WorldWideScience

Sample records for authentication ldrd project

  1. Final report for the mobile node authentication LDRD project.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Lanzone, Andrew J.

    2005-09-01

    In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

  2. Selected Examples of LDRD Projects Supporting Test Ban Treaty Verification and Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Al-Ayat, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Walter, W. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-02-23

    The Laboratory Directed Research and Development (LDRD) Program at the DOE National Laboratories was established to ensure the scientific and technical vitality of these institutions and to enhance the their ability to respond to evolving missions and anticipate national needs. LDRD allows the Laboratory directors to invest a percentage of their total annual budget in cutting-edge research and development projects within their mission areas. We highlight a selected set of LDRD-funded projects, in chronological order, that have helped provide capabilities, people and infrastructure that contributed greatly to our ability to respond to technical challenges in support of test ban treaty verification and nonproliferation.

  3. Idaho National Laboratory Annual Report FY 2013 LDRD Project Summaries

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2014-03-01

    The FY 2013 LDRD Annual Report is a compendium of the diverse research performed to develop and ensure the INL’s technical capabilities support the current and future DOE missions and national research priorities. LDRD is essential to INL—it provides a means for the Laboratory to maintain scientific and technical vitality while funding highly innovative, high-risk science and technology research and development (R&D) projects. The program enhances technical capabilities at the Laboratory, providing scientific and engineering staff with opportunities to explore proof-of-principle ideas, advanced studies of innovative concepts, and preliminary technical analyses. Established by Congress in 1991, the LDRD Program proves its benefit each year through new programs, intellectual property, patents, copyrights, national and international awards, and publications.

  4. LDRD Annual Report FY2006

    International Nuclear Information System (INIS)

    Sketchley, J A; Kotta, P; De Yoreo, J; Jackson, K; van Bibber, K

    2007-01-01

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Laboratory Science and Technology Office, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration in national security, energy security, environmental management, bioscience and technology to improve human health, and breakthroughs in fundamental science and technology. The accomplishments described in this Annual Report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $92 million for FY2006 sponsored 188 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest

  5. LDRD FY2004 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kline, K. M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2005-02-28

    The Laboratory Directed Research and Development (LDRD) Program is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and the National Nuclear Security Administration in national security, homeland security, energy security, environmental management, bioscience and healthcare technology, and breakthroughs in fundamental science and technology. The LDRD Program was authorized by Congress in 1991 and is administered by the Laboratory Science and Technology Office. The accomplishments described in this Annual Report demonstrate how the LDRD portfolio is strongly aligned with these missions and contributes to the Laboratory’s success in meeting its goals. The LDRD budget of $69.8 million for FY2004 sponsored 220 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific and technical quality and mission relevance. Each year, the number of meritorious proposals far exceeds the funding available, making the selection a challenging one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the Nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory’s multidisciplinary team approach to science and technology. Safeguarding the Nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle

  6. 1999 LDRD Laboratory Directed Research and Development

    Energy Technology Data Exchange (ETDEWEB)

    Rita Spencer; Kyle Wheeler

    2000-06-01

    This is the FY 1999 Progress Report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes work done on individual research projects, relates the projects to major Laboratory program sponsors, and provides an index to the principal investigators. Project summaries are grouped by their LDRD component: Competency Development, Program Development, and Individual Projects. Within each component, they are further grouped into nine technical categories: (1) materials science, (2) chemistry, (3) mathematics and computational science, (4) atomic, molecular, optical, and plasma physics, fluids, and particle beams, (5) engineering science, (6) instrumentation and diagnostics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) bioscience.

  7. FY 2014 LDRD Annual Report Project Summaries

    Energy Technology Data Exchange (ETDEWEB)

    Tomchak, Dena [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-02-01

    The FY 2014 Laboratory Directed Research and Development (LDRD) Annual Report is a compendium of the diverse research performed to develop and ensure the INL's technical capabilities can support future DOE missions and national research priorities. LDRD is essential to INL - it provides a means for the laboratory to pursue novel scientific and engineering research in areas that are deemed too basic or risky for programmatic investments. This research enahnces technical capabilities at the laboratory, providing scientific and engineering staff with opportunities for skill building and partnership development.

  8. THz transceiver characterization : LDRD project 139363 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Nordquist, Christopher Daniel; Wanke, Michael Clement; Cich, Michael Joseph; Reno, John Louis; Fuller, Charles T.; Wendt, Joel Robert; Lee, Mark; Grine, Albert D.

    2009-09-01

    LDRD Project 139363 supported experiments to quantify the performance characteristics of monolithically integrated Schottky diode + quantum cascade laser (QCL) heterodyne mixers at terahertz (THz) frequencies. These integrated mixers are the first all-semiconductor THz devices to successfully incorporate a rectifying diode directly into the optical waveguide of a QCL, obviating the conventional optical coupling between a THz local oscillator and rectifier in a heterodyne mixer system. This integrated mixer was shown to function as a true heterodyne receiver of an externally received THz signal, a breakthrough which may lead to more widespread acceptance of this new THz technology paradigm. In addition, questions about QCL mode shifting in response to temperature, bias, and external feedback, and to what extent internal frequency locking can improve stability have been answered under this project.

  9. A Case Study in Competitive Technical and Market Intelligence Support and Lessons Learned for the uChemLab LDRD Grand Challenge Project; TOPICAL

    International Nuclear Information System (INIS)

    SOUTHWELL, EDWIN T.; GARCIA, MARIE L.; MEYERS, CHARLES E.

    2001-01-01

    The(mu)ChemLab(trademark) Laboratory Directed Research and Development (LDRD) Grand Challenge project began in October 1996 and ended in September 2000. The technical managers of the(mu)ChemLab(trademark) project and the LDRD office, with the support of a consultant, conducted a competitive technical and market demand intelligence analysis of the(mu)ChemLab(trademark). The managers used this knowledge to make project decisions and course adjustments. CTI/MDI positively impacted the project's technology development, uncovered potential technology partnerships, and supported eventual industry partner contacts. CTI/MDI analysis is now seen as due diligence and the(mu)ChemLab(trademark) project is now the model for other Sandia LDRD Grand Challenge undertakings. This document describes the CTI/MDI analysis and captures the more important ''lessons learned'' of this Grand Challenge project, as reported by the project's management team

  10. FY2014 LBNL LDRD Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Ho, Darren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-06-01

    Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE’s National Laboratory System, Berkeley Lab supports DOE’s missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation. The LDRD program supports Berkeley Lab’s mission in many ways. First, because LDRD funds can be allocated within a relatively short time frame, Berkeley Lab researchers can support the mission of the Department of Energy (DOE) and serve the needs of the nation by quickly responding to forefront scientific problems. Second, LDRD enables Berkeley Lab to attract and retain highly qualified scientists and to support their efforts to carry out worldleading research. In addition, the LDRD program also supports new projects that involve graduate students and postdoctoral fellows, thus contributing to the education mission of Berkeley Lab.

  11. LDRD 2012 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Bookless, William [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2012-12-31

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY2012, as required. In FY2012, the BNL LDRD Program funded 52 projects, 14 of which were new starts, at a total cost of $10,061,292.

  12. LDRD 2014 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, Diane [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2015-03-01

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2014, as required. In FY 2014, the BNL LDRD Program funded 40 projects, 8 of which were new starts, at a total cost of $9.6M.

  13. LDRD 2015 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, D. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2015-12-31

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2015, as required. In FY 2015, the BNL LDRD Program funded 43 projects, 12 of which were new starts, at a total cost of $9.5M.

  14. LDRD 2016 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, D. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2017-03-31

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2C dated October 22, 2015. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2016, as required. In FY 2016, the BNL LDRD Program funded 48 projects, 21 of which were new starts, at a total cost of $11.5M. The investments that BNL makes in its LDRD program support the Laboratory’s strategic goals. BNL has identified four Critical Outcomes that define the Laboratory’s scientific future and that will enable it to realize its overall vision. Two operational Critical Outcomes address essential operational support for that future: renewal of the BNL campus; and safe, efficient laboratory operations.

  15. Terahertz spectral signatures :measurement and detection LDRD project 86361 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Wanke, Michael Clement; Brener, Igal; Lee, Mark

    2005-11-01

    LDRD Project 86361 provided support to upgrade the chemical and material spectral signature measurement and detection capabilities of Sandia National Laboratories using the terahertz (THz) portion of the electromagnetic spectrum, which includes frequencies between 0.1 to 10 THz. Under this project, a THz time-domain spectrometer was completed. This instrument measures sample absorption spectra coherently, obtaining both magnitude and phase of the absorption signal, and has shown an operating signal-to-noise ratio of 10{sub 4}. Additionally, various gas cells and a reflectometer were added to an existing high-resolution THz Fourier transform spectrometer, which greatly extend the functionality of this spectrometer. Finally, preliminary efforts to design an integrated THz transceiver based on a quantum cascade laser were begun.

  16. Final report on LDRD project ''proliferation-resistant fuel cycles''

    International Nuclear Information System (INIS)

    Brown, N W; Hassberger, J A.

    1999-01-01

    This report provides a summary of LDRD work completed during 1997 and 1998 to develop the ideas and concepts that lead to the Secure, Transportable, Autonomous Reactor (STAR) program proposals to the DOE Nuclear Energy Research Initiative (NERI). The STAR program consists of a team of three national laboratories (LLNL, ANL, and LANL), three universities, (UC Berkeley, TAMU, and MIT) and the Westinghouse Research Center. Based on the LLNL work and their own efforts on related work this team prepared and integrated a package of twelve proposals that will carry the LDRD work outlined here into the next phase of development. We are proposing to develop a new nuclear system that meets stringent requirements for a high degree of safety and proliferation resistance, and also deals directly with the related nuclear waste and spent fuel management issues

  17. LDRD FY 2014 Program Plan

    Energy Technology Data Exchange (ETDEWEB)

    Anita Gianotto; Dena Tomchak

    2013-08-01

    As required by DOE Order 413.2B the FY 2014 Program Plan is written to communicate ares of investment and approximate amounts being requested for the upcoming fiscal year. The program plan also includes brief highlights of current or previous LDRD projects that have an opportunity to impact our Nation's current and future energy challenges.

  18. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    Directory of Open Access Journals (Sweden)

    Evangelos Bekiaris

    2008-03-01

    Full Text Available Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO (2007 is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  19. 2007 LDRD ANNUAL REPORT

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-16

    I am pleased to present the fiscal year 2007 Laboratory Directed Research and Development (LDRD) annual report. This represents the first year that SRNL has been eligible for LDRD participation and our results to date demonstrate we are off to an excellent start. SRNL became a National Laboratory in 2004, and was designated the 'Corporate Laboratory' for the DOE Office of Environmental Management (EM) in 2006. As you will see, we have made great progress since these designations. The LDRD program is one of the tools SRNL is using to enable achievement of our strategic goals for the DOE. The LDRD program allows the laboratory to blend a strong basic science component into our applied technical portfolio. This blending of science with applied technology provides opportunities for our scientists to strengthen our capabilities and delivery. The LDRD program is vital to help SRNL attract and retain leading scientists and engineers who will help build SRNL's future and achieve DOE mission objectives. This program has stimulated our research staff creativity, while realizing benefits from their participation. This investment will yield long term dividends to the DOE in its Environmental Management, Energy, and National Security missions.

  20. Development of a cryogenic EOS capability for the Z Pulsed Radiation Source: Goals and accomplishments of FY97 LDRD project

    International Nuclear Information System (INIS)

    Hanson, D.L.; Johnston, R.R.; Asay, J.R.

    1998-03-01

    Experimental cryogenic capabilities are essential for the study of ICF high-gain target and weapons effects issues involving dynamic materials response at low temperatures. This report describes progress during the period 2/97-11/97 on the FY97 LDRD project ''Cryogenic EOS Capabilities on Pulsed Radiation Sources (Z Pinch)''. The goal of this project is the development of a general purpose cryogenic target system for precision EOS and shock physics measurements at liquid helium temperatures on the Z accelerator Z-pinch pulsed radiation source. Activity during the FY97 LDRD phase of this project has focused on development of a conceptual design for the cryogenic target system based on consideration of physics, operational, and safety issues, design and fabrication of principal system components, construction and instrumentation of a cryogenic test facility for off-line thermal and optical testing at liquid helium temperatures, initial thermal testing of a cryogenic target assembly, and the design of a cryogenic system interface to the Z pulsed radiation source facility. The authors discuss these accomplishments as well as elements of the project that require further work

  1. Authentication Projects for Historical Fiction: Do You Believe It?

    Science.gov (United States)

    McTigue, Erin; Thornton, Elaine; Wiese, Patricia

    2013-01-01

    Authentication projects, particularly for historical fiction, provide a means for students to explore literature and history while practicing critical literacy skills. The authors 1) present benefits and cautions for historical fiction use in elementary classrooms, 2) introduce authentication projects as a means to mitigate risks and enhance…

  2. Multi-attribute criteria applied to electric generation energy system analysis LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Kuswa, Glenn W.; Tsao, Jeffrey Yeenien; Drennen, Thomas E.; Zuffranieri, Jason V.; Paananen, Orman Henrie; Jones, Scott A.; Ortner, Juergen G. (DLR, German Aerospace, Cologne); Brewer, Jeffrey D.; Valdez, Maximo M.

    2005-10-01

    This report began with a Laboratory-Directed Research and Development (LDRD) project to improve Sandia National Laboratories multidisciplinary capabilities in energy systems analysis. The aim is to understand how various electricity generating options can best serve needs in the United States. The initial product is documented in a series of white papers that span a broad range of topics, including the successes and failures of past modeling studies, sustainability, oil dependence, energy security, and nuclear power. Summaries of these projects are included here. These projects have provided a background and discussion framework for the Energy Systems Analysis LDRD team to carry out an inter-comparison of many of the commonly available electric power sources in present use, comparisons of those options, and efforts needed to realize progress towards those options. A computer aid has been developed to compare various options based on cost and other attributes such as technological, social, and policy constraints. The Energy Systems Analysis team has developed a multi-criteria framework that will allow comparison of energy options with a set of metrics that can be used across all technologies. This report discusses several evaluation techniques and introduces the set of criteria developed for this LDRD.

  3. Final report on LDRD project: Simulation/optimization tools for system variability analysis

    Energy Technology Data Exchange (ETDEWEB)

    R. L. Bierbaum; R. F. Billau; J. E. Campbell; K. D. Marx; R. J. Sikorski; B. M. Thompson; S. D. Wix

    1999-10-01

    >This work was conducted during FY98 (Proposal Number 98-0036) and FY99 (Proposal Number 99-0818) under the auspices of the Sandia National Laboratories Laboratory-Directed Research and Development (LDRD) program. Electrical simulation typically treats a single data point in the very large input space of component properties. For electrical simulation to reach its full potential as a design tool, it must be able to address the unavoidable variability and uncertainty in component properties. Component viability is strongly related to the design margin (and reliability) of the end product. During the course of this project, both tools and methodologies were developed to enable analysis of variability in the context of electrical simulation tools. Two avenues to link relevant tools were also developed, and the resultant toolset was applied to a major component.

  4. Integrated computer control system CORBA-based simulator FY98 LDRD project final summary report

    International Nuclear Information System (INIS)

    Bryant, R M; Holloway, F W; Van Arsdall, P J.

    1999-01-01

    The CORBA-based Simulator was a Laboratory Directed Research and Development (LDRD) project that applied simulation techniques to explore critical questions about distributed control architecture. The simulator project used a three-prong approach comprised of a study of object-oriented distribution tools, computer network modeling, and simulation of key control system scenarios. This summary report highlights the findings of the team and provides the architectural context of the study. For the last several years LLNL has been developing the Integrated Computer Control System (ICCS), which is an abstract object-oriented software framework for constructing distributed systems. The framework is capable of implementing large event-driven control systems for mission-critical facilities such as the National Ignition Facility (NIF). Tools developed in this project were applied to the NIF example architecture in order to gain experience with a complex system and derive immediate benefits from this LDRD. The ICCS integrates data acquisition and control hardware with a supervisory system, and reduces the amount of new coding and testing necessary by providing prebuilt components that can be reused and extended to accommodate specific additional requirements. The framework integrates control point hardware with a supervisory system by providing the services needed for distributed control such as database persistence, system start-up and configuration, graphical user interface, status monitoring, event logging, scripting language, alert management, and access control. The design is interoperable among computers of different kinds and provides plug-in software connections by leveraging a common object request brokering architecture (CORBA) to transparently distribute software objects across the network of computers. Because object broker distribution applied to control systems is relatively new and its inherent performance is roughly threefold less than traditional point

  5. SRNL LDRD ANNUAL REPORT 2008

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-29

    The Laboratory Director is pleased to have the opportunity to present the 2008 Laboratory Directed Research and Development (LDRD) annual report. This is my first opportunity to do so, and only the second such report that has been issued. As will be obvious, SRNL has built upon the excellent start that was made with the LDRD program last year, and researchers have broken new ground in some important areas. In reviewing the output of this program this year, it is clear that the researchers implemented their ideas with creativity, skill and enthusiasm. It is gratifying to see this level of participation, because the LDRD program remains a key part of meeting SRNL's and DOE's strategic goals, and helps lay a solid scientific foundation for SRNL as the premier applied science laboratory. I also believe that the LDRD program's results this year have demonstrated SRNL's value as the EM Corporate Laboratory, having advanced knowledge in a spectrum of areas, including reduction of the technical risks of cleanup, separations science, packaging and transportation of nuclear materials, and many others. The research in support of Energy Security and National and Homeland Security has been no less notable. SRNL' s researchers have shown again that the nascent LDRD program is a sound investment for DOE that will pay off handsomely for the nation as time goes on.

  6. FY07 LDRD Final Report Precision, Split Beam, Chirped-Pulse, Seed Laser Technology

    Energy Technology Data Exchange (ETDEWEB)

    Dawson, J W; Messerly, M J; Phan, H H; Crane, J K; Beach, R J; Siders, C W; Barty, C J

    2009-11-12

    The goal of this LDRD ER was to develop a robust and reliable technology to seed high-energy laser systems with chirped pulses that can be amplified to kilo-Joule energies and recompressed to sub-picosecond pulse widths creating extremely high peak powers suitable for petawatt class physics experiments. This LDRD project focused on the development of optical fiber laser technologies compatible with the current long pulse National Ignition Facility (NIF) seed laser. New technologies developed under this project include, high stability mode-locked fiber lasers, fiber based techniques for reduction of compressed pulse pedestals and prepulses, new compact stretchers based on chirped fiber Bragg gratings (CFBGs), new techniques for manipulation of chirped pulses prior to amplification and new high-energy fiber amplifiers. This project was highly successful and met virtually all of its goals. The National Ignition Campaign has found the results of this work to be very helpful. The LDRD developed system is being employed in experiments to engineer the Advanced Radiographic Capability (ARC) front end and the fully engineered version of the ARC Front End will employ much of the technology and techniques developed here.

  7. LDRD 2013 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Bookless, W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2013-12-31

    This LDRD project establishes a research program led by Jingguang Chen, who has started a new position as a Joint Appointee between BNL and Columbia University as of FY2013. Under this project, Dr. Chen will establish a new program in catalysis science at BNL and Columbia University. The LDRD program will provide initial research funding to start research at both BNL and Columbia. At BNL, Dr. Chen will initiate laboratory research, including hiring research staff, and will collaborate with the existing BNL catalysis and electrocatalysis research groups. At Columbia, a subcontract to Dr. Chen will provide startup funding for his laboratory research, including initial graduate student costs. The research efforts will be linked under a common Catalysis Program in Sustainable Fuels. The overall impact of this project will be to strengthen the BNL catalysis science program through new linked research thrusts and the addition of an internationally distinguished catalysis scientist.

  8. 2013 SRNL LDRD Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    McWhorter, S. [Savannah River Site (SRS), Aiken, SC (United States)

    2014-03-07

    This report demonstrates the execution of our LDRD program within the objectives and guidelines outlined by the Department of Energy (DOE) through the DOE Order 413.2b. The projects described within the report align purposefully with SRNL’s strategic vision and provide great value to the DOE. The diversity exhibited in the research and development projects underscores the DOE Office of Environmental Management (DOE-EM) mission and enhances that mission by developing the technical capabilities and human capital necessary to support future DOE-EM national needs. As a multiprogram national laboratory, SRNL is applying those capabilities to achieve tangible results for the nation in National Security, Environmental Stewardship, Clean Energy and Nuclear Materials Management.

  9. RF/microwave properties of nanotubes and nanowires : LDRD Project 105876 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Scrymgeour, David; Lee, Mark; Hsu, Julia W. P.; Highstrete, Clark

    2009-09-01

    LDRD Project 105876 was a research project whose primary goal was to discover the currently unknown science underlying the basic linear and nonlinear electrodynamic response of nanotubes and nanowires in a manner that will support future efforts aimed at converting forefront nanoscience into innovative new high-frequency nanodevices. The project involved experimental and theoretical efforts to discover and understand high frequency (MHz through tens of GHz) electrodynamic response properties of nanomaterials, emphasizing nanowires of silicon, zinc oxide, and carbon nanotubes. While there is much research on DC electrical properties of nanowires, electrodynamic characteristics still represent a major new frontier in nanotechnology. We generated world-leading insight into how the low dimensionality of these nanomaterials yields sometimes desirable and sometimes problematic high-frequency properties that are outside standard model electron dynamics. In the cases of silicon nanowires and carbon nanotubes, evidence of strong disorder or glass-like charge dynamics was measured, indicating that these materials still suffer from serious inhomogeneities that limit there high frequency performance. Zinc oxide nanowires were found to obey conventional Drude dynamics. In all cases, a significant practical problem involving large impedance mismatch between the high intrinsic impedance of all nanowires and nanotubes and high-frequency test equipment had to be overcome.

