive project algorithm and near infrared spectroscopy

    Institute of Scientific and Technical Information of China (English)

    李水芳; 单杨; 尹永; 周孜

    2012-01-01

    采用连续投影算法(successive project algorithm,SPA)对177个不同产地油菜蜜样本的近红外光谱做波长选择,然后以33个特征变量作线性识别分析(LDA)。同时,也采用了主成分分析(PCA)对变量进行压缩。比较了二次识别分析(QDA)和簇类独立软模式分类法(SIMCA)的鉴别结果。SPA-LDA模型预测集的鉴别准确率为97.7%,而PCA-LDA、全谱的SIMCA和SPA-QDA预测集的正确率分别为93.2%、95.4%和90.9%;上述四种方法ROC曲线下的面积分别为0.964、0.912、0.948和0.933。SPA-LDA性能比其他三种方法要好。该方法准确、可靠,为蜂蜜真实性的现场快速检测提供了一种新方法。%Near infrared spectroscopy combined with chemometrics methods were used to detect Brassica honey samples.For this purpose,successive project algorithm(SPA) was employed to choose thirty-three spectral variables,which were used as input of liner discriminative analysis(LDA) model.For comparison,principal components analysis(PCA) was used to compress the high-dimensional data.Quadratic discriminative analysis(QDA) and soft independent modeling of class analogy(SIMCA) were also employed to classify authentic and adulterated honey.The classification accuracy rates of SPA-LDA,PCA-LDA,SPA-QDA,and SIMCA were 97.7%,93.2%,90.9% and 95.4%,respectively.The area under receiver operation characteristic(ROC) curves of the above mentioned four methods could reach 0.964,0.912,0.933,and 0.948,respectively.The performance of SPA-LDA was better than other three methods.The results showed that SPA-LDA could be a useful means for detect adulterated honey owning to its rapid,accuracy,and generalization.

  11. LDRD final report: photonic analog-to-digital converter (ADC) technology; TOPICAL

    International Nuclear Information System (INIS)

    We report on an LDRD seed program of novel technology development (started by an FY98 Engineering Tech-base project) that will enable extremely high-fidelity analog-to-digital converters for a variety of national security missions. High speed (l0+ GS/s ), high precision (l0+ bits) ADC technology requires extremely short aperture times ((approx)1ps ) with very low jitter requirements (sub 10fs ). These fundamental requirements, along with other technological barriers, are difficult to realize with electronics: However, we outline here, a way to achieve these timing apertures using a novel multi-wavelength optoelectronic short-pulse optical source. Our approach uses an optoelectronic feedback scheme with high optical Q to produce an optical pulse train with ultra-low jitter ( sub 5fs) and high amplitude stability ( and lt;10(sup 10)). This approach requires low power and can be integrated into an optoelectronic integrated circuit to minimize the size. Under this seed program we have demonstrated that the optical feedback mechanism can be used to generate a high Q resonator. This has reduced the technical risk for further development, making it an attractive candidate for outside funding

  12. Soot formation, transport, and radiation in unsteady diffusion flames : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Suo-Anttila, Jill Marie (Sandia National Laboratories, Albuquerque, NM); Williams, Timothy C.; Shaddix, Christopher R.; Jensen, Kirk A. (Sandia National Laboratories, Albuquerque, NM); Blevins, Linda Gail; Kearney, Sean Patrick (Sandia National Laboratories, Albuquerque, NM); Schefer, Robert W.

    2004-10-01

    Fires pose the dominant risk to the safety and security of nuclear weapons, nuclear transport containers, and DOE and DoD facilities. The thermal hazard from these fires primarily results from radiant emission from high-temperature flame soot. Therefore, it is necessary to understand the local transport and chemical phenomena that determine the distributions of soot concentration, optical properties, and temperature in order to develop and validate constitutive models for large-scale, high-fidelity fire simulations. This report summarizes the findings of a Laboratory Directed Research and Development (LDRD) project devoted to obtaining the critical experimental information needed to develop such constitutive models. A combination of laser diagnostics and extractive measurement techniques have been employed in both steady and pulsed laminar diffusion flames of methane, ethylene, and JP-8 surrogate burning in air. For methane and ethylene, both slot and coannular flame geometries were investigated, as well as normal and inverse diffusion flame geometries. For the JP-8 surrogate, coannular normal diffusion flames were investigated. Soot concentrations, polycyclic aromatic hydrocarbon (PAH) laser-induced fluorescence (LIF) signals, hydroxyl radical (OH) LIF, acetylene and water vapor concentrations, soot zone temperatures, and the velocity field were all successfully measured in both steady and unsteady versions of these various flames. In addition, measurements were made of the soot microstructure, soot dimensionless extinction coefficient (&), and the local radiant heat flux. Taken together, these measurements comprise a unique, extensive database for future development and validation of models of soot formation, transport, and radiation.

  13. Final LDRD report : nanoscale mechanisms in advanced aging of materials during storage of spent %22high burnup%22 nuclear fuel.

    Energy Technology Data Exchange (ETDEWEB)

    Clark, Blythe G.; Rajasekhara, Shreyas; Enos, David George; Dingreville, Remi Philippe Michel; Doyle, Barney Lee; Hattar, Khalid Mikhiel; Weiner, Ruth F.

    2013-09-01

    We present the results of a three-year LDRD project focused on understanding microstructural evolution and related property changes in Zr-based nuclear cladding materials towards the development of high fidelity predictive simulations for long term dry storage. Experiments and modeling efforts have focused on the effects of hydride formation and accumulation of irradiation defects. Key results include: determination of the influence of composition and defect structures on hydride formation; measurement of the electrochemical property differences between hydride and parent material for understanding and predicting corrosion resistance; in situ environmental transmission electron microscope observation of hydride formation; development of a predictive simulation for mechanical property changes as a function of irradiation dose; novel test method development for microtensile testing of ionirradiated material to simulate the effect of neutron irradiation on mechanical properties; and successful demonstration of an Idaho National Labs-based sample preparation and shipping method for subsequent Sandia-based analysis of post-reactor cladding.

  14. Inquiry based science education providing authentic experiences for the classroom

    OpenAIRE

    McLoughlin, Eilish; Finlayson, Odilla; Brady, Sarah

    2012-01-01

    The European Science and Technology in Action: Building Links with Industry, School and Home (ESTABLISH) is a four year (2010-2013) project funded by the European Commission's 7th Framework Programme for Science in Society. This project involves promotion and dissemination of inquiry-based teaching methods on a large scale in Europe, by provision of teacher education using materials and resources that include authentic problems informed by industry

  15. Biometric Authentication using Nonparametric Methods

    CERN Document Server

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy k-means classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based ...

  16. Improving Usability of Passphrase Authentication

    DEFF Research Database (Denmark)

    Nielsen, Glen; Vedel, Michael; Jensen, Christian D.

    2014-01-01

    The combination of user-names and passwords has become the predominant method of user authentication in computer systems. Most users have multiple accounts on different systems, which impose different constraints on the length and complexity of passwords that the user is allowed to select....... This is done to ensure an appropriate degree of security, but instead, it makes it difficult for users to remember their password, which results in passwords that are either insecure, but easy to remember, or written down on paper. In this paper we address the problem of usability in user authentication......, which accepts the most common typing mistakes. The proposed algorithm has been implemented in secure hardware and integrated into a standard Unix system. We present the design, implementation and preliminary evaluation of the developed passphrase authentication prototype....

  17. PERSON AUTHENTICATION USING MULTIPLE SENSOR DATA FUSION

    Directory of Open Access Journals (Sweden)

    S. Vasuhi

    2011-04-01

    Full Text Available This paper proposes a real-time system for face authentication, obtained through fusion of Infra Red (IR and visible images. In order to identify the unknown person authentication in highly secured areas, multiple algorithms are needed. The four well known algorithms for face recognition, Block Independent Component Analysis(BICA, Kalman Filtering(KF method, Discrete Cosine Transform(DCT and Orthogonal Locality Preserving Projections (OLPP are used to extract the features. If the data base size is very large and the features are not distinct then ambiguity will exists in face recognition. Hence more than one sensor is needed for critical and/or highly secured areas. This paper deals with multiple fusion methodology using weighted average and Fuzzy Logic. The visible sensor output depends on the environmental condition namely lighting conditions, illumination etc., to overcome this problem use histogram technique to choose appropriate algorithm. DCT and Kalman filtering are holistic approaches, BICA follows feature based approach and OLPP preserves the Euclidean structure of face space. These recognizers are capable of considering the problem of dimensionality reduction by eliminating redundant features and reducing the feature space. The system can handle variations like illumination, pose, orientation, occlusion, etc. up to a significant level. The integrated system overcomes the drawbacks of individual recognizers. The proposed system is aimed at increasing the accuracy of the person authentication system and at the same time reducing the limitations of individual algorithms. It is tested on real time database and the results are found to be 96% accurate.

  18. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    This paper examines the problem of providing a robust non-invasive authentication service for mobile users in a smart environment. We base our work on the persistent authentication model (PAISE), which relies on available sensors to track principals from the location where they authenticate, e.......g., through a smart card based access control system, to the location where the authentication is required by a location-based service. The PAISE model is extended with remote biometrics to prevent the decay of authentication confidence when authenticated users encounter and interact with other users in the...... environment. The result is a calm approach to authentication, where mobile users are transparently authenticated towards the system, which allows the provision of location-based services. The output of the remote biometrics are fused using error-rate-based fusion to solve a common problem that occurs in score...

  19. Introduction to Methods Demonstrations for Authentication

    International Nuclear Information System (INIS)

    During the Trilateral Initiative Technical Workshop on Authentication and Certification, PNNL will demonstrate some authentication technologies. This paper briefly describes the motivation for these demonstrations and provide background on them

  20. Final LDRD report : development of sample preparation methods for ChIPMA-based imaging mass spectrometry of tissue samples.

    Energy Technology Data Exchange (ETDEWEB)

    Maharrey, Sean P.; Highley, Aaron M.; Behrens, Richard, Jr.; Wiese-Smith, Deneille

    2007-12-01

    The objective of this short-term LDRD project was to acquire the tools needed to use our chemical imaging precision mass analyzer (ChIPMA) instrument to analyze tissue samples. This effort was an outgrowth of discussions with oncologists on the need to find the cellular origin of signals in mass spectra of serum samples, which provide biomarkers for ovarian cancer. The ultimate goal would be to collect chemical images of biopsy samples allowing the chemical images of diseased and nondiseased sections of a sample to be compared. The equipment needed to prepare tissue samples have been acquired and built. This equipment includes an cyro-ultramicrotome for preparing thin sections of samples and a coating unit. The coating unit uses an electrospray system to deposit small droplets of a UV-photo absorbing compound on the surface of the tissue samples. Both units are operational. The tissue sample must be coated with the organic compound to enable matrix assisted laser desorption/ionization (MALDI) and matrix enhanced secondary ion mass spectrometry (ME-SIMS) measurements with the ChIPMA instrument Initial plans to test the sample preparation using human tissue samples required development of administrative procedures beyond the scope of this LDRD. Hence, it was decided to make two types of measurements: (1) Testing the spatial resolution of ME-SIMS by preparing a substrate coated with a mixture of an organic matrix and a bio standard and etching a defined pattern in the coating using a liquid metal ion beam, and (2) preparing and imaging C. elegans worms. Difficulties arose in sectioning the C. elegans for analysis and funds and time to overcome these difficulties were not available in this project. The facilities are now available for preparing biological samples for analysis with the ChIPMA instrument. Some further investment of time and resources in sample preparation should make this a useful tool for chemical imaging applications.

  1. The Authentic Personality: A Theoretical and Empirical Conceptualization and the Development of the Authenticity Scale

    Science.gov (United States)

    Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen

    2008-01-01

    This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…

  2. Low-Altitude Airbursts and the Impact Threat - Final LDRD Report.

    Energy Technology Data Exchange (ETDEWEB)

    Boslough, Mark B.; Crawford, David A.

    2007-12-01

    The purpose of this nine-week project was to advance the understanding of low-altitude airbursts by developing the means to model them at extremely high resolution in order to span the scales of entry physics as well as blast wave and plume formation. Small asteroid impacts on Earth are a recognized hazard, but the full nature of the threat is still not well understood. We used shock physics codes to discover emergent phenomena associated with low-altitude airbursts such as the Siberian Tunguska event of 1908 and the Egyptian glass-forming event 29 million years ago. The planetary defense community is beginning to recognize the significant threat from such airbursts. Low-altitude airbursts are the only class of impacts that have a significant probability of occurring within a planning time horizon. There is roughly a 10% chance of a megaton-scale low-altitude airburst event in the next decade.The first part of this LDRD final project report is a preprint of our proceedings paper associated with the plenary presentation at the Hypervelocity Impact Society 2007 Symposium in Williamsburg, Virginia (International Journal of Impact Engineering, in press). The paper summarizes discoveries associated with a series of 2D axially-symmetric CTH simulations. The second part of the report contains slides from an invited presentation at the American Geophysical Union Fall 2007 meeting in San Francisco. The presentation summarizes the results of a series of 3D oblique impact simulations of the 1908 Tunguska explosion. Because of the brevity of this late-start project, the 3D results have not yet been written up for a peer-reviewed publication. We anticipate the opportunity to eventually run simulations that include the actual topography at Tunguska, at which time these results will be published.3

  3. Gradient-Drive Diffusion of Multi-Atom Molecules Through Macromolecules and Membranes: LDRD 96-0021 Close-Out Report

    Energy Technology Data Exchange (ETDEWEB)

    Ford, D.M.; Heffelfinger, G.S.; Martin, M.G.; Thompson, A.

    1998-12-01

    The goals of this Laboratory Directed Research and Development (LDRD) effort were to develop and prototype a new molecular simulation method and companion parallel algorithm able to model diffusion of multi-atom molecules through macromolecules under conditions of a chemical potential gradient. At the start of the project no such method existed, thus many important industrial and technological materials problems where gradient driven diffusion of multi-atom molecules is the predominant phenomenon were beyond the reach of molecular simulation (e.g. diffusion in polymers, a fundamental problem underlying polymer degradation in aging weapons).

  4. Authentic Montessori: The Teacher Makes the Difference

    Science.gov (United States)

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  5. 28 CFR 68.46 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Authenticity. 68.46 Section 68.46... ALIENS, UNFAIR IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.46 Authenticity. The authenticity of all documents submitted as proposed exhibits in advance of the hearing shall be deemed...

  6. Authenticity, Autonomy and Altruism: Keys for Transformation

    Science.gov (United States)

    Clarken, Rodney

    2011-01-01

    The value of authentic knowing, autonomous behavior and altruistic motivation is presented. Authenticity, autonomy and altruism are primary human capacities and keys for individual and collective transformation. Realizing the full development of these three basic potentialities can serve as goals and standards for well-being. Authenticity,…

  7. 29 CFR 18.50 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Authenticity. 18.50 Section 18.50 Labor Office of the Secretary of Labor RULES OF PRACTICE AND PROCEDURE FOR ADMINISTRATIVE HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES General § 18.50 Authenticity. The authenticity of all documents submitted as...

  8. Determination of authenticity of engraved scrimshaw

    Science.gov (United States)

    Ridley, Donald E.

    2000-03-01

    Scrimshaw is an occupational art form originated by, or indigenous to, whalemen, utilizing the hard by-products of the whale fishery, ivory, bone and baleen, in some cases combined with other found material. It is comprised of three types: 1) decorative, e.g. engraved or carved teeth or tusks; 2) utilitarian, e.g. tools and tool handles, and 3) a combination of these, e.g. busks, swifts an dippers. This paper is concerned with engraved scrimshaw, principally decorative, and in particular, determination of authenticity. The value of scrimshaw in general, and engraved scrimshaw in particular, has increased markedly in the last quarter century, encouraging forgery, thus making verification of authenticity of increasing importance. Two of the pioneers in the field of scientific detection of forgery of scrimshaw, or scrimshaw forensics, are Dr. Janet West of the Scott Polar Institute, Cambridge University, and Desmund T. Liddy of Australia. It is on their work that our project at the Kendall Whaling Museum is based. All of the methodologies discussed herein discussed herein are visual, the attributes visible to the unaided eye in many cases, augmented by low power stereo microscopy in others.

  9. Parallelizable and Authenticated Online Ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Luykx, Atul;

    2013-01-01

    cipher is a strong PRP. We then extend COPE to create COPA, the first parallelizable, online authenticated cipher with nonce-misuse resistance. COPA only requires two extra block cipher calls to provide integrity. The privacy and integrity of the scheme is proven secure assuming the underlying block...

  10. Authentic Instruction and Technology Literacy

    Science.gov (United States)

    Cydis, Susan

    2015-01-01

    Technology integration is an important aspect of student competence in the 21st century. The use of technology in teaching and learning is a valuable practice for supporting student learning and engagement. Modelling the pedagogical practices that integrate authentic, performance-based opportunities for technology integration was the focus of a…

  11. Literacy Cafe: Making Writing Authentic

    Science.gov (United States)

    Daniels, Erika

    2007-01-01

    The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…

  12. Authenticity in a Digital Environment.

    Science.gov (United States)

    Cullen, Charles T.; Hirtle, Peter B.; Levy, David; Lynch, Clifford A.; Rothenberg, Jeff

    On January 24, 2000, the Council on Library and Information Resources (CLIR) convened a group of experts from different domains of the information resources community to address the question, "What is an authentic digital object?" Five writers--an archivist, a digital library expert, a documentary editor and special collections librarian, an…

  13. The embodiment of authentic leadership.

    Science.gov (United States)

    Waite, Roberta; McKinney, Nicole; Smith-Glasgow, Mary Ellen; Meloy, Faye A

    2014-01-01

    Development of student leadership capacity and efficacy is critical to the nursing profession, and vital to this process is a strong foundation in critical thinking that includes a depth of understanding of self (i.e., authentic leadership development). This article will (a) present a theoretical overview of authentic leadership as compared with other popular leadership theories, (b) provide an overview of development/implementation of an authentic leadership course, the first in a series of six one-credit courses as an integral component of the Macy Undergraduate Leadership Fellows Program for upper-level nursing students, and (c) discuss related implications for nursing education. Findings from an investigator-developed quantitative pre-post survey and qualitative evaluation questions are provided. Student feedback regarding the comprehensive nature of the course was extremely positive and affirmed the value of introspection associated with authentic leadership in ongoing personal and professional development. Critical pedagogy and action-oriented learning strategies also proved beneficial to student engagement. PMID:25150413

  14. Authenticity and Lesbian Health Educators

    Science.gov (United States)

    Weiler-Timmins, Rebecca A.

    2011-01-01

    This qualitative study used narrative inquiry to explore how lesbian health educators navigate authenticity in a heteronormative higher education setting. The study was grounded in a lesbian standpoint pedagogical viewpoint, which provided a lens with which to view the nine participants' experiences. Of particular interest was how the educators in…

  15. Authenticity or School-only?

    DEFF Research Database (Denmark)

    Fougt, Simon Skov

    Challenging the apparent distinction among educational researchers between ‘authenticity’ outside schools and ‘school-only’ inside schools, this paper investigates the concept of meaningfulness from different perspectives with a focus on formal learning in schools, as it states that teaching...... and learning inside school also can be authentic....

  16. Chemiresistor microsensors for in-situ monitoring of volatile organic compounds : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Michael Loren; Hughes, Robert Clark; Kooser, Ara S.; McGrath, Lucas K.; Ho, Clifford Kuofei; Wright, Jerome L.; Davis, Chad Edward

    2003-09-01

    This report provides a summary of the three-year LDRD (Laboratory Directed Research and Development) project aimed at developing microchemical sensors for continuous, in-situ monitoring of volatile organic compounds. A chemiresistor sensor array was integrated with a unique, waterproof housing that allows the sensors to be operated in a variety of media including air, soil, and water. Numerous tests were performed to evaluate and improve the sensitivity, stability, and discriminatory capabilities of the chemiresistors. Field tests were conducted in California, Nevada, and New Mexico to further test and develop the sensors in actual environments within integrated monitoring systems. The field tests addressed issues regarding data acquisition, telemetry, power requirements, data processing, and other engineering requirements. Significant advances were made in the areas of polymer optimization, packaging, data analysis, discrimination, design, and information dissemination (e.g., real-time web posting of data; see www.sandia.gov/sensor). This project has stimulated significant interest among commercial and academic institutions. A CRADA (Cooperative Research and Development Agreement) was initiated in FY03 to investigate manufacturing methods, and a Work for Others contract was established between Sandia and Edwards Air Force Base for FY02-FY04. Funding was also obtained from DOE as part of their Advanced Monitoring Systems Initiative program from FY01 to FY03, and a DOE EMSP contract was awarded jointly to Sandia and INEEL for FY04-FY06. Contracts were also established for collaborative research with Brigham Young University to further evaluate, understand, and improve the performance of the chemiresistor sensors.

  17. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  18. From Idea to Innovation: The Role of LDRD Investments in Sandia's Recent Successful B61 Experiments.

    Energy Technology Data Exchange (ETDEWEB)

    Arrowsmith, Marie Danielle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    The Laboratory Directed Research and Development (LDRD) program, authorized by U.S. Congress in 1991, enables Department of Energy (DOE) laboratories to devote a small portion of their research funding to high-risk and potentially high-payoff research. Because it is high-risk, LDRD-supported research may not lead to immediate mission impacts; however, many successes at DOE labs can be traced back to investments in LDRD. LDRD investments have a history of enabling significant payoffs for long-running DOE and NNSA missions and for providing anticipatory new technologies that ultimately become critical to future missions. Many of Sandia National Laboratories’ successes can be traced back to investments in LDRD. Capabilities from three LDRDs were critical to recent tests of the B61-12 gravity bomb—tests that would previously have only been performed experimentally.

  19. Authentication Method for Privacy Protection in Smart Grid Environment

    Directory of Open Access Journals (Sweden)

    Do-Eun Cho

    2014-01-01

    Full Text Available Recently, the interest in green energy is increasing as a means to resolve problems including the exhaustion of the energy source and, effective management of energy through the convergence of various fields. Therefore, the projects of smart grid which is called intelligent electrical grid for the accomplishment of low carbon green growth are being carried out in a rush. However, as the IT is centered upon the electrical grid, the shortage of IT also appears in smart grid and the complexity of convergence is aggravating the problem. Also, various personal information and payment information within the smart grid are gradually becoming big data and target for external invasion and attack; thus, there is increase in concerns for this matter. The purpose of this study is to analyze the security vulnerabilities and security requirement within smart grid and the authentication and access control method for privacy protection within home network. Therefore, we propose a secure access authentication and remote control method for user’s home device within home network environment, and we present their security analysis. The proposed access authentication method blocks the unauthorized external access and enables secure remote access to home network and its devices with a secure message authentication protocol.

