WorldWideScience

Sample records for authentication ldrd project

  1. Final report for the mobile node authentication LDRD project.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Lanzone, Andrew J.

    2005-09-01

    In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

  2. FY 2014 LDRD Annual Report Project Summaries

    Energy Technology Data Exchange (ETDEWEB)

    Tomchak, Dena [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-02-01

    The FY 2014 Laboratory Directed Research and Development (LDRD) Annual Report is a compendium of the diverse research performed to develop and ensure the INL's technical capabilities can support future DOE missions and national research priorities. LDRD is essential to INL - it provides a means for the laboratory to pursue novel scientific and engineering research in areas that are deemed too basic or risky for programmatic investments. This research enahnces technical capabilities at the laboratory, providing scientific and engineering staff with opportunities for skill building and partnership development.

  3. Idaho National Laboratory Annual Report FY 2013 LDRD Project Summaries

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2014-03-01

    The FY 2013 LDRD Annual Report is a compendium of the diverse research performed to develop and ensure the INL’s technical capabilities support the current and future DOE missions and national research priorities. LDRD is essential to INL—it provides a means for the Laboratory to maintain scientific and technical vitality while funding highly innovative, high-risk science and technology research and development (R&D) projects. The program enhances technical capabilities at the Laboratory, providing scientific and engineering staff with opportunities to explore proof-of-principle ideas, advanced studies of innovative concepts, and preliminary technical analyses. Established by Congress in 1991, the LDRD Program proves its benefit each year through new programs, intellectual property, patents, copyrights, national and international awards, and publications.

  4. LDRD project 151362 : low energy electron-photon transport.

    Energy Technology Data Exchange (ETDEWEB)

    Kensek, Ronald Patrick; Hjalmarson, Harold Paul; Magyar, Rudolph J.; Bondi, Robert James; Crawford, Martin James

    2013-09-01

    At sufficiently high energies, the wavelengths of electrons and photons are short enough to only interact with one atom at time, leading to the popular %E2%80%9Cindependent-atom approximation%E2%80%9D. We attempted to incorporate atomic structure in the generation of cross sections (which embody the modeled physics) to improve transport at lower energies. We document our successes and failures. This was a three-year LDRD project. The core team consisted of a radiation-transport expert, a solid-state physicist, and two DFT experts.

  5. Selected Examples of LDRD Projects Supporting Test Ban Treaty Verification and Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Al-Ayat, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Walter, W. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-02-23

    The Laboratory Directed Research and Development (LDRD) Program at the DOE National Laboratories was established to ensure the scientific and technical vitality of these institutions and to enhance the their ability to respond to evolving missions and anticipate national needs. LDRD allows the Laboratory directors to invest a percentage of their total annual budget in cutting-edge research and development projects within their mission areas. We highlight a selected set of LDRD-funded projects, in chronological order, that have helped provide capabilities, people and infrastructure that contributed greatly to our ability to respond to technical challenges in support of test ban treaty verification and nonproliferation.

  6. Final report of LDRD project: Electromagnetic impulse radar for detection of underground structures

    Energy Technology Data Exchange (ETDEWEB)

    Loubriel, G.; Aurand, J.; Buttram, M.; Zutavern, F.; Brown, D.; Helgeson, W.

    1998-03-01

    This report provides a summary of the LDRD project titled: Electromagnetic impulse radar for the detection of underground structures. The project met all its milestones even with a tight two year schedule and total funding of $400 k. The goal of the LDRD was to develop and demonstrate a ground penetrating radar (GPR) that is based on high peak power, high repetition rate, and low center frequency impulses. The idea of this LDRD is that a high peak power, high average power radar based on the transmission of short impulses can be utilized effect can be utilized for ground penetrating radar. This direct time-domain system the authors are building seeks to increase penetration depth over conventional systems by using: (1) high peak power, high repetition rate operation that gives high average power, (2) low center frequencies that better penetrate the ground, and (3) short duration impulses that allow for the use of downward looking, low flying platforms that increase the power on target relative to a high flying platform. Specifically, chirped pulses that are a microsecond in duration require (because it is difficult to receive during transmit) platforms above 150 m (and typically 1 km) while this system, theoretically could be at 10 m above the ground. The power on target decays with distance squared so the ability to use low flying platforms is crucial to high penetration. Clutter is minimized by time gating the surface clutter return. Short impulses also allow gating (out) the coupling of the transmit and receive antennas.

  7. FPGAs in High Perfomance Computing: Results from Two LDRD Projects.

    Energy Technology Data Exchange (ETDEWEB)

    Underwood, Keith D; Ulmer, Craig D.; Thompson, David; Hemmert, Karl Scott

    2006-11-01

    Field programmable gate arrays (FPGAs) have been used as alternative computational de-vices for over a decade; however, they have not been used for traditional scientific com-puting due to their perceived lack of floating-point performance. In recent years, there hasbeen a surge of interest in alternatives to traditional microprocessors for high performancecomputing. Sandia National Labs began two projects to determine whether FPGAs wouldbe a suitable alternative to microprocessors for high performance scientific computing and,if so, how they should be integrated into the system. We present results that indicate thatFPGAs could have a significant impact on future systems. FPGAs have thepotentialtohave order of magnitude levels of performance wins on several key algorithms; however,there are serious questions as to whether the system integration challenge can be met. Fur-thermore, there remain challenges in FPGA programming and system level reliability whenusing FPGA devices.4 AcknowledgmentArun Rodrigues provided valuable support and assistance in the use of the Structural Sim-ulation Toolkit within an FPGA context. Curtis Janssen and Steve Plimpton provided valu-able insights into the workings of two Sandia applications (MPQC and LAMMPS, respec-tively).5

  8. LANL LDRD-funded project: Test particle simulations of energetic ions in natural and artificial radiation belts

    Energy Technology Data Exchange (ETDEWEB)

    Cowee, Misa [Los Alamos National Laboratory; Liu, Kaijun [Los Alamos National Laboratory; Friedel, Reinhard H. [Los Alamos National Laboratory; Reeves, Geoffrey D. [Los Alamos National Laboratory

    2012-07-17

    We summarize the scientific problem and work plan for the LANL LDRD-funded project to use a test particle code to study the sudden de-trapping of inner belt protons and possible cross-L transport of debris ions after a high altitude nuclear explosion (HANE). We also discuss future application of the code for other HANE-related problems.

  9. Final report on LDRD project: Simulation/optimization tools for system variability analysis

    Energy Technology Data Exchange (ETDEWEB)

    R. L. Bierbaum; R. F. Billau; J. E. Campbell; K. D. Marx; R. J. Sikorski; B. M. Thompson; S. D. Wix

    1999-10-01

    >This work was conducted during FY98 (Proposal Number 98-0036) and FY99 (Proposal Number 99-0818) under the auspices of the Sandia National Laboratories Laboratory-Directed Research and Development (LDRD) program. Electrical simulation typically treats a single data point in the very large input space of component properties. For electrical simulation to reach its full potential as a design tool, it must be able to address the unavoidable variability and uncertainty in component properties. Component viability is strongly related to the design margin (and reliability) of the end product. During the course of this project, both tools and methodologies were developed to enable analysis of variability in the context of electrical simulation tools. Two avenues to link relevant tools were also developed, and the resultant toolset was applied to a major component.

  10. A configuration space toolkit for automated spatial reasoning: Technical results and LDRD project final report

    Energy Technology Data Exchange (ETDEWEB)

    Xavier, P.G.; LaFarge, R.A.

    1997-02-01

    A robot`s configuration space (c-space) is the space of its kinematic degrees of freedom, e.g., the joint-space of an arm. Sets in c-space can be defined that characterize a variety of spatial relationships, such as contact between the robot and its environment. C-space techniques have been fundamental to research progress in areas such as motion planning and physically-based reasoning. However, practical progress has been slowed by the difficulty of implementing the c-space abstraction inside each application. For this reason, we proposed a Configuration Space Toolkit of high-performance algorithms and data structures meeting these needs. Our intent was to develop this robotics software to provide enabling technology to emerging applications that apply the c-space abstraction, such as advanced motion planning, teleoperation supervision, mechanism functional analysis, and design tools. This final report presents the research results and technical achievements of this LDRD project. Key results and achievements included (1) a hybrid Common LISP/C prototype that implements the basic C-Space abstraction, (2) a new, generic, algorithm for constructing hierarchical geometric representations, and (3) a C++ implementation of an algorithm for fast distance computation, interference detection, and c-space point-classification. Since the project conclusion, motion planning researchers in Sandia`s Intelligent Systems and Robotics Center have been using the CSTk libcstk.so C++ library. The code continues to be used, supported, and improved by projects in the ISRC.

  11. RF/microwave properties of nanotubes and nanowires : LDRD Project 105876 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Scrymgeour, David; Lee, Mark; Hsu, Julia W. P.; Highstrete, Clark

    2009-09-01

    LDRD Project 105876 was a research project whose primary goal was to discover the currently unknown science underlying the basic linear and nonlinear electrodynamic response of nanotubes and nanowires in a manner that will support future efforts aimed at converting forefront nanoscience into innovative new high-frequency nanodevices. The project involved experimental and theoretical efforts to discover and understand high frequency (MHz through tens of GHz) electrodynamic response properties of nanomaterials, emphasizing nanowires of silicon, zinc oxide, and carbon nanotubes. While there is much research on DC electrical properties of nanowires, electrodynamic characteristics still represent a major new frontier in nanotechnology. We generated world-leading insight into how the low dimensionality of these nanomaterials yields sometimes desirable and sometimes problematic high-frequency properties that are outside standard model electron dynamics. In the cases of silicon nanowires and carbon nanotubes, evidence of strong disorder or glass-like charge dynamics was measured, indicating that these materials still suffer from serious inhomogeneities that limit there high frequency performance. Zinc oxide nanowires were found to obey conventional Drude dynamics. In all cases, a significant practical problem involving large impedance mismatch between the high intrinsic impedance of all nanowires and nanotubes and high-frequency test equipment had to be overcome.

  12. Final report on LDRD project : biodiesel production from vegetable oils using slit-channel reactors.

    Energy Technology Data Exchange (ETDEWEB)

    Kalu, E. Eric (FAMU-FSU College of Engineering, Tallahassee, FL); Chen, Ken Shuang

    2008-01-01

    This report documents work done for a late-start LDRD project, which was carried out during the last quarter of FY07. The objective of this project was to experimentally explore the feasibility of converting vegetable (e.g., soybean) oils to biodiesel by employing slit-channel reactors and solid catalysts. We first designed and fabricated several slit-channel reactors with varying channel depths, and employed them to investigate the improved performance of slit-channel reactors over traditional batch reactors using a NaOH liquid catalyst. We then evaluated the effectiveness of several solid catalysts, including CaO, ZnO, MgO, ZrO{sub 2}, calcium gluconate, and heteropolyacid or HPA (Cs{sub 2.5}H{sub 0.5}PW{sub 12}O{sub 40}), for catalyzing the soybean oil-to-biodiesel transesterification reaction. We found that the slit-channel reactor performance improves as channel depth decreases, as expected; and the conversion efficiency of a slit-channel reactor is significantly higher when its channel is very shallow. We further confirmed CaO as having the highest catalytic activity among the solid catalysts tested, and we demonstrated for the first time calcium gluconate as a promising solid catalyst for converting soybean oil to biodiesel, based on our preliminary batch-mode conversion experiments.

  13. A Case Study in Competitive Technical and Market Intelligence Support and Lessons Learned for the uChemLab LDRD Grand Challenge Project; TOPICAL

    International Nuclear Information System (INIS)

    SOUTHWELL, EDWIN T.; GARCIA, MARIE L.; MEYERS, CHARLES E.

    2001-01-01

    The(mu)ChemLab(trademark) Laboratory Directed Research and Development (LDRD) Grand Challenge project began in October 1996 and ended in September 2000. The technical managers of the(mu)ChemLab(trademark) project and the LDRD office, with the support of a consultant, conducted a competitive technical and market demand intelligence analysis of the(mu)ChemLab(trademark). The managers used this knowledge to make project decisions and course adjustments. CTI/MDI positively impacted the project's technology development, uncovered potential technology partnerships, and supported eventual industry partner contacts. CTI/MDI analysis is now seen as due diligence and the(mu)ChemLab(trademark) project is now the model for other Sandia LDRD Grand Challenge undertakings. This document describes the CTI/MDI analysis and captures the more important ''lessons learned'' of this Grand Challenge project, as reported by the project's management team

  14. Final Report for LDRD Project 02-FS-009 Gigapixel Surveillance Camera

    Energy Technology Data Exchange (ETDEWEB)

    Marrs, R E; Bennett, C L

    2010-04-20

    The threats of terrorism and proliferation of weapons of mass destruction add urgency to the development of new techniques for surveillance and intelligence collection. For example, the United States faces a serious and growing threat from adversaries who locate key facilities underground, hide them within other facilities, or otherwise conceal their location and function. Reconnaissance photographs are one of the most important tools for uncovering the capabilities of adversaries. However, current imaging technology provides only infrequent static images of a large area, or occasional video of a small area. We are attempting to add a new dimension to reconnaissance by introducing a capability for large area video surveillance. This capability would enable tracking of all vehicle movements within a very large area. The goal of our project is the development of a gigapixel video surveillance camera for high altitude aircraft or balloon platforms. From very high altitude platforms (20-40 km altitude) it would be possible to track every moving vehicle within an area of roughly 100 km x 100 km, about the size of the San Francisco Bay region, with a gigapixel camera. Reliable tracking of vehicles requires a ground sampling distance (GSD) of 0.5 to 1 m and a framing rate of approximately two frames per second (fps). For a 100 km x 100 km area the corresponding pixel count is 10 gigapixels for a 1-m GSD and 40 gigapixels for a 0.5-m GSD. This is an order of magnitude beyond the 1 gigapixel camera envisioned in our LDRD proposal. We have determined that an instrument of this capacity is feasible.

  15. LDRD FY2004 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kline, K. M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2005-02-28

    The Laboratory Directed Research and Development (LDRD) Program is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and the National Nuclear Security Administration in national security, homeland security, energy security, environmental management, bioscience and healthcare technology, and breakthroughs in fundamental science and technology. The LDRD Program was authorized by Congress in 1991 and is administered by the Laboratory Science and Technology Office. The accomplishments described in this Annual Report demonstrate how the LDRD portfolio is strongly aligned with these missions and contributes to the Laboratory’s success in meeting its goals. The LDRD budget of $69.8 million for FY2004 sponsored 220 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific and technical quality and mission relevance. Each year, the number of meritorious proposals far exceeds the funding available, making the selection a challenging one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the Nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory’s multidisciplinary team approach to science and technology. Safeguarding the Nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle

  16. Final report on LDRD project : coupling strategies for multi-physics applications.

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Matthew Morgan; Moffat, Harry K.; Carnes, Brian; Hooper, Russell Warren; Pawlowski, Roger P.

    2007-11-01

    Many current and future modeling applications at Sandia including ASC milestones will critically depend on the simultaneous solution of vastly different physical phenomena. Issues due to code coupling are often not addressed, understood, or even recognized. The objectives of the LDRD has been both in theory and in code development. We will show that we have provided a fundamental analysis of coupling, i.e., when strong coupling vs. a successive substitution strategy is needed. We have enabled the implementation of tighter coupling strategies through additions to the NOX and Sierra code suites to make coupling strategies available now. We have leveraged existing functionality to do this. Specifically, we have built into NOX the capability to handle fully coupled simulations from multiple codes, and we have also built into NOX the capability to handle Jacobi Free Newton Krylov simulations that link multiple applications. We show how this capability may be accessed from within the Sierra Framework as well as from outside of Sierra. The critical impact from this LDRD is that we have shown how and have delivered strategies for enabling strong Newton-based coupling while respecting the modularity of existing codes. This will facilitate the use of these codes in a coupled manner to solve multi-physic applications.

  17. LDRD Annual Report FY2006

    International Nuclear Information System (INIS)

    Sketchley, J A; Kotta, P; De Yoreo, J; Jackson, K; van Bibber, K

    2007-01-01

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Laboratory Science and Technology Office, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration in national security, energy security, environmental management, bioscience and technology to improve human health, and breakthroughs in fundamental science and technology. The accomplishments described in this Annual Report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $92 million for FY2006 sponsored 188 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest

  18. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    Directory of Open Access Journals (Sweden)

    Evangelos Bekiaris

    2008-03-01

    Full Text Available Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO (2007 is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  19. Final report for LDRD project 11-0783 : directed robots for increased military manpower effectiveness.

    Energy Technology Data Exchange (ETDEWEB)

    Rohrer, Brandon Robinson; Rothganger, Fredrick H.; Wagner, John S.; Xavier, Patrick Gordon; Morrow, James Dan

    2011-09-01

    The purpose of this LDRD is to develop technology allowing warfighters to provide high-level commands to their unmanned assets, freeing them to command a group of them or commit the bulk of their attention elsewhere. To this end, a brain-emulating cognition and control architecture (BECCA) was developed, incorporating novel and uniquely capable feature creation and reinforcement learning algorithms. BECCA was demonstrated on both a mobile manipulator platform and on a seven degree of freedom serial link robot arm. Existing military ground robots are almost universally teleoperated and occupy the complete attention of an operator. They may remove a soldier from harm's way, but they do not necessarily reduce manpower requirements. Current research efforts to solve the problem of autonomous operation in an unstructured, dynamic environment fall short of the desired performance. In order to increase the effectiveness of unmanned vehicle (UV) operators, we proposed to develop robots that can be 'directed' rather than remote-controlled. They are instructed and trained by human operators, rather than driven. The technical approach is modeled closely on psychological and neuroscientific models of human learning. Two Sandia-developed models are utilized in this effort: the Sandia Cognitive Framework (SCF), a cognitive psychology-based model of human processes, and BECCA, a psychophysical-based model of learning, motor control, and conceptualization. Together, these models span the functional space from perceptuo-motor abilities, to high-level motivational and attentional processes.

  20. LDRD project final report : hybrid AI/cognitive tactical behavior framework for LVC.

    Energy Technology Data Exchange (ETDEWEB)

    Djordjevich, Donna D.; Xavier, Patrick Gordon; Brannon, Nathan Gregory; Hart, Brian E.; Hart, Derek H.; Little, Charles Quentin; Oppel, Fred John III; Linebarger, John Michael; Parker, Eric Paul

    2012-01-01

    This Lab-Directed Research and Development (LDRD) sought to develop technology that enhances scenario construction speed, entity behavior robustness, and scalability in Live-Virtual-Constructive (LVC) simulation. We investigated issues in both simulation architecture and behavior modeling. We developed path-planning technology that improves the ability to express intent in the planning task while still permitting an efficient search algorithm. An LVC simulation demonstrated how this enables 'one-click' layout of squad tactical paths, as well as dynamic re-planning for simulated squads and for real and simulated mobile robots. We identified human response latencies that can be exploited in parallel/distributed architectures. We did an experimental study to determine where parallelization would be productive in Umbra-based force-on-force (FOF) simulations. We developed and implemented a data-driven simulation composition approach that solves entity class hierarchy issues and supports assurance of simulation fairness. Finally, we proposed a flexible framework to enable integration of multiple behavior modeling components that model working memory phenomena with different degrees of sophistication.

  1. Multimedia Data Hiding and Authentication via Halftoning and Coordinate Projection

    Directory of Open Access Journals (Sweden)

    Wu Chai Wah

    2002-01-01

    Full Text Available We present image data hiding and authentication schemes based on halftoning and coordinate projection. The proposed data hiding scheme can embed images of the same size and similar bit depth into the cover image and robustness against compression is demonstrated. The image authentication scheme is based on the data hiding scheme and can detect, localize, and repair the tampered area of the image. Furthermore, the self-repairing feature of the authentication scheme has a hologram-like quality; any portion of the image can be used to reconstruct the entire image, with a greater quality of reconstruction as the portion size increases.

  2. LDRD FY 2014 Program Plan

    Energy Technology Data Exchange (ETDEWEB)

    Anita Gianotto; Dena Tomchak

    2013-08-01

    As required by DOE Order 413.2B the FY 2014 Program Plan is written to communicate ares of investment and approximate amounts being requested for the upcoming fiscal year. The program plan also includes brief highlights of current or previous LDRD projects that have an opportunity to impact our Nation's current and future energy challenges.

  3. LDRD Final Report - Investigations of the impact of the process integration of deposited magnetic films for magnetic memory technologies on radiation hardened CMOS devices and circuits - LDRD Project (FY99)

    International Nuclear Information System (INIS)

    Myers, David R.; Jessing, Jeffrey R.; Spahn, Olga B.; Shaneyfelt, Marty R.

    2000-01-01

    This project represented a coordinated LLNL-SNL collaboration to investigate the feasibility of developing radiation-hardened magnetic non-volatile memories using giant magnetoresistance (GMR) materials. The intent of this limited-duration study was to investigate whether giant magnetoresistance (GMR) materials similar to those used for magnetic tunnel junctions (MTJs) were process compatible with functioning CMOS circuits. Sandia's work on this project demonstrated that deposition of GMR materials did not affect the operation nor the radiation hardness of Sandia's rad-hard CMOS technology, nor did the integration of GMR materials and exposure to ionizing radiation affect the magnetic properties of the GMR films. Thus, following deposition of GMR films on rad-hard integrated circuits, both the circuits and the films survived ionizing radiation levels consistent with DOE mission requirements. Furthermore, Sandia developed techniques to pattern deposited GMR films without degrading the completed integrated circuits upon which they were deposited. The present feasibility study demonstrated all the necessary processing elements to allow fabrication of the non-volatile memory elements onto an existing CMOS chip, and even allow the use of embedded (on-chip) non-volatile memories for system-on-a-chip applications, even in demanding radiation environments. However, funding agencies DTRA, AIM, and DARPA did not have any funds available to support the required follow-on technology development projects that would have been required to develop functioning prototype circuits, nor were such funds available from LDRD nor from other DOE program funds

  4. Three-dimensional gyrokinetic particle-in-cell simulation of plasmas on a massively parallel computer: Final report on LDRD Core Competency Project, FY 1991--FY 1993

    International Nuclear Information System (INIS)

    Byers, J.A.; Williams, T.J.; Cohen, B.I.; Dimits, A.M.

    1994-01-01

    One of the programs of the Magnetic fusion Energy (MFE) Theory and computations Program is studying the anomalous transport of thermal energy across the field lines in the core of a tokamak. We use the method of gyrokinetic particle-in-cell simulation in this study. For this LDRD project we employed massively parallel processing, new algorithms, and new algorithms, and new formal techniques to improve this research. Specifically, we sought to take steps toward: researching experimentally-relevant parameters in our simulations, learning parallel computing to have as a resource for our group, and achieving a 100 x speedup over our starting-point Cray2 simulation code's performance

  5. Final LDRD report :

    Energy Technology Data Exchange (ETDEWEB)

    Clark, Blythe G.; Rajasekhara, Shreyas; Enos, David George; Dingreville, Remi Philippe Michel; Doyle, Barney Lee; Hattar, Khalid Mikhiel; Weiner, Ruth F.

    2013-09-01

    We present the results of a three-year LDRD project focused on understanding microstructural evolution and related property changes in Zr-based nuclear cladding materials towards the development of high fidelity predictive simulations for long term dry storage. Experiments and modeling efforts have focused on the effects of hydride formation and accumulation of irradiation defects. Key results include: determination of the influence of composition and defect structures on hydride formation; measurement of the electrochemical property differences between hydride and parent material for understanding and predicting corrosion resistance; in situ environmental transmission electron microscope observation of hydride formation; development of a predictive simulation for mechanical property changes as a function of irradiation dose; novel test method development for microtensile testing of ionirradiated material to simulate the effect of neutron irradiation on mechanical properties; and successful demonstration of an Idaho National Labs-based sample preparation and shipping method for subsequent Sandia-based analysis of post-reactor cladding.

  6. Dynamic compression of synthetic diamond windows (final report for LDRD project 93531).

    Energy Technology Data Exchange (ETDEWEB)

    Dolan, Daniel H.,

    2008-09-01

    Diamond is an attractive dynamic compression window for many reasons: high elastic limit,large mechanical impedance, and broad transparency range. Natural diamonds, however, aretoo expensive to be used in destructive experiments. Chemical vapor deposition techniquesare now able to produce large single-crystal windows, opening up many potential dynamiccompression applications. This project studied the behavior of synthetic diamond undershock wave compression. The results suggest that synthetic diamond could be a usefulwindow in this field, though complete characterization proved elusive.3

  7. Coordinating robot motion, sensing, and control in plans. LDRD project final report

    Energy Technology Data Exchange (ETDEWEB)

    Xavier, P.G.; Brown, R.G.; Watterberg, P.A. [Sandia National Labs., Albuquerque, NM (United States). Intelligent Systems and Robotics Center

    1997-08-01

    The goal of this project was to develop a framework for robotic planning and execution that provides a continuum of adaptability with respect to model incompleteness, model error, and sensing error. For example, dividing robot motion into gross-motion planning, fine-motion planning, and sensor-augmented control had yielded productive research and solutions to individual problems. Unfortunately, these techniques could only be combined by hand with ad hoc methods and were restricted to systems where all kinematics are completely modeled in planning. The original intent was to develop methods for understanding and autonomously synthesizing plans that coordinate motion, sensing, and control. The project considered this problem from several perspectives. Results included (1) theoretical methods to combine and extend gross-motion and fine-motion planning; (2) preliminary work in flexible-object manipulation and an implementable algorithm for planning shortest paths through obstacles for the free-end of an anchored cable; (3) development and implementation of a fast swept-body distance algorithm; and (4) integration of Sandia`s C-Space Toolkit geometry engine and SANDROS motion planer and improvements, which yielded a system practical for everyday motion planning, with path-segment planning at interactive speeds. Results (3) and (4) have either led to follow-on work or are being used in current projects, and they believe that (2) will eventually be also.

  8. FY2014 LBNL LDRD Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Ho, Darren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-06-01

    Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE’s National Laboratory System, Berkeley Lab supports DOE’s missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation. The LDRD program supports Berkeley Lab’s mission in many ways. First, because LDRD funds can be allocated within a relatively short time frame, Berkeley Lab researchers can support the mission of the Department of Energy (DOE) and serve the needs of the nation by quickly responding to forefront scientific problems. Second, LDRD enables Berkeley Lab to attract and retain highly qualified scientists and to support their efforts to carry out worldleading research. In addition, the LDRD program also supports new projects that involve graduate students and postdoctoral fellows, thus contributing to the education mission of Berkeley Lab.

  9. Cross-disciplinary, authentic student research projects

    NARCIS (Netherlands)

    Heck, A.; Uylings, P.; Kędzierska, E.; Ellermeijer, T.

    2010-01-01

    In the Dutch secondary education system, students must carry out at the end of their school career a rather large research or design project to demonstrate their ability to apply acquired knowledge and skills while pursuing a research question or design goal in some depth. They are encouraged to

  10. Final report on LDRD project : single-photon-sensitive imaging detector arrays at 1600 nm.

    Energy Technology Data Exchange (ETDEWEB)

    Childs, Kenton David; Serkland, Darwin Keith; Geib, Kent Martin; Hawkins, Samuel D.; Carroll, Malcolm S.; Klem, John Frederick; Sheng, Josephine Juin-Jye; Patel, Rupal K.; Bolles, Desta; Bauer, Tom M.; Koudelka, Robert

    2006-11-01

    The key need that this project has addressed is a short-wave infrared light detector for ranging (LIDAR) imaging at temperatures greater than 100K, as desired by nonproliferation and work for other customers. Several novel device structures to improve avalanche photodiodes (APDs) were fabricated to achieve the desired APD performance. A primary challenge to achieving high sensitivity APDs at 1550 nm is that the small band-gap materials (e.g., InGaAs or Ge) necessary to detect low-energy photons exhibit higher dark counts and higher multiplication noise compared to materials like silicon. To overcome these historical problems APDs were designed and fabricated using separate absorption and multiplication (SAM) regions. The absorption regions used (InGaAs or Ge) to leverage these materials 1550 nm sensitivity. Geiger mode detection was chosen to circumvent gain noise issues in the III-V and Ge multiplication regions, while a novel Ge/Si device was built to examine the utility of transferring photoelectrons in a silicon multiplication region. Silicon is known to have very good analog and GM multiplication properties. The proposed devices represented a high-risk for high-reward approach. Therefore one primary goal of this work was to experimentally resolve uncertainty about the novel APD structures. This work specifically examined three different designs. An InGaAs/InAlAs Geiger mode (GM) structure was proposed for the superior multiplication properties of the InAlAs. The hypothesis to be tested in this structure was whether InAlAs really presented an advantage in GM. A Ge/Si SAM was proposed representing the best possible multiplication material (i.e., silicon), however, significant uncertainty existed about both the Ge material quality and the ability to transfer photoelectrons across the Ge/Si interface. Finally a third pure germanium GM structure was proposed because bulk germanium has been reported to have better dark count properties. However, significant

  11. LDRD Final Report - Investigations of the impact of the process integration of deposited magnetic films for magnetic memory technologies on radiation-hardened CMOS devices and circuits - LDRD Project (FY99)

    Energy Technology Data Exchange (ETDEWEB)

    MYERS,DAVID R.; JESSING,JEFFREY R.; SPAHN,OLGA B.; SHANEYFELT,MARTY R.

    2000-01-01

    This project represented a coordinated LLNL-SNL collaboration to investigate the feasibility of developing radiation-hardened magnetic non-volatile memories using giant magnetoresistance (GMR) materials. The intent of this limited-duration study was to investigate whether giant magnetoresistance (GMR) materials similar to those used for magnetic tunnel junctions (MTJs) were process compatible with functioning CMOS circuits. Sandia's work on this project demonstrated that deposition of GMR materials did not affect the operation nor the radiation hardness of Sandia's rad-hard CMOS technology, nor did the integration of GMR materials and exposure to ionizing radiation affect the magnetic properties of the GMR films. Thus, following deposition of GMR films on rad-hard integrated circuits, both the circuits and the films survived ionizing radiation levels consistent with DOE mission requirements. Furthermore, Sandia developed techniques to pattern deposited GMR films without degrading the completed integrated circuits upon which they were deposited. The present feasibility study demonstrated all the necessary processing elements to allow fabrication of the non-volatile memory elements onto an existing CMOS chip, and even allow the use of embedded (on-chip) non-volatile memories for system-on-a-chip applications, even in demanding radiation environments. However, funding agencies DTRA, AIM, and DARPA did not have any funds available to support the required follow-on technology development projects that would have been required to develop functioning prototype circuits, nor were such funds available from LDRD nor from other DOE program funds.

  12. 1999 LDRD Laboratory Directed Research and Development

    Energy Technology Data Exchange (ETDEWEB)

    Rita Spencer; Kyle Wheeler

    2000-06-01

    This is the FY 1999 Progress Report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes work done on individual research projects, relates the projects to major Laboratory program sponsors, and provides an index to the principal investigators. Project summaries are grouped by their LDRD component: Competency Development, Program Development, and Individual Projects. Within each component, they are further grouped into nine technical categories: (1) materials science, (2) chemistry, (3) mathematics and computational science, (4) atomic, molecular, optical, and plasma physics, fluids, and particle beams, (5) engineering science, (6) instrumentation and diagnostics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) bioscience.

  13. Final report and recommendations of the ESnet Authentication Pilot Project

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

    1995-01-01

    To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

  14. 2007 LDRD ANNUAL REPORT

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-16

    I am pleased to present the fiscal year 2007 Laboratory Directed Research and Development (LDRD) annual report. This represents the first year that SRNL has been eligible for LDRD participation and our results to date demonstrate we are off to an excellent start. SRNL became a National Laboratory in 2004, and was designated the 'Corporate Laboratory' for the DOE Office of Environmental Management (EM) in 2006. As you will see, we have made great progress since these designations. The LDRD program is one of the tools SRNL is using to enable achievement of our strategic goals for the DOE. The LDRD program allows the laboratory to blend a strong basic science component into our applied technical portfolio. This blending of science with applied technology provides opportunities for our scientists to strengthen our capabilities and delivery. The LDRD program is vital to help SRNL attract and retain leading scientists and engineers who will help build SRNL's future and achieve DOE mission objectives. This program has stimulated our research staff creativity, while realizing benefits from their participation. This investment will yield long term dividends to the DOE in its Environmental Management, Energy, and National Security missions.

  15. Visualizing the Complex Process for Deep Learning with an Authentic Programming Project

    Science.gov (United States)

    Peng, Jun; Wang, Minhong; Sampson, Demetrios

    2017-01-01

    Project-based learning (PjBL) has been increasingly used to connect abstract knowledge and authentic tasks in educational practice, including computer programming education. Despite its promising effects on improving learning in multiple aspects, PjBL remains a struggle due to its complexity. Completing an authentic programming project involves a…

  16. 2013 SRNL LDRD Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    McWhorter, S. [Savannah River Site (SRS), Aiken, SC (United States)

    2014-03-07

    This report demonstrates the execution of our LDRD program within the objectives and guidelines outlined by the Department of Energy (DOE) through the DOE Order 413.2b. The projects described within the report align purposefully with SRNL’s strategic vision and provide great value to the DOE. The diversity exhibited in the research and development projects underscores the DOE Office of Environmental Management (DOE-EM) mission and enhances that mission by developing the technical capabilities and human capital necessary to support future DOE-EM national needs. As a multiprogram national laboratory, SRNL is applying those capabilities to achieve tangible results for the nation in National Security, Environmental Stewardship, Clean Energy and Nuclear Materials Management.

  17. Evaluation of authentic science projects on climate change in secondary schools : a focus on gender differences

    NARCIS (Netherlands)

    Dijkstra, Elma; Goedhart, Martin

    2011-01-01

    Background and purpose: This study examines secondary-school students' opinions on participating in authentic science projects, which are part of an international EU project on climate change research in seven countries. Partnerships between schools and research institutes result in student projects

  18. SRNL LDRD ANNUAL REPORT 2008

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-29

    The Laboratory Director is pleased to have the opportunity to present the 2008 Laboratory Directed Research and Development (LDRD) annual report. This is my first opportunity to do so, and only the second such report that has been issued. As will be obvious, SRNL has built upon the excellent start that was made with the LDRD program last year, and researchers have broken new ground in some important areas. In reviewing the output of this program this year, it is clear that the researchers implemented their ideas with creativity, skill and enthusiasm. It is gratifying to see this level of participation, because the LDRD program remains a key part of meeting SRNL's and DOE's strategic goals, and helps lay a solid scientific foundation for SRNL as the premier applied science laboratory. I also believe that the LDRD program's results this year have demonstrated SRNL's value as the EM Corporate Laboratory, having advanced knowledge in a spectrum of areas, including reduction of the technical risks of cleanup, separations science, packaging and transportation of nuclear materials, and many others. The research in support of Energy Security and National and Homeland Security has been no less notable. SRNL' s researchers have shown again that the nascent LDRD program is a sound investment for DOE that will pay off handsomely for the nation as time goes on.

  19. LDRD 2012 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Bookless, William [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2012-12-31

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY2012, as required. In FY2012, the BNL LDRD Program funded 52 projects, 14 of which were new starts, at a total cost of $10,061,292.

  20. LDRD 2014 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, Diane [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2015-03-01

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2014, as required. In FY 2014, the BNL LDRD Program funded 40 projects, 8 of which were new starts, at a total cost of $9.6M.

  1. LDRD 2015 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, D. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2015-12-31

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2015, as required. In FY 2015, the BNL LDRD Program funded 43 projects, 12 of which were new starts, at a total cost of $9.5M.

  2. LDRD 149045 final report distinguishing documents.

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Scott A.

    2010-09-01

    This LDRD 149045 final report describes work that Sandians Scott A. Mitchell, Randall Laviolette, Shawn Martin, Warren Davis, Cindy Philips and Danny Dunlavy performed in 2010. Prof. Afra Zomorodian provided insight. This was a small late-start LDRD. Several other ongoing efforts were leveraged, including the Networks Grand Challenge LDRD, and the Computational Topology CSRF project, and the some of the leveraged work is described here. We proposed a sentence mining technique that exploited both the distribution and the order of parts-of-speech (POS) in sentences in English language documents. The ultimate goal was to be able to discover 'call-to-action' framing documents hidden within a corpus of mostly expository documents, even if the documents were all on the same topic and used the same vocabulary. Using POS was novel. We also took a novel approach to analyzing POS. We used the hypothesis that English follows a dynamical system and the POS are trajectories from one state to another. We analyzed the sequences of POS using support vector machines and the cycles of POS using computational homology. We discovered that the POS were a very weak signal and did not support our hypothesis well. Our original goal appeared to be unobtainable with our original approach. We turned our attention to study an aspect of a more traditional approach to distinguishing documents. Latent Dirichlet Allocation (LDA) turns documents into bags-of-words then into mixture-model points. A distance function is used to cluster groups of points to discover relatedness between documents. We performed a geometric and algebraic analysis of the most popular distance functions and made some significant and surprising discoveries, described in a separate technical report.

  3. HARD - The High Assurance Remote Authentication Device Project

    OpenAIRE

    2006-01-01

    The HARD project will build and evaluate a high assurance network access device. The purpose of this device is to provide an unforgeable trusted path with which network clients can securely interact with security-enabled remote servers.

  4. Proof of Concept: Iraqi Enrollment via Voice Authentication Project

    National Research Council Canada - National Science Library

    Lee, Samuel K

    2005-01-01

    ...). The IEVAP is an Office of the Secretary of Defense sponsored research project commissioned to study the feasibility of speaker verification technology in support of the Global War on Terrorism security requirements...

  5. Authentic student research projects on physics and the human body

    NARCIS (Netherlands)

    Heck, A.; Ellermeijer, T.; Kędzierska, E.

    2010-01-01

    Students in Dutch senior secondary education are obliged to perform their own research project of approximately 80 hours. They are stimulated to choose the topic themselves (preferably with relations to two subjects, like physics and mathematics) and have a lot of freedom in the design of the

  6. Neurons to algorithms LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Rothganger, Fredrick H.; Aimone, James Bradley; Warrender, Christina E.; Trumbo, Derek

    2013-09-01

    Over the last three years the Neurons to Algorithms (N2A) LDRD project teams has built infrastructure to discover computational structures in the brain. This consists of a modeling language, a tool that enables model development and simulation in that language, and initial connections with the Neuroinformatics community, a group working toward similar goals. The approach of N2A is to express large complex systems like the brain as populations of a discrete part types that have specific structural relationships with each other, along with internal and structural dynamics. Such an evolving mathematical system may be able to capture the essence of neural processing, and ultimately of thought itself. This final report is a cover for the actual products of the project: the N2A Language Specification, the N2A Application, and a journal paper summarizing our methods.

  7. LDRD 2016 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, D. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2017-03-31

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2C dated October 22, 2015. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2016, as required. In FY 2016, the BNL LDRD Program funded 48 projects, 21 of which were new starts, at a total cost of $11.5M. The investments that BNL makes in its LDRD program support the Laboratory’s strategic goals. BNL has identified four Critical Outcomes that define the Laboratory’s scientific future and that will enable it to realize its overall vision. Two operational Critical Outcomes address essential operational support for that future: renewal of the BNL campus; and safe, efficient laboratory operations.

  8. Final report for %22High performance computing for advanced national electric power grid modeling and integration of solar generation resources%22, LDRD Project No. 149016.

    Energy Technology Data Exchange (ETDEWEB)

    Reno, Matthew J.; Riehm, Andrew Charles; Hoekstra, Robert John; Munoz-Ramirez, Karina; Stamp, Jason Edwin; Phillips, Laurence R.; Adams, Brian M.; Russo, Thomas V.; Oldfield, Ron A.; McLendon, William Clarence, III; Nelson, Jeffrey Scott; Hansen, Clifford W.; Richardson, Bryan T.; Stein, Joshua S.; Schoenwald, David Alan; Wolfenbarger, Paul R.

    2011-02-01

    Design and operation of the electric power grid (EPG) relies heavily on computational models. High-fidelity, full-order models are used to study transient phenomena on only a small part of the network. Reduced-order dynamic and power flow models are used when analysis involving thousands of nodes are required due to the computational demands when simulating large numbers of nodes. The level of complexity of the future EPG will dramatically increase due to large-scale deployment of variable renewable generation, active load and distributed generation resources, adaptive protection and control systems, and price-responsive demand. High-fidelity modeling of this future grid will require significant advances in coupled, multi-scale tools and their use on high performance computing (HPC) platforms. This LDRD report demonstrates SNL's capability to apply HPC resources to these 3 tasks: (1) High-fidelity, large-scale modeling of power system dynamics; (2) Statistical assessment of grid security via Monte-Carlo simulations of cyber attacks; and (3) Development of models to predict variability of solar resources at locations where little or no ground-based measurements are available.

  9. Final LDRD report :

    Energy Technology Data Exchange (ETDEWEB)

    Ambrosini, Andrea; Miller, James Edward; Allendorf, Mark D.; Coker, Eric Nicholas; Ermanoski, Ivan; Hogan, Roy E.,; McDaniel, Anthony H.

    2014-01-01

    Despite rapid progress, solar thermochemistry remains high risk; improvements in both active materials and reactor systems are needed. This claim is supported by studies conducted both prior to and as part of this project. Materials offer a particular large opportunity space as, until recently, very little effort apart from basic thermodynamic analysis was extended towards understanding this most fundamental component of a metal oxide thermochemical cycle. Without this knowledge, system design was hampered, but more importantly, advances in these crucial materials were rare and resulted more from intuition rather than detailed insight. As a result, only two basic families of potentially viable solid materials have been widely considered, each of which has significant challenges. Recent efforts towards applying an increased level of scientific rigor to the study of thermochemical materials have provided a much needed framework and insights toward developing the next generation of highly improved thermochemically active materials. The primary goal of this project was to apply this hard-won knowledge to rapidly advance the field of thermochemistry to produce a material within 2 years that is capable of yielding CO from CO2 at a 12.5 % reactor efficiency. Three principal approaches spanning a range of risk and potential rewards were pursued: modification of known materials, structuring known materials, and identifying/developing new materials for the application. A newly developed best-of-class material produces more fuel (9x more H2, 6x more CO) under milder conditions than the previous state of the art. Analyses of thermochemical reactor and system efficiencies and economics were performed and a new hybrid concept was reported. The larger case for solar fuels was also further refined and documented.

  10. Transportation Energy Pathways LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Barter, Garrett. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Reichmuth, David. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Westbrook, Jessica [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Malczynski, Leonard A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Yoshimura, Ann S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Peterson, Meghan B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); West, Todd H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Manley, Dawn Kataoka [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Guzman, Katherine Dunphy [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Edwards, Donna M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hines, Valerie Ann-Peters [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2012-09-01

    This report presents a system dynamics based model of the supply-demand interactions between the US light-duty vehicle (LDV) fleet, its fuels, and the corresponding primary energy sources through the year 2050. An important capability of our model is the ability to conduct parametric analyses. Others have relied upon scenario-based analysis, where one discrete set of values is assigned to the input variables and used to generate one possible realization of the future. While these scenarios can be illustrative of dominant trends and tradeoffs under certain circumstances, changes in input values or assumptions can have a significant impact on results, especially when output metrics are associated with projections far into the future. This type of uncertainty can be addressed by using a parametric study to examine a range of values for the input variables, offering a richer source of data to an analyst.The parametric analysis featured here focuses on a trade space exploration, with emphasis on factors that influence the adoption rates of electric vehicles (EVs), the reduction of GHG emissions, and the reduction of petroleum consumption within the US LDV fleet. The underlying model emphasizes competition between 13 different types of powertrains, including conventional internal combustion engine (ICE) vehicles, flex-fuel vehicles (FFVs), conventional hybrids(HEVs), plug-in hybrids (PHEVs), and battery electric vehicles(BEVs).We find that many factors contribute to the adoption rates of EVs. These include the pace of technological development for the electric powertrain, battery performance, as well as the efficiency improvements in conventional vehicles. Policy initiatives can also have a dramatic impact on the degree of EV adoption. The consumer effective payback period, in particular, can significantly increase the market penetration rates if extended towards the vehicle lifetime.Widespread EV adoption can have noticeable impact on petroleum consumption and

  11. Enhanced Micellar Catalysis LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Betty, Rita G.; Tucker, Mark D; Taggart, Gretchen; Kinnan, Mark K.; Glen, Crystal Chanea; Rivera, Danielle; Sanchez, Andres; Alam, Todd Michael

    2012-12-01

    The primary goals of the Enhanced Micellar Catalysis project were to gain an understanding of the micellar environment of DF-200, or similar liquid CBW surfactant-based decontaminants, as well as characterize the aerosolized DF-200 droplet distribution and droplet chemistry under baseline ITW rotary atomization conditions. Micellar characterization of limited surfactant solutions was performed externally through the collection and measurement of Small Angle X-Ray Scattering (SAXS) images and Cryo-Transmission Electron Microscopy (cryo-TEM) images. Micellar characterization was performed externally at the University of Minnesotas Characterization Facility Center, and at the Argonne National Laboratory Advanced Photon Source facility. A micellar diffusion study was conducted internally at Sandia to measure diffusion constants of surfactants over a concentration range, to estimate the effective micelle diameter, to determine the impact of individual components to the micellar environment in solution, and the impact of combined components to surfactant phase behavior. Aerosolized DF-200 sprays were characterized for particle size and distribution and limited chemical composition. Evaporation rates of aerosolized DF-200 sprays were estimated under a set of baseline ITW nozzle test system parameters.

  12. Implementing an authentic research project on eastern coyotes at an urban high school

    Directory of Open Access Journals (Sweden)

    David L. Eatough

    2008-01-01

    Full Text Available The need for inquiry oriented authentic activities is imperative to engage high school students in the active involvement and associated learning of science. Herein, we describe our experience of involving high school students in the process of studying wild coyotes in and around the communities where they live. We found that many became aware and familiar with the program but few participated to the point of being contributing members of the scientific community. To make this project sustainable in the long-run three important things must happen: one, there must be reliable point person (such as a graduate student who can focus on the ecology side of the coyote project while others can focus on the educational components of the collaboration; two, mechanisms must be put in place to provide incentives for participants; and three, funding must be reliable and substantial over time.

  13. Google Classroom and Open Clusters: An Authentic Science Research Project for High School Students

    Science.gov (United States)

    Johnson, Chelen H.; Linahan, Marcella; Cuba, Allison Frances; Dickmann, Samantha Rose; Hogan, Eleanor B.; Karos, Demetra N.; Kozikowski, Kendall G.; Kozikowski, Lauren Paige; Nelson, Samantha Brooks; O'Hara, Kevin Thomas; Ropinski, Brandi Lucia; Scarpa, Gabriella; Garmany, Catharine D.