  10. Mathematics authentic assessment on statistics learning: the case for student mini projects

    Science.gov (United States)

    Fauziah, D.; Mardiyana; Saputro, D. R. S.

    2018-03-01

    Mathematics authentic assessment is a form of meaningful measurement of student learning outcomes for the sphere of attitude, skill and knowledge in mathematics. The construction of attitude, skill and knowledge achieved through the fulfilment of tasks which involve active and creative role of the students. One type of authentic assessment is student mini projects, started from planning, data collecting, organizing, processing, analysing and presenting the data. The purpose of this research is to learn the process of using authentic assessments on statistics learning which is conducted by teachers and to discuss specifically the use of mini projects to improving students’ learning in the school of Surakarta. This research is an action research, where the data collected through the results of the assessments rubric of student mini projects. The result of data analysis shows that the average score of rubric of student mini projects result is 82 with 96% classical completeness. This study shows that the application of authentic assessment can improve students’ mathematics learning outcomes. Findings showed that teachers and students participate actively during teaching and learning process, both inside and outside of the school. Student mini projects also provide opportunities to interact with other people in the real context while collecting information and giving presentation to the community. Additionally, students are able to exceed more on the process of statistics learning using authentic assessment.

  11. LDRD 149045 final report distinguishing documents.

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Scott A.

    2010-09-01

    This LDRD 149045 final report describes work that Sandians Scott A. Mitchell, Randall Laviolette, Shawn Martin, Warren Davis, Cindy Philips and Danny Dunlavy performed in 2010. Prof. Afra Zomorodian provided insight. This was a small late-start LDRD. Several other ongoing efforts were leveraged, including the Networks Grand Challenge LDRD, and the Computational Topology CSRF project, and the some of the leveraged work is described here. We proposed a sentence mining technique that exploited both the distribution and the order of parts-of-speech (POS) in sentences in English language documents. The ultimate goal was to be able to discover 'call-to-action' framing documents hidden within a corpus of mostly expository documents, even if the documents were all on the same topic and used the same vocabulary. Using POS was novel. We also took a novel approach to analyzing POS. We used the hypothesis that English follows a dynamical system and the POS are trajectories from one state to another. We analyzed the sequences of POS using support vector machines and the cycles of POS using computational homology. We discovered that the POS were a very weak signal and did not support our hypothesis well. Our original goal appeared to be unobtainable with our original approach. We turned our attention to study an aspect of a more traditional approach to distinguishing documents. Latent Dirichlet Allocation (LDA) turns documents into bags-of-words then into mixture-model points. A distance function is used to cluster groups of points to discover relatedness between documents. We performed a geometric and algebraic analysis of the most popular distance functions and made some significant and surprising discoveries, described in a separate technical report.

  12. Final report on LDRD project : coupling strategies for multi-physics applications.

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Matthew Morgan; Moffat, Harry K.; Carnes, Brian; Hooper, Russell Warren; Pawlowski, Roger P.

    2007-11-01

    Many current and future modeling applications at Sandia including ASC milestones will critically depend on the simultaneous solution of vastly different physical phenomena. Issues due to code coupling are often not addressed, understood, or even recognized. The objectives of the LDRD has been both in theory and in code development. We will show that we have provided a fundamental analysis of coupling, i.e., when strong coupling vs. a successive substitution strategy is needed. We have enabled the implementation of tighter coupling strategies through additions to the NOX and Sierra code suites to make coupling strategies available now. We have leveraged existing functionality to do this. Specifically, we have built into NOX the capability to handle fully coupled simulations from multiple codes, and we have also built into NOX the capability to handle Jacobi Free Newton Krylov simulations that link multiple applications. We show how this capability may be accessed from within the Sierra Framework as well as from outside of Sierra. The critical impact from this LDRD is that we have shown how and have delivered strategies for enabling strong Newton-based coupling while respecting the modularity of existing codes. This will facilitate the use of these codes in a coupled manner to solve multi-physic applications.

  13. Authenticating Children's Literature: Raising Cultural Awareness with an Inquiry-Based Project in a Teacher Education Course

    Science.gov (United States)

    Smith, Jane; Wiese, Patricia

    2006-01-01

    This article discusses the importance of authentic picture-storybook adaptations of multicultural folktales and describes an action research project through which a children's picture-book adaptation of a traditional tale can be authenticated using an inquiry-based process. In addition to modeling an actual authentication project using "The Golden…

  14. LDRD Highlights at the National Laboratories

    Energy Technology Data Exchange (ETDEWEB)

    Alayat, R. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-10-10

    To meet the nation’s critical challenges, the Department of Energy (DOE) national laboratories have always pushed the boundaries of science, technology, and engineering. The Atomic Energy Act of 1954 provided the basis for these laboratories to engage in the cutting edge of science and technology and respond to technological surprises, while retaining the best scientific and technological minds. To help re-energize this commitment, in 1991 the U.S. Congress authorized the national laboratories to devote a relatively small percentage of their budget to creative and innovative work that serves to maintain their vitality in disciplines relevant to DOE missions. Since then, this effort has been formally called the Laboratory Directed Research and Development (LDRD) Program. LDRD has been an essential mechanism to enable the laboratories to address DOE’s current and future missions with leading-edge research proposed independently by laboratory technical staff, evaluated through expert peer-review committees, and funded by the individual laboratories consistent with the authorizing legislation and the DOE LDRD Order 413.2C.

  15. Neurons to algorithms LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Rothganger, Fredrick H.; Aimone, James Bradley; Warrender, Christina E.; Trumbo, Derek

    2013-09-01

    Over the last three years the Neurons to Algorithms (N2A) LDRD project teams has built infrastructure to discover computational structures in the brain. This consists of a modeling language, a tool that enables model development and simulation in that language, and initial connections with the Neuroinformatics community, a group working toward similar goals. The approach of N2A is to express large complex systems like the brain as populations of a discrete part types that have specific structural relationships with each other, along with internal and structural dynamics. Such an evolving mathematical system may be able to capture the essence of neural processing, and ultimately of thought itself. This final report is a cover for the actual products of the project: the N2A Language Specification, the N2A Application, and a journal paper summarizing our methods.

  16. Nanoporous Silica Templated HeteroEpitaxy: Final LDRD Report.

    Energy Technology Data Exchange (ETDEWEB)

    Burckel, David Bruce; Koleske, Daniel; Rowen, Adam M.; Williams, John Dalton; Fan, Hongyou; Arrington, Christian Lew

    2006-11-01

    This one-year out-of-the-box LDRD was focused on exploring the use of porous growth masks as a method for defect reduction during heteroepitaxial crystal growth. Initially our goal was to investigate porous silica as a growth mask, however, we expanded the scope of the research to include several other porous growth masks on various size scales, including mesoporous carbon, and the UV curable epoxy, SU-8. Use of SU-8 as a growth mask represents a new direction, unique in the extensive literature of patterned epitaxial growth, and presents the possibility of providing a single step growth mask. Additional research included investigation of pore viability via electrochemical deposition into high aspect ratio photoresist patterns and pilot work on using SU-8 as a DUV negative resist, another significant potential result. While the late start nature of this project pushed some of the initial research goals out of the time table, significant progress was made. 3 Acknowledgements This work was performed in part at the Nanoscience @ UNM facility, a member of the National Nanotechnology Infrastructure Network, which is supported by the National Science Foundation (Grant ECS 03-35765). Sandia is multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United Stated Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. This work was supported under the Sandia LDRD program (Project 99405). 4

  17. Efficient Probability of Failure Calculations for QMU using Computational Geometry LDRD 13-0144 Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Scott A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ebeida, Mohamed Salah [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Romero, Vicente J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Swiler, Laura Painton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rushdi, Ahmad A. [Univ. of Texas, Austin, TX (United States); Abdelkader, Ahmad [Univ. of Maryland, College Park, MD (United States)

    2015-09-01

    This SAND report summarizes our work on the Sandia National Laboratory LDRD project titled "Efficient Probability of Failure Calculations for QMU using Computational Geometry" which was project #165617 and proposal #13-0144. This report merely summarizes our work. Those interested in the technical details are encouraged to read the full published results, and contact the report authors for the status of the software and follow-on projects.

  18. LDRD final report : robust analysis of large-scale combinatorial applications.

    Energy Technology Data Exchange (ETDEWEB)

    Carr, Robert D.; Morrison, Todd (University of Colorado, Denver, CO); Hart, William Eugene; Benavides, Nicolas L. (Santa Clara University, Santa Clara, CA); Greenberg, Harvey J. (University of Colorado, Denver, CO); Watson, Jean-Paul; Phillips, Cynthia Ann

    2007-09-01

    Discrete models of large, complex systems like national infrastructures and complex logistics frameworks naturally incorporate many modeling uncertainties. Consequently, there is a clear need for optimization techniques that can robustly account for risks associated with modeling uncertainties. This report summarizes the progress of the Late-Start LDRD 'Robust Analysis of Largescale Combinatorial Applications'. This project developed new heuristics for solving robust optimization models, and developed new robust optimization models for describing uncertainty scenarios.

  19. Authentication Using Mobile Phones

    OpenAIRE

    Fusek, Z.

    2015-01-01

    This project deals with authentication by a mobile device. The mobile device with the operating system Android 5.0 was chosen as authentication device. The user can perform authentication with emulation of contactless chip cards by using Host-based Card Emulation, which runs via Near Field Communication, where cryptographic keys are stored in a secure environment KeyStore. The project continues with implementation of authentication via Bluetooth LE and describes application for authentization...

  20. LDRD Report: Topological Design Optimization of Convolutes in Next Generation Pulsed Power Devices.

    Energy Technology Data Exchange (ETDEWEB)

    Cyr, Eric C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); von Winckel, Gregory John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Kouri, Drew Philip [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gardiner, Thomas Anthony [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ridzal, Denis [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Shadid, John N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Miller, Sean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    This LDRD project was developed around the ambitious goal of applying PDE-constrained opti- mization approaches to design Z-machine components whose performance is governed by elec- tromagnetic and plasma models. This report documents the results of this LDRD project. Our differentiating approach was to use topology optimization methods developed for structural design and extend them for application to electromagnetic systems pertinent to the Z-machine. To achieve this objective a suite of optimization algorithms were implemented in the ROL library part of the Trilinos framework. These methods were applied to standalone demonstration problems and the Drekar multi-physics research application. Out of this exploration a new augmented Lagrangian approach to structural design problems was developed. We demonstrate that this approach has favorable mesh-independent performance. Both the final design and the algorithmic performance were independent of the size of the mesh. In addition, topology optimization formulations for the design of conducting networks were developed and demonstrated. Of note, this formulation was used to develop a design for the inner magnetically insulated transmission line on the Z-machine. The resulting electromagnetic device is compared with theoretically postulated designs.

  1. Authentic research projects: Students' perspectives on the process, ownership, and benefits of doing research

    Science.gov (United States)

    Bernard, Warren

    2005-11-01

    Authentic research projects are one type of inquiry activity as defined by the American Association for the Advancement of Science (1993) and are a core component in science education reform movements. The purpose of this study was to examine high school students' perspectives of an authentic research project. The context for this study was a local Science and Engineering Fair (SEF) that involved students from a Metro-Atlanta public high school. This study provided information about this type of activity from the student's perspective, an emic viewpoint. In this qualitative study, demographic information was used for the purposeful selection of fourteen students making up the study sample. In this descriptive ethnography, data were collected via an open-ended survey, three individual interviews, a web log, and a group interview. Interviews were audio taped and conducted according to the protocol established by Lincoln and Guba (1998). Transcripts of the interviews, web logs, and survey responses were coded and analyzed by the constant comparative method as described by Glaser and Strauss (1965). Reliability and validity were achieved through member checks and triangulation. Using Gowin's Vee diagram (1981) as a theoretical framework for analysis, themes emerged describing the students' research experience. The themes included the students' initial reactions, difficulty getting started, accepting ownership of their project, growing interest, acknowledged benefits of the research experience, and a reflective look back at their experience. Overall, students described the authentic research experience as a worthwhile activity. The implications of the study are two-fold. At the practitioner level, teachers should engage students in research, but should do so in a manner that maximizes authenticity. Examples may include having students present a formal prospectus and work with a scientist mentor. For Science Educators in teacher preparation programs, there should be an

  2. Learning in Authentic Contexts: Projects Integrating Spatial Technologies and Fieldwork

    Science.gov (United States)

    Huang, Kuo-Hung

    2011-01-01

    In recent years, professional practice has been an issue of concern in higher education. The purpose of this study is to design students' projects to facilitate collaborative learning in authentic contexts. Ten students majoring in Management Information Systems conducted fieldwork with spatial technologies to collect data and provided information…

  3. Final LDRD report : advanced plastic scintillators for neutron detection.

    Energy Technology Data Exchange (ETDEWEB)

    Vance, Andrew L.; Mascarenhas, Nicholas; O' Bryan, Greg; Mrowka, Stanley

    2010-09-01

    This report summarizes the results of a one-year, feasibility-scale LDRD project that was conducted with the goal of developing new plastic scintillators capable of pulse shape discrimination (PSD) for neutron detection. Copolymers composed of matrix materials such as poly(methyl methacrylate) (PMMA) and blocks containing trans-stilbene (tSB) as the scintillator component were prepared and tested for gamma/neutron response. Block copolymer synthesis utilizing tSBMA proved unsuccessful so random copolymers containing up to 30% tSB were prepared. These copolymers were found to function as scintillators upon exposure to gamma radiation; however, they did not exhibit PSD when exposed to a neutron source. This project, while falling short of its ultimate goal, demonstrated the possible utility of single-component, undoped plastics as scintillators for applications that do not require PSD.

  4. Final Report for LDRD Project 02-FS-009 Gigapixel Surveillance Camera

    Energy Technology Data Exchange (ETDEWEB)

    Marrs, R E; Bennett, C L

    2010-04-20

    The threats of terrorism and proliferation of weapons of mass destruction add urgency to the development of new techniques for surveillance and intelligence collection. For example, the United States faces a serious and growing threat from adversaries who locate key facilities underground, hide them within other facilities, or otherwise conceal their location and function. Reconnaissance photographs are one of the most important tools for uncovering the capabilities of adversaries. However, current imaging technology provides only infrequent static images of a large area, or occasional video of a small area. We are attempting to add a new dimension to reconnaissance by introducing a capability for large area video surveillance. This capability would enable tracking of all vehicle movements within a very large area. The goal of our project is the development of a gigapixel video surveillance camera for high altitude aircraft or balloon platforms. From very high altitude platforms (20-40 km altitude) it would be possible to track every moving vehicle within an area of roughly 100 km x 100 km, about the size of the San Francisco Bay region, with a gigapixel camera. Reliable tracking of vehicles requires a ground sampling distance (GSD) of 0.5 to 1 m and a framing rate of approximately two frames per second (fps). For a 100 km x 100 km area the corresponding pixel count is 10 gigapixels for a 1-m GSD and 40 gigapixels for a 0.5-m GSD. This is an order of magnitude beyond the 1 gigapixel camera envisioned in our LDRD proposal. We have determined that an instrument of this capacity is feasible.

  5. LDRD Final Report - Investigations of the impact of the process integration of deposited magnetic films for magnetic memory technologies on radiation-hardened CMOS devices and circuits - LDRD Project (FY99)

    Energy Technology Data Exchange (ETDEWEB)

    MYERS,DAVID R.; JESSING,JEFFREY R.; SPAHN,OLGA B.; SHANEYFELT,MARTY R.

    2000-01-01

    This project represented a coordinated LLNL-SNL collaboration to investigate the feasibility of developing radiation-hardened magnetic non-volatile memories using giant magnetoresistance (GMR) materials. The intent of this limited-duration study was to investigate whether giant magnetoresistance (GMR) materials similar to those used for magnetic tunnel junctions (MTJs) were process compatible with functioning CMOS circuits. Sandia's work on this project demonstrated that deposition of GMR materials did not affect the operation nor the radiation hardness of Sandia's rad-hard CMOS technology, nor did the integration of GMR materials and exposure to ionizing radiation affect the magnetic properties of the GMR films. Thus, following deposition of GMR films on rad-hard integrated circuits, both the circuits and the films survived ionizing radiation levels consistent with DOE mission requirements. Furthermore, Sandia developed techniques to pattern deposited GMR films without degrading the completed integrated circuits upon which they were deposited. The present feasibility study demonstrated all the necessary processing elements to allow fabrication of the non-volatile memory elements onto an existing CMOS chip, and even allow the use of embedded (on-chip) non-volatile memories for system-on-a-chip applications, even in demanding radiation environments. However, funding agencies DTRA, AIM, and DARPA did not have any funds available to support the required follow-on technology development projects that would have been required to develop functioning prototype circuits, nor were such funds available from LDRD nor from other DOE program funds.

  6. LDRD Final Report - Investigations of the impact of the process integration of deposited magnetic films for magnetic memory technologies on radiation hardened CMOS devices and circuits - LDRD Project (FY99)

    International Nuclear Information System (INIS)

    Myers, David R.; Jessing, Jeffrey R.; Spahn, Olga B.; Shaneyfelt, Marty R.

    2000-01-01

    This project represented a coordinated LLNL-SNL collaboration to investigate the feasibility of developing radiation-hardened magnetic non-volatile memories using giant magnetoresistance (GMR) materials. The intent of this limited-duration study was to investigate whether giant magnetoresistance (GMR) materials similar to those used for magnetic tunnel junctions (MTJs) were process compatible with functioning CMOS circuits. Sandia's work on this project demonstrated that deposition of GMR materials did not affect the operation nor the radiation hardness of Sandia's rad-hard CMOS technology, nor did the integration of GMR materials and exposure to ionizing radiation affect the magnetic properties of the GMR films. Thus, following deposition of GMR films on rad-hard integrated circuits, both the circuits and the films survived ionizing radiation levels consistent with DOE mission requirements. Furthermore, Sandia developed techniques to pattern deposited GMR films without degrading the completed integrated circuits upon which they were deposited. The present feasibility study demonstrated all the necessary processing elements to allow fabrication of the non-volatile memory elements onto an existing CMOS chip, and even allow the use of embedded (on-chip) non-volatile memories for system-on-a-chip applications, even in demanding radiation environments. However, funding agencies DTRA, AIM, and DARPA did not have any funds available to support the required follow-on technology development projects that would have been required to develop functioning prototype circuits, nor were such funds available from LDRD nor from other DOE program funds

  7. LDRD final report : a lightweight operating system for multi-core capability class supercomputers.

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, Suzanne Marie; Hudson, Trammell B. (OS Research); Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Levenhagen, Michael J.; Brightwell, Ronald Brian

    2010-09-01

    The two primary objectives of this LDRD project were to create a lightweight kernel (LWK) operating system(OS) designed to take maximum advantage of multi-core processors, and to leverage the virtualization capabilities in modern multi-core processors to create a more flexible and adaptable LWK environment. The most significant technical accomplishments of this project were the development of the Kitten lightweight kernel, the co-development of the SMARTMAP intra-node memory mapping technique, and the development and demonstration of a scalable virtualization environment for HPC. Each of these topics is presented in this report by the inclusion of a published or submitted research paper. The results of this project are being leveraged by several ongoing and new research projects.

  8. Multi-target camera tracking, hand-off and display LDRD 158819 final report

    International Nuclear Information System (INIS)

    Anderson, Robert J.

    2014-01-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn't lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identifies individual moving targets from the background imagery, and then displays the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  9. Multi-target camera tracking, hand-off and display LDRD 158819 final report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn't lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identifies individual moving targets from the background imagery, and then displays the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  10. Multi-Target Camera Tracking, Hand-off and Display LDRD 158819 Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Robotic and Security Systems Dept.

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn’t lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identify individual moving targets from the background imagery, and then display the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  11. Evaluation of authentic science projects on climate change in secondary schools: a focus on gender differences

    Science.gov (United States)

    Dijkstra, Elma; Goedhart, Martin

    2011-07-01

    Background and purpose This study examines secondary-school students' opinions on participating in authentic science projects which are part of an international EU project on climate change research in seven countries. Partnerships between schools and research institutes result in student projects, in which students work with and learn from scientists about the global carbon cycle. This study focuses in particular on differences between male and female students, as female students normally like traditional school science less than male students. Sample and design Data, drawn from 1370 students from 60 secondary schools across Europe, were collected through questionnaires taken at the end of the projects. The evaluated aspects were: organization; enjoyment; difficulty; and impact of the projects. Results The findings suggest that authentic science education is appreciated very much by both male students and even more by female students. The projects had positive impacts on climate change ideas, in particular for female students. Female students felt that they had learned many new things more often than male students. Conclusions Both male and female students have positive opinions about the authentic science projects. The results further point to positive effects of activities in which students have an active role, like hands-on experiments or presentation of results. The findings are placed in the international context of science education and their implications for policy are discussed.