  20. Network discovery, characterization, and prediction : a grand challenge LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Kegelmeyer, W. Philip, Jr.

    2010-11-01

    This report is the final summation of Sandia's Grand Challenge LDRD project No.119351, 'Network Discovery, Characterization and Prediction' (the 'NGC') which ran from FY08 to FY10. The aim of the NGC, in a nutshell, was to research, develop, and evaluate relevant analysis capabilities that address adversarial networks. Unlike some Grand Challenge efforts, that ambition created cultural subgoals, as well as technical and programmatic ones, as the insistence on 'relevancy' required that the Sandia informatics research communities and the analyst user communities come to appreciate each others needs and capabilities in a very deep and concrete way. The NGC generated a number of technical, programmatic, and cultural advances, detailed in this report. There were new algorithmic insights and research that resulted in fifty-three refereed publications and presentations; this report concludes with an abstract-annotated bibliography pointing to them all. The NGC generated three substantial prototypes that not only achieved their intended goals of testing our algorithmic integration, but which also served as vehicles for customer education and program development. The NGC, as intended, has catalyzed future work in this domain; by the end it had already brought in, in new funding, as much funding as had been invested in it. Finally, the NGC knit together previously disparate research staff and user expertise in a fashion that not only addressed our immediate research goals, but which promises to have created an enduring cultural legacy of mutual understanding, in service of Sandia's national security responsibilities in cybersecurity and counter proliferation.

  1. Federated Authentication and Authorisation in the Social Science Domain

    OpenAIRE

    Watt, John P.; Sinnott, Richard O; Inman, George; Chadwick, David W

    2011-01-01

    The use of Shibboleth as a mechanism for implementing federated authentication is commonplace in many countries. The ability of Shibboleth to transmit extra information about a user, including licenses, roles and other attributes, is not exploited for many reasons, mainly because institional Identity Providers (IdPs) are not maintainable sources of fine-grained authorisation information. The JISC-funded Shintau project has produced an extension to the Shibbole...

  2. Using Documentary Film for Authentic Representation of Phenomenological Research

    OpenAIRE

    Gina Haines; Christopher Klopper

    2015-01-01

    My search to authentically and visually represent a group of workers' lived experiences and -knowledge of their often interrelated personal and work-related strengths mediated by those experiences saw me combining a written research study with a visual, cinematic documentary resulting in the production of ¡°Project Happiness: The Lived Experience¡±. This paper overviews the methodological considerations involved when using a visual form of data presentation, specifically in terms of data coll...

  3. Providing Authentication & Authorization Mechanisms for Active Service Charging

    OpenAIRE

    Bagnulo, Marcelo; Alarcos, Bernardo; Calderón, María; Marifeli, Sedano

    2002-01-01

    Active network technology enables fast deployment of new network services tailored to the specific needs of end users, among others features. Nevertheless proper charging for these new added value services require suitable authentication and authorization mechanisms. In this article we describe a security architecture for SARA (Simple Active Router-Assistant) architecture, an active network platform deployed in the context of the IST-GCAP project. The proposed solution provides all the requir...

  4. ANALYTICAL AUTHENTICATION OF ORGANIC FOODS

    OpenAIRE

    Simeone, F.C.; Ruth, Saskia

    2014-01-01

    A growing consumers’ awareness of human health’s risks, environmental fragility, and animal welfare has boosted organic production of foods. Due to their high production costs, however, organic products tend to retail at a higher prices than their non-organic counterparts. This premium price exposes organic products to fraud and counterfeiting, which, in addition to administrative controls, call for confirmatory assessments of the organic identity. Authentication of organic products is a comp...

  5. Authentic leadership in school organizations

    OpenAIRE

    Bento, António; Ribeiro, Maria Isabel

    2013-01-01

    This research study, descriptive and exploratory in nature, had as objectives to know the perceptions of the teacher/students of a graduation course in Educational Sciences about their leaders, measured and evaluated through the Authentic Leadership Questionnaire (ALQ) and to verify if existed differences between the public and private school organizations in the four characteristics defined for the ALQ: a) self-conscious; b) transparency; c) moral/ethics; d) balanced processing. A non-proba...

  6. Graphical Passwords Authentication: A Survey

    OpenAIRE

    Nikhil Tarkeshwar Ambade; Prof. Dr. Arati Dixit

    2015-01-01

    In typically text-based passwords, well known users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. Reusing same or easy passwords across different accounts help to memorability, but decrease in security. Text passwords are the most popular user authentication method, but have security and usability problems. Alternatives such as biometric systems and tokens have their own drawbacks Graphical pass...

  7. Food authentication by molecular methods

    OpenAIRE

    de Oliveira, B.; Mafra, I; Costa, J; Amaral, J S; Faria, M.; Fernandes, T.; Soares, S.

    2011-01-01

    Quality and authenticity evaluation of foods encompasses many issues, such as the entire or partial fraudulent substitution of higher commercial value constituents by others with lower value and the presence of undeclared constituents/ingredients. To protect consumers from misleading labeling, regulations issued across the world have implemented specific guidelines and listed particular foods that sh ould be declared on the label. Particularly in the case of genetically modi...

  8. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Bork Petersen, Franziska

    2013-01-01

    In this thesis I investigate what ‘authenticity’ means in a contemporary popular context and how it is used in the staging of bodies. Furthermore, I analyse works of dance and fashion from the past fifteen years with a focus on their strategies of challenging the notion of ‘bodily authenticity......’. When ‘an authentic body’ is sought by participants or demanded by judges and ‘experts’ on popular makeover and casting TV shows such as The Swan (Fox 2004) or Germany’s Next Topmodel (Pro 7 2006-present) this refers to the physical visualisation of what is perceived/presented as the participants ‘inner...... self’. I scrutinise the staging techniques and the codes of appearance that bodies have to comply with in order to be deemed ‘authentic’ on the shows. To define them and place them in the history of the idea of ‘bodily authenticity’, I complement my study with an outline of how ‘authenticity...

  9. An Examination of Career Indecision and Application to Dispositional Authenticity

    Science.gov (United States)

    White, Nathan J.; Tracey, Terence J. G.

    2011-01-01

    Authenticity has been viewed as a dimension related to life satisfaction, but we propose that authenticity is related to career outcomes. In this study, we examined the relation between authenticity and career indecision. Authenticity was assessed by the Authenticity Scale and it was found to be moderately related to different indices of career…

  10. An Authentication Framework for Nomadic Users

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    . This is probably best explained by considering password based authentication, where a user is actively involved in the process. If the time required to log in to an account is considered too high, users tend to leave their terminals logged in throughout the day and share their account with other users...... defeating the obstacle by leaving terminals logged in or choosing short and easy to type passwords. Therefore, a password based authentication mechanism, which is quite simple and secure in personal computing, has become too cumbersome for nomadic users, which means that other means of authentication must...... be developed for nomadic users. In this paper, we focus on usability of authentication for nomadic users in a ubiquitous computing environment. We identify requirements for authentication of nomadic users and propose an authentication framework for this class of users. A prototype of the proposed...

  11. staging constructions of authenticity in organizational change

    DEFF Research Database (Denmark)

    Dupret, Katia

    2015-01-01

    Authenticity in organizations has gained increased focus in recent years. Authentic management and leadership are ways to motivate and make sustainable changes in the organization. But authenticity is also strategically worked with in order to serve social and political functions...... that are emotionally charged. Through a socio-material perspective this paper seeks to explore how change processes in organizations challenges the idea of authentic leadership as a merely individual ability or personality trait and suggest that the authentic leader is distributed into the practices of change....... The paper explores how staged organizational change where authentic role-play and scripts from everyday life combined with meta-reflection and feedback construct new forms of reflection where its ethical side-effects should be discussed....

  12. Identity-based authentication protocol for grid

    Institute of Scientific and Technical Information of China (English)

    Li Hon; Sun Shixin; Yang Homiao

    2008-01-01

    Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authentication process is very complicated,and therefore,the grid user is in a heavily loaded point both in computation and in communication.Based on identity-based architecture for grid(IBAG)and corre-sponding encryption and signature schemes,an identity-based authentication protocol for grid is proposed.Being certificate-free,the authentication protocol aligns well with the demands of grid computing.Through simulation testing,it is seen that the authentication protocol is more lightweight and efficient than SAP,especially the more lightweight user side.This contributes to the larger grid scalability.

  13. Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity.

    NARCIS (Netherlands)

    Gulikers, Judith; Bastiaens, Theo; Kirschner, Paul A.; Kester, Liesbeth

    2008-01-01

    Gulikers, J. T. M., Bastiaens, Th. J., Kirschner, P. A., & Kester, L. (2008). Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity. Journal of Vocational Education and Training, 60(4)

  14. Obfuscated authentication systems, devices, and methods

    Science.gov (United States)

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  15. Quantum Key Distribution Protocol with User Authentication

    CERN Document Server

    Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

    2005-01-01

    We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

  16. Heidegger's Concept of Authenticity and Sport Experience

    OpenAIRE

    HIGUCHI Satoshi

    1991-01-01

    Carolyne Thomas regarded the aesthetic experience in sport as authentic in the meaning from Martin Heidegger's Being and Time. To examine the adequacy of the interpretation, the comparison between Thomas' concept of authenticity and the Heidegger's was attempted in this paper. Thomas' concept of authenticity is opposite to accidentality. It is also positive realization of a self, positive movement toward a capable being, a unique self, a unique experience, and honesty in a sport situation...

  17. Heidegger's Concept of Authenticity and Sport Experience

    OpenAIRE

    HIGUCHI Satoshi

    1991-01-01

    Carolyne Thomas regarded the aesthetic experience in sport as authentic in the meaning from Martin Heidegger's Being and Time. To examine the adequacy of the interpretation, the comparison between Thomas' concept of authenticity and the Heidegger's was attempted in this paper.Thomas' concept of authenticity is opposite to accidentality. It is also positive realization of a self, positive movement toward a capable being, a unique self, a unique experience, and honesty in a sport situation. Aut...

  18. Negotiating authenticity in consuming the hyperreal

    OpenAIRE

    Kuronen, Noora

    2013-01-01

    OBJECTIVES OF THE STUDY: This study seeks to further our understanding of how authenticity is negotiated and produced in online discourses; what forms of negotiating authenticity can be identified. The idea is not to produce absolute answers, but to extent our understanding of the concept of authenticity in the culture increasingly based on simulation. METHODOLOGY/APPROACH: The research approach used in this study is Consumer Culture Theory (CCT). CCT studies consumption choices a...

  19. Laying Claim to Authenticity: Five Anthropological Dilemmas

    OpenAIRE

    THEODOSSOPOULOS, Dimitrios

    2013-01-01

    The introduction to this special collection examines five dilemmas about the use of the concept of authenticity in anthropological analysis. These relate to 1) the expectation of a singular authenticity “deep” in oneself or beyond the surface of social reality, 2) the contradictions emerging from the opposition of authenticity with inauthenticity, 3) the irony of the notion of invention of tradition (which deconstructs, but also offends), 4) the criteria involved in the auth...

  20. The Duality of Authenticity in ELT

    OpenAIRE

    Joy, J. John Love

    2011-01-01

    Purpose: This study aims to find out the dual-perspectives on authenticity in English language teaching.Problem: The concept of authenticity has generated quite a ripple in ESL/EFL classrooms. Contrasting perspectives have emerged over the years in reaction to this concept. Some regard authenticity as an inevitable part of teaching as it provides students with opportunities to interact with reality in the classroom itself, whereas, some others consider it an ambitious construct and suggest ap...

  1. Authentic leadership: What's in the construct?

    OpenAIRE

    Endrissat, Nada; Müller, Werner R.

    2006-01-01

    In a qualitative leadership study conducted in the German-speaking part of Switzerland the quest to be oneself i.e., to be authentic was found to be central for leadership. We will present the results in detail and highlight the difficulties leaders experience when trying to be authentic in their daily interaction. By providing a contextually rich description of authentic leadership from practitioners' point of views, our study contributes to the current endeavor to understand and define auth...

  2. Quantum Secure Direct Communication Based on Authentication

    International Nuclear Information System (INIS)

    We propose two schemes of quantum secure direct communication (QSDC) combined ideas of user authentication [Phys. Rev. A 73 (2006) 042305] and direct communication with dense coding [Phys. Rev. A. 68 (2003) 042317]. In these protocols, the privacy of authentication keys and the properties of the EPR pairs not only ensure the realization of identity authentication but also further improve the security of communication, and no secret messages are leaked even if the messages were broken. (general)

  3. The Ideal Self and State Authenticity

    OpenAIRE

    Power, Katherine Emilia

    2011-01-01

    The current study investigated the effect of priming people with alignment or distance to ideal self attributes on their feelings of authenticity. The effect of priming participants with self-irrelevant alignment or distance to ideal attributes was also explored, to test whether these manipulations might respectively increase or lower state authenticity, or whether state authenticity would only be affected by self-relevant priming. As expected, discrepant conditions were associated with lower...

  4. Quantum Secure Direct Communication Based on Authentication

    Institute of Scientific and Technical Information of China (English)

    WANG Min-Jie; PAN Wei

    2008-01-01

    We propose two schemes of quantum secure direct communication (QSDC) combined ideas of user authentication [Phys. Rev. A 73 (2006) 042305] and direct communication with dense coding [Phys. Rev. A. 68 (2003) 042317]. In these protocols, the privacy of authentication keys and the properties of the EPR pairs not only ensure the realization of identity authentication but also further improve the security of communication, and no secret messages are leaked even if the messages were broken.

  5. Authenticated tree parity machine key exchange

    OpenAIRE

    Volkmer, Markus; Schaumburg, André

    2004-01-01

    The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys. Adding an authentication via hashing e.g. is straightforward but with no relation to Neural Cryptography. We consequently formulate an authenticated key exchange within this concept. Another alternative, integrating a Zero-Knowledge protocol in...

  6. Food Authenticity, Technology and Consumer Acceptance

    OpenAIRE

    Hobbs, Jill E.; McDonald, Jillian; Zhang, Jing

    2012-01-01

    Traceability and authenticity issues have gained increasing prominence in food markets and create both opportunities and challenges for the food industry in providing credible information to consumers. Internal molecular tagging is an emerging technology with the potential to deliver traceability and authenticity assurances. A key question for the food industry in adopting new technologies is consumer acceptance. This paper explores consumer attitudes toward traceability and authenticity and ...

  7. Noncontact surface thermometry for microsystems: LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Abel, Mark (Georgia Institute of Technology, Atlanta, GA); Beecham, Thomas (Georgia Institute of Technology, Atlanta, GA); Graham, Samuel (Georgia Institute of Technology, Atlanta, GA); Kearney, Sean Patrick; Serrano, Justin Raymond; Phinney, Leslie Mary

    2006-10-01

    We describe a Laboratory Directed Research and Development (LDRD) effort to develop and apply laser-based thermometry diagnostics for obtaining spatially resolved temperature maps on working microelectromechanical systems (MEMS). The goal of the effort was to cultivate diagnostic approaches that could adequately resolve the extremely fine MEMS device features, required no modifications to MEMS device design, and which did not perturb the delicate operation of these extremely small devices. Two optical diagnostics were used in this study: microscale Raman spectroscopy and microscale thermoreflectance. Both methods use a low-energy, nonperturbing probe laser beam, whose arbitrary wavelength can be selected for a diffraction-limited focus that meets the need for micron-scale spatial resolution. Raman is exploited most frequently, as this technique provides a simple and unambiguous measure of the absolute device temperature for most any MEMS semiconductor or insulator material under steady state operation. Temperatures are obtained from the spectral position and width of readily isolated peaks in the measured Raman spectra with a maximum uncertainty near {+-}10 K and a spatial resolution of about 1 micron. Application of the Raman technique is demonstrated for V-shaped and flexure-style polycrystalline silicon electrothermal actuators, and for a GaN high-electron-mobility transistor. The potential of the Raman technique for simultaneous measurement of temperature and in-plane stress in silicon MEMS is also demonstrated and future Raman-variant diagnostics for ultra spatio-temporal resolution probing are discussed. Microscale thermoreflectance has been developed as a complement for the primary Raman diagnostic. Thermoreflectance exploits the small-but-measurable temperature dependence of surface optical reflectivity for diagnostic purposes. The temperature-dependent reflectance behavior of bulk silicon, SUMMiT-V polycrystalline silicon films and metal surfaces is

  8. Multifactor Authentication: Its Time Has Come

    Directory of Open Access Journals (Sweden)

    Jim Reno

    2013-08-01

    Full Text Available Transactions of any value must be authenticated to help prevent online crime. Even seemingly innocent interactions, such as social media postings, can have serious consequences if used fraudulently. A key problem in modern online interactions is establishing the identity of the user without alienating the user. Historically, almost all online authentications have been implemented using simple passwords, but increasingly these methods are under attack. Multifactor authentication requires the presentation of two or more of the three authentication factor types: “What you know”, “What you have”, and “What you are”. After presentation, each factor must be validated by the other party for authentication to occur. Multifactor authentication is a potential solution to the authentication problem, and it is beginning to be implemented at websites operated by well-known companies. This article surveys the different mechanisms used to implement multifactor authentication. How a site chooses to implement multifactor authentication affects security as well as the overall user experience.

  9. ARE AUTHENTIC LEADERS SATISFIED WITH THEIR JOB?

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2016-06-01

    Full Text Available A crisis in management has led to the appearance of Authentic leadership. The aim of this work is to determine the characteristics of Authentic leadership in educational institutions and to respond to the question as to whether authentic leaders are satisfied with their job. The third aim is to determine differences among the researched regions. The sample included 227 randomly selected directors from primary and secondary schools in Serbia, Montenegro and the Republika Srpska. The research used an ALQ questionnaire for the estimation of leadership behaviour. Descriptions for the results prediction and multiple linear regressions were used. A multivariance analysis of variance was used to compare the groups. The research results showed that every fourth director is an authentic leader. Authentic leadership has a significant influence on job satisfaction through two aspects: internalised perspective and balanced processing. There are no differences in Authentic leadership in the researched areas. The results could be useful for educational institutions in countries where the research was conducted. Further research could be carried out in other countries while cultural differences should be taken into account. One limiting factor consists of the fact that the analysed data are obtained only from school directors. Leaders of educational institutions should provide management through the development of their own authenticity and the authenticity of their followers. The characteristics of Authentic leadership were reviewed and tested practically in the West-Balkan environment.

  10. A compression tolerant scheme for image authentication

    Institute of Scientific and Technical Information of China (English)

    刘宝锋; 张文军; 余松煜

    2004-01-01

    Image authentication techniques used to protect the recipients against malicious forgery. In this paper, we propose a new image authentication technique based on digital signature. The authentication is verified by comparing the features of the each block in tested image with the corresponding features of the block recorded in the digital signature. The proposed authentication scheme is capable of distinguishing visible but non-malicious changes due to common processing operations from malicious changes. At last our experimental results show that the proposed scheme is not only efficient to protect integrity of image, but also with low computation,which are feasible for practical applications.

  11. High-efficiency high-energy Ka source for the critically-required maximum illumination of x-ray optics on Z using Z-petawatt-driven laser-breakout-afterburner accelerated ultrarelativistic electrons LDRD .

    Energy Technology Data Exchange (ETDEWEB)

    Sefkow, Adam B.; Bennett, Guy R.

    2010-09-01

    Under the auspices of the Science of Extreme Environments LDRD program, a <2 year theoretical- and computational-physics study was performed (LDRD Project 130805) by Guy R Bennett (formally in Center-01600) and Adam B. Sefkow (Center-01600): To investigate novel target designs by which a short-pulse, PW-class beam could create a brighter K{alpha} x-ray source than by simple, direct-laser-irradiation of a flat foil; Direct-Foil-Irradiation (DFI). The computational studies - which are still ongoing at this writing - were performed primarily on the RedStorm supercomputer at Sandia National Laboratories Albuquerque site. The motivation for a higher efficiency K{alpha} emitter was very clear: as the backlighter flux for any x-ray imaging technique on the Z accelerator increases, the signal-to-noise and signal-to-background ratios improve. This ultimately allows the imaging system to reach its full quantitative potential as a diagnostic. Depending on the particular application/experiment this would imply, for example, that the system would have reached its full design spatial resolution and thus the capability to see features that might otherwise be indiscernible with a traditional DFI-like x-ray source. This LDRD began FY09 and ended FY10.

  12. Laboratory Directed Research and Development (LDRD) on Mono-uranium Nitride Fuel Development for SSTAR and Space Applications

    Energy Technology Data Exchange (ETDEWEB)

    Choi, J; Ebbinghaus, B; Meiers, T; Ahn, J

    2006-02-09

    The US National Energy Policy of 2001 advocated the development of advanced fuel and fuel cycle technologies that are cleaner, more efficient, less waste-intensive, and more proliferation resistant. The need for advanced fuel development is emphasized in on-going DOE-supported programs, e.g., Global Nuclear Energy Initiative (GNEI), Advanced Fuel Cycle Initiative (AFCI), and GEN-IV Technology Development. The Directorates of Energy & Environment (E&E) and Chemistry & Material Sciences (C&MS) at Lawrence Livermore National Laboratory (LLNL) are interested in advanced fuel research and manufacturing using its multi-disciplinary capability and facilities to support a design concept of a small, secure, transportable, and autonomous reactor (SSTAR). The E&E and C&MS Directorates co-sponsored this Laboratory Directed Research & Development (LDRD) Project on Mono-Uranium Nitride Fuel Development for SSTAR and Space Applications. In fact, three out of the six GEN-IV reactor concepts consider using the nitride-based fuel, as shown in Table 1. SSTAR is a liquid-metal cooled, fast reactor. It uses nitride fuel in a sealed reactor vessel that could be shipped to the user and returned to the supplier having never been opened in its long operating lifetime. This sealed reactor concept envisions no fuel refueling nor on-site storage of spent fuel, and as a result, can greatly enhance proliferation resistance. However, the requirement for a sealed, long-life core imposes great challenges to research and development of the nitride fuel and its cladding. Cladding is an important interface between the fuel and coolant and a barrier to prevent fission gas release during normal and accidental conditions. In fabricating the nitride fuel rods and assemblies, the cladding material should be selected based on its the coolant-side corrosion properties, the chemical/physical interaction with the nitride fuel, as well as their thermal and neutronic properties. The US NASA space reactor, the

  13. E-Labs - Learning with Authentic Data

    Energy Technology Data Exchange (ETDEWEB)

    Bardeen, Marjorie G. [Fermilab; Wayne, Mitchell [Notre Dame U.