    2016-01-01

    STEM education is about offering unique opportunities to our students. For the past three years, students from two high schools (Breck School in Minneapolis, MN, and Carmel Catholic High School in Mundelein, IL) have collaborated on authentic astronomy research projects. This past year they surveyed archival data of open clusters to determine if a clear turnoff point could be unequivocally determined. Age and distance to each open cluster were calculated. Additionally, students requested time on several telescopes to obtain original data to compare to the archival data. Students from each school worked in collaborative teams, sharing and verifying results through regular online hangouts and chats. Work papers were stored in a shared drive and on a student-designed Google site to facilitate dissemination of documents between the two schools.

  14. Writing the Book…Literally: The Convergence of Authentic Intellectual Work (AIW) and Project-Based Learning (PBL)

    Science.gov (United States)

    Buckmiller, Tom M.; Kruse, Jerrid W.

    2015-01-01

    Using the Project-Based Learning (PBL) and Authentic Intellectual Work (AIW) models, we sought to create coursework that had value beyond the classroom. Refinements in the self-publishing book industry provide the opportunity to present student work to a larger audience and in a different, more engaging format. With the help of free software, our…

  15. Critical Elements for Successful Implementation and Adoption of Authentic Scientific Research Programs: Lessons Learned from NASA's Mars Student Imaging Project

    Science.gov (United States)

    Klug Boonstra, S.; Swann, J.; Boonstra, D.; Manfredi, L.; Christensen, P. R.

    2016-12-01

    Recent research identifies the most effective learning as active, engaged learning in which students interact with phenomena, other students, and the teacher/leader to derive meaning and construct understanding of their surroundings. "Similarly, an engaging and effective science education goes well beyond the low-level factual recall that is emphasized in many science classes. It must develop the skills that students need to solve complex problems, work in teams, make and recognize evidence-based arguments, and interpret and communicate complex information" (emphasis added). Authentic science research projects provide active, engaged learning in which students interact with authentic science data in an authentic problem-solving context to derive meaning and construct understanding of the world. In formal (and many informal) settings, the teacher/leader is effectively the gatekeeper who determines the learning experiences in which the students will participate. From our experience of nearly a decade and a half of authentic science programming for 5thgrade through early college students working with NASA Mars data, supporting and enabling the teacher is perhaps the most critical and foundational element for designing a successful authentic research experience. Yet, a major barrier to this type of learning are teacher/leaders who are too often not equipped or who lack confidence to succeed in facilitating authentic research projects. The Mars Student Imaging Project has implemented an iterative process of design, testing, and redesign that has identified and implemented critical teacher/leader-enabling elements that have led to increasingly successful adoptions within formal and informal educational settings - allowing more students to gain the benefits of immersive research experience.

  16. Impact of problem finding on the quality of authentic open inquiry science research projects

    Science.gov (United States)

    Labanca, Frank

    2008-11-01

    Problem finding is a creative process whereby individuals develop original ideas for study. Secondary science students who successfully participate in authentic, novel, open inquiry studies must engage in problem finding to determine viable and suitable topics. This study examined problem finding strategies employed by students who successfully completed and presented the results of their open inquiry research at the 2007 Connecticut Science Fair and the 2007 International Science and Engineering Fair. A multicase qualitative study was framed through the lenses of creativity, inquiry strategies, and situated cognition learning theory. Data were triangulated by methods (interviews, document analysis, surveys) and sources (students, teachers, mentors, fair directors, documents). The data demonstrated that the quality of student projects was directly impacted by the quality of their problem finding. Effective problem finding was a result of students using resources from previous, specialized experiences. They had a positive self-concept and a temperament for both the creative and logical perspectives of science research. Successful problem finding was derived from an idiosyncratic, nonlinear, and flexible use and understanding of inquiry. Finally, problem finding was influenced and assisted by the community of practicing scientists, with whom the students had an exceptional ability to communicate effectively. As a result, there appears to be a juxtaposition of creative and logical/analytical thought for open inquiry that may not be present in other forms of inquiry. Instructional strategies are suggested for teachers of science research students to improve the quality of problem finding for their students and their subsequent research projects.

  17. Advancing the Fundamental Understanding of Fission: 2014 LDRD 20120077DR Review

    Energy Technology Data Exchange (ETDEWEB)

    White, Morgan C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Tovesson, Fredrik K. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Sierk, Arnold John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-02-06

    The following slides were presented as part of the LDRD 20120077DR Progress Appraisal Review held Tuesday, February 4, 2014. This is part of an ongoing project assessment the previous of which was documented in LA-UR-13-21182. This presentation documents the progress made against the goals agreed to as part of the 2013 review.

  18. Final report on LDRD project : elucidating performance of proton-exchange-membrane fuel cells via computational modeling with experimental discovery and validation.

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Chao Yang (Pennsylvania State University, University Park, PA); Pasaogullari, Ugur (Pennsylvania State University, University Park, PA); Noble, David R.; Siegel, Nathan P.; Hickner, Michael A.; Chen, Ken Shuang

    2006-11-01

    In this report, we document the accomplishments in our Laboratory Directed Research and Development project in which we employed a technical approach of combining experiments with computational modeling and analyses to elucidate the performance of hydrogen-fed proton exchange membrane fuel cells (PEMFCs). In the first part of this report, we document our focused efforts on understanding water transport in and removal from a hydrogen-fed PEMFC. Using a transparent cell, we directly visualized the evolution and growth of liquid-water droplets at the gas diffusion layer (GDL)/gas flow channel (GFC) interface. We further carried out a detailed experimental study to observe, via direct visualization, the formation, growth, and instability of water droplets at the GDL/GFC interface using a specially-designed apparatus, which simulates the cathode operation of a PEMFC. We developed a simplified model, based on our experimental observation and data, for predicting the onset of water-droplet instability at the GDL/GFC interface. Using a state-of-the-art neutron imaging instrument available at NIST (National Institute of Standard and Technology), we probed liquid-water distribution inside an operating PEMFC under a variety of operating conditions and investigated effects of evaporation due to local heating by waste heat on water removal. Moreover, we developed computational models for analyzing the effects of micro-porous layer on net water transport across the membrane and GDL anisotropy on the temperature and water distributions in the cathode of a PEMFC. We further developed a two-phase model based on the multiphase mixture formulation for predicting the liquid saturation, pressure drop, and flow maldistribution across the PEMFC cathode channels. In the second part of this report, we document our efforts on modeling the electrochemical performance of PEMFCs. We developed a constitutive model for predicting proton conductivity in polymer electrolyte membranes and compared

  19. Nanoporous Silica Templated HeteroEpitaxy: Final LDRD Report.

    Energy Technology Data Exchange (ETDEWEB)

    Burckel, David Bruce; Koleske, Daniel; Rowen, Adam M.; Williams, John Dalton; Fan, Hongyou; Arrington, Christian Lew

    2006-11-01

    This one-year out-of-the-box LDRD was focused on exploring the use of porous growth masks as a method for defect reduction during heteroepitaxial crystal growth. Initially our goal was to investigate porous silica as a growth mask, however, we expanded the scope of the research to include several other porous growth masks on various size scales, including mesoporous carbon, and the UV curable epoxy, SU-8. Use of SU-8 as a growth mask represents a new direction, unique in the extensive literature of patterned epitaxial growth, and presents the possibility of providing a single step growth mask. Additional research included investigation of pore viability via electrochemical deposition into high aspect ratio photoresist patterns and pilot work on using SU-8 as a DUV negative resist, another significant potential result. While the late start nature of this project pushed some of the initial research goals out of the time table, significant progress was made. 3 Acknowledgements This work was performed in part at the Nanoscience @ UNM facility, a member of the National Nanotechnology Infrastructure Network, which is supported by the National Science Foundation (Grant ECS 03-35765). Sandia is multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United Stated Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. This work was supported under the Sandia LDRD program (Project 99405). 4

  20. Efficient Probability of Failure Calculations for QMU using Computational Geometry LDRD 13-0144 Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Scott A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ebeida, Mohamed Salah [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Romero, Vicente J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Swiler, Laura Painton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rushdi, Ahmad A. [Univ. of Texas, Austin, TX (United States); Abdelkader, Ahmad [Univ. of Maryland, College Park, MD (United States)

    2015-09-01

    This SAND report summarizes our work on the Sandia National Laboratory LDRD project titled "Efficient Probability of Failure Calculations for QMU using Computational Geometry" which was project #165617 and proposal #13-0144. This report merely summarizes our work. Those interested in the technical details are encouraged to read the full published results, and contact the report authors for the status of the software and follow-on projects.

  1. The Strategy Project: Promoting Self-Regulated Learning through an Authentic Assignment

    Science.gov (United States)

    Steiner, Hillary H.

    2016-01-01

    Success in college requires the development of self-regulated learning strategies that move beyond high school skills. First-year students of all ability levels benefit when given instruction in how to use these strategies in an authentic context. This paper presents an instructional method that requires deliberate practice of self-regulated…

  2. Final LDRD report : advanced plastic scintillators for neutron detection.

    Energy Technology Data Exchange (ETDEWEB)

    Vance, Andrew L.; Mascarenhas, Nicholas; O' Bryan, Greg; Mrowka, Stanley

    2010-09-01

    This report summarizes the results of a one-year, feasibility-scale LDRD project that was conducted with the goal of developing new plastic scintillators capable of pulse shape discrimination (PSD) for neutron detection. Copolymers composed of matrix materials such as poly(methyl methacrylate) (PMMA) and blocks containing trans-stilbene (tSB) as the scintillator component were prepared and tested for gamma/neutron response. Block copolymer synthesis utilizing tSBMA proved unsuccessful so random copolymers containing up to 30% tSB were prepared. These copolymers were found to function as scintillators upon exposure to gamma radiation; however, they did not exhibit PSD when exposed to a neutron source. This project, while falling short of its ultimate goal, demonstrated the possible utility of single-component, undoped plastics as scintillators for applications that do not require PSD.

  3. LDRD Highlights at the National Laboratories

    Energy Technology Data Exchange (ETDEWEB)

    Alayat, R. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-10-10

    To meet the nation’s critical challenges, the Department of Energy (DOE) national laboratories have always pushed the boundaries of science, technology, and engineering. The Atomic Energy Act of 1954 provided the basis for these laboratories to engage in the cutting edge of science and technology and respond to technological surprises, while retaining the best scientific and technological minds. To help re-energize this commitment, in 1991 the U.S. Congress authorized the national laboratories to devote a relatively small percentage of their budget to creative and innovative work that serves to maintain their vitality in disciplines relevant to DOE missions. Since then, this effort has been formally called the Laboratory Directed Research and Development (LDRD) Program. LDRD has been an essential mechanism to enable the laboratories to address DOE’s current and future missions with leading-edge research proposed independently by laboratory technical staff, evaluated through expert peer-review committees, and funded by the individual laboratories consistent with the authorizing legislation and the DOE LDRD Order 413.2C.

  4. WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)

    Energy Technology Data Exchange (ETDEWEB)

    SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

    2000-01-27

    The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

  5. WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)

    International Nuclear Information System (INIS)

    SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

    2000-01-01

    The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements

  6. LDRD 2013 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Bookless, W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2013-12-31

    This LDRD project establishes a research program led by Jingguang Chen, who has started a new position as a Joint Appointee between BNL and Columbia University as of FY2013. Under this project, Dr. Chen will establish a new program in catalysis science at BNL and Columbia University. The LDRD program will provide initial research funding to start research at both BNL and Columbia. At BNL, Dr. Chen will initiate laboratory research, including hiring research staff, and will collaborate with the existing BNL catalysis and electrocatalysis research groups. At Columbia, a subcontract to Dr. Chen will provide startup funding for his laboratory research, including initial graduate student costs. The research efforts will be linked under a common Catalysis Program in Sustainable Fuels. The overall impact of this project will be to strengthen the BNL catalysis science program through new linked research thrusts and the addition of an internationally distinguished catalysis scientist.

  7. "Applying anatomy to something I care about": Authentic inquiry learning and student experiences of an inquiry project.

    Science.gov (United States)

    Anstey, Lauren M

    2017-11-01

    Despite advances to move anatomy education away from its didactic history, there is a continued need for students to contextualize their studies to make learning more meaningful. This article investigates authentic learning in the context of an inquiry-based approach to learning human gross anatomy. Utilizing a case-study design with three groups of students (n = 18) and their facilitators (n = 3), methods of classroom observations, interviews, and artifact collection were utilized to investigate students' experiences of learning through an inquiry project. Qualitative data analysis through open and selective coding produced common meaningful themes of group and student experiences. Overall results demonstrate how the project served as a unique learning experience where learners engaged in the opportunity to make sense of anatomy in context of their interests and wider interdisciplinary considerations through collaborative, group-based investigation. Results were further considered in context of theoretical frameworks of inquiry-based and authentic learning. Results from this study demonstrate how students can engage anatomical understandings to inquire and apply disciplinary considerations to their personal lives and the world around them. Anat Sci Educ 10: 538-548. © 2017 American Association of Anatomists. © 2017 American Association of Anatomists.

  8. Tracking of Nuclear Production using Indigenous Species: Final LDRD Report

    Energy Technology Data Exchange (ETDEWEB)

    Alam, Todd Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Dept. of Electronic and Nanostructured Materials; Alam, Mary Kathleen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Energetics Characterization Dept.; McIntyre, Sarah K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Dept. of Electronic and Nanostructured Materials; Volk, David [Univ. of Texas, Galveston, TX (United States). Medical Branch; Neerathilingam, Muniasamy [Univ. of Texas, Galveston, TX (United States). Medical Branch; Luxon, Bruce A. [Univ. of Texas, Galveston, TX (United States). Medical Branch; Ansari, G. A. Shakeel [Univ. of Texas, Galveston, TX (United States). Medical Branch

    2009-10-01

    Our LDRD research project sought to develop an analytical method for detection of chemicals used in nuclear materials processing. Our approach is distinctly different than current research involving hardware-based sensors. By utilizing the response of indigenous species of plants and/or animals surrounding (or within) a nuclear processing facility, we propose tracking 'suspicious molecules' relevant to nuclear materials processing. As proof of concept, we have examined TBP, tributylphosphate, used in uranium enrichment as well as plutonium extraction from spent nuclear fuels. We will compare TBP to the TPP (triphenylphosphate) analog to determine the uniqueness of the metabonomic response. We show that there is a unique metabonomic response within our animal model to TBP. The TBP signature can further be delineated from that of TPP. We have also developed unique methods of instrumental transfer for metabonomic data sets.

  9. FY07 LDRD Final Report Precision, Split Beam, Chirped-Pulse, Seed Laser Technology

    Energy Technology Data Exchange (ETDEWEB)

    Dawson, J W; Messerly, M J; Phan, H H; Crane, J K; Beach, R J; Siders, C W; Barty, C J

    2009-11-12

    The goal of this LDRD ER was to develop a robust and reliable technology to seed high-energy laser systems with chirped pulses that can be amplified to kilo-Joule energies and recompressed to sub-picosecond pulse widths creating extremely high peak powers suitable for petawatt class physics experiments. This LDRD project focused on the development of optical fiber laser technologies compatible with the current long pulse National Ignition Facility (NIF) seed laser. New technologies developed under this project include, high stability mode-locked fiber lasers, fiber based techniques for reduction of compressed pulse pedestals and prepulses, new compact stretchers based on chirped fiber Bragg gratings (CFBGs), new techniques for manipulation of chirped pulses prior to amplification and new high-energy fiber amplifiers. This project was highly successful and met virtually all of its goals. The National Ignition Campaign has found the results of this work to be very helpful. The LDRD developed system is being employed in experiments to engineer the Advanced Radiographic Capability (ARC) front end and the fully engineered version of the ARC Front End will employ much of the technology and techniques developed here.

  10. Multi-attribute criteria applied to electric generation energy system analysis LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Kuswa, Glenn W.; Tsao, Jeffrey Yeenien; Drennen, Thomas E.; Zuffranieri, Jason V.; Paananen, Orman Henrie; Jones, Scott A.; Ortner, Juergen G. (DLR, German Aerospace, Cologne); Brewer, Jeffrey D.; Valdez, Maximo M.

    2005-10-01

    This report began with a Laboratory-Directed Research and Development (LDRD) project to improve Sandia National Laboratories multidisciplinary capabilities in energy systems analysis. The aim is to understand how various electricity generating options can best serve needs in the United States. The initial product is documented in a series of white papers that span a broad range of topics, including the successes and failures of past modeling studies, sustainability, oil dependence, energy security, and nuclear power. Summaries of these projects are included here. These projects have provided a background and discussion framework for the Energy Systems Analysis LDRD team to carry out an inter-comparison of many of the commonly available electric power sources in present use, comparisons of those options, and efforts needed to realize progress towards those options. A computer aid has been developed to compare various options based on cost and other attributes such as technological, social, and policy constraints. The Energy Systems Analysis team has developed a multi-criteria framework that will allow comparison of energy options with a set of metrics that can be used across all technologies. This report discusses several evaluation techniques and introduces the set of criteria developed for this LDRD.

  11. 2014 SRNL LDRD Annual Report, Rev. 0

    Energy Technology Data Exchange (ETDEWEB)

    Mcwhorter, S. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-03-15

    Laboratory Directed Research and Development is a congressionally authorized program that provides the ‘innovation inspiration’ from which many of the Laboratory’s multi-discipline advancements are made in both science and engineering technology. The program is the backbone for insuring that scientific, technical and engineering capabilities can meet current and future needs. It is an important tool in reducing the probability of technological surprise by allowing laboratory technical staff room to innovate and keep abreast of scientific breakthroughs. Drawing from the synergism among the EM and NNSA missions, and work from other federal agencies ensures that LDRD is the key element in maintaining the vitality of SRNL’s technical programs. The LDRD program aims to position the Laboratory for new business in clean energy, national security, nuclear materials management and environmental stewardship by leveraging the unique capabilities of the Laboratory to yield foundational scientific research in core business areas, while aligning with SRS strategic initiatives and maintaining a vision for ultimate DOE applications.

  12. Exploring the Relationship between Authentic Leadership and Project Outcomes and Job Satisfaction with Information Technology Professionals

    Science.gov (United States)

    Fischer, Mark A.

    2014-01-01

    One of the most important issues for organizations and information technology (IT) professionals is measuring the success or failure of information technology projects. How we understand the value and usefulness of IT projects is critical to how information technology executives evaluate and decide on technology investments. In a 2009 CHAOS…

  13. Small space object imaging : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Ackermann, Mark R.; Valley, Michael T.; Kearney, Sean Patrick

    2009-10-01

    We report the results of an LDRD effort to investigate new technologies for the identification of small-sized (mm to cm) debris in low-earth orbit. This small-yet-energetic debris presents a threat to the integrity of space-assets worldwide and represents significant security challenge to the international community. We present a nonexhaustive review of recent US and Russian efforts to meet the challenges of debris identification and removal and then provide a detailed description of joint US-Russian plans for sensitive, laser-based imaging of small debris at distances of hundreds of kilometers and relative velocities of several kilometers per second. Plans for the upcoming experimental testing of these imaging schemes are presented and a preliminary path toward system integration is identified.

  14. Geospatial Authentication

    Science.gov (United States)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.

  15. Brand new authentic places

    DEFF Research Database (Denmark)

    Stender, Marie

    created and transformed by architects and designers, estate agents and, eventually, residents? Based on ethnographic fieldwork in 3-4 new residential neighbourhoods in the Copenhagen Region, the project will investigate how stories of authenticity give places meaning and identity. The project will unfold...... neighbourhoods stories of authenticity seems to be of great importance giving value and identity to place and people. By way of design and branding new places are implied with notions of the real, the original and the unique referring to e.g. its historical past, architectural uniqueness, sustainability or sense...

  16. Final report for the network authentication investigation and pilot.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  17. Advanced nuclear measurements LDRD - Sensitivity analysis

    International Nuclear Information System (INIS)

    Dreicer, J.S.

    1999-01-01

    This component of the Advanced Nuclear Measurements LDRD-PD has focused on the analysis and methodologies to quantify and characterize existing inventories of weapons and commercial fissile materials, as well as to, anticipate future forms and quantities to fissile materials. Historically, domestic safeguards had been applied to either pure uniform homogeneous material or to well characterized materials. The future is different simplistically, measurement challenges will be associated with the materials recovered from dismantled nuclear weapons in the US and Russia subject to disposition, the residues and wastes left over from the weapons production process, and from the existing and growing inventory of materials in commercial/civilian programs. Nuclear measurement issues for the fissile materials coming from these sources are associated with homogeneity, purity, and matrix effects. Specifically, these difficult-to-measure fissile materials are heterogeneous, impure, and embedded in highly shielding non-uniform matrices. Currently, each of these effects creates problems for radiation-based assay and it is impossible to measure material that has a combination of all these effects. Nuclear materials control and measurement is a dynamic problem requiring a predictive capability. This component has been tasked with helping select which future problems are the most important to target, during the last year accomplishments include: characterization of weapons waste fissile materials, identification of measurement problem areas, defining instrument requirements, and characterization of commercial fissile materials. A discussion of accomplishments in each of these areas is presented

  18. Parallel Computation Chemistry Using Constraints: Final Report, LDRD 97-0301, Case 3504140000

    Energy Technology Data Exchange (ETDEWEB)

    Todd D. Plantenga

    1998-11-01

    Computer modeling to estimate material properties, design chem/bio sensors, and evaluate protein-protein interactions all require solving force field equations for molecular structures that contain tens of thousands of covalently connected atoms. Potential energy minimization is a key step in the calculation, but stiff covalent bonding forces make optimization difficult and expensive. This two-year LDRD developed two classes of advanced minimization algorithms that were specialized for chemistry applications and distributed computing machines. The project led to two successful algorithms that were implemented in three Sandia computational chemistry codes to support various users.

  19. Speaker Authentication

    CERN Document Server

    Li, Qi (Peter)

    2012-01-01

    This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker’s identity based on his/her voice characteristics while the VIV approach validates a speaker’s identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications. The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speake...

  20. Tools for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-09

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  1. LDRD Final Report: Global Optimization for Engineering Science Problems

    Energy Technology Data Exchange (ETDEWEB)

    HART,WILLIAM E.

    1999-12-01

    For a wide variety of scientific and engineering problems the desired solution corresponds to an optimal set of objective function parameters, where the objective function measures a solution's quality. The main goal of the LDRD ''Global Optimization for Engineering Science Problems'' was the development of new robust and efficient optimization algorithms that can be used to find globally optimal solutions to complex optimization problems. This SAND report summarizes the technical accomplishments of this LDRD, discusses lessons learned and describes open research issues.

  2. LDRD final report : a lightweight operating system for multi-core capability class supercomputers.

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, Suzanne Marie; Hudson, Trammell B. (OS Research); Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Levenhagen, Michael J.; Brightwell, Ronald Brian

    2010-09-01

    The two primary objectives of this LDRD project were to create a lightweight kernel (LWK) operating system(OS) designed to take maximum advantage of multi-core processors, and to leverage the virtualization capabilities in modern multi-core processors to create a more flexible and adaptable LWK environment. The most significant technical accomplishments of this project were the development of the Kitten lightweight kernel, the co-development of the SMARTMAP intra-node memory mapping technique, and the development and demonstration of a scalable virtualization environment for HPC. Each of these topics is presented in this report by the inclusion of a published or submitted research paper. The results of this project are being leveraged by several ongoing and new research projects.

  3. Interface physics in microporous media : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Yaklin, Melissa A.; Knutson, Chad E.; Noble, David R.; Aragon, Alicia R.; Chen, Ken Shuang; Giordano, Nicholas J. (Purdue University, West Lafayette, IN); Brooks, Carlton, F.; Pyrak-Nolte, Laura J. (Purdue University, West Lafayette, IN); Liu, Yihong (Purdue University, West Lafayette, IN)

    2008-09-01

    This document contains a summary of the work performed under the LDRD project entitled 'Interface Physics in Microporous Media'. The presence of fluid-fluid interfaces, which can carry non-zero stresses, distinguishes multiphase flows from more readily understood single-phase flows. In this work the physics active at these interfaces has been examined via a combined experimental and computational approach. One of the major difficulties of examining true microporous systems of the type found in filters, membranes, geologic media, etc. is the geometric uncertainty. To help facilitate the examination of transport at the pore-scale without this complication, a significant effort has been made in the area of fabrication of both two-dimensional and three-dimensional micromodels. Using these micromodels, multiphase flow experiments have been performed for liquid-liquid and liquid-gas systems. Laser scanning confocal microscopy has been utilized to provide high resolution, three-dimensional reconstructions as well as time resolved, two-dimensional reconstructions. Computational work has focused on extending lattice Boltzmann (LB) and finite element methods for probing the interface physics at the pore scale. A new LB technique has been developed that provides over 100x speed up for steady flows in complex geometries. A new LB model has been developed that allows for arbitrary density ratios, which has been a significant obstacle in applying LB to air-water flows. A new reduced order model has been developed and implemented in finite element code for examining non-equilibrium wetting in microchannel systems. These advances will enhance Sandia's ability to quantitatively probe the rich interfacial physics present in microporous systems.

  4. Building more powerful less expensive supercomputers using Processing-In-Memory (PIM) LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Murphy, Richard C.

    2009-09-01

    This report details the accomplishments of the 'Building More Powerful Less Expensive Supercomputers Using Processing-In-Memory (PIM)' LDRD ('PIM LDRD', number 105809) for FY07-FY09. Latency dominates all levels of supercomputer design. Within a node, increasing memory latency, relative to processor cycle time, limits CPU performance. Between nodes, the same increase in relative latency impacts scalability. Processing-In-Memory (PIM) is an architecture that directly addresses this problem using enhanced chip fabrication technology and machine organization. PIMs combine high-speed logic and dense, low-latency, high-bandwidth DRAM, and lightweight threads that tolerate latency by performing useful work during memory transactions. This work examines the potential of PIM-based architectures to support mission critical Sandia applications and an emerging class of more data intensive informatics applications. This work has resulted in a stronger architecture/implementation collaboration between 1400 and 1700. Additionally, key technology components have impacted vendor roadmaps, and we are in the process of pursuing these new collaborations. This work has the potential to impact future supercomputer design and construction, reducing power and increasing performance. This final report is organized as follow: this summary chapter discusses the impact of the project (Section 1), provides an enumeration of publications and other public discussion of the work (Section 1), and concludes with a discussion of future work and impact from the project (Section 1). The appendix contains reprints of the refereed publications resulting from this work.

  5. LDRD Report: Topological Design Optimization of Convolutes in Next Generation Pulsed Power Devices.

    Energy Technology Data Exchange (ETDEWEB)

    Cyr, Eric C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); von Winckel, Gregory John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Kouri, Drew Philip [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gardiner, Thomas Anthony [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ridzal, Denis [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Shadid, John N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Miller, Sean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    This LDRD project was developed around the ambitious goal of applying PDE-constrained opti- mization approaches to design Z-machine components whose performance is governed by elec- tromagnetic and plasma models. This report documents the results of this LDRD project. Our differentiating approach was to use topology optimization methods developed for structural design and extend them for application to electromagnetic systems pertinent to the Z-machine. To achieve this objective a suite of optimization algorithms were implemented in the ROL library part of the Trilinos framework. These methods were applied to standalone demonstration problems and the Drekar multi-physics research application. Out of this exploration a new augmented Lagrangian approach to structural design problems was developed. We demonstrate that this approach has favorable mesh-independent performance. Both the final design and the algorithmic performance were independent of the size of the mesh. In addition, topology optimization formulations for the design of conducting networks were developed and demonstrated. Of note, this formulation was used to develop a design for the inner magnetically insulated transmission line on the Z-machine. The resulting electromagnetic device is compared with theoretically postulated designs.

  6. Idaho National Laboratory LDRD Annual Report FY 2012

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2013-03-01

    This report provides a glimpse into our diverse research and development portfolio, wwhich encompasses both advanced nuclear science and technology and underlying technologies. IN keeping with the mission, INL's LDRD program fosters technical capabilities necessary to support current and future DOE-Office of Nuclear Energy research and development needs.

  7. Multi-target camera tracking, hand-off and display LDRD 158819 final report

    International Nuclear Information System (INIS)

    Anderson, Robert J.

    2014-01-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn't lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identifies individual moving targets from the background imagery, and then displays the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  8. Multi-target camera tracking, hand-off and display LDRD 158819 final report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn't lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identifies individual moving targets from the background imagery, and then displays the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  9. Multi-Target Camera Tracking, Hand-off and Display LDRD 158819 Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Robotic and Security Systems Dept.

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn’t lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identify individual moving targets from the background imagery, and then display the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  10. System and method for authentication

    Science.gov (United States)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  11. Retrospective on the Seniors' Council Tier 1 LDRD portfolio.

    Energy Technology Data Exchange (ETDEWEB)

    Ballard, William Parker

    2012-04-01

    This report describes the Tier 1 LDRD portfolio, administered by the Seniors Council between 2003 and 2011. 73 projects were sponsored over the 9 years of the portfolio at a cost of $10.5 million which includes $1.9M of a special effort in directed innovation targeted at climate change and cyber security. Two of these Tier 1 efforts were the seeds for the Grand Challenge LDRDs in Quantum Computing and Next Generation Photovoltaic conversion. A few LDRDs were terminated early when it appeared clear that the research was not going to succeed. A great many more were successful and led to full Tier 2 LDRDs or direct customer sponsorship. Over a dozen patents are in various stages of prosecution from this work, and one project is being submitted for an R and D 100 award.

  12. Implementation and assessment of a yeast orphan gene research project: involving undergraduates in authentic research experiences and progressing our understanding of uncharacterized open reading frames.

    Science.gov (United States)

    Bowling, Bethany V; Schultheis, Patrick J; Strome, Erin D

    2016-02-01

    Saccharomyces cerevisiae was the first eukaryotic organism to be sequenced; however, little progress has been made in recent years in furthering our understanding of all open reading frames (ORFs). From October 2012 to May 2015 the number of verified ORFs had only risen from 75.31% to 78%, while the number of uncharacterized ORFs had decreased from 12.8% to 11% (representing > 700 genes still left in this category; http://www.yeastgenome.org/genomesnapshot). Course-based research has been shown to increase student learning while providing experience with real scientific investigation; however, implementation in large, multi-section courses presents many challenges. This study sought to test the feasibility and effectiveness of incorporating authentic research into a core genetics course, with multiple instructors, to increase student learning and progress our understanding of uncharacterized ORFs. We generated a module-based annotation toolkit and utilized easily accessible bioinformatics tools to predict gene function for uncharacterized ORFs within the Saccharomyces Genome Database (SGD). Students were each assigned an uncharacterized ORF, which they annotated using contemporary comparative genomics methodologies, including multiple sequence alignment, conserved domain identification, signal peptide prediction and cellular localization algorithms. Student learning outcomes were measured by quizzes, project reports and presentations, as well as a post-project questionnaire. Our results indicate that the authentic research experience had positive impacts on students' perception of their learning and their confidence to conduct future research. Furthermore, we believe that creation of an online repository and adoption and/or adaptation of this project across multiple researchers and institutions could speed the process of gene function prediction. Copyright © 2015 John Wiley & Sons, Ltd.

  13. Implementation and assessment of a yeast orphan gene research project; involving undergraduates in authentic research experiences and progressing our understanding of uncharacterized open reading frames

    Science.gov (United States)

    Bowling, Bethany V.; Schultheis, Patrick J.

    2015-01-01

    Saccharomyces cerevisiae was the first eukaryotic organism to be sequenced, however little progress has been made in recent years in furthering our understanding of all open reading frames (ORFs). From October 2012 to May 2015 the number of verified ORFs has only risen from 75.31% to 78% while the number of uncharacterized ORFs have decreased from 12.8% to 11% (representing more than 700 genes still left in this category) [http://www.yeastgenome.org/genomesnapshot]. Course-based research has been shown to increase student learning while providing experience with real scientific investigation; however, implementation in large, multi-section courses presents many challenges. This study sought to test the feasibility and effectiveness of incorporating authentic research into a core genetics course with multiple instructors to increase student learning and progress our understanding of uncharacterized ORFs. We generated a module-based annotation toolkit and utilized easily accessible bioinformatics tools to predict gene function for uncharacterized ORFs within the Saccharomyces Genome Database (SGD). Students were each assigned an uncharacterized ORF which they annotated using contemporary comparative genomics methodologies including multiple sequence alignment, conserved domain identification, signal peptide prediction and cellular localization algorithms. Student learning outcomes were measured by quizzes, project reports and presentations, as well as a post-project questionnaire. Our results indicate the authentic research experience had positive impacts on student's perception of their learning and their confidence to conduct future research. Furthermore we believe that creation of an online repository and adoption and/or adaptation of this project across multiple researchers and institutions could speed the process of gene function prediction. PMID:26460164

  14. Authentic Teachers: Student Criteria Perceiving Authenticity of Teachers

    Science.gov (United States)

    De Bruyckere, Pedro; Kirschner, Paul A.

    2016-01-01

    Authenticity is seen by many as a key for good learning and education. There is talk of authentic instruction, authentic learning, authentic problems, authentic assessment, authentic tools and authentic teachers. The problem is that while authenticity is an often-used adjective describing almost all aspects of teaching and learning, the concept…

  15. Tibetan Interpretations of Authenticity

    DEFF Research Database (Denmark)

    Sobisch, Jan-Ulrich

    2015-01-01

    The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions.......The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions....

  16. Final LDRD report :ultraviolet water purification systems for rural environments and mobile applications.

    Energy Technology Data Exchange (ETDEWEB)

    Banas, Michael Anthony; Crawford, Mary Hagerott; Ruby, Douglas Scott; Ross, Michael P.; Nelson, Jeffrey Scott; Allerman, Andrew Alan; Boucher, Ray

    2005-11-01

    We present the results of a one year LDRD program that has focused on evaluating the use of newly developed deep ultraviolet LEDs in water purification. We describe our development efforts that have produced an LED-based water exposure set-up and enumerate the advances that have been made in deep UV LED performance throughout the project. The results of E. coli inactivation with 270-295 nm LEDs are presented along with an assessment of the potential for applying deep ultraviolet LED-based water purification to mobile point-of-use applications as well as to rural and international environments where the benefits of photovoltaic-powered systems can be realized.

  17. LDRD final report : mesoscale modeling of dynamic loading of heterogeneous materials

    Energy Technology Data Exchange (ETDEWEB)

    Robbins, Joshua [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dingreville, Remi Philippe Michel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Voth, Thomas Eugene [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Furnish, Michael David [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-12-01

    Material response to dynamic loading is often dominated by microstructure (grain structure, porosity, inclusions, defects). An example critically important to Sandia's mission is dynamic strength of polycrystalline metals where heterogeneities lead to localization of deformation and loss of shear strength. Microstructural effects are of broad importance to the scientific community and several institutions within DoD and DOE; however, current models rely on inaccurate assumptions about mechanisms at the sub-continuum or mesoscale. Consequently, there is a critical need for accurate and robust methods for modeling heterogeneous material response at this lower length scale. This report summarizes work performed as part of an LDRD effort (FY11 to FY13; project number 151364) to meet these needs.

  18. Precision formed micro magnets: LDRD project summary report

    Energy Technology Data Exchange (ETDEWEB)

    CHRISTENSON,TODD R.; GARINO,TERRY J.; VENTURINI,EUGENE L.

    2000-02-01

    A microfabrication process is described that provides for the batch realization of miniature rare earth based permanent magnets. Prismatic geometry with features as small as 5 microns, thicknesses up through several hundred microns and with submicron tolerances may be accommodated. The processing is based on a molding technique using deep x-ray lithography as a means to generate high aspect-ratio precision molds from PMMA (poly methyl methacrylate) used as an x-ray photoresist. Subsequent molding of rare-earth permanent magnet (REPM) powder combined with a thermosetting plastic binder may take place directly in the PMMA mold. Further approaches generate an alumina form replicated from the PMMA mold that becomes an intermediate mold for pressing higher density REPM material and allows for higher process temperatures. Maximum energy products of 3--8 MGOe (Mega Gauss Oersted, 1 MGOe = 100/4{pi} kJ/m{sup 3}) are obtained for bonded isotropic forms of REPM with dimensions on the scale of 100 microns and up to 23 MGOe for more dense anisotropic REPM material using higher temperature processing. The utility of miniature precision REPMs is revealed by the demonstration of a miniature multipole brushless DC motor that possesses a pole-anisotropic rotor with dimensions that would otherwise prohibit multipole magnetization using a multipole magnetizing fixture at this scale. Subsequent multipole assembly also leads to miniaturized Halbach arrays, efficient magnetic microactuators, and mechanical spring-like elements which can offset miniaturized mechanical scaling behavior.

  19. AIS authentication

    CERN Multimedia

    2006-01-01

    Users are invited to use the NICE password for AIS authentication. As announced in CNL June-August 2006 (see http://www.cerncourier.com/articles/cnl/3/6/14/1) it is possible to use the NICE username and password to log on to AIS. The procedure is now fully operational and users can themselves reset the AIS password such that the NICE password will be used for authentication required by AIS applications. We strongly recommend CERN users who have a NICE account (this is the case of most users) to do this, with the objective to reduce the number of passwords they need to remember. This can be achieved very easily, directly from the Change Password option on the AIS login (https://aislogin.cern.ch/). Users should just select the '[Change Password]' option displayed at the bottom of the page, provide the 'Old Password' and then click on the button 'Use Nice password' followed by 'Submit'. Change Password option on the AIS login windowSetting the AIS password - Use Nice Password It should be noted that the proce...

  20. Risk assessment meta tool LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Bouchard, Ann Marie; Osbourn, Gordon Cecil

    2006-12-01

    The goal of this project was to develop a risk analysis meta tool--a tool that enables security analysts both to combine and analyze data from multiple other risk assessment tools on demand. Our approach was based on the innovative self-assembling software technology under development by the project team. This technology provides a mechanism for the user to specify his intentions at a very high level (e.g., equations or English-like text), and then the code self-assembles itself, taking care of the implementation details. The first version of the meta tool focused specifically in importing and analyzing data from Joint Conflict and Tactical Simulation (JCATS) force-on-force simulation. We discuss the problem, our approach, technical risk, and accomplishments on this project, and outline next steps to be addressed with follow-on funding.

  1. Should Teachers Be Authentic?

    Science.gov (United States)

    Bialystok, Lauren

    2015-01-01

    Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…

  2. Diffractive Optics in the Infrared (DiOptIR) LDRD 67109 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Alford, Charles Fred; Vawter, Gregory Allen; Wendt, Joel Robert; Kemme, Shanalyn A.; Samora, Sally; Carter, Tony Ray; Peters, David William; Shields, Eric A.

    2005-10-01

    This diffractive optical element (DOE) LDRD is divided into two tasks. In Task 1, we develop two new DOE technologies: (1) a broad wavelength band effective anti-reflection (AR) structure and (2) a design tool to encode dispersion and polarization information into a unique diffraction pattern. In Task 2, we model, design, and fabricate a subwavelength polarization splitter. The first technology is an anti-reflective (AR) layer that may be etched into the DOE surface. For many wavelengths of interest, transmissive silicon DOEs are ideal. However, a significant portion of light (30% from each surface) is lost due to Fresnel reflection. To address this issue, we investigate a subwavelength, surface relief structure that acts as an effective AR coating. The second DOE component technology in Task 1 is a design tool to determine the optimal DOE surface relief structure that can encode the light's degree of dispersion and polarization into a unique spatial pattern. Many signals of interest have unique spatial, temporal, spectral, and polarization signatures. The ability to disperse the signal into a unique diffraction pattern would result in improved signal detection sensitivity with a simultaneous reduction in false alarm. Task 2 of this LDRD project is to investigate the modeling, design, and fabrication of subwavelength birefringent devices for polarimetric spectral sensing and imaging applications. Polarimetric spectral sensing measures the spectrum of the light and polarization state of light at each wavelength simultaneously. The capability to obtain both polarization and spectral information can help develop target/object signature and identify the target/object for several applications in NP&MC and national security.

  3. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations...... in theoretical understanding of the meanings of authentication. We provide a new insight in this direction and formalize it in CFPS (Common Framework for authentication Protocols' Specifications). CFPS provides a precise scope of definition for authentication protocols, which could make the design and analysis...

  4. Authenticating the Leader

    DEFF Research Database (Denmark)

    Johnsen, Christian Garmann

    As authentic leadership, with its dictum of being true to the self, has become increasingly influential among practitioners and mainstream leadership scholars, critical writers have drawn attention to the negative consequences of this development. Yet, few scholars have investigated the problem...... of authentication within discourse of authentic leadership. If authentic leadership is to make any sense, it is necessary to be able to distinguish the authentic from the inauthentic leader – in other words, it is necessary to authenticate the leader. This paper uses Gilles Deleuze’s reading of Plato as the point...... of departure for discussing the problem of authentication – separating the authentic leader form the inauthentic one – in the leadership guru Bill George’s model of authentic leadership. By doing so, the paper offers a way of conceptualizing the problem of authenticating leaders, as well as challenging...

  5. Bringing Authentic Research into the Classroom with the Mars Student Imaging Project: Comparison of the PBL Gold Standards to the Scientific Methods

    Science.gov (United States)

    Pounder, Jean

    2017-04-01

    The goal of Project Based Learning (PBL) is to actively engage students through authentic, real word study to increase content knowledge, understanding, and skills for everyday success. The essential design of PBL is very similar in nature to the scientific method and therefore easy to adapt to the science classroom. In my classroom, students use these essential elements when engaging in the study of the processes that affect the surface of a planet such as weathering and erosion. Studying Mars is a hook to getting students to learn about the same processes that occur on Earth and to contrast the differences that occur on another planetary body. As part of the Mars Student Imaging Project (MSIP), students have the opportunity to engage and collaborate with NASA scientists at Arizona State University and get feedback on their work. They research and develop their own question or area of focus to study. They use images of Mars taken using the THEMIS camera onboard the Mars Odyssey Satellite, which has been orbiting Mars since 2001. Students submit a proposal to the scientists at ASU and, if accepted, they are given the opportunity to use the THEMIS camera in orbit to photograph a new region on Mars that will hopefully contribute to their research. Students give a final presentation to the faculty, staff, community, and other students by presenting their work in a poster session and explaining their work to the audience.

  6. LDRD Final Report: Advanced Hohlraum Concepts

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Ogden S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-11-08

    Indirect drive inertial confinement fusion (ICF) experiments to date have mostly used cylindrical, laser-heated, gas-filled hohlraums to produce the radiation drive needed to symmetrically implode DT-filled fusion capsules. These hohlraums have generally been unable to produce a symmetric radiation drive through the end of the desired drive pulse, and are plagued with complications due to laser-plasma interactions (LPI) that have made it difficult to predict their performance. In this project we developed several alternate hohlraum concepts. These new hohlraums utilize different hohlraum geometries, radiation shields, and foam materials in an attempt to improve performance relative to cylindrical hohlraums. Each alternate design was optimized using radiation hydrodynamic (RH) design codes to implode a reference DT capsule with a high-density carbon (HDC) ablator. The laser power and energy required to produce the desired time-dependent radiation drive, and the resulting time-dependent radiation symmetry for each new concept were compared to the results for a reference cylindrical hohlraum. Since several of the new designs needed extra laser entrance holes (LEHs), techniques to keep small LEHs open longer, including high-Z foam liners and low-Z wires at the LEH axis, were investigated numerically. Supporting experiments and target fabrication efforts were also done as part of this project. On the Janus laser facility plastic tubes open at one end (halfraums) and filled with SiO2 or Ta2O5 foam were heated with a single 2w laser. Laser propagation and backscatter were measured. Generally the measured propagation was slower than calculated, and the measured laser backscatter was less than calculated. A comparable, scaled up experiment was designed for the NIF facility and four targets were built. Since low density gold foam was identified as a desirable material for lining the LEH and the hohlraum wall, a technique was developed to

  7. Kerberos authentication: The security answer for unsecured networks

    Energy Technology Data Exchange (ETDEWEB)

    Engert, D.E.

    1995-06-01

    Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

  8. Final Report for the Virtual Reliability Realization System LDRD

    Energy Technology Data Exchange (ETDEWEB)

    DELLIN, THEODORE A.; HENDERSON, CHRISTOPHER L.; O' TOOLE, EDWARD J.

    2000-12-01

    Current approaches to reliability are not adequate to keep pace with the need for faster, better and cheaper products and systems. This is especially true in high consequence of failure applications. The original proposal for the LDRD was to look at this challenge and see if there was a new paradigm that could make reliability predictions, along with a quantitative estimate of the risk in that prediction, in a way that was faster, better and cheaper. Such an approach would be based on the underlying science models that are the backbone of reliability predictions. The new paradigm would be implemented in two software tools: the Virtual Reliability Realization System (VRRS) and the Reliability Expert System (REX). The three-year LDRD was funded at a reduced level for the first year ($120K vs. $250K) and not renewed. Because of the reduced funding, we concentrated on the initial development of the expertise system. We developed an interactive semiconductor calculation tool needed for reliability analyses. We also were able to generate a basic functional system using Microsoft Siteserver Commerce Edition and Microsoft Sequel Server. The base system has the capability to store Office documents from multiple authors, and has the ability to track and charge for usage. The full outline of the knowledge model has been incorporated as well as examples of various types of content.

  9. Immersive Learning: Realism, Authenticity & Audience

    OpenAIRE

    Livingstone, Daniel

    2016-01-01

    For almost 20 years the Digital Design Studio has been exploring and applying virtual reality for a wide range of industrial, commercial and educational applications. Drawing from a range of recent projects, we explore the complex relationships between realism, authenticity and audience for effective engagement and education in immersive learning.

  10. ParaText : scalable solutions for processing and searching very large document collections : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Crossno, Patricia Joyce; Dunlavy, Daniel M.; Stanton, Eric T.; Shead, Timothy M.

    2010-09-01

    This report is a summary of the accomplishments of the 'Scalable Solutions for Processing and Searching Very Large Document Collections' LDRD, which ran from FY08 through FY10. Our goal was to investigate scalable text analysis; specifically, methods for information retrieval and visualization that could scale to extremely large document collections. Towards that end, we designed, implemented, and demonstrated a scalable framework for text analysis - ParaText - as a major project deliverable. Further, we demonstrated the benefits of using visual analysis in text analysis algorithm development, improved performance of heterogeneous ensemble models in data classification problems, and the advantages of information theoretic methods in user analysis and interpretation in cross language information retrieval. The project involved 5 members of the technical staff and 3 summer interns (including one who worked two summers). It resulted in a total of 14 publications, 3 new software libraries (2 open source and 1 internal to Sandia), several new end-user software applications, and over 20 presentations. Several follow-on projects have already begun or will start in FY11, with additional projects currently in proposal.