  12. Evaluation of authentic science projects on climate change in secondary schools : a focus on gender differences

    NARCIS (Netherlands)

    Dijkstra, Elma; Goedhart, Martin

    2011-01-01

    Background and purpose: This study examines secondary-school students' opinions on participating in authentic science projects, which are part of an international EU project on climate change research in seven countries. Partnerships between schools and research institutes result in student projects

  13. Retrospective on the Seniors' Council Tier 1 LDRD portfolio.

    Energy Technology Data Exchange (ETDEWEB)

    Ballard, William Parker

    2012-04-01

    This report describes the Tier 1 LDRD portfolio, administered by the Seniors Council between 2003 and 2011. 73 projects were sponsored over the 9 years of the portfolio at a cost of $10.5 million which includes $1.9M of a special effort in directed innovation targeted at climate change and cyber security. Two of these Tier 1 efforts were the seeds for the Grand Challenge LDRDs in Quantum Computing and Next Generation Photovoltaic conversion. A few LDRDs were terminated early when it appeared clear that the research was not going to succeed. A great many more were successful and led to full Tier 2 LDRDs or direct customer sponsorship. Over a dozen patents are in various stages of prosecution from this work, and one project is being submitted for an R and D 100 award.

  14. 2014 SRNL LDRD Annual Report, Rev. 0

    Energy Technology Data Exchange (ETDEWEB)

    Mcwhorter, S. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-03-15

    Laboratory Directed Research and Development is a congressionally authorized program that provides the ‘innovation inspiration’ from which many of the Laboratory’s multi-discipline advancements are made in both science and engineering technology. The program is the backbone for insuring that scientific, technical and engineering capabilities can meet current and future needs. It is an important tool in reducing the probability of technological surprise by allowing laboratory technical staff room to innovate and keep abreast of scientific breakthroughs. Drawing from the synergism among the EM and NNSA missions, and work from other federal agencies ensures that LDRD is the key element in maintaining the vitality of SRNL’s technical programs. The LDRD program aims to position the Laboratory for new business in clean energy, national security, nuclear materials management and environmental stewardship by leveraging the unique capabilities of the Laboratory to yield foundational scientific research in core business areas, while aligning with SRS strategic initiatives and maintaining a vision for ultimate DOE applications.

  15. Three-dimensional gyrokinetic particle-in-cell simulation of plasmas on a massively parallel computer: Final report on LDRD Core Competency Project, FY 1991--FY 1993

    International Nuclear Information System (INIS)

    Byers, J.A.; Williams, T.J.; Cohen, B.I.; Dimits, A.M.

    1994-01-01

    One of the programs of the Magnetic fusion Energy (MFE) Theory and computations Program is studying the anomalous transport of thermal energy across the field lines in the core of a tokamak. We use the method of gyrokinetic particle-in-cell simulation in this study. For this LDRD project we employed massively parallel processing, new algorithms, and new algorithms, and new formal techniques to improve this research. Specifically, we sought to take steps toward: researching experimentally-relevant parameters in our simulations, learning parallel computing to have as a resource for our group, and achieving a 100 x speedup over our starting-point Cray2 simulation code's performance

  16. Tools for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-09

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  17. Tools for Authentication

    International Nuclear Information System (INIS)

    White, G.

    2008-01-01

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work

  18. Evaluation of Authentic Science Projects on Climate Change in Secondary Schools: A Focus on Gender Differences

    Science.gov (United States)

    Dijkstra, Elma; Goedhart, Martin

    2011-01-01

    Background and purpose: This study examines secondary-school students' opinions on participating in authentic science projects which are part of an international EU project on climate change research in seven countries. Partnerships between schools and research institutes result in student projects, in which students work with and learn from…

  19. Building more powerful less expensive supercomputers using Processing-In-Memory (PIM) LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Murphy, Richard C.

    2009-09-01

    This report details the accomplishments of the 'Building More Powerful Less Expensive Supercomputers Using Processing-In-Memory (PIM)' LDRD ('PIM LDRD', number 105809) for FY07-FY09. Latency dominates all levels of supercomputer design. Within a node, increasing memory latency, relative to processor cycle time, limits CPU performance. Between nodes, the same increase in relative latency impacts scalability. Processing-In-Memory (PIM) is an architecture that directly addresses this problem using enhanced chip fabrication technology and machine organization. PIMs combine high-speed logic and dense, low-latency, high-bandwidth DRAM, and lightweight threads that tolerate latency by performing useful work during memory transactions. This work examines the potential of PIM-based architectures to support mission critical Sandia applications and an emerging class of more data intensive informatics applications. This work has resulted in a stronger architecture/implementation collaboration between 1400 and 1700. Additionally, key technology components have impacted vendor roadmaps, and we are in the process of pursuing these new collaborations. This work has the potential to impact future supercomputer design and construction, reducing power and increasing performance. This final report is organized as follow: this summary chapter discusses the impact of the project (Section 1), provides an enumeration of publications and other public discussion of the work (Section 1), and concludes with a discussion of future work and impact from the project (Section 1). The appendix contains reprints of the refereed publications resulting from this work.

  20. Final report for the network authentication investigation and pilot.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  1. LDRD final report : mesoscale modeling of dynamic loading of heterogeneous materials

    Energy Technology Data Exchange (ETDEWEB)

    Robbins, Joshua [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dingreville, Remi Philippe Michel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Voth, Thomas Eugene [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Furnish, Michael David [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-12-01

    Material response to dynamic loading is often dominated by microstructure (grain structure, porosity, inclusions, defects). An example critically important to Sandia's mission is dynamic strength of polycrystalline metals where heterogeneities lead to localization of deformation and loss of shear strength. Microstructural effects are of broad importance to the scientific community and several institutions within DoD and DOE; however, current models rely on inaccurate assumptions about mechanisms at the sub-continuum or mesoscale. Consequently, there is a critical need for accurate and robust methods for modeling heterogeneous material response at this lower length scale. This report summarizes work performed as part of an LDRD effort (FY11 to FY13; project number 151364) to meet these needs.

  2. Idaho National Laboratory LDRD Annual Report FY 2012

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2013-03-01

    This report provides a glimpse into our diverse research and development portfolio, wwhich encompasses both advanced nuclear science and technology and underlying technologies. IN keeping with the mission, INL's LDRD program fosters technical capabilities necessary to support current and future DOE-Office of Nuclear Energy research and development needs.

  3. Designing Pu600 for Authentication

    International Nuclear Information System (INIS)

    White, G.

    2008-01-01

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work

  4. Authentic And Concurrent Evaluation-refining

    DEFF Research Database (Denmark)

    Eriksson, Carina Ihlström; Åkesson, Maria; Kautz, Karlheinz

    2011-01-01

    This paper addresses the need for more detailed accounts for evaluation in design science research literature. By revisiting a design project regarding the future e-newspaper we give detailed descriptions of its authentic and concurrent evaluation approach by illustrating the what, why and how...... of all evaluation activities throughout the whole project. The project produced seven different design artifacts that were evaluated. The utility and theoretical outcomes of the evaluation activities clearly influenced design decisions regarding newspaper design, user value and business model design...... as well as decisions on strategic levels. We emphasize a holistic and concurrent approach to evaluation compared to the general design science research thinking and argue that reflecting on how to seek authenticity is important. By authenticity we refer to the notion of how closely an evaluation captures...

  5. LDRD project final report : hybrid AI/cognitive tactical behavior framework for LVC.

    Energy Technology Data Exchange (ETDEWEB)

    Djordjevich, Donna D.; Xavier, Patrick Gordon; Brannon, Nathan Gregory; Hart, Brian E.; Hart, Derek H.; Little, Charles Quentin; Oppel, Fred John III; Linebarger, John Michael; Parker, Eric Paul

    2012-01-01

    This Lab-Directed Research and Development (LDRD) sought to develop technology that enhances scenario construction speed, entity behavior robustness, and scalability in Live-Virtual-Constructive (LVC) simulation. We investigated issues in both simulation architecture and behavior modeling. We developed path-planning technology that improves the ability to express intent in the planning task while still permitting an efficient search algorithm. An LVC simulation demonstrated how this enables 'one-click' layout of squad tactical paths, as well as dynamic re-planning for simulated squads and for real and simulated mobile robots. We identified human response latencies that can be exploited in parallel/distributed architectures. We did an experimental study to determine where parallelization would be productive in Umbra-based force-on-force (FOF) simulations. We developed and implemented a data-driven simulation composition approach that solves entity class hierarchy issues and supports assurance of simulation fairness. Finally, we proposed a flexible framework to enable integration of multiple behavior modeling components that model working memory phenomena with different degrees of sophistication.

  6. Image authentication using distributed source coding.

    Science.gov (United States)

    Lin, Yao-Chung; Varodayan, David; Girod, Bernd

    2012-01-01

    We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.

  7. Designing Pu600 for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-10

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work.

  8. Final LDRD report :ultraviolet water purification systems for rural environments and mobile applications.

    Energy Technology Data Exchange (ETDEWEB)

    Banas, Michael Anthony; Crawford, Mary Hagerott; Ruby, Douglas Scott; Ross, Michael P.; Nelson, Jeffrey Scott; Allerman, Andrew Alan; Boucher, Ray

    2005-11-01

    We present the results of a one year LDRD program that has focused on evaluating the use of newly developed deep ultraviolet LEDs in water purification. We describe our development efforts that have produced an LED-based water exposure set-up and enumerate the advances that have been made in deep UV LED performance throughout the project. The results of E. coli inactivation with 270-295 nm LEDs are presented along with an assessment of the potential for applying deep ultraviolet LED-based water purification to mobile point-of-use applications as well as to rural and international environments where the benefits of photovoltaic-powered systems can be realized.

  9. Tracking of Nuclear Production using Indigenous Species: Final LDRD Report

    International Nuclear Information System (INIS)

    Alam, Todd Michael; Alam, Mary Kathleen; McIntyre, Sarah K.; Volk, David; Neerathilingam, Muniasamy; Luxon, Bruce A.; Ansari, G. A. Shakeel

    2009-01-01

    Our LDRD research project sought to develop an analytical method for detection of chemicals used in nuclear materials processing. Our approach is distinctly different than current research involving hardware-based sensors. By utilizing the response of indigenous species of plants and/or animals surrounding (or within) a nuclear processing facility, we propose tracking 'suspicious molecules' relevant to nuclear materials processing. As proof of concept, we have examined TBP, tributylphosphate, used in uranium enrichment as well as plutonium extraction from spent nuclear fuels. We will compare TBP to the TPP (triphenylphosphate) analog to determine the uniqueness of the metabonomic response. We show that there is a unique metabonomic response within our animal model to TBP. The TBP signature can further be delineated from that of TPP. We have also developed unique methods of instrumental transfer for metabonomic data sets.

  10. Tracking of Nuclear Production using Indigenous Species: Final LDRD Report

    Energy Technology Data Exchange (ETDEWEB)

    Alam, Todd Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Dept. of Electronic and Nanostructured Materials; Alam, Mary Kathleen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Energetics Characterization Dept.; McIntyre, Sarah K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Dept. of Electronic and Nanostructured Materials; Volk, David [Univ. of Texas, Galveston, TX (United States). Medical Branch; Neerathilingam, Muniasamy [Univ. of Texas, Galveston, TX (United States). Medical Branch; Luxon, Bruce A. [Univ. of Texas, Galveston, TX (United States). Medical Branch; Ansari, G. A. Shakeel [Univ. of Texas, Galveston, TX (United States). Medical Branch

    2009-10-01

    Our LDRD research project sought to develop an analytical method for detection of chemicals used in nuclear materials processing. Our approach is distinctly different than current research involving hardware-based sensors. By utilizing the response of indigenous species of plants and/or animals surrounding (or within) a nuclear processing facility, we propose tracking 'suspicious molecules' relevant to nuclear materials processing. As proof of concept, we have examined TBP, tributylphosphate, used in uranium enrichment as well as plutonium extraction from spent nuclear fuels. We will compare TBP to the TPP (triphenylphosphate) analog to determine the uniqueness of the metabonomic response. We show that there is a unique metabonomic response within our animal model to TBP. The TBP signature can further be delineated from that of TPP. We have also developed unique methods of instrumental transfer for metabonomic data sets.

  11. Using Rose and Compass for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2009-07-09

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  12. Using Rose and Compass for Authentication

    International Nuclear Information System (INIS)

    White, G.

    2009-01-01

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work

  13. Automated Algorithms for Quantum-Level Accuracy in Atomistic Simulations: LDRD Final Report.

    Energy Technology Data Exchange (ETDEWEB)

    Thompson, Aidan Patrick; Schultz, Peter Andrew; Crozier, Paul; Moore, Stan Gerald; Swiler, Laura Painton; Stephens, John Adam; Trott, Christian Robert; Foiles, Stephen Martin; Tucker, Garritt J. (Drexel University)

    2014-09-01

    This report summarizes the result of LDRD project 12-0395, titled "Automated Algorithms for Quantum-level Accuracy in Atomistic Simulations." During the course of this LDRD, we have developed an interatomic potential for solids and liquids called Spectral Neighbor Analysis Poten- tial (SNAP). The SNAP potential has a very general form and uses machine-learning techniques to reproduce the energies, forces, and stress tensors of a large set of small configurations of atoms, which are obtained using high-accuracy quantum electronic structure (QM) calculations. The local environment of each atom is characterized by a set of bispectrum components of the local neighbor density projected on to a basis of hyperspherical harmonics in four dimensions. The SNAP coef- ficients are determined using weighted least-squares linear regression against the full QM training set. This allows the SNAP potential to be fit in a robust, automated manner to large QM data sets using many bispectrum components. The calculation of the bispectrum components and the SNAP potential are implemented in the LAMMPS parallel molecular dynamics code. Global optimization methods in the DAKOTA software package are used to seek out good choices of hyperparameters that define the overall structure of the SNAP potential. FitSnap.py, a Python-based software pack- age interfacing to both LAMMPS and DAKOTA is used to formulate the linear regression problem, solve it, and analyze the accuracy of the resultant SNAP potential. We describe a SNAP potential for tantalum that accurately reproduces a variety of solid and liquid properties. Most significantly, in contrast to existing tantalum potentials, SNAP correctly predicts the Peierls barrier for screw dislocation motion. We also present results from SNAP potentials generated for indium phosphide (InP) and silica (SiO 2 ). We describe efficient algorithms for calculating SNAP forces and energies in molecular dynamics simulations using massively parallel computers

  14. Authentic Leadership Kepala Sekolah dalam Menanamkan Sistem Nilai

    OpenAIRE

    Aan Komariah

    2013-01-01

    Abstract: The Authentic Leadership of School Principals in Inculcating Value System. The present article reports on a research project aimed at examining the extent to which “ authentic ladership” is important as an alternative leadership model to apply at schools to inculcate value and character systems of the school community. It was also aimed at examining the dimensionality of the authentic leaderhip . Delphi Survey method was implemented to assess the importance of authentic leadership. ...

  15. Authentic Leadership Kepala Sekolah Dalam Menanamkan Sistem Nilai

    OpenAIRE

    Komariah, Aan

    2012-01-01

    : The Authentic Leadership of School Principals in Inculcating Value System. The present article reports on a research project aimed at examining the extent to which “ authentic ladership” is important as an alternative leadership model to apply at schools to inculcate value and character systems of the school community. It was also aimed at examining the dimensionality of the authentic leaderhip . Delphi Survey method was implemented to assess the importance of authentic leadership. The stud...

  16. Laboratory Directed Research and Development Program FY2016 Annual Summary of Completed Projects

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2017-03-30

    ORNL FY 2016 Annual Summary of Laboratory Directed Research and Development Program (LDRD) Completed Projects. The Laboratory Directed Research and Development (LDRD) program at ORNL operates under the authority of DOE Order 413.2C, “Laboratory Directed Research and Development” (October 22, 2015), which establishes DOE’s requirements for the program while providing the Laboratory Director broad flexibility for program implementation. The LDRD program funds are obtained through a charge to all Laboratory programs. ORNL reports its status to DOE in March of each year.

  17. Final LDRD report : development of advanced UV light emitters and biological agent detection strategies.

    Energy Technology Data Exchange (ETDEWEB)

    Figiel, Jeffrey James; Crawford, Mary Hagerott; Banas, Michael Anthony; Farrow, Darcie; Armstrong, Andrew M.; Serkland, Darwin Keith; Allerman, Andrew Alan; Schmitt, Randal L.

    2007-12-01

    We present the results of a three year LDRD project which has focused on the development of novel, compact, ultraviolet solid-state sources and fluorescence-based sensing platforms that apply such devices to the sensing of biological and nuclear materials. We describe our development of 270-280 nm AlGaN-based semiconductor UV LEDs with performance suitable for evaluation in biosensor platforms as well as our development efforts towards the realization of a 340 nm AlGaN-based laser diode technology. We further review our sensor development efforts, including evaluation of the efficacy of using modulated LED excitation and phase sensitive detection techniques for fluorescence detection of bio molecules and uranyl-containing compounds.

  18. Exploration of cloud computing late start LDRD #149630 : Raincoat. v. 2.1.

    Energy Technology Data Exchange (ETDEWEB)

    Echeverria, Victor T.; Metral, Michael David; Leger, Michelle A.; Gabert, Kasimir Georg; Edgett, Patrick Garrett; Thai, Tan Q.

    2010-09-01

    This report contains documentation from an interoperability study conducted under the Late Start LDRD 149630, Exploration of Cloud Computing. A small late-start LDRD from last year resulted in a study (Raincoat) on using Virtual Private Networks (VPNs) to enhance security in a hybrid cloud environment. Raincoat initially explored the use of OpenVPN on IPv4 and demonstrates that it is possible to secure the communication channel between two small 'test' clouds (a few nodes each) at New Mexico Tech and Sandia. We extended the Raincoat study to add IPSec support via Vyatta routers, to interface with a public cloud (Amazon Elastic Compute Cloud (EC2)), and to be significantly more scalable than the previous iteration. The study contributed to our understanding of interoperability in a hybrid cloud.

  19. Strengthening Software Authentication with the ROSE Software Suite

    International Nuclear Information System (INIS)

    White, G

    2006-01-01

    Many recent nonproliferation and arms control software projects include a software authentication regime. These include U.S. Government-sponsored projects both in the United States and in the Russian Federation (RF). This trend toward requiring software authentication is only accelerating. Demonstrating assurance that software performs as expected without hidden ''backdoors'' is crucial to a project's success. In this context, ''authentication'' is defined as determining that a software package performs only its intended purpose and performs said purpose correctly and reliably over the planned duration of an agreement. In addition to visual inspections by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs, both to aid visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary and not extensible. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool has to be based on a complete language compiler. ROSE is precisely such a compiler infrastructure developed within the Department of Energy (DOE) and targeted at the optimization of scientific applications and user-defined libraries within large-scale applications (typically applications of a million lines of code). ROSE is a robust, source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C and C++ (handling the full C, C99, C++ languages and with current collaborations to support Fortran90). We propose to extend ROSE to address a number of security-specific requirements, and apply it to software authentication for nonproliferation and arms control projects

  20. Authentic Teachers: Student Criteria Perceiving Authenticity of Teachers

    Science.gov (United States)

    De Bruyckere, Pedro; Kirschner, Paul A.

    2016-01-01

    Authenticity is seen by many as a key for good learning and education. There is talk of authentic instruction, authentic learning, authentic problems, authentic assessment, authentic tools and authentic teachers. The problem is that while authenticity is an often-used adjective describing almost all aspects of teaching and learning, the concept…

  1. Writing the Book…Literally: The Convergence of Authentic Intellectual Work (AIW) and Project-Based Learning (PBL)

    Science.gov (United States)

    Buckmiller, Tom M.; Kruse, Jerrid W.

    2015-01-01

    Using the Project-Based Learning (PBL) and Authentic Intellectual Work (AIW) models, we sought to create coursework that had value beyond the classroom. Refinements in the self-publishing book industry provide the opportunity to present student work to a larger audience and in a different, more engaging format. With the help of free software, our…

  2. Real-time discriminatory sensors for water contamination events :LDRD 52595 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Borek, Theodore Thaddeus III (; ); Carrejo-Simpkins, Kimberly; Wheeler, David Roger; Adkins, Douglas Ray; Robinson, Alex Lockwood; Irwin, Adriane Nadine; Lewis, Patrick Raymond; Goodin, Andrew M.; Shelmidine, Gregory J.; Dirk, Shawn M.; Chambers, William Clayton; Mowry, Curtis Dale (1722 Micro-Total-Analytical Systems); Showalter, Steven Kedrick

    2005-10-01

    The gas-phase {mu}ChemLab{trademark} developed by Sandia can detect volatile organics and semi-volatiles organics via gas phase sampling . The goal of this three year Laboratory Directed Research and Development (LDRD) project was to adapt the components and concepts used by the {mu}ChemLab{trademark} system towards the analysis of water-borne chemicals of current concern. In essence, interfacing the gas-phase {mu}ChemLab{trademark} with water to bring the significant prior investment of Sandia and the advantages of microfabrication and portable analysis to a whole new world of important analytes. These include both chemical weapons agents and their hydrolysis products and disinfection by-products such as Trihalomethanes (THMs) and haloacetic acids (HAAs). THMs and HAAs are currently regulated by EPA due to health issues, yet water utilities do not have rapid on-site methods of detection that would allow them to adjust their processes quickly; protecting consumers, meeting water quality standards, and obeying regulations more easily and with greater confidence. This report documents the results, unique hardware and devices, and methods designed during the project toward the goal stated above. It also presents and discusses the portable field system to measure THMs developed in the course of this project.

  3. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner\\'s signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  4. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin; Papadias, Dimitris; Papadopoulos, Stavros; Kalnis, Panos

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  5. Unobtrusive behavioral and activity-related multimodal biometrics: The ACTIBIO Authentication concept.

    Science.gov (United States)

    Drosou, A; Ioannidis, D; Moustakas, K; Tzovaras, D

    2011-03-01

    Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.