    2016-01-01

    the success teachers have had providing an opportunity for students to: • Organize and conduct authentic research. • Experience the environment of scientific collaborations. • Possibly make real contributions to a burgeoning scientific field. We've created projects that are problem-based, student driven and technology dependent. Students reach beyond classroom walls to explore data with other students and experts and share results, publishing original work to a worldwide audience. Students can discover and extend the research of other students, modeling the processes of modern, large-scale research projects. From start to finish e-Labs are student-led, teacher-guided projects. Students need only a Web browser to access computing techniques employed by professional researchers. A Project Map with milestones allows students to set the research plan rather than follow a step-by-step process common in other online projects. Most importantly, e-Labs build the learning experience around the students' own questions and let them use the very tools that scientists use. Students contribute to and access shared data, most derived from professional research databases. They use common analysis tools, store their work and use metadata to discover, replicate and confirm the research of others. This is where real scientific collaboration begins. Using online tools, students correspond with other research groups, post comments and questions, prepare summary reports, and in general participate in the part of scientific research that is often left out of classroom experiments. Teaching tools such as student and teacher logbooks, pre- and post-tests and an assessment rubric aligned with learner outcomes help teachers guide student work. Constraints on interface designs and administrative tools such as registration databases give teachers the "one-stop-shopping" they seek for multiple e-Labs. Teaching and administrative tools also allow us to track usage and assess the

  14. Bluetooth-based authentication system for ambient intelligence

    Institute of Scientific and Technical Information of China (English)

    Jian HE; Hui LI; Yong ZHANG; Zhang-qin HUANG

    2008-01-01

    According to the requirement of natural human-computer interaction for Ambient Intelligence (AmI), a Bluetooth-based authentication technique is provided. An authentication network combining advantages of Bluetooth ad hoc network with the Ethernet is introduced first in detail. Then we propose a Bluetooth badge for storing the user's identification information. Finally, the authentication system based on Bluetooth badge and authentication network is introduced. It is demonstrated experimentally that the Bluetooth-based authentication technique can authenticate the user automatically.

  15. Reality versus Authenticity: Mapping the Scaffolding Needs for Teaching Intellectual Skills for Working in Television

    Science.gov (United States)

    McKee, Alan

    2007-01-01

    A number of elements of scaffolding are identified that contribute to the operationalization of real world video production projects as authentic learning environments in which students can learn the intellectual television production skills necessary for working in the television industry. Three key elements are identified. Firstly projects must…

  16. Authentic Learning and Alien Worlds

    Science.gov (United States)

    Watt, Sara D.; Watt, Keith; Gleim, Brian

    2015-01-01

    Glendale Community College has developed a laboratory course and observing program which provides non-science majors with opportunities to perform authentic science in a community college setting. The program is designed around experiential learning which allows students to meaningfully construct concepts within contexts that involve real-world problems that are relevant to the learner. Students learn observational astronomy and data analysis techniques by observing exoplanet transits using 8-inch Celestron telescopes. The exoplanet data gathered and analyzed by the students is contributed to the exoplanet database. This poster presents an overview of the program and highlights early educational results.

  17. Authentic Moral Conflicts and Students' Moral Development

    Science.gov (United States)

    Fu, Wei-li

    2006-01-01

    This research deals with the different psychological processes people undergo when they experience firsthand authentic moral conflicts. It also discusses the value of authentic moral conflicts in students' moral development, and reasons for the ineffectiveness of moral education in China. The main reason for the unsatisfactory effects of moral…

  18. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...... authentication goals, the correctness requirements, can be derived from the binding sequence....

  19. Entity Authentication:Analysis using Structured Intuition

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    In this paper, we propose a new method for the analysis that uses intuition of the analyst in a structured way. First we define entity authentication in terms of fine level authentication goals (FLAGs). Then we use some relevant structures in protocol narrations and use them to justify FLAGs for...

  20. Aggregated Authentication (AMAC) Using Universal Hash Functions

    Science.gov (United States)

    Znaidi, Wassim; Minier, Marine; Lauradoux, Cédric

    Aggregation is a very important issue to reduce the energy consumption in Wireless Sensors Networks (WSNs). There is currently a lack of cryptographic primitives for authentication of aggregated data. The theoretical background for Aggregated Message Authentication Codes (AMACs) has been proposed by Chan and Castelluccia at ISIT 08.

  1. Wikis as Platforms for Authentic Assessment

    Science.gov (United States)

    Eddy, Pamela L.; Lawrence, April

    2013-01-01

    Calls for accountability focus attention on assessment of student learning. Authentic assessment involves evaluating student learning as students perform real world tasks. We present a four-stage conceptual framework for authentic assessment. We argue first that evaluation is a process rather than a static one-time event. Second, authentic…

  2. Authentic Interdisciplinary Instruction: Raising the Bar

    Science.gov (United States)

    Mohnsen, Bonnie

    2011-01-01

    This article addressed the need for authentic interdisciplinary instruction. Authentic interdisciplinary instruction is defined as a learning activity that simultaneously improves student performance related to grade-level standards in two or more disciplines (e.g., science and physical education). The process described for creating authentic…

  3. Efficient Quantum Secure Direct Communication with Authentication

    International Nuclear Information System (INIS)

    Two protocols of quantum direct communication with authentication [Phys. Rev. A 73 (2006) 042305] were recently indicated to be insecure against the authenticator Trent attacks [Phys. Rev. A 75 (2007) 026301]. We present two efficient protocols by using four Pauli operations, which are secure against inner Trent attacks as well as outer Eve attacks. Finally we generalize them to multiparty quantum direction communication. (general)

  4. Teacher Authenticity: A Theoretical and Empirical Investigation

    Science.gov (United States)

    Akoury, Paul N.

    2013-01-01

    This study builds on a small, under-acknowledged body of educational works that speak to the problem of an overly technical focus on teaching, which negates a more authentic consideration of what it means to teach, including an exploration of the spiritual and moral dimensions. A need for educational change and the teacher's authentic way of…

  5. Research on Secure Authentication Mechanism of Grid

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Based on the analysis on the security mechanism of grid, this paper discusses the advantages of latest techniques of grid security, and presents a secure authentication scheme of grid based on elliptic curve cryptosystem (ECC). The secure authentication scheme may provide reference value for the further application of grid.

  6. Difference packing arrays and systematic authentication codes

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    In this paper, a type of combinatorial design (called difference packing array)is proposed and used to give a construction of systematic authentication codes. Taking advantage of this construction, some new series of systematic authentication codes are obtainable in terms of existing difference packing arrays.

  7. Making it Real: Authenticity, Process and Pedagogy

    Science.gov (United States)

    Badger, Richard; MacDonald, Malcolm

    2010-01-01

    Authenticity has been a part of the intellectual resources of language teaching since the 1890s but its precise meaning and implications are contested. This commentary argues for a view of authenticity which recognizes the limits of the concept as a guide for pedagogic practice and acknowledges the fact that texts are processes rather than…

  8. On the fly finger knuckle print authentication

    Science.gov (United States)

    Abe, Narishige; Shinzaki, Takashi

    2014-05-01

    Finger knuckle print authentication has been researched not only as a supplemental authentication modality to fingerprint recognition but also as a method for logging into a PC or entering a building. However, in previous works, some specific devices were necessary to capture a finger knuckle print and users had to keep their fingers perfectly still to capture their finger knuckle. In this paper, we propose a new on the fly finger knuckle print authentication system using a general web camera. In our proposed authentication system, users can input their finger knuckle prints without needing their hand to remain motionless during image capture. We also evaluate the authentication accuracy of the proposed system, achieving an 7% EER under best conditions.

  9. Extensible Authentication Protocol Overview and Its Applications

    Science.gov (United States)

    Youm, Heung Youl

    The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple authentication mechanisms [38] between a peer and an authentication server in a data communication network. EAP is used as a useful tool for enabling user authentication and distribution of session keys. There are numerous EAP methods that have been developed by global SDOs such as IETF, IEEE, ITU-T, and 3GPP. In this paper, we analyze the most widely deployed EAP methods ranging from the EAP-TLS [27] to the EAP-PSK [25]. In addition, we derive the security requirements of EAP methods meet, evaluate the typical EAP methods in terms of the security requirements, and discuss the features of the existing widely-deployed EAP methods. In addition, we identify two typical use cases for the EAP methods. Finally, recent global standardization activities in this area are reviewed.

  10. Authentication in the context of international safeguards

    International Nuclear Information System (INIS)

    The International atomic Energy Agency held its first Advisory Group meeting on the subject of authentication in 1981. This meeting concentrated on the application of authentication to in-plant Non-Destructive Assay equipment supplied by the Facility Operator/State. In the decade since this meeting, a considerable amount of interest has developed over the use of authentication technology as a vital element of effective International Safeguards. Attendant with this interest, confusion has developed over the meaning and the need for the application of the technology as it exists today, and it may exist in the future. This paper addresses the subject of authentication, with emphasis on its basic definition and the applications of authentication technology in International Safeguards

  11. Combined Analysis of Stable Isotope, (1)H NMR, and Fatty Acid To Verify Sesame Oil Authenticity.

    Science.gov (United States)

    Kim, Jeongeun; Jin, Gyungsu; Lee, Yunhee; Chun, Hyang Sook; Ahn, Sangdoo; Kim, Byung Hee

    2015-10-14

    The aim of this study was to verify the authenticity of sesame oils using combined analysis of stable isotope ratio, (1)H NMR spectroscopy, and fatty acid profiles of the oils. Analytical data were obtained from 35 samples of authentic sesame oils and 29 samples of adulterated sesame oils currently distributed in Korea. The orthogonal projection to latent structure discriminant analysis technique was used to select variables that most effectively verify the sesame oil authenticity. The variables include δ(13)C value, integration values of NMR peaks that signify the CH3 of n-3 fatty acids, CH2 between two C═C, protons from sesamin/sesamolin, and 18:1n-9, 18:3n-3, 18:2t, and 18:3t content values. The authenticity of 65 of 70 blind samples was correctly verified by applying the range of the eight variables found in the authentic sesame oil samples, suggesting that triple analysis is a useful approach to verify sesame oil authenticity. PMID:26395416

  12. LDRD final report on massively-parallel linear programming : the parPCx system.

    Energy Technology Data Exchange (ETDEWEB)

    Parekh, Ojas (Emory University, Atlanta, GA); Phillips, Cynthia Ann; Boman, Erik Gunnar

    2005-02-01

    This report summarizes the research and development performed from October 2002 to September 2004 at Sandia National Laboratories under the Laboratory-Directed Research and Development (LDRD) project ''Massively-Parallel Linear Programming''. We developed a linear programming (LP) solver designed to use a large number of processors. LP is the optimization of a linear objective function subject to linear constraints. Companies and universities have expended huge efforts over decades to produce fast, stable serial LP solvers. Previous parallel codes run on shared-memory systems and have little or no distribution of the constraint matrix. We have seen no reports of general LP solver runs on large numbers of processors. Our parallel LP code is based on an efficient serial implementation of Mehrotra's interior-point predictor-corrector algorithm (PCx). The computational core of this algorithm is the assembly and solution of a sparse linear system. We have substantially rewritten the PCx code and based it on Trilinos, the parallel linear algebra library developed at Sandia. Our interior-point method can use either direct or iterative solvers for the linear system. To achieve a good parallel data distribution of the constraint matrix, we use a (pre-release) version of a hypergraph partitioner from the Zoltan partitioning library. We describe the design and implementation of our new LP solver called parPCx and give preliminary computational results. We summarize a number of issues related to efficient parallel solution of LPs with interior-point methods including data distribution, numerical stability, and solving the core linear system using both direct and iterative methods. We describe a number of applications of LP specific to US Department of Energy mission areas and we summarize our efforts to integrate parPCx (and parallel LP solvers in general) into Sandia's massively-parallel integer programming solver PICO (Parallel Interger and

  13. Development of highly integrated magetically and electrostatically actuated micropumps : LDRD 64709 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Sosnowchik, Brian D. (Pennsylvania State University, University Park, PA); Galambos, Paul C.; Hendrix, Jason R. (Florida State University, Tallahassee, FL); Zwolinski, Andrew (Florida State University, Tallahassee, FL)

    2003-12-01

    The pump and actuator systems designed and built in the SUMMiT{trademark} process, Sandia's surface micromachining polysilicon MEMS (Micro-Electro-Mechanical Systems) fabrication technology, on the previous campus executive program LDRD (SAND2002-0704P) with FSU/FAMU (Florida State University/Florida Agricultural and Mechanical University) were characterized in this LDRD. These results demonstrated that the device would pump liquid against the flow resistance of a microfabricated channel, but the devices were determined to be underpowered for reliable pumping. As a result a new set of SUMMiT{trademark} pumps with actuators that generate greater torque will be designed and submitted for fabrication. In this document we will report details of dry actuator/pump assembly testing, wet actuator/pump testing, channel resistance characterization, and new pump/actuator design recommendations.

  14. Exploration of cloud computing late start LDRD #149630 : Raincoat. v. 2.1.

    Energy Technology Data Exchange (ETDEWEB)

    Echeverria, Victor T.; Metral, Michael David; Leger, Michelle A.; Gabert, Kasimir Georg; Edgett, Patrick Garrett; Thai, Tan Q.

    2010-09-01

    This report contains documentation from an interoperability study conducted under the Late Start LDRD 149630, Exploration of Cloud Computing. A small late-start LDRD from last year resulted in a study (Raincoat) on using Virtual Private Networks (VPNs) to enhance security in a hybrid cloud environment. Raincoat initially explored the use of OpenVPN on IPv4 and demonstrates that it is possible to secure the communication channel between two small 'test' clouds (a few nodes each) at New Mexico Tech and Sandia. We extended the Raincoat study to add IPSec support via Vyatta routers, to interface with a public cloud (Amazon Elastic Compute Cloud (EC2)), and to be significantly more scalable than the previous iteration. The study contributed to our understanding of interoperability in a hybrid cloud.

  15. Final LDRD report : infrared detection and power generation using self-assembled quantum dots.

    Energy Technology Data Exchange (ETDEWEB)

    Cederberg, Jeffrey George; Ellis, Robert; Shaner, Eric Arthur

    2008-02-01

    Alternative solutions are desired for mid-wavelength and long-wavelength infrared radiation detection and imaging arrays. We have investigated quantum dot infrared photodetectors (QDIPs) as a possible solution for long-wavelength infrared (8 to 12 {mu}m) radiation sensing. This document provides a summary for work done under the LDRD 'Infrared Detection and Power Generation Using Self-Assembled Quantum Dots'. Under this LDRD, we have developed QDIP sensors and made efforts to improve these devices. While the sensors fabricated show good responsivity at 80 K, their detectivity is limited by high noise current. Following efforts concentrated on how to reduce or eliminate this problem, but with no clear path was identified to the desired performance improvements.

  16. Image content authentication based on channel coding

    Science.gov (United States)

    Zhang, Fan; Xu, Lei

    2008-03-01

    The content authentication determines whether an image has been tampered or not, and if necessary, locate malicious alterations made on the image. Authentication on a still image or a video are motivated by recipient's interest, and its principle is that a receiver must be able to identify the source of this document reliably. Several techniques and concepts based on data hiding or steganography designed as a means for the image authentication. This paper presents a color image authentication algorithm based on convolution coding. The high bits of color digital image are coded by the convolution codes for the tamper detection and localization. The authentication messages are hidden in the low bits of image in order to keep the invisibility of authentication. All communications channels are subject to errors introduced because of additive Gaussian noise in their environment. Data perturbations cannot be eliminated but their effect can be minimized by the use of Forward Error Correction (FEC) techniques in the transmitted data stream and decoders in the receiving system that detect and correct bits in error. This paper presents a color image authentication algorithm based on convolution coding. The message of each pixel is convolution encoded with the encoder. After the process of parity check and block interleaving, the redundant bits are embedded in the image offset. The tamper can be detected and restored need not accessing the original image.

  17. Graphical Passwords Authentication: A Survey

    Directory of Open Access Journals (Sweden)

    Nikhil Tarkeshwar Ambade

    2015-02-01

    Full Text Available In typically text-based passwords, well known users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. Reusing same or easy passwords across different accounts help to memorability, but decrease in security. Text passwords are the most popular user authentication method, but have security and usability problems. Alternatives such as biometric systems and tokens have their own drawbacks Graphical passwords offer another alternative. This paper conducts a comprehensive survey of the existing graphical password techniques also classifies these techniques into three categories: recall, recognition, and cued-recall approaches. This paper discusses security and usability aspects of graphical password techniques and point out the future research directions in this area.

  18. THORP: Authentication, transparency and independence

    International Nuclear Information System (INIS)

    The thermal oxide reprocessing plant (THORP) at Sellafield (United Kingdom) has started active commissioning in a run-up to full operation. It has a design annual throughput of 1200 t of heavy metal, containing up to 12 t of plutonium. The plant is subject to comprehensive Euratom safeguards involving challenges for both the inspectorate and the operator, extending from plant design through construction to commissioning and operation. The key elements of the safeguards approach are described and the concept of a network of safeguards measures at varying levels of independence is developed, leading to a comprehensive overall safeguards assurance. The importance of ensuring transparence of operations and of the related plant generated operating data is underlined. Authentication measures planned in all areas where information is obtained are described, leading, for the full set of verification activities, to a high level of independent assurance. (author). 7 refs

  19. Instant Java password and authentication security

    CERN Document Server

    Mayoral, Fernando

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication, detailing advanced topics in a recipe format.This book is ideal for developers new to user authentication and password security, and who are looking to get a good grounding in how to implement it in a reliable way.It's assumed that the reader will have some experience in Java already, as well as being familiar with the basic idea behind user authentication.

  20. ALE: AES-based lightweight authenticated encryption

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Mendel, Florian; Regazzoni, Francesco;

    2014-01-01

    In this paper, we propose a new Authenticated Lightweight Encryption algorithm coined ALE. The basic operation of ALE is the AES round transformation and the AES-128 key schedule. ALE is an online single-pass authenticated encryption algorithm that supports optional associated data. Its security...... is at least 2.5 times more performant than the alternatives in their smallest implementations by requiring only about 4 AES rounds to both encrypt and authenticate a 128-bit data block for longer messages. When using the AES-NI instructions, ALE outperforms AES-GCM, AES-CCM and ASC-1 by a...

  1. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria;

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... can recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All...

  2. Authentication planning for XOR network coding

    CERN Document Server

    Jaffres-Runser, Katia

    2011-01-01

    This paper formulates the authentication planning problem when network coding is implemented in a wireless sensor network. The planning problem aims at minimizing the energy consumed by the security application which is guarantied using message authentication codes. This paper proposes a binary non-linear optimization formulation for this planning problem whose decision variables are the authentication decision of the nodes and the MAC modes of operation. It is illustrated for a butterfly topology. Results show that there is a real trade-off between energy efficiency and message throughput in this context.

  3. Authentication Systems in Internet of Things

    Directory of Open Access Journals (Sweden)

    Tuhin Borgohain

    2015-01-01

    Full Text Available This paper analyzes the various authentication systems implemented for enhanced security and private reposition of an individual’s login credentials. The first part of the paper describes the multi-factor authentication (MFA systems, which, though not applicable to the field of Internet of Things, provides great security to a user’s credentials. MFA is followed by a brief description of the working mechanism of interaction of third party clients with private resources over the OAuth protocol framework and a study of the delegation based authentication system in IP-based IoT.

  4. Towards distortion-free robust image authentication

    International Nuclear Information System (INIS)

    This paper investigates a general framework for distortion-free robust image authentication by multiple marking. First, by robust watermarking a subsampled version of image edges is embedded. Then, by reversible watermarking the information needed to recover the original image is inserted, too. The hiding capacity of the reversible watermarking is the essential requirement for this approach. Thus in case of no attacks not only image is authenticated but also the original is exactly recovered. In case of attacks, reversibility is lost, but image can still be authenticated. Preliminary results providing very good robustness against JPEG compression are presented

  5. Authenticated Key Agreement in Group Settings

    Institute of Scientific and Technical Information of China (English)

    LI Ming; WANG Yong; GU Da-wu; BAI Ying-cai

    2006-01-01

    An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.

  6. Behavioural Biometrics and Cognitive Security Authentication Comparison Study

    OpenAIRE

    Karan Khare; Surbhi Rautji; Deepak Gaur

    2013-01-01

    Behaviouralbiometrics is a scientific study with the primary purpose of identifying the authenticity of auser based on the way they interact with an authentication mechanism. While Association based passwordauthentication is a cognitive model of authentication system.The work done shows the implementation of Keyboard Latency technique for Authentication,implementation of Association Based Password authentication and comparison among two. There areseveral forms of behavioural biometrics such a...

  7. Development of anti-counterfeit consumer product authentication system

    OpenAIRE

    Olena V. Narimanova

    2015-01-01

    Aim of the research is to develop an anti-counterfeit consumer product authentication system. The main requirements for this system are formulated, the choice of method of consumer product authentication is substantiated. The scheme of anti-counterfeit consumer product authentication system is developed basing on previously proposed method of checking the QR-code integrity and authenticity. The proposed within the system consumer product authentication technology is simple, economical for imp...

  8. Authenticity and Experience among Visitors at a Historic Village

    OpenAIRE

    Harvey, William Robert

    1998-01-01

    This study examines the concept of authenticity as applied at Appomattox Court House National Historical Park (ACHNHP). Based on past theoretical research, a functional definition of authenticity is used in an effort to test whether or not visitors to the park come for reasons relating to authenticity. Further analyses are used to determine the relative importance of authenticity to other motivational reasons for visiting the park, and how the level of authenticity experienced at ACHNHP aff...

  9. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Directory of Open Access Journals (Sweden)

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  10. Developing Listening Skills with Authentic Materials.