  11. Real-time discriminatory sensors for water contamination events :LDRD 52595 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Borek, Theodore Thaddeus III (; ); Carrejo-Simpkins, Kimberly; Wheeler, David Roger; Adkins, Douglas Ray; Robinson, Alex Lockwood; Irwin, Adriane Nadine; Lewis, Patrick Raymond; Goodin, Andrew M.; Shelmidine, Gregory J.; Dirk, Shawn M.; Chambers, William Clayton; Mowry, Curtis Dale (1722 Micro-Total-Analytical Systems); Showalter, Steven Kedrick

    2005-10-01

    The gas-phase {mu}ChemLab{trademark} developed by Sandia can detect volatile organics and semi-volatiles organics via gas phase sampling . The goal of this three year Laboratory Directed Research and Development (LDRD) project was to adapt the components and concepts used by the {mu}ChemLab{trademark} system towards the analysis of water-borne chemicals of current concern. In essence, interfacing the gas-phase {mu}ChemLab{trademark} with water to bring the significant prior investment of Sandia and the advantages of microfabrication and portable analysis to a whole new world of important analytes. These include both chemical weapons agents and their hydrolysis products and disinfection by-products such as Trihalomethanes (THMs) and haloacetic acids (HAAs). THMs and HAAs are currently regulated by EPA due to health issues, yet water utilities do not have rapid on-site methods of detection that would allow them to adjust their processes quickly; protecting consumers, meeting water quality standards, and obeying regulations more easily and with greater confidence. This report documents the results, unique hardware and devices, and methods designed during the project toward the goal stated above. It also presents and discusses the portable field system to measure THMs developed in the course of this project.

  12. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session. In th...... as the only setup assumption. We hope post-session authentication can be used to devise new strategies for building trust among strangers....

  13. Authenticity in Adult Learning

    Science.gov (United States)

    Ashton, Sam

    2010-01-01

    This paper is concerned with the relationship between authenticity and adult learning and prompted by some studies in which adult "authentic learning" is a central concept. The implication revealed by them is that real-worldness of learning contexts, learning content and learning tasks is perceived as conferring authenticity on learning. Here,…

  14. Authenticating the Leader

    DEFF Research Database (Denmark)

    Garmann Johnsen, Christian

    2018-01-01

    In the wake of a series of corporate scandals, there has been a growing call for authentic leadership in order to ensure ethical conduct in contemporary organizations. Authentic leadership, however, depends upon the ability to draw a distinction between the authentic and inauthentic leader. This ...... or her own value-commitments....

  15. Authentication Assurance Levels

    International Nuclear Information System (INIS)

    Kouzes, Richard T.; Cash, James R.; Devaney, David M.; Geelhood, Bruce D.; Hansen, Randy R.; Melton, Ronald B.; Pitts, W. Karl

    2002-01-01

    This Common Criteria approach has been applied to create a definition of Authentication Assurance Levels that can quantify the level of assurance reached for a system subject to a set of authentication procedures. The arms-control authentication application of the Common Criteria expands on more typical information security evaluations in that it must contend with information barriers and preclude sophisticated intentional subversion attempts.

  16. Automated Algorithms for Quantum-Level Accuracy in Atomistic Simulations: LDRD Final Report.

    Energy Technology Data Exchange (ETDEWEB)

    Thompson, Aidan Patrick; Schultz, Peter Andrew; Crozier, Paul; Moore, Stan Gerald; Swiler, Laura Painton; Stephens, John Adam; Trott, Christian Robert; Foiles, Stephen Martin; Tucker, Garritt J. (Drexel University)

    2014-09-01

    This report summarizes the result of LDRD project 12-0395, titled "Automated Algorithms for Quantum-level Accuracy in Atomistic Simulations." During the course of this LDRD, we have developed an interatomic potential for solids and liquids called Spectral Neighbor Analysis Poten- tial (SNAP). The SNAP potential has a very general form and uses machine-learning techniques to reproduce the energies, forces, and stress tensors of a large set of small configurations of atoms, which are obtained using high-accuracy quantum electronic structure (QM) calculations. The local environment of each atom is characterized by a set of bispectrum components of the local neighbor density projected on to a basis of hyperspherical harmonics in four dimensions. The SNAP coef- ficients are determined using weighted least-squares linear regression against the full QM training set. This allows the SNAP potential to be fit in a robust, automated manner to large QM data sets using many bispectrum components. The calculation of the bispectrum components and the SNAP potential are implemented in the LAMMPS parallel molecular dynamics code. Global optimization methods in the DAKOTA software package are used to seek out good choices of hyperparameters that define the overall structure of the SNAP potential. FitSnap.py, a Python-based software pack- age interfacing to both LAMMPS and DAKOTA is used to formulate the linear regression problem, solve it, and analyze the accuracy of the resultant SNAP potential. We describe a SNAP potential for tantalum that accurately reproduces a variety of solid and liquid properties. Most significantly, in contrast to existing tantalum potentials, SNAP correctly predicts the Peierls barrier for screw dislocation motion. We also present results from SNAP potentials generated for indium phosphide (InP) and silica (SiO 2 ). We describe efficient algorithms for calculating SNAP forces and energies in molecular dynamics simulations using massively parallel computers

  17. Advancements in sensing and perception using structured lighting techniques :an LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Novick, David Keith; Padilla, Denise D.; Davidson, Patrick A. Jr. (.; .); Carlson, Jeffrey J.

    2005-09-01

    This report summarizes the analytical and experimental efforts for the Laboratory Directed Research and Development (LDRD) project entitled ''Advancements in Sensing and Perception using Structured Lighting Techniques''. There is an ever-increasing need for robust, autonomous ground vehicles for counterterrorism and defense missions. Although there has been nearly 30 years of government-sponsored research, it is undisputed that significant advancements in sensing and perception are necessary. We developed an innovative, advanced sensing technology for national security missions serving the Department of Energy, the Department of Defense, and other government agencies. The principal goal of this project was to develop an eye-safe, robust, low-cost, lightweight, 3D structured lighting sensor for use in broad daylight outdoor applications. The market for this technology is wide open due to the unavailability of such a sensor. Currently available laser scanners are slow, bulky and heavy, expensive, fragile, short-range, sensitive to vibration (highly problematic for moving platforms), and unreliable for outdoor use in bright sunlight conditions. Eye-safety issues are a primary concern for currently available laser-based sensors. Passive, stereo-imaging sensors are available for 3D sensing but suffer from several limitations : computationally intensive, require a lighted environment (natural or man-made light source), and don't work for many scenes or regions lacking texture or with ambiguous texture. Our approach leveraged from the advanced capabilities of modern CCD camera technology and Center 6600's expertise in 3D world modeling, mapping, and analysis, using structured lighting. We have a diverse customer base for indoor mapping applications and this research extends our current technology's lifecycle and opens a new market base for outdoor 3D mapping. Applications include precision mapping, autonomous navigation, dexterous

  18. Bringing Community and Academic Scholars Together to Facilitate and Conduct Authentic Community Based Participatory Research: Project UNITED

    Science.gov (United States)

    Lewis, Dwight; Yerby, Lea; Tucker, Melanie; Foster, Pamela Payne; Hamilton, Kara C.; Fifolt, Matthew M.; Hites, Lisle; Shreves, Mary Katherine; Page, Susan B.; Bissell, Kimberly L.; Lucky, Felecia L.; Higginbotham, John C.

    2015-01-01

    Cultural competency, trust, and research literacy can affect the planning and implementation of sustainable community-based participatory research (CBPR). The purpose of this manuscript is to highlight: (1) the development of a CBPR pilot grant request for application; and (2) a comprehensive program supporting CBPR obesity-related grant proposals facilitated by activities designed to promote scholarly collaborations between academic researchers and the community. After a competitive application process, academic researchers and non-academic community leaders were selected to participate in activities where the final culminating project was the submission of a collaborative obesity-related CBPR grant application. Teams were comprised of a mix of academic researchers and non-academic community leaders, and each team submitted an application addressing obesity-disparities among rural predominantly African American communities in the US Deep South. Among four collaborative teams, three (75%) successfully submitted a grant application to fund an intervention addressing rural and minority obesity disparities. Among the three submitted grant applications, one was successfully funded by an internal CBPR grant, and another was funded by an institutional seed funding grant. Preliminary findings suggest that the collaborative activities were successful in developing productive scholarly relationships between researchers and community leaders. Future research will seek to understand the full-context of our findings. PMID:26703675

  19. Bringing Community and Academic Scholars Together to Facilitate and Conduct Authentic Community Based Participatory Research: Project UNITED.

    Science.gov (United States)

    Lewis, Dwight; Yerby, Lea; Tucker, Melanie; Foster, Pamela Payne; Hamilton, Kara C; Fifolt, Matthew M; Hites, Lisle; Shreves, Mary Katherine; Page, Susan B; Bissell, Kimberly L; Lucky, Felecia L; Higginbotham, John C

    2015-12-22

    Cultural competency, trust, and research literacy can affect the planning and implementation of sustainable community-based participatory research (CBPR). The purpose of this manuscript is to highlight: (1) the development of a CBPR pilot grant request for application; and (2) a comprehensive program supporting CBPR obesity-related grant proposals facilitated by activities designed to promote scholarly collaborations between academic researchers and the community. After a competitive application process, academic researchers and non-academic community leaders were selected to participate in activities where the final culminating project was the submission of a collaborative obesity-related CBPR grant application. Teams were comprised of a mix of academic researchers and non-academic community leaders, and each team submitted an application addressing obesity-disparities among rural predominantly African American communities in the US Deep South. Among four collaborative teams, three (75%) successfully submitted a grant application to fund an intervention addressing rural and minority obesity disparities. Among the three submitted grant applications, one was successfully funded by an internal CBPR grant, and another was funded by an institutional seed funding grant. Preliminary findings suggest that the collaborative activities were successful in developing productive scholarly relationships between researchers and community leaders. Future research will seek to understand the full-context of our findings.

  20. Characterize and Model Final Waste Formulations and Offgas Solids from Thermal Treatment Processes - FY-98 Final Report for LDRD 2349

    Energy Technology Data Exchange (ETDEWEB)

    Kessinger, Glen Frank; Nelson, Lee Orville; Grandy, Jon Drue; Zuck, Larry Douglas; Kong, Peter Chuen Sun; Anderson, Gail

    1999-08-01

    The purpose of LDRD #2349, Characterize and Model Final Waste Formulations and Offgas Solids from Thermal Treatment Processes, was to develop a set of tools that would allow the user to, based on the chemical composition of a waste stream to be immobilized, predict the durability (leach behavior) of the final waste form and the phase assemblages present in the final waste form. The objectives of the project were: • investigation, testing and selection of thermochemical code • development of auxiliary thermochemical database • synthesis of materials for leach testing • collection of leach data • using leach data for leach model development • thermochemical modeling The progress toward completion of these objectives and a discussion of work that needs to be completed to arrive at a logical finishing point for this project will be presented.

  1. Multi-factor authentication

    Science.gov (United States)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  2. Authentic And Concurrent Evaluation-refining

    DEFF Research Database (Denmark)

    Eriksson, Carina Ihlström; Åkesson, Maria; Kautz, Karlheinz

    2011-01-01

    This paper addresses the need for more detailed accounts for evaluation in design science research literature. By revisiting a design project regarding the future e-newspaper we give detailed descriptions of its authentic and concurrent evaluation approach by illustrating the what, why and how...... as well as decisions on strategic levels. We emphasize a holistic and concurrent approach to evaluation compared to the general design science research thinking and argue that reflecting on how to seek authenticity is important. By authenticity we refer to the notion of how closely an evaluation captures...

  3. Quantitative adaptation analytics for assessing dynamic systems of systems: LDRD Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Gauthier, John H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). System Readiness & Sustainment Technologies (6133, M/S 1188); Miner, Nadine E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Military & Energy Systems Analysis (6114, M/S 1188); Wilson, Michael L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Resilience and Regulatory Effects (6921, M/S 1138); Le, Hai D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). System Readiness & Sustainment Technologies (6133, M/S 1188); Kao, Gio K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Networked System Survivability & Assurance (5629, M/S 0671); Melander, Darryl J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Software Systems R& D (9525, M/S 1188); Longsine, Dennis Earl [Sandia National Laboratories, Unknown, Unknown; Vander Meer, Jr., Robert C. [SAIC, Inc., Albuquerque, NM (United States)

    2015-01-01

    Our society is increasingly reliant on systems and interoperating collections of systems, known as systems of systems (SoS). These SoS are often subject to changing missions (e.g., nation- building, arms-control treaties), threats (e.g., asymmetric warfare, terrorism), natural environments (e.g., climate, weather, natural disasters) and budgets. How well can SoS adapt to these types of dynamic conditions? This report details the results of a three year Laboratory Directed Research and Development (LDRD) project aimed at developing metrics and methodologies for quantifying the adaptability of systems and SoS. Work products include: derivation of a set of adaptability metrics, a method for combining the metrics into a system of systems adaptability index (SoSAI) used to compare adaptability of SoS designs, development of a prototype dynamic SoS (proto-dSoS) simulation environment which provides the ability to investigate the validity of the adaptability metric set, and two test cases that evaluate the usefulness of a subset of the adaptability metrics and SoSAI for distinguishing good from poor adaptability in a SoS. Intellectual property results include three patents pending: A Method For Quantifying Relative System Adaptability, Method for Evaluating System Performance, and A Method for Determining Systems Re-Tasking.

  4. Authentication: Hot and cool

    OpenAIRE

    Cohen, E; Cohen, SA

    2012-01-01

    Seeking to shift the discussion of the concept of authenticity in tourism scholarship from the dominant concern with tourist experiences to the more sociological problem of the processes of authentication of tourist attractions, we conceptualize two analytically distinct, but practically often intersecting, modes of authentication of attractions, “cool” and “hot”. Through a range of examples, we demonstrate the implications of the two modes for the dynamics of the constitution of tourist attr...

  5. Final LDRD report : development of sample preparation methods for ChIPMA-based imaging mass spectrometry of tissue samples.

    Energy Technology Data Exchange (ETDEWEB)

    Maharrey, Sean P.; Highley, Aaron M.; Behrens, Richard, Jr.; Wiese-Smith, Deneille

    2007-12-01

    The objective of this short-term LDRD project was to acquire the tools needed to use our chemical imaging precision mass analyzer (ChIPMA) instrument to analyze tissue samples. This effort was an outgrowth of discussions with oncologists on the need to find the cellular origin of signals in mass spectra of serum samples, which provide biomarkers for ovarian cancer. The ultimate goal would be to collect chemical images of biopsy samples allowing the chemical images of diseased and nondiseased sections of a sample to be compared. The equipment needed to prepare tissue samples have been acquired and built. This equipment includes an cyro-ultramicrotome for preparing thin sections of samples and a coating unit. The coating unit uses an electrospray system to deposit small droplets of a UV-photo absorbing compound on the surface of the tissue samples. Both units are operational. The tissue sample must be coated with the organic compound to enable matrix assisted laser desorption/ionization (MALDI) and matrix enhanced secondary ion mass spectrometry (ME-SIMS) measurements with the ChIPMA instrument Initial plans to test the sample preparation using human tissue samples required development of administrative procedures beyond the scope of this LDRD. Hence, it was decided to make two types of measurements: (1) Testing the spatial resolution of ME-SIMS by preparing a substrate coated with a mixture of an organic matrix and a bio standard and etching a defined pattern in the coating using a liquid metal ion beam, and (2) preparing and imaging C. elegans worms. Difficulties arose in sectioning the C. elegans for analysis and funds and time to overcome these difficulties were not available in this project. The facilities are now available for preparing biological samples for analysis with the ChIPMA instrument. Some further investment of time and resources in sample preparation should make this a useful tool for chemical imaging applications.

  6. Low-Altitude Airbursts and the Impact Threat - Final LDRD Report.

    Energy Technology Data Exchange (ETDEWEB)

    Boslough, Mark B.; Crawford, David A.

    2007-12-01

    The purpose of this nine-week project was to advance the understanding of low-altitude airbursts by developing the means to model them at extremely high resolution in order to span the scales of entry physics as well as blast wave and plume formation. Small asteroid impacts on Earth are a recognized hazard, but the full nature of the threat is still not well understood. We used shock physics codes to discover emergent phenomena associated with low-altitude airbursts such as the Siberian Tunguska event of 1908 and the Egyptian glass-forming event 29 million years ago. The planetary defense community is beginning to recognize the significant threat from such airbursts. Low-altitude airbursts are the only class of impacts that have a significant probability of occurring within a planning time horizon. There is roughly a 10% chance of a megaton-scale low-altitude airburst event in the next decade.The first part of this LDRD final project report is a preprint of our proceedings paper associated with the plenary presentation at the Hypervelocity Impact Society 2007 Symposium in Williamsburg, Virginia (International Journal of Impact Engineering, in press). The paper summarizes discoveries associated with a series of 2D axially-symmetric CTH simulations. The second part of the report contains slides from an invited presentation at the American Geophysical Union Fall 2007 meeting in San Francisco. The presentation summarizes the results of a series of 3D oblique impact simulations of the 1908 Tunguska explosion. Because of the brevity of this late-start project, the 3D results have not yet been written up for a peer-reviewed publication. We anticipate the opportunity to eventually run simulations that include the actual topography at Tunguska, at which time these results will be published.3

  7. ESnet authentication services and trust federations

    International Nuclear Information System (INIS)

    Muruganantham, Dhivakaran; Helm, Mike; Genovese, Tony

    2005-01-01

    ESnet provides authentication services and trust federation support for SciDAC projects, collaboratories, and other distributed computing applications. The ESnet ATF team operates the DOEGrids Certificate Authority, available to all DOE Office of Science programs, plus several custom CAs, including one for the National Fusion Collaboratory and one for NERSC. The secure hardware and software environment developed to support CAs is suitable for supporting additional custom authentication and authorization applications that your program might require. Seamless, secure interoperation across organizational and international boundaries is vital to collaborative science. We are fostering the development of international PKI federations by founding the TAGPMA, the American regional PMA, and the worldwide IGTF Policy Management Authority (PMA), as well as participating in European and Asian regional PMAs. We are investigating and prototyping distributed authentication technology that will allow us to support the 'roaming scientist' (distributed wireless via eduroam), as well as more secure authentication methods (one-time password tokens)

  8. From Idea to Innovation: The Role of LDRD Investments in Sandia's Recent Successful B61 Experiments.

    Energy Technology Data Exchange (ETDEWEB)

    Arrowsmith, Marie Danielle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    The Laboratory Directed Research and Development (LDRD) program, authorized by U.S. Congress in 1991, enables Department of Energy (DOE) laboratories to devote a small portion of their research funding to high-risk and potentially high-payoff research. Because it is high-risk, LDRD-supported research may not lead to immediate mission impacts; however, many successes at DOE labs can be traced back to investments in LDRD. LDRD investments have a history of enabling significant payoffs for long-running DOE and NNSA missions and for providing anticipatory new technologies that ultimately become critical to future missions. Many of Sandia National Laboratories’ successes can be traced back to investments in LDRD. Capabilities from three LDRDs were critical to recent tests of the B61-12 gravity bomb—tests that would previously have only been performed experimentally.

  9. Authenticity at work

    NARCIS (Netherlands)

    van den Bosch, Ralph

    2016-01-01

    Authenticity at work, loosely defined as the degree to which an individual stays true to their core self, has impact on workers in the workplace. This thesis shows that authenticity at work can be measured with a reliable and valid instrument: the IAM Work. Furthermore, results of this thesis show

  10. AUTHENTICITY IN THE BLOGOSPHERE

    Directory of Open Access Journals (Sweden)

    Waclaw Branicki

    2010-01-01

    Full Text Available The primary purpose of this article is to answer the question of whether writing a blog defined as a personal diary can help to better understand himself. Self-awareness is a prerequisite for authentic existence. In the first part analyzed the concept of authenticity. Pointed out the relationship of authenticity to the categories of freedom, truth and responsibility. The second part presents the relationship between authentic existence and the process of self-disclosure, which may take place in the blogosphere. In the third part presents the question whether a writing blog affects the level authenticity of existence. It was recognized that a key element of this phenomenon is the sense of responsibility.

  11. Chemiresistor microsensors for in-situ monitoring of volatile organic compounds : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Michael Loren; Hughes, Robert Clark; Kooser, Ara S.; McGrath, Lucas K.; Ho, Clifford Kuofei; Wright, Jerome L.; Davis, Chad Edward

    2003-09-01

    This report provides a summary of the three-year LDRD (Laboratory Directed Research and Development) project aimed at developing microchemical sensors for continuous, in-situ monitoring of volatile organic compounds. A chemiresistor sensor array was integrated with a unique, waterproof housing that allows the sensors to be operated in a variety of media including air, soil, and water. Numerous tests were performed to evaluate and improve the sensitivity, stability, and discriminatory capabilities of the chemiresistors. Field tests were conducted in California, Nevada, and New Mexico to further test and develop the sensors in actual environments within integrated monitoring systems. The field tests addressed issues regarding data acquisition, telemetry, power requirements, data processing, and other engineering requirements. Significant advances were made in the areas of polymer optimization, packaging, data analysis, discrimination, design, and information dissemination (e.g., real-time web posting of data; see www.sandia.gov/sensor). This project has stimulated significant interest among commercial and academic institutions. A CRADA (Cooperative Research and Development Agreement) was initiated in FY03 to investigate manufacturing methods, and a Work for Others contract was established between Sandia and Edwards Air Force Base for FY02-FY04. Funding was also obtained from DOE as part of their Advanced Monitoring Systems Initiative program from FY01 to FY03, and a DOE EMSP contract was awarded jointly to Sandia and INEEL for FY04-FY06. Contracts were also established for collaborative research with Brigham Young University to further evaluate, understand, and improve the performance of the chemiresistor sensors.

  12. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner\\'s signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  13. The Chronotopes of Authenticity: Designing the Tujia Heritage in China

    Science.gov (United States)

    Wang, Xuan; Kroon, Sjaak

    2017-01-01

    This paper examines the ways in which the ethnic minority group the Tujia in Enshi, China, engages with heritage tourism, as a complex project of designing authenticity. Authenticity is taken as part of the chronotopic phenomena of identity making: the complex interplay of multiple, nonrandom timespace frames of discourses and semiotic…

  14. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  15. Authenticity and Constructivism in Education

    Science.gov (United States)

    Splitter, Laurance J.

    2009-01-01

    This paper examines the concept of authenticity and its relevance in education, from a philosophical perspective. Under the heading of educational authenticity (EA), I critique Fred Newmann's views on authentic pedagogy and intellectual work. I argue against the notion that authentic engagement is usefully analyzed in terms of a relationship…

  16. A Review Of Authentication Methods

    Directory of Open Access Journals (Sweden)

    Nilesh A. Lal

    2015-08-01

    Full Text Available Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms password entry smart card and biometric. Each authentication mechanism functions differently and has their strengths and weakness. In this paper we review different types of authentication mechanisms their vulnerabilities and recommend novel solutions.

  17. Network discovery, characterization, and prediction : a grand challenge LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Kegelmeyer, W. Philip, Jr.

    2010-11-01

    This report is the final summation of Sandia's Grand Challenge LDRD project No.119351, 'Network Discovery, Characterization and Prediction' (the 'NGC') which ran from FY08 to FY10. The aim of the NGC, in a nutshell, was to research, develop, and evaluate relevant analysis capabilities that address adversarial networks. Unlike some Grand Challenge efforts, that ambition created cultural subgoals, as well as technical and programmatic ones, as the insistence on 'relevancy' required that the Sandia informatics research communities and the analyst user communities come to appreciate each others needs and capabilities in a very deep and concrete way. The NGC generated a number of technical, programmatic, and cultural advances, detailed in this report. There were new algorithmic insights and research that resulted in fifty-three refereed publications and presentations; this report concludes with an abstract-annotated bibliography pointing to them all. The NGC generated three substantial prototypes that not only achieved their intended goals of testing our algorithmic integration, but which also served as vehicles for customer education and program development. The NGC, as intended, has catalyzed future work in this domain; by the end it had already brought in, in new funding, as much funding as had been invested in it. Finally, the NGC knit together previously disparate research staff and user expertise in a fashion that not only addressed our immediate research goals, but which promises to have created an enduring cultural legacy of mutual understanding, in service of Sandia's national security responsibilities in cybersecurity and counter proliferation.

  18. Network layer security and secret key authentication

    OpenAIRE

    Llovet Ureña, Marcel

    2015-01-01

    The goal of this project is to update Von Mann Young Rhee’s book, ‘Internet Security: Cryptographic Principles, Algorithms and Protocols’ which is about network layer security and secret key authentication. It is an extremely important aspect in modern life to have security in the network to protect our information and prevent eavesdroppers or maleficent programs, for example. This is the reason why this project aims to update these kinds of algorithms and hash functions. This project uses me...

  19. Noncontact surface thermometry for microsystems: LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Abel, Mark (Georgia Institute of Technology, Atlanta, GA); Beecham, Thomas (Georgia Institute of Technology, Atlanta, GA); Graham, Samuel (Georgia Institute of Technology, Atlanta, GA); Kearney, Sean Patrick; Serrano, Justin Raymond; Phinney, Leslie Mary

    2006-10-01

    We describe a Laboratory Directed Research and Development (LDRD) effort to develop and apply laser-based thermometry diagnostics for obtaining spatially resolved temperature maps on working microelectromechanical systems (MEMS). The goal of the effort was to cultivate diagnostic approaches that could adequately resolve the extremely fine MEMS device features, required no modifications to MEMS device design, and which did not perturb the delicate operation of these extremely small devices. Two optical diagnostics were used in this study: microscale Raman spectroscopy and microscale thermoreflectance. Both methods use a low-energy, nonperturbing probe laser beam, whose arbitrary wavelength can be selected for a diffraction-limited focus that meets the need for micron-scale spatial resolution. Raman is exploited most frequently, as this technique provides a simple and unambiguous measure of the absolute device temperature for most any MEMS semiconductor or insulator material under steady state operation. Temperatures are obtained from the spectral position and width of readily isolated peaks in the measured Raman spectra with a maximum uncertainty near {+-}10 K and a spatial resolution of about 1 micron. Application of the Raman technique is demonstrated for V-shaped and flexure-style polycrystalline silicon electrothermal actuators, and for a GaN high-electron-mobility transistor. The potential of the Raman technique for simultaneous measurement of temperature and in-plane stress in silicon MEMS is also demonstrated and future Raman-variant diagnostics for ultra spatio-temporal resolution probing are discussed. Microscale thermoreflectance has been developed as a complement for the primary Raman diagnostic. Thermoreflectance exploits the small-but-measurable temperature dependence of surface optical reflectivity for diagnostic purposes. The temperature-dependent reflectance behavior of bulk silicon, SUMMiT-V polycrystalline silicon films and metal surfaces is

  20. Sensor Based Process Control (SBPC) Laboratories Directed Research and Development (LDRD)

    Energy Technology Data Exchange (ETDEWEB)

    Wronosky, J.B.

    1993-03-01

    This report describes the activities and results of an LDRD entitled Sensor Based Process Control. This research examined the needs of the plating industry for monitor and control capabilities with particular emphasis on water effluent from rinse baths. A personal computer-based monitor and control development system was used as a test bed.

  1. Authenticity in Anatomy Art.

    Science.gov (United States)

    Adkins, Jessica

    2017-01-12

    The aim of this paper is to observe the evolution and evaluate the 'realness' and authenticity in Anatomy Art, an art form I define as one which incorporates accurate anatomical representations of the human body with artistic expression. I examine the art of 17th century wax anatomical models, the preservations of Frederik Ruysch, and Gunther von Hagens' Body Worlds plastinates, giving consideration to authenticity of both body and art. I give extra consideration to the works of Body Worlds since the exhibit creator believes he has created anatomical specimens with more educational value and bodily authenticity than ever before. Ultimately, I argue that von Hagens fails to offer Anatomy Art 'real human bodies,' and that the lack of bodily authenticity of his plastinates results in his creations being less pedagogic than he claims.

  2. Authentic Material 2.

    Science.gov (United States)

    Beeching, Kate

    1982-01-01

    Discusses techniques for the exploitation of authentic material, with reference to the self-instruction manual, designed for highly literate, undergraduate students, which accompanies the BBC course "Allez France." (EKN)

  3. Laboratory Directed Research and Development Program FY2016 Annual Summary of Completed Projects

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2017-03-30

    ORNL FY 2016 Annual Summary of Laboratory Directed Research and Development Program (LDRD) Completed Projects. The Laboratory Directed Research and Development (LDRD) program at ORNL operates under the authority of DOE Order 413.2C, “Laboratory Directed Research and Development” (October 22, 2015), which establishes DOE’s requirements for the program while providing the Laboratory Director broad flexibility for program implementation. The LDRD program funds are obtained through a charge to all Laboratory programs. ORNL reports its status to DOE in March of each year.

  4. High-efficiency high-energy Ka source for the critically-required maximum illumination of x-ray optics on Z using Z-petawatt-driven laser-breakout-afterburner accelerated ultrarelativistic electrons LDRD .

    Energy Technology Data Exchange (ETDEWEB)

    Sefkow, Adam B.; Bennett, Guy R.

    2010-09-01

    Under the auspices of the Science of Extreme Environments LDRD program, a <2 year theoretical- and computational-physics study was performed (LDRD Project 130805) by Guy R Bennett (formally in Center-01600) and Adam B. Sefkow (Center-01600): To investigate novel target designs by which a short-pulse, PW-class beam could create a brighter K{alpha} x-ray source than by simple, direct-laser-irradiation of a flat foil; Direct-Foil-Irradiation (DFI). The computational studies - which are still ongoing at this writing - were performed primarily on the RedStorm supercomputer at Sandia National Laboratories Albuquerque site. The motivation for a higher efficiency K{alpha} emitter was very clear: as the backlighter flux for any x-ray imaging technique on the Z accelerator increases, the signal-to-noise and signal-to-background ratios improve. This ultimately allows the imaging system to reach its full quantitative potential as a diagnostic. Depending on the particular application/experiment this would imply, for example, that the system would have reached its full design spatial resolution and thus the capability to see features that might otherwise be indiscernible with a traditional DFI-like x-ray source. This LDRD began FY09 and ended FY10.

  5. Laboratory Directed Research and Development (LDRD) on Mono-uranium Nitride Fuel Development for SSTAR and Space Applications

    International Nuclear Information System (INIS)

    Choi, J; Ebbinghaus, B; Meiers, T; Ahn, J

    2006-01-01

    The US National Energy Policy of 2001 advocated the development of advanced fuel and fuel cycle technologies that are cleaner, more efficient, less waste-intensive, and more proliferation resistant. The need for advanced fuel development is emphasized in on-going DOE-supported programs, e.g., Global Nuclear Energy Initiative (GNEI), Advanced Fuel Cycle Initiative (AFCI), and GEN-IV Technology Development. The Directorates of Energy and Environment (E and E) and Chemistry and Material Sciences (C and MS) at Lawrence Livermore National Laboratory (LLNL) are interested in advanced fuel research and manufacturing using its multi-disciplinary capability and facilities to support a design concept of a small, secure, transportable, and autonomous reactor (SSTAR). The E and E and C and MS Directorates co-sponsored this Laboratory Directed Research and Development (LDRD) Project on Mono-Uranium Nitride Fuel Development for SSTAR and Space Applications. In fact, three out of the six GEN-IV reactor concepts consider using the nitride-based fuel, as shown in Table 1. SSTAR is a liquid-metal cooled, fast reactor. It uses nitride fuel in a sealed reactor vessel that could be shipped to the user and returned to the supplier having never been opened in its long operating lifetime. This sealed reactor concept envisions no fuel refueling nor on-site storage of spent fuel, and as a result, can greatly enhance proliferation resistance. However, the requirement for a sealed, long-life core imposes great challenges to research and development of the nitride fuel and its cladding. Cladding is an important interface between the fuel and coolant and a barrier to prevent fission gas release during normal and accidental conditions. In fabricating the nitride fuel rods and assemblies, the cladding material should be selected based on its the coolant-side corrosion properties, the chemical/physical interaction with the nitride fuel, as well as their thermal and neutronic properties. The US

  6. AUTHENTIC TEXTS FOR CRITICAL READING ACTIVITIES

    Directory of Open Access Journals (Sweden)

    Ila Amalia

    2016-03-01

    Full Text Available This research takes an action research aimed at promoting critical reading (“thinking” while reading skills using authentic materials among the students. This research also aims to reveal the students perception on using critical reading skills in reading activities. Nineteen English Education Department students who took Reading IV class, participated in this project. There were three cycles with three different critical reading strategies were applied. Meanwhile, the authentic materials were taken from newspaper and internet articles. The result revealed that the use of critical reading strategies along with the use of authentic materials has improved students’ critical reading skills as seen from the improvement of each cycle - the students critical reading skill was 54% (fair in the cycle 1 improved to 68% (average in cycle 2, and 82% (good in cycle 3.. In addition, based on the critical reading skill criteria, the students’ critical reading skill has improved from 40% (nearly meet to 80% (exceed. Meanwhile, from the students’ perception questionnaire, it was shown that 63% students agreed the critical reading activity using authentic text could improve critical thinking and 58% students agreed that doing critical reading activity could improve reading comprehension. The result had the implication that the use of authentic texts could improve students’ critical reading skills if it was taught by performing not lecturing them. Selectively choosing various strategies and materials can trigger students’ activeness in responding to a text, that eventually shape their critical reading skills.

  7. Using Rose and Compass for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2009-07-09

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  8. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  9. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    analysis should complement and support corporate social responsibility, management spirituality, authentic leadership / authentic follower, and other secular research by offering a research methods bridge between empirically grounded theology and secular studies, with the common goal of improving workplace...... of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop the criterion variable. From the literature review of concept and historical data in both traditions......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review...

  10. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    2018-01-01

    Authenticity is developed and deployed as a criterion variable for a theology of the workplace inquiry that combines theory and methodological development with data analysis. The goal is to show that social science method can offer an empirically valid, prophetic dimension to the study of employm......Authenticity is developed and deployed as a criterion variable for a theology of the workplace inquiry that combines theory and methodological development with data analysis. The goal is to show that social science method can offer an empirically valid, prophetic dimension to the study...... of employment and work parameters in light of religious teachings on the social question at national, organizational, or firm-specific levels. The function of a criterion variable is described, noting that the switch from a dependent variable approach introduces an open-system dynamism to social science...... theology and allied fields for the common cause of assessing authenticity in firm, organization, and higher system functions....

  11. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    analysis should complement and support corporate social responsibility, management spirituality, authentic leadership / authentic follower, and other secular research by offering a research methods bridge between empirically grounded theology and secular studies, with the common goal of improving workplace......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review...... of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop the criterion variable. From the literature review of concept and historical data in both traditions...

  12. Authentic leadership to the future

    Directory of Open Access Journals (Sweden)

    Dimovski Vlado

    2012-01-01

    Full Text Available Authentic leadership is the latest evolutionary stage in leadership development and emphasizes the leader's authenticity. The construct of authenticity was researched by ancient Greek philosophers as 'know thy-self ', and 'thy true self '. Authentic leadership began to develop after 2004. The main reason why the researchers place so much attention to authentic leadership is fact that authentic leadership reaches all of the employees in organizations. Authentic leaders must identify the strengths of their followers and help them with their development and integration towards a common goal, purpose, vision and identity of the organization. Authentic leadership is seen as the final stage in the development of leadership styles, properties of this leadership style, and the consequences of this style have not been fully explored. In our paper we will explore this new style of leadership and its implications.

  13. Two-factor authentication

    CERN Document Server

    Stanislav, Mark

    2015-01-01

    During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market.

  14. Exploration of cloud computing late start LDRD #149630 : Raincoat. v. 2.1.

    Energy Technology Data Exchange (ETDEWEB)

    Echeverria, Victor T.; Metral, Michael David; Leger, Michelle A.; Gabert, Kasimir Georg; Edgett, Patrick Garrett; Thai, Tan Q.

    2010-09-01

    This report contains documentation from an interoperability study conducted under the Late Start LDRD 149630, Exploration of Cloud Computing. A small late-start LDRD from last year resulted in a study (Raincoat) on using Virtual Private Networks (VPNs) to enhance security in a hybrid cloud environment. Raincoat initially explored the use of OpenVPN on IPv4 and demonstrates that it is possible to secure the communication channel between two small 'test' clouds (a few nodes each) at New Mexico Tech and Sandia. We extended the Raincoat study to add IPSec support via Vyatta routers, to interface with a public cloud (Amazon Elastic Compute Cloud (EC2)), and to be significantly more scalable than the previous iteration. The study contributed to our understanding of interoperability in a hybrid cloud.

  15. Topic Map for Authentic Travel

    OpenAIRE

    Wandsvik, Atle; Zare, Mehdi

    2007-01-01

    E-business is a new trend in Internet use. Authentic travel is an approach to travel and travel business which helps the traveler experience what is authentic in the travel destination. But how can the traveler find those small authentic spots and organize them together to compose a vacation? E-business techniques, combined withTopic Maps, can help.

  16. Authentication of Hadith

    African Journals Online (AJOL)

    OYELAKIN

    the side of one of the narrators. Hadith forgery featured in Islam barely two decades after the prophet and scholars did their best to differentiate it from authentic ones. Despite this, for Khan, it is possible that some traditions regarded as genuine merely due to their isnad may not be genuine in textual outlook. Since the isnad ...

  17. Final LDRD report : science-based solutions to achieve high-performance deep-UV laser diodes.

    Energy Technology Data Exchange (ETDEWEB)

    Armstrong, Andrew M.; Miller, Mary A.; Crawford, Mary Hagerott; Alessi, Leonard J.; Smith, Michael L.; Henry, Tanya A.; Westlake, Karl R.; Cross, Karen Charlene; Allerman, Andrew Alan; Lee, Stephen Roger

    2011-12-01

    We present the results of a three year LDRD project that has focused on overcoming major materials roadblocks to achieving AlGaN-based deep-UV laser diodes. We describe our growth approach to achieving AlGaN templates with greater than ten times reduction of threading dislocations which resulted in greater than seven times enhancement of AlGaN quantum well photoluminescence and 15 times increase in electroluminescence from LED test structures. We describe the application of deep-level optical spectroscopy to AlGaN epilayers to quantify deep level energies and densities and further correlate defect properties with AlGaN luminescence efficiency. We further review our development of p-type short period superlattice structures as an approach to mitigate the high acceptor activation energies in AlGaN alloys. Finally, we describe our laser diode fabrication process, highlighting the development of highly vertical and smooth etched laser facets, as well as characterization of resulting laser heterostructures.

  18. Authentic feminist? Authenticity and feminist identity in teenage feminists' talk.

    Science.gov (United States)

    Calder-Dawe, Octavia; Gavey, Nicola

    2017-12-01

    This article explores how young people's feminist identities take shape in conjunction with a contemporary ideal of personal authenticity: to know and to express the 'real me'. Drawing from interviews with 18 teenagers living in Auckland, New Zealand, we examine a novel convergence of authenticity and feminism in participants' identity talk. For social psychologists interested in identity and politics, this convergence is intriguing: individualizing values such as authenticity are generally associated with disengagement with structural critique and with a repudiation of politicized and activist identities. Rather than seeking to categorize authentic feminism as an instance of either 'good/collective' or 'bad/individualized' feminist politics, we use discourse analysis to examine how the identity position of authentic feminist was constructed and to explore implications for feminist politics. On one hand, interviewees mobilized authentic feminism to affirm their commitment to normative liberal values of authenticity and self-expression. At the same time, the position of authentic feminist appeared to authorize risky feminist identifications and to justify counter-normative feelings, desires, and actions. To conclude, we explore how encountering others' intolerance of authentic feminism exposed interviewees to the limits of authenticity discourse, propelling some towards new understandings of the social world and their space for action within it. © 2017 The British Psychological Society.

  19. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  20. FPGA Authentication Methods.

    Energy Technology Data Exchange (ETDEWEB)

    Brotz, Jay Kristoffer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hymel, Ross W [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Punnoose, Ratish J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mannos, Tom [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Grant, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom); Evans, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom)

    2017-05-01

    One of the greatest challenges facing designers of equipment to be used in a nuclear arms control treaty is how to convince the other party in the treaty to trust its results and functionality. Whether the host provides equipment meant to prove treaty obligations and the inspector needs to gain that trust (commonly referred to as authentication), or the inspector provides this equipment and the host needs to gain this trust (commonly considered to be included in certification), one party generally has higher confidence in the equipment at the start of a treaty regime and the other party needs to gain that confidence prior to use. While we focus on authentication in this document—that is, the inspector gaining confidence in host-provided equipment—our conclusions will likely apply to host certification of inspector-provided equipment.

  1. International safeguards data authentication

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  2. PhytoAuthent: Molecular authentication of complex herbal food supplements for safety and efficacy

    Directory of Open Access Journals (Sweden)

    Mihael Ichim

    2017-10-01

    Full Text Available The PhytoAuthent project was structured to gather, test, develop and apply, in real life case scenarios, molecular techniques, such as biochemical fingerprinting and DNA sequence-based methods, for plant identification of constituents in complex herbal products. The project had a strong focus on applied aspects like protecting consumers from health risks associated with product substitution and contamination of herbal products.

  3. Films and Blogs: an authentic approach to improve the writing skill – An intercultural project-based framework in the Senior High State School

    Directory of Open Access Journals (Sweden)

    Christine Calogerakou

    2011-02-01

    Full Text Available This paper presents the implementation and the positive findings of a research involving a telecollaborative, e-twining project which linked two Senior State High school classes, one from Greece and one from Italy. The research aimed at investigating whether films and blogs in the English class can foster the development of writing skills, promote intercultural awareness and enhance the cultivation of new literacies. The research showed that the project succeeded in motivating the students who, through their on-line communication achieved cultural literacy and other new literacies to a large degree.

  4. k-Times Anonymous Authentication

    Science.gov (United States)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  5. Persistent Authentication in Smart Environments

    DEFF Research Database (Denmark)

    Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D.

    2008-01-01

    Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based...... information, e.g., it is common to have swipe card terminals placed next to doors to restricted areas. This means that all access to protected resources must have individual means of authenticating users, which makes the access control system more expensive and less flexible, because access controls...... will not be installed unless it is absolutely necessary. The cost of installing and maintaining an authentication infrastructure and the inconvenience of repeatedly authenticating toward different location based service providers mean that new models of authentication are needed in smart environments. This paper...

  6. Behavior-aware decision support systems : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Hirsch, Gary B.; Homer, Jack (Homer Consulting); Chenoweth, Brooke N.; Backus, George A.; Strip, David R.

    2007-11-01

    As Sandia National Laboratories serves its mission to provide support for the security-related interests of the United States, it is faced with considering the behavioral responses that drive problems, mitigate interventions, or lead to unintended consequences. The effort described here expands earlier works in using healthcare simulation to develop behavior-aware decision support systems. This report focuses on using qualitative choice techniques and enhancing two analysis models developed in a sister project.

  7. FY04 LDRD Final Report Stroke Sensor Development Using Microdot Sensor Arrays

    Energy Technology Data Exchange (ETDEWEB)

    Carter, J C; Wilson, T S; Alvis, R M; Paulson, C N; Setlur, U S; McBride, M T; Brown, S B; Bearinger, J P; Colston, B W

    2005-11-15

    major thrust area for the Medical Technology Program (M-division). Through MTP, LLNL has a sizable investment and recognizable expertise in stroke treatment research. The proposed microdot array sensor for stroke will complement this existing program in which mechanical devices are being designed for removing the thrombus. The following list of stroke projects and their relative status shows that MTP has a proven track record of taking ideas to industry: The goal of this LDRD funded project was to develop and demonstrate a minimally invasive optical fiber-based sensor for rapid and in-vivo measurements of multiple stroke biomarkers (e.g. pH and enzyme). The development of this sensor also required the development of a new fabrication technology for attaching indicator chemistries to optical fibers. A benefit of this work is to provide clinicians with a tool to assess vascular integrity of the region beyond the thrombus to determine whether or not it is safe to proceed with the removal of the clot. Such an assessment could extend the use of thrombolytic drug treatment to acute stroke victims outside the current rigid temporal limitation of 3 hours. Furthermore, this sensor would also provide a tool for use with emerging treatments involving the use of mechanical devices for removing the thrombus. The sensor effectively assesses the risk for reperfusion injury.

  8. Advances in radiation modeling in ALEGRA :a final report for LDRD-67120, efficient implicit mulitgroup radiation calculations.

    Energy Technology Data Exchange (ETDEWEB)

    Mehlhorn, Thomas Alan; Kurecka, Christopher J. (University of Michigan, Ann Arbor, MI); McClarren, Ryan (University of Michigan, Ann Arbor, MI); Brunner, Thomas A.; Holloway, James Paul (University of Michigan, Ann Arbor, MI)

    2005-11-01

    The original LDRD proposal was to use a nonlinear diffusion solver to compute estimates for the material temperature that could then be used in a Implicit Monte Carlo (IMC) calculation. At the end of the first year of the project, it was determined that this was not going to be effective, partially due to the concept, and partially due to the fact that the radiation diffusion package was not as efficient as it could be. The second, and final year, of the project focused on improving the robustness and computational efficiency of the radiation diffusion package in ALEGRA. To this end, several new multigroup diffusion methods have been developed and implemented in ALEGRA. While these methods have been implemented, their effectiveness of reducing overall simulation run time has not been fully tested. Additionally a comprehensive suite of verification problems has been developed for the diffusion package to ensure that it has been implemented correctly. This process took considerable time, but exposed significant bugs in both the previous and new diffusion packages, the linear solve packages, and even the NEVADA Framework's parser. In order to manage this large suite of problem, a new tool called Tampa has been developed. It is a general tool for automating the process of running and analyzing many simulations. Ryan McClarren, at the University of Michigan has been developing a Spherical Harmonics capability for unstructured meshes. While still in the early phases of development, this promises to bridge the gap in accuracy between a full transport solution using IMC and the diffusion approximation.

  9. The INDIGO-Datacloud Authentication and Authorization Infrastructure

    Science.gov (United States)

    Ceccanti, A.; Hardt, M.; Wegh, B.; Millar, AP; Caberletti, M.; Vianello, E.; Licehammer, S.

    2017-10-01

    Contemporary distributed computing infrastructures (DCIs) are not easily and securely accessible by scientists. These computing environments are typically hard to integrate due to interoperability problems resulting from the use of different authentication mechanisms, identity negotiation protocols and access control policies. Such limitations have a big impact on the user experience making it hard for user communities to port and run their scientific applications on resources aggregated from multiple providers. The INDIGO-DataCloud project wants to provide the services and tools needed to enable a secure composition of resources from multiple providers in support of scientific applications. In order to do so, a common AAI architecture has to be defined that supports multiple authentication mechanisms, support delegated authorization across services and can be easily integrated in off-the-shelf software. In this contribution we introduce the INDIGO Authentication and Authorization Infrastructure, describing its main components and their status and how authentication, delegation and authorization flows are implemented across services.