  6. Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept

    Directory of Open Access Journals (Sweden)

    A. Drosou

    2011-01-01

    Full Text Available Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.

  7. ParaText : scalable solutions for processing and searching very large document collections : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Crossno, Patricia Joyce; Dunlavy, Daniel M.; Stanton, Eric T.; Shead, Timothy M.

    2010-09-01

    This report is a summary of the accomplishments of the 'Scalable Solutions for Processing and Searching Very Large Document Collections' LDRD, which ran from FY08 through FY10. Our goal was to investigate scalable text analysis; specifically, methods for information retrieval and visualization that could scale to extremely large document collections. Towards that end, we designed, implemented, and demonstrated a scalable framework for text analysis - ParaText - as a major project deliverable. Further, we demonstrated the benefits of using visual analysis in text analysis algorithm development, improved performance of heterogeneous ensemble models in data classification problems, and the advantages of information theoretic methods in user analysis and interpretation in cross language information retrieval. The project involved 5 members of the technical staff and 3 summer interns (including one who worked two summers). It resulted in a total of 14 publications, 3 new software libraries (2 open source and 1 internal to Sandia), several new end-user software applications, and over 20 presentations. Several follow-on projects have already begun or will start in FY11, with additional projects currently in proposal.

  8. Authentic Leadership Kepala Sekolah dalam Menanamkan Sistem Nilai

    Directory of Open Access Journals (Sweden)

    Aan Komariah

    2013-07-01

    Full Text Available Abstract: The Authentic Leadership of School Principals in Inculcating Value System. The present article reports on a research project aimed at examining the extent to which “ authentic ladership” is important as an alternative leadership model to apply at schools to inculcate value and character systems of the school community. It was also aimed at examining the dimensionality of the authentic leaderhip . Delphi Survey method was implemented to assess the importance of authentic leadership. The study involved 62 superintendants who were formerly principals of secondary schools, high schools, and vocational schools in Bandung, West Java. The results show that authentic leadership was a suitable type of leadership model to effectively instill value system. It also demonstrated that authentic leadership was a unidimensional construct. Abstrak: Authentic Leadership Kepala Sekolah dalam Menanamkan Sistem Nilai. Penelitian ini bertujuan untuk menguji seberapa penting authentic leadership untuk dijadikan sebagai alternatif kepemimpinan di sekolah untuk menanamkan sistem nilai dan karakter warga sekolah serta menguji multidimensionalitas konstruk authentic leadership di sekolah. Metode Delphi Survey digunakan untuk pengujian tingkat pentingnya perilaku authentic leadership dengan partisipan 62 pengawas mantan kepala sekolah SMP, SMA dan SMK di Kota Bandung. Hasil penelitian menunjukan bahwa authentic leadership adalah tipe kepemimpinan yang tepat untuk menanamkan sistem nilai secara efektif. Penelitian juga membuktikan bahwa authentic leadership merupakan konstruk yang bersifat unidimensional.

  9. Microwave to millimeter-wave electrodynamic response and applications of semiconductor nanostructures: LDRD project 67025 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Shaner, Eric Arthur; Lee, Mark; Averitt, R. D. (Los Alamos National Laboratory); Highstrete, Clark; Taylor, A. J. (Los Alamos National Laboratory); Padilla, W. J. (Los Alamos National Laboratory); Reno, John Louis; Wanke, Michael Clement; Allen, S. James (University of California Santa Barbara)

    2006-11-01

    Solid-state lighting (SSL) technologies, based on semiconductor light emitting devices, have the potential to reduce worldwide electricity consumption by more than 10%, which could significantly reduce U.S. dependence on imported energy and improve energy security. The III-nitride (AlGaInN) materials system forms the foundation for white SSL and could cover a wide spectral range from the deep UV to the infrared. For this LDRD program, we have investigated the synthesis of single-crystalline III-nitride nanowires and heterostructure nanowires, which may possess unique optoelectronic properties. These novel structures could ultimately lead to the development of novel and highly efficient SSL nanodevice applications. GaN and III-nitride core-shell heterostructure nanowires were successfully synthesized by metal organic chemical vapor deposition (MOCVD) on two-inch wafer substrates. The effect of process conditions on nanowire growth was investigated, and characterization of the structural, optical, and electrical properties of the nanowires was also performed.

  10. Final Report for the Virtual Reliability Realization System LDRD

    Energy Technology Data Exchange (ETDEWEB)

    DELLIN, THEODORE A.; HENDERSON, CHRISTOPHER L.; O' TOOLE, EDWARD J.

    2000-12-01

    Current approaches to reliability are not adequate to keep pace with the need for faster, better and cheaper products and systems. This is especially true in high consequence of failure applications. The original proposal for the LDRD was to look at this challenge and see if there was a new paradigm that could make reliability predictions, along with a quantitative estimate of the risk in that prediction, in a way that was faster, better and cheaper. Such an approach would be based on the underlying science models that are the backbone of reliability predictions. The new paradigm would be implemented in two software tools: the Virtual Reliability Realization System (VRRS) and the Reliability Expert System (REX). The three-year LDRD was funded at a reduced level for the first year ($120K vs. $250K) and not renewed. Because of the reduced funding, we concentrated on the initial development of the expertise system. We developed an interactive semiconductor calculation tool needed for reliability analyses. We also were able to generate a basic functional system using Microsoft Siteserver Commerce Edition and Microsoft Sequel Server. The base system has the capability to store Office documents from multiple authors, and has the ability to track and charge for usage. The full outline of the knowledge model has been incorporated as well as examples of various types of content.

  11. High-efficiency high-energy Ka source for the critically-required maximum illumination of x-ray optics on Z using Z-petawatt-driven laser-breakout-afterburner accelerated ultrarelativistic electrons LDRD .

    Energy Technology Data Exchange (ETDEWEB)

    Sefkow, Adam B.; Bennett, Guy R.

    2010-09-01

    Under the auspices of the Science of Extreme Environments LDRD program, a <2 year theoretical- and computational-physics study was performed (LDRD Project 130805) by Guy R Bennett (formally in Center-01600) and Adam B. Sefkow (Center-01600): To investigate novel target designs by which a short-pulse, PW-class beam could create a brighter K{alpha} x-ray source than by simple, direct-laser-irradiation of a flat foil; Direct-Foil-Irradiation (DFI). The computational studies - which are still ongoing at this writing - were performed primarily on the RedStorm supercomputer at Sandia National Laboratories Albuquerque site. The motivation for a higher efficiency K{alpha} emitter was very clear: as the backlighter flux for any x-ray imaging technique on the Z accelerator increases, the signal-to-noise and signal-to-background ratios improve. This ultimately allows the imaging system to reach its full quantitative potential as a diagnostic. Depending on the particular application/experiment this would imply, for example, that the system would have reached its full design spatial resolution and thus the capability to see features that might otherwise be indiscernible with a traditional DFI-like x-ray source. This LDRD began FY09 and ended FY10.

  12. PhytoAuthent: Molecular authentication of complex herbal food supplements for safety and efficacy

    Directory of Open Access Journals (Sweden)

    Mihael Ichim

    2017-10-01

    Full Text Available The PhytoAuthent project was structured to gather, test, develop and apply, in real life case scenarios, molecular techniques, such as biochemical fingerprinting and DNA sequence-based methods, for plant identification of constituents in complex herbal products. The project had a strong focus on applied aspects like protecting consumers from health risks associated with product substitution and contamination of herbal products.

  13. [Inheritance and innovation of traditional Chinese medicinal authentication].

    Science.gov (United States)

    Zhao, Zhong-zhen; Chen, Hu-biao; Xiao, Pei-gen; Guo, Ping; Liang, Zhi-tao; Hung, Fanny; Wong, Lai-lai; Brand, Eric; Liu, Jing

    2015-09-01

    Chinese medicinal authentication is fundamental for the standardization and globalization of Chinese medicine. The discipline of authentication addresses difficult issues that have remained unresolved for thousands of years, and is essential for preserving safety. Chinese medicinal authentication has both scientific and traditional cultural connotations; the use of scientific methods to elucidate traditional experience-based differentiation carries the legacy of Chinese medicine forward, and offers immediate practical significance and long-term scientific value. In this paper, a path of inheritance and innovation is explored through the scientific exposition of Chinese medicinal authentication, featuring a review of specialized publications, the establishment of a Chinese medicine specimen center and Chinese medicinal image databases, the expansion of authentication technologies, and the formation of a cultural project dedicated to the Compedium of Materia Medica.

  14. THE STUDENTS’ PERCEPTIONS OF AUTHENTIC TEXTS-BASED TRANSLATION

    Directory of Open Access Journals (Sweden)

    Rusiana .

    2017-12-01

    Full Text Available Translation requires lots of practice. As it is generally known, authentic texts provide fruitful experience for students to translate either Indonesian-English or vice versa. Authentic texts give many real uses of language in varied meaningful contexts The texts used were advertisement, abstract, local stories, tourist attraction, community service and project for money. This research is aimed at investigating whether the use of authentic texts benefits the students and describing the students’ perceptions toward the use of authentic texts in Translation class. It is a qualitative research. Questionnaires were used to obtain the students’ perceptions on the use of authentic texts in translation. The findings show that authentic texts-based translation benefits students in experiencing better translation. Advertisement was considered to be the most relevant text. On the contrary, they find it difficult to cope with authentic texts particularly dealing with words/terms/vocabulary, meanings, culture, and grammar. The recommendations are that the students have to be exposed to many authentic texts of varied topics in both English and Indonesian in order that they understand both the SL and TL well. For further researchers, it would be possible to research on the influence of authentic texts based translation on the students’ translation skill.

  15. "Applying anatomy to something I care about": Authentic inquiry learning and student experiences of an inquiry project.

    Science.gov (United States)

    Anstey, Lauren M

    2017-11-01

    Despite advances to move anatomy education away from its didactic history, there is a continued need for students to contextualize their studies to make learning more meaningful. This article investigates authentic learning in the context of an inquiry-based approach to learning human gross anatomy. Utilizing a case-study design with three groups of students (n = 18) and their facilitators (n = 3), methods of classroom observations, interviews, and artifact collection were utilized to investigate students' experiences of learning through an inquiry project. Qualitative data analysis through open and selective coding produced common meaningful themes of group and student experiences. Overall results demonstrate how the project served as a unique learning experience where learners engaged in the opportunity to make sense of anatomy in context of their interests and wider interdisciplinary considerations through collaborative, group-based investigation. Results were further considered in context of theoretical frameworks of inquiry-based and authentic learning. Results from this study demonstrate how students can engage anatomical understandings to inquire and apply disciplinary considerations to their personal lives and the world around them. Anat Sci Educ 10: 538-548. © 2017 American Association of Anatomists. © 2017 American Association of Anatomists.

  16. ESnet authentication services and trust federations

    Energy Technology Data Exchange (ETDEWEB)

    Muruganantham, Dhivakaran; Helm, Mike; Genovese, Tony [ESnet, Energy Sciences Network, 1 Cyclotron Road, MS 50A-3111 Berkeley, California 94720 (United States)

    2005-01-01

    ESnet provides authentication services and trust federation support for SciDAC projects, collaboratories, and other distributed computing applications. The ESnet ATF team operates the DOEGrids Certificate Authority, available to all DOE Office of Science programs, plus several custom CAs, including one for the National Fusion Collaboratory and one for NERSC. The secure hardware and software environment developed to support CAs is suitable for supporting additional custom authentication and authorization applications that your program might require. Seamless, secure interoperation across organizational and international boundaries is vital to collaborative science. We are fostering the development of international PKI federations by founding the TAGPMA, the American regional PMA, and the worldwide IGTF Policy Management Authority (PMA), as well as participating in European and Asian regional PMAs. We are investigating and prototyping distributed authentication technology that will allow us to support the 'roaming scientist' (distributed wireless via eduroam), as well as more secure authentication methods (one-time password tokens)

  17. ESnet authentication services and trust federations

    International Nuclear Information System (INIS)

    Muruganantham, Dhivakaran; Helm, Mike; Genovese, Tony

    2005-01-01

    ESnet provides authentication services and trust federation support for SciDAC projects, collaboratories, and other distributed computing applications. The ESnet ATF team operates the DOEGrids Certificate Authority, available to all DOE Office of Science programs, plus several custom CAs, including one for the National Fusion Collaboratory and one for NERSC. The secure hardware and software environment developed to support CAs is suitable for supporting additional custom authentication and authorization applications that your program might require. Seamless, secure interoperation across organizational and international boundaries is vital to collaborative science. We are fostering the development of international PKI federations by founding the TAGPMA, the American regional PMA, and the worldwide IGTF Policy Management Authority (PMA), as well as participating in European and Asian regional PMAs. We are investigating and prototyping distributed authentication technology that will allow us to support the 'roaming scientist' (distributed wireless via eduroam), as well as more secure authentication methods (one-time password tokens)

  18. Creating an Authentic Learning Environment in the Foreign Language Classroom

    Directory of Open Access Journals (Sweden)

    Larisa Nikitina

    2011-01-01

    Full Text Available Theatrical activities are widely used by language educators to promote and facilitate language learning. Involving students in production of their own video or a short movie in the target language allows a seamless fusion of language learning, art, and popular culture. The activity is also conducive for creating an authentic learning situation where the real world becomes a part of the educational experience and necessitates the use of an authentic language by the learners. This article describes a video project carried out by Russian language learners at Universiti Malaysia Sabah (UMS. It examines how the work on the project created and supported authenticity of the learning experience. Though the article focuses on the video project done in the context of language learning and teaching this activity could be successfully implemented in teaching various subjects at both secondary and tertiary levels.

  19. Implementing an authentic research project on eastern coyotes at an urban high school

    Directory of Open Access Journals (Sweden)

    David L. Eatough

    2008-01-01

    Full Text Available The need for inquiry oriented authentic activities is imperative to engage high school students in the active involvement and associated learning of science. Herein, we describe our experience of involving high school students in the process of studying wild coyotes in and around the communities where they live. We found that many became aware and familiar with the program but few participated to the point of being contributing members of the scientific community. To make this project sustainable in the long-run three important things must happen: one, there must be reliable point person (such as a graduate student who can focus on the ecology side of the coyote project while others can focus on the educational components of the collaboration; two, mechanisms must be put in place to provide incentives for participants; and three, funding must be reliable and substantial over time.

  20. Hardware authentication using transmission spectra modified optical fiber

    International Nuclear Information System (INIS)

    Grubbs, Robert K.; Romero, Juan A.

    2010-01-01

    The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

  1. Small space object imaging : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Ackermann, Mark R.; Valley, Michael T.; Kearney, Sean Patrick

    2009-10-01

    We report the results of an LDRD effort to investigate new technologies for the identification of small-sized (mm to cm) debris in low-earth orbit. This small-yet-energetic debris presents a threat to the integrity of space-assets worldwide and represents significant security challenge to the international community. We present a nonexhaustive review of recent US and Russian efforts to meet the challenges of debris identification and removal and then provide a detailed description of joint US-Russian plans for sensitive, laser-based imaging of small debris at distances of hundreds of kilometers and relative velocities of several kilometers per second. Plans for the upcoming experimental testing of these imaging schemes are presented and a preliminary path toward system integration is identified.

  2. Authentic e-Learning in a Multicultural Context: Virtual Benchmarking Cases from Five Countries

    Science.gov (United States)

    Leppisaari, Irja; Herrington, Jan; Vainio, Leena; Im, Yeonwook

    2013-01-01

    The implementation of authentic learning elements at education institutions in five countries, eight online courses in total, is examined in this paper. The International Virtual Benchmarking Project (2009-2010) applied the elements of authentic learning developed by Herrington and Oliver (2000) as criteria to evaluate authenticity. Twelve…

  3. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session....... In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post......-session authentication, although a new term, is not a new concept; it is the basis of at least a few practical schemes. We, for the first time, systematically study it and present the underlying authentication model. Further, we show that an important class of problems is solvable using post-session authentication...

  4. "Thick" Authenticity: New Media and Authentic Learning.

    Science.gov (United States)

    Shaffer, David Williamson; Resnick, Mitchel

    1999-01-01

    Discusses authenticity as it is applied to educational interventions and argues that the concept should be analyzed more closely. Describes four kinds of authenticity; analyzes how computational media are well-suited to support different aspects of authentic learning; and discusses connectivity, modeling, and pluralism. Contains 75 references.…

  5. Authentication method for authenticating a first party to a second party

    NARCIS (Netherlands)

    2014-01-01

    An authentication system and method is presented for authenticating a first party to a second party, where an operation is performed on condition that the authentication succeeds. The authentication method verifies whether the first party is authenticated. If the first party is not authenticated,

  6. Authenticating the Leader

    DEFF Research Database (Denmark)

    Johnsen, Christian Garmann

    As authentic leadership, with its dictum of being true to the self, has become increasingly influential among practitioners and mainstream leadership scholars, critical writers have drawn attention to the negative consequences of this development. Yet, few scholars have investigated the problem...... of authentication within discourse of authentic leadership. If authentic leadership is to make any sense, it is necessary to be able to distinguish the authentic from the inauthentic leader – in other words, it is necessary to authenticate the leader. This paper uses Gilles Deleuze’s reading of Plato as the point...... of departure for discussing the problem of authentication – separating the authentic leader form the inauthentic one – in the leadership guru Bill George’s model of authentic leadership. By doing so, the paper offers a way of conceptualizing the problem of authenticating leaders, as well as challenging...

  7. LDRD final report: photonic analog-to-digital converter (ADC) technology; TOPICAL

    International Nuclear Information System (INIS)

    Bowers, M; Deri, B; Haigh, R; Lowry, M; Sargis, P; Stafford, R; Tong, T

    1999-01-01

    We report on an LDRD seed program of novel technology development (started by an FY98 Engineering Tech-base project) that will enable extremely high-fidelity analog-to-digital converters for a variety of national security missions. High speed (l0+ GS/s ), high precision (l0+ bits) ADC technology requires extremely short aperture times ((approx)1ps ) with very low jitter requirements (sub 10fs ). These fundamental requirements, along with other technological barriers, are difficult to realize with electronics: However, we outline here, a way to achieve these timing apertures using a novel multi-wavelength optoelectronic short-pulse optical source. Our approach uses an optoelectronic feedback scheme with high optical Q to produce an optical pulse train with ultra-low jitter ( sub 5fs) and high amplitude stability ( and lt;10(sup 10)). This approach requires low power and can be integrated into an optoelectronic integrated circuit to minimize the size. Under this seed program we have demonstrated that the optical feedback mechanism can be used to generate a high Q resonator. This has reduced the technical risk for further development, making it an attractive candidate for outside funding

  8. Characterize and Model Final Waste Formulations and Offgas Solids from Thermal Treatment Processes - FY-98 Final Report for LDRD 2349

    Energy Technology Data Exchange (ETDEWEB)

    Kessinger, Glen Frank; Nelson, Lee Orville; Grandy, Jon Drue; Zuck, Larry Douglas; Kong, Peter Chuen Sun; Anderson, Gail

    1999-08-01

    The purpose of LDRD #2349, Characterize and Model Final Waste Formulations and Offgas Solids from Thermal Treatment Processes, was to develop a set of tools that would allow the user to, based on the chemical composition of a waste stream to be immobilized, predict the durability (leach behavior) of the final waste form and the phase assemblages present in the final waste form. The objectives of the project were: • investigation, testing and selection of thermochemical code • development of auxiliary thermochemical database • synthesis of materials for leach testing • collection of leach data • using leach data for leach model development • thermochemical modeling The progress toward completion of these objectives and a discussion of work that needs to be completed to arrive at a logical finishing point for this project will be presented.

  9. AARC: First draft of the Blueprint Architecture for Authentication and Authorisation Infrastructures

    OpenAIRE

    Biancini, A.; Florio, L.; Haase, M.; Hardt, M.; Jankowski, M.; Jensen, J.; Kanellopoulos, C.; Liampotis, N.; Licehammer, S.; Memon, S.; van Dijk, N.; Paetow, S.; Prochazka, M.; Sallé, M.; Solagna, P.

    2016-01-01

    AARC (Authentication and Authorisation for Research Communities) is a two-year EC-funded project to develop and pilot an integrated cross-discipline authentication and authorisation framework, building on existing authentication and authorisation infrastructures (AAIs) and production federated infrastructure. AARC also champions federated access and offers tailored training to complement the actions needed to test AARC results and to promote AARC outcomes. This article describes a high-level ...

  10. Qubit authentication

    International Nuclear Information System (INIS)

    Curty, Marcos; Santos, David J.; Perez, Esther; Garcia-Fernandez, Priscila

    2002-01-01

    Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties with the minimum amount of resources. Specifically, our objective is to determine whether one elementary quantum message (a qubit) can be authenticated with a key of minimum length. We show that, unlike the case of classical-message quantum authentication, this is not possible

  11. Final report for LDRD project 11-0783 : directed robots for increased military manpower effectiveness.

    Energy Technology Data Exchange (ETDEWEB)

    Rohrer, Brandon Robinson; Rothganger, Fredrick H.; Wagner, John S.; Xavier, Patrick Gordon; Morrow, James Dan

    2011-09-01

    The purpose of this LDRD is to develop technology allowing warfighters to provide high-level commands to their unmanned assets, freeing them to command a group of them or commit the bulk of their attention elsewhere. To this end, a brain-emulating cognition and control architecture (BECCA) was developed, incorporating novel and uniquely capable feature creation and reinforcement learning algorithms. BECCA was demonstrated on both a mobile manipulator platform and on a seven degree of freedom serial link robot arm. Existing military ground robots are almost universally teleoperated and occupy the complete attention of an operator. They may remove a soldier from harm's way, but they do not necessarily reduce manpower requirements. Current research efforts to solve the problem of autonomous operation in an unstructured, dynamic environment fall short of the desired performance. In order to increase the effectiveness of unmanned vehicle (UV) operators, we proposed to develop robots that can be 'directed' rather than remote-controlled. They are instructed and trained by human operators, rather than driven. The technical approach is modeled closely on psychological and neuroscientific models of human learning. Two Sandia-developed models are utilized in this effort: the Sandia Cognitive Framework (SCF), a cognitive psychology-based model of human processes, and BECCA, a psychophysical-based model of learning, motor control, and conceptualization. Together, these models span the functional space from perceptuo-motor abilities, to high-level motivational and attentional processes.