    Science.gov (United States)

    Miller, Lindsay

    2003-01-01

    Discusses how to help English-as-a-Second-Language learners develop effective listening skills. Suggests a process for helping ESL learners develop their listening skills and makes suggestions for how this might be achieved with authentic materials. (VWL)

  11. Authenticated hash tables

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Papamanthou, Charalampos; Tamassia, Roberto

    2008-01-01

    Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so that the client can save space or achieve load balancing. Authenticating the hash table functionality, i.e., verifying...... the correctness of queries answered by the server and ensuring the integrity of the stored data, is crucial because the server, lying outside the administrative control of the client, can be malicious. We design efficient and secure protocols for optimally authenticating membership queries on hash...... for authenticating a hash table with constant query cost and sublinear update cost. Our solution employs the RSA accumulator in a nested way over the stored data, strictly improving upon previous accumulator-based solutions. Our construction applies to two concrete data authentication models and lends...

  12. Athos: Efficient Authentication of Outsourced File Systems

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Goodrich, Michael T.; Papamanthou, Charalampos;

    2008-01-01

    We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system's integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated...... outsourced storage. Using light-weight cryptographic primitives and efficient data-structuring techniques, we design authentication schemes that allow a client to efficiently verify that the file system is fully consistent with the exact history of updates and queries requested by the client. In Athos, file......-system operations are verified in time that is logarithmic in the size of the file system using optimal storage complexity-constant storage overhead at the client and asymptotically no extra overhead at the server. We provide a prototype implementation of Athos validating its performance and its authentication...

  13. Hardware device binding and mutual authentication

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  14. Authenticating Devices in Ubiquitous Computing Environment

    Directory of Open Access Journals (Sweden)

    Kamarularifin Abd Jalil

    2015-05-01

    Full Text Available The deficient of a good authentication protocol in a ubiquitous application environment has made it a good target for adversaries. As a result, all the devices which are participating in such environment are said to be exposed to attacks such as identity impostor, man-in-the-middle attacks and also unauthorized attacks. Thus, this has created skeptical among the users and has resulted them of keeping their distance from such applications. For this reason, in this paper, we are proposing a new authentication protocol to be used in such environment. Unlike other authentication protocols which can be adopted to be used in such environment, our proposed protocol could avoid a single point of failures, implements trust level in granting access and also promotes decentralization. It is hoped that the proposed authentication protocol can reduce or eliminate the problems mentioned.

  15. AUTHENTIC ASSESSMENT OF LANGUAGE SKILLS IN SCHOOL

    OpenAIRE

    DENISENKO I.S.

    2015-01-01

    The article defines key features of Authentic Assessment as alternative to traditional forms of assessment evaluating language skills schools: core principles and forms, criteria and requirements to teachers, developers and a scale for students.

  16. Design of safeguards systems for authentication

    International Nuclear Information System (INIS)

    To permit valid conclusions to be drawn from safeguards data, it is essential that this data is known to be authentic. That is, it must be known that the data originated from the intended source, that the data was not changed in transit, and that it is not a repeat or delayed copy of previous data. Safeguards systems and equipment should be designed with authentication included, instead of attempting to add security later. Failure to integrate authentication measures early in the design results in systems that are expensive or possibly impossible to deploy securely. This paper gives some of the factors that should be considered and some of the methods that can be employed for ensuring high security while minimizing cost. The paper is a compilation of some of the lessons learned by the authors during many years of working with the authentication of these systems. (author)

  17. Authentication of food allergen quality by physicochemical and immunological methods

    DEFF Research Database (Denmark)

    Sancho, A I; Hoffmann-Sommergruber, K; Alessandri, S;

    2010-01-01

    and standardization of methods between different laboratories and operators for risk assessment in the food industry. Therefore, there is a need for well-defined purified food allergens. In this context, a panel of 46 food allergens from plant and animal sources has been purified, from either the food sources...... or as recombinant forms, within the EU-funded EuroPrevall project. These allergens have been characterized by a battery of diagnostic tests demonstrating that they constitute an authentic, well-defined library of comparable quality. The review summarizes the applications, potentials and limitations of key...

  18. Energy Efficient Authentication Strategies for Network Coding

    OpenAIRE

    Apavatjrut, Anya; Znaidi, Wassim; Fraboulet, Antoine; Goursaud, Claire; Jaffrès-Runser, Katia; Lauradoux, Cédric; Minier, Marine

    2012-01-01

    Recent advances in information theory and networking, e.g. aggregation, network coding or rateless codes, have significantly modified data dissemination in wireless networks. These new paradigms create new threats for security such as pollution attacks and denial of services (DoS). These attacks exploit the difficulty to authenticate data in such contexts. The particular case of xor network coding is considered herein. We investigate different strategies based on message authentication codes ...

  19. Mobile Fingerprint Authentication System with Enhanced Security

    OpenAIRE

    Li, Yi

    2016-01-01

    Abstract—Although use of fingerprint is highly effective in user authentication of networked services such as electronic payment, there are some problems in conventional systems, including high cost due to need for specialized fingerprint readers and limited usability. To resolve these problems, we propose a new system which incorporates a web-based fingerprint authentication using a smartphone as a fingerprint input device. Additionally, awatermark-based encryption solution is used to enhance sy...

  20. Applying Keystroke Dynamics for Personal Authentication

    OpenAIRE

    Gagbla, George Kofi

    2005-01-01

    With the establishment of the information society, security had become the greatest concern for Institutions transacting business over the Internet. Home banking and on-line brokerage applications currently, use basic software-only security functions for the internet such as server authentications and Secure Sockets layer. Higher levels of protections are being achieved with Smart card based authentication schemes and transaction protocols. Password based security identifies users based on wh...

  1. Comparison of authentication methods and tools

    OpenAIRE

    Kocmur, Matej

    2012-01-01

    We started this thesis with the review in area of many different authenticational protocols, more detailed description of the three most important authenticational protocols (RADIUS, LDAP and KERBEROS) follow, also cryptographic methods, hash functions and PKI infrastructure are described. We concluded the theoretical part of the thesis with safety aspects of protocols RADIUS and LDAP and also vulnerability of KERBEROS protocol, where we obtained proper quotes, which we also commented. The ne...

  2. Trait and state authenticity across cultures

    OpenAIRE

    Slabu, L; Lenton, A.; Sedikides, Constantine; Bruder, Martin

    2014-01-01

    We examined the role of culture in both trait and state authenticity, asking whether the search for and experience of the “true self” is a uniquely Western phenomenon or is relevant cross-culturally. We tested participants from the United States, China, India, and Singapore. U.S. participants reported higher average levels of trait authenticity than those from Eastern cultures (i.e., China, India, Singapore), but this effect was partially explained by cultural differences in self-construal an...

  3. Keystroke Dynamics Authentication For Collaborative Systems

    OpenAIRE

    Giot, Romain; El-Abed, Mohamad; Rosenberger, Christophe

    2009-01-01

    International audience We present in this paper a study on the ability and the benefits of using a keystroke dynamics authentication method for collaborative systems. Authentication is a challenging issue in order to guarantee the security of use of collaborative systems during the access control step. Many solutions exist in the state of the art such as the use of one time passwords or smart-cards. We focus in this paper on biometric based solutions that do not necessitate any additional ...

  4. Image Based Authentication Using Steganography Technique

    OpenAIRE

    Satish Kumar Sonker; Sanjeev Kumar; Amit Kumar; Dr. Pragya Singh

    2013-01-01

    In the world of Information Security we are generally using Traditional (Text based) or multi factor Authentication Approach. Through which we are facing a lot of problems and it’s also less secure too. In these types conventional method attacks like brute-force attack, Dictionary Attack etc., are possible. This paper proposes the Image Based Authentication Using Steganography Technique considering the advantage of steganography technique along with the image. Including steganography in image...

  5. Quantum Authentication Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Penghao, Niu; Yuan, Chen; Chong, Li

    2016-01-01

    Based on the entanglement swapping, a quantum authentication scheme with a trusted- party is proposed in this paper. With this scheme, two users can perform mutual identity authentication to confirm each other's validity. In addition, the scheme is proved to be secure under circumstances where a malicious attacker is capable of monitoring the classical and quantum channels and has the power to forge all information on the public channel.

  6. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  7. Messianic Judaism as a mode of fundamentalist authenticity : grammar of authenticity through ethnography of a contested identity

    OpenAIRE

    Dulin, John Christopher

    2010-01-01

    This paper considers how Messianic Jews understand their faith as a unique form of authenticity. On one level, both Messianic Jewish claims of authenticity and critics of Messianic authenticity reflect the same semiotic logic of what I call the "evaluative grammar of authenticity." The evaluative grammar of authenticity values causal/metonymic indexes over manipulated symbols and is undergirded by a suspicion that general appearances are symbolically manipulated in order to mask actual indexi...

  8. Unobtrusive behavioral and activity-related multimodal biometrics: The ACTIBIO Authentication concept.

    Science.gov (United States)

    Drosou, A; Ioannidis, D; Moustakas, K; Tzovaras, D

    2011-01-01

    Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities. PMID:21380485

  9. Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept

    Directory of Open Access Journals (Sweden)

    A. Drosou

    2011-01-01

    Full Text Available Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.

  10. Developing More Authentic e-Courses by Integrating Working Life Mentoring and Social Media

    Science.gov (United States)

    Leppisaari, Irja; Kleimola, Riina; Herrington, Jan; Maunula, Markus; Hohenthal, Tuula

    2014-01-01

    Studies show that affordances of social media have not yet been fully exploited in the promotion of authentic e-learning in higher education. The e-Learning of the Future project (2009-2011) has met these challenges through working life mentoring using social media. In this paper, we examine the planning and implementation of social media in nine…

  11. Improving a Field School Curriculum Using Modularized Lessons and Authentic Case-Based Learning

    Science.gov (United States)

    Rea, Roy V.; Hodder, Dexter P.

    2007-01-01

    University course evaluations are replete with student comments expressing frustration with taking time out of work, paying money for, and putting energy into field education projects that lack authentic "real-world" problem-solving objectives. Here, we describe a model for field school education that borrows on pedagogical tools such as…

  12. Authentic Research Experience and "Big Data" Analysis in the Classroom: Maize Response to Abiotic Stress

    Science.gov (United States)

    Makarevitch, Irina; Frechette, Cameo; Wiatros, Natalia

    2015-01-01

    Integration of inquiry-based approaches into curriculum is transforming the way science is taught and studied in undergraduate classrooms. Incorporating quantitative reasoning and mathematical skills into authentic biology undergraduate research projects has been shown to benefit students in developing various skills necessary for future…

  13. Permutation-based Homogeneous Block Content Authentication for Watermarking

    Directory of Open Access Journals (Sweden)

    S.Maruthuperumal

    2013-02-01

    Full Text Available In modern days, digital watermarking has become an admired technique for hitting data in digital images to help guard against copyright infringement. The proposed Permutation-based Homogeneous Block Content authentication (PHBC methods develop a secure and excellence strong watermarking algorithm that combines the reward of permutation-based Homogeneous block (PHB with that of significant and insignificant bit values with X0R encryption function using Max coefficient of least coordinate value for embedding the watermark. In the projected system uses the relationship between the permutation blocks to embed many data into Homogeneous blocks without causing solemn distortion to the watermarked image. The experimental results show that the projected system is very efficient in achieving perceptual invisibility with an increase in the Peak Signal to Noise Ratio (PSNR. Moreover, the projected system is robust to a variety of signal processing operations, such as image Cropping, Rotation, Resizing, Adding noise, Filtering , Blurring and Motion blurring.

  14. Robust image authentication in the presence of noise

    CERN Document Server

    2015-01-01

    This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.    Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:   Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the pre...

  15. Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs

    Institute of Scientific and Technical Information of China (English)

    Rajeev Singh; Teek Parval Sharma

    2015-01-01

    Authentication per frame is an implicit necessity for security in wireless local area networks (WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames. It utilizes the sequence number of the frame along with the authentication stream generators for authentication. Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation.

  16. Authenticity in the Bureau-Enterprise Culture: The Struggle for Authentic Meaning

    Science.gov (United States)

    Woods, Philip A.

    2007-01-01

    This article emphasizes the extent to which conceptions of authenticity are forged through social interaction and socially mediated identities and how, in turn, authentic leadership involves the transformation of the organizational, social or cultural order in which leadership is situated. The overarching context for this exploration of authentic…

  17. Authenticity Is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity

    Science.gov (United States)

    Gulikers, Judith T. M.; Bastiaens, Theo J.; Kirschner, Paul A.; Kester, Liesbeth

    2008-01-01

    In vocational education and training (VET) in the Netherlands, learning and working are integrated from the start. Authentic assessments are used during competence-based VET curricula to achieve correspondence between learning and working. The premise behind this study is that authenticity is subjective and that perceptions of assessment…

  18. Perceptions of Leadership Coaches Regarding Leader Authenticity and Authenticity Development Strategies

    Science.gov (United States)

    Stone, Anne H.

    2012-01-01

    Purpose: The purpose of this study was to identify what leadership coaches perceive to be the benefits of authenticity to their clients' success. Another purpose was to identify what barriers leadership coaches perceive as preventing their clients from developing authenticity. A final purpose of this study was to identify which strategies…

  19. Advances in radiation modeling in ALEGRA :a final report for LDRD-67120, efficient implicit mulitgroup radiation calculations.

    Energy Technology Data Exchange (ETDEWEB)

    Mehlhorn, Thomas Alan; Kurecka, Christopher J. (University of Michigan, Ann Arbor, MI); McClarren, Ryan (University of Michigan, Ann Arbor, MI); Brunner, Thomas A.; Holloway, James Paul (University of Michigan, Ann Arbor, MI)

    2005-11-01

    The original LDRD proposal was to use a nonlinear diffusion solver to compute estimates for the material temperature that could then be used in a Implicit Monte Carlo (IMC) calculation. At the end of the first year of the project, it was determined that this was not going to be effective, partially due to the concept, and partially due to the fact that the radiation diffusion package was not as efficient as it could be. The second, and final year, of the project focused on improving the robustness and computational efficiency of the radiation diffusion package in ALEGRA. To this end, several new multigroup diffusion methods have been developed and implemented in ALEGRA. While these methods have been implemented, their effectiveness of reducing overall simulation run time has not been fully tested. Additionally a comprehensive suite of verification problems has been developed for the diffusion package to ensure that it has been implemented correctly. This process took considerable time, but exposed significant bugs in both the previous and new diffusion packages, the linear solve packages, and even the NEVADA Framework's parser. In order to manage this large suite of problem, a new tool called Tampa has been developed. It is a general tool for automating the process of running and analyzing many simulations. Ryan McClarren, at the University of Michigan has been developing a Spherical Harmonics capability for unstructured meshes. While still in the early phases of development, this promises to bridge the gap in accuracy between a full transport solution using IMC and the diffusion approximation.

  20. FY04 LDRD Final Report Stroke Sensor Development Using Microdot Sensor Arrays

    Energy Technology Data Exchange (ETDEWEB)

    Carter, J C; Wilson, T S; Alvis, R M; Paulson, C N; Setlur, U S; McBride, M T; Brown, S B; Bearinger, J P; Colston, B W

    2005-11-15

    major thrust area for the Medical Technology Program (M-division). Through MTP, LLNL has a sizable investment and recognizable expertise in stroke treatment research. The proposed microdot array sensor for stroke will complement this existing program in which mechanical devices are being designed for removing the thrombus. The following list of stroke projects and their relative status shows that MTP has a proven track record of taking ideas to industry: The goal of this LDRD funded project was to develop and demonstrate a minimally invasive optical fiber-based sensor for rapid and in-vivo measurements of multiple stroke biomarkers (e.g. pH and enzyme). The development of this sensor also required the development of a new fabrication technology for attaching indicator chemistries to optical fibers. A benefit of this work is to provide clinicians with a tool to assess vascular integrity of the region beyond the thrombus to determine whether or not it is safe to proceed with the removal of the clot. Such an assessment could extend the use of thrombolytic drug treatment to acute stroke victims outside the current rigid temporal limitation of 3 hours. Furthermore, this sensor would also provide a tool for use with emerging treatments involving the use of mechanical devices for removing the thrombus. The sensor effectively assesses the risk for reperfusion injury.

  1. Behavior-aware decision support systems : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Hirsch, Gary B.; Homer, Jack (Homer Consulting); Chenoweth, Brooke N.; Backus, George A.; Strip, David R.

    2007-11-01

    As Sandia National Laboratories serves its mission to provide support for the security-related interests of the United States, it is faced with considering the behavioral responses that drive problems, mitigate interventions, or lead to unintended consequences. The effort described here expands earlier works in using healthcare simulation to develop behavior-aware decision support systems. This report focuses on using qualitative choice techniques and enhancing two analysis models developed in a sister project.

  2. Designing Authentic Learning Environments in Chemistry Lessons: Paving the Way in Pre-Service Teacher Education

    Science.gov (United States)

    Schumacher, Andrea; Reiners, Christiane S.

    2013-09-01

    Authenticity has recently become a popular term in science education. A study focusing on authenticity in the sense of making chemistry lessons better resemble chemistry practice is carried out at the University of Cologne in the Institute of Chemical Education, where prospective chemistry teachers are trained. In the long run an innovative module shall be developed, which challenges teacher students' pre-conceptions about characteristics of chemistry practice and supports them in translating their conceptions into authentic learning environments. This paper presents the first part of the project in which course elements to stimulate reflection on students' attitudes were evaluated. Moreover the students were given an opportunity for teacher students to create a practical activity for pupils in order to detect aspects in which the students need more support, for example possible ways for this transformation or more experience with inquiry-based learning.

  3. Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

    International Nuclear Information System (INIS)

    In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.

  4. SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    RAVIKIRAN PEELUKHANA,

    2011-04-01

    Full Text Available The cloud virtualization technology improves the economy of scale for data centers through server consolidation, application consolidation and resources consolidation. Virtualization allows the provider to move Virtual Images from more congested host to less-congested hosts, as required. Enterprises also get improved server reliability, which in turn increases application performance. Despite these benefits, it includes major security challenges with the portability of Virtual Images between different cloud providers.The security and integrity of Virtual images is the foundation for the overall security of the cloud. Many of the Virtual images are intended to be shared by diverse and unrelated users. Unfortunately, existing approaches to cloud security built by cloud practitioners fall short when dealing with Virtual images. Secure transmission of virtual Images can bepossible by providing authentication using Blind Authentication protocol (BAP. The proposed approach authenticates the allocation of virtual images using Blind authentication protocol. It provides provable protection against replay and client side attacks even if the keys of the user are compromised. The encryption also provides template protection, revocability and alleviates the concerns on privacy in widespread use of biometrics. Carrying out the authentication in the encrypted domain is a secure process, while the encryption key acts as an additional layer of security.

  5. User Dynamics in Graphical Authentication Systems

    Science.gov (United States)

    Revett, Kenneth; Jahankhani, Hamid; de Magalhães, Sérgio Tenreiro; Santos, Henrique M. D.

    In this paper, a graphical authentication system is presented which is based on a matching scheme. The user is required to match up thumbnail graphical images that belong to a variety of categories - in an order based approach. The number of images in the selection panel was varied to determine how this effects memorability. In addition, timing information was included as a means of enhancing the security level of the system. That is, the user's mouse clicks were timed and used as part of the authentication process. This is one of the few studies that employ a proper biometric facility, namely mouse dynamics, into a graphical authentication system. Lastly, this study employees the use of the 2-D version of Fitts' law, the Accot-Zhai streering law, which is used to examine the effect of image size on usability. The results from this study indicate that the combination of biometrics (mouse timing information) into a graphical authentication scheme produces FAR/FRR values that approach textual based authentication schemes.

  6. Smartphone sensors for stone lithography authentication.

    Science.gov (United States)

    Spagnolo, Giuseppe Schirripa; Cozzella, Lorenzo; Papalillo, Donato

    2014-01-01

    Nowadays mobile phones include quality photo and video cameras, access to wireless networks and the internet, GPS assistance and other innovative systems. These facilities open them to innovative uses, other than the classical telephonic communication one. Smartphones are a more sophisticated version of classic mobile phones, which have advanced computing power, memory and connectivity. Because fake lithographs are flooding the art market, in this work, we propose a smartphone as simple, robust and efficient sensor for lithograph authentication. When we buy an artwork object, the seller issues a certificate of authenticity, which contains specific details about the artwork itself. Unscrupulous sellers can duplicate the classic certificates of authenticity, and then use them to "authenticate" non-genuine works of art. In this way, the buyer will have a copy of an original certificate to attest that the "not original artwork" is an original one. A solution for this problem would be to insert a system that links together the certificate and the related specific artwork. To do this it is necessary, for a single artwork, to find unique, unrepeatable, and unchangeable characteristics. In this article we propose an innovative method for the authentication of stone lithographs. We use the color spots distribution captured by means of a smartphone camera as a non-cloneable texture of the specific artworks and an information management system for verifying it in mobility stone lithography. PMID:24811077

  7. Improving Classical Authentication over a Quantum Channel

    Directory of Open Access Journals (Sweden)

    Yasser Omar

    2012-12-01

    Full Text Available We propose a quantum protocol to authenticate classical messages that can be used to replace Wegman–Carter’s classical authentication scheme in quantum key distribution (QKD protocols. We show that the proposed scheme achieves greater conditional entropy of the seed for the intruder given her (quantum observation than the classical case. The proposed scheme is suitable for situations where the shared symmetric key used in authentication becomes dangerously short (due to noise or eavesdropping, and there is a threat that it might be completely consumed without being replaced. Our protocol is an improvement over a classical scheme by Brassard and takes advantage of quantum channel properties. It is motivated by information-theoretical results. We stress that the proposed authentication protocol can also be used as an independent authentication protocol that is not a part of a QKD. However by adopting it, QKD becomes a fully quantum protocol. We prove that quantum resources can improve both the secrecy of the key generated by the PRG and the secrecy of the tag obtained with a hidden hash function. We conclude that the proposed quantum encoding offers more security than the classical scheme and, by applying a classical result, we show that it can be used under noisy quantum channels.