  10. Authentic, Original, and Valuable

    DEFF Research Database (Denmark)

    Tupasela, Aaro Mikael; Tamminen, Sakari

    2015-01-01

    The idea of genetic authenticity and origin has been an important issue within genetics for decades for scientific, political, and economic reasons. The question of where species and populations come from, as well as the linking of genetic traits to particular geographical locations, has resurfaced....... Using the case of human and non-human genetics to compare and contrast the various facets associated with genetic identity, we seek to develop a broader picture of the ways in which genetics plays an important role in stabilizing categories of origin....

  11. Tides, Krill, Penguins, Oh My!: Scientists and Teachers Partner in Project CONVERGE to Bring Collaborative Antarctic Research, Authentic Data, and Scientific Inquiry into the Hands of NJ and NY Students

    Science.gov (United States)

    Hunter-thomson, K. I.; Kohut, J. T.; Florio, K.; McDonnell, J. D.; Ferraro, C.; Clark, H.; Gardner, K.; Oliver, M. J.

    2016-02-01

    How do you get middle and high school students excited about scientific inquiry? Have them join a collaborative research team in Antarctica! A comprehensive education program brought ocean science, marine ecology, and climate change impact research to more than 950 students in 2014-15 to increase their exposure to and excitement of current research. The program was integrated into a collaborative research project, involving five universities, that worked to characterize the connection between ocean circulation, plankton distribution, penguin foraging behavior, and climate change around Palmer Station, Antarctica. The scientists and education team co-led a weeklong workshop to expose 22 teachers to the research science, build relationships among the teachers and scientists, and refine the program to most effectively communicate the research to their students. In the fall, teachers taught NGSS-aligned, hands-on, data-focused classroom lessons to provide their students the necessary content to understand the project hypotheses using multiple science practices. Through a professional science blog and live video calls from Antarctica, students followed and discussed the science teams work while they were in the field. To apply the science practices the students had learned about, they designed, conducted, and analyzed their own ocean-related, inquiry-based research investigation as the culminating component of the program (results were presented at a Student Research Symposium attended by the science team). Of their own choosing, roughly half of the students used raw data from the CONVERGE research (including krill, CODAR, penguin, and glider data) for their investigations. This presentation will focus on the evaluation results of the education program to identify the aspects that successfully engaged teachers and students with scientific inquiry, science practices, and authentic data as well as the replicability of this integrated scientist-teacher partnership and

  12. Autonomous intelligent assembly systems LDRD 105746 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J.

    2013-04-01

    This report documents a three-year to develop technology that enables mobile robots to perform autonomous assembly tasks in unstructured outdoor environments. This is a multi-tier problem that requires an integration of a large number of different software technologies including: command and control, estimation and localization, distributed communications, object recognition, pose estimation, real-time scanning, and scene interpretation. Although ultimately unsuccessful in achieving a target brick stacking task autonomously, numerous important component technologies were nevertheless developed. Such technologies include: a patent-pending polygon snake algorithm for robust feature tracking, a color grid algorithm for uniquely identification and calibration, a command and control framework for abstracting robot commands, a scanning capability that utilizes a compact robot portable scanner, and more. This report describes this project and these developed technologies.

  13. LDRD Final Report: Adaptive Methods for Laser Plasma Simulation

    International Nuclear Information System (INIS)

    Dorr, M R; Garaizar, F X; Hittinger, J A

    2003-01-01

    The goal of this project was to investigate the utility of parallel adaptive mesh refinement (AMR) in the simulation of laser plasma interaction (LPI). The scope of work included the development of new numerical methods and parallel implementation strategies. The primary deliverables were (1) parallel adaptive algorithms to solve a system of equations combining plasma fluid and light propagation models, (2) a research code implementing these algorithms, and (3) an analysis of the performance of parallel AMR on LPI problems. The project accomplished these objectives. New algorithms were developed for the solution of a system of equations describing LPI. These algorithms were implemented in a new research code named ALPS (Adaptive Laser Plasma Simulator) that was used to test the effectiveness of the AMR algorithms on the Laboratory's large-scale computer platforms. The details of the algorithm and the results of the numerical tests were documented in an article published in the Journal of Computational Physics [2]. A principal conclusion of this investigation is that AMR is most effective for LPI systems that are ''hydrodynamically large'', i.e., problems requiring the simulation of a large plasma volume relative to the volume occupied by the laser light. Since the plasma-only regions require less resolution than the laser light, AMR enables the use of efficient meshes for such problems. In contrast, AMR is less effective for, say, a single highly filamented beam propagating through a phase plate, since the resulting speckle pattern may be too dense to adequately separate scales with a locally refined mesh. Ultimately, the gain to be expected from the use of AMR is highly problem-dependent. One class of problems investigated in this project involved a pair of laser beams crossing in a plasma flow. Under certain conditions, energy can be transferred from one beam to the other via a resonant interaction with an ion acoustic wave in the crossing region. AMR provides an

  14. Creating an Authentic Learning Environment in the Foreign Language Classroom

    Directory of Open Access Journals (Sweden)

    Larisa Nikitina

    2011-01-01

    Full Text Available Theatrical activities are widely used by language educators to promote and facilitate language learning. Involving students in production of their own video or a short movie in the target language allows a seamless fusion of language learning, art, and popular culture. The activity is also conducive for creating an authentic learning situation where the real world becomes a part of the educational experience and necessitates the use of an authentic language by the learners. This article describes a video project carried out by Russian language learners at Universiti Malaysia Sabah (UMS. It examines how the work on the project created and supported authenticity of the learning experience. Though the article focuses on the video project done in the context of language learning and teaching this activity could be successfully implemented in teaching various subjects at both secondary and tertiary levels.

  15. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Petersen, Franziska Bork

    2013-01-01

    In this thesis I investigate what 'authenticity' means in a contemporary popular context and how it is used in the staging of bodies. Furthermore, I analyse works of dance and fashion from the past fifteen years with a focus on their strategies of challenging the notion of 'bodily authenticity'. ...

  16. Authenticity, Culture and Language Learning

    Science.gov (United States)

    MacDonald, Malcolm N.; Badger, Richard; Dasli, Maria

    2006-01-01

    In philosophy, authenticity has been used with two meanings: one entails the notion of correspondence; the other entails the notion of genesis (Cooper, 1983: 15). As in certain branches of philosophy, language teaching has perhaps clung too long to the first of these notions of authenticity at the expense of the other. This paper reviews four key…

  17. Development of efficient, integrated cellulosic biorefineries : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Teh, Kwee-Yan; Hecht, Ethan S.; Shaddix, Christopher R.; Buffleben, George M.; Dibble, Dean C.; Lutz, Andrew E.

    2010-09-01

    Cellulosic ethanol, generated from lignocellulosic biomass sources such as grasses and trees, is a promising alternative to conventional starch- and sugar-based ethanol production in terms of potential production quantities, CO{sub 2} impact, and economic competitiveness. In addition, cellulosic ethanol can be generated (at least in principle) without competing with food production. However, approximately 1/3 of the lignocellulosic biomass material (including all of the lignin) cannot be converted to ethanol through biochemical means and must be extracted at some point in the biochemical process. In this project we gathered basic information on the prospects for utilizing this lignin residue material in thermochemical conversion processes to improve the overall energy efficiency or liquid fuel production capacity of cellulosic biorefineries. Two existing pretreatment approaches, soaking in aqueous ammonia (SAA) and the Arkenol (strong sulfuric acid) process, were implemented at Sandia and used to generated suitable quantities of residue material from corn stover and eucalyptus feedstocks for subsequent thermochemical research. A third, novel technique, using ionic liquids (IL) was investigated by Sandia researchers at the Joint Bioenergy Institute (JBEI), but was not successful in isolating sufficient lignin residue. Additional residue material for thermochemical research was supplied from the dilute-acid simultaneous saccharification/fermentation (SSF) pilot-scale process at the National Renewable Energy Laboratory (NREL). The high-temperature volatiles yields of the different residues were measured, as were the char combustion reactivities. The residue chars showed slightly lower reactivity than raw biomass char, except for the SSF residue, which had substantially lower reactivity. Exergy analysis was applied to the NREL standard process design model for thermochemical ethanol production and from a prototypical dedicated biochemical process, with process data

  18. Authentic Learning Environments in Higher Education

    Directory of Open Access Journals (Sweden)

    Reviewed by Dr. Adnan BOYACI

    2006-01-01

    Full Text Available Over the last decade the use of the authentic cases, problems and projects as a starting point for learning has won ground in higher education. Usually, these cases refer complex, ill–defined or open ended problems and often require multidisciplinary approaches. Students start with analysis of the cases, which involvesgathering information, constructing and testing possible solutions. In short they supposedly develop competencies needed to deal withproblems and issues that arise in a professional academic practice. This approach to learning may contrast with the common practice whichhas students working individually, grasping the knowledge from their teachers and text books using artificial problems (Berge and others,2005.In other words authentic learning experiences are those situated in certain appropriate social context and inevitably relevant from learner’s perspective. In planning for authentic learning to realize, a tension can appear between providing real world ‘natural’experiences and the nature of experiences that are possible offer within institution which can be often artificial and seen as inauthentic by the student. Bridging the gap between the learning taking place within the institution and learning within the real lifecommunities of practice can be difficult for university teacher (Stein and others, 2004. In that sense the purpose of this is to construct that bridge book by providing examples of good practice.

  19. Reading Authentic Texts

    DEFF Research Database (Denmark)

    Balling, Laura Winther

    2013-01-01

    Most research on cognates has focused on words presented in isolation that are easily defined as cognate between L1 and L2. In contrast, this study investigates what counts as cognate in authentic texts and how such cognates are read. Participants with L1 Danish read news articles in their highly...... proficient L2, English, while their eye-movements were monitored. The experiment shows a cognate advantage for morphologically simple words, but only when cognateness is defined relative to translation equivalents that are appropriate in the context. For morphologically complex words, a cognate disadvantage...... is observed which may be due to problems of integrating cognate with non-cognate morphemes. The results show that fast non-selective access to the bilingual lexicon is conditioned by the communicative context. Importantly, a range of variables are statistically controlled in the regression analyses, including...

  20. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2015-06-01

    Full Text Available This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The research included the use of an ALQ questionnaire for the estimation of leadership behavior. The components of authentic leadership are defined using factor analysis and other statistics techniques. The findings developed in this research indicated the fact that directors in educational institutions have a specific authentic leadership style. We suggest the concept of authentic leadership based on the four following factors: Communication-conformist, self-consciousness, self-discovery, and self-concept. Supporting these factors provides the directors with the possibility of obtaining a high level of authentic leadership.

  1. Authenticity in CALL: Three Domains of "Realness"

    Science.gov (United States)

    Buendgens-Kosten, Judith

    2013-01-01

    This paper discusses the role of authenticity and authenticity claims in computer assisted language learning (CALL). It considers authenticity as the result of a social negotiation process rather than an innate feature of a text, object, person, or activity. From this basis, it argues that authenticity claims play an important role in both second…

  2. Authentic leadership: application to women leaders

    Science.gov (United States)

    Hopkins, Margaret M.; O’Neil, Deborah A.

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women. PMID:26236254

  3. Two dimensional point of use fuel cell : a final LDRD project report.

    Energy Technology Data Exchange (ETDEWEB)

    Zavadil, Kevin Robert; Hickner, Michael A. (Pennsylvania State University, University Park, PA); Gross, Matthew L. (Pennsylvania State University, University Park, PA)

    2011-03-01

    The Proliferation Assessment (program area - Things Thin) within the Defense Systems and Assessment Investment Area desires high energy density and long-lived power sources with moderate currents (mA) that can be used as building blocks in platforms for the continuous monitoring of chemical, biological, and radiological agents. Fuel cells can be an optimum choice for a power source because of the high energy densities that are possible with liquid fuels. Additionally, power generation and fuel storage can be decoupled in a fuel cell for independent control of energy and power density for customized, application-driven power solutions. Direct methanol fuel cells (DMFC) are explored as a possible concept to develop into ultrathin or two-dimensional power sources. New developments in nanotechnology, advanced fabrication techniques, and materials science are exploited to create a planar DMFC that could be co-located with electronics in a chip format. Carbon nanotubes and pyrolyzed polymers are used as building block electrodes - porous, mechanically compliant current collectors. Directed assembly methods including surface functionalization and layer-by-layer deposition with polyelectrolytes are used to pattern, build, and add functionality to these electrodes. These same techniques are used to incorporate nanoscale selective electrocatalyst into the carbon electrodes to provide a high density of active electron transfer sites for the methanol oxidation and oxygen reduction reactions. The resulting electrodes are characterized in terms of their physical properties, electrocatalytic function, and selectivity to better understand how processing impacts their performance attributes. The basic function of a membrane electrode assembly is demonstrated for several prototype devices.

  4. Molecular dynamics of gases and vapors in nanoporous solids. Final LDRD project report

    Energy Technology Data Exchange (ETDEWEB)

    Pohl, P.I.

    1996-08-01

    This report provides a study of gases in microporous solids using molecular modeling. The theory of gas transport in porous materials as well as the molecular modeling literature is briefly reviewed. Work complete is described and analyzed with retard to the prevailing theory. The work covers two simple subjects, construction of porous solid models and diffusion of He, H{sub 2}, Ar and CH{sub 4} down a pressure gradient across the material models as in typical membrane permeation experiments. The broader objective is to enhance our capability to efficiently and accurately develop, produce and apply microporous materials.

  5. FY09 Final Report for LDRD Project: Understanding Viral Quasispecies Evolution through Computation and Experiment

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, C

    2009-11-12

    In FY09 they will (1) complete the implementation, verification, calibration, and sensitivity and scalability analysis of the in-cell virus replication model; (2) complete the design of the cell culture (cell-to-cell infection) model; (3) continue the research, design, and development of their bioinformatics tools: the Web-based structure-alignment-based sequence variability tool and the functional annotation of the genome database; (4) collaborate with the University of California at San Francisco on areas of common interest; and (5) submit journal articles that describe the in-cell model with simulations and the bioinformatics approaches to evaluation of genome variability and fitness.

  6. Final report LDRD project 105816 : model reduction of large dynamic systems with localized nonlinearities.

    Energy Technology Data Exchange (ETDEWEB)

    Lehoucq, Richard B.; Segalman, Daniel Joseph; Hetmaniuk, Ulrich L. (University of Washington, Seattle, WA); Dohrmann, Clark R.

    2009-10-01

    Advanced computing hardware and software written to exploit massively parallel architectures greatly facilitate the computation of extremely large problems. On the other hand, these tools, though enabling higher fidelity models, have often resulted in much longer run-times and turn-around-times in providing answers to engineering problems. The impediments include smaller elements and consequently smaller time steps, much larger systems of equations to solve, and the inclusion of nonlinearities that had been ignored in days when lower fidelity models were the norm. The research effort reported focuses on the accelerating the analysis process for structural dynamics though combinations of model reduction and mitigation of some factors that lead to over-meshing.

  7. Final report on LDRD Project: In situ determination of composition and strain during MBE

    Energy Technology Data Exchange (ETDEWEB)

    Chason, E.; Floro, J.A.; Reno, J.; Klem, J.

    1997-02-01

    Molecular Beam Epitaxy (MBE) of semiconductor heterostructures for advanced electronic and opto-electronic devices requires precise control of the surface composition and strain. The development of advanced in situ diagnostics for real-time monitoring and process control of strain and composition would enhance the yield, reliability and process flexibility of material grown by MBE and benefit leading-edge programs in microelectronics and photonics. The authors have developed a real-time laser-based technique to measure the evolution of stress in epitaxial films during growth by monitoring the change in the wafer curvature. Research has focused on the evolution of stress during the epitaxial growth of Si{sub x}Ge{sub 1{minus}x} alloys on Si(001) substrates. Initial studies have observed the onset and kinetics of strain relaxation during the growth of heteroepitaxial layers. The technique has also been used to measure the segregation of Ge to the surface during alloy growth with monolayer sensitivity, an order of magnitude better resolution than post-growth characterization. In addition, creation of a 2-dimensional array of parallel beams allows rapid surface profiling of the film stress that can be used to monitor process uniformity.

  8. Final report : LDRD project 79824 carbon nanotube sorting via DNA-directed self-assembly.

    Energy Technology Data Exchange (ETDEWEB)

    Robinson, David B; Leung, Kevin; Rempe, Susan B.; Dossa, Paul D.; Frischknecht, Amalie Lucile; Martin, Marcus Gary

    2007-10-01

    Single-wall carbon nanotubes (SWNTs) have shown great promise in novel applications in molecular electronics, biohazard detection, and composite materials. Commercially synthesized nanotubes exhibit a wide dispersion of geometries and conductivities, and tend to aggregate. Hence the key to using these materials is the ability to solubilize and sort carbon nanotubes according to their geometric/electronic properties. One of the most effective dispersants is single-stranded DNA (ssDNA), but there are many outstanding questions regarding the interaction between nucleic acids and SWNTs. In this work we focus on the interactions of SWNTs with single monomers of nucleic acids, as a first step to answering these outstanding questions. We use atomistic molecular dynamics simulations to calculate the binding energy of six different nucleotide monophosphates (NMPs) to a (6,0) single-wall carbon nanotube in aqueous solution. We find that the binding energies are generally favorable, of the order of a few kcal/mol. The binding energies of the different NMPs were very similar in salt solution, whereas we found a range of binding energies for NMPs in pure water. The binding energies are sensitive to the details of the association of the sodium ions with the phosphate groups and also to the average conformations of the nucleotides. We use electronic structure (Density Functional Theory (DFT) and Moller-Plesset second order perturbation to uncorrelated Hartree Fock theory (MP2)) methods to complement the classical force field study. With judicious choices of DFT exchange correlation functionals, we find that DFT, MP2, and classical force field predictions are in qualitative and even quantitative agreement; all three methods should give reliable and valid predictions. However, in one important case, the interactions between ions and metallic carbon nanotubes--the SWNT polarization-induced affinity for ions, neglected in most classical force field studies, is found to be extremely large (on the order of electron volts) and may have important consequences for various SWNT applications. Finally, the adsorption of NMPs onto single-walled carbon nanotubes were studied experimentally. The nanotubes were sonicated in the presence of the nucleotides at various weight fractions and centrifuged before examining the ultraviolet absorbance of the resulting supernatant. A distinct Langmuir adsorption isotherm was obtained for each nucleotide. All of the nucleotides differ in their saturation value as well as their initial slope, which we attribute to differences both in nucleotide structure and in the binding ability of different types or clusters of tubes. Results from this simple system provide insights toward development of dispersion and separation methods for nanotubes: strongly binding nucleotides are likely to help disperse, whereas weaker ones may provide selectivity that may be beneficial to a separation process.

  9. Final report for LDRD Project 93633 : new hash function for data protection.

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, Timothy John; Dautenhahn, Nathan; Schroeppel, Richard Crabtree; Tolk, Keith Michael; Orman, Hilarie (PurpleStreak, Inc.); Walker, Andrea Mae; Malone, Sean; Lee, Eric; Neumann, William Douglas; Cordwell, William R.; Torgerson, Mark Dolan; Anderson, Eric; Lanzone, Andrew J.; Collins, Michael Joseph; McDonald, Timothy Scott; Caskey, Susan Adele

    2009-03-01

    The security of the widely-used cryptographic hash function SHA1 has been impugned. We have developed two replacement hash functions. The first, SHA1X, is a drop-in replacement for SHA1. The second, SANDstorm, has been submitted as a candidate to the NIST-sponsored SHA3 Hash Function competition.

  10. Final report on LDRD project : narrow-linewidth VCSELs for atomic microsystems.

    Energy Technology Data Exchange (ETDEWEB)

    Chow, Weng Wah; Geib, Kent Martin; Peake, Gregory Merwin; Serkland, Darwin Keith

    2011-09-01

    Vertical-cavity surface-emitting lasers (VCSELs) are well suited for emerging photonic microsystems due to their low power consumption, ease of integration with other optical components, and single frequency operation. However, the typical VCSEL linewidth of 100 MHz is approximately ten times wider than the natural linewidth of atoms used in atomic beam clocks and trapped atom research, which degrades or completely destroys performance in those systems. This report documents our efforts to reduce VCSEL linewidths below 10 MHz to meet the needs of advanced sub-Doppler atomic microsystems, such as cold-atom traps. We have investigated two complementary approaches to reduce VCSEL linewidth: (A) increasing the laser-cavity quality factor, and (B) decreasing the linewidth enhancement factor (alpha) of the optical gain medium. We have developed two new VCSEL devices that achieved increased cavity quality factors: (1) all-semiconductor extended-cavity VCSELs, and (2) micro-external-cavity surface-emitting lasers (MECSELs). These new VCSEL devices have demonstrated linewidths below 10 MHz, and linewidths below 1 MHz seem feasible with further optimization.

  11. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori

    2015-01-01

    Recently companies have applied two-factor user authentication. Persistent Authentication is one of the interesting authentication mechanisms to establish security and usability of two-factor authentication systems. However, there is room to improve its feasibility and usability. In this paper, we...... propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  12. Authenticity and commoditization at home

    DEFF Research Database (Denmark)

    Stender, Marie

    This paper investigates how interest and affect are entangled in the built environment of new Danish homes. The paper unfolds tensions and conflicts in the process from design through branding to occupancy of the house, and the relationship between authenticity and commoditization is explored....... The aim is to unfold how forces of commoditization and singularization intertwine as the house is transformed from an architectural expression into real estate for sale and eventually into somebody's home. What tensions are revealed in this process and how are interest and affect entangled? Authenticity...... seems to be a key concept in contemporary branding of products, places, and more recently also private homes. On the one hand authenticity thus seems to be closely related to the commercial value of things, on the other hand the authentic is held to be an expression of an inner nature or feeling...

  13. Robustness of digital artist authentication

    DEFF Research Database (Denmark)

    Jacobsen, Robert; Nielsen, Morten

    is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection.......In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...

  14. The fantasy of authenticity: touring with Lacan

    OpenAIRE

    Knudsen, Daniel C.; Rickly, J.M.; Vidon, Elizabeth S.

    2016-01-01

    Amidst the plethora of research regarding the meaning of authenticity, there remains uncertainty as to the work authenticity performs in tourism. Existential authenticity conceptually shifts focus from the objects of touristic practice to a sense of Being, suggesting that authenticity can be achieved, albeit only in the liminal moments of tourism experiences. Psychoanalysis would contend otherwise – authenticity will always be beyond our reach. In a 2006 publication, Tim Oakes broaches the to...

  15. Quantum direct communication with authentication

    International Nuclear Information System (INIS)

    Lee, Hwayean; Lim, Jongin; Yang, HyungJin

    2006-01-01

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states

  16. Transmissive infrared frequency selective surfaces and infrared antennas: final report for LDRD 105749

    International Nuclear Information System (INIS)

    Wendt, Joel Robert; Hadley, G. Ronald; Samora, Sally; Loui, Hung; Cruz-Cabrera, Alvaro Augusto; Davids, Paul; Kemme, Shanalyn A.; Basilio, Lorena I.; Johnson, William Arthur; Peters, David William

    2009-01-01

    Plasmonic structures open up new opportunities in photonic devices, sometimes offering an alternate method to perform a function and sometimes offering capabilities not possible with standard optics. In this LDRD we successfully demonstrated metal coatings on optical surfaces that do not adversely affect the transmission of those surfaces at the design frequency. This technology could be applied as an RF noise blocking layer across an optical aperture or as a method to apply an electric field to an active electro-optic device without affecting optical performance. We also demonstrated thin optical absorbers using similar patterned surfaces. These infrared optical antennas show promise as a method to improve performance in mercury cadmium telluride detectors. Furthermore, these structures could be coupled with other components to lead to direct rectification of infrared radiation. This possibility leads to a new method for infrared detection and energy harvesting of infrared radiation.

  17. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  18. Authentication techniques for smart cards

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  19. Creating contextually authentic science in a low-performing urban elementary school

    Science.gov (United States)

    Buxton, Cory A.

    2006-09-01

    This article reports on a 2-year collaborate project to reform the teaching and learning of science in the context of Mae Jemison Elementary, the lowest performing elementary school in the state of Louisiana. I outline a taxonomy of authentic science inquiry experiences and then use the resulting framework to focus on how project participants interpreted and enacted ideas about collaboration and authenticity. The resulting contextually authentic science inquiry model links the strengths of a canonically authentic model of science inquiry (grounded in the Western scientific canon) with the strengths of a youth-centered model of authenticity (grounded in student-generated inquiry), thus bringing together relevant content standards and topics with critical social relevance. I address the question of how such enactments may or may not promote doing science together and consider the implications of this model for urban science education.

  20. Main group adducts of carbon dioxide and related chemistry (LDRD 149938).

    Energy Technology Data Exchange (ETDEWEB)

    Barry, Brian M. (University of New Mexico, Albuquerque, NM); Kemp, Richard Alan; Stewart, Constantine A.; Dickie, Diane A. (University of New Mexico, Albuquerque, NM)

    2010-11-01

    This late-start LDRD was broadly focused on the synthetic attempts to prepare novel ligands as complexing agents for main group metals for the sequestration of CO{sub 2}. In prior work we have shown that certain main group (p block elements) metals such as tin and zinc, when ligated to phosphinoamido- ligands, can bind CO{sub 2} in a novel fashion. Rather than simple insertion into the metal-nitrogen bonds to form carbamates, we have seen the highly unusual complexation of CO{sub 2} in a mode that is more similar to a chemical 'adduct' rather than complexation schemes that have been observed previously. The overarching goal in this work is to prepare more of these complexes that can (a) sequester (or bind) CO{sub 2} easily in this adduct form, and (b) be stable to chemical or electrochemical reduction designed to convert the CO{sub 2} to useful fuels or fuel precursors. The currently used phosphinoamido- ligands appear at this point to be less-stable than desired under electrochemical reduction conditions. This instability is believed due to the more delicate, reactive nature of the ligand framework system. In order to successfully capture and convert CO{sub 2} to useful organics, this instability must be addressed and solved. Work described in the late-start LDRD was designed to screen a variety of ligand/metal complexes that a priori are believed to be more stable to polar solvents and possible mild hydrolytic conditions than are the phosphinoamido-ligands. Results from ligand syntheses and metal complexation studies are reported.

  1. Quantum Cascade Lasers (QCLs) for standoff explosives detection : LDRD 138733 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Theisen, Lisa Anne; Linker, Kevin Lane

    2009-09-01

    Continued acts of terrorism using explosive materials throughout the world have led to great interest in explosives detection technology, especially technologies that have a potential for remote or standoff detection. This LDRD was undertaken to investigate the benefit of the possible use of quantum cascade lasers (QCLs) in standoff explosives detection equipment. Standoff detection of explosives is currently one of the most difficult problems facing the explosives detection community. Increased domestic and troop security could be achieved through the remote detection of explosives. An effective remote or standoff explosives detection capability would save lives and prevent losses of mission-critical resources by increasing the distance between the explosives and the intended targets and/or security forces. Many sectors of the US government are urgently attempting to obtain useful equipment to deploy to our troops currently serving in hostile environments. This LDRD was undertaken to investigate the potential benefits of utilizing quantum cascade lasers (QCLs) in standoff detection systems. This report documents the potential opportunities that Sandia National Laboratories can contribute to the field of QCL development. The following is a list of areas where SNL can contribute: (1) Determine optimal wavelengths for standoff explosives detection utilizing QCLs; (2) Optimize the photon collection and detection efficiency of a detection system for optical spectroscopy; (3) Develop QCLs with broader wavelength tunability (current technology is a 10% change in wavelength) while maintaining high efficiency; (4) Perform system engineering in the design of a complete detection system and not just the laser head; and (5) Perform real-world testing with explosive materials with commercial prototype detection systems.

  2. Authenticity in art

    International Nuclear Information System (INIS)

    Fleming, S.J.

    1975-01-01

    After a general introductory chapter, the subject is treated under three headings: paintings, ceramics and metals. The scientific tests for authenticity are described in their application to one or more of these branches of art. The traditional method of visual stylistic judgement is compared with and supplemented by scientific methods which (as well as 'wet' chemical analysis, optical microscopy, ultraviolet, infrared, electron and X-ray microscopy, X-ray crystallography and X-ray fluorescence, and direct age determination) include the following or more direct 'nuclear' interest: neutron (or proton, deuteron and high-energy photon) activation analysis for determining impurity and trace element content, gamma radiography for bronzes, neutron autoradiography or examining paintings, radiocarbon dating, other isotope dating (e.g. with lead isotopes and the radium-lead ratio), high temperature thermoluminescence for ceramics, and mass spectroscopy to determine isotope ratios indicative of particular sources of materials. As well as the reference in each chapter there is an additional bibliography. (U.K.)

  3. Strengthening Software Authentication with the ROSE Software Suite

    International Nuclear Information System (INIS)

    White, G

    2006-01-01

    Many recent nonproliferation and arms control software projects include a software authentication regime. These include U.S. Government-sponsored projects both in the United States and in the Russian Federation (RF). This trend toward requiring software authentication is only accelerating. Demonstrating assurance that software performs as expected without hidden ''backdoors'' is crucial to a project's success. In this context, ''authentication'' is defined as determining that a software package performs only its intended purpose and performs said purpose correctly and reliably over the planned duration of an agreement. In addition to visual inspections by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs, both to aid visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary and not extensible. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool has to be based on a complete language compiler. ROSE is precisely such a compiler infrastructure developed within the Department of Energy (DOE) and targeted at the optimization of scientific applications and user-defined libraries within large-scale applications (typically applications of a million lines of code). ROSE is a robust, source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C and C++ (handling the full C, C99, C++ languages and with current collaborations to support Fortran90). We propose to extend ROSE to address a number of security-specific requirements, and apply it to software authentication for nonproliferation and arms control projects

  4. X.509 Authentication/Authorization in FermiCloud

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyunwoo [Fermilab; Timm, Steven [Fermilab

    2014-11-11

    We present a summary of how X.509 authentication and authorization are used with OpenNebula in FermiCloud. We also describe a history of why the X.509 authentication was needed in FermiCloud, and review X.509 authorization options, both internal and external to OpenNebula. We show how these options can be and have been used to successfully run scientific workflows on federated clouds, which include OpenNebula on FermiCloud and Amazon Web Services as well as other community clouds. We also outline federation options being used by other commercial and open-source clouds and cloud research projects.

  5. For-LySa: UML for Authentication Analysis

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Montangero, Carlo; Perrone, Lara

    2005-01-01

    The DEGAS project aims at enriching standard UML-centred development environments in such a way that the developers of global applications can exploit automated formal analyses with minimal overhead. In this paper, we present For-LySa, an instantiation of the DEGAS approach for authentication...... analysis, which exploits an existing analysis tool developed for the process calculus LySa. We discuss what information is needed for the analysis, and how to build the UML model of an authentication protocol in such a way that the needed information can be extracted from the model. We then present our...

  6. Human Authentication Based on ECG Waves Using Radon Transform

    Science.gov (United States)

    Hegde, Chetana; Prabhu, H. Rahul; Sagar, D. S.; Shenoy, P. Deepa; Venugopal, K. R.; Patnaik, L. M.

    Automated security is one of the major concerns of modern times. Secure and reliable authentication systems are in great demand. A biometric trait like electrocardiogram (ECG) of a person is unique and secure. In this paper, we propose a human authentication system based on ECG waves considering a plotted ECG wave signal as an image. The Radon Transform is applied on the preprocessed ECG image to get a radon image consisting of projections for θ varying from 0 o to 180 o . The pairwise distance between the columns of Radon image is computed to get a feature vector. Correlation Coefficient between feature vector stored in the database and that of input image is computed to check the authenticity of a person. Then the confusion matrix is generated to find False Acceptance Ratio (FAR) and False Rejection Ratio (FRR). This methodology of authentication is tested on ECG wave data set of 105 individuals taken from Physionet QT Database. The proposed authentication system is found to have FAR of about 3.19% and FRR of about 0.128%. The overall accuracy of the system is found to be 99.85%.

  7. Authentication codes that permit arbitration

    Energy Technology Data Exchange (ETDEWEB)

    Simmons, G.J.

    1987-01-01

    Objective of authentication is to detect attempted deceptions in a communications channel. Traditionally this has been restricted to providing the authorized receiver with a capability of detecting unauthentic messages. The known codes have all left open the possibility for either the transmitter to disavow a message that he actually sent to the receiver, i.e., an authentic message, or else for the receiver to falsely attribute a message of his own devising to the transmitter. Of course the party being deceived would know that he was the victim of a deception by the other, but would be unable to ''prove'' this to a third party. Ideally, authentication should provide a means to detect attempted deceptions by insiders (the transmitter or receiver) as well as outsiders (the opponent). It has been an open question of whether it was possible to devise authentication codes that would permit a third party, an arbiter, to decide (in probability) whether the transmitter or the receiver was cheating in the event of a dispute. We answer this question in that both permits the receiver to detect outsider deceptions, as well affirmative by first constructing an example of an authentication code as permitting a designated arbiter to detect insider deceptions and then by generalizing this construction to an infinite class of such codes.

  8. Deep Brain Stimulation, Authenticity and Value.

    Science.gov (United States)

    Pugh, Jonathan; Maslen, Hannah; Savulescu, Julian

    2017-10-01

    Deep brain stimulation has been of considerable interest to bioethicists, in large part because of the effects that the intervention can occasionally have on central features of the recipient's personality. These effects raise questions regarding the philosophical concept of authenticity. In this article, we expand on our earlier work on the concept of authenticity in the context of deep brain stimulation by developing a diachronic, value-based account of authenticity. Our account draws on both existentialist and essentialist approaches to authenticity, and Laura Waddell Ekstrom's coherentist approach to personal autonomy. In developing our account, we respond to Sven Nyholm and Elizabeth O'Neill's synchronic approach to authenticity, and explain how the diachronic approach we defend can have practical utility, contrary to Alexandre Erler and Tony Hope's criticism of autonomy-based approaches to authenticity. Having drawn a distinction between the authenticity of an individual's traits and the authenticity of that person's values, we consider how our conception of authenticity applies to the context of anorexia nervosa in comparison to other prominent accounts of authenticity. We conclude with some reflections on the prudential value of authenticity, and by highlighting how the language of authenticity can be invoked to justify covert forms of paternalism that run contrary to the value of individuality that seems to be at the heart of authenticity.

  9. Designing assignment using authentic assessment

    Science.gov (United States)

    Arlianty, Widinda Normalia; Febriana, Beta Wulan; Diniaty, Artina; Fauzi'ah, Lina

    2017-12-01

    This research is conducted to get an overview of the use of authentic assessment in the department of chemistry education, Islamic University of Indonesia. This research was conducted on the students of semester five, odd semester of academic year 2016/2017. Authentic assessment is an assessment process that is capable of measuring the knowledge, attitudes and skills of learners. Chemistry teacher candidates are required to be equipped with teaching and judging skills. Teachers were required can design and carry out assessment of the process and learning outcomes of students in an objective, accountable, and informative. Teacher creativity is required in the assessment. Therefore, authentic assessment is very appropriate used to improve the competence of students in education department as teachers candidates in the preparation of learning assessments.

  10. PERSON AUTHENTICATION USING MULTIPLE SENSOR DATA FUSION

    Directory of Open Access Journals (Sweden)

    S. Vasuhi

    2011-04-01

    Full Text Available This paper proposes a real-time system for face authentication, obtained through fusion of Infra Red (IR and visible images. In order to identify the unknown person authentication in highly secured areas, multiple algorithms are needed. The four well known algorithms for face recognition, Block Independent Component Analysis(BICA, Kalman Filtering(KF method, Discrete Cosine Transform(DCT and Orthogonal Locality Preserving Projections (OLPP are used to extract the features. If the data base size is very large and the features are not distinct then ambiguity will exists in face recognition. Hence more than one sensor is needed for critical and/or highly secured areas. This paper deals with multiple fusion methodology using weighted average and Fuzzy Logic. The visible sensor output depends on the environmental condition namely lighting conditions, illumination etc., to overcome this problem use histogram technique to choose appropriate algorithm. DCT and Kalman filtering are holistic approaches, BICA follows feature based approach and OLPP preserves the Euclidean structure of face space. These recognizers are capable of considering the problem of dimensionality reduction by eliminating redundant features and reducing the feature space. The system can handle variations like illumination, pose, orientation, occlusion, etc. up to a significant level. The integrated system overcomes the drawbacks of individual recognizers. The proposed system is aimed at increasing the accuracy of the person authentication system and at the same time reducing the limitations of individual algorithms. It is tested on real time database and the results are found to be 96% accurate.

  11. Polymeric self-authenticating banknotes

    Science.gov (United States)

    Zientek, Paul

    1998-04-01

    This paper discusses a new concept in overt security called the self-authenticating banknote. The self-authenticating banknote concept is built around the transparent window feature of the polymer banknote. This feature allows the incorporation of transmission based optical devices on a banknote so that the user, by folding the note over on itself and looking through an optical device which is a part of the note itself, can visually inspect and verify certain security features on the banknote. This paper presents a number of examples of optical devices which are presently being developed for this purpose.

  12. Measuring Teacher Authenticity: Criteria Students Use in Their Perception of Teacher Authenticity

    Science.gov (United States)

    De Bruyckere, Pedro; Kirschner, Paul A.

    2017-01-01

    Authenticity is an often-heard term with respect to education. Tasks should be authentic, the learning environment should be authentic and, above all, the teacher should be authentic. Previous qualitative research has shown that there are four primary criteria that students in formal educational settings use when forming their perceptions of…

  13. Measuring teacher authenticity: Criteria students use in their perception of teacher authenticity

    NARCIS (Netherlands)

    De Bruyckere, Pedro; Kirschner, Paul A.

    2018-01-01

    Authenticity is an often-heard term with respect to education. Tasks should be authentic, the learning environment should be authentic and, above all, the teacher should be authentic. Previous qualitative research has shown that there are four primary criteria that students in formal educational

  14. Authenticity, Autonomy and Altruism: Keys for Transformation

    Science.gov (United States)

    Clarken, Rodney

    2011-01-01

    The value of authentic knowing, autonomous behavior and altruistic motivation is presented. Authenticity, autonomy and altruism are primary human capacities and keys for individual and collective transformation. Realizing the full development of these three basic potentialities can serve as goals and standards for well-being. Authenticity,…

  15. 29 CFR 18.50 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Authenticity. 18.50 Section 18.50 Labor Office of the Secretary of Labor RULES OF PRACTICE AND PROCEDURE FOR ADMINISTRATIVE HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES General § 18.50 Authenticity. The authenticity of all documents submitted as proposed...

  16. 28 CFR 68.46 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Authenticity. 68.46 Section 68.46... ALIENS, UNFAIR IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.46 Authenticity. The authenticity of all documents submitted as proposed exhibits in advance of the hearing shall be deemed admitted...

  17. Authentic Montessori: The Teacher Makes the Difference

    Science.gov (United States)

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  18. 1 authentic leadership and spiritual capital development

    African Journals Online (AJOL)

    2008-05-01

    May 1, 2008 ... The purpose of this paper is to examine authentic leadership and spiritual capital as key elements for the successful building of quality management and effective organizations. It highlights the nexus between authentic leadership and spiritual capital, describes the common features of authentic leadership.

  19. Determination of authenticity of engraved scrimshaw

    Science.gov (United States)

    Ridley, Donald E.

    2000-03-01

    Scrimshaw is an occupational art form originated by, or indigenous to, whalemen, utilizing the hard by-products of the whale fishery, ivory, bone and baleen, in some cases combined with other found material. It is comprised of three types: 1) decorative, e.g. engraved or carved teeth or tusks; 2) utilitarian, e.g. tools and tool handles, and 3) a combination of these, e.g. busks, swifts an dippers. This paper is concerned with engraved scrimshaw, principally decorative, and in particular, determination of authenticity. The value of scrimshaw in general, and engraved scrimshaw in particular, has increased markedly in the last quarter century, encouraging forgery, thus making verification of authenticity of increasing importance. Two of the pioneers in the field of scientific detection of forgery of scrimshaw, or scrimshaw forensics, are Dr. Janet West of the Scott Polar Institute, Cambridge University, and Desmund T. Liddy of Australia. It is on their work that our project at the Kendall Whaling Museum is based. All of the methodologies discussed herein discussed herein are visual, the attributes visible to the unaided eye in many cases, augmented by low power stereo microscopy in others.

  20. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  1. Authentic Supervision Reconciles the Irreconcilables.

    Science.gov (United States)

    Pajak, Edward F.; Seyfarth, John T.

    1983-01-01

    Successful supervisors share a characteristic of "authenticity," rather than a particular pattern of behavior. From a background of Gestalt psychology, four steps are offered to help supervisors become aware of their own needs and feelings and recognize the "shoulds" that prevent real contact with others. (MLF)

  2. Authenticity and Relationships with Students

    Science.gov (United States)

    Frego, Katherine A.

    2006-01-01

    Although authenticity makes one vulnerable, the author believes that its impact on learning and on enjoyment of the teaching and learning process justifies the risk. This chapter describes how to offer a relationship to each student, focusing on appropriate caring for individuals and for learning. (Contains 1 figure.)

  3. Embodying Authenticity in Higher Education

    Science.gov (United States)

    Douglass, Laura

    2016-01-01

    Orienting to the community of higher education involves a learning experience that is authentic and embodied for one new college administrator. Reflecting on her experience, she articulates how her relationship to her body helps to understand and respond to the tensions of engaging with a scholarly community.

  4. Towards an Authentic Indian Environmentalism

    African Journals Online (AJOL)

    Jenny

    An attempt must therefore be made to formulate a more authentic Indian environmental perspective.To do this ... (of government forests), global warming and ozone depletion that feature in the media and existing school textbooks.To get started .... Not only that, numerous water parks and golf courses are springing up for the ...

  5. Literacy Cafe: Making Writing Authentic

    Science.gov (United States)

    Daniels, Erika

    2007-01-01

    The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…

  6. Authenticity or School-only?

    DEFF Research Database (Denmark)

    Fougt, Simon Skov

    Challenging the apparent distinction among educational researchers between ‘authenticity’ outside schools and ‘school-only’ inside schools, this paper investigates the concept of meaningfulness from different perspectives with a focus on formal learning in schools, as it states that teaching...... and learning inside school also can be authentic....

  7. The embodiment of authentic leadership.

    Science.gov (United States)

    Waite, Roberta; McKinney, Nicole; Smith-Glasgow, Mary Ellen; Meloy, Faye A

    2014-01-01

    Development of student leadership capacity and efficacy is critical to the nursing profession, and vital to this process is a strong foundation in critical thinking that includes a depth of understanding of self (i.e., authentic leadership development). This article will (a) present a theoretical overview of authentic leadership as compared with other popular leadership theories, (b) provide an overview of development/implementation of an authentic leadership course, the first in a series of six one-credit courses as an integral component of the Macy Undergraduate Leadership Fellows Program for upper-level nursing students, and (c) discuss related implications for nursing education. Findings from an investigator-developed quantitative pre-post survey and qualitative evaluation questions are provided. Student feedback regarding the comprehensive nature of the course was extremely positive and affirmed the value of introspection associated with authentic leadership in ongoing personal and professional development. Critical pedagogy and action-oriented learning strategies also proved beneficial to student engagement. Copyright © 2014 Elsevier Inc. All rights reserved.

  8. Improving Usability of Passphrase Authentication

    DEFF Research Database (Denmark)

    Nielsen, Glen; Vedel, Michael; Jensen, Christian D.

    2014-01-01

    . This is done to ensure an appropriate degree of security, but instead, it makes it difficult for users to remember their password, which results in passwords that are either insecure, but easy to remember, or written down on paper. In this paper we address the problem of usability in user authentication...

  9. Authenticity as an aim of psychoanalysis.

    Science.gov (United States)

    Neri, Claudio

    2008-12-01

    This paper will present a series of predominantly clinical observations concerning the lengthy work a patient carries out, with the help of the analyst, in order to achieve greater personal authenticity. When this work is drawing to a close and the patient has gained a degree of authenticity, this authenticity remains within him, almost without his realizing it. The power of authenticity is instead revealed through the patient's most intimate and important relationships. In the long term, the patient's authenticity also alters his perception of himself and of his role in the world. He feels more alive and less overcome by a sense of futility, if earlier this had been the case.

  10. Quantum identity authentication with single photon

    Science.gov (United States)

    Hong, Chang ho; Heo, Jino; Jang, Jin Gak; Kwon, Daesung

    2017-10-01

    Quantum identity authentication with single photons is proposed in the paper. It can verify a user's identity without exposing to an authentication key information. The protocol guarantees high efficiency in that it can verify two bits of authentication information using just a single photon. The security of our authentication scheme is analyzed and confirmed in the case of a general attack. Moreover, the proposed protocol is practicable with current technology. Our quantum identity authentication protocol does not require quantum memory registration and any entangled photon sources.

  11. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  12. Infusing Authentic Inquiry into Biotechnology

    Science.gov (United States)

    Hanegan, Nikki L.; Bigler, Amber

    2009-10-01

    Societal benefit depends on the general public's understandings of biotechnology (Betsch in World J Microbiol Biotechnol 12:439-443, 1996; Dawson and Cowan in Int J Sci Educ 25(1):57-69, 2003; Schiller in Business Review: Federal Reserve Bank of Philadelphia (Fourth Quarter), 2002; Smith and Emmeluth in Am Biol Teach 64(2):93-99, 2002). A National Science Foundation funded survey of high school biology teachers reported that hands-on biotechnology education exists in advanced high school biology in the United States, but is non-existent in mainstream biology coursework (Micklos et al. in Biotechnology labs in American high schools, 1998). The majority of pre-service teacher content preparation courses do not teach students appropriate content knowledge through the process of inquiry. A broad continuum exists when discussing inquiry-oriented student investigations (Hanegan et al. in School Sci Math J 109(2):110-134, 2009). Depending on the amount of structure in teacher lessons, inquiries can often be categorized as guided or open. The lesson can be further categorized as simple or authentic (Chinn and Malhotra in Sci Educ 86(2):175-218, 2002). Although authentic inquiries provide the best opportunities for cognitive development and scientific reasoning, guided and simple inquiries are more often employed in the classroom (Crawford in J Res Sci Teach 37(9):916-937, 2000; NRC in Inquiry and the national science education standards: a guide for teaching and learning, 2000). For the purposes of this study we defined inquiry as "authentic" if original research problems were resolved (Hanegan et al. in School Sci Math J 109(2):110-134, 2009; Chinn and Malhotra in Sci Educ 86(2):175-218, 2002; Roth in Authentic school science: knowing and learning in open-inquiry science laboratories, 1995). The research question to guide this study through naturalistic inquiry research methods was: How will participants express whether or not an authentic inquiry experience enhanced

  13. Materiality, Authenticity and Value in the historic environment

    DEFF Research Database (Denmark)

    Douglas-Jones, Rachel

    2014-01-01

    , the study explores how these interventions impact on perceptions of authenticity and value. The project puts conversations with practitioners at the heart of the field of inquiry. It is oriented toward initiating discussion between research and practice, demonstrating the role of qualitative research......It is widely recognised that the historic environment provides a source of cultural enrichment and enhances people’s quality of life and wellbeing. However, it also undergoes cycles of material transformation, of decay and renewal, which inform the meanings and values associated...... with it and contribute to the experience of authenticity. In this interdisciplinary project, we have used ethnographic methods including interviews and participant observation to examine the kinds of value attached to deterioration and decay in historic buildings. We use these methods firstly to ask how processes...