  12. Authentic feminist? Authenticity and feminist identity in teenage feminists' talk.

    Science.gov (United States)

    Calder-Dawe, Octavia; Gavey, Nicola

    2017-12-01

    This article explores how young people's feminist identities take shape in conjunction with a contemporary ideal of personal authenticity: to know and to express the 'real me'. Drawing from interviews with 18 teenagers living in Auckland, New Zealand, we examine a novel convergence of authenticity and feminism in participants' identity talk. For social psychologists interested in identity and politics, this convergence is intriguing: individualizing values such as authenticity are generally associated with disengagement with structural critique and with a repudiation of politicized and activist identities. Rather than seeking to categorize authentic feminism as an instance of either 'good/collective' or 'bad/individualized' feminist politics, we use discourse analysis to examine how the identity position of authentic feminist was constructed and to explore implications for feminist politics. On one hand, interviewees mobilized authentic feminism to affirm their commitment to normative liberal values of authenticity and self-expression. At the same time, the position of authentic feminist appeared to authorize risky feminist identifications and to justify counter-normative feelings, desires, and actions. To conclude, we explore how encountering others' intolerance of authentic feminism exposed interviewees to the limits of authenticity discourse, propelling some towards new understandings of the social world and their space for action within it. © 2017 The British Psychological Society.

  13. Final LDRD report : science-based solutions to achieve high-performance deep-UV laser diodes.

    Energy Technology Data Exchange (ETDEWEB)

    Armstrong, Andrew M.; Miller, Mary A.; Crawford, Mary Hagerott; Alessi, Leonard J.; Smith, Michael L.; Henry, Tanya A.; Westlake, Karl R.; Cross, Karen Charlene; Allerman, Andrew Alan; Lee, Stephen Roger

    2011-12-01

    We present the results of a three year LDRD project that has focused on overcoming major materials roadblocks to achieving AlGaN-based deep-UV laser diodes. We describe our growth approach to achieving AlGaN templates with greater than ten times reduction of threading dislocations which resulted in greater than seven times enhancement of AlGaN quantum well photoluminescence and 15 times increase in electroluminescence from LED test structures. We describe the application of deep-level optical spectroscopy to AlGaN epilayers to quantify deep level energies and densities and further correlate defect properties with AlGaN luminescence efficiency. We further review our development of p-type short period superlattice structures as an approach to mitigate the high acceptor activation energies in AlGaN alloys. Finally, we describe our laser diode fabrication process, highlighting the development of highly vertical and smooth etched laser facets, as well as characterization of resulting laser heterostructures.

  14. Immersive Learning: Realism, Authenticity & Audience

    OpenAIRE

    Livingstone, Daniel

    2016-01-01

    For almost 20 years the Digital Design Studio has been exploring and applying virtual reality for a wide range of industrial, commercial and educational applications. Drawing from a range of recent projects, we explore the complex relationships between realism, authenticity and audience for effective engagement and education in immersive learning.

  15. Authenticating the Leader

    DEFF Research Database (Denmark)

    Garmann Johnsen, Christian

    2018-01-01

    In the wake of a series of corporate scandals, there has been a growing call for authentic leadership in order to ensure ethical conduct in contemporary organizations. Authentic leadership, however, depends upon the ability to draw a distinction between the authentic and inauthentic leader......’s inverted Platonism, the paper challenges the practice by which authentic leaders are distinguished from inauthentic leaders. In conclusion, the paper suggests that an adequate concept of authentic leadership should consider how ethics can occur when the authentic leader is able to critically reflect his...

  16. System and method for authentication

    Science.gov (United States)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  17. Authentication and authorisation in entrusted unions

    NARCIS (Netherlands)

    Ayed, D.; Camenisch, J.; Ignatenko, T.; Johnstone, M.N.; Koster, R.P.; Lange, B.; Petkovic, M.; Sommer, D.; Zic, J.

    2014-01-01

    This paper reports on the status of a project whose aim is to implement and demonstrate in a real-life environment an integrated eAuthentication and eAuthorisation framework to enable trusted collaborations and delivery of services across different organisational/governmental jurisdictions. This aim

  18. Post-Session Authentication

    OpenAIRE

    Ahmed , Naveed; Jensen , Christian ,

    2012-01-01

    Part 1: Full Papers; International audience; Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session. In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of a...

  19. Final LDRD report : development of sample preparation methods for ChIPMA-based imaging mass spectrometry of tissue samples.

    Energy Technology Data Exchange (ETDEWEB)

    Maharrey, Sean P.; Highley, Aaron M.; Behrens, Richard, Jr.; Wiese-Smith, Deneille

    2007-12-01

    The objective of this short-term LDRD project was to acquire the tools needed to use our chemical imaging precision mass analyzer (ChIPMA) instrument to analyze tissue samples. This effort was an outgrowth of discussions with oncologists on the need to find the cellular origin of signals in mass spectra of serum samples, which provide biomarkers for ovarian cancer. The ultimate goal would be to collect chemical images of biopsy samples allowing the chemical images of diseased and nondiseased sections of a sample to be compared. The equipment needed to prepare tissue samples have been acquired and built. This equipment includes an cyro-ultramicrotome for preparing thin sections of samples and a coating unit. The coating unit uses an electrospray system to deposit small droplets of a UV-photo absorbing compound on the surface of the tissue samples. Both units are operational. The tissue sample must be coated with the organic compound to enable matrix assisted laser desorption/ionization (MALDI) and matrix enhanced secondary ion mass spectrometry (ME-SIMS) measurements with the ChIPMA instrument Initial plans to test the sample preparation using human tissue samples required development of administrative procedures beyond the scope of this LDRD. Hence, it was decided to make two types of measurements: (1) Testing the spatial resolution of ME-SIMS by preparing a substrate coated with a mixture of an organic matrix and a bio standard and etching a defined pattern in the coating using a liquid metal ion beam, and (2) preparing and imaging C. elegans worms. Difficulties arose in sectioning the C. elegans for analysis and funds and time to overcome these difficulties were not available in this project. The facilities are now available for preparing biological samples for analysis with the ChIPMA instrument. Some further investment of time and resources in sample preparation should make this a useful tool for chemical imaging applications.

  20. Multi-factor authentication

    Science.gov (United States)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  1. AUTHENTIC TEXTS FOR CRITICAL READING ACTIVITIES

    Directory of Open Access Journals (Sweden)

    Ila Amalia

    2016-03-01

    Full Text Available This research takes an action research aimed at promoting critical reading (“thinking” while reading skills using authentic materials among the students. This research also aims to reveal the students perception on using critical reading skills in reading activities. Nineteen English Education Department students who took Reading IV class, participated in this project. There were three cycles with three different critical reading strategies were applied. Meanwhile, the authentic materials were taken from newspaper and internet articles. The result revealed that the use of critical reading strategies along with the use of authentic materials has improved students’ critical reading skills as seen from the improvement of each cycle - the students critical reading skill was 54% (fair in the cycle 1 improved to 68% (average in cycle 2, and 82% (good in cycle 3.. In addition, based on the critical reading skill criteria, the students’ critical reading skill has improved from 40% (nearly meet to 80% (exceed. Meanwhile, from the students’ perception questionnaire, it was shown that 63% students agreed the critical reading activity using authentic text could improve critical thinking and 58% students agreed that doing critical reading activity could improve reading comprehension. The result had the implication that the use of authentic texts could improve students’ critical reading skills if it was taught by performing not lecturing them. Selectively choosing various strategies and materials can trigger students’ activeness in responding to a text, that eventually shape their critical reading skills.

  2. Tibetan Interpretations of Authenticity

    DEFF Research Database (Denmark)

    Sobisch, Jan-Ulrich

    2015-01-01

    The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions.......The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions....

  3. X.509 Authentication/Authorization in FermiCloud

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyunwoo [Fermilab; Timm, Steven [Fermilab

    2014-11-11

    We present a summary of how X.509 authentication and authorization are used with OpenNebula in FermiCloud. We also describe a history of why the X.509 authentication was needed in FermiCloud, and review X.509 authorization options, both internal and external to OpenNebula. We show how these options can be and have been used to successfully run scientific workflows on federated clouds, which include OpenNebula on FermiCloud and Amazon Web Services as well as other community clouds. We also outline federation options being used by other commercial and open-source clouds and cloud research projects.

  4. For-LySa: UML for Authentication Analysis

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Montangero, Carlo; Perrone, Lara

    2005-01-01

    The DEGAS project aims at enriching standard UML-centred development environments in such a way that the developers of global applications can exploit automated formal analyses with minimal overhead. In this paper, we present For-LySa, an instantiation of the DEGAS approach for authentication...... analysis, which exploits an existing analysis tool developed for the process calculus LySa. We discuss what information is needed for the analysis, and how to build the UML model of an authentication protocol in such a way that the needed information can be extracted from the model. We then present our...

  5. Laboratory directed research and development annual report. Fiscal year 1994

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-02-01

    The Department of Energy Order DOE 5000.4A establishes DOE`s policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. This report represents Pacific Northwest Laboratory`s (PNL`s) LDRD report for FY 1994. During FY 1994, 161 LDRD projects were selected for support through PNL`s LDRD project selection process. Total funding allocated to these projects was $13.7 million. Consistent with the Mission Statement and Strategic Plan provided in PNL`s Institutional Plan, the LDRD investments are focused on developing new and innovative approaches in research related to our {open_quotes}core competencies.{close_quotes} Currently, PNL`s core competencies have been identified as integrated environmental research; process science and engineering; energy systems development. In this report, the individual summaries of LDRD projects (presented in Section 1.0) are organized according to these core competencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. Projects within the three core competency areas were approximately 91.4 % of total LDRD project funding at PNL in FY 1994. A significant proportion of PNL`s LDRD funds are also allocated to projects within the various research centers that are proposed by individual researchers or small research teams. Funding allocated to each of these projects is typically $35K or less. The projects described in this report represent PNL`s investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. The report provides an overview of PNL`s LDRD program, the management process used for the program, and project summaries for each LDRD project.

  6. Laboratory Directed Research and Development (LDRD) on Mono-uranium Nitride Fuel Development for SSTAR and Space Applications

    International Nuclear Information System (INIS)

    Choi, J; Ebbinghaus, B; Meiers, T; Ahn, J

    2006-01-01

    The US National Energy Policy of 2001 advocated the development of advanced fuel and fuel cycle technologies that are cleaner, more efficient, less waste-intensive, and more proliferation resistant. The need for advanced fuel development is emphasized in on-going DOE-supported programs, e.g., Global Nuclear Energy Initiative (GNEI), Advanced Fuel Cycle Initiative (AFCI), and GEN-IV Technology Development. The Directorates of Energy and Environment (E and E) and Chemistry and Material Sciences (C and MS) at Lawrence Livermore National Laboratory (LLNL) are interested in advanced fuel research and manufacturing using its multi-disciplinary capability and facilities to support a design concept of a small, secure, transportable, and autonomous reactor (SSTAR). The E and E and C and MS Directorates co-sponsored this Laboratory Directed Research and Development (LDRD) Project on Mono-Uranium Nitride Fuel Development for SSTAR and Space Applications. In fact, three out of the six GEN-IV reactor concepts consider using the nitride-based fuel, as shown in Table 1. SSTAR is a liquid-metal cooled, fast reactor. It uses nitride fuel in a sealed reactor vessel that could be shipped to the user and returned to the supplier having never been opened in its long operating lifetime. This sealed reactor concept envisions no fuel refueling nor on-site storage of spent fuel, and as a result, can greatly enhance proliferation resistance. However, the requirement for a sealed, long-life core imposes great challenges to research and development of the nitride fuel and its cladding. Cladding is an important interface between the fuel and coolant and a barrier to prevent fission gas release during normal and accidental conditions. In fabricating the nitride fuel rods and assemblies, the cladding material should be selected based on its the coolant-side corrosion properties, the chemical/physical interaction with the nitride fuel, as well as their thermal and neutronic properties. The US

  7. Interface physics in microporous media : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Yaklin, Melissa A.; Knutson, Chad E.; Noble, David R.; Aragon, Alicia R.; Chen, Ken Shuang; Giordano, Nicholas J. (Purdue University, West Lafayette, IN); Brooks, Carlton, F.; Pyrak-Nolte, Laura J. (Purdue University, West Lafayette, IN); Liu, Yihong (Purdue University, West Lafayette, IN)

    2008-09-01

    This document contains a summary of the work performed under the LDRD project entitled 'Interface Physics in Microporous Media'. The presence of fluid-fluid interfaces, which can carry non-zero stresses, distinguishes multiphase flows from more readily understood single-phase flows. In this work the physics active at these interfaces has been examined via a combined experimental and computational approach. One of the major difficulties of examining true microporous systems of the type found in filters, membranes, geologic media, etc. is the geometric uncertainty. To help facilitate the examination of transport at the pore-scale without this complication, a significant effort has been made in the area of fabrication of both two-dimensional and three-dimensional micromodels. Using these micromodels, multiphase flow experiments have been performed for liquid-liquid and liquid-gas systems. Laser scanning confocal microscopy has been utilized to provide high resolution, three-dimensional reconstructions as well as time resolved, two-dimensional reconstructions. Computational work has focused on extending lattice Boltzmann (LB) and finite element methods for probing the interface physics at the pore scale. A new LB technique has been developed that provides over 100x speed up for steady flows in complex geometries. A new LB model has been developed that allows for arbitrary density ratios, which has been a significant obstacle in applying LB to air-water flows. A new reduced order model has been developed and implemented in finite element code for examining non-equilibrium wetting in microchannel systems. These advances will enhance Sandia's ability to quantitatively probe the rich interfacial physics present in microporous systems.

  8. Main group adducts of carbon dioxide and related chemistry (LDRD 149938).

    Energy Technology Data Exchange (ETDEWEB)

    Barry, Brian M. (University of New Mexico, Albuquerque, NM); Kemp, Richard Alan; Stewart, Constantine A.; Dickie, Diane A. (University of New Mexico, Albuquerque, NM)

    2010-11-01

    This late-start LDRD was broadly focused on the synthetic attempts to prepare novel ligands as complexing agents for main group metals for the sequestration of CO{sub 2}. In prior work we have shown that certain main group (p block elements) metals such as tin and zinc, when ligated to phosphinoamido- ligands, can bind CO{sub 2} in a novel fashion. Rather than simple insertion into the metal-nitrogen bonds to form carbamates, we have seen the highly unusual complexation of CO{sub 2} in a mode that is more similar to a chemical 'adduct' rather than complexation schemes that have been observed previously. The overarching goal in this work is to prepare more of these complexes that can (a) sequester (or bind) CO{sub 2} easily in this adduct form, and (b) be stable to chemical or electrochemical reduction designed to convert the CO{sub 2} to useful fuels or fuel precursors. The currently used phosphinoamido- ligands appear at this point to be less-stable than desired under electrochemical reduction conditions. This instability is believed due to the more delicate, reactive nature of the ligand framework system. In order to successfully capture and convert CO{sub 2} to useful organics, this instability must be addressed and solved. Work described in the late-start LDRD was designed to screen a variety of ligand/metal complexes that a priori are believed to be more stable to polar solvents and possible mild hydrolytic conditions than are the phosphinoamido-ligands. Results from ligand syntheses and metal complexation studies are reported.

  9. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations in the...

  10. 2015 Fermilab Laboratory Directed Research & Development Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Wester, W. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States)

    2016-05-26

    The Fermi National Accelerator Laboratory (FNAL) is conducting a Laboratory Directed Research and Development (LDRD) program. Fiscal year 2015 represents the first full year of LDRD at Fermilab and includes seven projects approved mid-year in FY14 and six projects approved in FY15. One of the seven original projects has been completed just after the beginning of FY15. The implementation of LDRD at Fermilab is captured in the approved Fermilab 2015 LDRD Annual Program Plan. In FY15, the LDRD program represents 0.64% of Laboratory funding. The scope of the LDRD program at Fermilab will be established over the next couple of years where a portfolio of about 20 on-going projects representing approximately between 1% and 1.5% of the Laboratory funding is anticipated. This Annual Report focuses on the status of the current projects and provides an overview of the current status of LDRD at Fermilab.

  11. Inspiring students through an authentic polar science expedition: the RESEt Project

    Science.gov (United States)

    Cattadori, Matteo

    2016-04-01

    RESEt (Research and Education Svalbard Experience www.resetsvalbard.it) is an ongoing educational project focusing mainly on polar and climate system topics. It started in 2014 and will end in 2017 with the high school diploma of the 22 students (16 y. o.) making the participant class. This class attend a school (Liceo Filzi, Rovereto, Trento. Italy) with a primary focus on disciplines like philosophy and education, rather then STEM (Science, Technology, Engineering, and Mathematics). Nevertheless their science curricula include climate topics that are rather challenging to grasp and, at the same time, crucial for their scientific citizenship. Some questions arise: How to foster their interest in geosciences topics? How to engage them in authentic scientific knowledge? How to increase their interest in scientific university courses during their post-secondary career? RESEt project will attempt to answer these questions through the development of integrated activities distributed over the last three years of their high school cycle. The most important moment will be an educational scientific expedition at the Svalbard, an archipelago located in the Arctic. The expedition be entirely organized, planned, and directed by students. In Svalbard, students will visit the main scientific facilities devoted to climate studies including those of Italian CNR (National Research Council) and they will perform some environmental measurement using data-loggers. Students are even involved in the fundraising process to raise more than ten thousand Euros needed to for travel expenses. This work is aimed mainly at presenting some of the preliminary data collected during the RESEt project, including the fundraising aspects. The management of the RESEt project strongly relies on the experience and network gained by the abstract author during the participation to the Education and Public Outreach (EPO) program of International Polar Year (IPY) 2007-2009 as well as the support of Polar

  12. Google Classroom and Open Clusters: An Authentic Science Research Project for High School Students

    Science.gov (United States)

    Johnson, Chelen H.; Linahan, Marcella; Cuba, Allison Frances; Dickmann, Samantha Rose; Hogan, Eleanor B.; Karos, Demetra N.; Kozikowski, Kendall G.; Kozikowski, Lauren Paige; Nelson, Samantha Brooks; O'Hara, Kevin Thomas; Ropinski, Brandi Lucia; Scarpa, Gabriella; Garmany, Catharine D.

    2016-01-01

    STEM education is about offering unique opportunities to our students. For the past three years, students from two high schools (Breck School in Minneapolis, MN, and Carmel Catholic High School in Mundelein, IL) have collaborated on authentic astronomy research projects. This past year they surveyed archival data of open clusters to determine if a clear turnoff point could be unequivocally determined. Age and distance to each open cluster were calculated. Additionally, students requested time on several telescopes to obtain original data to compare to the archival data. Students from each school worked in collaborative teams, sharing and verifying results through regular online hangouts and chats. Work papers were stored in a shared drive and on a student-designed Google site to facilitate dissemination of documents between the two schools.

  13. Quantitative adaptation analytics for assessing dynamic systems of systems: LDRD Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Gauthier, John H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). System Readiness & Sustainment Technologies (6133, M/S 1188); Miner, Nadine E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Military & Energy Systems Analysis (6114, M/S 1188); Wilson, Michael L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Resilience and Regulatory Effects (6921, M/S 1138); Le, Hai D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). System Readiness & Sustainment Technologies (6133, M/S 1188); Kao, Gio K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Networked System Survivability & Assurance (5629, M/S 0671); Melander, Darryl J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Software Systems R& D (9525, M/S 1188); Longsine, Dennis Earl [Sandia National Laboratories, Unknown, Unknown; Vander Meer, Jr., Robert C. [SAIC, Inc., Albuquerque, NM (United States)

    2015-01-01

    Our society is increasingly reliant on systems and interoperating collections of systems, known as systems of systems (SoS). These SoS are often subject to changing missions (e.g., nation- building, arms-control treaties), threats (e.g., asymmetric warfare, terrorism), natural environments (e.g., climate, weather, natural disasters) and budgets. How well can SoS adapt to these types of dynamic conditions? This report details the results of a three year Laboratory Directed Research and Development (LDRD) project aimed at developing metrics and methodologies for quantifying the adaptability of systems and SoS. Work products include: derivation of a set of adaptability metrics, a method for combining the metrics into a system of systems adaptability index (SoSAI) used to compare adaptability of SoS designs, development of a prototype dynamic SoS (proto-dSoS) simulation environment which provides the ability to investigate the validity of the adaptability metric set, and two test cases that evaluate the usefulness of a subset of the adaptability metrics and SoSAI for distinguishing good from poor adaptability in a SoS. Intellectual property results include three patents pending: A Method For Quantifying Relative System Adaptability, Method for Evaluating System Performance, and A Method for Determining Systems Re-Tasking.