  8. IMAGE AUTHENTICATION TECHNIQUES AND ADVANCES SURVEY

    Directory of Open Access Journals (Sweden)

    Derroll David

    2015-10-01

    Full Text Available With the advanced technologies in the area of Engineering the World has become a smaller place and communication is in our finger tips. The multimedia sharing traffic through electronic media has increased tremendously in the recent years with the higher use of social networking sites. The statistics of amount of images uploaded in the internet per day is very huge. Digital Image security has become vulnerable due to increase transmission over non-secure channel and needs protection. Digital Images play a crucial role in medical and military images etc. and any tampering of them is a serious issue. Several approaches are introduced to authenticate multimedia images. These approaches can be categorized into fragile and semi-fragile watermarking, conventional cryptography and digital signatures based on the image content. The aim of this paper is to provide a comparative study and also a survey of emerging techniques for image authentication. The important requirements for an efficient image authentication system design are discussed along with the classification of image authentication into tamper detection, localization and reconstruction and robustness against image processing operation. Furthermore, the concept of image content based authentication is enlightened.

  9. FY05 LDRD Final Report, A Revolution in Biological Imaging

    Energy Technology Data Exchange (ETDEWEB)

    Chapman, H N; Bajt, S; Balhorn, R; Barty, A; Barsky, D; Bogan, M; Chung, S; Frank, M; Hau-Riege, S; Ishii, H; London, R; Marchesini, S; Noy, A; Segelke, B; Szoke, A; Szoke, H; Trebes, J; Wootton, A; Hajdu, J; Bergh, M; Caleman, C; Huldt, G; Lejon, S; der Spoel, D v; Howells, M; He, H; Spence, J; Nugent, K; Ingerman, E

    2006-01-20

    X-ray free-electron lasers (XFELs) are currently under development and will provide a peak brightness more than 10 orders of magnitude higher than modern synchrotrons. The goal of this project was to perform the fundamental research to evaluate the possibility of harnessing these unique x-ray sources to image single biological particles and molecules at atomic resolution. Using a combination of computational modeling and experimental verification where possible, they showed that it should indeed be possible to record coherent scattering patterns from single molecules with pulses that are shorter than the timescales for the degradation of the structure due to the interaction with those pulses. They used these models to determine the effectiveness of strategies to allow imaging using longer XFEL pulses and to design validation experiments to be carried out at interim ultrafast sources. They also developed and demonstrated methods to recover three-dimensional (3D) images from coherent diffraction patterns, similar to those expected from XFELs. The images of micron-sized test objects are the highest-resolution 3D images of any noncrystalline material ever formed with x-rays. The project resulted in 14 publications in peer-reviewed journals and four records of invention.

  10. Autonomous intelligent assembly systems LDRD 105746 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J.

    2013-04-01

    This report documents a three-year to develop technology that enables mobile robots to perform autonomous assembly tasks in unstructured outdoor environments. This is a multi-tier problem that requires an integration of a large number of different software technologies including: command and control, estimation and localization, distributed communications, object recognition, pose estimation, real-time scanning, and scene interpretation. Although ultimately unsuccessful in achieving a target brick stacking task autonomously, numerous important component technologies were nevertheless developed. Such technologies include: a patent-pending polygon snake algorithm for robust feature tracking, a color grid algorithm for uniquely identification and calibration, a command and control framework for abstracting robot commands, a scanning capability that utilizes a compact robot portable scanner, and more. This report describes this project and these developed technologies.

  11. An Efficient Multicast Source Authentication Protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Weidong; LI Zhitang; LU Chuiwei; ZHANG Yejiang

    2006-01-01

    We propose an efficient multicast source authentication protocol called efficient multi-tree-chains scheme (EMTC),which shows more loss resistibility,less communication cost,and no delay at receivers. The EMTC scheme is based on combination of single Chain scheme and Hash Tree Chains scheme,and integrates the advantages of both. In this scheme,stream is firstly divided into blocks with n packets,and each block consists of m clusters,everyone of which contains a tree of packets. All clusters are chained together. Through EMTC,packets of one cluster can be authenticated by any packet of the previous cluster. Compared to other multicast authentication protocols,the proposed scheme has the following advantages: ① dramatically improves the resistance to burst packets loss; ② low computation and communication overhead; ③ imposes low delay on the sender side and no delay on the receiver side.

  12. Flexible Authentication in Vehicular Ad hoc Networks

    CERN Document Server

    Caballero-Gil, P; Molina-Gil, J; Hernández-Goya, C

    2010-01-01

    A Vehicular Ad-Hoc Network (VANET) is a form of Mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed roadside equipment. The key operation in VANETs is the broadcast of messages. Consequently, the vehicles need to make sure that the information has been sent by an authentic node in the network. VANETs present unique challenges such as high node mobility, real-time constraints, scalability, gradual deployment and privacy. No existent technique addresses all these requirements. In particular, both inter-vehicle and vehicle-to-roadside wireless communications present different characteristics that should be taken into account when defining node authentication services. That is exactly what is done in this paper, where the features of inter-vehicle and vehicle-to-roadside communications are analyzed to propose differentiated services for node authentication, according to privacy and efficiency needs.

  13. Enhanced User Authentication through Trajectory Clustering

    CERN Document Server

    Munaga, Hazarath; Venkateswarlu, N B

    2011-01-01

    Password authentication is the most commonly used technique to authenticate the user validity. However, due to its simplicity, it is vulnerable to pseudo attacks. It can be enhanced using various biometric techniques such as thumb impression, finger movement, eye movement etc. In this paper, we concentrate on the most economic technique, based on the user habitual rhythm pattern i.e. not what they type but how they type is the measure for authenticating the user. We consider the latency between key events as the trajectory, and trajectory clustering is used to obtain the hidden patterns of the user. Obtained pattern can be considered as a cluster of measurements that can be used to differentiate from other users. We evaluated the proposed technique on the data obtained from the 100 users.

  14. Authenticating Tripartite Key Agreement Protocol with Pairings

    Institute of Scientific and Technical Information of China (English)

    Sheng-Li Liu; Fang-Guo Zhang; Ke-Fei Chen

    2004-01-01

    In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.

  15. Authentic moral conflicts and students' moral development

    Institute of Scientific and Technical Information of China (English)

    Fu Wei-li

    2006-01-01

    This research deals with the different psychological processes people undergo when they experience firsthand authentic moral conflicts.It also discusses the value of authentic moral conflicts in students' moral development,and reasons for the ineffectiveness of moral education in China.The main reason for the unsatisfactory effects of moral education in China over a period of time lies in the predominance of virtual moral education.In authentic situations,the proper arrangement of moral conflicts requires careful analysis of values hidden in the prearranged or generated moral conflicts so as to utilize,guide,and control them properly.Such arrangement of moral conflicts should be adapted to students' life experience for deepening their understanding of the moral aspects of life.Also,special attention should be attached to students' varied requirements,thus leaving enough options and space for their independent participation in activities of moral education.

  16. An Investigation of the Effects of Authentic Science Experiences Among Urban High School Students

    Science.gov (United States)

    Chapman, Angela

    Providing equitable learning opportunities for all students has been a persistent issue for some time. This is evident by the science achievement gap that still exists between male and female students as well as between White and many non-White student populations (NCES, 2007, 2009, 2009b) and an underrepresentation of female, African-American, Hispanic, and Native Americans in many science, technology, engineering, and mathematics (STEM) related careers (NCES, 2009b). In addition to gender and ethnicity, socioeconomic status and linguistic differences are also factors that can marginalize students in the science classroom. One factor attributed to the achievement gap and low participation in STEM career is equitable access to resources including textbooks, laboratory equipment, qualified science teachers, and type of instruction. Extensive literature supports authentic science as one way of improving science learning. However, the majority of students do not have access to this type of resource. Additionally, extensive literature posits that culturally relevant pedagogy is one way of improving education. This study examines students' participation in an authentic science experience and argues that this is one way of providing culturally relevant pedagogy in science classrooms. The purpose of this study was to better understand how marginalized students were affected by their participation in an authentic science experience, within the context of an algae biofuel project. Accordingly, an interpretivist approach was taken. Data were collected from pre/post surveys and tests, semi-structured interviews, student journals, and classroom observations. Data analysis used a mixed methods approach. The data from this study were analyzed to better understand whether students perceived the experience to be one of authentic science, as well as how students science identities, perceptions about who can do science, attitudes toward science, and learning of science practices

  17. Authenticity: is it real or is it marketing?

    Science.gov (United States)

    Weinberger, David

    2008-03-01

    Marty Echt, the new head of marketing at Hunsk Engines, is determined to bring the motorcycle maker back to its roots. He says it's not enough to project authenticity to customers--employees must personally subscribe to the brand's values. Should the company's CEO support Marty's "real deal" vision? Five experts comment on this fictional case study. Bruce Weindruch, the founder and CEO of the History Factory, says that an authenticity-based campaign can be effective--but only if it's truly drawn from history. Marketers like Marty often remember their organization's past in a golden haze. Weindruch recommends exploring old engineering drawings, ads, and product photos in order to understand what customers and employees really valued back in the day. Gillian Arnold, a consultant to luxury fashion and fine jewelry brands, thinks Marty's approach is right: People in key marketing posts must be passionate about their products and know them inside and out. She argues that the CEO needs to commit more fully to the new campaign and address the significant gap between the staff and the brand. James H. Gilmore and B. Joseph Pine II, the cofounders of Strategic Horizons, point out that Hunsk needs to manage customers' perceptions rather than trying to be a "real company" or forming a management team whose personal interests match the brand. People purchase a product if it conforms to their self-image; that alone determines the brand's authenticity. Glenn Brackett of Sweetgrass Rods, a maker of bamboo fly-fishing rods, says Marty seems to be one of the few people who understand Hunsk motorcycles. If employees bring blood, sweat, heart, and soul to a product, it will manifest that spirit, and customers will line up for it. PMID:18411964

  18. Computer Security: Cryptography and authentication (2/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Remi Mollon studied computer security at University and he first worked on Grids, with the EGEE project, for a French Bioinformatics institute. Information security being crucial in that field, he developed an encrypted file management system on top of Grid middleware, and he contributed in integrating legacy applications with Grids. Then, he was hired by CERN as a Grid Data Management developer, and he joined the Grid Operational Security Coordination Team. Remi has now moved to CERN Computer Security Team. Remi is involved in the daily security operations, in addition to be responsible to design Team's computer infrastructure, and to participate to several projects, like multi-factor authentication at CERN. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have s...

  19. Multiparty Simultaneous Quantum Identity Authentication Based on Entanglement Swapping

    Institute of Scientific and Technical Information of China (English)

    WANG Jian; ZHANG Quan; TANG Chao-Jing

    2006-01-01

    @@ We present a multiparty simultaneous quantum identity authentication protocol based on entanglement swapping.In our protocol, the multi-user can be authenticated by a trusted third party simultaneously.

  20. Android Based Total Security for System Authentication

    Directory of Open Access Journals (Sweden)

    Mithil Vasani

    2015-04-01

    Full Text Available In this Paper [5], A highly severe menace to any computing device is the impersonation of an authenticate user. The most frequent computer authentication scheme is to use alphanumerical usernames and passwords. But the textual passwords are prone to dictionary attacks, eves dropping, shoulder surfing and social engineering. As such, graphical passwords have been introduced as an alternative to the traditional authentication process. Though the graphical password schemes provide a way of making more user friendly passwords, while increasing the level of security, they are vulnerable to shoulder surfing. To address this problem, text can be used in combination with the colors and images to generate the session passwords, thereby making a stronger authentication means. In general, session passwords are those that can be used only once and for every new session, a new password is engendered. This paper [7] describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner. The proposed system involves using a mobile phone as a software token for One Time Password generation. The generated One Time Password is valid for only a short user defined period of time and is generated by factors that are unique to both, the user and the mobile device itself. Additionally, an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization. The proposed method has been implemented and tested. Initial results show the success of the proposed method.

  1. Securing Authentication of TCP/IP Layer Two By Modifying Challenge-Handshake Authentication Protocol

    Directory of Open Access Journals (Sweden)

    M. W. Youssef

    2012-04-01

    Full Text Available Computer communications have been playing a vital role in the world economy. Government organizations, large companies and banks are using those networks in trading their data. This imposed a challenge due to the increasing need for protecting the sensitive data traded over those networks. This research presents a mechanism to protect computers communication over open un-trusted networks, primarily, that mechanism relies on securing communication authentication. In order to do that, the communication protection mechanism modifies the Challenge-Handshake Authentication Protocol (CHAP which is responsible for the authentication of communication of layer two High-level Data Link Control (HDLC protocol.

  2. ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    Amit Rana

    2012-09-01

    Full Text Available The Internet Engineering Task Force (IETF has proposednew protocols for highly secured wireless networking. Thepurpose of this paper is to implement one such proposedsecurity protocol - PEAP (Protected ExtensibleAuthentication Protocol [1]. PEAP was jointly developedby Microsoft, Cisco and RSA security. The protocolimplementation is done on the server end of a Client/Servernetwork model on a RADIUS server (RemoteAuthentication Dial-in User Service. The proposedprotocol - PEAP provides for Client identity protection andkey generation thus preventing unauthorized user accessand protecting or encrypting the data against maliciousactivities.

  3. Biometrics Identity Authentication in Secure Electronic Transactions

    Directory of Open Access Journals (Sweden)

    Deepu Saini

    2012-06-01

    Full Text Available There are so many ways by which a person can be identified, but authentication of a person by biometric methods is assumed to be more secure. There are many reasons behind this e.g. in this world each person is having different biometric features, even thetwins in this world having different biometrics features. In electronic transactions, biometric method is used from very early days but now a day’s it is supposed to be the best and secure method for electronic transactions. In this paper the concepts regarding biometric identity authentication are explained.

  4. Standards for Cell Line Authentication and Beyond

    Science.gov (United States)

    Cole, Kenneth D.; Plant, Anne L.

    2016-01-01

    Different genomic technologies have been applied to cell line authentication, but only one method (short tandem repeat [STR] profiling) has been the subject of a comprehensive and definitive standard (ASN-0002). Here we discuss the power of this document and why standards such as this are so critical for establishing the consensus technical criteria and practices that can enable progress in the fields of research that use cell lines. We also examine other methods that could be used for authentication and discuss how a combination of methods could be used in a holistic fashion to assess various critical aspects of the quality of cell lines. PMID:27300367

  5. Perceived Authentic leadership In social media

    OpenAIRE

    Mordenfeld, Frida; Johansson, Sandra

    2013-01-01

      Social media has become a powerful tool and the authors have been able to identify a sample of core dimensions that an authentic leader need to possess in order to be able to facilitate the increasing phenomenon and usage of social media in an effective way, i.e. transparency, flexibility, adaptability and trustworthiness.   With this investigation the authors aim to create an understanding of how authentic leaders deal with the on-going changes and rise of social media usage in their appli...

  6. Multimedia encryption and authentication techniques and applications

    CERN Document Server

    Furht, Borko

    2006-01-01

    Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for thos

  7. Pathways to Authenticity in Operatic Interpretation

    DEFF Research Database (Denmark)

    Grund, Cynthia M.; Westney, WIlliam

    What does it mean to characterize an operatic performance as authentic? To be sure there are important issues attendant to style, history and performance practice. This presentation focuses instead on the visceral level of concern to performers of any genre: whether or not one’s musical expression...... of the performer, as well as providing ways of assessing the degree to which authenticity of interpretation is experienced by the audience. During this process, loci for the emergence of musical meaning appear. In the course of the presentation we will identify and examine these and the role they play...... in the formation of the meaningful musical whole....

  8. Fingerprint Recognition on Various Authentication Sensors

    Institute of Scientific and Technical Information of China (English)

    A.Tirupathi Rao; N.Pattabhi Ramaiah; C.Krishna Mohan

    2014-01-01

    Fingerprint is a very popular and an ancient biometric technology to uniquely identify a person. In this paper, a fingerprint matcher is proposed which uses the global and local adaptive binarization and global minutia features. The fingerprint data is collected using three different authentication devices based on optical sensors. The experimental results are compared with the National Institute of Standards and Technology (NIST) Bozorth algorithm and various authentication fingerprint sensors. The accuracy of the proposed algorithm has been improved significantly compared with that of the NIST Bozorth algorithm.

  9. AUTHENTICITY IN TASK-BASED INTERACTION: A CONVERSATION ANALYSIS PERSPECTIVE

    OpenAIRE

    HANAN WAER

    2009-01-01

    In recent years, there has been an increasing interest in task-based learning. Authenticity has been characterized as a main aspect in defining a task (Long 1985; Skehan 1996; Ellis 2003). However, far too little attention has been paid to investigating authenticity in task-based interaction (TBI). To the best knowledge of the researcher, no research has been done using conversation analysis (CA) to investigate authenticity in TBI. Therefore, the present paper focuses on the issue of authent...

  10. Authentic tasks in higher education: Studying design principles for assessment

    OpenAIRE

    Keulen, H. van; Van den Berg, I.; Ramaekers, S.

    2006-01-01

    Students may benefit significantly from learning through authentic tasks. But how do we assess their learning outcomes, taking into account the specific characteristics of authentic tasks? In the second presentation of this symposium on design principles for authentic tasks we present and discuss principles for assessment procedures in authentic tasks from three different domains: clinical reasoning in Veterinary Science; internships in Medicine; and essay writing in History, all at Utrecht U...

  11. Human Errors and Learnability Evaluation of Authentication System

    OpenAIRE

    Khan, Mohammad Ali; Nasir, Majid

    2011-01-01

    Usability studies are important in today’s context. However, the increased security level of authentication systems is reducing the usability level. Thus, to provide secured but yet usable authentication systems is a challenge for researchers to solve till now. Learnability and human errors are influential factors of the usability of authentication systems. There are not many specific studies on the learnability and human errors concentrating on authentication systems. The authors’ aim of thi...

  12. The role of authenticity in electoral social media campaigns

    OpenAIRE

    Grow, Gabrielle; Ward, Janelle

    2013-01-01

    textabstractAuthenticity is a popular buzzword in electoral politics: Electoral candidates and politicians are expected to be authentic in their public interactions. Since 2008, campaigning via social media has become an integral part of elections in the United States, and continues to gain importance. In such an environment, this paper presents research into the role of authenticity in electoral social media campaigns. Using Gilpin, et al.'s (2010) definition of authenticity as the theoretic...

  13. Secure authentication of classical messages with single photons

    International Nuclear Information System (INIS)

    This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical. (general)

  14. The role of authenticity in electoral social media campaigns

    OpenAIRE

    Grow, Gabrielle; Ward, Janelle

    2013-01-01

    Authenticity is a popular buzzword in electoral politics: Electoral candidates and politicians are expected to be authentic in their public interactions. Since 2008, campaigning via social media has become an integral part of elections in the United States, and continues to gain importance. In such an environment, this paper presents research into the role of authenticity in social media electoral campaigns. Using Gilpin, et al.’s (2010) definition of authenticity as the theoretical bas...

  15. Final report LDRD project 105816 : model reduction of large dynamic systems with localized nonlinearities.

    Energy Technology Data Exchange (ETDEWEB)

    Lehoucq, Richard B.; Segalman, Daniel Joseph; Hetmaniuk, Ulrich L. (University of Washington, Seattle, WA); Dohrmann, Clark R.

    2009-10-01

    Advanced computing hardware and software written to exploit massively parallel architectures greatly facilitate the computation of extremely large problems. On the other hand, these tools, though enabling higher fidelity models, have often resulted in much longer run-times and turn-around-times in providing answers to engineering problems. The impediments include smaller elements and consequently smaller time steps, much larger systems of equations to solve, and the inclusion of nonlinearities that had been ignored in days when lower fidelity models were the norm. The research effort reported focuses on the accelerating the analysis process for structural dynamics though combinations of model reduction and mitigation of some factors that lead to over-meshing.

  16. Two dimensional point of use fuel cell : a final LDRD project report.

    Energy Technology Data Exchange (ETDEWEB)

    Zavadil, Kevin Robert; Hickner, Michael A. (Pennsylvania State University, University Park, PA); Gross, Matthew L. (Pennsylvania State University, University Park, PA)

    2011-03-01

    The Proliferation Assessment (program area - Things Thin) within the Defense Systems and Assessment Investment Area desires high energy density and long-lived power sources with moderate currents (mA) that can be used as building blocks in platforms for the continuous monitoring of chemical, biological, and radiological agents. Fuel cells can be an optimum choice for a power source because of the high energy densities that are possible with liquid fuels. Additionally, power generation and fuel storage can be decoupled in a fuel cell for independent control of energy and power density for customized, application-driven power solutions. Direct methanol fuel cells (DMFC) are explored as a possible concept to develop into ultrathin or two-dimensional power sources. New developments in nanotechnology, advanced fabrication techniques, and materials science are exploited to create a planar DMFC that could be co-located with electronics in a chip format. Carbon nanotubes and pyrolyzed polymers are used as building block electrodes - porous, mechanically compliant current collectors. Directed assembly methods including surface functionalization and layer-by-layer deposition with polyelectrolytes are used to pattern, build, and add functionality to these electrodes. These same techniques are used to incorporate nanoscale selective electrocatalyst into the carbon electrodes to provide a high density of active electron transfer sites for the methanol oxidation and oxygen reduction reactions. The resulting electrodes are characterized in terms of their physical properties, electrocatalytic function, and selectivity to better understand how processing impacts their performance attributes. The basic function of a membrane electrode assembly is demonstrated for several prototype devices.