  14. Authentication Method for Privacy Protection in Smart Grid Environment

    Directory of Open Access Journals (Sweden)

    Do-Eun Cho

    2014-01-01

    Full Text Available Recently, the interest in green energy is increasing as a means to resolve problems including the exhaustion of the energy source and, effective management of energy through the convergence of various fields. Therefore, the projects of smart grid which is called intelligent electrical grid for the accomplishment of low carbon green growth are being carried out in a rush. However, as the IT is centered upon the electrical grid, the shortage of IT also appears in smart grid and the complexity of convergence is aggravating the problem. Also, various personal information and payment information within the smart grid are gradually becoming big data and target for external invasion and attack; thus, there is increase in concerns for this matter. The purpose of this study is to analyze the security vulnerabilities and security requirement within smart grid and the authentication and access control method for privacy protection within home network. Therefore, we propose a secure access authentication and remote control method for user’s home device within home network environment, and we present their security analysis. The proposed access authentication method blocks the unauthorized external access and enables secure remote access to home network and its devices with a secure message authentication protocol.

  15. Improving Usability of Passphrase Authentication

    DEFF Research Database (Denmark)

    Nielsen, Glen; Vedel, Michael; Jensen, Christian D.

    2014-01-01

    . This is done to ensure an appropriate degree of security, but instead, it makes it difficult for users to remember their password, which results in passwords that are either insecure, but easy to remember, or written down on paper. In this paper we address the problem of usability in user authentication.......We promote the use of passphrases, which provide better security and are often easier to remember than passwords. Passphrases will be significantly longer than passwords, which makes them more difficult to enter correctly on a keyboard. We solve this problem by proposing a new passphrase validation algorithm......The combination of user-names and passwords has become the predominant method of user authentication in computer systems. Most users have multiple accounts on different systems, which impose different constraints on the length and complexity of passwords that the user is allowed to select...

  16. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Bork Petersen, Franziska

    2013-01-01

    In this thesis I investigate what ‘authenticity’ means in a contemporary popular context and how it is used in the staging of bodies. Furthermore, I analyse works of dance and fashion from the past fifteen years with a focus on their strategies of challenging the notion of ‘bodily authenticity...... self’. I scrutinise the staging techniques and the codes of appearance that bodies have to comply with in order to be deemed ‘authentic’ on the shows. To define them and place them in the history of the idea of ‘bodily authenticity’, I complement my study with an outline of how ‘authenticity...... and by a depiction of 'working hard'. But various techniques also mask the hard work, for example by showing a participant ‘having fun’ performing it. Contemporary works of dance and fashion challenge the problematic implications in the notion of ‘bodily authenticity’. I analyse three strategies of undermining...

  17. Digital image authentication from thumbnails

    Science.gov (United States)

    Kee, Eric; Farid, Hany

    2010-01-01

    We describe how to exploit the formation and storage of an embedded image thumbnail for image authentication. The creation of a thumbnail is modeled with a series of filtering operations, contrast adjustment, and compression. We automatically estimate these model parameters and show that these parameters differ significantly between camera manufacturers and photo-editing software. We also describe how this signature can be combined with encoding information from the underlying full resolution image to further refine the signature's distinctiveness.

  18. Persistent Authentication in Smart Environments

    DEFF Research Database (Denmark)

    Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D.

    2008-01-01

    present a proof-of-concept implementation of the proposed mechanism, which employs camera based tracking with a single stationary 3D camera that uses the "time of flight" principle. A preliminary evaluation of the proposed mechanism indicates that persistent authentication is technically possible...... with the proposed hardware. The proposed model is sufficiently general to allow the addition of more cameras or supplemental tracking technologies, which will improve the robustness and scalability of the proposed mechanism....

  19. National Authentication Framework Implementation Study

    Science.gov (United States)

    2009-12-01

    Identifiers RA Registration Authority SAML Security Assertion Markup Language SFA Single-factor Authentication SMS Short Messaging System SOA ...Internet 2.0 and the growing interest in systems developed based upon the Service- Oriented Architecture ( SOA ). While core specifications upon which...August 2009. [4] S. Harris, CISSP: Exam Guide, 4th ed., New York: McGraw-Hill, 2008, pp. 1145. [5] J. Brainard, A. Juels, R. L. Rivest, M. Szydlo

  20. Multi-Factor Authentication: A Survey

    Directory of Open Access Journals (Sweden)

    Aleksandr Ometov

    2018-01-01

    Full Text Available Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA starting from Single-Factor Authentication (SFA and through Two-Factor Authentication (2FA. Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.

  1. Authenticity assessment of dairy products.

    Science.gov (United States)

    de la Fuente, Miguel Angel; Juárez, Manuela

    2005-01-01

    The authenticity of dairy products has become a focal point, attracting the attention of scientists, producers, consumers, and policymakers. Among many others, some of the practices not allowed in milk and milk products are the substitution of part of the fat or proteins, admixtures of milk of different species, additions of low-cost dairy products (mainly whey derivatives), or mislabeling of products protected by denomination of origin. A range of analytical methods to detect frauds have been developed, modified, and continually reassessed to be one step ahead of manufacturers who pursue these illegal activities. Traditional procedures to assess the authenticity of dairy products include chromatographic, electrophoretic, and immunoenzymatic methods. New approaches such as capillary electrophoresis, polymerase chain reaction, and isotope ratio mass spectrometry have also emerged alongside the latest developments in the former procedures. This work intends to provide an updated and extensive overview since 1991 on the principal applications of all these techniques together with their advantages and disadvantages for detecting the authenticity of dairy products. The scope and limits of different tools are also discussed.

  2. Staging constructions of authenticity in organizational change

    DEFF Research Database (Denmark)

    Dupret, Katia

    2018-01-01

    that are emotionally charged. Through a socio-material perspective this paper seeks to explore how change processes in organizations challenges the idea of authentic leadership as a merely individual ability or personality trait and suggest that the authentic leader is distributed into the practices of change......Authenticity in organizations has gained increased focus in recent years. Authentic management and leadership are ways to motivate and make sustainable changes in the organization. But authenticity is also strategically worked with in order to serve social and political functions....... The paper explores how staged organizational change where authentic role-play and scripts from everyday life combined with meta-reflection and feedback construct new forms of reflection where its ethical side-effects should be discussed....

  3. An Examination of Career Indecision and Application to Dispositional Authenticity

    Science.gov (United States)

    White, Nathan J.; Tracey, Terence J. G.

    2011-01-01

    Authenticity has been viewed as a dimension related to life satisfaction, but we propose that authenticity is related to career outcomes. In this study, we examined the relation between authenticity and career indecision. Authenticity was assessed by the Authenticity Scale and it was found to be moderately related to different indices of career…

  4. Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity.

    NARCIS (Netherlands)

    Gulikers, Judith; Bastiaens, Theo; Kirschner, Paul A.; Kester, Liesbeth

    2008-01-01

    Gulikers, J. T. M., Bastiaens, Th. J., Kirschner, P. A., & Kester, L. (2008). Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity. Journal of Vocational Education and Training, 60(4)

  5. The Duality of Authenticity in ELT

    OpenAIRE

    Joy, J. John Love

    2011-01-01

    Purpose: This study aims to find out the dual-perspectives on authenticity in English language teaching.Problem: The concept of authenticity has generated quite a ripple in ESL/EFL classrooms. Contrasting perspectives have emerged over the years in reaction to this concept. Some regard authenticity as an inevitable part of teaching as it provides students with opportunities to interact with reality in the classroom itself, whereas, some others consider it an ambitious construct and suggest ap...

  6. Disambiguating authenticity: Interpretations of value and appeal

    OpenAIRE

    O?Connor, Kieran; Carroll, Glenn R.; Kov?cs, Bal?zs

    2017-01-01

    While shaping aesthetic judgment and choice, socially constructed authenticity takes on some very different meanings among observers, consumers, producers and critics. Using a theoretical framework positing four distinct meanings of socially constructed authenticity-type, moral, craft, and idiosyncratic-we aim to document empirically the unique appeal of each type. We develop predictions about the relationships between attributed authenticity and corresponding increases in the value ascribed ...

  7. A Review Of Multimodal Biometric Authentication Systems

    Directory of Open Access Journals (Sweden)

    Kunal Kumar

    2015-08-01

    Full Text Available Authentication is the process of validating the identity of a person based on certain input that the person provides. Authentication has become a major topic of research due to the increasing number of attacks on computer networks around the globe. This review paper focuses on multimodal biometric authentication systems in use today. The aim is to elicit the best combination of authentication factors for multimodal use. We study the strengths and weakness of selected biometric mechanisms and recommend novel solutions to include in multimodal biometric systems to improve on the current biometric drawbacks. We believe this paper will provide security researchers some useful insight whilst designing better biometric systems.

  8. User Authentication in Smartphones for Telehealth

    Science.gov (United States)

    SMITH, KATHERINE A.; ZHOU, LEMING; WATZLAF, VALERIE J. M.

    2017-01-01

    Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed. PMID:29238444

  9. Authenticity Lies in the Eye of the Beholder The Perception of Teachers' Authenticity by their Students

    NARCIS (Netherlands)

    De Bruyckere, Pedro

    2018-01-01

    Everything and everybody is urged to be authentic. Brands now need to create authentic experiences in music, artists survive if they are perceived as being real and nowadays, even in political elections, the perception of authenticity is an issue, certainly in the 2016 elections in the United

  10. E-Labs - Learning with Authentic Data

    Energy Technology Data Exchange (ETDEWEB)

    Bardeen, Marjorie G. [Fermilab; Wayne, Mitchell [Notre Dame U.

    2016-01-01

    the success teachers have had providing an opportunity for students to: • Organize and conduct authentic research. • Experience the environment of scientific collaborations. • Possibly make real contributions to a burgeoning scientific field. We've created projects that are problem-based, student driven and technology dependent. Students reach beyond classroom walls to explore data with other students and experts and share results, publishing original work to a worldwide audience. Students can discover and extend the research of other students, modeling the processes of modern, large-scale research projects. From start to finish e-Labs are student-led, teacher-guided projects. Students need only a Web browser to access computing techniques employed by professional researchers. A Project Map with milestones allows students to set the research plan rather than follow a step-by-step process common in other online projects. Most importantly, e-Labs build the learning experience around the students' own questions and let them use the very tools that scientists use. Students contribute to and access shared data, most derived from professional research databases. They use common analysis tools, store their work and use metadata to discover, replicate and confirm the research of others. This is where real scientific collaboration begins. Using online tools, students correspond with other research groups, post comments and questions, prepare summary reports, and in general participate in the part of scientific research that is often left out of classroom experiments. Teaching tools such as student and teacher logbooks, pre- and post-tests and an assessment rubric aligned with learner outcomes help teachers guide student work. Constraints on interface designs and administrative tools such as registration databases give teachers the "one-stop-shopping" they seek for multiple e-Labs. Teaching and administrative tools also allow us to track usage and assess the

  11. Creating Contextually Authentic Science in a "Low-Performing" Urban Elementary School

    Science.gov (United States)

    Buxton, Cory A.

    2006-01-01

    This article reports on a 2 1/2-year collaborate project to reform the teaching and learning of science in the context of Mae Jemison Elementary, the lowest performing elementary school in the state of Louisiana. I outline a taxonomy of authentic science inquiry experiences and then use the resulting framework to focus on how project participants…

  12. Authentic Performance in the Instrumental Analysis Laboratory: Building a Visible Spectrophotometer Prototype

    Science.gov (United States)

    Wilson, Mark V.; Wilson, Erin

    2017-01-01

    In this work we describe an authentic performance project for Instrumental Analysis in which students designed, built, and tested spectrophotometers made from simple components. The project addressed basic course content such as instrument design principles, UV-vis spectroscopy, and spectroscopic instrument components as well as skills such as…

  13. Parallelizable and Authenticated Online Ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Luykx, Atul

    2013-01-01

    -purpose CPUs or dedicated hardware.We propose the first parallelizable online cipher, COPE. It performs two calls to the underlying block cipher per plaintext block and is fully parallelizable in both encryption and decryption. COPE is proven secure against chosenplaintext attacks assuming the underlying block...... cipher is a strong PRP. We then extend COPE to create COPA, the first parallelizable, online authenticated cipher with nonce-misuse resistance. COPA only requires two extra block cipher calls to provide integrity. The privacy and integrity of the scheme is proven secure assuming the underlying block...

  14. Continuous user authentication using temporal information

    Science.gov (United States)

    Niinuma, Koichiro; Jain, Anil K.

    2010-04-01

    Conventional computer systems authenticate users only at the initial log-in session, which can be the cause of a critical security flaw. To resolve this problem, systems need continuous user authentication methods that continuously monitor and authenticate users based on some biometric trait(s). We propose a new method for continuous user authentication based on a Webcam that monitors a logged in user's face and color of clothing. Our method can authenticate users regardless of their posture in front of the workstation (laptop or PC). Previous methods for continuous user authentication cannot authenticate users without biometric observation. To alleviate this requirement, our method uses color information of users' clothing as an enrollment template in addition to their face information. The system cannot pre-register the clothing color information because this information is not permanent. To deal with the problem, our system automatically registers this information every time the user logs in and then fuses it with the conventional (password) identification system. We report preliminary authentication results and future enhancements to the proposed system.

  15. Enhancing Authentication Models Characteristic Metrics via ...

    African Journals Online (AJOL)

    In this work, we derive the universal characteristic metrics set for authentication models based on security, usability and design issues. We then compute the probability of the occurrence of each characteristic metrics in some single factor and multifactor authentication models in order to determine the effectiveness of these ...

  16. Ignoring Authentic African Literature Means Ignoring Africans

    Science.gov (United States)

    Romano, Carlin

    2005-01-01

    Africa produces imaginative and authentic literature whose texture makes it impossible to think of Africans as statistics. African writers, however have to struggle to get recognized in America due to their culture and other racial and social differences, hence suggesting that efforts should be made to give authentic African literature its due.

  17. Making it Real: Authenticity, Process and Pedagogy

    Science.gov (United States)

    Badger, Richard; MacDonald, Malcolm

    2010-01-01

    Authenticity has been a part of the intellectual resources of language teaching since the 1890s but its precise meaning and implications are contested. This commentary argues for a view of authenticity which recognizes the limits of the concept as a guide for pedagogic practice and acknowledges the fact that texts are processes rather than…

  18. Test-Task Authenticity: The Multiple Perspectives

    Science.gov (United States)

    Gan, Zhengdong

    2012-01-01

    Leung and Lewkowicz remind us that the debate over the past two decades that is most relevant to ELT (English languge teaching) pedagogy and curriculum concerns test-task authenticity. This paper first reviews how the authenticity debate in the literature of second language acquisition, pedagogy and testing has evolved. Drawing on a body of…

  19. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...

  20. Eyeglass Large Aperture, Lightweight Space Optics FY2000 - FY2002 LDRD Strategic Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Hyde, R

    2003-02-10

    differences in their requirements and implementations, the fundamental difficulty in utilizing large aperture optics is the same for all of these applications: It is extremely difficult to design large aperture space optics which are both optically precise and can meet the practical requirements for launch and deployment in space. At LLNL we have developed a new concept (Eyeglass) which uses large diffractive optics to solve both of these difficulties; greatly reducing both the mass and the tolerance requirements for large aperture optics. During previous LDRD-supported research, we developed this concept, built and tested broadband diffractive telescopes, and built 50 cm aperture diffraction-limited diffractive lenses (the largest in the world). This work is fully described in UCRL-ID-136262, Eyeglass: A Large Aperture Space Telescope. However, there is a large gap between optical proof-of-principle with sub-meter apertures, and actual 50 meter space telescopes. This gap is far too large (both in financial resources and in spacecraft expertise) to be filled internally at LLNL; implementation of large aperture diffractive space telescopes must be done externally using non-LLNL resources and expertise. While LLNL will never become the primary contractor and integrator for large space optical systems, our natural role is to enable these devices by developing the capability of producing very large diffractive optics. Accordingly, the purpose of the Large Aperture, Lightweight Space Optics Strategic Initiative was to develop the technology to fabricate large, lightweight diffractive lenses. The additional purpose of this Strategic Initiative was, of course, to demonstrate this lens-fabrication capability in a fashion compellingly enough to attract the external support necessary to continue along the path to full-scale space-based telescopes. During this 3 year effort (FY2000-FY2002) we have developed the capability of optically smoothing and diffractively-patterning thin meter

  1. The Duality of Authenticity in ELT

    Directory of Open Access Journals (Sweden)

    J. John Love Joy

    2011-11-01

    Full Text Available Purpose: This study aims to find out the dual-perspectives on authenticity in English language teaching.Problem: The concept of authenticity has generated quite a ripple in ESL/EFL classrooms. Contrasting perspectives have emerged over the years in reaction to this concept. Some regard authenticity as an inevitable part of teaching as it provides students with opportunities to interact with reality in the classroom itself, whereas, some others consider it an ambitious construct and suggest approaching it with caution.Method: In order to verify these perspectives, a survey of literature has been done to trace the genesis of authenticity and its various facets.Conclusion: As a result, we have found that a balanced outlook on authenticity is required by the teachers to promote better teaching-learning experiences.

  2. User Authentication in Smartphones for Telehealth

    Directory of Open Access Journals (Sweden)

    Katherine A. Smith

    2017-11-01

    Full Text Available Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity.  When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.  Keywords: Authentication, Biometrics, HIPAA, Mobile security, Telehealth

  3. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    .g., through a smart card based access control system, to the location where the authentication is required by a location-based service. The PAISE model is extended with remote biometrics to prevent the decay of authentication confidence when authenticated users encounter and interact with other users...... in the environment. The result is a calm approach to authentication, where mobile users are transparently authenticated towards the system, which allows the provision of location-based services. The output of the remote biometrics are fused using error-rate-based fusion to solve a common problem that occurs in score...... level fusion, i.e., the scores of each biometric system are usually incompatible, as they have different score ranges as well as different probability distributions. We have integrated remote biometrics with the PAISE prototype and the experimental results on a publicly available dataset, show...

  4. Final Report on Institutional Computing Project s15_hilaserion, “Kinetic Modeling of Next-Generation High-Energy, High-Intensity Laser-Ion Accelerators as an Enabling Capability”

    Energy Technology Data Exchange (ETDEWEB)

    Albright, Brian James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Yin, Lin [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Stark, David James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-06

    This proposal sought of order 1M core-hours of Institutional Computing time intended to enable computing by a new LANL Postdoc (David Stark) working under LDRD ER project 20160472ER (PI: Lin Yin) on laser-ion acceleration. The project was “off-cycle,” initiating in June of 2016 with a postdoc hire.

  5. Combined Analysis of Stable Isotope, (1)H NMR, and Fatty Acid To Verify Sesame Oil Authenticity.

    Science.gov (United States)

    Kim, Jeongeun; Jin, Gyungsu; Lee, Yunhee; Chun, Hyang Sook; Ahn, Sangdoo; Kim, Byung Hee

    2015-10-14

    The aim of this study was to verify the authenticity of sesame oils using combined analysis of stable isotope ratio, (1)H NMR spectroscopy, and fatty acid profiles of the oils. Analytical data were obtained from 35 samples of authentic sesame oils and 29 samples of adulterated sesame oils currently distributed in Korea. The orthogonal projection to latent structure discriminant analysis technique was used to select variables that most effectively verify the sesame oil authenticity. The variables include δ(13)C value, integration values of NMR peaks that signify the CH3 of n-3 fatty acids, CH2 between two C═C, protons from sesamin/sesamolin, and 18:1n-9, 18:3n-3, 18:2t, and 18:3t content values. The authenticity of 65 of 70 blind samples was correctly verified by applying the range of the eight variables found in the authentic sesame oil samples, suggesting that triple analysis is a useful approach to verify sesame oil authenticity.

  6. Authentication of forensic DNA samples.

    Science.gov (United States)

    Frumkin, Dan; Wasserstrom, Adam; Davidson, Ariane; Grafit, Arnon

    2010-02-01

    Over the past twenty years, DNA analysis has revolutionized forensic science, and has become a dominant tool in law enforcement. Today, DNA evidence is key to the conviction or exoneration of suspects of various types of crime, from theft to rape and murder. However, the disturbing possibility that DNA evidence can be faked has been overlooked. It turns out that standard molecular biology techniques such as PCR, molecular cloning, and recently developed whole genome amplification (WGA), enable anyone with basic equipment and know-how to produce practically unlimited amounts of in vitro synthesized (artificial) DNA with any desired genetic profile. This artificial DNA can then be applied to surfaces of objects or incorporated into genuine human tissues and planted in crime scenes. Here we show that the current forensic procedure fails to distinguish between such samples of blood, saliva, and touched surfaces with artificial DNA, and corresponding samples with in vivo generated (natural) DNA. Furthermore, genotyping of both artificial and natural samples with Profiler Plus((R)) yielded full profiles with no anomalies. In order to effectively deal with this problem, we developed an authentication assay, which distinguishes between natural and artificial DNA based on methylation analysis of a set of genomic loci: in natural DNA, some loci are methylated and others are unmethylated, while in artificial DNA all loci are unmethylated. The assay was tested on natural and artificial samples of blood, saliva, and touched surfaces, with complete success. Adopting an authentication assay for casework samples as part of the forensic procedure is necessary for maintaining the high credibility of DNA evidence in the judiciary system.

  7. Proteomics for the authentication of fish species.

    Science.gov (United States)

    Mazzeo, Maria Fiorella; Siciliano, Rosa Anna

    2016-09-16

    Assessment of seafood authenticity and origin, mainly in the case of processed products (fillets, sticks, baby food) represents the crucial point to prevent fraudulent deceptions thus guaranteeing market transparency and consumers health. The most dangerous practice that jeopardies fish safety is intentional or unintentional mislabeling, originating from the substitution of valuable fish species with inferior ones. Conventional analytical methods for fish authentication are becoming inadequate to comply with the strict regulations issued by the European Union and with the increase of mislabeling due to the introduction on the market of new fish species and market globalization. This evidence prompts the development of high-throughput approaches suitable to identify unambiguous biomarkers of authenticity and screen a large number of samples with minimal time consumption. Proteomics provides suitable and powerful tools to investigate main aspects of food quality and safety and has given an important contribution in the field of biomarkers discovery applied to food authentication. This report describes the most relevant methods developed to assess fish identity and offers a perspective on their potential in the evaluation of fish quality and safety thus depicting the key role of proteomics in the authentication of fish species and processed products. The assessment of fishery products authenticity is a main issue in the control quality process as deceptive practices could imply severe health risks. Proteomics based methods could significantly contribute to detect falsification and frauds, thus becoming a reliable operative first-line testing resource in food authentication. Copyright © 2016 Elsevier B.V. All rights reserved.

  8. Image content authentication based on channel coding

    Science.gov (United States)

    Zhang, Fan; Xu, Lei

    2008-03-01

    The content authentication determines whether an image has been tampered or not, and if necessary, locate malicious alterations made on the image. Authentication on a still image or a video are motivated by recipient's interest, and its principle is that a receiver must be able to identify the source of this document reliably. Several techniques and concepts based on data hiding or steganography designed as a means for the image authentication. This paper presents a color image authentication algorithm based on convolution coding. The high bits of color digital image are coded by the convolution codes for the tamper detection and localization. The authentication messages are hidden in the low bits of image in order to keep the invisibility of authentication. All communications channels are subject to errors introduced because of additive Gaussian noise in their environment. Data perturbations cannot be eliminated but their effect can be minimized by the use of Forward Error Correction (FEC) techniques in the transmitted data stream and decoders in the receiving system that detect and correct bits in error. This paper presents a color image authentication algorithm based on convolution coding. The message of each pixel is convolution encoded with the encoder. After the process of parity check and block interleaving, the redundant bits are embedded in the image offset. The tamper can be detected and restored need not accessing the original image.

  9. Perfumed historic buildings: Issues of authenticity

    Directory of Open Access Journals (Sweden)

    Tošić Jovana

    2016-01-01

    Full Text Available Contemporary historical preservation practice includes olfactory preservation as an experimental method of architectural preservation. The implementation of manufactured scents in historic buildings raises important issues of authenticity. This paper focuses on three important issues in the relation between olfactory preservation and authenticity: the importance of phenomenology in memory evocation; the relative character of the authenticity concept; and the significance of social values in historic preservation. This requires a critical examination of charters, documents and theoretical interpretations which reflect a broader concept of authenticity. The paper discusses certain articles of the Venice Charter, the Nara Document on Authenticity, as well as the sense of smell in architectural experience through critical analysis of the theories of John Ruskin, Viollet-le-Duc, Roger Scruton and Juhani Pallasmaa and their concepts of authenticity. Authenticity issues are illustrated by the examples of olfactory preservation: olfactory reconstruction of Philip Johnson’s Glass House; interior restoration and olfactory reconstruction of the Arts Club in Mayfair, London; and the creation process of the perfume brand Arquiste, a meaningful example which relocates the olfactory reconstruction context. These critical analyses raise the question of scent in historic buildings as a value in itself.

  10. Data Authentication Demonstration for Radionuclide Stations

    Energy Technology Data Exchange (ETDEWEB)

    Harris, Mark; Herrington, Pres; Miley, Harry; Ellis, J. Edward; McKinnon, David; St. Pierre, Devon

    1999-08-03

    Data authentication is required for certification of sensor stations in the International Monitoring System (IMS). Authentication capability has been previously demonstrated for continuous waveform stations (seismic and infrasound). This paper addresses data surety for the radionuclide stations in the IMS, in particular the Radionuclide Aerosol Sampler/Analyzer (RASA) system developed by Pacific Northwest National Laboratory (PNNL). Radionuclide stations communicate data by electronic mail using formats defined in IMS 1.0, Formats and Protocols for Messages. An open message authentication standard exists, called S/MIME (Secure/Multipurpose Internet Mail Extensions), which has been proposed for use with all IMS radionuclide station message communications. This standard specifies adding a digital signature and public key certificate as a MIME attachment to the e-mail message. It is advantageous because it allows authentication to be added to all IMS 1.0 messages in a standard format and is commercially supported in e-mail software. For command and control, the RASA system uses a networked Graphical User Interface (GUI) based upon Common Object Request Broker Architecture (CORBA) communications, which requires special authentication procedures. The authors have modified the RASA system to meet CTBTO authentication guidelines, using a FORTEZZA card for authentication functions. They demonstrated signing radionuclide data messages at the RASA, then sending, receiving, and verifying the messages at a data center. They demonstrated authenticating command messages and responses from the data center GUI to the RASA. Also, the particular authentication system command to change the private/public key pair and retrieve the new public key was demonstrated. This work shows that data surety meeting IMS guidelines may be immediately applied to IMS radionuclide systems.

  11. Student experiences in undergraduate anatomy: An exploration of inquiry learning as an authentic experience

    Science.gov (United States)

    Anstey, Lauren M.

    Anatomy education is challenged to develop contemporary approaches to teaching and learning that move beyond factual recall to elicit from students meaningful and deep understandings of the discipline. Inquiry-based learning is one such pedagogy that involves students' active and increasingly independent investigation of questions and problems that are of interest to them. Because inquiry-based learning aims to encourage learners to draw upon wider contexts for learning and emphasizes the development of skills that extend beyond the confines of the classroom, there is a potential that students' experiences are authentic in nature. This study sought to explore undergraduate students' experiences of an Inquiry Project for learning anatomy. The project's aims were twofold. First, to document, describe, and explain the essence of students' experiences of engagement throughout the Inquiry Project, and second, to explore students' experiences as potentially reflective of authentic learning. A hermeneutic phenomenology and case study methodology was used to explore students' experiences of an Inquiry Project within a second-year undergraduate anatomy course at a mid-sized university in Ontario, Canada. Students (18) and facilitators (3) were observed during group work sessions and inquiry presentations, curricular documents and students' work were analyzed, and interviews were conducted. Data analysis sought to describe students' experiences and as a result, common meaningful themes of groups' and students' engagement were characterized. These results were then further analyzed through a theoretical framework of authentic learning, informed mainly by the Theory of Authentic Learning. While confirmatory and novel connections between factors were found to reflect Authentic Learning, five qualities of Authentic Inquiry Learning emerged from analysis of the data to represent how students' learning was neither solely authentic nor inquiry-based, but a hybrid of the two

  12. Towards distortion-free robust image authentication

    International Nuclear Information System (INIS)

    Coltuc, D

    2007-01-01

    This paper investigates a general framework for distortion-free robust image authentication by multiple marking. First, by robust watermarking a subsampled version of image edges is embedded. Then, by reversible watermarking the information needed to recover the original image is inserted, too. The hiding capacity of the reversible watermarking is the essential requirement for this approach. Thus in case of no attacks not only image is authenticated but also the original is exactly recovered. In case of attacks, reversibility is lost, but image can still be authenticated. Preliminary results providing very good robustness against JPEG compression are presented

  13. Staging constructions of authenticity in organizational change

    DEFF Research Database (Denmark)

    Dupret, Katia

    2018-01-01

    that are emotionally charged. Through a socio-material perspective this paper seeks to explore how change processes in organizations challenges the idea of authentic leadership as a merely individual ability or personality trait and suggest that the authentic leader is distributed into the practices of change....... The paper explores how staged organizational change where authentic role-play and scripts from everyday life combined with meta-reflection and feedback construct new forms of reflection where its ethical side-effects should be discussed....

  14. Instant Java password and authentication security

    CERN Document Server

    Mayoral, Fernando

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication, detailing advanced topics in a recipe format.This book is ideal for developers new to user authentication and password security, and who are looking to get a good grounding in how to implement it in a reliable way.It's assumed that the reader will have some experience in Java already, as well as being familiar with the basic idea behind user authentication.

  15. Authenticated communication from quantum readout of PUFs

    Science.gov (United States)

    Škorić, Boris; Pinkse, Pepijn W. H.; Mosk, Allard P.

    2017-08-01

    Quantum readout of physical unclonable functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: A verifier can check if received classical data were sent by the PUF holder. We call this modification QR-d or, in the case of the optical-PUF implementation, QSA-d. We discuss how QSA-d can be operated in a parallel way. We also present a protocol for authenticating quantum states.

  16. Make me authentic, but not here: Reflexive struggles with academic identity and authentic leadership

    OpenAIRE

    Tomkins, Leah; Nicholds, Alyson

    2017-01-01

    This article presents a reflexive auto-ethnography of the experience of teaching authentic leadership to MBA students. It traces parallels between the challenges of authentic leadership and the challenges of academic identity work, grounded specifically in the experience of having to teach something one does not fully endorse. Both authentic leadership and academic identity work emerge as struggle – riddled with false starts, best intentions and self-deception, and entwined in the politics of...

  17. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Directory of Open Access Journals (Sweden)

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  18. Authentication of food allergen quality by physicochemical and immunological methods

    DEFF Research Database (Denmark)

    Sancho, A I; Hoffmann-Sommergruber, K; Alessandri, S

    2010-01-01

    Purified allergens are required to detect cross-contamination with other allergenic foods and to understand allergen interaction with other components of the food matrix. Pure allergens are also used for the diagnosis and treatment of food allergies. For example, serological methods are being...... or as recombinant forms, within the EU-funded EuroPrevall project. These allergens have been characterized by a battery of diagnostic tests demonstrating that they constitute an authentic, well-defined library of comparable quality. The review summarizes the applications, potentials and limitations of key...

  19. Athos: Efficient Authentication of Outsourced File Systems

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Goodrich, Michael T.; Papamanthou, Charalampos

    2008-01-01

    We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system's integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated...... outsourced storage. Using light-weight cryptographic primitives and efficient data-structuring techniques, we design authentication schemes that allow a client to efficiently verify that the file system is fully consistent with the exact history of updates and queries requested by the client. In Athos, file-system...... operations are verified in time that is logarithmic in the size of the file system using optimal storage complexity-constant storage overhead at the client and asymptotically no extra overhead at the server. We provide a prototype implementation of Athos validating its performance and its authentication...

  20. Authentic professional competence in clinical neuropsychology.

    Science.gov (United States)

    Denney, Robert L

    2010-08-01

    Authentic Professional Competence in Clinical Neuropsychology was Dr Denney's 2009 presidential address at the Annual Conference of the National Academy of Neuropsychology. In his address, he highlighted the need for clinical neuropsychologists to strive for authentic professional competence rather than a mere pretense of expertise. Undisputed credibility arises from authentic professional competence. Achieving authentic professional competence includes the completion of a thorough course of training within the defined specialty area and validation of expertise by one's peers through the board certification process. Included in the address were survey results regarding what the consumer believes about board certification as well as survey results regarding the experiences of recent neuropsychology diplomates. It is important for neuropsychologists to realize that the board certification process enhances public perception and credibility of the field as well as personal growth for the neuropsychologist. Lastly, he urged all neuropsychologists to support the unified training model and pursue board certification.

  1. IPCT: A scheme for mobile authentication

    Directory of Open Access Journals (Sweden)

    Vishnu Shankar

    2016-09-01

    Full Text Available Mobile is becoming a part of everyone's life and as their power of computation and storage is rising and cost is coming down. Most of mobile phone users have a lot of private data which they want to protect from others (La Polla et al., 2013. It means user must be authenticated properly for accessing the mobile resources. Normally user is authenticated using text passwords, PIN, face recognition or patterns etc. All these methods are used but they have some shortcomings. In this paper we have seen various existing methods of mobile authentications and proposed our improved mobile authentication IPCT scheme. We have compared our Image Pass Code with tapping scheme with existing techniques and shown that our scheme is better than existing techniques.

  2. Multi-factor authentication using quantum communication

    Science.gov (United States)

    Hughes, Richard John; Peterson, Charles Glen; Thrasher, James T.; Nordholt, Jane E.; Yard, Jon T.; Newell, Raymond Thorson; Somma, Rolando D.

    2018-02-06

    Multi-factor authentication using quantum communication ("QC") includes stages for enrollment and identification. For example, a user enrolls for multi-factor authentication that uses QC with a trusted authority. The trusted authority transmits device factor information associated with a user device (such as a hash function) and user factor information associated with the user (such as an encrypted version of a user password). The user device receives and stores the device factor information and user factor information. For multi-factor authentication that uses QC, the user device retrieves its stored device factor information and user factor information, then transmits the user factor information to the trusted authority, which also retrieves its stored device factor information. The user device and trusted authority use the device factor information and user factor information (more specifically, information such as a user password that is the basis of the user factor information) in multi-factor authentication that uses QC.

  3. Security Enhancement Using Mutual Authentication in Existing CDMA Systems

    OpenAIRE

    L. Krishna Bharathi; Gnanou Florence Sudha

    2010-01-01

    Even though CDMA2000 wireless networks are being widely deployed as a cellular digital standard around the world, it has some hidden vulnerabilities concerned with security issues. The existing CDMA systems use authentication mechanism by CAVE (Cellular Authentication and Voice Encryption) algorithm. This authentication method has several disadvantages. Only one way authentication is provided, that is, only a base station authenticates a subscriber. And, CAVE algorithm is prone to cryptograph...

  4. Authentic Material and Automaticity for Teaching English

    OpenAIRE

    Widyastuti, Widyastuti

    2017-01-01

    This article discusses how to make students of Science Education in first year feel interesting in English lesson, understanding the text well and can communicate English fluency. It has been suggested that Authentic Material and Automaticity Theory not only creates a friendly and fun condition in teaching reading but helps students to study comprehensibly so they are able to understand the text, structure, vocabulary easily, read fluently and they also can communicate in English. The authent...

  5. Authentic Leadership: Practices to Promote Integrity.

    Science.gov (United States)

    Hughes, Vickie

    Integrity is a highly desired leadership trait. Authentic leaders reflect on their behavior and seek feedback about how their actions affect others. How can a nurse develop as an authentic leader who consistently demonstrates integrity? The following are discussed: Reflection; Connection to Christ and others; Social and Emotional Intelligence providing perceptive competency and social awareness; Aesthetic Qualities whereby leaders apply experiential knowing in leadership situations; and effective expression of Gratitude as a meaningful act of valuing others.

  6. Final Report on LDRD project 130784 : functional brain imaging by tunable multi-spectral Event-Related Optical Signal (EROS).

    Energy Technology Data Exchange (ETDEWEB)

    Speed, Ann Elizabeth; Spahn, Olga Blum; Hsu, Alan Yuan-Chun

    2009-09-01

    Functional brain imaging is of great interest for understanding correlations between specific cognitive processes and underlying neural activity. This understanding can provide the foundation for developing enhanced human-machine interfaces, decision aides, and enhanced cognition at the physiological level. The functional near infrared spectroscopy (fNIRS) based event-related optical signal (EROS) technique can provide direct, high-fidelity measures of temporal and spatial characteristics of neural networks underlying cognitive behavior. However, current EROS systems are hampered by poor signal-to-noise-ratio (SNR) and depth of measure, limiting areas of the brain and associated cognitive processes that can be investigated. We propose to investigate a flexible, tunable, multi-spectral fNIRS EROS system which will provide up to 10x greater SNR as well as improved spatial and temporal resolution through significant improvements in electronics, optoelectronics and optics, as well as contribute to the physiological foundation of higher-order cognitive processes and provide the technical foundation for miniaturized portable neuroimaging systems.

  7. Final report on LDRD project: Semiconductor surface-emitting microcavity laser spectroscopy for analysis of biological cells and microstructures

    Energy Technology Data Exchange (ETDEWEB)

    Gourley, P.L.; McDonald, A.E. [Sandia National Labs., Albuquerque, NM (United States). Nanostructure and Semiconductor Physics Dept.; Gourley, M.F. [Washington Hospital Center, DC (United States); Bellum, J. [Coherent Technologies, Boulder, CO (United States)

    1997-08-01

    This article discusses a new intracavity laser technique that uses living or fixed cells as an integral part of the laser. The cells are placed on a GaAs based semiconductor wafer comprising one half of a vertical cavity surface-emitting laser. After placement, the cells are covered with a dielectric mirror to close the laser cavity. When photo-pumped with an external laser, this hybrid laser emits coherent light images and spectra that depend sensitively on the cell size, shape, and dielectric properties. The light spectra can be used to identify different cell types and distinguish normal and abnormal cells. The laser can be used to study single cells in real time as a cell-biology lab-on-a-chip, or to study large populations of cells by scanning the pump laser at high speed. The laser is well-suited to be integrated with other micro-optical or micro-fluidic components to lead to micro-optical-mechanical systems for analysis of fluids, particulates, and biological cells.

  8. A complexity science-based framework for global joint operations analysis to support force projection: LDRD Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Lawton, Craig R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). System Sustainment & Readiness Technologies Dept.

    2015-01-01

    The military is undergoing a significant transformation as it modernizes for the information age and adapts to address an emerging asymmetric threat beyond traditional cold war era adversaries. Techniques such as traditional large-scale, joint services war gaming analysis are no longer adequate to support program evaluation activities and mission planning analysis at the enterprise level because the operating environment is evolving too quickly. New analytical capabilities are necessary to address modernization of the Department of Defense (DoD) enterprise. This presents significant opportunity to Sandia in supporting the nation at this transformational enterprise scale. Although Sandia has significant experience with engineering system of systems (SoS) and Complex Adaptive System of Systems (CASoS), significant fundamental research is required to develop modeling, simulation and analysis capabilities at the enterprise scale. This report documents an enterprise modeling framework which will enable senior level decision makers to better understand their enterprise and required future investments.

  9. Final report on LDRD project: A phenomenological model for multicomponent transport with simultaneous electrochemical reactions in concentrated solutions

    Energy Technology Data Exchange (ETDEWEB)

    CHEN,KEN S.; EVANS,GREGORY H.; LARSON,RICHARD S.; NOBLE,DAVID R.; HOUF,WILLIAM G.

    2000-01-01

    A phenomenological model was developed for multicomponent transport of charged species with simultaneous electrochemical reactions in concentrated solutions, and was applied to model processes in a thermal battery cell. A new general framework was formulated and implemented in GOMA (a multidimensional, multiphysics, finite-element computer code developed and being enhanced at Sandia) for modeling multidimensional, multicomponent transport of neutral and charged species in concentrated solutions. The new framework utilizes the Stefan-Maxwell equations that describe multicomponent diffusion of interacting species using composition-insensitive binary diffusion coefficients. The new GOMA capability for modeling multicomponent transport of neutral species was verified and validated using the model problem of ternary gaseous diffusion in a Stefan tube. The new GOMA-based thermal battery computer model was verified using an idealized battery cell in which concentration gradients are absent; the full model was verified by comparing with that of Bernardi and Newman (1987) and validated using limited thermal battery discharge-performance data from the open literature (Dunning 1981) and from Sandia (Guidotti 1996). Moreover, a new Liquid Chemkin Software Package was developed, which allows the user to handle manly aspects of liquid-phase kinetics, thermodynamics, and transport (particularly in terms of computing properties). Lastly, a Lattice-Boltzmann-based capability was developed for modeling pore- or micro-scale phenomena involving convection, diffusion, and simplified chemistry; this capability was demonstrated by modeling phenomena in the cathode region of a thermal battery cell.

  10. Incorporating an Authentic Learning Strategy into Undergraduate Apparel and Merchandising Curriculum

    Science.gov (United States)

    Ma, Yoon Jin; Lee, Hyun-Hwa

    2012-01-01

    An authentic learning strategy fostering students' active learning was studied using the scenario of a real-world project. Students from two different classes at two different universities worked as clients or consultants to develop an apparel sourcing strategy. Quantitative and qualitative data were gathered from 44 undergraduates enrolled in…

  11. The Brisbane Media Map: Participatory Design and Authentic Learning to Link Students and Industry

    Science.gov (United States)

    Collis, Christy; Foth, Marcus; Schroeter, Ronald

    2009-01-01

    The Brisbane Media Map is both an online resource and a tertiary-level authentic learning project. The Brisbane Media Map is an online database which provides a detailed overview of about 600 media industry organizations in Brisbane, Australia. In addition to providing contact details and synopses for each organization's profile, the Brisbane…

  12. Authentic Research Experience and "Big Data" Analysis in the Classroom: Maize Response to Abiotic Stress

    Science.gov (United States)

    Makarevitch, Irina; Frechette, Cameo; Wiatros, Natalia

    2015-01-01

    Integration of inquiry-based approaches into curriculum is transforming the way science is taught and studied in undergraduate classrooms. Incorporating quantitative reasoning and mathematical skills into authentic biology undergraduate research projects has been shown to benefit students in developing various skills necessary for future…

  13. Developing More Authentic e-Courses by Integrating Working Life Mentoring and Social Media

    Science.gov (United States)

    Leppisaari, Irja; Kleimola, Riina; Herrington, Jan; Maunula, Markus; Hohenthal, Tuula

    2014-01-01

    Studies show that affordances of social media have not yet been fully exploited in the promotion of authentic e-learning in higher education. The e-Learning of the Future project (2009-2011) has met these challenges through working life mentoring using social media. In this paper, we examine the planning and implementation of social media in nine…

  14. Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept

    Directory of Open Access Journals (Sweden)

    A. Drosou

    2011-01-01

    Full Text Available Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.

  15. Improving a Field School Curriculum Using Modularized Lessons and Authentic Case-Based Learning

    Science.gov (United States)

    Rea, Roy V.; Hodder, Dexter P.

    2007-01-01

    University course evaluations are replete with student comments expressing frustration with taking time out of work, paying money for, and putting energy into field education projects that lack authentic "real-world" problem-solving objectives. Here, we describe a model for field school education that borrows on pedagogical tools such as…

  16. Perceptions of Leadership Coaches Regarding Leader Authenticity and Authenticity Development Strategies

    Science.gov (United States)

    Stone, Anne H.

    2012-01-01

    Purpose: The purpose of this study was to identify what leadership coaches perceive to be the benefits of authenticity to their clients' success. Another purpose was to identify what barriers leadership coaches perceive as preventing their clients from developing authenticity. A final purpose of this study was to identify which strategies…

  17. Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity

    NARCIS (Netherlands)

    Gulikers, J.T.M.; Bastiaens, Th.J.; Kirschner, P.A.; Kester, L.

    2008-01-01

    In vocational education and training (VET) in the Netherlands, learning and working are integrated from the start. Authentic assessments are used during competence-based VET curricula to achieve correspondence between learning and working. The premise behind this study is that authenticity is

  18. Robust image authentication in the presence of noise

    CERN Document Server

    2015-01-01

    This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.    Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:   Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the pre...

  19. Privacy-Preserving Biometric Authentication: Challenges and Directions

    Directory of Open Access Journals (Sweden)

    Elena Pagnin

    2017-01-01

    Full Text Available An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication. The most characteristic feature of this authentication method is the naturally strong bond between a user and her biometric credentials. This very same advantageous property, however, raises serious security and privacy concerns in case the biometric trait gets compromised. In this article, we present the most challenging issues that need to be taken into consideration when designing secure and privacy-preserving biometric authentication protocols. More precisely, we describe the main threats against privacy-preserving biometric authentication systems and give directions on possible countermeasures in order to design secure and privacy-preserving biometric authentication protocols.

  20. ENHANCING STUDENTS’ VOCABULARY MASTERY THROUGH AUTHENTIC MATERIALS

    Directory of Open Access Journals (Sweden)

    Nuraeningsih Nuraeningsih

    2017-04-01

    Full Text Available Teaching vocabulary using textbooks is sometimes boring and less meaningful due to the lack of context that possibly discourages students to learn. At university level, students are supposed to acquire intermediate to upper level of vocabulary mastery. The situation then becomes a challenge for us to cope. Authentic materials, on the other hand provide real language use which can be positively stimulate students’ interest to have sufficient exposure to English. This research is aimed at improving students’ vocabulary mastery through written authentic materials. The design of the research is classroom action research. It was conducted in a Vocabulary Building class B consisting of 43 students. The selected authentic materials are texts taken from newspaper, magazine, the internet, recipe, & forms. The result of the study shows that through authentic materials the students’ vocabulary mastery in cycle I & II improves and the achievement category is sufficient. Otherwise, students’ response towards the use of authentic texts seems increase significantly from cycle I to cycle II.

  1. Disambiguating authenticity: Interpretations of value and appeal.

    Science.gov (United States)

    O'Connor, Kieran; Carroll, Glenn R; Kovács, Balázs

    2017-01-01

    While shaping aesthetic judgment and choice, socially constructed authenticity takes on some very different meanings among observers, consumers, producers and critics. Using a theoretical framework positing four distinct meanings of socially constructed authenticity-type, moral, craft, and idiosyncratic-we aim to document empirically the unique appeal of each type. We develop predictions about the relationships between attributed authenticity and corresponding increases in the value ascribed to it through: (1) consumer value ratings, (2) willingness to pay, and (3) behavioral choice. We report empirical analyses from a research program of three multi-method studies using (1) archival data from voluntary consumer evaluations of restaurants in an online review system, (2) a university-based behavioral lab experiment, and (3) an online survey-based experiment. Evidence is consistent across the studies and suggests that perceptions of four distinct subtypes of socially constructed authenticity generate increased appeal and value even after controlling for option quality. Findings suggest additional directions for research on authenticity.