  14. Music in advertising and consumer identity: The search for Heideggerian authenticity

    OpenAIRE

    Abolhasani, Morteza; Oakes, Steve; Oakes, Helen

    2017-01-01

    This study discusses netnographic findings involving 472 YouTube postings categorized to identify themes regarding consumers’ experience of music in advertisements. Key themes relate to musical taste, musical indexicality, musical repetition and musical authenticity. Postings reveal how music conveys individual taste and is linked to personal memories and Heidegger’s coincidental time where moments of authenticity may be triggered in a melee of emotions, memories and projections. Identity pro...

  15. k-Times Anonymous Authentication

    Science.gov (United States)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  16. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  17. Authentication Assurance Levels

    International Nuclear Information System (INIS)

    Kouzes, Richard T.; Cash, James R.; Devaney, David M.; Geelhood, Bruce D.; Hansen, Randy R.; Melton, Ronald B.; Pitts, W. Karl

    2002-01-01

    This Common Criteria approach has been applied to create a definition of Authentication Assurance Levels that can quantify the level of assurance reached for a system subject to a set of authentication procedures. The arms-control authentication application of the Common Criteria expands on more typical information security evaluations in that it must contend with information barriers and preclude sophisticated intentional subversion attempts.

  18. Authentic leadership to the future

    Directory of Open Access Journals (Sweden)

    Dimovski Vlado

    2012-01-01

    Full Text Available Authentic leadership is the latest evolutionary stage in leadership development and emphasizes the leader's authenticity. The construct of authenticity was researched by ancient Greek philosophers as 'know thy-self ', and 'thy true self '. Authentic leadership began to develop after 2004. The main reason why the researchers place so much attention to authentic leadership is fact that authentic leadership reaches all of the employees in organizations. Authentic leaders must identify the strengths of their followers and help them with their development and integration towards a common goal, purpose, vision and identity of the organization. Authentic leadership is seen as the final stage in the development of leadership styles, properties of this leadership style, and the consequences of this style have not been fully explored. In our paper we will explore this new style of leadership and its implications.

  19. Speaker Authentication

    CERN Document Server

    Li, Qi (Peter)

    2012-01-01

    This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker’s identity based on his/her voice characteristics while the VIV approach validates a speaker’s identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications. The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speake...

  20. Materiality, Authenticity and Value in the historic environment

    DEFF Research Database (Denmark)

    Douglas-Jones, Rachel

    2014-01-01

    with it and contribute to the experience of authenticity. In this interdisciplinary project, we have used ethnographic methods including interviews and participant observation to examine the kinds of value attached to deterioration and decay in historic buildings. We use these methods firstly to ask how processes...

  1. Chemiresistor microsensors for in-situ monitoring of volatile organic compounds : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Michael Loren; Hughes, Robert Clark; Kooser, Ara S.; McGrath, Lucas K.; Ho, Clifford Kuofei; Wright, Jerome L.; Davis, Chad Edward

    2003-09-01

    This report provides a summary of the three-year LDRD (Laboratory Directed Research and Development) project aimed at developing microchemical sensors for continuous, in-situ monitoring of volatile organic compounds. A chemiresistor sensor array was integrated with a unique, waterproof housing that allows the sensors to be operated in a variety of media including air, soil, and water. Numerous tests were performed to evaluate and improve the sensitivity, stability, and discriminatory capabilities of the chemiresistors. Field tests were conducted in California, Nevada, and New Mexico to further test and develop the sensors in actual environments within integrated monitoring systems. The field tests addressed issues regarding data acquisition, telemetry, power requirements, data processing, and other engineering requirements. Significant advances were made in the areas of polymer optimization, packaging, data analysis, discrimination, design, and information dissemination (e.g., real-time web posting of data; see www.sandia.gov/sensor). This project has stimulated significant interest among commercial and academic institutions. A CRADA (Cooperative Research and Development Agreement) was initiated in FY03 to investigate manufacturing methods, and a Work for Others contract was established between Sandia and Edwards Air Force Base for FY02-FY04. Funding was also obtained from DOE as part of their Advanced Monitoring Systems Initiative program from FY01 to FY03, and a DOE EMSP contract was awarded jointly to Sandia and INEEL for FY04-FY06. Contracts were also established for collaborative research with Brigham Young University to further evaluate, understand, and improve the performance of the chemiresistor sensors.

  2. Communicating food safety, authenticity and consumer choice. Field experiences.

    Science.gov (United States)

    Syntesa, Heiner Lehr

    2013-04-01

    The paper reviews patented and non-patented technologies, methods and solutions in the area of food traceability. It pays special attention to the communication of food safety, authenticity and consumer choice. Twenty eight recent patents are reviewed in the areas of (secure) identification, product freshness indicators, meat traceability, (secure) transport of information along the supply chain, country/region/place of origin, automated authentication, supply chain management systems, consumer interaction systems. In addition, solutions and pilot projects are described in the areas of Halal traceability, traceability of bird's nests, cold chain management, general food traceability and other areas.

  3. Authentic leadership: becoming and remaining an authentic nurse leader.

    Science.gov (United States)

    Murphy, Lin G

    2012-11-01

    This article explores how chief nurse executives became and remained authentic leaders. Using narrative inquiry, this qualitative study focused on the life stories of participants. Results demonstrate the importance of reframing, reflection in alignment with values, and the courage needed as nurse leaders progress to authenticity.

  4. Converse PUF-based authentication

    NARCIS (Netherlands)

    Kocabas, U.; Peter, Andreas; Katzenbeisser, S.; Sadeghi, A.

    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich

  5. Contextual Student Learning through Authentic Asteroid Research Projects using a Robotic Telescope Network

    Science.gov (United States)

    Hoette, Vivian L.; Puckett, Andrew W.; Linder, Tyler R.; Heatherly, Sue Ann; Rector, Travis A.; Haislip, Joshua B.; Meredith, Kate; Caughey, Austin L.; Brown, Johnny E.; McCarty, Cameron B.; Whitmore, Kevin T.

    2015-11-01

    Skynet is a worldwide robotic telescope network operated by the University of North Carolina at Chapel Hill with active observing sites on 3 continents. The queue-based observation request system is simple enough to be used by middle school students, but powerful enough to supply data for research scientists. The Skynet Junior Scholars program, funded by the NSF, has teamed up with professional astronomers to engage students from middle school to undergraduates in authentic research projects, from target selection through image analysis and publication of results. Asteroid research is a particularly fruitful area for youth collaboration that reinforces STEM education standards and can allow students to make real contributions to scientific knowledge, e.g., orbit refinement through astrometric submissions to the Minor Planet Center. We have created a set of projects for youth to: 1. Image an asteroid, make a movie, and post it to a gallery; 2. Measure the asteroid’s apparent motion using the Afterglow online image processor; and 3. Image asteroids from two or more telescopes simultaneously to demonstrate parallax. The apparent motion and parallax projects allow students to estimate the distance to their asteroid, as if they were the discoverer of a brand new object in the solar system. Older students may take on advanced projects, such as analyzing uncertainties in asteroid orbital parameters; studying impact probabilities of known objects; observing time-sensitive targets such as Near Earth Asteroids; and even discovering brand new objects in the solar system.Images are acquired from among seven Skynet telescopes in North Carolina, California, Wisconsin, Canada, Australia, and Chile, as well as collaborating observatories such as WestRock in Columbus, Georgia; Stone Edge in El Verano, California; and Astronomical Research Institute in Westfield, Illinois.

  6. Multi-Factor Authentication: A Survey

    Directory of Open Access Journals (Sweden)

    Aleksandr Ometov

    2018-01-01

    Full Text Available Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA starting from Single-Factor Authentication (SFA and through Two-Factor Authentication (2FA. Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.

  7. Laboratory Directed Research and Development FY2008 Annual Report

    International Nuclear Information System (INIS)

    Kammeraad, J.E.; Jackson, K.J.; Sketchley, J.A.; Kotta, P.R.

    2009-01-01

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Institutional Science and Technology Office at Lawrence Livermore, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the full spectrum of national security interests encompassed by the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration. The accomplishments described in this annual report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $91.5 million for fiscal year 2008 sponsored 176 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with universities

  8. AUTHENTICITY IN THE BLOGOSPHERE

    Directory of Open Access Journals (Sweden)

    Waclaw Branicki

    2010-01-01

    Full Text Available The primary purpose of this article is to answer the question of whether writing a blog defined as a personal diary can help to better understand himself. Self-awareness is a prerequisite for authentic existence. In the first part analyzed the concept of authenticity. Pointed out the relationship of authenticity to the categories of freedom, truth and responsibility. The second part presents the relationship between authentic existence and the process of self-disclosure, which may take place in the blogosphere. In the third part presents the question whether a writing blog affects the level authenticity of existence. It was recognized that a key element of this phenomenon is the sense of responsibility.

  9. The Strategy Project: Promoting Self-Regulated Learning through an Authentic Assignment

    Science.gov (United States)

    Steiner, Hillary H.

    2016-01-01

    Success in college requires the development of self-regulated learning strategies that move beyond high school skills. First-year students of all ability levels benefit when given instruction in how to use these strategies in an authentic context. This paper presents an instructional method that requires deliberate practice of self-regulated…

  10. Laboratory Directed Research and Development Annual Report for 2010

    International Nuclear Information System (INIS)

    Hughes, Pamela J.

    2011-01-01

    This report documents progress made on all LDRD-funded projects during fiscal year 2010. The projects supported by LDRD funding all have demonstrable ties to DOE missions. In addition, many of the LDRD projects are relevant to the missions of other federal agencies that sponsor work at the Laboratory. The program plays a key role in attracting the best and brightest scientific staff needed to serve the highest priority DOE mission objectives. The flexibility provided by the LDRD program allows us to make rapid decisions about projects that address emerging scientific challenges so that PNNL remains a modern research facility well into the 21st century. Individual project reports comprise the bulk of this LDRD report. The Laboratory focuses its LDRD research on scientific assets that often address more than one scientific discipline. Though multidisciplinary, each project in this report appears under one of the following primary research categories: (1) Advanced Sensors and Instrumentation; (2) Biological Sciences; (3) Chemistry; (4) Earth and Space Sciences; (5) Energy Supply and Use; and (6) Engineering and Manufacturing Processes.

  11. The Authentic Personality: A Theoretical and Empirical Conceptualization and the Development of the Authenticity Scale

    Science.gov (United States)

    Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen

    2008-01-01

    This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…

  12. 2014 Fermilab Laboratory Directoed Research & Development Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Wester, W. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States)

    2016-05-26

    After initiation by the Fermilab Laboratory Director, a team from the senior Laboratory leadership and a Laboratory Directed Research and Development (LDRD) Advisory Committee developed an implementation plan for LDRD at Fermilab for the first time. This implementation was captured in the approved Fermilab 2014 LDRD Program Plan and followed directions and guidance from the Department of Energy (DOE) order, DOE O 413.2B, a “Roles, Responsibilities, and Guidelines, …” document, and examples of best practices at other DOE Office of Science Laboratories. At Fermilab, a FY14 midyear Call for Proposals was issued. A LDRD Selection Committee evaluated those proposals that were received and provided a recommendation to the Laboratory Director who approved seven LDRD projects. This Annual Report focuses on the status of those seven projects and provides an overview of the current status of LDRD at Fermilab. The seven FY14 LDRD approved projects had a date of initiation late in FY14 such that this report reflects approximately six months of effort approximately through January 2015. The progress of these seven projects, the subsequent award of six additional new projects beginning in FY15, and preparations for the issuance of the FY16 Call for Proposals indicates that LDRD is now integrated into the overall annual program at Fermilab. All indications are that LDRD is improving the scientific and technical vitality of the Laboratory and providing new, novel, or cutting edge projects carried out at the forefront of science and technology and aligned with the mission and strategic visions of Fermilab and the Department of Energy.

  13. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  14. Discovering your authentic leadership.

    Science.gov (United States)

    George, Bill; Sims, Peter; McLean, Andrew N; Mayer, Diana

    2007-02-01

    The ongoing problems in business leadership over the past five years have underscored the need for a new kind of leader in the twenty-first century: the authentic leader. Author Bill George, a Harvard Business School professor and the former chairman and CEO of Medtronic, and his colleagues, conducted the largest leadership development study ever undertaken. They interviewed 125 business leaders from different racial, religious, national, and socioeconomic backgrounds to understand how leaders become and remain authentic. Their interviews showed that you do not have to be born with any particular characteristics or traits to lead. You also do not have to be at the top of your organization. Anyone can learn to be an authentic leader. The journey begins with leaders understanding their life stories. Authentic leaders frame their stories in ways that allow them to see themselves not as passive observers but as individuals who learn from their experiences. These leaders make time to examine their experiences and to reflect on them, and in doing so they grow as individuals and as leaders. Authentic leaders also work hard at developing self-awareness through persistent and often courageous self-exploration. Denial can be the greatest hurdle that leaders face in becoming self-aware, but authentic leaders ask for, and listen to, honest feedback. They also use formal and informal support networks to help them stay grounded and lead integrated lives. The authors argue that achieving business results over a sustained period of time is the ultimate mark of authentic leadership. It may be possible to drive short-term outcomes without being authentic, but authentic leadership is the only way to create long-term results.

  15. A Review Of Authentication Methods

    OpenAIRE

    Nilesh A. Lal; Salendra Prasad; Mohammed Farik

    2015-01-01

    Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms password entry smart card and biometric. Each authentication mechanism functions differently and has their strengths and weakness. In this paper we review different types of authentication mechanisms their vulnerabilities and recommend novel solutions.

  16. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  17. STUDENTS’ POTENTIAL FOR AUTHENTIC LEADERSHIP

    OpenAIRE

    Djurdja Solesa-Grijak; Dragan Solesa; Nedjo Kojic

    2015-01-01

    To know yourself and to act accordingly has been seen as a moral imperative throughout history. The aim of this research was to determine potential of students for authentic leadership and relation between their authentic personality and potential for authentic leadership. The sample consisted of students (N=133) from Serbia (male – 59% and female – 41%). The average age of students was M=21.9. Instruments used were Authenticity Scale (Wood et al., 2008) and Authentic Leadership Self-Assessme...

  18. Testing Template and Testing Concept of Operations for Speaker Authentication Technology

    National Research Council Canada - National Science Library

    Sipko, Marek M

    2006-01-01

    This thesis documents the findings of developing a generic testing template and supporting concept of operations for speaker verification technology as part of the Iraqi Enrollment via Voice Authentication Project (IEVAP...

  19. A Review Of Authentication Methods

    Directory of Open Access Journals (Sweden)

    Nilesh A. Lal

    2015-08-01

    Full Text Available Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms password entry smart card and biometric. Each authentication mechanism functions differently and has their strengths and weakness. In this paper we review different types of authentication mechanisms their vulnerabilities and recommend novel solutions.

  20. Laboratory Directed Research and Development FY2008 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Kammeraad, J E; Jackson, K J; Sketchley, J A; Kotta, P R

    2009-03-24

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Institutional Science and Technology Office at Lawrence Livermore, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the full spectrum of national security interests encompassed by the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration. The accomplishments described in this annual report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $91.5 million for fiscal year 2008 sponsored 176 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with

  1. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2015-06-01

    Full Text Available This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The research included the use of an ALQ questionnaire for the estimation of leadership behavior. The components of authentic leadership are defined using factor analysis and other statistics techniques. The findings developed in this research indicated the fact that directors in educational institutions have a specific authentic leadership style. We suggest the concept of authentic leadership based on the four following factors: Communication-conformist, self-consciousness, self-discovery, and self-concept. Supporting these factors provides the directors with the possibility of obtaining a high level of authentic leadership.

  2. Security Gaps In Authentication Factor Credentials

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Authentication factors refer to user login credentials that a user supplies to an authentication process for it to decide whether to grant or deny access. While two-factor and three-factor authentication generally provides better security than one-factor authentication the aim of this paper is to review security in individual authentication factor credentials that are in use nowadays. These credentials will be discussed in factor categories knowledge factor possession factor and inherence factor. The paper details current security gaps and some novel approaches to diminish the gaps in these authentication factors. We believe that our recommendations will inspire development of better authentication credentials and systems.

  3. Multifactor Authentication: Its Time Has Come

    Directory of Open Access Journals (Sweden)

    Jim Reno

    2013-08-01

    Full Text Available Transactions of any value must be authenticated to help prevent online crime. Even seemingly innocent interactions, such as social media postings, can have serious consequences if used fraudulently. A key problem in modern online interactions is establishing the identity of the user without alienating the user. Historically, almost all online authentications have been implemented using simple passwords, but increasingly these methods are under attack. Multifactor authentication requires the presentation of two or more of the three authentication factor types: “What you know”, “What you have”, and “What you are”. After presentation, each factor must be validated by the other party for authentication to occur. Multifactor authentication is a potential solution to the authentication problem, and it is beginning to be implemented at websites operated by well-known companies. This article surveys the different mechanisms used to implement multifactor authentication. How a site chooses to implement multifactor authentication affects security as well as the overall user experience.

  4. Authentic Performance in the Instrumental Analysis Laboratory: Building a Visible Spectrophotometer Prototype

    Science.gov (United States)

    Wilson, Mark V.; Wilson, Erin

    2017-01-01

    In this work we describe an authentic performance project for Instrumental Analysis in which students designed, built, and tested spectrophotometers made from simple components. The project addressed basic course content such as instrument design principles, UV-vis spectroscopy, and spectroscopic instrument components as well as skills such as…

  5. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  6. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    This paper examines the problem of providing a robust non-invasive authentication service for mobile users in a smart environment. We base our work on the persistent authentication model (PAISE), which relies on available sensors to track principals from the location where they authenticate, e.......g., through a smart card based access control system, to the location where the authentication is required by a location-based service. The PAISE model is extended with remote biometrics to prevent the decay of authentication confidence when authenticated users encounter and interact with other users...... in the environment. The result is a calm approach to authentication, where mobile users are transparently authenticated towards the system, which allows the provision of location-based services. The output of the remote biometrics are fused using error-rate-based fusion to solve a common problem that occurs in score...

  7. Authentication Method for Privacy Protection in Smart Grid Environment

    Directory of Open Access Journals (Sweden)

    Do-Eun Cho

    2014-01-01

    Full Text Available Recently, the interest in green energy is increasing as a means to resolve problems including the exhaustion of the energy source and, effective management of energy through the convergence of various fields. Therefore, the projects of smart grid which is called intelligent electrical grid for the accomplishment of low carbon green growth are being carried out in a rush. However, as the IT is centered upon the electrical grid, the shortage of IT also appears in smart grid and the complexity of convergence is aggravating the problem. Also, various personal information and payment information within the smart grid are gradually becoming big data and target for external invasion and attack; thus, there is increase in concerns for this matter. The purpose of this study is to analyze the security vulnerabilities and security requirement within smart grid and the authentication and access control method for privacy protection within home network. Therefore, we propose a secure access authentication and remote control method for user’s home device within home network environment, and we present their security analysis. The proposed access authentication method blocks the unauthorized external access and enables secure remote access to home network and its devices with a secure message authentication protocol.

  8. Authentic leadership, authentic followership, basic need satisfaction, and work role performance: A cross-level study

    OpenAIRE

    Leroy, Hannes; Anseel, F.; Gardner, W.; Sels, Luc

    2015-01-01

    Authentic leadership occurs when individuals enact their true selves in their role as a leader. This article examines the role of authentic followership in the previously established relationship between authentic leadership and follower in-role and extrarole performance behaviors. Consideration of followers who enact their true selves is important to understand how authentic leadership fosters follower self-determined work motivation and thus work role performance. Using self-determination t...

  9. Geospatial Authentication

    Science.gov (United States)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server.

  10. Network discovery, characterization, and prediction : a grand challenge LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Kegelmeyer, W. Philip, Jr.

    2010-11-01

    This report is the final summation of Sandia's Grand Challenge LDRD project No.119351, 'Network Discovery, Characterization and Prediction' (the 'NGC') which ran from FY08 to FY10. The aim of the NGC, in a nutshell, was to research, develop, and evaluate relevant analysis capabilities that address adversarial networks. Unlike some Grand Challenge efforts, that ambition created cultural subgoals, as well as technical and programmatic ones, as the insistence on 'relevancy' required that the Sandia informatics research communities and the analyst user communities come to appreciate each others needs and capabilities in a very deep and concrete way. The NGC generated a number of technical, programmatic, and cultural advances, detailed in this report. There were new algorithmic insights and research that resulted in fifty-three refereed publications and presentations; this report concludes with an abstract-annotated bibliography pointing to them all. The NGC generated three substantial prototypes that not only achieved their intended goals of testing our algorithmic integration, but which also served as vehicles for customer education and program development. The NGC, as intended, has catalyzed future work in this domain; by the end it had already brought in, in new funding, as much funding as had been invested in it. Finally, the NGC knit together previously disparate research staff and user expertise in a fashion that not only addressed our immediate research goals, but which promises to have created an enduring cultural legacy of mutual understanding, in service of Sandia's national security responsibilities in cybersecurity and counter proliferation.

  11. 22 CFR 92.36 - Authentication defined.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication defined. 92.36 Section 92.36... Notarial Acts § 92.36 Authentication defined. An authentication is a certification of the genuineness of... recognized in another jurisdiction. Documents which may require authentication include legal instruments...

  12. Authentication over Noisy Channels

    OpenAIRE

    Lai, Lifeng; Gamal, Hesham El; Poor, H. Vincent

    2008-01-01

    In this work, message authentication over noisy channels is studied. The model developed in this paper is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks, namely impersonation attacks and substitution attacks, are investigated for both single message and multiple message authentication scenarios. For each scenario, information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably, in both scenarios,...