  17. Final report : LDRD project 79824 carbon nanotube sorting via DNA-directed self-assembly.

    Energy Technology Data Exchange (ETDEWEB)

    Robinson, David B; Leung, Kevin; Rempe, Susan B.; Dossa, Paul D.; Frischknecht, Amalie Lucile; Martin, Marcus Gary

    2007-10-01

    Single-wall carbon nanotubes (SWNTs) have shown great promise in novel applications in molecular electronics, biohazard detection, and composite materials. Commercially synthesized nanotubes exhibit a wide dispersion of geometries and conductivities, and tend to aggregate. Hence the key to using these materials is the ability to solubilize and sort carbon nanotubes according to their geometric/electronic properties. One of the most effective dispersants is single-stranded DNA (ssDNA), but there are many outstanding questions regarding the interaction between nucleic acids and SWNTs. In this work we focus on the interactions of SWNTs with single monomers of nucleic acids, as a first step to answering these outstanding questions. We use atomistic molecular dynamics simulations to calculate the binding energy of six different nucleotide monophosphates (NMPs) to a (6,0) single-wall carbon nanotube in aqueous solution. We find that the binding energies are generally favorable, of the order of a few kcal/mol. The binding energies of the different NMPs were very similar in salt solution, whereas we found a range of binding energies for NMPs in pure water. The binding energies are sensitive to the details of the association of the sodium ions with the phosphate groups and also to the average conformations of the nucleotides. We use electronic structure (Density Functional Theory (DFT) and Moller-Plesset second order perturbation to uncorrelated Hartree Fock theory (MP2)) methods to complement the classical force field study. With judicious choices of DFT exchange correlation functionals, we find that DFT, MP2, and classical force field predictions are in qualitative and even quantitative agreement; all three methods should give reliable and valid predictions. However, in one important case, the interactions between ions and metallic carbon nanotubes--the SWNT polarization-induced affinity for ions, neglected in most classical force field studies, is found to be extremely large (on the order of electron volts) and may have important consequences for various SWNT applications. Finally, the adsorption of NMPs onto single-walled carbon nanotubes were studied experimentally. The nanotubes were sonicated in the presence of the nucleotides at various weight fractions and centrifuged before examining the ultraviolet absorbance of the resulting supernatant. A distinct Langmuir adsorption isotherm was obtained for each nucleotide. All of the nucleotides differ in their saturation value as well as their initial slope, which we attribute to differences both in nucleotide structure and in the binding ability of different types or clusters of tubes. Results from this simple system provide insights toward development of dispersion and separation methods for nanotubes: strongly binding nucleotides are likely to help disperse, whereas weaker ones may provide selectivity that may be beneficial to a separation process.

  18. Final report on LDRD project : narrow-linewidth VCSELs for atomic microsystems.

    Energy Technology Data Exchange (ETDEWEB)

    Chow, Weng Wah; Geib, Kent Martin; Peake, Gregory Merwin; Serkland, Darwin Keith

    2011-09-01

    Vertical-cavity surface-emitting lasers (VCSELs) are well suited for emerging photonic microsystems due to their low power consumption, ease of integration with other optical components, and single frequency operation. However, the typical VCSEL linewidth of 100 MHz is approximately ten times wider than the natural linewidth of atoms used in atomic beam clocks and trapped atom research, which degrades or completely destroys performance in those systems. This report documents our efforts to reduce VCSEL linewidths below 10 MHz to meet the needs of advanced sub-Doppler atomic microsystems, such as cold-atom traps. We have investigated two complementary approaches to reduce VCSEL linewidth: (A) increasing the laser-cavity quality factor, and (B) decreasing the linewidth enhancement factor (alpha) of the optical gain medium. We have developed two new VCSEL devices that achieved increased cavity quality factors: (1) all-semiconductor extended-cavity VCSELs, and (2) micro-external-cavity surface-emitting lasers (MECSELs). These new VCSEL devices have demonstrated linewidths below 10 MHz, and linewidths below 1 MHz seem feasible with further optimization.

  19. Geomechanics of penetration : experimental and computational approaches : final report for LDRD project 38718.

    Energy Technology Data Exchange (ETDEWEB)

    Hardy, Robert Douglas; Holcomb, David Joseph; Gettemy, Glen L.; Fossum, Arlo Frederick; Rivas, Raul R.; Bronowski, David R.; Preece, Dale S.

    2004-10-01

    The purpose of the present work is to increase our understanding of which properties of geomaterials most influence the penetration process with a goal of improving our predictive ability. Two primary approaches were followed: development of a realistic, constitutive model for geomaterials and designing an experimental approach to study penetration from the target's point of view. A realistic constitutive model, with parameters based on measurable properties, can be used for sensitivity analysis to determine the properties that are most important in influencing the penetration process. An immense literature exists that is devoted to the problem of predicting penetration into geomaterials or similar man-made materials such as concrete. Various formulations have been developed that use an analytic or more commonly, numerical, solution for the spherical or cylindrical cavity expansion as a sort of Green's function to establish the forces acting on a penetrator. This approach has had considerable success in modeling the behavior of penetrators, both as to path and depth of penetration. However the approach is not well adapted to the problem of understanding what is happening to the material being penetrated. Without a picture of the stress and strain state imposed on the highly deformed target material, it is not easy to determine what properties of the target are important in influencing the penetration process. We developed an experimental arrangement that allows greater control of the deformation than is possible in actual penetrator tests, yet approximates the deformation processes imposed by a penetrator. Using explosive line charges placed in a central borehole, we loaded cylindrical specimens in a manner equivalent to an increment of penetration, allowing the measurement of the associated strains and accelerations and the retrieval of specimens from the more-or-less intact cylinder. Results show clearly that the deformation zone is highly concentrated near the borehole, with almost no damage occurring beyond 1/2 a borehole diameter. This implies penetration is not strongly influenced by anything but the material within a diameter or so of the penetration. For penetrator tests, target size should not matter strongly once target diameters exceed some small multiple of the penetrator diameter. Penetration into jointed rock should not be much affected unless a discontinuity is within a similar range. Accelerations measured at several points along a radius from the borehole are consistent with highly-concentrated damage and energy absorption; At the borehole wall, accelerations were an order of magnitude higher than at 1/2 a diameter, but at the outer surface, 8 diameters away, accelerations were as expected for propagation through an elastic medium. Accelerations measured at the outer surface of the cylinders increased significantly with cure time for the concrete. As strength increased, less damage was observed near the explosively-driven borehole wall consistent with the lower energy absorption expected and observed for stronger concrete. As it is the energy absorbing properties of a target that ultimately stop a penetrator, we believe this may point the way to a more readily determined equivalent of the S number.

  20. Final report for LDRD Project 93633 : new hash function for data protection.

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, Timothy John; Dautenhahn, Nathan; Schroeppel, Richard Crabtree; Tolk, Keith Michael; Orman, Hilarie (PurpleStreak, Inc.); Walker, Andrea Mae; Malone, Sean; Lee, Eric; Neumann, William Douglas; Cordwell, William R.; Torgerson, Mark Dolan; Anderson, Eric; Lanzone, Andrew J.; Collins, Michael Joseph; McDonald, Timothy Scott; Caskey, Susan Adele

    2009-03-01

    The security of the widely-used cryptographic hash function SHA1 has been impugned. We have developed two replacement hash functions. The first, SHA1X, is a drop-in replacement for SHA1. The second, SANDstorm, has been submitted as a candidate to the NIST-sponsored SHA3 Hash Function competition.

  1. Enhanced Vapor-Phase Diffusion in Porous Media - LDRD Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Ho, C.K.; Webb, S.W.

    1999-01-01

    As part of the Laboratory-Directed Research and Development (LDRD) Program at Sandia National Laboratories, an investigation into the existence of enhanced vapor-phase diffusion (EVD) in porous media has been conducted. A thorough literature review was initially performed across multiple disciplines (soil science and engineering), and based on this review, the existence of EVD was found to be questionable. As a result, modeling and experiments were initiated to investigate the existence of EVD. In this LDRD, the first mechanistic model of EVD was developed which demonstrated the mechanisms responsible for EVD. The first direct measurements of EVD have also been conducted at multiple scales. Measurements have been made at the pore scale, in a two- dimensional network as represented by a fracture aperture, and in a porous medium. Significant enhancement of vapor-phase transport relative to Fickian diffusion was measured in all cases. The modeling and experimental results provide additional mechanisms for EVD beyond those presented by the generally accepted model of Philip and deVries (1957), which required a thermal gradient for EVD to exist. Modeling and experimental results show significant enhancement under isothermal conditions. Application of EVD to vapor transport in the near-surface vadose zone show a significant variation between no enhancement, the model of Philip and deVries, and the present results. Based on this information, the model of Philip and deVries may need to be modified, and additional studies are recommended.

  2. Authenticity is in the eye of the beholder. Beliefs and perceptions of authentic assessment and the influence on student learning.

    OpenAIRE

    Gulikers, Judith

    2007-01-01

    Gulikers, J.T.M. (2006). Authenticity is in the eye of the beholder. Beliefs and perceptions of authentic assessment and the influence on student learning. Unpublished doctoral dissertation. Open University of the Netherlands, The Netherlands.

  3. Toward Developing Authentic Leadership: Team-Based Simulations

    Science.gov (United States)

    Shapira-Lishchinsky, Orly

    2014-01-01

    Although there is a consensus that authentic leadership should be an essential component in educational leadership, no study to date has ever tried to find whether team-based simulations may promote authentic leadership. The purpose of this study was to identify whether principal trainees can develop authentic leadership through ethical decision…

  4. Minding the gap between communication skills simulation and authentic experience

    OpenAIRE

    Yardley, S; Irvine, AW; Lefroy, J

    2013-01-01

    CONTEXT: Concurrent exposure to simulated and authentic experiences during undergraduate medical education is increasing. The impact of gaps or differences between contemporaneous experiences has not been adequately considered. We address two questions. How do new undergraduate medical students understand contemporaneous interactions with simulated and authentic patients? How and why do student perceptions of differences between simulated and authentic patient interactions shape their learnin...

  5. A Research on the Consequences of Authentic Leadership

    OpenAIRE

    Akif Tabak; Mustafa Polat; Serkan Cosar; Tolga Turkoz

    2013-01-01

    The present study examined the relationship between employees' authentic leadership perceptions and three relevant authentic leadership consequences, organizational trust, organizational commitment and organizational cynicism. With 371 employees in a Turkish firm, correlation analysis results showed that authentic leadership perceptions of employees were positively related to organizational trust and organizational commitment, but was negatively related with organizational cynicism. Moreover,...

  6. Authentic Assessment for Student Learning: An Ontological Conceptualisation

    Science.gov (United States)

    Vu, Thuy T.; Dall'Alba, Gloria

    2014-01-01

    Authentic assessment has been proposed as having potential to enhance student learning for a changing world. Conventionally, assessment is seen to be authentic when the tasks are real-to-life or have real-life value. Drawing on Martin Heidegger's work, we challenge this conceptualisation as narrow and limited. We argue that authenticity need…

  7. Children's and Adolescents' Perception of the Authenticity of Smiles

    Science.gov (United States)

    Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula

    2009-01-01

    Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six…

  8. Robust authentication through stochastic femtosecond laser filament induced scattering surfaces

    Science.gov (United States)

    Zhang, Haisu; Tzortzakis, Stelios

    2016-05-01

    We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.

  9. Reconciling Divisions in the Field of Authentic Education

    Science.gov (United States)

    Sarid, Ariel

    2015-01-01

    The aim of this article is twofold: first, to identify and address three central divisions in the field of authentic education that introduce ambiguity and at times inconsistencies within the field of authentic education. These divisions concern a) the relationship between autonomy and authenticity; b) the division between the two basic attitudes…

  10. Quantum Dialogue with Authentication Based on Bell States

    Science.gov (United States)

    Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping

    2013-06-01

    We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.

  11. FY07 LDRD Final Report Neutron Capture Cross-Section Measurements at DANCE

    International Nuclear Information System (INIS)

    We have measured neutron capture cross sections intended to address defense science problems including mix and the Quantification of Margins and Uncertainties (QMU), and provide details about statistical decay of excited nuclei. A major part of this project included developing the ability to produce radioactive targets. The cross-section measurements were made using the white neutron source at the Los Alamos Neutron Science Center, the detector array called DANCE (The Detector for Advanced Neutron Capture Experiments) and targets important for astrophysics and stockpile stewardship. DANCE is at the leading edge of neutron capture physics and represents a major leap forward in capability. The detector array was recently built with LDRD money. Our measurements are a significant part of the early results from the new experimental DANCE facility. Neutron capture reactions are important for basic nuclear science, including astrophysics and the statistics of the γ-ray cascades, and for applied science, including stockpile science and technology. We were most interested in neutron capture with neutron energies in the range between 1 eV and a few hundred keV, with targets important to basic science, and the s-process in particular. Of particular interest were neutron capture cross-section measurements of rare isotopes, especially radioactive isotopes. A strong collaboration between universities and Los Alamos due to the Academic Alliance was in place at the start of our project. Our project gave Livermore leverage in focusing on Livermore interests. The Lawrence Livermore Laboratory did not have a resident expert in cross-section measurements; this project allowed us to develop this expertise. For many radionuclides, the cross sections for destruction, especially (n,γ), are not well known, and there is no adequate model that describes neutron capture. The modeling problem is significant because, at low energies where capture reactions are important, the neutron reaction

  12. FY07 LDRD Final Report Neutron Capture Cross-Section Measurements at DANCE

    Energy Technology Data Exchange (ETDEWEB)

    Parker, W; Agvaanluvsan, U; Wilk, P; Becker, J; Wang, T

    2008-02-08

    We have measured neutron capture cross sections intended to address defense science problems including mix and the Quantification of Margins and Uncertainties (QMU), and provide details about statistical decay of excited nuclei. A major part of this project included developing the ability to produce radioactive targets. The cross-section measurements were made using the white neutron source at the Los Alamos Neutron Science Center, the detector array called DANCE (The Detector for Advanced Neutron Capture Experiments) and targets important for astrophysics and stockpile stewardship. DANCE is at the leading edge of neutron capture physics and represents a major leap forward in capability. The detector array was recently built with LDRD money. Our measurements are a significant part of the early results from the new experimental DANCE facility. Neutron capture reactions are important for basic nuclear science, including astrophysics and the statistics of the {gamma}-ray cascades, and for applied science, including stockpile science and technology. We were most interested in neutron capture with neutron energies in the range between 1 eV and a few hundred keV, with targets important to basic science, and the s-process in particular. Of particular interest were neutron capture cross-section measurements of rare isotopes, especially radioactive isotopes. A strong collaboration between universities and Los Alamos due to the Academic Alliance was in place at the start of our project. Our project gave Livermore leverage in focusing on Livermore interests. The Lawrence Livermore Laboratory did not have a resident expert in cross-section measurements; this project allowed us to develop this expertise. For many radionuclides, the cross sections for destruction, especially (n,{gamma}), are not well known, and there is no adequate model that describes neutron capture. The modeling problem is significant because, at low energies where capture reactions are important, the neutron

  13. Development of efficient, integrated cellulosic biorefineries : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Teh, Kwee-Yan; Hecht, Ethan S.; Shaddix, Christopher R.; Buffleben, George M.; Dibble, Dean C.; Lutz, Andrew E.

    2010-09-01

    Cellulosic ethanol, generated from lignocellulosic biomass sources such as grasses and trees, is a promising alternative to conventional starch- and sugar-based ethanol production in terms of potential production quantities, CO{sub 2} impact, and economic competitiveness. In addition, cellulosic ethanol can be generated (at least in principle) without competing with food production. However, approximately 1/3 of the lignocellulosic biomass material (including all of the lignin) cannot be converted to ethanol through biochemical means and must be extracted at some point in the biochemical process. In this project we gathered basic information on the prospects for utilizing this lignin residue material in thermochemical conversion processes to improve the overall energy efficiency or liquid fuel production capacity of cellulosic biorefineries. Two existing pretreatment approaches, soaking in aqueous ammonia (SAA) and the Arkenol (strong sulfuric acid) process, were implemented at Sandia and used to generated suitable quantities of residue material from corn stover and eucalyptus feedstocks for subsequent thermochemical research. A third, novel technique, using ionic liquids (IL) was investigated by Sandia researchers at the Joint Bioenergy Institute (JBEI), but was not successful in isolating sufficient lignin residue. Additional residue material for thermochemical research was supplied from the dilute-acid simultaneous saccharification/fermentation (SSF) pilot-scale process at the National Renewable Energy Laboratory (NREL). The high-temperature volatiles yields of the different residues were measured, as were the char combustion reactivities. The residue chars showed slightly lower reactivity than raw biomass char, except for the SSF residue, which had substantially lower reactivity. Exergy analysis was applied to the NREL standard process design model for thermochemical ethanol production and from a prototypical dedicated biochemical process, with process data

  14. Analysis and Authenticity Investigations of Glass and Metallic Art Objects

    International Nuclear Information System (INIS)

    A suite of glass pieces of Art, and several metal-based corroded objects were studied in the frame of this project, which intends to accommodate two purposes; a) to investigate the feasibility of physico-chemical characterization of ancient glass by employing a non-widely used analytical technique, that of luminescence spectroscopy, along with conventionally used methods such as XRF and SEM-EDX, and b) to approach issues of counterfeiting of culturally-related iron and other metallic objects, by examining the features of their corrosion products, studied via a combination of the non-destructive RF-plasma treatment and the microscopic techniques. The results of the study show that luminescence measurements own diagnostic power that can aid substantially to the classifying and understanding of the manufacturing of ancient glass, particularly when bridged with longer-established analytical methods. Moreover, evident differences between corrosion layers of authentic metallic objects and of the ones created after artificial pre-corrosion, as ascertained by the plasma treatment and by microscopy (SEM or optical) study, provide a basis for suggesting such a combination of techniques for authenticity detection of corroded metallic objects with cultural heritage importance. (author)

  15. Image encryption and authentication. A fully digital approach

    International Nuclear Information System (INIS)

    Optical surveillance is one of the basic safeguards measures implemented by the IAEA. If it were possible to have the data carriers replaced and mailed to the IAEA by staff of the State System for Accounting and Control (SSAC) or by the facility operator or, ultimately have the data remotely transmitted to IAEA Headquarters, this would enable the frequency of on-site inspections to be reduced, since the surveillance information would still be available in a timely manner for evaluation at HQ. The IAEA needs to verify the authenticity of the data, whereas the facility operator will insist on the confidentiality of the data; i.e. a third party must not be able to make any use of the data transferred. The present development effort is concentrated on the appropriate camera electronics ensuring uninterrupted electronic authentication and encryption of the video signals from the camera up to the review station. The design concept is described, some crucial aspects are discussed, and the status and perspectives of the project reported. (author). 4 refs, 2 figs

  16. What Do You Mean by "Authentic"? A Comparative Review of the Literature on Conceptions of Authenticity in Teaching

    Science.gov (United States)

    Kreber, Carolin; Klampfleitner, Monika; McCune, Velda; Bayne, Sian; Knottenbelt, Miesbeth

    2007-01-01

    "Authenticity in teaching" has been recognized as an important yet under-researched phenomenon. To gain greater insight into the meaning of authenticity in teaching in adult and higher education settings, the authors delved into some of the philosophical and educational literature on authenticity, giving particular attention, but not confining…

  17. Stamp Verification for Automated Document Authentication

    DEFF Research Database (Denmark)

    Micenková, Barbora; van Beusekom, Joost; Shafait, Faisal

    Stamps, along with signatures, can be considered as the most widely used extrinsic security feature in paper documents. In contrast to signatures, however, for stamps little work has been done to automatically verify their authenticity. In this paper, an approach for verification of color stamps is...

  18. Rugged Practices: Embodying Authenticity in Outdoor Recreation

    Science.gov (United States)

    Senda-Cook, Samantha

    2012-01-01

    When people recreate outdoors, they value the quality of the experience. This study examines rhetorical practices that sustain or undermine perceived authentic outdoor recreation experiences. I conducted a rhetorical analysis of my fieldnotes gathered through participant observation and interview transcripts of online and in-person interviews. I…

  19. FAST PALMPRINT AUTHENTICATION BY SOBEL CODE METHOD

    Directory of Open Access Journals (Sweden)

    Jyoti Malik

    2011-05-01

    Full Text Available The ideal real time personal authentication system should be fast and accurate to automatically identify a person’s identity. In this paper, we have proposed a palmprint based biometric authentication method with improvement in time and accuracy, so as to make it a real time palmprint authentication system. Several edge detection methods, wavelet transform, phase congruency etc. are available to extract line feature from the palmprint. In this paper, Multi-scale Sobel Code operators of different orientations (0?, 45?, 90?, and 135? are applied to the palmprint to extract Sobel-Palmprint features in different direc- tions. The Sobel-Palmprint features extracted are stored in Sobel- Palmprint feature vector and matched using sliding window with Hamming Distance similarity measurement method. The sliding win- dow method is accurate but time taking process. In this paper, we have improved the sliding window method so that the matching time reduces. It is observed that there is 39.36% improvement in matching time. In addition, a Min Max Threshold Range (MMTR method is proposed that helps in increasing overall system accuracy by reducing the False Acceptance Rate (FAR. Experimental results indicate that the MMTR method improves the False Acceptance Rate drastically and improvement in sliding window method reduces the comparison time. The accuracy improvement and matching time improvement leads to proposed real time authentication system.

  20. Supporting Authentic Learning Contexts Beyond Classroom Walls

    Science.gov (United States)

    Herrington, Jan; Specht, Marcus; Brickell, Gwyn; Harper, Barry

    At the classroom level, contexts for learning are often limited in the experiential component. Teachers and trainers feel overwhelmed by the difficulty of inventing authentic learning contexts, and creating tasks that truly reflect the way knowledge would be used in the real world (Herrington et al. 2004). However, there are growing numbers of examples of how such authentic learning environments are being used in schools, higher education, and professional development in a variety of contexts and discipline areas, such as in literacy education (Ferry et al. 2006), in physical activity fitness and health (Rice et al. 1999), in Indigenous education (Marshall et al. 2001), in evaluation (Agostinho 2006), in multimedia and ICT (Bennett et al. 2001), in literature (Fitzsimmons 2006), and in business writing (Pennell et al. 1997). Teachers and trainers who subscribe to this approach to learning can be very inventive in developing learner perceptions of authentic contexts, but often financial, situational and time constraints limit the experiential elements of authentic learning settings.

  1. Forensics: Food Authentication Using MtDNA

    OpenAIRE

    Chandrika Murugaiah

    2015-01-01

    There is a clear trend in the food international market towards labelling products with information about their composition and quality. Due to the increase in international trade in seafood and seafood products, authentication has become a necessity. There is a need for suitable methods of identification to ensure compliance with the labelling regulations and thereby to prevent the substitution of fish species.

  2. Two-Factor Cancelable Biometrics Authenticator

    Institute of Scientific and Technical Information of China (English)

    Ying-Han Pang; Andrew T. B. J; David N. C. L

    2007-01-01

    Biometrics-based authentication system offers advantages of providing high reliability and accuracy.However,the contemporary authentication system is impuissance to compromise.If a biometrics data is compromised, it cannot be replaced and rendered unusable.In this paper, a cancelable biometrics-based authenticator is proposed to solve this irrevocability issue.The proposed approach is a two-factor authentication system, which requires both of the random data and facial feature in order to access the system.In this system, tokenized pseudo-random data is coupled with moment-based facial feature via inner product algorithm.The output of the product is then discretized to generate a set of private binary code, coined as 2factor-Hashing code, which is acted as verification key.If this biometrics-based verification key is compromised, a new one can be issued by replacing a different set of random number via token replacement.Then, the compromised one is rendered completely useless.This feature offers an extra protection layer against biometrics fabrication since the verification code is replaceable.Experimental results demonstrate that the proposed system provides zero Equal Error Rate in which there is a clear separation in between the genuine and the imposter distribution populations.