  2. Disambiguating authenticity: Interpretations of value and appeal.

    Directory of Open Access Journals (Sweden)

    Kieran O'Connor

    Full Text Available While shaping aesthetic judgment and choice, socially constructed authenticity takes on some very different meanings among observers, consumers, producers and critics. Using a theoretical framework positing four distinct meanings of socially constructed authenticity-type, moral, craft, and idiosyncratic-we aim to document empirically the unique appeal of each type. We develop predictions about the relationships between attributed authenticity and corresponding increases in the value ascribed to it through: (1 consumer value ratings, (2 willingness to pay, and (3 behavioral choice. We report empirical analyses from a research program of three multi-method studies using (1 archival data from voluntary consumer evaluations of restaurants in an online review system, (2 a university-based behavioral lab experiment, and (3 an online survey-based experiment. Evidence is consistent across the studies and suggests that perceptions of four distinct subtypes of socially constructed authenticity generate increased appeal and value even after controlling for option quality. Findings suggest additional directions for research on authenticity.

  3. Aging and the Ethics of Authenticity.

    Science.gov (United States)

    Laceulle, Hanne

    2017-05-02

    This article aims to make a philosophical contribution to debates about meaningful sociocultural narratives about aging. It is argued that the moral-philosophical discourse of authenticity may provide valuable resources for counter narratives about later life that are capable of challenging the dominant stereotyping decline- and age-defying cultural narratives. The discussion will draw on classical and contemporary views of authenticity by Rousseau; existentialists such as Kierkegaard, Nietzsche, and Heidegger; and contemporary thinkers such as Taylor and Meyers. Authenticity discourse is argued to be capable of, on the one hand, acknowledging the positive potentials of growth and development that later life may harbor, while, on the other hand, providing support for recognizing and integrating the inevitable existential vulnerability and finitude that old age also confronts us with. Although authenticity is not a commonly used term in gerontology, some examples show how a language associated with this philosophical discourse has found its way into gerontological thought as well, supporting its relevance for the context of aging. The article concludes with a discussion of four aspects through which the authenticity discourse may contribute to viable cultural narratives about later life. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  4. Simulations in nursing practice: toward authentic leadership.

    Science.gov (United States)

    Shapira-Lishchinsky, Orly

    2014-01-01

    Aim  This study explores nurses' ethical decision-making in team simulations in order to identify the benefits of these simulations for authentic leadership. Background  While previous studies have indicated that team simulations may improve ethics in the workplace by reducing the number of errors, those studies focused mainly on clinical aspects and not on nurses' ethical experiences or on the benefits of authentic leadership. Methods  Fifty nurses from 10 health institutions in central Israel participated in the study. Data about nurses' ethical experiences were collected from 10 teams. Qualitative data analysis based on Grounded Theory was applied, using the atlas.ti 5.0 software package. Findings  Simulation findings suggest four main benefits that reflect the underlying components of authentic leadership: self-awareness, relational transparency, balanced information processing and internalized moral perspective. Conclusions  Team-based simulation as a training tool may lead to authentic leadership among nurses. Implications for nursing management  Nursing management should incorporate team simulations into nursing practice to help resolve power conflicts and to develop authentic leadership in nursing. Consequently, errors will decrease, patients' safety will increase and optimal treatment will be provided. © 2012 John Wiley & Sons Ltd.

  5. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  6. Computer Security: Cryptography and authentication (2/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Remi Mollon studied computer security at University and he first worked on Grids, with the EGEE project, for a French Bioinformatics institute. Information security being crucial in that field, he developed an encrypted file management system on top of Grid middleware, and he contributed in integrating legacy applications with Grids. Then, he was hired by CERN as a Grid Data Management developer, and he joined the Grid Operational Security Coordination Team. Remi has now moved to CERN Computer Security Team. Remi is involved in the daily security operations, in addition to be responsible to design Team's computer infrastructure, and to participate to several projects, like multi-factor authentication at CERN. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have s...

  7. New Capabilities for Hostile Environments on Z Grand Challenge LDRD - Final Status

    Energy Technology Data Exchange (ETDEWEB)

    Cuneo, Michael E. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Griffin, P. J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Balch, D. K. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Bell, K. S. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Bierner, J. A. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Coverdale, C. A. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Flanagan, T. M. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Hansen, S. B. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Slaboszewicz, V. Harper- [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Jones, B. M. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Lamppa, D. C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Martin, W. J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); McKenney, J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Moore, N. W. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Parma, E. J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Peebles, H. C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Rovang, D. C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Savage, M. E. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Tang, R. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Vesey, R. A. [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2016-10-01

    The purpose of this project was to develop new physical simulation capabilities in order to support the science-based qualification of nonnuclear weapon components in hostile radiation environments. The project contributes directly to the goals of maintaining a safe, secure, and effective US nuclear stockpile, maintaining strategic deterrence at lower nuclear force levels, extending the life of the nuclear deterrent capability, and to be ready for technological surprise.

  8. An Approach to Improve the Match-on-Card ngerprint Authentication System Security

    CSIR Research Space (South Africa)

    Nair, Kishor Krishnan

    2016-08-18

    Full Text Available difference between the conventional FAS authentication process and FAS using smart card process is all about the authentication location. FAS authentication using smart card token is possible through four authentication approaches. They are the Template...

  9. Approximate Public Key Authentication with Information Hiding

    Energy Technology Data Exchange (ETDEWEB)

    THOMAS,EDWARD V.; DRAELOS,TIMOTHY J.

    2000-10-01

    This paper describes a solution for the problem of authenticating the shapes of statistically variant gamma spectra while simultaneously concealing the shapes and magnitudes of the sensitive spectra. The shape of a spectrum is given by the relative magnitudes and positions of the individual spectral elements. Class-specific linear orthonormal transformations of the measured spectra are used to produce output that meet both the authentication and concealment requirements. For purposes of concealment, the n-dimensional gamma spectra are transformed into n-dimensional output spectra that are effectively indistinguishable from Gaussian white noise (independent of the class). In addition, the proposed transformations are such that statistical authentication metrics computed on the transformed spectra are identical to those computed on the original spectra.

  10. A digital technique for art authentication.

    Science.gov (United States)

    Lyu, Siwei; Rockmore, Daniel; Farid, Hany

    2004-12-07

    We describe a computational technique for authenticating works of art, specifically paintings and drawings, from high-resolution digital scans of the original works. This approach builds a statistical model of an artist from the scans of a set of authenticated works against which new works then are compared. The statistical model consists of first- and higher-order wavelet statistics. We show preliminary results from our analysis of 13 drawings that at various times have been attributed to Pieter Bruegel the Elder; these results confirm expert authentications. We also apply these techniques to the problem of determining the number of artists that may have contributed to a painting attributed to Pietro Perugino and again achieve an analysis agreeing with expert opinion.

  11. Authenticity: is it real or is it marketing?

    Science.gov (United States)

    Weinberger, David

    2008-03-01

    Marty Echt, the new head of marketing at Hunsk Engines, is determined to bring the motorcycle maker back to its roots. He says it's not enough to project authenticity to customers--employees must personally subscribe to the brand's values. Should the company's CEO support Marty's "real deal" vision? Five experts comment on this fictional case study. Bruce Weindruch, the founder and CEO of the History Factory, says that an authenticity-based campaign can be effective--but only if it's truly drawn from history. Marketers like Marty often remember their organization's past in a golden haze. Weindruch recommends exploring old engineering drawings, ads, and product photos in order to understand what customers and employees really valued back in the day. Gillian Arnold, a consultant to luxury fashion and fine jewelry brands, thinks Marty's approach is right: People in key marketing posts must be passionate about their products and know them inside and out. She argues that the CEO needs to commit more fully to the new campaign and address the significant gap between the staff and the brand. James H. Gilmore and B. Joseph Pine II, the cofounders of Strategic Horizons, point out that Hunsk needs to manage customers' perceptions rather than trying to be a "real company" or forming a management team whose personal interests match the brand. People purchase a product if it conforms to their self-image; that alone determines the brand's authenticity. Glenn Brackett of Sweetgrass Rods, a maker of bamboo fly-fishing rods, says Marty seems to be one of the few people who understand Hunsk motorcycles. If employees bring blood, sweat, heart, and soul to a product, it will manifest that spirit, and customers will line up for it.

  12. Facelock: familiarity-based graphical authentication

    Directory of Open Access Journals (Sweden)

    Rob Jenkins

    2014-06-01

    Full Text Available Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate, even after a one-year delay (86.1% success rate. Zero-acquaintance attackers were reduced to guessing (<1% success rate. Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate. In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate. Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  13. Diagnostic development for determining the joint temperature/soot statistics in hydrocarbon-fueled pool fires : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Casteneda, Jaime N.; Frederickson, Kraig; Grasser, Thomas W.; Hewson, John C.; Kearney, Sean Patrick; Luketa, Anay Josephine

    2009-09-01

    A joint temperature/soot laser-based optical diagnostic was developed for the determination of the joint temperature/soot probability density function (PDF) for hydrocarbon-fueled meter-scale turbulent pool fires. This Laboratory Directed Research and Development (LDRD) effort was in support of the Advanced Simulation and Computing (ASC) program which seeks to produce computational models for the simulation of fire environments for risk assessment and analysis. The development of this laser-based optical diagnostic is motivated by the need for highly-resolved spatio-temporal information for which traditional diagnostic probes, such as thermocouples, are ill-suited. The in-flame gas temperature is determined from the shape of the nitrogen Coherent Anti-Stokes Raman Scattering (CARS) signature and the soot volume fraction is extracted from the intensity of the Laser-Induced Incandescence (LII) image of the CARS probed region. The current state of the diagnostic will be discussed including the uncertainty and physical limits of the measurements as well as the future applications of this probe.

  14. An Investigation of the Effects of Authentic Science Experiences Among Urban High School Students

    Science.gov (United States)

    Chapman, Angela

    Providing equitable learning opportunities for all students has been a persistent issue for some time. This is evident by the science achievement gap that still exists between male and female students as well as between White and many non-White student populations (NCES, 2007, 2009, 2009b) and an underrepresentation of female, African-American, Hispanic, and Native Americans in many science, technology, engineering, and mathematics (STEM) related careers (NCES, 2009b). In addition to gender and ethnicity, socioeconomic status and linguistic differences are also factors that can marginalize students in the science classroom. One factor attributed to the achievement gap and low participation in STEM career is equitable access to resources including textbooks, laboratory equipment, qualified science teachers, and type of instruction. Extensive literature supports authentic science as one way of improving science learning. However, the majority of students do not have access to this type of resource. Additionally, extensive literature posits that culturally relevant pedagogy is one way of improving education. This study examines students' participation in an authentic science experience and argues that this is one way of providing culturally relevant pedagogy in science classrooms. The purpose of this study was to better understand how marginalized students were affected by their participation in an authentic science experience, within the context of an algae biofuel project. Accordingly, an interpretivist approach was taken. Data were collected from pre/post surveys and tests, semi-structured interviews, student journals, and classroom observations. Data analysis used a mixed methods approach. The data from this study were analyzed to better understand whether students perceived the experience to be one of authentic science, as well as how students science identities, perceptions about who can do science, attitudes toward science, and learning of science practices

  15. Entity Authentication:Analysis using Structured Intuition

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    In this paper, we propose a new method for the analysis that uses intuition of the analyst in a structured way. First we define entity authentication in terms of fine level authentication goals (FLAGs). Then we use some relevant structures in protocol narrations and use them to justify FLAGs...... for the protocol. All along this process, we discover vulnerabilities and unstated assumptions of the protocol. As the method is intuition based, the quality of results depends on the expertise of the security analyst, however, the structured intuition has two major advantages: Firstly we get a precise...

  16. Multimedia encryption and authentication techniques and applications

    CERN Document Server

    Furht, Borko

    2006-01-01

    Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for thos

  17. Group-ID based RFID Mutual Authentication

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2013-11-01

    Full Text Available For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns. This paper presents a new RFID mutual authentication protocol, which is designed to be configured on EPC Gen2 platform and to meet various security requirements while providing efficiency using PRNG (Pseudo Random Number Generator. Group-ID is used to minimize the authentication time. Security analysis of the proposed protocol is discussed.

  18. Ldrd-2015-00076 -- Validation Study Of The SRNL Vacuum Aerosol Contaminant Extractor

    Energy Technology Data Exchange (ETDEWEB)

    Siegfried, M. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-10-14

    SRNL recently developed a prototype device for the IAEA to prepare particulate samples collected on swipes for laboratory analysis. The Vacuum Aerosol Contaminant Extractor (VacACE) utilizes electrostatic precipitation in lieu of the impaction or ultrasonic solvent extraction methods presently employed by the IAEA to place particles of interest on carbon planchets for investigation. The project was funded by the Intentional Safeguards Projects Office (ISPO) with scope for device design and fabrication, but no scope for validation or testing. Without documented validation of the tool, sample processing and subsequent analysis fidelity cannot be assured. The goal of this project was to determine collection efficacy in a rigorous fashion, demonstrate proof of concept with standardized particulates, and produce a validated VacACE sampling protocol.

  19. Teachers' Development Model to Authentic Assessment by Empowerment Evaluation Approach

    Science.gov (United States)

    Charoenchai, Charin; Phuseeorn, Songsak; Phengsawat, Waro

    2015-01-01

    The purposes of this study were 1) Study teachers authentic assessment, teachers comprehension of authentic assessment and teachers needs for authentic assessment development. 2) To create teachers development model. 3) Experiment of teachers development model. 4) Evaluate effectiveness of teachers development model. The research is divided into 4…

  20. Authentic tasks in higher education: Studying design principles for assessment

    NARCIS (Netherlands)

    van Keulen, H.; van den Berg, I.; Ramaekers, S.

    2006-01-01

    Students may benefit significantly from learning through authentic tasks. But how do we assess their learning outcomes, taking into account the specific characteristics of authentic tasks? In the second presentation of this symposium on design principles for authentic tasks we present and discuss

  1. Reconciling Divisions in the Field of Authentic Education

    Science.gov (United States)

    Sarid, Ariel

    2015-01-01

    The aim of this article is twofold: first, to identify and address three central divisions in the field of authentic education that introduce ambiguity and at times inconsistencies within the field of authentic education. These divisions concern a) the relationship between autonomy and authenticity; b) the division between the two basic attitudes…

  2. How does "being real" feel? The experience of state authenticity.

    Science.gov (United States)

    Lenton, Alison P; Bruder, Martin; Slabu, Letitia; Sedikides, Constantine

    2013-06-01

    We propose that the experience of state authenticity-the subjective sense of being one's true self-ought to be considered separately from trait authenticity as well as from prescriptions regarding what should make people feel authentic. In Study 1 (N = 104), online participants rated the frequency of and motivation for experiences of authenticity and inauthenticity. Studies 2 (N = 268) and 3 (N = 93) asked (local or online, respectively) participants to describe their experiences of authenticity or inauthenticity. Participants in Studies 1 and 2 also completed measures of trait authenticity, and participants in Study 3 rated their experience with respect to several phenomenological dimensions. Study 1 demonstrated that people are motivated to experience state authenticity and avoid inauthenticity and that such experiences are common, regardless of one's degree of trait authenticity. Coding of Study 2's narratives identified the emotions accompanying and needs fulfilled in each state. Trait authenticity generally did not qualify the nature of (in)authentic experiences. Study 3 corroborated the results of Study 2 and further revealed positive mood and nostalgia as consequences of reflecting on experiences of authenticity. We discuss implications of these findings for conceptualizations of authenticity and the self. © 2012 Wiley Periodicals, Inc.

  3. An Examination of Teacher Authenticity in the College Classroom

    Science.gov (United States)

    Johnson, Zac D.; LaBelle, Sara

    2017-01-01

    This study sought to generate a more robust understanding of teacher (in)authenticity. In other contexts, authenticity is regarded as a display of true self and has been positively linked to beneficial psychological (e.g., increased self-esteem) and social outcomes (e.g., higher relational satisfaction). However, what it means to be authentic in…

  4. Authentic Assessment for Student Learning: An Ontological Conceptualisation

    Science.gov (United States)

    Vu, Thuy T.; Dall'Alba, Gloria

    2014-01-01

    Authentic assessment has been proposed as having potential to enhance student learning for a changing world. Conventionally, assessment is seen to be authentic when the tasks are real-to-life or have real-life value. Drawing on Martin Heidegger's work, we challenge this conceptualisation as narrow and limited. We argue that authenticity need…

  5. Side Channel Authenticity Discriminant Analysis for Device Class Identification

    Science.gov (United States)

    2016-03-31

    Side Channel Authenticity Discriminant Analysis for Device Class Identification Eric Koziel, Kate...include additional identification components. We instead propose Side Channel Authenticity Discriminant Analysis (SICADA) to leverage physical phenomena...manifesting from device operation to match suspect parts to a class of authentic parts. This paper examines the extent that power dissipation

  6. Children's and Adolescents' Perception of the Authenticity of Smiles

    Science.gov (United States)

    Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula

    2009-01-01

    Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six…

  7. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  8. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information

  9. Authenticating the writings of Julius Caesar

    NARCIS (Netherlands)

    Kestemont, Mike; Stover, Justin; Koppel, Moshe; Karsdorp, F.B.; Daelemans, Walter

    2016-01-01

    In this paper, we shed new light on the authenticity of the Corpus Caesarianum, a group of five commentaries describing the campaigns of Julius Caesar (100–44 BC), the founder of the Roman empire. While Caesar himself has authored at least part of these commentaries, the authorship of the rest of

  10. Biometric authentication for a mobile personal device

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    2006-01-01

    Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a

  11. Using Film to Teach Authentic Leadership

    Science.gov (United States)

    Scott, Meagan; Weeks, Penny Pennington

    2016-01-01

    Utilizing film as a teaching tool in a personal leadership development course helped undergraduate students synthesize authentic leadership concepts. "Iron Jawed Angels" facilitated the culminating lesson as students applied course concepts to an observed leader. Three objectives guided the final lesson: (a) critique Alice Paul's…

  12. Elemental Scanning Devices Authenticate Works of Art

    Science.gov (United States)

    2013-01-01

    To better detect aluminum compounds, Marshall Space Flight Center partnered with KeyMaster Inc. (later acquired by Madison, Wisconsin-based Bruker AXS Inc.) to develop a vacuum pump system that could be attached to X-ray fluorescence (XRF) scanners. The resulting technology greatly expanded XRF scanner capabilities, and hundreds of museums now use them to authenticate artifacts and works of art.

  13. FAST PALMPRINT AUTHENTICATION BY SOBEL CODE METHOD

    Directory of Open Access Journals (Sweden)

    Jyoti Malik

    2011-05-01

    Full Text Available The ideal real time personal authentication system should be fast and accurate to automatically identify a person’s identity. In this paper, we have proposed a palmprint based biometric authentication method with improvement in time and accuracy, so as to make it a real time palmprint authentication system. Several edge detection methods, wavelet transform, phase congruency etc. are available to extract line feature from the palmprint. In this paper, Multi-scale Sobel Code operators of different orientations (0?, 45?, 90?, and 135? are applied to the palmprint to extract Sobel-Palmprint features in different direc- tions. The Sobel-Palmprint features extracted are stored in Sobel- Palmprint feature vector and matched using sliding window with Hamming Distance similarity measurement method. The sliding win- dow method is accurate but time taking process. In this paper, we have improved the sliding window method so that the matching time reduces. It is observed that there is 39.36% improvement in matching time. In addition, a Min Max Threshold Range (MMTR method is proposed that helps in increasing overall system accuracy by reducing the False Acceptance Rate (FAR. Experimental results indicate that the MMTR method improves the False Acceptance Rate drastically and improvement in sliding window method reduces the comparison time. The accuracy improvement and matching time improvement leads to proposed real time authentication system.

  14. Authentic Leadership and Spiritual Capital Development: Agenda ...

    African Journals Online (AJOL)

    An important factor responsible for the poor performance of many organizations is paucity of authentic leadership and spiritual capital. Evidence from various researchers such as William George (2005), Zohar and Marshal (2004), Stephen Covey (2004), indicate that many business companies and government ...

  15. Authentic Classroom Leaders: The Student Perspective

    Science.gov (United States)

    Downing, Megan S.

    2016-01-01

    In a qualitative study assessing students' perceptions of faculty-student interaction in the online learning environment, findings demonstrated that students make meaning of faculty-student interaction in ways that align with authentic leadership behaviors. Faculty interaction, or lack thereof, shaped students' perceptions of faculty authenticity…

  16. The authenticity of spatial planning knowledge

    NARCIS (Netherlands)

    Salet, W.

    2014-01-01

    This article intends to start a debate on the authentic disciplinary grounds of spatial planning studies as a scientific discipline of spatial intervention closely interrelated with practices of spatial development. In a volatile epoch of regrouping academic specializations, scientists feel a strong

  17. Supporting Authentic Learning Contexts Beyond Classroom Walls

    Science.gov (United States)

    Herrington, Jan; Specht, Marcus; Brickell, Gwyn; Harper, Barry

    At the classroom level, contexts for learning are often limited in the experiential component. Teachers and trainers feel overwhelmed by the difficulty of inventing authentic learning contexts, and creating tasks that truly reflect the way knowledge would be used in the real world (Herrington et al. 2004). However, there are growing numbers of examples of how such authentic learning environments are being used in schools, higher education, and professional development in a variety of contexts and discipline areas, such as in literacy education (Ferry et al. 2006), in physical activity fitness and health (Rice et al. 1999), in Indigenous education (Marshall et al. 2001), in evaluation (Agostinho 2006), in multimedia and ICT (Bennett et al. 2001), in literature (Fitzsimmons 2006), and in business writing (Pennell et al. 1997). Teachers and trainers who subscribe to this approach to learning can be very inventive in developing learner perceptions of authentic contexts, but often financial, situational and time constraints limit the experiential elements of authentic learning settings.

  18. Pathways to Authenticity in Operatic Interpretation

    DEFF Research Database (Denmark)

    Grund, Cynthia M.; Westney, WIlliam

    through physically interactive and expressive warm-up exercises that break down barriers at the start of the session, and through interactive and experimental techniques in response to the performances themselves. On this approach, physicality and interactivity provide pathways to authenticity on the part...

  19. The Authentic Teacher: Gestures of Behavior.

    Science.gov (United States)

    Shimabukuro, Gini

    1998-01-01

    Stresses the importance for Catholic school educators to reveal the Christian message through every gesture of behavior and foster an experiential faith in students' lives. States that this demands a great deal of skill, knowledge, and self-awareness on the teacher's part, and requires self-esteem, authentic caring, humility, and communication…

  20. Disambiguating authenticity: Interpretations of value and appeal

    Science.gov (United States)

    O’Connor, Kieran; Carroll, Glenn R.; Kovács, Balázs

    2017-01-01

    While shaping aesthetic judgment and choice, socially constructed authenticity takes on some very different meanings among observers, consumers, producers and critics. Using a theoretical framework positing four distinct meanings of socially constructed authenticity–type, moral, craft, and idiosyncratic–we aim to document empirically the unique appeal of each type. We develop predictions about the relationships between attributed authenticity and corresponding increases in the value ascribed to it through: (1) consumer value ratings, (2) willingness to pay, and (3) behavioral choice. We report empirical analyses from a research program of three multi-method studies using (1) archival data from voluntary consumer evaluations of restaurants in an online review system, (2) a university-based behavioral lab experiment, and (3) an online survey-based experiment. Evidence is consistent across the studies and suggests that perceptions of four distinct subtypes of socially constructed authenticity generate increased appeal and value even after controlling for option quality. Findings suggest additional directions for research on authenticity. PMID:28650997

  1. Culturally Speaking: Booktalking Authentic Multicultural Literature

    Science.gov (United States)

    York, Sheryl

    2008-01-01

    Booktalking authentic multicultural literature can encourage students to read, promote respect for all cultures, and help make all students feel welcome in libraries and media centers. It also provides opportunities to collaborate with teachers to increase diversity throughout the schools. This article presents selected booktalks of contemporary…

  2. Semiotic and semantic implications of "authenticity".

    Science.gov (United States)

    Giannini, A James

    2010-04-01

    The concept of transgenerational authenticity was examined in a Japanese cohort by Ito, et al. Reviewing that study, it was noted the eldest generation was distinguished from succeeding ones as this group grew up under U.S. military occupation. The possibility of resultant semantic and semiotic disruptions was considered.

  3. Stamp Verification for Automated Document Authentication

    DEFF Research Database (Denmark)

    Micenková, Barbora; van Beusekom, Joost; Shafait, Faisal

    Stamps, along with signatures, can be considered as the most widely used extrinsic security feature in paper documents. In contrast to signatures, however, for stamps little work has been done to automatically verify their authenticity. In this paper, an approach for verification of color stamps ...

  4. Smartphone Sensors for Stone Lithography Authentication

    Directory of Open Access Journals (Sweden)

    Giuseppe Schirripa Spagnolo

    2014-05-01

    Full Text Available Nowadays mobile phones include quality photo and video cameras, access to wireless networks and the internet, GPS assistance and other innovative systems. These facilities open them to innovative uses, other than the classical telephonic communication one. Smartphones are a more sophisticated version of classic mobile phones, which have advanced computing power, memory and connectivity. Because fake lithographs are flooding the art market, in this work, we propose a smartphone as simple, robust and efficient sensor for lithograph authentication. When we buy an artwork object, the seller issues a certificate of authenticity, which contains specific details about the artwork itself. Unscrupulous sellers can duplicate the classic certificates of authenticity, and then use them to “authenticate” non-genuine works of art. In this way, the buyer will have a copy of an original certificate to attest that the “not original artwork” is an original one. A solution for this problem would be to insert a system that links together the certificate and the related specific artwork. To do this it is necessary, for a single artwork, to find unique, unrepeatable, and unchangeable characteristics. In this article we propose an innovative method for the authentication of stone lithographs. We use the color spots distribution captured by means of a smartphone camera as a non-cloneable texture of the specific artworks and an information management system for verifying it in mobility stone lithography.

  5. Towards an ethics of authentic practice.

    Science.gov (United States)

    Murray, Stuart J; Holmes, Dave; Perron, Amélie; Rail, Geneviève

    2008-10-01

    This essay asks how we might best elaborate an ethics of authentic practice. Will we be able to agree on a set of shared terms through which ethical practice will be understood? How will we define ethics and the subject's relation to authoritative structures of power and knowledge? We begin by further clarifying our critique of evidence-based medicine (EBM), reflecting on the intimate relation between theory and practice. We challenge the charge that our position amounts to no more than 'subjectivism' and 'antiauthoritarian' theory. We argue that an ethical practice ought to question the authority of EBM without falling into the trap of dogmatic antiauthoritarianism. In this, we take up the work of Hannah Arendt, who offers terms to help understand our difficult political relation to authority in an authentic ethical practice. We continue with a discussion of Michel Foucault's use of 'free speech' or parrhesia, which he adopts from Ancient Greek philosophy. Foucault demonstrates that authentic ethical practice demands that we 'speak truth to power.' We conclude with a consideration of recent biotechnologies, and suggest that these biomedical practices force us to re-evaluate our theoretical understanding of the ethical subject. We believe that we are at a crucial juncture: we must develop an ethics of authentic practice that will be commensurable with new and emergent biomedical subjectivities.

  6. What Do You Mean by "Authentic"? A Comparative Review of the Literature on Conceptions of Authenticity in Teaching

    Science.gov (United States)

    Kreber, Carolin; Klampfleitner, Monika; McCune, Velda; Bayne, Sian; Knottenbelt, Miesbeth

    2007-01-01

    "Authenticity in teaching" has been recognized as an important yet under-researched phenomenon. To gain greater insight into the meaning of authenticity in teaching in adult and higher education settings, the authors delved into some of the philosophical and educational literature on authenticity, giving particular attention, but not confining…

  7. Watermarking-Based Digital Audio Data Authentication

    Directory of Open Access Journals (Sweden)

    Jana Dittmann

    2003-09-01

    Full Text Available Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing. Existing concepts address mainly image data. Depending on the necessary security level and the sensitivity to detect changes in the media, we differentiate between fragile, semifragile, and content-fragile watermarking approaches for media authentication. Furthermore, invertible watermarking schemes exist while each bit change can be recognized by the watermark which can be extracted and the original data can be reproduced for high-security applications. Later approaches can be extended with cryptographic approaches like digital signatures. As we see from the literature, only few audio approaches exist and the audio domain requires additional strategies for time flow protection and resynchronization. To allow different security levels, we have to identify relevant audio features that can be used to determine content manipulations. Furthermore, in the field of invertible schemes, there are a bunch of publications for image and video data but no approaches for digital audio to ensure data authentication for high-security applications. In this paper, we introduce and evaluate two watermarking algorithms for digital audio data, addressing content integrity protection. In our first approach, we discuss possible features for a content-fragile watermarking scheme to allow several postproduction modifications. The second approach is designed for high-security applications to detect each bit change and reconstruct the original audio by introducing an invertible audio watermarking concept. Based on the invertible audio scheme, we combine digital signature schemes and digital watermarking to provide a public verifiable data authentication and a reproduction of the original, protected with a secret key.

  8. Authentication Approaches for Standoff Video Surveillance

    International Nuclear Information System (INIS)

    Baldwin, G.; Sweatt, W.; Thomas, M.

    2015-01-01

    Video surveillance for international nuclear safeguards applications requires authentication, which confirms to an inspector reviewing the surveillance images that both the source and the integrity of those images can be trusted. To date, all such authentication approaches originate at the camera. Camera authentication would not suffice for a ''standoff video'' application, where the surveillance camera views an image piped to it from a distant objective lens. Standoff video might be desired in situations where it does not make sense to expose sensitive and costly camera electronics to contamination, radiation, water immersion, or other adverse environments typical of hot cells, reprocessing facilities, and within spent fuel pools, for example. In this paper, we offer optical architectures that introduce a standoff distance of several metres between the scene and camera. Several schemes enable one to authenticate not only that the extended optical path is secure, but also that the scene is being viewed live. They employ optical components with remotely-operated spectral, temporal, directional, and intensity properties that are under the control of the inspector. If permitted by the facility operator, illuminators, reflectors and polarizers placed in the scene offer further possibilities. Any tampering that would insert an alternative image source for the camera, although undetectable with conventional cryptographic authentication of digital camera data, is easily exposed using the approaches we describe. Sandia National Laboratories is a multi-programme laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. Support to Sandia National Laboratories provided by the NNSA Next Generation Safeguards Initiative is gratefully acknowledged. SAND2014-3196 A. (author)

  9. Authentication of data for monitoring a comprehensive test ban treaty

    International Nuclear Information System (INIS)

    Craft, R.L.; Draelos, T.J.

    1996-05-01

    The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations

  10. Examining the relationship between authenticity and self-handicapping.

    Science.gov (United States)

    Akin, Ahmet; Akin, Umran

    2014-12-01

    Self-handicapping includes strategies of externalization in which people excuse failure and internalize success, but which also prevents them from behaving in an authentic way. The goal was to investigate the relation of authenticity with self-handicapping. The study was conducted with 366 university students (176 men, 190 women; M age = 20.2 yr.). Participants completed the Turkish version of the Authenticity Scale and the Self-handicapping Scale. Self-handicapping was correlated positively with two factors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor. A multiple regression analysis indicated that self-handicapping was predicted positively by self-alienation and accepting external influence and negatively by authentic living, accounting for 21% of the variance collectively. These results demonstrated the negative association of authenticity with self-handicapping.

  11. Vein matching using artificial neural network in vein authentication systems

    Science.gov (United States)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  12. Perceived Authenticity of the Visitor Experience in Museums

    DEFF Research Database (Denmark)

    Hede, Anne-Marie; Garma, Romana; Josiassen, Alexander

    2014-01-01

    of perceived authenticity, resonating with Bal's (1996) research in this area. Findings also confirm that consumer scepticism and expectations are antecedents to perceived authenticity of the visitor experience in museums, and that perceived authenticity in turn affects visitor satisfaction and perceived...... corporate hypocrisy. Practical implications -This research provides a framework for museums to manage visitors' perceptions of authenticity, and to plan and design exhibits accordingly. Originality/value - Our research, set in the museum context, articulates the basis of perceived authenticity, its....... To investigate authenticity in a model with two antecedents and two outcomes, an additional data set was collected. Hypotheses were tested using structural equation modelling. Findings -The results show that perceived authenticity of the museum, the visitor and the materials in the museum are dimensions...

  13. Kierkegaard and Sartre on God and Authenticity

    Directory of Open Access Journals (Sweden)

    Amirabbas Alizamani

    2014-09-01

    Full Text Available To evaluate and judge the notion of humanity, one has to use logic and logical criteria, since every notion's delimitation in logic requires an exact definition to be offered. And it is by definition that one can distinguish between one particular notion or extension and other notions and extensions. Different definitions have been suggested of the nature of humanity throughout the history of ideas every one of which casts light on an aspect of human existence. The intricate and deep nature of human being may have been the main obstacle in the way to an exact definition of human being. The past masters have defined man as a rational animal; i.e. man is inside the family of animals but an animal that have the power of thinking. Human rationality is not merely a matter of speaking, but rather it covers his all internal and external aspects. Since man is consisted of mind and body. Contemporary thinkers have left behind the traditional definition of man and approached him from different perspectives. In any case, what is important for us is human being's humanity.    On the other hand, the notion of humanity has always had an inseparable relationship with ethics. Needless to say, moral rules and maxims comprise a set of determinate oughts and ought-nots which should be adopted and followed by every human individual if s/he seeks to reach happiness. These moral rules are sometimes associated with religious and divine concepts which include a faith background and sometimes they go shoulder to shoulder with the rational rules where there is no occasion for extra-rational elements. One of the fundamental notions of ethics is authenticity, or to put it otherwise, how a man is authentic? What are the criteria of an authentic man? Authenticity can be verbally analyzed to the following notions: Authenticity in the sense of having a determinate family background. Authenticity in the sense of having a steady and impenetrable structure Authenticity in the

  14. Kierkegaard and Sartre on God and Authenticity

    Directory of Open Access Journals (Sweden)

    Alireza Faraji

    2014-08-01

    Full Text Available To evaluate and judge the notion of humanity, one has to use logic and logical criteria, since every notion's delimitation in logic requires an exact definition to be offered. And it is by definition that one can distinguish between one particular notion or extension and other notions and extensions. Different definitions have been suggested of the nature of humanity throughout the history of ideas every one of which casts light on an aspect of human existence. The intricate and deep nature of human being may have been the main obstacle in the way to an exact definition of human being. The past masters have defined man as a rational animal; i.e. man is inside the family of animals but an animal that have the power of thinking. Human rationality is not merely a matter of speaking, but rather it covers his all internal and external aspects. Since man is consisted of mind and body. Contemporary thinkers have left behind the traditional definition of man and approached him from different perspectives. In any case, what is important for us is human being's humanity.    On the other hand, the notion of humanity has always had an inseparable relationship with ethics. Needless to say, moral rules and maxims comprise a set of determinate oughts and ought-nots which should be adopted and followed by every human individual if s/he seeks to reach happiness. These moral rules are sometimes associated with religious and divine concepts which include a faith background and sometimes they go shoulder to shoulder with the rational rules where there is no occasion for extra-rational elements. One of the fundamental notions of ethics is authenticity, or to put it otherwise, how a man is authentic? What are the criteria of an authentic man? Authenticity can be verbally analyzed to the following notions: Authenticity in the sense of having a determinate family background. Authenticity in the sense of having a steady and impenetrable structure Authenticity in the

  15. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  16. FY08 LDRD Final Report LOCAL: Locality-Optimizing Caching Algorithms and Layouts

    Energy Technology Data Exchange (ETDEWEB)

    Lindstrom, P

    2009-02-27

    This project investigated layout and compression techniques for large, unstructured simulation data to reduce bandwidth requirements and latency in simulation I/O and subsequent post-processing, e.g. data analysis and visualization. The main goal was to eliminate the data-transfer bottleneck - for example, from disk to memory and from central processing unit to graphics processing unit - through coherent data access and by trading underutilized compute power for effective bandwidth and storage. This was accomplished by (1) designing algorithms that both enforce and exploit compactness and locality in unstructured data, and (2) adapting offline computations to a novel stream processing framework that supports pipelining and low-latency sequential access to compressed data. This report summarizes the techniques developed and results achieved, and includes references to publications that elaborate on the technical details of these methods.

  17. Authenticity assessment of banknotes using portable near infrared spectrometer and chemometrics.

    Science.gov (United States)

    da Silva Oliveira, Vanessa; Honorato, Ricardo Saldanha; Honorato, Fernanda Araújo; Pereira, Claudete Fernandes

    2018-05-01

    Spectra recorded using a portable near infrared (NIR) spectrometer, Soft Independent Modeling of Class Analogy (SIMCA) and Linear Discriminant Analysis (LDA) associated to Successive Projections Algorithm (SPA) models were applied to identify counterfeit and authentic Brazilian Real (R$20, R$50 and R$100) banknotes, enabling a simple field analysis. NIR spectra (950-1650nm) were recorded from seven different areas of the banknotes (two with fluorescent ink, one over watermark, three with intaglio printing process and one over the serial numbers with typography printing). SIMCA and SPA-LDA models were built using 1st derivative preprocessed spectral data from one of the intaglio areas. For the SIMCA models, all authentic (300) banknotes were correctly classified and the counterfeits (227) were not classified. For the two classes SPA-LDA models (authentic and counterfeit currencies), all the test samples were correctly classified into their respective class. The number of selected variables by SPA varied from two to nineteen for R$20, R$50 and R$100 currencies. These results show that the use of the portable near-infrared with SIMCA or SPA-LDA models can be a completely effective, fast, and non-destructive way to identify authenticity of banknotes as well as permitting field analysis. Copyright © 2018 Elsevier B.V. All rights reserved.

  18. Developing formative authentic assessment instruments based on learning trajectory for elementary school

    Directory of Open Access Journals (Sweden)

    Anesa Surya

    2016-06-01

    Full Text Available This research aims to (1 develop research formative authentic assessment instruments based on learning trajectory that is eligible for the fourth grade students of elementary schools; and (2 develop formative authentic assessment instruments based on learning trajectory that is effective for the fourth grade students of elementary schools. This developmental study refers to the model developed by Borg & Gall. The developmental design was grouped into four development procedures, consisting of: (a Exploration, (b development of the draft/prototype, (c product testing and revisions, and (d final validation. The experimental subjects are some pilot project elementary schools which used Curriculum 2013 in Ngawi Regency. The data were collected using interview guides, documentation, assessment sheets of the product instrument of authentic assessment, observation sheets of the students, achievement test, questionnaire responses of teachers and students. The data of the instrument reliability were analyzed in terms of item discrimination and item difficulty, and the agreement index was employed for the reliability of the instrument. The research finding reveals that the research instrument in terms of attitude assessment, assessment of knowledge and skills according to subject-matter experts and experts in evaluation is categorized as ‘very good’. The results of the item discrimination analysis show that nonnegative and item difficulties  range from easy to hard. The formative authentic assessment instruments are categorized as ‘reliable’ by the agreement index of ≥ 0.75.

  19. Secure Strokes – A Security Mechanism for Authentication in Mobile Devices using User’s Behavioral Pattern of Keystrokes Dynamics with Visual Cues

    OpenAIRE

    Pallavica Sahoo; Prithumit Deb

    2011-01-01

    The aim is to develop a security system for mobile devices that eliminates the vulnerability of PIN (4-digit) security and which reduces the high end configuration and memory space requirements of biometrics security. The issues that we will be handling in the project work is the vulnerability of PIN security in mobile devices and providing an extra layer of security through Key Strokes Dynamics based authentication system. Also the problem of authentication error rates while using natural us...

  20. A nuclear method to authenticate Buddha images

    Science.gov (United States)

    Khaweerat, S.; Ratanatongchai, W.; Channuie, J.; Wonglee, S.; Picha, R.; Promping, J.; Silva, K.; Liamsuwan, T.

    2015-05-01

    The value of Buddha images in Thailand varies dramatically depending on authentication and provenance. In general, people use their individual skills to make the justification which frequently leads to obscurity, deception and illegal activities. Here, we propose two non-destructive techniques of neutron radiography (NR) and neutron activation autoradiography (NAAR) to reveal respectively structural and elemental profiles of small Buddha images. For NR, a thermal neutron flux of 105 n cm-2s-1 was applied. NAAR needed a higher neutron flux of 1012 n cm-2 s-1 to activate the samples. Results from NR and NAAR revealed unique characteristic of the samples. Similarity of the profile played a key role in the classification of the samples. The results provided visual evidence to enhance the reliability of authenticity approval. The method can be further developed for routine practice which impact thousands of customers in Thailand.

  1. Human doctoring: bringing authenticity to our care.

    Science.gov (United States)

    Risdon, C; Edey, L

    1999-08-01

    Increasingly, doctors are looking for ways to treat the whole patient--mind, body, and spirit, disease and illness. To accomplish this, doctors must establish authentic relationships with their patients--that is, relationships in which the life experiences and knowledge of both participants are acknowledged and respected. Physicians must be aware of everything they bring, both as persons and as professionals, to every clinical encounter. In this article, the authors discuss a hypothetical case of a teenaged girl suffering from recurrent coldsores and the possible ways her physician might handle her case. They analyze the differences among the three scenarios, using them to highlight ways physicians can work to achieve authentic and mutually beneficial relationships with the people in their care.

  2. Protecting autonomy as authenticity using Ulysses contracts.

    Science.gov (United States)

    van Willigenburg, Theo; Delaere, Patrick

    2005-08-01

    Pre-commitment directives or Ulysses contracts are often defended as instruments that may strengthen the autonomous self-control of episodically disordered psychiatric patients. Autonomy is understood in this context in terms of sovereignty ("governing" or "managing" oneself). After critically analyzing this idea of autonomy in the context of various forms of self-commitment and pre-commitment, we argue that what is at stake in using Ulysses contracts in psychiatry is not autonomy as sovereignty, but autonomy as authenticity. Pre-commitment directives do not function to protect autonomous self-control. They serve in upholding the guidance that is provided by one's deepest identity conferring concerns. We elucidate this concept of autonomy as authenticity, by showing how Ulysses contracts protect the possibility of being "a self."

  3. A nuclear method to authenticate Buddha images

    International Nuclear Information System (INIS)

    Khaweerat, S; Ratanatongchai, W; Channuie, J; Wonglee, S; Picha, R; Promping, J; Silva, K; Liamsuwan, T

    2015-01-01

    The value of Buddha images in Thailand varies dramatically depending on authentication and provenance. In general, people use their individual skills to make the justification which frequently leads to obscurity, deception and illegal activities. Here, we propose two non-destructive techniques of neutron radiography (NR) and neutron activation autoradiography (NAAR) to reveal respectively structural and elemental profiles of small Buddha images. For NR, a thermal neutron flux of 10 5 n cm -2 s -1 was applied. NAAR needed a higher neutron flux of 10 12 n cm -2 s -1 to activate the samples. Results from NR and NAAR revealed unique characteristic of the samples. Similarity of the profile played a key role in the classification of the samples. The results provided visual evidence to enhance the reliability of authenticity approval. The method can be further developed for routine practice which impact thousands of customers in Thailand. (paper)

  4. Information authentication using an optical dielectric metasurface

    Science.gov (United States)

    Wang, Xiaogang; Mei, Shengtao

    2017-09-01

    Metasurfaces that consist of a monolayer of photonic artificial atoms are emerging as attractive materials for optical wavefront-shaping and polarization-control devices. By integrating nanophotonics with a phase-encoding technique, we demonstrate theoretically an information authentication method using dielectric metasurfaces that can be verified without information disclosure at visible wavelengths. The required secured diffraction pattern can be simply achieved by a metasurface hologram with a small number of pixels, which means increased efficiency and lower costs of production. Although the decrypted image is noisy, it can be authenticated by recognition algorithms where the primary image is used as a reference. The results show that the dielectric metasurface approach, providing great flexibility in the design of the wavefront of light and compatible with the CMOS technology, can be potentially applied in optical information security.

  5. Authenticated hash tables

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Papamanthou, Charalampos; Tamassia, Roberto

    2008-01-01

    Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so that the client can save space or achieve load balancing. Authenticating the hash table functionality, i.e., verifying...... the correctness of queries answered by the server and ensuring the integrity of the stored data, is crucial because the server, lying outside the administrative control of the client, can be malicious. We design efficient and secure protocols for optimally authenticating membership queries on hash tables: for any...... fixed constants 0 1/ε, the server can provide a proof of integrity of the answer to a (non-)membership query in constant time, requiring O(nε/logκε--1 n) time to treat updates, yet keeping the communication and verification costs constant. This is the first construction...

  6. Routing Data Authentication in Wireless Networks; TOPICAL

    International Nuclear Information System (INIS)

    TORGERSON, MARK D.; VAN LEEUWEN, BRIAN P.

    2001-01-01

    In this paper, we discuss several specific threats directed at the routing data of an ad hoc network. We address security issues that arise from wrapping authentication mechanisms around ad hoc routing data. We show that this bolt-on approach to security may make certain attacks more difficult, but still leaves the network routing data vulnerable. We also show that under a certain adversarial model, most existing routing protocols cannot be secured with the aid of digital signatures

  7. Cost Effective RADIUS Authentication for Wireless Clients

    Directory of Open Access Journals (Sweden)

    Alexandru ENACEANU

    2010-12-01

    Full Text Available Network administrators need to keep administrative user information for each network device, but network devices usually support only limited functions for user management. WLAN security is a modern problem that needs to be solved and it requires a lot of overhead especially when applied to corporate wireless networks. Administrators can set up a RADIUS server that uses an external database server to handle authentication, authorization, and accounting for network security issues.

  8. Verifiable process monitoring through enhanced data authentication

    International Nuclear Information System (INIS)

    Goncalves, Joao G.M.; Schwalbach, Peter; Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

    2010-01-01

    To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

  9. The Bird Box Survey Project

    Science.gov (United States)

    Willis, Patrick

    2014-01-01

    When high school students are asked what's the best part of science class, many will say it's the field trips. Students enjoy engaging in authentic, community-based science outside the classroom. To capitalize on this, Patrick Willis created the Bird Box Survey Project for his introductory field biology class. The project takes students…

  10. Authentic Material and Automaticity for Teaching English

    Directory of Open Access Journals (Sweden)

    Widyastuti Widyastuti

    2017-07-01

    Full Text Available This article discusses how to make students of Science Education in first year feel interesting in English lesson, understanding the text well and can communicate English fluency. It has been suggested that Authentic Material and Automaticity Theory not only creates a friendly and fun condition in teaching reading but helps students to study comprehensibly so they are able to understand the text, structure, vocabulary easily, read fluently and they also can communicate in English. The authentic material can make the teaching learning process fun and eliminate boring because the topics and materials can be found in internet so it will be more visually and  interactive . Automaticity theory can solve the problem of students who must memorize words that make them feel boring and forget the words soon. The other benefit is the students can exposure the real language being used in a real context and stimulate studens’idea, encouarage them to relate themselves with real-life experiencesThese strategies can make the students understand easily and enjoy the teaching learning process. By combining authentic material and automaticity strategies for teaching English in science education, will develop readers (students to become fully competent and fluent.