  13. Laboratory Directed Research and Development annual report, Fiscal year 1993

    International Nuclear Information System (INIS)

    1994-01-01

    The Department of Energy Order DOE 5000.4A establishes DOE's policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is ''research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this Order. LDRD includes activities previously defined as ER ampersand D, as well as other discretionary research and development activities not provided for in a DOE program.'' Consistent with the Mission Statement and Strategic Plan provided in PNL's Institutional Plan, the LDRD investments are focused on developing new and innovative approaches in research related to our ''core competencies.'' Currently, PNL's core competencies have been identified as integrated environmental research; process technology; energy systems research. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these core competencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. A significant proportion of PNL's LDRD funds are also allocated to projects within the various research centers that are proposed by individual researchers or small research teams. The projects are described in Section 2.0. The projects described in this report represent PNL's investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. In accordance with DOE guidelines, the report provides an overview of PNL's LDRD program and the management process used for the program and project summaries for each LDRD project

  14. Laboratory Directed Research and Development annual report, Fiscal year 1993

    Energy Technology Data Exchange (ETDEWEB)

    1994-01-01

    The Department of Energy Order DOE 5000.4A establishes DOE`s policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is ``research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this Order. LDRD includes activities previously defined as ER&D, as well as other discretionary research and development activities not provided for in a DOE program.`` Consistent with the Mission Statement and Strategic Plan provided in PNL`s Institutional Plan, the LDRD investments are focused on developing new and innovative approaches in research related to our ``core competencies.`` Currently, PNL`s core competencies have been identified as integrated environmental research; process technology; energy systems research. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these core competencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. A significant proportion of PNL`s LDRD funds are also allocated to projects within the various research centers that are proposed by individual researchers or small research teams. The projects are described in Section 2.0. The projects described in this report represent PNL`s investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. In accordance with DOE guidelines, the report provides an overview of PNL`s LDRD program and the management process used for the program and project summaries for each LDRD project.

  15. The authentic worker's well-being and performance: the relationship between authenticity at work, well-being, and work outcomes.

    Science.gov (United States)

    van den Bosch, Ralph; Taris, Toon W

    2014-01-01

    Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications.

  16. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori

    2015-01-01

    propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  17. Authentication: Hot and cool

    OpenAIRE

    Cohen, E; Cohen, SA

    2012-01-01

    Seeking to shift the discussion of the concept of authenticity in tourism scholarship from the dominant concern with tourist experiences to the more sociological problem of the processes of authentication of tourist attractions, we conceptualize two analytically distinct, but practically often intersecting, modes of authentication of attractions, “cool” and “hot”. Through a range of examples, we demonstrate the implications of the two modes for the dynamics of the constitution of tourist attr...

  18. Authenticity at work

    NARCIS (Netherlands)

    van den Bosch, Ralph

    2016-01-01

    Authenticity at work, loosely defined as the degree to which an individual stays true to their core self, has impact on workers in the workplace. This thesis shows that authenticity at work can be measured with a reliable and valid instrument: the IAM Work. Furthermore, results of this thesis show

  19. 7 CFR 1.22 - Authentication.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to make...

  20. Privacy-Preserving Biometric Authentication: Challenges and Directions

    Directory of Open Access Journals (Sweden)

    Elena Pagnin

    2017-01-01

    Full Text Available An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication. The most characteristic feature of this authentication method is the naturally strong bond between a user and her biometric credentials. This very same advantageous property, however, raises serious security and privacy concerns in case the biometric trait gets compromised. In this article, we present the most challenging issues that need to be taken into consideration when designing secure and privacy-preserving biometric authentication protocols. More precisely, we describe the main threats against privacy-preserving biometric authentication systems and give directions on possible countermeasures in order to design secure and privacy-preserving biometric authentication protocols.

  1. HERMA-Heartbeat Microwave Authentication

    Science.gov (United States)

    Lux, James Paul (Inventor); Chow, Edward (Inventor); McKee, Michael Ray (Inventor); Haque, Salman-ul Mohammed (Inventor); Tkacenko, Andre (Inventor)

    2018-01-01

    Systems and methods for identifying and/or authenticating individuals utilizing microwave sensing modules are disclosed. A HEaRtbeat Microwave Authentication (HERMA) system can enable the active identification and/or authentication of a user by analyzing reflected RF signals that contain a person's unique characteristics related to their heartbeats. An illumination signal is transmitted towards a person where a reflected signal captures the motion of the skin and tissue (i.e. displacement) due to the person's heartbeats. The HERMA system can utilize existing transmitters in a mobile device (e.g. Wi-Fi, Bluetooth, Cellphone signals) as the illumination source with at least one external receive antenna. The received reflected signals can be pre-processed and analyzed to identify and/or authenticate a user.

  2. Authentic leadership: application to women leaders.

    Science.gov (United States)

    Hopkins, Margaret M; O'Neil, Deborah A

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.

  3. Authentic leadership: application to women leaders

    OpenAIRE

    Hopkins, Margaret M.; O?Neil, Deborah A.

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.

  4. Literacity: A multimedia adult literacy package combining NASA technology, recursive ID theory, and authentic instruction theory

    Science.gov (United States)

    Willis, Jerry; Willis, Dee Anna; Walsh, Clare; Stephens, Elizabeth; Murphy, Timothy; Price, Jerry; Stevens, William; Jackson, Kevin; Villareal, James A.; Way, Bob

    1994-01-01

    An important part of NASA's mission involves the secondary application of its technologies in the public and private sectors. One current application under development is LiteraCity, a simulation-based instructional package for adults who do not have functional reading skills. Using fuzzy logic routines and other technologies developed by NASA's Information Systems Directorate and hypermedia sound, graphics, and animation technologies the project attempts to overcome the limited impact of adult literacy assessment and instruction by involving the adult in an interactive simulation of real-life literacy activities. The project uses a recursive instructional development model and authentic instruction theory. This paper describes one component of a project to design, develop, and produce a series of computer-based, multimedia instructional packages. The packages are being developed for use in adult literacy programs, particularly in correctional education centers. They use the concepts of authentic instruction and authentic assessment to guide development. All the packages to be developed are instructional simulations. The first is a simulation of 'finding a friend a job.'

  5. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Petersen, Franziska Bork

    2013-01-01

    ' was understood in the Enlightenment and what techniques were used to stage the body when the concept gained currency, for instance in the writings of Rousseau. My analysis makes clear that 'bodily authenticity' on the two TV shows is achieved by strictly following gender-normative codes of beauty...... the 'authentic' ideal in a total of seven pieces. These strategies are hyperbole which exaggerates the beauty code implicit in 'authentic appearance'; multiplicity which undermines 'authenticity's' essentialism and estrangement which denies the notion of individual authorship. In conclusion, I place the staging...

  6. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  7. Topic Map for Authentic Travel

    OpenAIRE

    Wandsvik, Atle; Zare, Mehdi

    2007-01-01

    E-business is a new trend in Internet use. Authentic travel is an approach to travel and travel business which helps the traveler experience what is authentic in the travel destination. But how can the traveler find those small authentic spots and organize them together to compose a vacation? E-business techniques, combined withTopic Maps, can help.

  8. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    Science.gov (United States)

    Kent, Alexander Dale [Los Alamos, NM

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  9. Authenticity and commoditization at home

    DEFF Research Database (Denmark)

    Stender, Marie

    This paper investigates how interest and affect are entangled in the built environment of new Danish homes. The paper unfolds tensions and conflicts in the process from design through branding to occupancy of the house, and the relationship between authenticity and commoditization is explored....... In Denmark, the concept of authenticity is often associated with old houses. By way of design and branding, though, new neighbourhoods are made authentic, referring to their historical past, architectural uniqueness or sense of community. Based on a fieldwork in three new residential buildings in Copenhagen......, the paper explores the inherent paradox of the staging of authenticity. Rather than viewing the house solely from the perspective of the resident, the study ethnographically traces the entire process from design to occupancy in order to investigate how notions of value and authenticity are negotiated...

  10. FY2007 Laboratory Directed Research and Development Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Craig, W W; Sketchley, J A; Kotta, P R

    2008-03-20

    The Laboratory Directed Research and Development (LDRD) annual report for fiscal year 2007 (FY07) provides a summary of LDRD-funded projects for the fiscal year and consists of two parts: An introduction to the LDRD Program, the LDRD portfolio-management process, program statistics for the year, and highlights of accomplishments for the year. A summary of each project, submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to Department of Energy (DOE)/National Nuclear Security Administration (NNSA) and Lawrence Livermore National Laboratory (LLNL) mission areas, the technical progress achieved in FY07, and a list of publications that resulted from the research in FY07. Summaries are organized in sections by research category (in alphabetical order). Within each research category, the projects are listed in order of their LDRD project category: Strategic Initiative (SI), Exploratory Research (ER), Laboratory-Wide Competition (LW), and Feasibility Study (FS). Within each project category, the individual project summaries appear in order of their project tracking code, a unique identifier that consists of three elements. The first is the fiscal year the project began, the second represents the project category, and the third identifies the serial number of the proposal for that fiscal year.

  11. Quantum Dialogue with Authentication Based on Bell States

    Science.gov (United States)

    Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping

    2013-06-01

    We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.

  12. User Authentication based on Continuous Touch Biometrics

    Directory of Open Access Journals (Sweden)

    Christina J Kroeze

    2016-12-01

    Full Text Available Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, leaving the device vulnerable if stolen. This paper investigates the possibility of unobtrusive, continuous authentication for smartphones based on biometric data collected using a touchscreen. The possibility of authenticating users on a smartphone was evaluated by conducting an experiment simulating real-world touch interaction. Touch data was collected from 30 participants during normal phone use. The touch features were analysed in terms of the information provided for authentication. It was found that features such as finger pressure, location of touch interaction and shape of the finger were important discriminators for authentication. The touch data was also analysed using two classification algorithms to measure the authentication accuracy. The results show that touch data is sufficiently distinct between users to be used in authentication without disrupting normal touch interaction. It is also shown that the raw touch data was more effective in authentication than the aggregated gesture data.

  13. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Directory of Open Access Journals (Sweden)

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  14. Authenticity Lies in the Eye of the Beholder The Perception of Teachers' Authenticity by their Students

    NARCIS (Netherlands)

    De Bruyckere, Pedro

    2018-01-01

    Everything and everybody is urged to be authentic. Brands now need to create authentic experiences in music, artists survive if they are perceived as being real and nowadays, even in political elections, the perception of authenticity is an issue, certainly in the 2016 elections in the United

  15. Make me authentic, but not here: Reflexive struggles with academic identity and authentic leadership

    OpenAIRE

    Tomkins, Leah; Nicholds, Alyson

    2017-01-01

    This article presents a reflexive auto-ethnography of the experience of teaching authentic leadership to MBA students. It traces parallels between the challenges of authentic leadership and the challenges of academic identity work, grounded specifically in the experience of having to teach something one does not fully endorse. Both authentic leadership and academic identity work emerge as struggle – riddled with false starts, best intentions and self-deception, and entwined in the politics of...

  16. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  17. Laboratory directed research and development annual report: Fiscal year 1992

    International Nuclear Information System (INIS)

    1993-01-01

    The Department of Energy Order DOE 5000.4A establishes DOE's policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is ''research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this order. Consistent with the Mission Statement and Strategic Plan provided in PNL's Institutional Plan, the LDRD investments are focused on developing new and innovative approaches to research related to our ''core competencies.'' Currently, PNL's core competencies have been identified as: integrated environmental research; process science and engineering; energy distribution and utilization. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these corecompetencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. The projects described in this report represent PNL's investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. The report provides an overview of PNL's LDRD program and the management process used for the program and project summaries for each LDRD project

  18. Anonymous Authentication Systems Based on Private Information Retrieval

    OpenAIRE

    Nakamura, Toru; Inenaga, Shunsuke; Ikeda, Daisuke; Baba, Kensuke; Yasuura, Hiroto

    2009-01-01

    This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authenticati...

  19. An all-encompassing study of an authentic court setting

    DEFF Research Database (Denmark)

    Christensen, Tina Paulsen

    necessarily be judged from a particular (subjective) perspective on the communicative event. In this paper I shall address the issue of interpreting quality in an all-encompassing perspective on an authentic Danish courtroom setting. The aim of the empirical case-based survey is unlike that of most existing...... but homogeneous. Several empirical studies, which have been carried out on this subject, have shown that different user groups have different expectations about the interpreted communicative event, which ceteris paribus means that user expectations are heterogeneous. The question is, whether the heterogeneity......, which are to be considered as expectancy norms projected and recommended by the specific legal system. In order to be able to answer this question, a questionnaire-based survey on specific quality criteria has been conducted within an authentic interpreter-mediated court setting, because, according...

  20. Perfumed historic buildings: Issues of authenticity

    Directory of Open Access Journals (Sweden)

    Tošić Jovana

    2016-01-01

    Full Text Available Contemporary historical preservation practice includes olfactory preservation as an experimental method of architectural preservation. The implementation of manufactured scents in historic buildings raises important issues of authenticity. This paper focuses on three important issues in the relation between olfactory preservation and authenticity: the importance of phenomenology in memory evocation; the relative character of the authenticity concept; and the significance of social values in historic preservation. This requires a critical examination of charters, documents and theoretical interpretations which reflect a broader concept of authenticity. The paper discusses certain articles of the Venice Charter, the Nara Document on Authenticity, as well as the sense of smell in architectural experience through critical analysis of the theories of John Ruskin, Viollet-le-Duc, Roger Scruton and Juhani Pallasmaa and their concepts of authenticity. Authenticity issues are illustrated by the examples of olfactory preservation: olfactory reconstruction of Philip Johnson’s Glass House; interior restoration and olfactory reconstruction of the Arts Club in Mayfair, London; and the creation process of the perfume brand Arquiste, a meaningful example which relocates the olfactory reconstruction context. These critical analyses raise the question of scent in historic buildings as a value in itself.

  1. Sensing pressure for authentication

    NARCIS (Netherlands)

    Henderson, N.J.; White, N.M.; Veldhuis, Raymond N.J.; Hartel, Pieter H.; Slump, Cornelis H.

    The use of signals resulting from tapping a rhythm on a pressure sensor is explored for authentication. The features used for authentication can be divided into rhythm and waveform features. This paper studies the use of waveform features. A verification scheme based on prototype waveforms is

  2. Staging constructions of authenticity in organizational change

    DEFF Research Database (Denmark)

    Dupret, Katia

    2018-01-01

    Authenticity in organizations has gained increased focus in recent years. Authentic management and leadership are ways to motivate and make sustainable changes in the organization. But authenticity is also strategically worked with in order to serve social and political functions...... that are emotionally charged. Through a socio-material perspective this paper seeks to explore how change processes in organizations challenges the idea of authentic leadership as a merely individual ability or personality trait and suggest that the authentic leader is distributed into the practices of change...

  3. BIOMETRIC AUTHENTICATION USING NONPARAMETRIC METHODS

    OpenAIRE

    S V Sheela; K R Radhika

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determine...

  4. 22 CFR 92.37 - Authentication procedure.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication procedure. 92.37 Section 92.37... Notarial Acts § 92.37 Authentication procedure. (a) The consular officer must compare the foreign official...) Where the State law requires the consular officer's certificate of authentication to show that the...

  5. Robust image authentication in the presence of noise

    CERN Document Server

    2015-01-01

    This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.    Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:   Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the pre...

  6. [Brief introduction of geo-authentic herbs].

    Science.gov (United States)

    Liang, Fei; Li, Jian; Zhang, Wei; Zhang, Rui-Xian

    2013-05-01

    The science of geo-authentic herbs is a characteristic discipline of traditional Chinese medicine established during thousands of years of clinical practices. It has a long history under the guidance of profound theories of traditional Chinese medicine. The words of "geo-authentic product" were derived from an administrative division unit in the ancient times, which layed stress on the good quality of products in particular regions. In ancient records of traditional Chinese medicine, the words of "geo-authentic product" were first found in Concise Herbal Foundation Compilation of the Ming dynasty, and the words of "geo-authentic herbs" were first discovered in Peony Pavilion of the late Ming dynasty. After all, clinical effect is the fundamental evaluation standard of geo-authentic herbs.

  7. User Authentication in Smartphones for Telehealth

    Directory of Open Access Journals (Sweden)

    Katherine A. Smith

    2017-11-01

    Full Text Available Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity.  When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.  Keywords: Authentication, Biometrics, HIPAA, Mobile security, Telehealth

  8. Software Authentication

    International Nuclear Information System (INIS)

    Wolford, J.K.; Geelhood, B.D.; Hamilton, V.A.; Ingraham, J.; MacArthur, D.W.; Mitchell, D.J.; Mullens, J.A.; Vanier, P. E.; White, G.K.; Whiteson, R.

    2001-01-01

    The effort to define guidance for authentication of software for arms control and nuclear material transparency measurements draws on a variety of disciplines and has involved synthesizing established criteria and practices with newer methods. Challenges include the need to protect classified information that the software manipulates as well as deal with the rapid pace of innovation in the technology of nuclear material monitoring. The resulting guidance will shape the design of future systems and inform the process of authentication of instruments now being developed. This paper explores the technical issues underlying the guidance and presents its major tenets

  9. Authenticity assessment of banknotes using portable near infrared spectrometer and chemometrics.

    Science.gov (United States)

    da Silva Oliveira, Vanessa; Honorato, Ricardo Saldanha; Honorato, Fernanda Araújo; Pereira, Claudete Fernandes

    2018-05-01

    Spectra recorded using a portable near infrared (NIR) spectrometer, Soft Independent Modeling of Class Analogy (SIMCA) and Linear Discriminant Analysis (LDA) associated to Successive Projections Algorithm (SPA) models were applied to identify counterfeit and authentic Brazilian Real (R$20, R$50 and R$100) banknotes, enabling a simple field analysis. NIR spectra (950-1650nm) were recorded from seven different areas of the banknotes (two with fluorescent ink, one over watermark, three with intaglio printing process and one over the serial numbers with typography printing). SIMCA and SPA-LDA models were built using 1st derivative preprocessed spectral data from one of the intaglio areas. For the SIMCA models, all authentic (300) banknotes were correctly classified and the counterfeits (227) were not classified. For the two classes SPA-LDA models (authentic and counterfeit currencies), all the test samples were correctly classified into their respective class. The number of selected variables by SPA varied from two to nineteen for R$20, R$50 and R$100 currencies. These results show that the use of the portable near-infrared with SIMCA or SPA-LDA models can be a completely effective, fast, and non-destructive way to identify authenticity of banknotes as well as permitting field analysis. Copyright © 2018 Elsevier B.V. All rights reserved.

  10. Context-Aware Multimodal FIDO Authenticator for Sustainable IT Services

    Directory of Open Access Journals (Sweden)

    Seung-Hyun Kim

    2018-05-01

    Full Text Available Existing sustainable IT services have several problems related to user authentication such as the inefficiency of managing the system security, low security, and low usability. In this paper, we propose a Fast IDentity Online (FIDO authenticator that performs continuous authentication with implicit authentication based on user context and multimodal authentication. The proposed FIDO authenticator, a context-aware multimodal FIDO authentication (CAMFA method, combines information such as the user context, state of the mobile device, and user biometrics, then applies implicit and explicit authentication methods to meet the level of authentication required by the service provider. This reduces the user’s explicit authentication burden and continually authenticates users at risk during the session. Moreover, it is able to respond to attacks such as the theft of the authentication method or session hijacking. To study the effectiveness of CAMFA, we ran a user study by collecting data from 22 participants over 42 days of activity on a practical Android platform. The result of the user study demonstrates that the number of explicit authentication requests could be reduced by half. Based on the results of this study, an advanced user authentication that provides multimodal and continuous authentication could be applied to sustainable IT services.

  11. Incorporating an Authentic Learning Strategy into Undergraduate Apparel and Merchandising Curriculum

    Science.gov (United States)

    Ma, Yoon Jin; Lee, Hyun-Hwa

    2012-01-01

    An authentic learning strategy fostering students' active learning was studied using the scenario of a real-world project. Students from two different classes at two different universities worked as clients or consultants to develop an apparel sourcing strategy. Quantitative and qualitative data were gathered from 44 undergraduates enrolled in…

  12. Impact of problem finding on the quality of authentic open inquiry science research projects

    Science.gov (United States)

    Labanca, Frank

    2008-11-01

    Problem finding is a creative process whereby individuals develop original ideas for study. Secondary science students who successfully participate in authentic, novel, open inquiry studies must engage in problem finding to determine viable and suitable topics. This study examined problem finding strategies employed by students who successfully completed and presented the results of their open inquiry research at the 2007 Connecticut Science Fair and the 2007 International Science and Engineering Fair. A multicase qualitative study was framed through the lenses of creativity, inquiry strategies, and situated cognition learning theory. Data were triangulated by methods (interviews, document analysis, surveys) and sources (students, teachers, mentors, fair directors, documents). The data demonstrated that the quality of student projects was directly impacted by the quality of their problem finding. Effective problem finding was a result of students using resources from previous, specialized experiences. They had a positive self-concept and a temperament for both the creative and logical perspectives of science research. Successful problem finding was derived from an idiosyncratic, nonlinear, and flexible use and understanding of inquiry. Finally, problem finding was influenced and assisted by the community of practicing scientists, with whom the students had an exceptional ability to communicate effectively. As a result, there appears to be a juxtaposition of creative and logical/analytical thought for open inquiry that may not be present in other forms of inquiry. Instructional strategies are suggested for teachers of science research students to improve the quality of problem finding for their students and their subsequent research projects.