  3. Smartphone Sensors for Stone Lithography Authentication

    Directory of Open Access Journals (Sweden)

    Giuseppe Schirripa Spagnolo

    2014-05-01

    Full Text Available Nowadays mobile phones include quality photo and video cameras, access to wireless networks and the internet, GPS assistance and other innovative systems. These facilities open them to innovative uses, other than the classical telephonic communication one. Smartphones are a more sophisticated version of classic mobile phones, which have advanced computing power, memory and connectivity. Because fake lithographs are flooding the art market, in this work, we propose a smartphone as simple, robust and efficient sensor for lithograph authentication. When we buy an artwork object, the seller issues a certificate of authenticity, which contains specific details about the artwork itself. Unscrupulous sellers can duplicate the classic certificates of authenticity, and then use them to “authenticate” non-genuine works of art. In this way, the buyer will have a copy of an original certificate to attest that the “not original artwork” is an original one. A solution for this problem would be to insert a system that links together the certificate and the related specific artwork. To do this it is necessary, for a single artwork, to find unique, unrepeatable, and unchangeable characteristics. In this article we propose an innovative method for the authentication of stone lithographs. We use the color spots distribution captured by means of a smartphone camera as a non-cloneable texture of the specific artworks and an information management system for verifying it in mobility stone lithography.

  4. Elemental Scanning Devices Authenticate Works of Art

    Science.gov (United States)

    2013-01-01

    To better detect aluminum compounds, Marshall Space Flight Center partnered with KeyMaster Inc. (later acquired by Madison, Wisconsin-based Bruker AXS Inc.) to develop a vacuum pump system that could be attached to X-ray fluorescence (XRF) scanners. The resulting technology greatly expanded XRF scanner capabilities, and hundreds of museums now use them to authenticate artifacts and works of art.

  5. Authentic Scientific Inquiry and School Science

    Science.gov (United States)

    Hume, Anne

    2009-01-01

    Scientific literacy goals feature strongly in the rhetoric of most forward-looking science curricula. Many science educators believe that a key means of attaining these goals is through the engagement of students in "authentic scientific inquiry". For students to experience such learning it is critical that teachers understand and appreciate what…

  6. Progress in authentication of food and wine

    Science.gov (United States)

    Authentication of foods, wines and beverages for varietal, country- (or region-) of-origin, and processing conditions is becoming of increasing concern to consumers and regulators both in the U.S. and internationally. As markets become more globalized and foods and beverages are sourced from many lo...

  7. Towards an ethics of authentic practice.

    Science.gov (United States)

    Murray, Stuart J; Holmes, Dave; Perron, Amélie; Rail, Geneviève

    2008-10-01

    This essay asks how we might best elaborate an ethics of authentic practice. Will we be able to agree on a set of shared terms through which ethical practice will be understood? How will we define ethics and the subject's relation to authoritative structures of power and knowledge? We begin by further clarifying our critique of evidence-based medicine (EBM), reflecting on the intimate relation between theory and practice. We challenge the charge that our position amounts to no more than 'subjectivism' and 'antiauthoritarian' theory. We argue that an ethical practice ought to question the authority of EBM without falling into the trap of dogmatic antiauthoritarianism. In this, we take up the work of Hannah Arendt, who offers terms to help understand our difficult political relation to authority in an authentic ethical practice. We continue with a discussion of Michel Foucault's use of 'free speech' or parrhesia, which he adopts from Ancient Greek philosophy. Foucault demonstrates that authentic ethical practice demands that we 'speak truth to power.' We conclude with a consideration of recent biotechnologies, and suggest that these biomedical practices force us to re-evaluate our theoretical understanding of the ethical subject. We believe that we are at a crucial juncture: we must develop an ethics of authentic practice that will be commensurable with new and emergent biomedical subjectivities. PMID:19018894

  8. HANDWRITTEN TEXT IMAGE AUTHENTICATION USING BACK PROPAGATION

    Directory of Open Access Journals (Sweden)

    A S N Chakravarthy

    2011-10-01

    Full Text Available Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involveconfirming the identity of a person, tracing the origins of an artefact, ensuring that a product is whatit’s packaging and labelling claims to be, or assuring that a computer program is a trusted one. Theauthentication of information can pose special problems (especially man-in-the-middle attacks, and isoften wrapped up with authenticating identity. Literary can involve imitating the style of a famous author.If an original manuscript, typewritten text, or recording is available, then the medium itself (or itspackaging - anything from a box to e-mail headers can help prove or disprove the authenticity of thedocument. The use of digital images of handwritten historical documents has become more popular inrecent years. Volunteers around the world now read thousands of these images as part of theirindexing process. Handwritten text images of old documents are sometimes difficult to read or noisy dueto the preservation of the document and quality of the image [1]. Handwritten text offers challenges thatare rarely encountered in machine-printed text. In addition, most problems faced in reading machineprintedtext (e.g., character recognition, word segmentation, letter segmentation, etc. are more severe, inhandwritten text. In this paper we Here in this paper we proposed a method for authenticating handwritten text images using back propagation algorithm..

  9. ASSORTED DIRECTIONS OF AUTHENTICATION IN BIOMETRIC SYSTEMS

    OpenAIRE

    Shambhu Prasad Sah*, Purushottam Das, Himanshu Pant, Ankur Singh Bist

    2016-01-01

    Biometrics refers to a way of authentication in the world of computer security using various metrics linked to human characteristics. It is used for access control and recognition of individuals. This paper provides the working of Biometrics System, description of its various features and various biometrics methods used in digital world of computer.  

  10. Handwritten Text Image Authentication using Back Propagation

    CERN Document Server

    Chakravarthy, A S N; Avadhani, P S

    2011-01-01

    Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle attacks), and is often wrapped up with authenticating identity. Literary can involve imitating the style of a famous author. If an original manuscript, typewritten text, or recording is available, then the medium itself (or its packaging - anything from a box to e-mail headers) can help prove or disprove the authenticity of the document. The use of digital images of handwritten historical documents has become more popular in recent years. Volunteers around the world now read thousands of these images as part of their indexing process. Handwritten text images of old documents are sometimes difficult to read or noisy du...

  11. Authenticity in learning game: how it is designed and perceived

    OpenAIRE

    Gonçalves, Celso; Croset, Marie-Caroline; Ney, Muriel; Balacheff, Nicolas; Bosson, Jean-Luc

    2010-01-01

    A key concern in game-based learning is the level of authenticity games require in order to match what learners can expect in the real world, what keeps them engaged in the game, and what they need to learn. We examined authenticity or credibility in a game from the learner’s perspective. There are very few studies on this aspect. We propose that authenticity is the result of a compromise between external authenticity (perceived likeness with real life reference), internal authenticity (perce...

  12. User Authentication with Provable Security against Online Dictionary Attacks

    Directory of Open Access Journals (Sweden)

    Yongzhong He

    2009-05-01

    Full Text Available Dictionary attacks are the best known threats on the password-based authentication schemes. Based on Reverse Turing Test (RTT, some usable and scalable authentication schemes are proposed to defeat online dictionary attacks mounted by automated programs. However it is found that these authentication schemes are vulnerable to various online dictionary attacks. In this paper, a practical decision function is presented, based on which RTT authentication schemes are constructed and shown to be secure against all the known online dictionary attacks. After formally modeling of the adversary, the static and dynamic security of the authentication schemes are proved formally.

  13. Authentication and Authorization in Server Systems for Bio-Informatics

    CERN Document Server

    Madhuri, K Lakshmi

    2010-01-01

    Authentication and authorization are two tightly coupled and interrelated concepts which are used to keep transactions secure and help in protecting confidential information. This paper proposes to evaluate the current techniques used for authentication and authorization also compares them with the best practices and universally accepted authentication and authorization methods. Authentication verifies user identity and provides reusable credentials while authorization services stores information about user access levels. These mechanisms by which a system checks what level of access a particular authenticated user should have to view secure resources is controlled by the system

  14. Authenticity and integrity of digital mammography images.

    Science.gov (United States)

    Zhou, X Q; Huang, H K; Lou, S L

    2001-08-01

    Data security becomes more and more important in telemammography which uses a public high-speed wide area network connecting the examination site with the mammography expert center. Generally, security is characterized in terms of privacy, authenticity and integrity of digital data. Privacy is a network access issue and is not considered in this paper. We present a method, authenticity and integrity of digital mammography, here which can meet the requirements of authenticity and integrity for mammography image (IM) transmission. The authenticity and integrity for mammography (AIDM) consists of the following four modules. 1) Image preprocessing: To segment breast pixels from background and extract patient information from digital imaging and communication in medicine (DICOM) image header. 2) Image hashing: To compute an image hash value of the mammogram using the MD5 hash algorithm. 3) Data encryption: To produce a digital envelope containing the encrypted image hash value (digital signature) and corresponding patient information. 4) Data embedding: To embed the digital envelope into the image. This is done by replacing the least significant bit of a random pixel of the mammogram by one bit of the digital envelope bit stream and repeating for all bits in the bit stream. Experiments with digital IMs demonstrate the following. 1) In the expert center, only the user who knows the private key can open the digital envelope and read the patient information data and the digital signature of the mammogram transmitted from the examination site. 2) Data integrity can be verified by matching the image hash value decrypted from the digital signature with that computed from the transmitted image. 3) No visual quality degradation is detected in the embedded image compared with the original. Our preliminary results demonstrate that AIDM is an effective method for image authenticity and integrity in telemammography application. PMID:11513029

  15. Authentic Italian food as Mamma used to make it

    DEFF Research Database (Denmark)

    d'Ambrosio, Luigi; Madsen, Jan Halberg

    2014-01-01

    Research description and purpose: The purpose of this investigation is to explore how Italian restaurants define authentic Italian culinary experiences and how these experiences are designed and rendered to the restaurants’ guests. Design/Methodology: The purpose of this research is exploratory....... Qualitative in-depth semi-structured interviews have been conducted with five Italian restaurants in Aalborg, Denmark. The researchers follow an interpretivistic and social-constructivistic stance. The qualitative interviews take the point of departure in Gilmore and Pine’s (2007) five genres of authenticity......, namely: natural authenticity, original authenticity, exceptional authenticity, referential authenticity, and influential authenticity. Research limitations/implications: This research focuses on the supply side and does not include an investigation of the guests’ experience. The results of this research...

  16. Behavioural Biometrics and Cognitive Security Authentication Comparison Study

    Directory of Open Access Journals (Sweden)

    Karan Khare

    2013-11-01

    Full Text Available Behaviouralbiometrics is a scientific study with the primary purpose of identifying the authenticity of auser based on the way they interact with an authentication mechanism. While Association based passwordauthentication is a cognitive model of authentication system.The work done shows the implementation of Keyboard Latency technique for Authentication,implementation of Association Based Password authentication and comparison among two. There areseveral forms of behavioural biometrics such as voice analysis, signature verification, and keystrokedynamics. In this study, evidence is presented indicating that keystroke dynamics is a viable method notonly for user verification, but also for identification as well. The work presented in this model borrowsideas from the bioinformatics literature such as position specific scoring matrices (motifs and multiplesequence alignments to provide a novel approach to user verification and identification within the contextof a keystroke dynamics based user authentication system. Similarly Cognitive approach can be defined inmany ways of which one is association based Technique for authentication

  17. CPK-based grid authentication: a step forward

    Institute of Scientific and Technical Information of China (English)

    WANG Hai-yan; WANG Ru-chuan

    2007-01-01

    Effective grid authentication plays a critical role in grid security, which has been recognized as a key issue in the designing and extension of grid technologies. At present, public key infrastructure (PKI) has been widely applied for grid authentication, and this article proposes a novel grid authentication mechanism, which is based on combined public key (CPK) employing elliptic curve cryptography (ECC). The designing structure of the new grid authentication mechanism and its implementation procedure are described in details.Property analysis of the new mechanism is also made in comparison with that of the globus security infrastructure (GSI) authentication, which leads to the conclusion that CPK-based grid authentication, may be applied as an optimized approach towards efficient and effective grid authentication.

  18. Perceived Authenticity of the Visitor Experience in Museums

    DEFF Research Database (Denmark)

    Hede, Anne-Marie; Garma, Romana; Josiassen, Alexander;

    2014-01-01

    Purpose -This paper aims to investigate the authenticity concept and its antecedents and consequences within the context of museums. Design/methodology/approach - A higher-order scale of authenticity is developed and then tested for reliability and validity using a sample of museum visitors....... To investigate authenticity in a model with two antecedents and two outcomes, an additional data set was collected. Hypotheses were tested using structural equation modelling. Findings -The results show that perceived authenticity of the museum, the visitor and the materials in the museum are dimensions...... of perceived authenticity, resonating with Bal's (1996) research in this area. Findings also confirm that consumer scepticism and expectations are antecedents to perceived authenticity of the visitor experience in museums, and that perceived authenticity in turn affects visitor satisfaction and perceived...

  19. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  20. Kierkegaard and Sartre on God and Authenticity

    Directory of Open Access Journals (Sweden)

    Amirabbas Alizamani

    2014-09-01

    Full Text Available To evaluate and judge the notion of humanity, one has to use logic and logical criteria, since every notion's delimitation in logic requires an exact definition to be offered. And it is by definition that one can distinguish between one particular notion or extension and other notions and extensions. Different definitions have been suggested of the nature of humanity throughout the history of ideas every one of which casts light on an aspect of human existence. The intricate and deep nature of human being may have been the main obstacle in the way to an exact definition of human being. The past masters have defined man as a rational animal; i.e. man is inside the family of animals but an animal that have the power of thinking. Human rationality is not merely a matter of speaking, but rather it covers his all internal and external aspects. Since man is consisted of mind and body. Contemporary thinkers have left behind the traditional definition of man and approached him from different perspectives. In any case, what is important for us is human being's humanity.    On the other hand, the notion of humanity has always had an inseparable relationship with ethics. Needless to say, moral rules and maxims comprise a set of determinate oughts and ought-nots which should be adopted and followed by every human individual if s/he seeks to reach happiness. These moral rules are sometimes associated with religious and divine concepts which include a faith background and sometimes they go shoulder to shoulder with the rational rules where there is no occasion for extra-rational elements. One of the fundamental notions of ethics is authenticity, or to put it otherwise, how a man is authentic? What are the criteria of an authentic man? Authenticity can be verbally analyzed to the following notions: Authenticity in the sense of having a determinate family background. Authenticity in the sense of having a steady and impenetrable structure Authenticity in the

  1. The Carpenteria reservoir redevelopment project

    Energy Technology Data Exchange (ETDEWEB)

    Kendall, R.P.; Whitney, E.M.; Krogh, K.E. [Los Alamos National Lab., NM (United States); Coombs, S. [Pacific Operators Offshore, Inc., Carpinteria, CA (United States); Paul, R.G. [Dept. of the Interior (United States); Voskanian, M.M. [California State Lands Commission, Sacramento, CA (United States); Ershaghi, I. [University of Southern California, Los Angeles, CA (United States)

    1997-08-01

    This is the final report of a one-year, Laboratory Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). The objective of this project was to develop a simulation-based reservoir management system that could be used to guide the redevelopment of the Carpenteria Offshore Field, which is located just seven miles from Santa Barbara. The system supports geostatistical and geological modeling and reservoir forecasting. Moreover, it is also a shared resource between the field operator, Pacific Operators Offshore, and the mineral owners, the U.S. Department of the Interior and the State of California.

  2. Bioagent detection using miniaturized NMR and nanoparticle amplification : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Clewett, C. F. M.; Adams, David Price; Fan, Hongyou; Williams, John D.; Sillerud, Laurel O.; Alam, Todd Michael; Aldophi, Natalie L. (New Mexico Resonance, Albuquerque, NM); McDowell, Andrew F. (New Mexico Resonance, Albuquerque, NM)

    2006-11-01

    This LDRD program was directed towards the development of a portable micro-nuclear magnetic resonance ({micro}-NMR) spectrometer for the detection of bioagents via induced amplification of solvent relaxation based on superparamagnetic nanoparticles. The first component of this research was the fabrication and testing of two different micro-coil ({micro}-coil) platforms: namely a planar spiral NMR {micro}-coil and a cylindrical solenoid NMR {micro}-coil. These fabrication techniques are described along with the testing of the NMR performance for the individual coils. The NMR relaxivity for a series of water soluble FeMn oxide nanoparticles was also determined to explore the influence of the nanoparticle size on the observed NMR relaxation properties. In addition, The use of commercially produced superparamagnetic iron oxide nanoparticles (SPIONs) for amplification via NMR based relaxation mechanisms was also demonstrated, with the lower detection limit in number of SPIONs per nanoliter (nL) being determined.

  3. Transmissive infrared frequency selective surfaces and infrared antennas : final report for LDRD 105749.

    Energy Technology Data Exchange (ETDEWEB)

    Wendt, Joel Robert; Hadley, G. Ronald; Samora, Sally; Loui, Hung; Cruz-Cabrera, Alvaro Augusto; Davids, Paul; Kemme, Shanalyn A.; Basilio, Lorena I.; Johnson, William Arthur; Peters, David William

    2009-09-01

    Plasmonic structures open up new opportunities in photonic devices, sometimes offering an alternate method to perform a function and sometimes offering capabilities not possible with standard optics. In this LDRD we successfully demonstrated metal coatings on optical surfaces that do not adversely affect the transmission of those surfaces at the design frequency. This technology could be applied as an RF noise blocking layer across an optical aperture or as a method to apply an electric field to an active electro-optic device without affecting optical performance. We also demonstrated thin optical absorbers using similar patterned surfaces. These infrared optical antennas show promise as a method to improve performance in mercury cadmium telluride detectors. Furthermore, these structures could be coupled with other components to lead to direct rectification of infrared radiation. This possibility leads to a new method for infrared detection and energy harvesting of infrared radiation.

  4. Secure Strokes – A Security Mechanism for Authentication in Mobile Devices using User’s Behavioral Pattern of Keystrokes Dynamics with Visual Cues

    OpenAIRE

    Pallavica Sahoo; Prithumit Deb

    2011-01-01

    The aim is to develop a security system for mobile devices that eliminates the vulnerability of PIN (4-digit) security and which reduces the high end configuration and memory space requirements of biometrics security. The issues that we will be handling in the project work is the vulnerability of PIN security in mobile devices and providing an extra layer of security through Key Strokes Dynamics based authentication system. Also the problem of authentication error rates while using natural us...

  5. Quantum Cascade Lasers (QCLs) for standoff explosives detection : LDRD 138733 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Theisen, Lisa Anne; Linker, Kevin Lane

    2009-09-01

    Continued acts of terrorism using explosive materials throughout the world have led to great interest in explosives detection technology, especially technologies that have a potential for remote or standoff detection. This LDRD was undertaken to investigate the benefit of the possible use of quantum cascade lasers (QCLs) in standoff explosives detection equipment. Standoff detection of explosives is currently one of the most difficult problems facing the explosives detection community. Increased domestic and troop security could be achieved through the remote detection of explosives. An effective remote or standoff explosives detection capability would save lives and prevent losses of mission-critical resources by increasing the distance between the explosives and the intended targets and/or security forces. Many sectors of the US government are urgently attempting to obtain useful equipment to deploy to our troops currently serving in hostile environments. This LDRD was undertaken to investigate the potential benefits of utilizing quantum cascade lasers (QCLs) in standoff detection systems. This report documents the potential opportunities that Sandia National Laboratories can contribute to the field of QCL development. The following is a list of areas where SNL can contribute: (1) Determine optimal wavelengths for standoff explosives detection utilizing QCLs; (2) Optimize the photon collection and detection efficiency of a detection system for optical spectroscopy; (3) Develop QCLs with broader wavelength tunability (current technology is a 10% change in wavelength) while maintaining high efficiency; (4) Perform system engineering in the design of a complete detection system and not just the laser head; and (5) Perform real-world testing with explosive materials with commercial prototype detection systems.

  6. Main group adducts of carbon dioxide and related chemistry (LDRD 149938).

    Energy Technology Data Exchange (ETDEWEB)

    Barry, Brian M. (University of New Mexico, Albuquerque, NM); Kemp, Richard Alan; Stewart, Constantine A.; Dickie, Diane A. (University of New Mexico, Albuquerque, NM)

    2010-11-01

    This late-start LDRD was broadly focused on the synthetic attempts to prepare novel ligands as complexing agents for main group metals for the sequestration of CO{sub 2}. In prior work we have shown that certain main group (p block elements) metals such as tin and zinc, when ligated to phosphinoamido- ligands, can bind CO{sub 2} in a novel fashion. Rather than simple insertion into the metal-nitrogen bonds to form carbamates, we have seen the highly unusual complexation of CO{sub 2} in a mode that is more similar to a chemical 'adduct' rather than complexation schemes that have been observed previously. The overarching goal in this work is to prepare more of these complexes that can (a) sequester (or bind) CO{sub 2} easily in this adduct form, and (b) be stable to chemical or electrochemical reduction designed to convert the CO{sub 2} to useful fuels or fuel precursors. The currently used phosphinoamido- ligands appear at this point to be less-stable than desired under electrochemical reduction conditions. This instability is believed due to the more delicate, reactive nature of the ligand framework system. In order to successfully capture and convert CO{sub 2} to useful organics, this instability must be addressed and solved. Work described in the late-start LDRD was designed to screen a variety of ligand/metal complexes that a priori are believed to be more stable to polar solvents and possible mild hydrolytic conditions than are the phosphinoamido-ligands. Results from ligand syntheses and metal complexation studies are reported.

  7. Location-assured, multifactor authentication on smartphones via LTE communication

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.

  8. Graphical User Authentication for E-Transaction

    Directory of Open Access Journals (Sweden)

    Dr. Manish Manoria

    2012-10-01

    Full Text Available The most common computer authentication method is to usealphanumerical usernames and passwords. This method has beenshown to have significant drawbacks. A graphical based password isone promising alternatives of textual passwords. According to humanpsychology, humans are able to remember pictures easily. Recently,E-transactions have become an important tool to carry out financialtransactions besides the orthodox banking transactions. They areincreasingly being used to make payments, access bank accounts andfacilitate other commercial transactions. In view of their increasedimportance there is a compelling need to establish ways toauthenticate user during E-transactions. In this paper, we haveproposed a new hybrid graphical password based system, which is acombination of recognition and recall based techniques that offersmany advantages over the orthodox authentication system and maybe more convenient for the user. Our scheme is resistant to Phishingattack and many other attacks on graphical passwords. This scheme isproposed for E-transactions used to make payments and commercialtransactions etc.