  11. Holograms and authentication: meeting future demands

    Science.gov (United States)

    Lancaster, Ian M.

    2004-06-01

    The use of holograms as authentication or security devices is the most valuable application of holograms yet devised. In 20 years, this has developed from the first use of a hologram on credit cards, to the situation today where governments turn to holograms as a key security feature on the protected documents they issue, including banknotes, identity documents and tax banderols. At the same time, holograms (and related devices) are the most recognised visible feature used to authenticate and protect branded and OEM products; this sector covers the gamut from CD jewel-box seals to the protection of safety-related items such as medicines and vehicle replacement parts. There has been creative synergy between the commercial suppliers of such holograms and the practical holography community. But new technologies are coming forward to challenge the role of holograms, a challenge that is aided by the counterfeiting of security holograms. What are the characteristics of those technologies and can holograms provide similar resources to users? Examples of collaboration between hologram producers and producers of other technologies to create combination devices suggest a possible route forward for holography to maintain its role in authentication and security. By scrutinising and adapting to needs, often by combination with other techniques, holographers may be able to retain their role in this important application.

  12. Electromagnetic simulation of electronic packaging designs (95-ERP-003). 1995 LDRD final report

    Energy Technology Data Exchange (ETDEWEB)

    Swegle, J.A.

    1996-05-01

    The primary focus of the project summarized in this report has been to evaluate the performance of the 3D, time-domain electromagnetic code DS13D in the simulation of structures used in microwave microelectronics circuits. We`ve adopted two test cases, coaxial and stripline transmission lines, for which well-known results are available so that results obtained with DS13D could be easily and accurately checked. Our goals have been three-fold: (1) To develop specialized mode-launching capabilities for single-mode signals typically found in test geometries and the diagnostics necessary to evaluate the performance of the code in modeling the propagation of those signals. (2) To analyze the effect of different zoning schemes on the accuracy with which the code models the propagation of signals through the geometries by checking against known analytic results and calculations performed with other codes. (3) To examine the effect of code modifications aimed at enhancing the accuracy of the simulations. The calculated transmission line impedance was chosen as the primary means of evaluating code performance. Since the lowest-order propagating modes for the test cases were transverse electromagnetic (TEM) modes, the computation of impedance was reasonably straightforward. Both time- and frequency-domain values (the latter obtained from the code output by post-processing with a discrete Fourier transform) were obtained and compared.

  13. Compute-to-Learn: Authentic Learning via Development of Interactive Computer Demonstrations within a Peer-Led Studio Environment

    Science.gov (United States)

    Jafari, Mina; Welden, Alicia Rae; Williams, Kyle L.; Winograd, Blair; Mulvihill, Ellen; Hendrickson, Heidi P.; Lenard, Michael; Gottfried, Amy; Geva, Eitan

    2017-01-01

    In this paper, we report on the implementation of a novel compute-to-learn pedagogy, which is based upon the theories of situated cognition and meaningful learning. The "compute-to-learn" pedagogy is designed to simulate an authentic research experience as part of the undergraduate curriculum, including project development, teamwork,…

  14. CORSICA: A comprehensive simulation of toroidal magnetic-fusion devices. Final report to the LDRD Program

    Energy Technology Data Exchange (ETDEWEB)

    Crotinger, J.A.; LoDestro, L.; Pearlstein, L.D.; Tarditi, A.; Casper, T.A.; Hooper, E.B.

    1997-03-21

    In 1992, our group began exploring the requirements for a comprehensive simulation code for toroidal magnetic fusion experiments. There were several motivations for taking this step. First, the new machines being designed were much larger and more expensive than current experiments. Second, these new designs called for much more sophisticated control of the plasma shape and position, as well as the distributions of energy, mass, and current within the plasma. These factors alone made it clear that a comprehensive simulation capability would be an extremely valuable tool for machine design. The final motivating factor was that the national Numerical Tokamak Project (NTP) had recently received High Performance Computing and Communications (HPCC) Grand Challenge funding to model turbulent transport in tokamaks, raising the possibility that first-principles simulations of this process might be practical in the near future. We felt that the best way to capitalize on this development was to integrate the resulting turbulence simulation codes into a comprehensive simulation. Such simulations must include the effects of many microscopic length- and time-scales. In order to do a comprehensive simulation efficiently, the length- and time- scale disparities must be exploited. We proposed to do this by coupling the average or quasistatic effects from the fast time-scales to a slow-time-scale transport code for the macroscopic plasma evolution. In FY93-FY96 we received funding to investigate algorithms for computationally coupling such disparate-scale simulations and to implement these algorithms in a prototype simulation code, dubbed CORSICA. Work on algorithms and test cases proceeded in parallel, with the algorithms being incorporated into CORSICA as they became mature. In this report we discuss the methods and algorithms, the CORSICA code, its applications, and our plans for the future.

  15. The authentic worker's well-being and performance: the relationship between authenticity at work, well-being, and work outcomes.

    Science.gov (United States)

    van den Bosch, Ralph; Taris, Toon W

    2014-01-01

    Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications.

  16. Children's and adolescents' perception of the authenticity of smiles.

    Science.gov (United States)

    Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula

    2009-03-01

    Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six smiles differing in intensity and presence of orbicularis oculi (Duchenne marker) was rated by 1206 children from 4 to 17 years of age. No differences were found as a function of encoder group. All children perceived medium Duchenne smiles as more authentic than equally intense medium non-Duchenne smiles. Furthermore, results suggest a decrease in the reliance on intensity across the age span. Younger children use the intensity marker along the whole continuum to infer authenticity. In contrast, older children (14- to 17-year-olds) rated all smiles that did not contain the Duchenne marker as roughly equally low in authenticity.

  17. Managing Authentic Experience in the Hypermodern Knowledge Economy

    DEFF Research Database (Denmark)

    Rendtorff, Jacob Dahl

    2017-01-01

    Customers Really Want) has thereby become central to management theory and management philosophy. In this paper, I want to discuss some fundamental and foundational aspects of the concept of authentic experience in the framework of the experience economy as a social reality of late modernity. 1. I......Modern experience economy is about buying and selling experiences, to make intimate experiences and search for customer satisfaction the driving motor of capitalist economies. The concept of experience and more recently the notion of authentic experience (e.g. Pine and Gilmore: Authenticity: What...... will start with a phenomenological perspective on the concept of experience and relate this concept to the idea of authenticity. This will be based on comparison between different concepts of authenticity. 2. After this I will analyze this concept of authenticity in the framework of the kind of society...

  18. Secure authentication system that generates seed from biometric information.

    Science.gov (United States)

    Kim, Yeojin; Ahn, Jung-Ho; Byun, Hyeran

    2005-02-10

    As biometric recognition techniques are gradually improved, the stability of biometric authentication systems are enhanced. Although bioinformation has properties that make it resistant to fraud, biometric authentication systems are not immune to hacking. We show a secure biometric authentication system (1) to guarantee the integrity of biometric information by mixing data by use of a biometric key and (2) to raise recognition rates by use of bimodal biometrics.

  19. Engaging Students in Authentic Microbiology Research in an Introductory Biology Laboratory Course is Correlated with Gains in Student Understanding of the Nature of Authentic Research and Critical Thinking

    Directory of Open Access Journals (Sweden)

    Brittany J. Gasper

    2013-02-01

    Full Text Available Recent recommendations for biology education highlight the role of authentic research experiences early in undergraduate education as a means of increasing the number and quality of biology majors. These experiences will inform students on the nature of science, increase their confidence in doing science, as well as foster critical thinking skills, an area that has been lacking despite it being one of the desired outcomes at undergraduate institutions and with future employers. With these things in mind, we have developed an introductory biology laboratory course where students design and execute an authentic microbiology research project. Students in this course are assimilated into the community of researchers by engaging in scholarly activities such as participating in inquiry, reading scientific literature, and communicating findings in written and oral formats. After three iterations of a semester-long laboratory course, we found that students who took the course showed a significant increase in their understanding of the nature of authentic research and their level of critical thinking skills.

  20. Ninth Grade Student Responses to Authentic Science Instruction

    Science.gov (United States)

    Ellison, Michael Steven

    This mixed methods case study documents an effort to implement authentic science and engineering instruction in one teacher's ninth grade science classrooms in a science-focused public school. The research framework and methodology is a derivative of work developed and reported by Newmann and others (Newmann & Associates, 1996). Based on a working definition of authenticity, data were collected for eight months on the authenticity in the experienced teacher's pedagogy and in student performance. Authenticity was defined as the degree to which a classroom lesson, an assessment task, or an example of student performance demonstrates construction of knowledge through use of the meaning-making processes of science and engineering, and has some value to students beyond demonstrating success in school (Wehlage et al., 1996). Instruments adapted for this study produced a rich description of the authenticity of the teacher's instruction and student performance. The pedagogical practices of the classroom teacher were measured as moderately authentic on average. However, the authenticity model revealed the teacher's strategy of interspersing relatively low authenticity instructional units focused on building science knowledge with much higher authenticity tasks requiring students to apply these concepts and skills. The authenticity of the construction of knowledge and science meaning-making processes components of authentic pedagogy were found to be greater, than the authenticity of affordances for students to find value in classroom activities beyond demonstrating success in school. Instruction frequently included one aspect of value beyond school, connections to the world outside the classroom, but students were infrequently afforded the opportunity to present their classwork to audiences beyond the teacher. When the science instruction in the case was measured to afford a greater level of authentic intellectual work, a higher level of authentic student performance on

  1. Single Sign-on Authentication server (part of CLARIN infrastructure)

    NARCIS (Netherlands)

    de Jong, H.A.; Maas, M.

    2013-01-01

    The Huygens Single Sign-on server allows federated logins (authentication) via SURFconext affiliates thus facilitating all connected (academic / research) institutes to use online Huygens ING software services.

  2. Peer-to-peer architectures for exascale computing : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Vorobeychik, Yevgeniy; Mayo, Jackson R.; Minnich, Ronald G.; Armstrong, Robert C.; Rudish, Donald W.

    2010-09-01

    platforms. P2P architectures give us a starting point for crafting applications and system software for exascale. In the context of the Internet, P2P applications (e.g., file sharing, botnets) have already solved this problem for 10{sup 6}-10{sup 7} nodes. Usually based on a fractal distributed hash table structure, these systems have proven robust in practice to constant and unpredictable outages, failures, and even subversion. For example, a recent estimate of botnet turnover (i.e., the number of machines leaving and joining) is about 11% per week. Nonetheless, P2P networks remain effective despite these failures: The Conficker botnet has grown to {approx} 5 x 10{sup 6} peers. Unlike today's system software and applications, those for next-generation exascale machines cannot assume a static structure and, to be scalable over millions of nodes, must be decentralized. P2P architectures achieve both, and provide a promising model for 'fault-oblivious computing'. This project aimed to study the dynamics of P2P networks in the context of a design for exascale systems and applications. Having no single point of failure, the most successful P2P architectures are adaptive and self-organizing. While there has been some previous work applying P2P to message passing, little attention has been previously paid to the tightly coupled exascale domain. Typically, the per-node footprint of P2P systems is small, making them ideal for HPC use. The implementation on each peer node cooperates en masse to 'heal' disruptions rather than relying on a controlling 'master' node. Understanding this cooperative behavior from a complex systems viewpoint is essential to predicting useful environments for the inextricably unreliable exascale platforms of the future. We sought to obtain theoretical insight into the stability and large-scale behavior of candidate architectures, and to work toward leveraging Sandia's Emulytics platform to test promising candidates

  3. PENGOPTIMALAN KOMPETENSI MAHASISWA JURUSAN BAHASA DAN SASTRA INDONESIA FBS UNNES DALAM MEMBUAT MEDIA PEMBELAJARAN BAHASA INDONESIA MENGGUNAKAN ELEMEN AUTHENTIC ASSESSMENT

    Directory of Open Access Journals (Sweden)

    Mimi Mulyani

    2010-04-01

    Full Text Available The learning-media subject aims for students to have the competence of makinga variety of instructional media. In fact, the student‟s competences in designing, creating, and displaying the instructional media are not maximized since the media made by students is often not discussed in the class. A comprehensive measurement of aspects of learning; covering aspects of the process, performance, and product; can be done using authentic assessment approaches. The results show that the contextual elements of authentic assessment approach can improve students' competence in designing, creating, and displaying graphics media. It also change their attitudes and interests from negative to positive. it is suggested that lecturers discuss the students‟ project in the lecture. Unnes is expected to improve the facilities of learning media that can lead students to be more creative and innovative in creating instructional media. Keywords: competence, instructional media, elements of authentic assessment

  4. Philosophically Rooted Educational Authenticity as a Normative Ideal for Education: Is the International Baccalaureate's Primary Years Programme an Example of an Authentic Curriculum?

    Science.gov (United States)

    Lüddecke, Florian

    2016-01-01

    Whereas the importance of authenticity in relation to educational contexts has been highlighted, educational authenticity (EA) has mainly referred to a real-life/world convergence or the notion of teacher authenticity, implying that authenticity can be taught and learnt. This view, however, has largely overlooked philosophical considerations so…

  5. Authentication via wavefront-shaped optical responses

    Science.gov (United States)

    Eilers, Hergen; Anderson, Benjamin R.; Gunawidjaja, Ray

    2018-02-01

    Authentication/tamper-indication is required in a wide range of applications, including nuclear materials management and product counterfeit detection. State-of-the-art techniques include reflective particle tags, laser speckle authentication, and birefringent seals. Each of these passive techniques has its own advantages and disadvantages, including the need for complex image comparisons, limited flexibility, sensitivity to environmental conditions, limited functionality, etc. We have developed a new active approach to address some of these short-comings. The use of an active characterization technique adds more flexibility and additional layers of security over current techniques. Our approach uses randomly-distributed nanoparticles embedded in a polymer matrix (tag/seal) which is attached to the item to be secured. A spatial light modulator is used to adjust the wavefront of a laser which interacts with the tag/seal, and a detector is used to monitor this interaction. The interaction can occur in various ways, including transmittance, reflectance, fluorescence, random lasing, etc. For example, at the time of origination, the wavefront-shaped reflectance from a tag/seal can be adjusted to result in a specific pattern (symbol, words, etc.) Any tampering with the tag/seal would results in a disturbance of the random orientation of the nanoparticles and thus distort the reflectance pattern. A holographic waveplate could be inserted into the laser beam for verification. The absence/distortion of the original pattern would then indicate that tampering has occurred. We have tested the tag/seal's and authentication method's tamper-indicating ability using various attack methods, including mechanical, thermal, and chemical attacks, and have verified our material/method's robust tamper-indicating ability.

  6. Authentic Voices Authentic Singing : A Multicultural Approach To Vocal Music Therapy

    NARCIS (Netherlands)

    Uhlig, S.

    2006-01-01

    This book presents the exclusive use of the authentic voice to highlight its virtuosity, healing potency and its importance to well-being. It demonstrates the powerful impact of the voice with clinical examples from mental health, medical and special education settings. In the book the undiscovered

  7. Complementing Security Breach of Authentication by Using Shared Authentication Information in Mobile WiMAX Networks

    Science.gov (United States)

    Kim, Youngwook; Lim, Hyoung-Kyu; Bahk, Saewoong

    The signalling protocol vulnerability opens DDoS problem in Mobile WiMAX networks. This letter proposes an authentication method that uses the unrevealed upper 64bits of Cipher-based MAC as a solution. It runs for MSs in idle mode and reduces the calculation complexity by 59% under DDoS attack while incurring 1% overhead under normal condition.

  8. Relations between student perceptions of assessment authenticity, study approaches and learning outcome

    NARCIS (Netherlands)

    Gulikers, J.T.M.; Bastiaens, Th.J.; Kirschner, P.A.; Kester, L.

    2006-01-01

    This article examines the relationships between perceptions of authenticity and alignment on study approach and learning outcome. Senior students of a vocational training program performed an authentic assessment and filled in a questionnaire about the authenticity of various assessment

  9. Authenticity, Post-truth and Populism

    Directory of Open Access Journals (Sweden)

    Vintilă Mihăilescu

    2017-11-01

    Full Text Available The article discusses the fake news phenomenon as a social act, analyzed together with what has caused it and what accompanies it: the culture of authenticity, digital communication and its specificity (emphasis on image, not on concepts, post-truth and populism (with its emotional dimension. The premise is that fake news is immanent to the social space, but in the context of globalization and under the development of information technology and social media, it has a greater social impact and carries higher risks for the society.

  10. Human Factors in Web-Authentication

    Science.gov (United States)

    2009-02-06

    I didn’t think of it as anything particularly special.” • “I just chalked it up to general security advice and more or less forgot about it.” 63... Alice visits https://www.vanguard. com/index.html with the intention of authenticating herself. The user’s browser will attempt to establish an SSL...record that requesters should not cache this result, i.e., it sets the TTL=0. After the pharmer returns the trojan document to Alice , it updates the

  11. Trichoblastic carcinosarcoma: an authentic cutaneous carcinosarcoma.

    Science.gov (United States)

    Colston, Jonathan; Hodge, Keith; Fraga, Garth Robert

    2016-05-18

    We describe a trichoblastic carcinosarcoma on the forehead of a 65-year-old man. This is the fifth case of trichoblastic carcinosarcoma in the literature and the first to be reported from the USA. It was successfully treated with direct excision. Trichoblastic carcinosarcoma should be distinguished from epidermal carcinosarcoma. We believe trichoblastic carcinosarcoma is an authentic carcinosarcoma derived from multiple progenitor cells whereas epidermal carcinosarcomas are derived from a single progenitor cell that undergoes epithelial to mesenchymal transition, and are better considered as sarcomatoid carcinomas. 2016 BMJ Publishing Group Ltd.

  12. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Yo-Hsuan Chuang

    2018-04-01

    Full Text Available Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs. Within this kind of Internet of Things (IoT environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  13. A Lightweight Continuous Authentication Protocol for the Internet of Things.

    Science.gov (United States)

    Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-04-05

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  14. International education and reflection: transition of Swedish and American nursing students to authenticity.

    Science.gov (United States)

    Lepp, Margret; Zorn, CeCelia R; Duffy, Patricia R; Dickson, Rana J

    2003-01-01

    Reflection, a process grounded in distancing from the self to enhance self-awareness, can be used as a pedagogic activity to promote students' transition to a greater authenticity and professionalism and, therefore, improve patient care and nursing practice. In this international educational project (implemented in 2001) using interactive videoconferencing technology (IVC), Swedish and U.S. nursing students and faculty incorporated reflective journaling, drama in education, photolanguage, and off-air meeting discussions to enhance personal and professional development. Highlights from the literature, a description of the project, and student and faculty appraisals are presented.

  15. Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things

    Science.gov (United States)

    Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido

    2016-01-01

    This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie–Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes. PMID:26751454

  16. Supporting NGSS-aligned Study of Authentic Data about Climate

    Science.gov (United States)

    Zalles, D. R.

    2013-12-01

    The subject of climate change holds tremendous opportunity for students to learn how scientists use data to develop and test theories of how the natural world works and appreciate how climate change instantiates cross-cutting NGSS science themes like stability and change, energy and matter, and cause and effect. To do so, students and teachers need help seeing in authentic Earth system data complex climate interactions and generate plans for building greater understanding of the complexities through further data investigation. With ever-growing repositories of global and regional public data and user friendly tools for their display, K-12 educators are challenged to help students study data independently rather than through the usual pre-filtered didactic presentations of data found in textbooks. The paper will describe strategies for facilitating critical thinking about authentic climate-related data in two climate change education projects funded by NASA and NSF, as well as learning outcomes. Data Enhanced Investigations for Climate Change Education (dicce.sri.com) brings data from NASA satellite missions to classrooms. Studying Topography, Orographic Rainfall, and Ecosystems with Geospatial Information Technology (store.sri.com) provides recent climatological and vegetation data about certain study areas in California and New York plus geospatially distributed projected values of temperature, precipitation, and land cover in 2050 and 2099, derived from NCAR's A2 climate change model. Supportive resources help students move from naïve conceptions of simple linear relationships between variables into critical analysis of what other variables could be mediating those relationships. DICCE contains guides for how to interpret multiyear trends that are evident in the NASA mission data in relation to what we know about current climate change. If a learner plots a line of best fit across multiple months or years of regional data and notices that the line is either

  17. Authentic leaders creating healthy work environments for nursing practice.

    Science.gov (United States)

    Shirey, Maria R

    2006-05-01

    Implementation of authentic leadership can affect not only the nursing workforce and the profession but the healthcare delivery system and society as a whole. Creating a healthy work environment for nursing practice is crucial to maintain an adequate nursing workforce; the stressful nature of the profession often leads to burnout, disability, and high absenteeism and ultimately contributes to the escalating shortage of nurses. Leaders play a pivotal role in retention of nurses by shaping the healthcare practice environment to produce quality outcomes for staff nurses and patients. Few guidelines are available, however, for creating and sustaining the critical elements of a healthy work environment. In 2005, the American Association of Critical-Care Nurses released a landmark publication specifying 6 standards (skilled communication, true collaboration, effective decision making, appropriate staffing, meaningful recognition, and authentic leadership) necessary to establish and sustain healthy work environments in healthcare. Authentic leadership was described as the "glue" needed to hold together a healthy work environment. Now, the roles and relationships of authentic leaders in the healthy work environment are clarified as follows: An expanded definition of authentic leadership and its attributes (eg, genuineness, trustworthiness, reliability, compassion, and believability) is presented. Mechanisms by which authentic leaders can create healthy work environments for practice (eg, engaging employees in the work environment to promote positive behaviors) are described. A practical guide on how to become an authentic leader is advanced. A research agenda to advance the study of authentic leadership in nursing practice through collaboration between nursing and business is proposed.

  18. Authentic Italian food as Mamma used to make it!

    DEFF Research Database (Denmark)

    Madsen, Jan Halberg; d'Ambrosio, Luigi

    2015-01-01

    The purpose of this investigation is to explore how Italian restaurants define authentic Italian culinary experiences and how these experiences are designed and rendered to the restaurants’ guests.......The purpose of this investigation is to explore how Italian restaurants define authentic Italian culinary experiences and how these experiences are designed and rendered to the restaurants’ guests....

  19. 22 CFR 61.3 - Certification and authentication criteria.

    Science.gov (United States)

    2010-04-01

    ... or aspect of a subject unless the material contains widespread and gross misstatements of fact; (4... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and...

  20. One-Way Quantum Authenticated Secure Communication Using Rotation Operation

    International Nuclear Information System (INIS)

    Tsai Chia-Wei; Wei Toung-Shang; Hwang Tzonelih

    2011-01-01

    This study proposes a theoretical quantum authenticated secure communication (QASC) protocol using Einstein-Podolsky-Rosen (EPR) entangle state, which enables a sender to send a secure as well as authenticated message to a receiver within only one step quantum transmission without having the classical channels and the certification authority. (general)

  1. Girls' Relationship Authenticity and Self-Esteem across Adolescence

    Science.gov (United States)

    Impett, Emily A.; Sorsoli, Lynn; Schooler, Deborah; Henson, James M.; Tolman; Deborah L.

    2008-01-01

    Feminist psychologists have long posited that relationship authenticity (i.e., the congruence between what one thinks and feels and what one does and says in relational contexts) is integral to self-esteem and well-being. Guided by a feminist developmental framework, the authors investigated the role of relationship authenticity in promoting…

  2. Preliminary Development and Validation of a Measure of Relationship Authenticity

    Science.gov (United States)

    Lopez, Frederick G.; Rice, Kenneth G.

    2006-01-01

    The authors describe the preliminary development and validation of the Authenticity in Relationships Scale. An initial pool of 37 items addressing various elements of the proposed definition of "relationship authenticity" was administered to 2 independent samples of undergraduates (N = 487) who acknowledged being in a current romantic…

  3. Trusting Description: Authenticity, Accountability, and Archival Description Standards

    Science.gov (United States)

    MacNeil, Heather

    2009-01-01

    It has been suggested that one of the purposes of archival description is to establish grounds for presuming the authenticity of the records being described. The article examines the implications of this statement by examining the relationship between and among authenticity, archival description, and archival accountability, assessing how this…

  4. South African managers in public service: On being authentic

    Directory of Open Access Journals (Sweden)

    Antoni Barnard

    2014-01-01

    Full Text Available South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work–life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.

  5. The influence of authentic leadership on safety climate in nursing.

    Science.gov (United States)

    Dirik, Hasan Fehmi; Seren Intepeler, Seyda

    2017-07-01

    This study analysed nurses' perceptions of authentic leadership and safety climate and examined the contribution of authentic leadership to the safety climate. It has been suggested and emphasised that authentic leadership should be used as a guidance to ensure quality care and the safety of patients and health-care personnel. This predictive study was conducted with 350 nurses in three Turkish hospitals. The data were collected using the Authentic Leadership Questionnaire and the Safety Climate Survey and analysed using hierarchical regression analysis. The mean authentic leadership perception and the safety climate scores of the nurses were 2.92 and 3.50, respectively. The percentage of problematic responses was found to be less than 10% for only four safety climate items. Hierarchical regression analysis revealed that authentic leadership significantly predicted the safety climate. Procedural and political improvements are required in terms of the safety climate in institutions, where the study was conducted, and authentic leadership increases positive perceptions of safety climate. Exhibiting the characteristics of authentic leadership, or improving them and reflecting them on to personnel can enhance the safety climate. Planning information sharing meetings to raise the personnel's awareness of safety climate and systemic improvements can contribute to creating safe care climates. © 2017 John Wiley & Sons Ltd.

  6. A Framework for Authenticity in the Mathematics and Statistics Classroom

    Science.gov (United States)

    Garrett, Lauretta; Huang, Li; Charleton, Maria Calhoun

    2016-01-01

    Authenticity is a term commonly used in reference to pedagogical and curricular qualities of mathematics teaching and learning, but its use lacks a coherent framework. The work of researchers in engineering education provides such a framework. Authentic qualities of mathematics teaching and learning are fit within a model described by Strobel,…

  7. South African managers in public service: On being authentic

    Science.gov (United States)

    Simbhoo, Nirvana

    2014-01-01

    South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work–life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work. PMID:24434054

  8. Authenticity and autochthonous traditions in archaic and Hellenistic poetry

    NARCIS (Netherlands)

    Klooster, Julia; Bakker, Egbert J.

    J.J.H. Klooster, ‘Authenticity and autochthonous traditions in archaic and Hellenistic poetry’. In E. Bakker (ed): Authorship, Authority and Authenticity in Archaic and Classical Greek Song. Proceedings of the Network for the Study of Archaic and Classical Greek Song, Vol. 2, Leiden: Brill

  9. An enhanced iris recognition and authentication system using ...

    African Journals Online (AJOL)

    Iris recognition and authentication has a major issue in its code generation and verification accuracy, in order to enhance the authentication process, a binary bit sequence of iris is generated, which contain several vital information that is used to calculate the Mean Energy and Maximum Energy that goes into the eye with an ...

  10. Consideration of historical authenticity in heritage tourism planning and development

    Science.gov (United States)

    Craig Wiles; Gail Vander Stoep

    2008-01-01

    A review of heritage tourism literature reveals a fundamental tension over the use, function, and degree of authenticity of historic resources used for tourism development. Using a case study approach, this paper explores how stakeholder beliefs regarding historical authenticity influence the heritage tourism products, services, and experiences created for visitors and...

  11. Claims-Based Authentication for a Web-Based Enterprise

    Science.gov (United States)

    2013-07-01

    Authentication Service V5), updated by RFC 4537 and 5021 g. RFC 4510 Lightweight Directory Access Protocol ( LDAP ): Technical Specification Road Map...June 2006 h. Authentication Methods for LDAP . M. Wahl, H. Alvestrand, J. Hodges, R.L. Morgan. IETF RFC 2829, May 2000. [7] United States

  12. The role of authenticity in electoral social media campaigns

    NARCIS (Netherlands)

    G. Grow (Gabrielle); J.R. Ward (Janelle)

    2013-01-01

    textabstractAuthenticity is a popular buzzword in electoral politics: Electoral candidates and politicians are expected to be authentic in their public interactions. Since 2008, campaigning via social media has become an integral part of elections in the United States, and continues to gain

  13. Analytical authentication of organic products: an overview of markers

    NARCIS (Netherlands)

    Capuano, E.; Boerrigter-Eenling, G.R.; Veer, van der G.; Ruth, van S.M.

    2013-01-01

    Consumers' interest in organic foods is increasing and so is the need for robust analytical tools for their authentication. This review focuses on the most promising biomarkers/analytical approaches that are available for the authentication of organic produce. Food products have been subdivided into

  14. Authentic Leadership--Is It More than Emotional Intelligence?

    Science.gov (United States)

    Duncan, Phyllis; Green, Mark; Gergen, Esther; Ecung, Wenonah

    2017-01-01

    One of the newest theories to gain widespread interest is authentic leadership. Part of the rationale for developing a model and subsequent instrument to measure authentic leadership was a concern that the more popular theory, the full range model of leadership and its instrument, the Multifactor Leadership Questionnaire (MLQ) (Bass & Avolio,…

  15. Banknote authentication using chaotic elements technology

    Science.gov (United States)

    Ambadiyil, Sajan; P. S., Krishnendu; Mahadevan Pillai, V. P.; Prabhu, Radhakrishna

    2017-10-01

    The counterfeit banknote is a growing threat to the society since the advancements in the field of computers, scanners and photocopiers, as they have made the duplication process for banknote much simpler. The fake note detection systems developed so far have many drawbacks such as high cost, poor accuracy, unavailability, lack of user-friendliness and lower effectiveness. One possible solution to this problem could be the use of a system uniquely linked to the banknote itself. In this paper, we present a unique identification and authentication process for the banknote using chaotic elements embedded in it. A chaotic element means that the physical elements are formed from a random process independent from human intervention. The chaotic elements used in this paper are the random distribution patterns of such security fibres set into the paper pulp. A unique ID is generated from the fibre pattern obtained from UV image of the note, which can be verified by any person who receives the banknote to decide whether the banknote is authentic or not. Performance analysis of the system is also studied in this paper.

  16. Analytical Methods in Tracing Honey Authenticity.

    Science.gov (United States)

    Trifković, Jelena; Andrić, Filip; Ristivojević, Petar; Guzelmeric, Etil; Yesilada, Erdem

    2017-07-01

    Honey is a precious natural product that is marketed with a wide range of nutritional and medicinal properties. However, it is also a product subjected to frequent adulteration through mislabeling and mixing with cheaper and lower-quality honeys and various sugar syrups. In that sense, honey authentication regarding its genuine botanical and geographical origins, as well as the detection of any adulteration, is essential in order to protect consumer health and to avoid competition that could create a destabilized market. Various analytical techniques have been developed to detect adulterations in honey, including measuring the ratios of stable isotopes (mostly 13C/12C) and the use of different spectroscopic, chromatographic, and electrochemical methods. This review aims to provide a cross-section of contemporary analytical methods used for the determination of honey authenticity in order to help the scientific community engaged in the field of honey chemistry make appropriate choices and select the best applications that should lead to improvements in the detection and elimination of fraudulent practices in honey manufacturing.

  17. A Nuclear Medthod to Authenticate Buddha Images

    International Nuclear Information System (INIS)

    Khaweerat, S.; Ratanatongchai, W.; Channuie, J.; Wonglee, S.; Picha, R.; Promping, J.; Silva, K.; Liamsuwan, T.

    2014-01-01

    The value of Buddha images in Thailand change dramatically depending on authentication and provenance. In general, people use their individual skills to make justification which frequently lead to obscurity, deception and unlawful activities. Here, we proposed a non-destructive technique of neutron-activation-autoradiography to reveal structural and elemental profiles of small Buddha images. With neutron flux of 1012 cm-2s-1, irradiation conditions were varied from 10 seconds to 1 hour for obtaining wide range of elemental composition in objects. Autoradiograph of particular objects demonstrates unique profiles at a time. In complimentary with INAA qualitative data, the profile integration was carried out. Similarity of profile plays a key role in object classification. The genuine profile was established and used as prototype model to compare with other suspects. The results provide significant evidences to ensure the accurate justification. On the other hand, the method can be further developed for routine practice which impact thousands of customers. TINT is possible to be only one authorized organization in Thailand to provide authentication certification of Buddha images in the near future.

  18. LDRD final report :

    Energy Technology Data Exchange (ETDEWEB)

    Brost, Randolph C.; McLendon, William Clarence,

    2013-01-01

    Modeling geospatial information with semantic graphs enables search for sites of interest based on relationships between features, without requiring strong a priori models of feature shape or other intrinsic properties. Geospatial semantic graphs can be constructed from raw sensor data with suitable preprocessing to obtain a discretized representation. This report describes initial work toward extending geospatial semantic graphs to include temporal information, and initial results applying semantic graph techniques to SAR image data. We describe an efficient graph structure that includes geospatial and temporal information, which is designed to support simultaneous spatial and temporal search queries. We also report a preliminary implementation of feature recognition, semantic graph modeling, and graph search based on input SAR data. The report concludes with lessons learned and suggestions for future improvements.

  19. Caltech campus executive LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Shepodd, Timothy J.; Knudsen, Tamara

    2013-01-01

    The environment most brain systems of humans and other animals are almost constantly confronted with is complex and continuously changing, with each time step updating a potentially bewildering set of opportunities and demands for action. Far from the controlled, discrete trials used in most neuro- and psychological investigations, behavior outside the lab at Caltech is a seamless and continuous process of monitoring (and error correction) of ongoing action, and of evaluating persistence in the current activity with respect to opportunities to switch tasks as alternatives become available. Prior work on frontopolar and prefrontal task switching, use tasks within the same modality (View a stream of symbols on a screen and perform certain response mappings depending on task rules). However, in these task switches the effector is constant: only the mapping of visual symbols to the specific button changes. In this task, the subjects are choosing what kinds of future action decisions they want to perform, where they can control either which body part will act, or which direction they will orient an instructed body action. An effector choice task presents a single target and the subject selects which effector to use to reach the target (eye or hand). While the techniques available for humans can be less spatially resolved compared to non-human primate neural data, they do allow for experimentation on multiple brain areas with relative ease. Thus, we address a broader network of areas involved in motor decisions. We aim to resolve a current dispute regarding the specific functional roles of brain areas that are often co-activated in studies of decision tasks, dorsal premotor cortex(PMd) and posterior parietal cortex(PPC). In one model, the PPC distinctly drives intentions for action selection, whereas PMd stimulation results in complex multi-joint movements without any awareness of, nor subjective feeling of, willing the elicited movement, thus seems to merely help execute the chosen action.

  20. LDRD Annual Report.

    Energy Technology Data Exchange (ETDEWEB)

    Sweany, Melinda [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-10-01

    This is a high-risk effort to leverage knowledge gained from previous work, which focused on detector development leading to better energy resolution and reconstruction errors. This work seeks to enable applications that require precise elemental characterization of materials, such as chemical munitions remediation, offering the potential to close current detection gaps.

  1. Final LDRD report :

    Energy Technology Data Exchange (ETDEWEB)

    Kronawitter, Coleman X.; Antoun, Bonnie R.; Mao, Samuel S.

    2012-01-01

    The distinction between electricity and fuel use in analyses of global power consumption statistics highlights the critical importance of establishing efficient synthesis techniques for solar fuelsthose chemicals whose bond energies are obtained through conversion processes driven by solar energy. Photoelectrochemical (PEC) processes show potential for the production of solar fuels because of their demonstrated versatility in facilitating optoelectronic and chemical conversion processes. Tandem PEC-photovoltaic modular configurations for the generation of hydrogen from water and sunlight (solar water splitting) provide an opportunity to develop a low-cost and efficient energy conversion scheme. The critical component in devices of this type is the PEC photoelectrode, which must be optically absorptive, chemically stable, and possess the required electronic band alignment with the electrochemical scale for its charge carriers to have sufficient potential to drive the hydrogen and oxygen evolution reactions. After many decades of investigation, the primary technological obstacle remains the development of photoelectrode structures capable of efficient conversion of light with visible frequencies, which is abundant in the solar spectrum. Metal oxides represent one of the few material classes that can be made photoactive and remain stable to perform the required functions.

  2. Authentic Italian food as Mamma used to make it

    DEFF Research Database (Denmark)

    d'Ambrosio, Luigi; Madsen, Jan Halberg

    2014-01-01

    Research description and purpose: The purpose of this investigation is to explore how Italian restaurants define authentic Italian culinary experiences and how these experiences are designed and rendered to the restaurants’ guests. Design/Methodology: The purpose of this research is exploratory...... are unique to this case and cannot be expected replicated, nor generalized. Originality/value: This article investigates how the authentic Italian culinary experience is defined and designed by restaurant owners or managers in the specific context of the city of Aalborg, Denmark. The originality...... of this research resides in the contribution to a better understanding of how authentic experiences are defined and designed at the supply side in the restaurant industry. Moreover, this article takes on a critical perspective on Gilmore and Pine’s genres of authenticity. Keywords: Genres of authenticity, culinary...

  3. A Secure Mobility Network Authentication Scheme Ensuring User Anonymity

    Directory of Open Access Journals (Sweden)

    Ya-Fen Chang

    2017-12-01

    Full Text Available With the rapid growth of network technologies, users are used to accessing various services with their mobile devices. To ensure security and privacy in mobility networks, proper mechanisms to authenticate the mobile user are essential. In this paper, a mobility network authentication scheme based on elliptic curve cryptography is proposed. In the proposed scheme, a mobile user can be authenticated without revealing who he is for user anonymity, and a session key is also negotiated to protect the following communications. The proposed mobility network authentication scheme is analyzed to show that it can ensure security, user anonymity, and convenience. Moreover, Burrows-Abadi-Needham logic (BAN logic is used to deduce the completeness of the proposed authentication scheme.

  4. Development of anti-counterfeit consumer product authentication system

    Directory of Open Access Journals (Sweden)

    Olena V. Narimanova

    2015-06-01

    Full Text Available Aim of the research is to develop an anti-counterfeit consumer product authentication system. The main requirements for this system are formulated, the choice of method of consumer product authentication is substantiated. The scheme of anti-counterfeit consumer product authentication system is developed basing on previously proposed method of checking the QR-code integrity and authenticity. The proposed within the system consumer product authentication technology is simple, economical for implementation, does not require the external changes of product packaging, does not affect existing production process. The technology can be recommended for the use to private businesses and government institutions that are interested in the security of their products from counterfeiting, as well as tracking and removing from circulation the counterfeit consumer products.

  5. Development of a Mobile EEG-based Biometric Authentication System

    DEFF Research Database (Denmark)

    Klonovs, Juris; Petersen, Christoffer Kjeldgaard; Olesen, Henning

    In recent years the need for greater security for storing personal and business data or accessing corporate networks on mobile devices is growing rapidly, and one of the potential solutions is to employ the innovative biometric authentication techniques. This paper presents the development...... of a mobile biometric authentication system based on electroencephalogram (EEG) recordings in combination with already proven technologies such as facial detection and near-field communication (NFC). The overall goal of this work is to fill the gap between mobile web technologies and wireless EEG devices...... and present a mobile prototype system capable of authenticating users based on the uniqueness of their brainwaves. Furthermore, we implement a novel authentication process, which leads the authentication system to be more secure. We also give suggestions for future improvements of the system....

  6. The influence of trait-emotional intelligence on authentic leadership

    Directory of Open Access Journals (Sweden)

    Martina Kotzé

    2015-11-01

    Full Text Available Orientation: Authentic leadership is a relatively new construct that has recently gained increasing attention resulting from challenges faced by organisations relating to ethical meltdowns, corruption and fraud. Research purpose: This study seeks to explore the relationship between components of emotional intelligence and authentic leadership. Motivation for the study: Several authors called for more empirical investigations into the antecedents of authentic leadership. Despite the important role that emotions play in leadership, empirical studies were lacking about the influence of different components of emotional intelligence to authentic leadership. Research design, approach and method: Data were collected, using questionnaires obtained from 341 full-time employed applicants to MBA and leadership programmes in a South African Business School. Relationships between variables were analysed, using Pearson product-moment correlations and stepwise multiple regression. Main findings: The results indicated that emotional intelligence has positive statistically significant associations with authentic leadership. Specifically, those who scored high on all the emotional intelligence components also scored high on authentic leadership. In addition, the emotional intelligence component of empathy was a statistically significant predictor of authentic leadership. Practical/managerial implications: Initial findings suggest the potential value of recognising and developing the emotional intelligence of leaders to enable them to lead their organisations authentically to desired, successful outcomes. As empathy has been shown to be the most important emotional intelligence predictor of authentic leadership, leaders need to understand when subordinates perceive a leader as displaying empathic emotion. Contribution: This study contributes to the literature and empirical research on the antecedents of authentic leadership.

  7. Synergy between Authentic Assessment Activities and Learner Autonomy: How Does This Promote Shared Authenticity in Online Higher Education?

    Science.gov (United States)

    Gikandi, Joyce

    2013-01-01

    The purpose of this study was to establish whether and how authentic assessment activities and learner autonomy converged to productively engage both the teacher and learners in shared authenticity. The study employed case study methodology to investigate the phenomena within an online course in ICT designed for continuing professionals in…

  8. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    Directory of Open Access Journals (Sweden)

    Seung-hwan Ju

    2013-01-01

    Full Text Available The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  9. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    Science.gov (United States)

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  10. A study on user authentication methodology using numeric password and fingerprint biometric information.

    Science.gov (United States)

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  11. State Authenticity as Fit to Environment: The Implications of Social Identity for Fit, Authenticity, and Self-Segregation.

    Science.gov (United States)

    Schmader, Toni; Sedikides, Constantine

    2017-10-01

    People seek out situations that "fit," but the concept of fit is not well understood. We introduce State Authenticity as Fit to the Environment (SAFE), a conceptual framework for understanding how social identities motivate the situations that people approach or avoid. Drawing from but expanding the authenticity literature, we first outline three types of person-environment fit: self-concept fit, goal fit, and social fit. Each type of fit, we argue, facilitates cognitive fluency, motivational fluency, and social fluency that promote state authenticity and drive approach or avoidance behaviors. Using this model, we assert that contexts subtly signal social identities in ways that implicate each type of fit, eliciting state authenticity for advantaged groups but state inauthenticity for disadvantaged groups. Given that people strive to be authentic, these processes cascade down to self-segregation among social groups, reinforcing social inequalities. We conclude by mapping out directions for research on relevant mechanisms and boundary conditions.

  12. Integrated analytical study for the authentication of five Russian icons (XVI-XVII centuries).

    Science.gov (United States)

    Sandu, Irina Crina Anca; Bracci, Susanna; Sandu, Ion; Lobefaro, Mariella

    2009-10-01

    This article presents an integrated approach for the authentication of five Russian icons through the study of their paint materials (elemental composition and stratigraphic mapping), state of conservation and artistic technique. The results of the applied analytical protocol, involving optical and scanning electron microscopy coupled with energy-dispersive X-ray spectrometry and Fourier transformed infrared spectroscopy/microspectroscopy, led to the conclusion that the five icons belong to the same group and iconographic school (from Northern Russia) and date from the end of the 16th century to the beginning of 17th century. Because of massive overpainting, the icons "suffered" a change in iconographic style and significance, and restoration treatment brought to light the original painting and its attribution. Identification of the composition of the original chromatic palette used by the iconographer, the stratigraphic mapping and the conservation state of the painting materials, along with the features of the original artistic technique, furnished key elements for the icons' authentication. Here, we present the first experimental data concerning the identification of the authentication characteristics, being part of a large project that has as its final aim the evaluation of the effectiveness and effects of the cleaning agent on the paint layers.

  13. AUTHENTICITY, IDENTITY AND SUSTAINABILITY IN POST-WAR IRAQ: Reshaping the Urban Form of Erbil City

    Directory of Open Access Journals (Sweden)

    Rebwar Ibrahim

    2014-12-01

    Full Text Available Issues of authenticity and identity are particularly significant in cities where social and cultural change is shaping active transformation of its urban fabric and structure in the post-war condition. In search of sustainable future, Iraqi cities are stretched between the two ends of the spectrum, authentic quarters with its traditional fabric and modern districts with their global sense of living. This paper interrogates the reciprocal influences and distinct qualities and sustainable performance of both authentic and modern quarters of Erbil, the capital of the Iraqi province of Kurdistan, as factors in shaping sustainable urban forms for Iraqi cities. In doing so, the paper, firstly, seeks to highlight the urban identity as an effective factor in relation to sustainable urban form. Secondly, the city of Erbil in Iraq has been chosen as a field study, due to its regional, social, political and historical role in the region. Thirdly, the study emphasises the dynamic activities and performance of residential projects according to rational sustainable criteria. The research concludes that urban identity and the sense of place in traditional and historical places should inform design strategies in order to achieve a more sustainable urban context.

  14. Multimodal Authentication - Biometric Password And Steganography

    Directory of Open Access Journals (Sweden)

    Alvin Prasad

    2017-06-01

    Full Text Available Security is a major concern for everyone be it individuals or organizations. As the nature of information systems is becoming distributed securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

  15. Teaching Air Pollution in an Authentic Context

    Science.gov (United States)

    Mandrikas, Achilleas; Stavrou, Dimitrios; Skordoulis, Constantine

    2017-04-01

    This paper describes a teaching-learning sequence (TLS) about air pollution and the findings resulting from its implementation by pre-service elementary teachers (PET) currently undergraduate students of the Department of Primary Education in the National and Kapodistrian University of Athens, Greece. The TLS focused on the relation of air pollution with wind and topography in local conditions. An authentic context was provided to the students based on daily up-to-date meteorological data via the Internet in order to estimate air pollution. The results are encouraging given that PET can correlate wind and concentration of air pollutants through reading specialized angular diagrams and weather maps, can recognize the correlation of topography in the concentration of air pollutants, and can describe temperature inversion. However, the PET demonstrated clear difficulties in ability of orientation, in wind naming, and in interpretation of symbols on weather map. Finally, the implications on teaching air pollution are discussed.

  16. [Molecular ecology of Gardenia jasminoides authenticity].