  9. User Authentication Based On Keystroke Dynamics

    Directory of Open Access Journals (Sweden)

    J.R Nisha

    2014-03-01

    Full Text Available The most common way to enforce access control is user authentication based on username and password. This form of access control has many flaws which make it vulnerable to hacking. Biometric authentication such as the keystroke dynamics is used in which the keyboard is used in order to identify users. Then the classifier is tailored to each user to find out whether the given user is genuine or not. The contribution of this approach is twofold: first it reduces the possibility of over fitting second it allows scalability to a high volume of users. Here, measured mean, median values, and standard deviation of keystroke features such as latency, dwell time, digraph and their combination are used. The algorithms used for feature subset selection are Particle Swarm Optimization (PSO, Genetic Algorithm (GA, Ant Colony Optimization (ACO and the proposed Renovated Artificial Bee Colony Optimization (RABCO algorithm. Back Propagation Neural Network (BPNN is used for classification.

  10. Image Content Authentication Using Pinned Sine Transform

    Directory of Open Access Journals (Sweden)

    Anthony T. S. Ho

    2004-10-01

    Full Text Available Digital image content authentication addresses the problem of detecting any illegitimate modification on the content of images. To cope with this problem, a novel semifragile watermarking scheme using the pinned sine transform (PST is presented in this paper. The watermarking system can localize the portions of a watermarked image that have been tampered maliciously with high accuracy as well as approximately recover it. In particular, the watermarking scheme is very sensitive to any texture alteration in the watermarked images. The interblock relationship introduced in the process of PST renders the watermarking scheme resistant to content cutting and pasting attacks. The watermark can still survive slight nonmalicious manipulations, which is desirable in some practical applications such as legal tenders. Simulation results demonstrated that the probability of tamper detection of this authentication scheme is higher than 98%, and it is less sensitive to legitimate image processing operations such as compression than that of the equivalent DCT scheme.

  11. The Authenticated Tracking and Monitoring System (ATMS)

    International Nuclear Information System (INIS)

    The Authenticated Tracking and Monitoring System (ATMS) has been designed to address the need for global monitoring of the status and location of proliferation-sensitive items. Conceived to utilize the proposed Global Verification and Location System (GVLS) satellite link, ATMS could use the existing International Maritime Satellite commercial communication system until GVLS is operational. The ATMS concept uses sensor packs to monitor items and environmental conditions, collects a variety of event data through a sensor processing unit, and transmits the data to a satellite, which then sends data to ground stations. Authentication and encryption algorithms will be used to secure the data. A typical ATMS application would be to track and monitor the safety and security of a number of items in transit along a scheduled shipping route. This paper also discusses a proof-of-concept system demonstration

  12. Trace element ink spiking for signature authentication

    International Nuclear Information System (INIS)

    Signature authentication is a critical question in forensic document examination. Last years the evolution of personal computers made signature copying a quite easy task, so the development of new ways for signature authentication is crucial. In the present work a commercial ink was spiked with many trace elements in various concentrations. Inorganic and organometallic ink soluble compounds were used as spiking agents, whilst ink retained its initial properties. The spiked inks were used for paper writing and the documents were analyzed by a non destructive method, the energy dispersive X-ray fluorescence. The thin target model was proved right for quantitative analysis and a very good linear relationship of the intensity (X-ray signal) against concentration was estimated for all used elements. Intensity ratios between different elements in the same ink gave very stable results, independent on the writing alterations. The impact of time both to written document and prepared inks was also investigated. (author)

  13. Comment on 'Quantum direct communication with authentication'

    International Nuclear Information System (INIS)

    Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305 (2006)] were recently proposed by Lee, Lim, and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message. The first protocol can be eavesdropped on by Trent using the intercept-measure-resend attack, while the second protocol can be eavesdropped on by Trent using a simple single-qubit measurement. To fix these leaks, we revise the original versions of the protocols by using the Pauli Z operation σz instead of the original bit-flip operation X. As a consequence, the attacks we present can be prevented and accordingly the protocol securities are improved

  14. A nuclear method to authenticate Buddha images

    Science.gov (United States)

    Khaweerat, S.; Ratanatongchai, W.; Channuie, J.; Wonglee, S.; Picha, R.; Promping, J.; Silva, K.; Liamsuwan, T.

    2015-05-01

    The value of Buddha images in Thailand varies dramatically depending on authentication and provenance. In general, people use their individual skills to make the justification which frequently leads to obscurity, deception and illegal activities. Here, we propose two non-destructive techniques of neutron radiography (NR) and neutron activation autoradiography (NAAR) to reveal respectively structural and elemental profiles of small Buddha images. For NR, a thermal neutron flux of 105 n cm-2s-1 was applied. NAAR needed a higher neutron flux of 1012 n cm-2 s-1 to activate the samples. Results from NR and NAAR revealed unique characteristic of the samples. Similarity of the profile played a key role in the classification of the samples. The results provided visual evidence to enhance the reliability of authenticity approval. The method can be further developed for routine practice which impact thousands of customers in Thailand.

  15. The Authentication Techniques in Distributed E-Learning between Universities in Avicenna Virtual Campus Network

    OpenAIRE

    Amjad Mahfouth

    2012-01-01

    E-Learning become the most used and popular teaching method in universities with availability of E-learning tools and techniques, development of technology communications and networks. In this paper we will propose authentication techniques between universities in Avicenna Virtual Campus Project in Euro Mid Infrastructure Network. These universities are sharing a resources to support the E-learning System between them, since the universities are usually isolated graphically in the world. The ...

  16. Authentication system deployment throughout protected access (UTM) for the Wireless Network in a hotel chain

    OpenAIRE

    Escolà Henke, Jean Miquel

    2011-01-01

    A Hotel chain distributed over Europe wishes to provide wireless access to Internet for the hosted customers and offer an integral security through a Unified Threat Management ( UTM ) The project will consist; in one hand, based on the customer's needs, on adding a wireless access, with a captive portal authentication centralized at our company being able to manage users as well as the wireless networks remotely. On the other hand, the securization and management of the communication li...

  17. Authentication of shankhpushpi by RAPD markers

    Directory of Open Access Journals (Sweden)

    Showkat Hussain Ganie

    2012-05-01

    Full Text Available Background: “Shankhpushpi”, an important indigenous drug of Ayurveda, an ancient system of Indian medicine, improves memory power and intellect. It is used in many Ayurvedic formulations, either singly or in combination with other herbs, meant for sleeplessness, epilepsy, hallucinations and anxiety. At least three different plant species viz., Clitoria ternatea, Convolvulus pluricaulis and Evolvulus alsinoides are as the source of this drug in the different parts of the country. Because of increased demand and high price, shankhpushpi is often adulterated in the trade by other related species. Therefore, a reliable authentication method is needed to facilitate differentiation/identification of the genuine material from its adulterants. The present study was aimed at developing RAPD-based markers for identification of C. pluricaulis, E. alsinoides and C. ternatea, and analyzing the market samples of the drug to ascertain their authenticity. Material and Methods: Fresh samples of source plants of shankhpushpi were collected from Ghaziabad and Delhi. The market samples were procured from the crude-drug markets of different geographical regions of India. The amplified polymorphic DNA (RAPD technique was employed for characterization of genuine and market samples. Twenty-five 11-mer oligonucleotide primers were used to amplify the DNA isolated. Results: Out of 25 primers, only four (OPN-03, OPN-04, OPN-05 and OPN-06 yielded amplification products that produced clear and reproducible bands, which were used to characterize the market samples. RAPD profile of some market samples did not match with the authentic samples, indicating that these samples were either adulterated or spurious. Conclusion: The RAPD markers developed in this study may provide guidance for the authentication of plant materials traded as shankhpushpi.

  18. Multifactor authentication using smartphone as token

    OpenAIRE

    Neves, Pedro Fonseca das

    2015-01-01

    Master in Computer Engineering Biometrics are a field of study with relevant developments in the last decade. Specifically, electrocardiogram (ECG) based biometrics are now deemed a reliable source of identification. One of the major advances in this technology was the improvements in off-the-person authentication, by requiring nothing more than dry electrodes or conductive fabrics to acquire an ECG signal in a non-intrusive way through the user’s hands. However, identification still has a...

  19. An Authentication Technique Based on Classification

    Institute of Scientific and Technical Information of China (English)

    李钢; 杨杰

    2004-01-01

    We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different to the original watermark, and different kinds of modification lead to different extracted watermarks. In this paper, different kinds of modification are considered as classes, and we used classification algorithm to recognize the modifications with high probability. Simulation results show that the proposed method is potential and effective.

  20. Enhancements to A Lightweight RFID Authentication Protocol

    CERN Document Server

    Zhang, Xiaowen; Wei, Xinzhou

    2008-01-01

    Vajda and Buttyan (VB) proposed a set of five lightweight RFID authentication protocols. Defend, Fu, and Juels (DFJ) did cryptanalysis on two of them - XOR and SUBSET. To the XOR protocol, DFJ proposed repeated keys attack and nibble attack. In this paper, we identify the vulnerability existed in the original VB's successive session key permutation algorithm. We propose three enhancements to prevent DFJ's attacks and make XOR protocol stronger without introducing extra resource cost.

  1. Forensics: Food Authentication Using MtDNA

    Directory of Open Access Journals (Sweden)

    Chandrika Murugaiah

    2015-10-01

    Full Text Available There is a clear trend in the food international market towards labelling products with information about their composition and quality. Due to the increase in international trade in seafood and seafood products, authentication has become a necessity. There is a need for suitable methods of identification to ensure compliance with the labelling regulations and thereby to prevent the substitution of fish species.

  2. Secure Authentication of Cloud Data Mining API

    OpenAIRE

    Bhadauria, Rohit; Borgohain, Rajdeep; Biswas, Abirlal; Sanyal, Sugata

    2013-01-01

    Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure privacy and security in a cloud computing environment. This paper discusses the security at different...

  3. Cost Effective RADIUS Authentication for Wireless Clients

    Directory of Open Access Journals (Sweden)

    Alexandru ENACEANU

    2010-12-01

    Full Text Available Network administrators need to keep administrative user information for each network device, but network devices usually support only limited functions for user management. WLAN security is a modern problem that needs to be solved and it requires a lot of overhead especially when applied to corporate wireless networks. Administrators can set up a RADIUS server that uses an external database server to handle authentication, authorization, and accounting for network security issues.

  4. Authentication and privacy in mobile web services

    OpenAIRE

    Elmufti, K.

    2008-01-01

    This thesis looks at the issue of authentication and privacy in mobile Web services. The work in this thesis builds on GSM and UMTS security framework to develop security protocols for mobile Web services environment. The thesis initially highlights some core principles of designing security protocols in such environment. The next two chapters look at the core technologies and building blocks in Web services systems and the core security features in mobile networks mainly GSM and UMTS. Regist...

  5. Efficient and Robust Pseudonymous Authentication in VANET

    OpenAIRE

    Calandriello, Giorgio; Papadimitratos, Panagiotis; Lioy, Antonio; Hubaux, Jean-Pierre

    2007-01-01

    Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks (VANETs). Efficient and easy- to-manage security and privacy-enhancing mechanisms are essential for the wide-spread adoption of the VANET technology. In this paper, we are concerned with this problem; and in particular, how to achieve efficient and robust pseudonym-based authentication. We design mechanisms that reduce the security overhead for safety beaconing, a...

  6. Efficient Authentication of Outsourced String Similarity Search

    OpenAIRE

    Dong, Boxiang; Wang, Hui

    2016-01-01

    Cloud computing enables the outsourcing of big data analytics, where a third party server is responsible for data storage and processing. In this paper, we consider the outsourcing model that provides string similarity search as the service. In particular, given a similarity search query, the service provider returns all strings from the outsourced dataset that are similar to the query string. A major security concern of the outsourcing paradigm is to authenticate whether the service provider...

  7. Verifiable process monitoring through enhanced data authentication

    International Nuclear Information System (INIS)

    To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

  8. Routing Data Authentication in Wireless Networks; TOPICAL

    International Nuclear Information System (INIS)

    In this paper, we discuss several specific threats directed at the routing data of an ad hoc network. We address security issues that arise from wrapping authentication mechanisms around ad hoc routing data. We show that this bolt-on approach to security may make certain attacks more difficult, but still leaves the network routing data vulnerable. We also show that under a certain adversarial model, most existing routing protocols cannot be secured with the aid of digital signatures

  9. Debunking some myths about biometric authentication

    CERN Document Server

    Esposito, Alfredo

    2012-01-01

    Biometric authentication systems are presented as the best way to reach high security levels in controlling access to IT systems or sensitive infrastructures. But several issues are often not taken properly into account. In order for the implementation of those systems to be successful, the hidden risks and the related liabilities have to be carefully analyzed before biometrics can be used on a large scale for sensitive applications.

  10. Distributed authentication for randomly compromised networks

    OpenAIRE

    Beals, Travis R.; Hynes, Kevin P.; Sanders, Barry C.

    2008-01-01

    We introduce a simple, practical approach with probabilistic information-theoretic security to solve one of quantum key distribution's major security weaknesses: the requirement of an authenticated classical channel to prevent man-in-the-middle attacks. Our scheme employs classical secret sharing and partially trusted intermediaries to provide arbitrarily high confidence in the security of the protocol. Although certain failures elude detection, we discuss preemptive strategies to reduce the ...

  11. Human Cell Line and Tissue Sample Authentication

    OpenAIRE

    Ewing, Margaret M.; McLaren, Robert S.; Hebble, Kathryn D.; Ready, Kim; Storts, Douglas R.; Hooper, Kyle

    2013-01-01

    Background: Short Tandem Repeat (STR) genotyping analysis is a proven technology for uniquely identifying virtually all human samples. STR genotyping was adopted as the preferred technology for identification of human tissue culture cell lines by the ATCC Standards Development Organization (ASN-0002: Authentication of Human Cell Lines: Standardization of STR Profiling). We developed new automation-compatible protocols/systems for generating STR profiles from human cell lines or tissue samples...

  12. A New Approach for Authentication Technique

    Directory of Open Access Journals (Sweden)

    Alaa H. Al-Hamami

    2005-01-01

    Full Text Available One of the serious problems is how to authenticate the passport document for its holder. The major factor of this authenticity is the corresponding of the Passport's photo with its holder. Most of the Passport document contains a holder's signature in addition, of course, to the full name. We propose a firm authentication method by extracting some features for the original name of the holder with the passport number and digest them in a form, by applying some techniques, that can be hidden in the passport's photo. The modern method of issuing a passport now is by using a computer in fixing the passport's photo (imaging. In using this method we could hide the invisible watermark which contains the digest name and passport number inside the passport's photo. During the hidden process there are many techniques could be applied to disguise any color difference appears during the hidden process. After using this technique, it is very simple to use the computer in scanning and verifying, at check point, that the passport's photo has been not replaced and that by comparing the invisible watermark with the digest name of the holder and passport number.

  13. Authentication of Primary User in Cognitive Radio

    Directory of Open Access Journals (Sweden)

    Mr. Sudesh Gupta

    2012-03-01

    Full Text Available Cognitive Radio (CR or soft ware defined radio is a new concept for maximizing the utilization of the radio spectrum. The CR can sense the unused frequency spectrum at any time from the wide range of wireless radio spectrum. This gives the efficient use of radio resources. In cognitive radio environment, a primary licensed user (PU can share spectrum availability information with a secondary user, the secondary user will then be able to access available frequency spectrum. However, a secondary user should always need to verify the authenticity of the spectrum occupancy information whether it comes from the authentic primary users. Without the verification, a malicious user can give false information about the spectrum occupancy. This can result interference to the primary users and minimize available spectrum for the secondary usage. In this paper, we have develop an efficient technique to verify the source of the spectrum occupancy information is to be from the authentic primary user , by doing this we are maximizing the spectrum utilization efficiency and minimizing any interference to the primary licensed users.

  14. Authentication of Primary User in Cognitive Radio

    Directory of Open Access Journals (Sweden)

    Sudesh Gupta

    2012-03-01

    Full Text Available Cognitive Radio (CR or software defined radio is a new concept for maximizing the utilization of the radio spectrum. The CR can sense the unused frequency spectrum at any time from the wide range of wireless radio spectrum. This gives the efficient use of radio resources. In cognitive radio environment, a primary licensed user (PU can share spectrum availability information with a secondary user, the secondary user will then be able to access available frequency spectrum. However, a secondary user should always need to verify the authenticity of the spectrum occupancy information whether it comes from the authentic primary users. Without the verification, a malicious user can give false information about the spectrum occupancy. This can result interference to the primary users and minimize available spectrum for the secondary usage. In this paper, we have develop an efficient technique to verify the source of the spectrum occupancy information is to be from the authentic primary user , by doing this we are maximizing the spectrum utilization efficiency and minimizing any interference to the primary licensed users.

  15. Chemical composition analysis and authentication of whisky.

    Science.gov (United States)

    Wiśniewska, Paulina; Dymerski, Tomasz; Wardencki, Waldemar; Namieśnik, Jacek

    2015-08-30

    Whisky (whiskey) is one of the most popular spirit-based drinks made from malted or saccharified grains, which should mature for at least 3 years in wooden barrels. High popularity of products usually causes a potential risk of adulteration. Thus authenticity assessment is one of the key elements of food product marketing. Authentication of whisky is based on comparing the composition of this alcohol with other spirit drinks. The present review summarizes all information about the comparison of whisky and other alcoholic beverages, the identification of type of whisky or the assessment of its quality and finally the authentication of whisky. The article also presents the various techniques used for analyzing whisky, such as gas and liquid chromatography with different types of detectors (FID, AED, UV-Vis), electronic nose, atomic absorption spectroscopy and mass spectrometry. In some cases the application of chemometric methods is also described, namely PCA, DFA, LDA, ANOVA, SIMCA, PNN, k-NN and CA, as well as preparation techniques such SPME or SPE. PMID:25315338

  16. Holograms and authentication: meeting future demands

    Science.gov (United States)

    Lancaster, Ian M.

    2004-06-01

    The use of holograms as authentication or security devices is the most valuable application of holograms yet devised. In 20 years, this has developed from the first use of a hologram on credit cards, to the situation today where governments turn to holograms as a key security feature on the protected documents they issue, including banknotes, identity documents and tax banderols. At the same time, holograms (and related devices) are the most recognised visible feature used to authenticate and protect branded and OEM products; this sector covers the gamut from CD jewel-box seals to the protection of safety-related items such as medicines and vehicle replacement parts. There has been creative synergy between the commercial suppliers of such holograms and the practical holography community. But new technologies are coming forward to challenge the role of holograms, a challenge that is aided by the counterfeiting of security holograms. What are the characteristics of those technologies and can holograms provide similar resources to users? Examples of collaboration between hologram producers and producers of other technologies to create combination devices suggest a possible route forward for holography to maintain its role in authentication and security. By scrutinising and adapting to needs, often by combination with other techniques, holographers may be able to retain their role in this important application.

  17. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K1 and K2; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K1, and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K2. Then, the encrypted message and the intermediary MAC is again encrypted by using the K2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K2 and compared to the received MAC. The received ciphertext again is decrypted by the key K2 and compared with the first decrypted MAC twice by the key K2. The plaintext is obtained by decrypting the received ciphertext first by K2 and then by K1, using the corresponding decryption techniques respectively. The encryption techniques with key K2 provides the authentication and with key K1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  18. Laser surface authentication for containment and surveillance

    International Nuclear Information System (INIS)

    Containment and Surveillance (C and S) techniques are extensively used for IAEA safeguards activities because they are flexible and cost effective. The two main C and S categories have been optical surveillance and sealing systems. Both techniques are often used to monitor nuclear material storage containers and to maintain continuity of knowledge on IAEA equipment. A new technology developed at the Nanotechnology Laboratories at Imperial College, London and the University of Durham may now provide a new tool for both sealing systems authentication, a containment issue, and laser item identification, a surveillance issue. The technology - Laser Surface Authentication (LSA) - is based on a laser optical technique and uses the phenomena of laser speckle to recognize and extract the inherent 'fingerprint' within all material surfaces such as paper, plastic, metals and ceramics. The physical principle behind LSA and its general applications will be discussed in this paper. The potential application of LSA for metal seals authentication, a component of containment, will also be discussed, and initial test results shown. The paper concludes with a discussion of the application of LSA to a critical safeguards need for monitoring UF6 cylinder movement in an enrichment plant. (author)

  19. Application of Multi Factor Authentication in Internet of Things Domain

    Science.gov (United States)

    Gupta, Udit

    2015-08-01

    Authentication forms the gateway to any secure system. Together with integrity, confidentiality and authorization it helps in preventing any sort of intrusions into the system. Up until a few years back password based authentication was the most common form of authentication to any secure network. But with the advent of more sophisticated technologies this form of authentication although still widely used has become insecure. Furthermore, with the rise of 'Internet of Things' where the number of devices would grow manifold it would be infeasible for user to remember innumerable passwords. Therefore, it's important to address this concern by devising ways in which multiple forms of authentication would be required to gain access to any smart devices and at the same time its usability would be high. In this paper, a methodology is discussed as to what kind of authentication mechanisms could be deployed in internet of things (IOT).

  20. A Mixed Mechanism Mutual Authentication Protocol for TETRA

    Institute of Scientific and Technical Information of China (English)

    LI Hui; YANG Yi-xian

    2005-01-01

    The mutual authentication between the MS and Switching and Management Infrastructure (SwMI) in the TErrestrial Trunked RAdio (TETRA) system are analysed in this paper and theoretical analysis shows that some drawbacks exist when using the shared secrets in the Challenge-Response protocol: (1) It's difficult to store and maintain large amount of MS's authentication key in the SwMI when the network is large. (2) It's hard to support non-renouncement services when using the symmetrical cryptography. An authentication protocol for TETRA using Identity-based Public Keys for the SwMI to authenticate the MSs and an authentication protocol based on hash chain for the MSs to authenticate the SwMI are presented, which can effectively compensate the above-mentioned drawbacks.