    Science.gov (United States)

    Han, Jianping; Chen, Shilin; Zhang, Wen-Sheng; Wang, Yongyan

    2006-12-01

    By using amplified fragment length polymorphism (AFLP) markers, this paper studied the genetic relationships among five wild or cultivated Gardenia jasminoides Ellis populations in Jiangxi Province. Chemical fingerprint was also built with HPLC method. The results showed that there was a great genetic difference among these samples. The UPGMA obtained with NTSYS-PC 2. 10e software suggested that there were seven branches of population, and the population from near geographical location clustered firstly. The geniposide content of these branches was not correlated with UPGMA. It could be concluded that the authenticity was resulted from the co-action of genotype and environmental change. The microelements content in G. jasminoides fruit measured by inductively coupled plasma showed that there was a negative correlation between Zn and geniposide contents.

  17. User Authentication Mechanisms for Remote Education Systems

    Directory of Open Access Journals (Sweden)

    Ekaterina Yurievna Gourina

    2013-02-01

    Full Text Available Systems of remote education (RE are now widespread. These systems are convenient in terms of simplicity, efficiency of education, costs, opportunities to study with a teacher when you are in different parts of the globe, to attend online lectures and seminars. The information circulating in this system is a source of making money for its owner, which of course does not want the system (and the information in it to be used by not authorized users. In this article methods of authentication in such systems is discussed, because you can put a firewall, encrypt data transmissions, etc., but if there will be free access to the server, where all the information is held — it will all be useless.

  18. Calorimetry for Fast Authentication of Edible Oils

    Science.gov (United States)

    Angiuli, Marco; Bussolino, Gian Carlo; Ferrari, Carlo; Matteoli, Enrico; Righetti, Maria Cristina; Salvetti, Giuseppe; Tombari, Elpidio

    2009-06-01

    There are little data in the literature on how to authenticate edible oils through calorimetry techniques. However, oil melting curves can be used to represent correlations between calorimetric results and oil quality. A calorimetric method has been developed for studying the solid-liquid phase transitions of olive oil and seed oils, in which melting peak behavior is correlated to the type, quality, and composition of the oil. Good reproducible thermograms were obtained by defining precise protocols for use in testing, which take into account the specific characteristics of a particular oil. This approach does not replace classical analytical methods; nevertheless, it is believed that calorimetric tests could be a useful preliminary stage for quality testing. The calorimetric technique allows the detection of the adulterant (seed oils or refined olive oil), oil origin, and possible photo-oxidation degradation processes, before more complex and expensive procedures and analyses are applied.

  19. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  20. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  1. Heidegger's "authenticity" in the psychotherapy of adolescents.

    Science.gov (United States)

    Chessick, R D

    1996-01-01

    Those aspects of Heidegger's thought culminating in his notion of "authenticity" are described, and the use of his concepts in the psychotherapy of certain adolescents is suggested. This paper offers some details of Heidegger's position and its applicability to psychotherapy. Heidegger attempted to get around the scientistic attitude of our time by use of a phenomenological description of how we actually live our lives. He described what he called our inauthentic immersion in the "they" or the everyday of life, which he argued generates self-forgetfulness, self-centeredness, an anxious sense of life having no meaning or value, and the convinction that nothing really matters. In that situation only peak experiences or "thrills" such as sexual ecstasy, dangerous exploits, fights, or drugs are used to "make it all worthwhile." These are typical complaints and descriptions from adolescent (as well as borderline) patients, of course, and represent self pathology or a possibly temporary state of identity diffusion. Heidegger's solution, one which can be used with certain intellectually inclined adolescents who are not judged suitable for uncovering psychotherapy at the time, is a kind of self-focussing. In this procedure one stands back and reviews options and possibilities in the attempt to shape one's life in accordance with ideals and values that are determined by actual focus on them rather than by a mindless immersion in everyday practices. I suggest that this kind of intellectual exchange with certain adolescents, especially if it is accompanied by a proper idealizing relationship, has as its value the development of an increased sense of cohesiveness of the self, and a sense of meaningful and authentic living in which life begins to attain a unified flow characterized by cumulativeness and direction that can be articulated in a temporal narrative. The encouragement of such a narrative is a worthwhile tactic to consider in the psychotherapy of certain adolescents.

  2. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  3. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  4. Authentic Astronomical Discovery in Planetariums: Data-Driven Immersive Lectures

    Science.gov (United States)

    Wyatt, Ryan Jason

    2018-01-01

    Planetariums are akin to “branch offices” for astronomy in major cities and other locations around the globe. With immersive, fulldome video technology, modern digital planetariums offer the opportunity to integrate authentic astronomical data into both pre-recorded shows and live lectures. At the California Academy of Sciences Morrison Planetarium, we host the monthly Benjamin Dean Astronomy Lecture Series, which features researchers describing their cutting-edge work to well-informed lay audiences. The Academy’s visualization studio and engineering teams work with researchers to visualize their data in both pre-rendered and real-time formats, and these visualizations are integrated into a variety of programs—including lectures! The assets are then made available to any other planetariums with similar software to support their programming. A lecturer can thus give the same immersive presentation to audiences in a variety of planetariums. The Academy has also collaborated with Chicago’s Adler Planetarium to bring Kavli Fulldome Lecture Series to San Francisco, and the two theaters have also linked together in live “domecasts” to share real-time content with audiences in both cities. These lecture series and other, similar projects suggest a bright future for astronomers to bring their research to the public in an immersive and visually compelling format.

  5. A robust cloud access scheme with mutual authentication

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2016-01-01

    Full Text Available Due to the progress of network technology, we can access some information through remote servers, and we also can save and access lots of personal data in remote servers. Therefore, to protect these data and resist unauthorized access is an important issue. Some researchers proposed authentication scheme, but there still exist some security weaknesses. This article is based on the concept of HDFS (Hadoop Distributed File System, and offers a robust authentication scheme. The proposed scheme achieves mutual authentication, prevents re-play attack, solves asynchronous issue, and prevents offline password guessing attack.

  6. Teaching Children Foreign-Language Grammar: Are Authentic Materials Appropriate?

    Directory of Open Access Journals (Sweden)

    Olga Malova

    2016-10-01

    Full Text Available The paper discusses authentic materials as a resource for teaching grammar to young learners. Difficulties in foreign-language grammar learning for Russian pupils are presented, and typical challenges are described. The paper provides a pre-/post-intervention study of the development of children’s grammar skills. The research question is, “How does one use authentic materials for teaching grammar in an English as a foreign language (EFL classroom?” A qualitative method is used to assess the learning outcomes of using authentic materials in teaching grammar to eight–nine-year-old pupils (the second year of studying English.

  7. Xavier's Take on Authentic Writing: Structuring Choices for Expression and Impact

    Science.gov (United States)

    Behizadeh, Nadia

    2015-01-01

    Because authenticity in education is a subjective judgment regarding the meaningfulness of an activity, a need exists to co-investigate with students classroom factors increasing authenticity of writing. In this case study, one 8th grade student's needs for authentic writing are explored in detail. Xavier's take on authentic writing…

  8. A New Construction of Multisender Authentication Codes from Polynomials over Finite Fields

    Directory of Open Access Journals (Sweden)

    Xiuli Wang

    2013-01-01

    Full Text Available Multisender authentication codes allow a group of senders to construct an authenticated message for a receiver such that the receiver can verify the authenticity of the received message. In this paper, we construct one multisender authentication code from polynomials over finite fields. Some parameters and the probabilities of deceptions of this code are also computed.

  9. A Construction of Multisender Authentication Codes with Sequential Model from Symplectic Geometry over Finite Fields

    Directory of Open Access Journals (Sweden)

    Shangdi Chen

    2014-01-01

    Full Text Available Multisender authentication codes allow a group of senders to construct an authenticated message for a receiver such that the receiver can verify authenticity of the received message. In this paper, we construct multisender authentication codes with sequential model from symplectic geometry over finite fields, and the parameters and the maximum probabilities of deceptions are also calculated.

  10. A New Construction of Multisender Authentication Codes from Pseudosymplectic Geometry over Finite Fields

    Directory of Open Access Journals (Sweden)

    Xiuli Wang

    2013-01-01

    Full Text Available Multisender authentication codes allow a group of senders to construct an authenticated message for one receiver such that the receiver can verify authenticity of the received message. In this paper, we construct one multisender authentication code from pseudosymplectic geometry over finite fields. The parameters and the probabilities of deceptions of this code are also computed.

  11. CosmoQuest: Creative Engagement & Citizen Science Ignite Authentic Science

    Science.gov (United States)

    Cobb, W. H.; Noel-Storr, J.; Tweed, A.; Asplund, S.; Aiello, M. P.; Lebofsky, L. A.; Chilton, H.; Gay, P.

    2016-12-01

    The CosmoQuest Virtual Research Facility offers in-depth experiences to diverse audiences nationally and internationally through pioneering citizen science. An endeavor between universities, research institutes, and NASA centers, CosmoQuest brings together scientists, educators, researchers, programmers—and individuals of all ages—to explore and make sense of our solar system and beyond. CosmoQuest creates pathways for engaging diverse audiences in authentic science, encouraging scientists to engage with learners, and learners to engage with scientists. Here is a sequence of activities developed by CosmoQuest, leveraging a NASA Discovery and New Frontiers Programs activity developed for the general STEAM community, that activates STEM learning. The Spark: Igniting Curiosity Art and the Cosmic Connection uses the elements of art—shape, line, color, texture, value—to hone observation skills and inspire questions. Learners explore NASA image data from celestial bodies in our solar system—planets, asteroids, moons. They investigate their geology, analyzing features and engaging in scientific discourse rising from evidence while creating a beautiful piece of art. The Fuel: Making Connections Crater Comparisons explore authentic NASA image data sets, engrossing learners at a deeper level. With skills learned in Art and the Cosmic Connection, learners analyze specific image sets with the feedback of mission team members. The Burn: Evolving Community Become a Solar System Mapper. Investigate and analyze NASA mission image data of Mars, Mercury, the Moon and Vesta through CosmoQuest's citizen science projects. Learners make real-world connections while contributing to NASA science. Scaffolded by an educational framework that inspires 21st century learners, CosmoQuest engages people in analyzing and interpreting real NASA data, inspiring questions, defining problems, and realizing their potential to contribute to genuine scientific results. Through social channels

  12. Predictive role of authenticity on psychological vulnerability in Turkish university students.

    Science.gov (United States)

    Satici, Seydi Ahmet; Kayis, Ahmet Rifat; Akin, Ahmet

    2013-04-01

    Authenticity is associated with adaptive psychological characteristics and may be predictive of psychological vulnerability. The study was conducted with Turkish university students (N = 303; 158 women, 145 men; M age = 20.1 yr.). Participants completed the Turkish version of Authenticity Scale and the Psychological Vulnerability Scale. Psychological vulnerability was correlated positively with two subfactors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor of authenticity. Self-alienation, accepting external influence, and authentic living were related to psychological vulnerability, accounting for 33% of the variance collectively. Authenticity is an important predictor of psychological vulnerability.

  13. Authentication for Propulsion Test Streaming Video

    Data.gov (United States)

    National Aeronautics and Space Administration — A streaming video system was developed and implemented at SSC to support various propulsion projects at SSC. These projects included J-2X and AJ-26 rocket engine...

  14. Study of Wireless Authentication Center with Mixed Encryption in WSN

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2016-01-01

    Full Text Available WSN (wireless sensor network has been used in a wide range of applications nowadays. Sensor networks may often relay critical data; thus, security must be a high priority. However, due to their limited computational, energy, and storage resources, sensor nodes are vulnerable to attack. So how to protect sensor nodes from attacks without raising computational capability and energy consumption is a worthwhile issue. A WAC (wireless authentication center with mixed encryption named “MEWAC” is proposed. MEWAC is based on MCU (Microcontroller Unit and WiFi (Wireless Fidelity module and uses RSA, AES (Advanced Encryption Standard, and SHA-1 (Secure Hash Algorithm 1 to provide high performance authentication and data encryption services for sensor nodes. The experimental results show that MEWAC has the advantages of low cost, low power consumption, good performance, and stability; moreover, the authentication protocol improves the security of WSN and reduces the overhead in node authentication.

  15. Advanced information processing system: Authentication protocols for network communication

    Science.gov (United States)

    Harper, Richard E.; Adams, Stuart J.; Babikyan, Carol A.; Butler, Bryan P.; Clark, Anne L.; Lala, Jaynarayan H.

    1994-01-01

    In safety critical I/O and intercomputer communication networks, reliable message transmission is an important concern. Difficulties of communication and fault identification in networks arise primarily because the sender of a transmission cannot be identified with certainty, an intermediate node can corrupt a message without certainty of detection, and a babbling node cannot be identified and silenced without lengthy diagnosis and reconfiguration . Authentication protocols use digital signature techniques to verify the authenticity of messages with high probability. Such protocols appear to provide an efficient solution to many of these problems. The objective of this program is to develop, demonstrate, and evaluate intercomputer communication architectures which employ authentication. As a context for the evaluation, the authentication protocol-based communication concept was demonstrated under this program by hosting a real-time flight critical guidance, navigation and control algorithm on a distributed, heterogeneous, mixed redundancy system of workstations and embedded fault-tolerant computers.

  16. A digital memories based user authentication scheme with privacy preservation.

    Science.gov (United States)

    Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang

    2017-01-01

    The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.

  17. Increasing Authenticity of Simulation-Based Assessment in Diagnostic Radiology

    NARCIS (Netherlands)

    van der Gijp, Anouk; Ravesloot, Cécile J.; Tipker, Corinne A.; de Crom, Kim; Rutgers, Dik R.; van der Schaaf, Marieke F.; van der Schaaf, Irene C.; Mol, Christian P.; Vincken, Koen L.; ten Cate, Olle Th J.; Maas, Mario; van Schaik, Jan P. J.

    2017-01-01

    Introduction: Clinical reasoning in diagnostic imaging professions is a complex skill that requires processing of visual information and image manipulation skills. We developed a digital simulation-based test method to increase authenticity of image interpretation skill assessment. Methods: A

  18. Authenticity and psychiatric disorder: does autonomy of personal preferences matter?

    Science.gov (United States)

    Sjöstrand, Manne; Juth, Niklas

    2014-02-01

    In healthcare ethics there is a discussion regarding whether autonomy of personal preferences, what sometimes is referred to as authenticity, is necessary for autonomous decision-making. It has been argued that patients' decisions that lack sufficient authenticity could be deemed as non-autonomous and be justifiably overruled by healthcare staff. The present paper discusses this issue in relation certain psychiatric disorders. It takes its starting point in recent qualitative studies of the experiences and thoughts of patients' with anorexia nervosa where issues related to authenticity seem particularly relevant. The paper examines different interpretations of authenticity relevant for autonomy and concludes that the concept, as it has been elaborated in recent debate, is highly problematic to use as a criterion for autonomous decision-making in healthcare.

  19. New, More Authentic Model for AIDS Will Accelerate Studies | Poster

    Science.gov (United States)

    By Frank Blanchard, Staff Writer, and Jeff Lifson, Guest Writer Researchers are working to develop a more authentic animal model of human immunodeficiency virus (HIV) infection and AIDS that is expected to speed up studies of experimental treatments and vaccines.

  20. The analyst's authenticity: "if you see something, say something".

    Science.gov (United States)

    Goldstein, George; Suzuki, Jessica Y

    2015-05-01

    The history of authenticity in psychoanalysis is as old as analysis itself, but the analyst's authenticity in particular has become an increasingly important area of focus in recent decades. This article traces the development of conceptions of analytic authenticity and proposes that the analyst's spontaneous verbalization of his or her unformulated experience in session can be a potent force in the course of an analysis. We acknowledge that although analytic authenticity can be a challenging ideal for the analyst to strive for, it contains the power to transform the experience of the patient and the analyst, as well as the meaning of their work together. Whether it comes in the form of an insight-oriented comment or a simple acknowledgment of things as they seem to be, a therapist's willingness to speak aloud something that has lost its language is a powerful clinical phenomenon that transcends theoretical orientation and modality. © 2015 Wiley Periodicals, Inc.

  1. Advances in isotopic analysis for food authenticity testing

    DEFF Research Database (Denmark)

    Laursen, Kristian Holst; Bontempo, L.; Camin, Federica

    2016-01-01

    Abstract Stable isotope analysis has been used for food authenticity testing for more than 30 years and is today being utilized on a routine basis for a wide variety of food commodities. During the past decade, major analytical method developments have been made and the fundamental understanding...... of fractionation processes resulting in isotopic signatures suitable for food authentication has improved. In combination with an increasing use of multivariate statistics, development of new reference materials, establishment of reference sample databases, and complementation with other analytical methods, food...... authenticity testing is currently developing even further. In this chapter, we aim to provide an overview of the latest developments in stable isotope analysis for food authenticity testing. As several review articles and book chapters have recently addressed this topic, we will primarily focus on relevant...

  2. Password-based authenticated key exchange scheme using smart card

    Science.gov (United States)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  3. Towards non-repudiable authentication through biometrics and smart cards

    CSIR Research Space (South Africa)

    Msiza, I

    2012-10-01

    Full Text Available cardholder to card MDS-IS Offerings ? CSIR 2012 Slide 13 Biometric Authentication Solutions ? Fingerprint recognition systems ? Iris recognition ? Otoacoustic emissions ? Face recognition systems Smart Cards ? Smart ID systems ? Smart card designs...

  4. HPAKE : Password Authentication Secure against Cross-Site User Impersonation

    Science.gov (United States)

    Boyen, Xavier

    We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in "cross-site user impersonation" to each other.

  5. A digital memories based user authentication scheme with privacy preservation.

    Directory of Open Access Journals (Sweden)

    JunLiang Liu

    Full Text Available The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key, which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.

  6. Authentication Protocols for Internet of Things: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Mohamed Amine Ferrag

    2017-01-01

    Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

  7. Combined machine-readable and visually authenticated optical devices

    Science.gov (United States)

    Souparis, Hugues

    1996-03-01

    Optical variable devices are now widely used on documents or values. The most recent optical visual features with high definition, animation, brightness, special color tune, provide excellent first and second levels of authentication. Human eye is the only instrument required to check the authenticity. This is a major advantage of OVDs in many circumstances, such as currency exchange, ID street control . . . But, under other circumstances, such as automatic payments with banknotes, volume ID controls at boarders, ID controls in shops . . . an automatic authentication will be necessary or more reliable. When both a visual and automated authentication are required, the combination, on the same security component, of a variable image and a machine readable optical element is a very secure and cost effective solution for the protection of documents. Several techniques are now available an can be selected depending upon the respective roles of the machine readability and visual control.

  8. The Keyed-Hash Message Authentication Code (HMAC)

    National Research Council Canada - National Science Library

    2002-01-01

    .... The cryptographic strength of HMAC depends on the properties of the underlying hash function. The HMAC specification in this standard is a generalization of Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI...

  9. Pre-Authentication Schemes for UMTS-WLAN Interworking

    Directory of Open Access Journals (Sweden)

    Ali Al Shidhani

    2009-01-01

    Full Text Available Interworking Universal Mobile Telecommunication System (UMTS and IEEE 802.11 Wireless Local Area Networks (WLANs introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS of the applications running on the User Equipment (UE. There is a need to design fast and secured handover protocols to operate in UMTS-WLAN interworking architectures. This paper proposes two secured pre-authentication protocols in the UMTS-WLAN interworking architectures. Performance analysis of the proposed protocols show superior results in comparison to existing protocols in terms of authentication signaling cost, authentication delay and load on critical nodes involved in the authentication procedure. Additionally, the security of the proposed protocols was verified by the Automated Validation of Internet Security Protocols and Applications (AVISPA security analyzer.

  10. Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations

    Science.gov (United States)

    Donohue, John T.; Critchfield, Anna R.

    2000-01-01

    We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.

  11. [Application of rapid PCR to authenticate medicinal snakes].

    Science.gov (United States)

    Chen, Kang; Jiang, Chao; Yuan, Yuan; Huang, Lu-Qi; Li, Man

    2014-10-01

    To obtained an accurate, rapid and efficient method for authenticate medicinal snakes listed in Chinese Pharmacopoeia (Zaocysd humnades, Bungarus multicinctus, Agkistrodon acutus), a rapid PCR method for authenticate snakes and its adulterants was established based on the classic molecular authentication methods. DNA was extracted by alkaline lysis and the specific primers were amplified by two-steps PCR amplification method. The denatured and annealing temperature and cycle numbers were optimized. When 100 x SYBR Green I was added in the PCR product, strong green fluorescence was visualized under 365 nm UV whereas adulterants without. The whole process can complete in 30-45 minutes. The established method provides the technical support for authentication of the snakes on field.

  12. Implementation of Keystroke Dynamics for Authentication in Computer Systems

    Directory of Open Access Journals (Sweden)

    S. V. Skuratov

    2010-06-01

    Full Text Available Implementation of keystroke dynamics in multifactor authentication systems is described in the article. Original access control system based on totality of matchers is presented. Testing results and useful recommendations are also adduced.

  13. UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks

    Directory of Open Access Journals (Sweden)

    Jin Cao

    2018-01-01

    Full Text Available Machine Type Communication (MTC, as one of the most important wireless communication technologies in the future wireless communication, has become the new business growth point of mobile communication network. It is a key point to achieve seamless handovers within Evolved-Universal Terrestrial Radio Access Network (E-UTRAN for massive MTC (mMTC devices in order to support mobility in the Long Term Evolution-Advanced (LTE-A networks. When mMTC devices simultaneously roam from a base station to a new base station, the current handover mechanisms suggested by the Third-Generation Partnership Project (3GPP require several handover signaling interactions, which could cause the signaling load over the access network and the core network. Besides, several distinct handover procedures are proposed for different mobility scenarios, which will increase the system complexity. In this paper, we propose a simple and secure uniform group-based handover authentication scheme for mMTC devices based on the multisignature and aggregate message authentication code (AMAC techniques, which is to fit in with all of the mobility scenarios in the LTE-A networks. Compared with the current 3GPP standards, our scheme can achieve a simple authentication process with robust security protection including privacy preservation and thus avoid signaling congestion. The correctness of the proposed group handover authentication protocol is formally proved in the Canetti-Krawczyk (CK model and verified based on the AVISPA and SPAN.

  14. AUTHENTIC MATERIALS VS TEXTBOOKS IN ESP (ENGLISH FOR SPECIFIC PURPOSES

    Directory of Open Access Journals (Sweden)

    Elena Spirovska Tevdovska

    2018-03-01

    Full Text Available The purpose of this study is to analyze and compare the value of authentic materials and textbooks in ESP English for Specific Purposes learning and teaching context. The study compares the characteristics of the authentic materials and the characteristics of textbooks designed and selected for the purpose of teaching and learning English as a foreign language in ESP setting. The study defines the role of materials in ESP setting and compares the benefits and possible drawbacks of both types of materials and resources: the authentic materials in English for Specific Purposes context compared to traditional textbooks designed for the purpose of teaching and learning English for Specific Purposes. The study identifies the benefits of authentic materials, which include the richness as an input source and the authenticity of the tasks offered to learners, as well as the negative sides of authentic materials, which include the level of difficulty that these materials might present to the learner . Furthermore, the study identifies the benefits of textbooks, which include available sources for the learners and less time consuming class preparation for the teachers, as well as the drawbacks which include the impossibility of finding a textbook which corresponds entirely to learners’ needs. In addition, the article focuses on teachers’ attitudes and opinions regarding the appropriateness and exploitability of each source and their preferences and reasons for material selection. The target population consists of eleven lecturers who teach English for Specific Purposes in tertiary education. The lecturers teach various branches of ESP, including ESP for Computer Sciences, Business, Communication and Legal Studies. Data collection is conducted through a specifically designed questionnaire, addressing the questions of materials selection, teachers’ preferences regarding textbooks or authentic materials and the selection criteria applied by the

  15. New authentication mechanism using certificates for big data analytic tools

    OpenAIRE

    Velthuis, Paul

    2017-01-01

    Companies analyse large amounts of sensitive data on clusters of machines, using a framework such as Apache Hadoop to handle inter-process communication, and big data analytic tools such as Apache Spark and Apache Flink to analyse the growing amounts of data. Big data analytic tools are mainly tested on performance and reliability. Security and authentication have not been enough considered and they lack behind. The goal of this research is to improve the authentication and security for data ...

  16. A speaker recognition solution for identification and authentication

    OpenAIRE

    2014-01-01

    M.Com. (Informatics) A certain degree of vulnerability exists in traditional knowledge-based identification and authentication access control, as a result of password interception and social engineering techniques. This vulnerability has warranted the exploration of additional identification and authentication approaches such as physical token-based systems and biometrics. Speaker recognition is one such biometric approach that is currently not widely used due to its inherent technological...

  17. Authenticity and place attachment of major visitor attractions

    OpenAIRE

    Ram, Yael; Bjork, Peter; Weidenfeld, Adi

    2016-01-01

    This paper aims to explore the relationships between place attachment and perceived authenticity of major visitor attractions. The empirical study was conducted with a sample of international tourists to major visitor attractions in two capital cities, Helsinki, Finland and Jerusalem, Israel. The results indicate a positive correlation between place attachment and authenticity. Major visitor attractions located in places with considerable heritage experience value are considered more authenti...

  18. Ethical Selves : A Sketch for a Theory of Relational Authenticity

    OpenAIRE

    Fletcher, Natalie

    2013-01-01

    Philosophers who show interest in authenticity tend to narrowly focus on its capacity to help people evade conformity and affirm individuality, a simplistic reduction that neglects authenticity’s moral potential and gives credence to the many critics who dismiss it as a euphemism for excessive individualism. Yet when conceived relationally, authenticity can also allow for worthy human flourishing without falling prey to conformity’s opposite extreme—egoism. This essay proposes a sketch for a ...

  19. Beneficiary contact moderates relationship between authentic leadership and engagement

    Directory of Open Access Journals (Sweden)

    Caren B. Scheepers

    2016-07-01

    Full Text Available Orientation: Beneficiary contact moderates the relationship between authentic leadership and work engagement. Research purpose: The objective of this study was to examine the moderating effect of the breadth, depth and frequency of employee interaction with the beneficiaries of their work on the positive impact of authentic leadership on work engagement. Motivation for the study: Investigating the boundary conditions of the relationship between leaders and followers is vital to enhance the positive effect of leadership. Authentic leadership has not previously been examined with respect to beneficiary contact as a specific situational factor. The researchers therefore set out to ascertain whether beneficiary contact has a strengthening or weakening effect on the impact of authentic leadership on work engagement. Research design, approach and method: The researchers administered the Authentic Leadership Questionnaire (ALQ, the Utrecht Work Engagement Scale (UWES-9 and Grant’s scale on Beneficiary Contact. Main findings: The findings showed that beneficiary contact had a weakening effect on the positive relationship between authentic leadership and work engagement. Practical/managerial implications: Ideally, organisations create environments conducive to work engagement in which leadership plays an important role. This study found that one factor in the work environment, namely beneficiary contact, might have an adverse effect on the positive relationship that authentic leadership has on work engagement. Leaders should therefore take organisational contextual realities into account, such as regular, intense interaction of employees with the beneficiaries of their work. This situation could create strain for individual employees, requiring additional organisational support. Contribution/value-add: Organisations need to recognise the impact of beneficiary contact on the relationship between authentic leadership and work engagement. The researchers

  20. Authenticity in the Context of Technologically Enriched ESP

    Directory of Open Access Journals (Sweden)

    Vilhelmina Vaičiūnienė

    2013-01-01

    Full Text Available Purpose—to determine student attitudes towards authenticity and the interrelation between authenticity and the use of ICT in the ESP learning context. Design/methodology/approach—the research conducted in autumn 2011 was aimed at comparative analysis of students of two study modes—full-time and part-time. It followed research focusing on Bachelor study programme student attitudes (Business Informatics and Finance Economics to authentic resources carried out in spring of 2010. The survey participants were Bachelor study cycle first year students from several faculties of MRU (Law, Politics and Management, Economics and Finance Management, Social Informatics, Social Policy. The paper discusses the ESP learning experience at Mykolas Romeris University and presents research findings obtained through the questionnaire survey. Findings—comparative analysis between full-time and part-time study mode student responses reveals similar learning patterns; however, certain differences can also be observed. The full-time students are motivated by more advanced authentic learning materials and they are more computer literate and able to access these materials, whereas the respondents from the part-time study mode appreciate more traditional Internet-based language learning tools. Research limitations/implications—the research sample was composed of first year Bachelor study programme students, therefore the results cannot be generalised and applied to Master level students. Practical implications—awareness of student needs and problems encountered in authentic learning environment may help improve ESP teaching methods. Originality/Value—gaining insight into student perception of authenticity in learning process and technological proficiency to access authentic resources Keywords: authenticity, student autonomy, ESP context, information communication technologies (ICT. Research type: research paper.

  1. Authenticity in the Context of Technologically Enriched ESP

    Directory of Open Access Journals (Sweden)

    Vilhelmina Vaičiūnienė

    2012-07-01

    Full Text Available Purpose—to determine student attitudes towards authenticity and the interrelation between authenticity and the use of ICT in the ESP learning context.Design/methodology/approach—the research conducted in autumn 2011 was aimed at comparative analysis of students of two study modes—full-time and part-time. It followed research focusing on Bachelor study programme student attitudes (Business Informatics and Finance Economics to authentic resources carried out in spring of 2010. The survey participants were Bachelor study cycle first year students from several faculties of MRU (Law, Politics and Management, Economics and Finance Management, Social Informatics, Social Policy. The paper discusses the ESP learning experience at Mykolas Romeris University and presents research findings obtained through the questionnaire survey.Findings—comparative analysis between full-time and part-time study mode student responses reveals similar learning patterns; however, certain differences can also be observed. The full-time students are motivated by more advanced authentic learning materials and they are more computer literate and able to access these materials, whereas the respondents from the part-time study mode appreciate more traditional Internet-based language learning tools.Research limitations/implications—the research sample was composed of first year Bachelor study programme students, therefore the results cannot be generalised and applied to Master level students.Practical implications—awareness of student needs and problems encountered in authentic learning environment may help improve ESP teaching methods.Originality/Value—gaining insight into student perception of authenticity in learning process and technological proficiency to access authentic resourcesKeywords: authenticity, student autonomy, ESP context, information communication technologies (ICT.Research type: research paper.

  2. Screen Fingerprints as a Novel Modality for Active Authentication

    Science.gov (United States)

    2014-03-01

    biometrics such as face and iris recognition has become more reliable. Yet, its dependence on hardware sensors often limits its applicability. On the...as a new biometric modality for active authentication. Such a fingerprint is acquired by taking a screen recording of the computer being used and...extracting discriminative visual feature from the recording. 15. SUBJECT TERMS Active authentication, screen fingerprints, biometrics 16. SECURITY

  3. Activity report for feasibility study on PKI authentication method with IC card in authentication system sub group of J-PARC information system group

    International Nuclear Information System (INIS)

    Teshima, Naoya; Aoyagi, Tetsuo; Nakajima, Norihiro; Hashimoto, Kiyoharu; Manabe, Atsushi; Yuasa, Fukuko

    2009-06-01

    The Authentication System Sub Group of J-PARC Information System Group completed the mapping of the several authentication methods in terms of the level of security. Of the methods, the PKI authentication method with IC card provides the Super High Security Level and will be adopted as the authentication method of several J-PARC Information Systems. We study the feasibility of this method with following four examples; (1) 'The EAP-TLS wireless LAN authentication method'. (2) 'The Web-SSL client authentication method in SSL-VPN connection'. (3) 'The PKI authentication method with a certificate issued by NAREGI-CA software stored in IC card.' (4) 'The PKI authentication method with Dual interface FeliCa card'. In each example, we confirmed the feasibility of the method in a practical way. In this report we present the details of the study. (author)

  4. A Multifactor Secure Authentication System for Wireless Payment

    Science.gov (United States)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  5. Analysis of Broadcast Authentication Mechanism in Selected Network Topologies

    Directory of Open Access Journals (Sweden)

    T. Vanek

    2011-04-01

    Full Text Available This paper deals with simulation of the broadcast authentication protocols using Colored Petri Nets and further optimizations in Matlab environment. Typical application of broadcast authentication protocols can be configurations where only one transmitter with multiple recipients exists (such as message exchange in sensor networks routing protocols, or the leader election process in sensors network. Authentication of every packet seems to be very effective way to mitigate an attack, however resulting in increase of end-to-end delay. To mitigate this drawback, the broadcast authentication protocols have been proposed. Concept of optimization of the broadcast authentication protocol DREAM parameters in a special case of fully N-ary tree and general random topology containing the same amount of nodes with regard to delay and energy consumption minimization is showed in the paper. Protocol DREAM was taken as an example of broadcast authenticating protocol to show how Color Petri Nets can be used to create a fully functional model of the protocol.

  6. Authenticity, life satisfaction, and distress: a longitudinal analysis.

    Science.gov (United States)

    Boyraz, Güler; Waits, J Brandon; Felix, Victoria A

    2014-07-01

    The purpose of the present study was to examine the reciprocal relationships between authenticity and measures of life satisfaction and distress using a 2-wave panel study design. Data were collected from 232 college students attending 2 public universities. Structural equation modeling was used to analyze the data. The results of the cross-lagged panel analysis indicated that after controlling for temporal stability, initial authenticity (Time 1) predicted later distress and life satisfaction (Time 2). Specifically, higher levels of authenticity at Time 1 were associated with increased life satisfaction and decreased distress at Time 2. Neither distress nor life satisfaction at Time 1 significantly predicted authenticity at Time 2. However, the relationship between Time 1 distress and Time 2 authenticity was not significantly different from the relationship between Time 1 authenticity and Time 2 distress. Results are discussed in light of humanistic-existential theories and the empirical research on well-being. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  7. Robust Secure Authentication and Data Storage with Perfect Secrecy

    Directory of Open Access Journals (Sweden)

    Sebastian Baur

    2018-04-01

    Full Text Available We consider an authentication process that makes use of biometric data or the output of a physical unclonable function (PUF, respectively, from an information theoretical point of view. We analyse different definitions of achievability for the authentication model. For the secrecy of the key generated for authentication, these definitions differ in their requirements. In the first work on PUF based authentication, weak secrecy has been used and the corresponding capacity regions have been characterized. The disadvantages of weak secrecy are well known. The ultimate performance criteria for the key are perfect secrecy together with uniform distribution of the key. We derive the corresponding capacity region. We show that, for perfect secrecy and uniform distribution of the key, we can achieve the same rates as for weak secrecy together with a weaker requirement on the distribution of the key. In the classical works on PUF based authentication, it is assumed that the source statistics are known perfectly. This requirement is rarely met in applications. That is why the model is generalized to a compound model, taking into account source uncertainty. We also derive the capacity region for the compound model requiring perfect secrecy. Additionally, we consider results for secure storage using a biometric or PUF source that follow directly from the results for authentication. We also generalize known results for this problem by weakening the assumption concerning the distribution of the data that shall be stored. This allows us to combine source compression and secure storage.

  8. Increasing Authenticity of Simulation-Based Assessment in Diagnostic Radiology.

    Science.gov (United States)

    van der Gijp, Anouk; Ravesloot, Cécile J; Tipker, Corinne A; de Crom, Kim; Rutgers, Dik R; van der Schaaf, Marieke F; van der Schaaf, Irene C; Mol, Christian P; Vincken, Koen L; Ten Cate, Olle Th J; Maas, Mario; van Schaik, Jan P J

    2017-12-01

    Clinical reasoning in diagnostic imaging professions is a complex skill that requires processing of visual information and image manipulation skills. We developed a digital simulation-based test method to increase authenticity of image interpretation skill assessment. A digital application, allowing volumetric image viewing and manipulation, was used for three test administrations of the national Dutch Radiology Progress Test for residents. This study describes the development and implementation process in three phases. To assess authenticity of the digital tests, perceived image quality and correspondence to clinical practice were evaluated and compared with previous paper-based tests (PTs). Quantitative and qualitative evaluation results were used to improve subsequent tests. Authenticity of the first digital test was not rated higher than the PTs. Test characteristics and environmental conditions, such as image manipulation options and ambient lighting, were optimized based on participants' comments. After adjustments in the third digital test, participants favored the image quality and clinical correspondence of the digital image questions over paper-based image questions. Digital simulations can increase authenticity of diagnostic radiology assessments compared with paper-based testing. However, authenticity does not necessarily increase with higher fidelity. It can be challenging to simulate the image interpretation task of clinical practice in a large-scale assessment setting, because of technological limitations. Optimizing image manipulation options, the level of ambient light, time limits, and question types can help improve authenticity of simulation-based radiology assessments.

  9. An inconclusive digital audio authenticity examination: a unique case.

    Science.gov (United States)

    Koenig, Bruce E; Lacey, Douglas S

    2012-01-01

    This case report sets forth an authenticity examination of 35 encrypted, proprietary-format digital audio files containing recorded telephone conversations between two codefendants in a criminal matter. The codefendant who recorded the conversations did so on a recording system he developed; additionally, he was both a forensic audio authenticity examiner, who had published and presented in the field, and was the head of a professional audio society's writing group for authenticity standards. The authors conducted the examination of the recordings following nine laboratory steps of the peer-reviewed and published 11-step digital audio authenticity protocol. Based considerably on the codefendant's direct involvement with the development of the encrypted audio format, his experience in the field of forensic audio authenticity analysis, and the ease with which the audio files could be accessed, converted, edited in the gap areas, and reconstructed in such a way that the processes were undetected, the authors concluded that the recordings could not be scientifically authenticated through accepted forensic practices. © 2011 American Academy of Forensic Sciences.

  10. Authenticity Anyone? The Enhancement of Emotions via Neuro-Psychopharmacology.

    Science.gov (United States)

    Kraemer, Felicitas

    2011-04-01

    This article will examine how the notion of emotional authenticity is intertwined with the notions of naturalness and artificiality in the context of the recent debates about 'neuro-enhancement' and 'neuro-psychopharmacology.' In the philosophy of mind, the concept of authenticity plays a key role in the discussion of the emotions. There is a widely held intuition that an artificial means will always lead to an inauthentic result. This article, however, proposes that artificial substances do not necessarily result in inauthentic emotions. The literature provided by the philosophy of mind on this subject usually resorts to thought experiments. On the other hand, the recent literature in applied ethics on 'enhancement' provides good reasons to include real world examples. Such case studies reveal that some psychotropic drugs such as antidepressants actually cause people to undergo experiences of authenticity, making them feel 'like themselves' for the first time in their lives. Beginning with these accounts, this article suggests three non-naturalist standards for emotions: the authenticity standard, the rationality standard, and the coherence standard. It argues that the authenticity standard is not always the only valid one, but that the other two ways of assessing emotions are also valid, and that they can even have repercussions on the felt authenticity of emotions. In conclusion, it sketches some of the normative implications if not ethical intricacies that accompany the enhancement of emotions.

  11. The Need for Authenticity-Based Autonomy in Medical Ethics.

    Science.gov (United States)

    White, Lucie

    2017-08-11

    The notion of respect for autonomy dominates bioethical discussion, though what qualifies precisely as autonomous action is notoriously elusive. In recent decades, the notion of autonomy in medical contexts has often been defined in opposition to the notion of autonomy favoured by theoretical philosophers. Where many contemporary theoretical accounts of autonomy place emphasis on a condition of "authenticity", the special relation a desire must have to the self, bioethicists often regard such a focus as irrelevant to the concerns of medical ethics, and too stringent for use in practical contexts. I argue, however, that the very condition of authenticity that forms a focus in theoretical philosophy is also essential to autonomy and competence in medical ethics. After tracing the contours of contemporary authenticity-based theories of autonomy, I consider and respond to objections against the incorporation of a notion of authenticity into accounts of autonomy designed for use in medical contexts. By looking at the typical problems that arise when making judgments concerning autonomy or competence in a medical setting, I reveal the need for a condition of authenticity-as a means of protecting choices, particularly high-stakes choices, from being restricted or overridden on the basis of intersubjective disagreement. I then turn to the treatment of false and contestable beliefs, arguing that it is only through reference to authenticity that we can make important distinctions in this domain. Finally, I consider a potential problem with my proposed approach; its ability to deal with anorexic and depressive desires.

  12. Authentication Based on Multilayer Clustering in Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Suh Heyi-Sook

    2005-01-01

    Full Text Available In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN, designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH using a new concept of control cluster head (CCH scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.

  13. Authenticity in the Teaching of ESP: An Evaluation Proposal

    Directory of Open Access Journals (Sweden)

    María Luisa Pérez Cañado

    2015-10-01

    Full Text Available Although authentic materials are a very rich source for the selection of teaching materials in the field of ESP (English for Specific Purposes in general and of Business English in particular, the ultimate purpose should be authentic communication between the text (oral or written and its recipient as a result of the interpretation brought to the text by the latter. To speak of authenticity implies therefore a dual focus: that of “authentic material” and that of “authenticity”. The literature in the field is vast and deserves an in-depth analysis, as in many cases the previous terms are treated as synonyms. Thus, an original proposal for the evaluation of authenticity is called for, an aspect rarely considered in the evaluation of teaching materials. This proposal will build upon a review of the literature on authenticity, as well as on the most important proposals for the evaluation of teaching materials. The proposal set forth in this paper is completed with a checklist which integrates the consideration of the inherent characteristics in the material being evaluated, together with the teacher’s view on this score.

  14. Analog Video Authentication and Seal Verification Equipment Development

    Energy Technology Data Exchange (ETDEWEB)

    Gregory Lancaster

    2012-09-01

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  15. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  16. Blind quantum computation with identity authentication

    Science.gov (United States)

    Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong

    2018-04-01

    Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.

  17. Research and Mass Deployment of Non-cognitive Authentication Strategy Based on Campus Wireless Network

    Directory of Open Access Journals (Sweden)

    Huangfu Dapeng

    2018-01-01

    Full Text Available With the rapid development of Internet +, the dependence on wireless networks and wireless terminals are increasing. Campus wireless network has become the main network of teachers and students in campus on the internet. As there are uneven clients and a wide variety of intelligent terminals now. Simplified authentication and network security become the most urgent problem for wireless network. This paper used the Portal + Mac authentication method to realize the non-cognitive authentication of teachers and students on basis of the analysis of the advantages and disadvantages of mainstream authentication of campus wireless network, such as 802.1X authentication, Portal authentication, Mac authentication and DHCP authentication. Teachers and students only need portal certification at the first time, then surf the internet with non-perceived authentication at the second time and later. This method increases network security, and is better to meet the needs of teachers and students.

  18. Experiencing authenticity - the core of student learning in clinical practice.

    Science.gov (United States)

    Manninen, Katri

    2016-10-01

    Learning in clinical practice is challenging regarding organizational and pedagogical issues. Clinical education wards are one way to meet these challenges by focusing on both patient care and student learning. However, more knowledge is needed about how students' learning can be enhanced and about patients' and supervisors' roles in these settings. The aim was to explore nursing students' learning on a clinical education ward with an explicit pedagogical framework. Semi-structured interviews of students were analyzed using qualitative content analysis and an ethnographic study including observations and follow-up interviews of students, patients and supervisors was conducted. The core of student meaningful learning experiences both external and internal authenticity. Students in early stages immediately created mutual relationships, experienced both external and internal authenticity, and patients became active participants in student learning. Without a mutual relationship, patients passively let students practice on their bodies. Students nearing graduation experienced only external authenticity, creating uncertainty as a threshold for learning. Caring for patients with complex needs helped students overcome the threshold and experience internal authenticity. Supervisors' challenges were to balance patient care and student learning by working as a team. They supported students coping with the complex challenges on the ward. Students need to experience external and internal authenticity to make learning meaningful. Experiencing authenticity, involving meaning-making processes and knowledge construction, is linked to transformative learning and overcoming thresholds. Therefore, an explicit pedagogical framework, based on patient-centredness, peer learning and the supervisory team, creates the prerequisites for experiencing external and internal authenticity.

  19. Authentication Sensing System Using Resonance Evaluation Spectroscopy (ASSURES)

    Science.gov (United States)

    Trolinger, James D.; Dioumaev, Andrei K.; Lal, Amit K.; Dimas, Dave

    2017-08-01

    This paper describes an ongoing instrument development project to distinguish genuine manufactured components from counterfeit components; we call the instrument ASSURES (Authentication Sensing System Using Resonance Evaluation Spectroscopy). The system combines Laser Doppler Vibrometry with acoustical resonance spectroscopy, augmented with finite element analysis. Vibrational properties of components, such as resonant modes, damping, and spectral frequency response to various forcing functions depend strongly upon the mechanical properties of the material, including its size, shape, internal hardness, tensile strength, alloy/composite compositions, flaws, defects, and other internal material properties. Although acoustic resonant spectroscopy has seen limited application, the information rich signals in the vibrational spectra of objects provide a pathway to many new applications. Components with the same shape but made of different materials, different fatigue histories, damage, tampering, or heat treatment, will respond differently to high frequency stimulation. Laser Doppler Vibrometry offers high sensitivity and frequency bandwidth to measure the component's frequency spectrum, and overcomes many issues that limit conventional acoustical resonance spectroscopy, since the sensor laser beam can be aimed anywhere along the part as well as to multiple locations on a part in a non-contact way. ASSURES is especially promising for use in additive manufacturing technology by providing signatures as digital codes that are unique to specific objects and even to specific locations on objects. We believe that such signatures can be employed to address many important issues in the manufacturing industry. These include insuring the part meets the often very rigid specifications of the customer and being able to detect non-visible internal manufacturing defects or non-visible damage that has occurred after manufacturing.

  20. Ocular toxicity of authentic lunar dust

    Science.gov (United States)

    2012-01-01

    Background Dust exposure is a well-known occupational hazard for terrestrial workers and astronauts alike and will continue to be a concern as humankind pursues exploration and habitation of objects beyond Earth. Humankind’s limited exploration experience with the Apollo Program indicates that exposure to dust will be unavoidable. Therefore, NASA must assess potential toxicity and recommend appropriate mitigation measures to ensure that explorers are adequately protected. Visual acuity is critical during exploration activities and operations aboard spacecraft. Therefore, the present research was performed to ascertain the ocular toxicity of authentic lunar dust. Methods Small (mean particle diameter = 2.9 ± 1.0 μm), reactive lunar dust particles were produced by grinding bulk dust under ultrapure nitrogen conditions. Chemical reactivity and cytotoxicity testing were performed using the commercially available EpiOcularTM assay. Subsequent in vivo Draize testing utilized a larger size fraction of unground lunar dust that is more relevant to ocular exposures (particles testing indicated minimal irritancy potential based on the time required to reduce cell viability by 50% (ET50). Follow-up testing using the Draize standard protocol confirmed that the lunar dust was minimally irritating. Minor irritation of the upper eyelids was noted at the 1-hour observation point, but these effects resolved within 24 hours. In addition, no corneal scratching was observed using fluorescein stain. Conclusions Low-titanium mare lunar dust is minimally irritating to the eyes and is considered a nuisance dust for ocular exposure. No special precautions are recommended to protect against ocular exposures, but fully shielded goggles may be used if dust becomes a nuisance. PMID:22817808