  13. Engaging Students in Authentic Microbiology Research in an Introductory Biology Laboratory Course is Correlated with Gains in Student Understanding of the Nature of Authentic Research and Critical Thinking

    Directory of Open Access Journals (Sweden)

    Brittany J. Gasper

    2013-02-01

    Full Text Available Recent recommendations for biology education highlight the role of authentic research experiences early in undergraduate education as a means of increasing the number and quality of biology majors. These experiences will inform students on the nature of science, increase their confidence in doing science, as well as foster critical thinking skills, an area that has been lacking despite it being one of the desired outcomes at undergraduate institutions and with future employers. With these things in mind, we have developed an introductory biology laboratory course where students design and execute an authentic microbiology research project. Students in this course are assimilated into the community of researchers by engaging in scholarly activities such as participating in inquiry, reading scientific literature, and communicating findings in written and oral formats. After three iterations of a semester-long laboratory course, we found that students who took the course showed a significant increase in their understanding of the nature of authentic research and their level of critical thinking skills.

  14. Final Report on Institutional Computing Project s15_hilaserion, “Kinetic Modeling of Next-Generation High-Energy, High-Intensity Laser-Ion Accelerators as an Enabling Capability”

    Energy Technology Data Exchange (ETDEWEB)

    Albright, Brian James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Yin, Lin [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Stark, David James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-06

    This proposal sought of order 1M core-hours of Institutional Computing time intended to enable computing by a new LANL Postdoc (David Stark) working under LDRD ER project 20160472ER (PI: Lin Yin) on laser-ion acceleration. The project was “off-cycle,” initiating in June of 2016 with a postdoc hire.

  15. Laboratory directed research and development annual report: Fiscal year 1992

    Energy Technology Data Exchange (ETDEWEB)

    1993-01-01

    The Department of Energy Order DOE 5000.4A establishes DOE`s policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is ``research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this order. Consistent with the Mission Statement and Strategic Plan provided in PNL`s Institutional Plan, the LDRD investments are focused on developing new and innovative approaches to research related to our ``core competencies.`` Currently, PNL`s core competencies have been identified as: integrated environmental research; process science and engineering; energy distribution and utilization. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these corecompetencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. The projects described in this report represent PNL`s investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. The report provides an overview of PNL`s LDRD program and the management process used for the program and project summaries for each LDRD project.

  16. Laboratory directed research and development annual report: Fiscal year 1992

    Energy Technology Data Exchange (ETDEWEB)

    1993-01-01

    The Department of Energy Order DOE 5000.4A establishes DOE's policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this order. Consistent with the Mission Statement and Strategic Plan provided in PNL's Institutional Plan, the LDRD investments are focused on developing new and innovative approaches to research related to our core competencies.'' Currently, PNL's core competencies have been identified as: integrated environmental research; process science and engineering; energy distribution and utilization. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these corecompetencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. The projects described in this report represent PNL's investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. The report provides an overview of PNL's LDRD program and the management process used for the program and project summaries for each LDRD project.

  17. Managing authenticity: the paradox of great leadership.

    Science.gov (United States)

    Goffee, Rob; Jones, Gareth

    2005-12-01

    Leaders and followers both associate authenticity with sincerity, honesty, and integrity. It's the real thing--the attribute that uniquely defines great managers. But while the expression of a genuine self is necessary for great leadership, the concept of authenticity is often misunderstood, not least by leaders themselves. They often assume that authenticity is an innate quality--that a person is either genuine or not. In fact, the authors say, authenticity is largely defined by what other people see in you and, as such, can to a great extent be controlled by you. In this article, the authors explore the qualities of authentic leadership. To illustrate their points, they recount the experiences of some of the authentic leaders they have known and studied, including the BBC's Greg Dyke, Nestlé's Peter Brabeck-Letmathe, and Marks & Spencer's Jean Tomlin. Establishing your authenticity as a leader is a two-part challenge. You have to consistently match your words and deeds; otherwise, followers will never accept you as authentic. But it is not enough just to practice what you preach. To get people to follow you, you also have to get them to relate to you. This means presenting different faces to different audiences--a requirement that many people find hard to square with authenticity. But authenticity is not the product of manipulation. It accurately reflects aspects of the leader's inner self, so it can't be an act. Authentic leaders seem to know which personality traits they should reveal to whom, and when. Highly attuned to their environments, authentic leaders rely on an intuition born of formative, sometimes harsh experiences to understand the expectations and concerns of the people they seek to influence. They retain their distinctiveness as individuals, yet they know how to win acceptance in strong corporate and social cultures and how to use elements of those cultures as a basis for radical change.

  18. Laboratory-directed research and development: FY 1996 progress report

    Energy Technology Data Exchange (ETDEWEB)

    Vigil, J.; Prono, J. [comps.

    1997-05-01

    This report summarizes the FY 1996 goals and accomplishments of Laboratory-Directed Research and Development (LDRD) projects. It gives an overview of the LDRD program, summarizes work done on individual research projects, and provides an index to the projects` principal investigators. Projects are grouped by their LDRD component: Individual Projects, Competency Development, and Program Development. Within each component, they are further divided into nine technical disciplines: (1) materials science, (2) engineering and base technologies, (3) plasmas, fluids, and particle beams, (4) chemistry, (5) mathematics and computational sciences, (6) atomic and molecular physics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) biosciences.

  19. Laboratory-directed research and development: FY 1996 progress report

    International Nuclear Information System (INIS)

    Vigil, J.; Prono, J.

    1997-05-01

    This report summarizes the FY 1996 goals and accomplishments of Laboratory-Directed Research and Development (LDRD) projects. It gives an overview of the LDRD program, summarizes work done on individual research projects, and provides an index to the projects' principal investigators. Projects are grouped by their LDRD component: Individual Projects, Competency Development, and Program Development. Within each component, they are further divided into nine technical disciplines: (1) materials science, (2) engineering and base technologies, (3) plasmas, fluids, and particle beams, (4) chemistry, (5) mathematics and computational sciences, (6) atomic and molecular physics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) biosciences

  20. Final Report Sustained Spheromak Physics Project FY 1997 - FY 1999

    International Nuclear Information System (INIS)

    Hooper, E.B.; Hill, D.N.

    2000-01-01

    This is the final report on the LDRD SI-funded Sustained Spheromak Physics Project for the years FY1997-FY1999, during which the SSPX spheromak was designed, built, and commissioned for operation at LLNL. The specific LDRD project covered in this report concerns the development, installation, and operation of specialized hardware and diagnostics for use on the SSPX facility in order to study energy confinement in a sustained spheromak plasma configuration. The USDOE Office of Fusion Energy Science funded the construction and routine operation of the SSPX facility. The main distinctive feature of the spheromak is that currents in the plasma itself produce the confining toroidal magnetic field, rather than external coils, which necessarily thread the vacuum vessel. There main objective of the Sustained Spheromak Physics Project was to test whether sufficient energy confinement could be maintained in a spheromak plasma sustained by DC helicity injection. Achieving central electron temperatures of several hundred eV would indicate this. In addition, we set out to determine how the energy confinement scales with T c and to relate the confinement time to the level of internal magnetic turbulence. Energy confinement and its scaling are the central technical issues for the spheromak as a fusion reactor concept. Pending the outcome of energy confinement studies now under way, the spheromak could be the basis for an attractive fusion reactor because of its compact size, simply-connected magnetic geometry, and potential for steady-state current drive

  1. Authentic leadership: develop the leader within.

    Science.gov (United States)

    Yasinski, Lesia

    2014-03-01

    Great leadership usually starts with a willing heart, a positive attitude, and a desire to make a difference. Strong leadership is important, in today's health care climate, to ensure optimal patient outcomes and the fostering of future generations of knowledgeable, motivated and enthusiastic perioperative nurses. This article will explore key elements necessary for the development of authentic leadership. While highlighting the role that personal development plays in leadership skills, this article will also discuss ways to cultivate authenticity in leadership. The following questions will be addressed: What is authentic leadership? How does one become an authentic leader?

  2. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review of the con......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review...... of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop the criterion variable. From the literature review of concept and historical data in both traditions...... analysis should complement and support corporate social responsibility, management spirituality, authentic leadership / authentic follower, and other secular research by offering a research methods bridge between empirically grounded theology and secular studies, with the common goal of improving workplace...

  3. Perceived Authenticity of the Visitor Experience in Museums

    DEFF Research Database (Denmark)

    Hede, Anne-Marie; Garma, Romana; Josiassen, Alexander

    2014-01-01

    of perceived authenticity, resonating with Bal's (1996) research in this area. Findings also confirm that consumer scepticism and expectations are antecedents to perceived authenticity of the visitor experience in museums, and that perceived authenticity in turn affects visitor satisfaction and perceived...... corporate hypocrisy. Practical implications -This research provides a framework for museums to manage visitors' perceptions of authenticity, and to plan and design exhibits accordingly. Originality/value - Our research, set in the museum context, articulates the basis of perceived authenticity, its....... To investigate authenticity in a model with two antecedents and two outcomes, an additional data set was collected. Hypotheses were tested using structural equation modelling. Findings -The results show that perceived authenticity of the museum, the visitor and the materials in the museum are dimensions...

  4. Laboratory Directed Research and Development Program FY2011

    Energy Technology Data Exchange (ETDEWEB)

    none, none

    2012-04-27

    Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Themes that are codified in DOE's 2006 Strategic Plan (DOE/CF-0010), with a primary focus on Scientific Discovery and Innovation. For that strategic theme, the Fiscal Year (FY) 2011 LDRD projects support each one of the three goals through multiple strategies described in the plan. In addition, LDRD efforts support the four goals of Energy Security, the two goals of Environmental Responsibility, and Nuclear Security (unclassified fundamental research that supports stockpile safety and nonproliferation programs). Going forward in FY 2012, the LDRD program also supports the Goals codified in the new DOE Strategic Plan of May, 2011. The LDRD program also supports Office of Science strategic plans, including the 20-year Scientific Facilities Plan and the Office of Science Strategic Plan. The research also supports the strategic directions periodically under consideration and review by the Office of Science Program Offices, such as LDRD projects germane to new research facility concepts and new fundamental science directions. Brief summares of projects and accomplishments for the period for each division are included.

  5. ARE AUTHENTIC LEADERS SATISFIED WITH THEIR JOB?

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2016-06-01

    Full Text Available A crisis in management has led to the appearance of Authentic leadership. The aim of this work is to determine the characteristics of Authentic leadership in educational institutions and to respond to the question as to whether authentic leaders are satisfied with their job. The third aim is to determine differences among the researched regions. The sample included 227 randomly selected directors from primary and secondary schools in Serbia, Montenegro and the Republika Srpska. The research used an ALQ questionnaire for the estimation of leadership behaviour. Descriptions for the results prediction and multiple linear regressions were used. A multivariance analysis of variance was used to compare the groups. The research results showed that every fourth director is an authentic leader. Authentic leadership has a significant influence on job satisfaction through two aspects: internalised perspective and balanced processing. There are no differences in Authentic leadership in the researched areas. The results could be useful for educational institutions in countries where the research was conducted. Further research could be carried out in other countries while cultural differences should be taken into account. One limiting factor consists of the fact that the analysed data are obtained only from school directors. Leaders of educational institutions should provide management through the development of their own authenticity and the authenticity of their followers. The characteristics of Authentic leadership were reviewed and tested practically in the West-Balkan environment.

  6. Facelock: familiarity-based graphical authentication.

    Science.gov (United States)

    Jenkins, Rob; McLachlan, Jane L; Renaud, Karen

    2014-01-01

    Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  7. Advances in radiation modeling in ALEGRA :a final report for LDRD-67120, efficient implicit mulitgroup radiation calculations.

    Energy Technology Data Exchange (ETDEWEB)

    Mehlhorn, Thomas Alan; Kurecka, Christopher J. (University of Michigan, Ann Arbor, MI); McClarren, Ryan (University of Michigan, Ann Arbor, MI); Brunner, Thomas A.; Holloway, James Paul (University of Michigan, Ann Arbor, MI)

    2005-11-01

    The original LDRD proposal was to use a nonlinear diffusion solver to compute estimates for the material temperature that could then be used in a Implicit Monte Carlo (IMC) calculation. At the end of the first year of the project, it was determined that this was not going to be effective, partially due to the concept, and partially due to the fact that the radiation diffusion package was not as efficient as it could be. The second, and final year, of the project focused on improving the robustness and computational efficiency of the radiation diffusion package in ALEGRA. To this end, several new multigroup diffusion methods have been developed and implemented in ALEGRA. While these methods have been implemented, their effectiveness of reducing overall simulation run time has not been fully tested. Additionally a comprehensive suite of verification problems has been developed for the diffusion package to ensure that it has been implemented correctly. This process took considerable time, but exposed significant bugs in both the previous and new diffusion packages, the linear solve packages, and even the NEVADA Framework's parser. In order to manage this large suite of problem, a new tool called Tampa has been developed. It is a general tool for automating the process of running and analyzing many simulations. Ryan McClarren, at the University of Michigan has been developing a Spherical Harmonics capability for unstructured meshes. While still in the early phases of development, this promises to bridge the gap in accuracy between a full transport solution using IMC and the diffusion approximation.

  8. Advances in radiation modeling in ALEGRA: a final report for LDRD-67120, efficient implicit multigroup radiation calculations

    International Nuclear Information System (INIS)

    Mehlhorn, Thomas Alan; Kurecka, Christopher J.; McClarren, Ryan; Brunner, Thomas A.; Holloway, James Paul

    2005-01-01

    The original LDRD proposal was to use a nonlinear diffusion solver to compute estimates for the material temperature that could then be used in a Implicit Monte Carlo (IMC) calculation. At the end of the first year of the project, it was determined that this was not going to be effective, partially due to the concept, and partially due to the fact that the radiation diffusion package was not as efficient as it could be. The second, and final year, of the project focused on improving the robustness and computational efficiency of the radiation diffusion package in ALEGRA. To this end, several new multigroup diffusion methods have been developed and implemented in ALEGRA. While these methods have been implemented, their effectiveness of reducing overall simulation run time has not been fully tested. Additionally a comprehensive suite of verification problems has been developed for the diffusion package to ensure that it has been implemented correctly. This process took considerable time, but exposed significant bugs in both the previous and new diffusion packages, the linear solve packages, and even the NEVADA Framework's parser. In order to manage this large suite of problem, a new tool called Tampa has been developed. It is a general tool for automating the process of running and analyzing many simulations. Ryan McClarren, at the University of Michigan has been developing a Spherical Harmonics capability for unstructured meshes. While still in the early phases of development, this promises to bridge the gap in accuracy between a full transport solution using IMC and the diffusion approximation

  9. Robustness of digital artist authentication

    DEFF Research Database (Denmark)

    Jacobsen, Robert; Nielsen, Morten

    In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...... is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection....

  10. Examining the relationship between authenticity and self-handicapping.

    Science.gov (United States)

    Akin, Ahmet; Akin, Umran

    2014-12-01

    Self-handicapping includes strategies of externalization in which people excuse failure and internalize success, but which also prevents them from behaving in an authentic way. The goal was to investigate the relation of authenticity with self-handicapping. The study was conducted with 366 university students (176 men, 190 women; M age = 20.2 yr.). Participants completed the Turkish version of the Authenticity Scale and the Self-handicapping Scale. Self-handicapping was correlated positively with two factors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor. A multiple regression analysis indicated that self-handicapping was predicted positively by self-alienation and accepting external influence and negatively by authentic living, accounting for 21% of the variance collectively. These results demonstrated the negative association of authenticity with self-handicapping.

  11. User Authentication in Smartphones for Telehealth.

    Science.gov (United States)

    Smith, Katherine A; Zhou, Leming; Watzlaf, Valerie J M

    2017-01-01

    Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.

  12. Obfuscated authentication systems, devices, and methods

    Science.gov (United States)

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  13. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  14. Two-factor authentication

    CERN Document Server

    Stanislav, Mark

    2015-01-01

    During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market.

  15. Authentication in the context of international safeguards

    International Nuclear Information System (INIS)

    Drayer, D.D.; Sonnier, C.S.; Augustson, R.

    1991-01-01

    The International atomic Energy Agency held its first Advisory Group meeting on the subject of authentication in 1981. This meeting concentrated on the application of authentication to in-plant Non-Destructive Assay equipment supplied by the Facility Operator/State. In the decade since this meeting, a considerable amount of interest has developed over the use of authentication technology as a vital element of effective International Safeguards. Attendant with this interest, confusion has developed over the meaning and the need for the application of the technology as it exists today, and it may exist in the future. This paper addresses the subject of authentication, with emphasis on its basic definition and the applications of authentication technology in International Safeguards

  16. Implementation and assessment of a yeast orphan gene research project: involving undergraduates in authentic research experiences and progressing our understanding of uncharacterized open reading frames.

    Science.gov (United States)

    Bowling, Bethany V; Schultheis, Patrick J; Strome, Erin D

    2016-02-01

    Saccharomyces cerevisiae was the first eukaryotic organism to be sequenced; however, little progress has been made in recent years in furthering our understanding of all open reading frames (ORFs). From October 2012 to May 2015 the number of verified ORFs had only risen from 75.31% to 78%, while the number of uncharacterized ORFs had decreased from 12.8% to 11% (representing > 700 genes still left in this category; http://www.yeastgenome.org/genomesnapshot). Course-based research has been shown to increase student learning while providing experience with real scientific investigation; however, implementation in large, multi-section courses presents many challenges. This study sought to test the feasibility and effectiveness of incorporating authentic research into a core genetics course, with multiple instructors, to increase student learning and progress our understanding of uncharacterized ORFs. We generated a module-based annotation toolkit and utilized easily accessible bioinformatics tools to predict gene function for uncharacterized ORFs within the Saccharomyces Genome Database (SGD). Students were each assigned an uncharacterized ORF, which they annotated using contemporary comparative genomics methodologies, including multiple sequence alignment, conserved domain identification, signal peptide prediction and cellular localization algorithms. Student learning outcomes were measured by quizzes, project reports and presentations, as well as a post-project questionnaire. Our results indicate that the authentic research experience had positive impacts on students' perception of their learning and their confidence to conduct future research. Furthermore, we believe that creation of an online repository and adoption and/or adaptation of this project across multiple researchers and institutions could speed the process of gene function prediction. Copyright © 2015 John Wiley & Sons, Ltd.

  17. 22 CFR 61.5 - Authentication procedures-Imports.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication procedures-Imports. 61.5 Section... AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department authentication of foreign produced audio-visual materials shall submit to the Department a bona fide foreign...

  18. Facelock: familiarity-based graphical authentication

    Directory of Open Access Journals (Sweden)

    Rob Jenkins

    2014-06-01

    Full Text Available Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate, even after a one-year delay (86.1% success rate. Zero-acquaintance attackers were reduced to guessing (<1% success rate. Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate. In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate. Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  19. Secure ADS-B authentication system and method

    Science.gov (United States)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  20. Hardware device binding and mutual authentication

    Science.gov (United States)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  1. Authentic Montessori: The Teacher Makes the Difference

    Science.gov (United States)

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  2. PERSON AUTHENTICATION USING MULTIPLE SENSOR DATA FUSION

    Directory of Open Access Journals (Sweden)

    S. Vasuhi

    2011-04-01

    Full Text Available This paper proposes a real-time system for face authentication, obtained through fusion of Infra Red (IR and visible images. In order to identify the unknown person authentication in highly secured areas, multiple algorithms are needed. The four well known algorithms for face recognition, Block Independent Component Analysis(BICA, Kalman Filtering(KF method, Discrete Cosine Transform(DCT and Orthogonal Locality Preserving Projections (OLPP are used to extract the features. If the data base size is very large and the features are not distinct then ambiguity will exists in face recognition. Hence more than one sensor is needed for critical and/or highly secured areas. This paper deals with multiple fusion methodology using weighted average and Fuzzy Logic. The visible sensor output depends on the environmental condition namely lighting conditions, illumination etc., to overcome this problem use histogram technique to choose appropriate algorithm. DCT and Kalman filtering are holistic approaches, BICA follows feature based approach and OLPP preserves the Euclidean structure of face space. These recognizers are capable of considering the problem of dimensionality reduction by eliminating redundant features and reducing the feature space. The system can handle variations like illumination, pose, orientation, occlusion, etc. up to a significant level. The integrated system overcomes the drawbacks of individual recognizers. The proposed system is aimed at increasing the accuracy of the person authentication system and at the same time reducing the limitations of individual algorithms. It is tested on real time database and the results are found to be 96% accurate.

  3. Ninth Grade Student Responses to Authentic Science Instruction

    Science.gov (United States)

    Ellison, Michael Steven

    This mixed methods case study documents an effort to implement authentic science and engineering instruction in one teacher's ninth grade science classrooms in a science-focused public school. The research framework and methodology is a derivative of work developed and reported by Newmann and others (Newmann & Associates, 1996). Based on a working definition of authenticity, data were collected for eight months on the authenticity in the experienced teacher's pedagogy and in student performance. Authenticity was defined as the degree to which a classroom lesson, an assessment task, or an example of student performance demonstrates construction of knowledge through use of the meaning-making processes of science and engineering, and has some value to students beyond demonstrating success in school (Wehlage et al., 1996). Instruments adapted for this study produced a rich description of the authenticity of the teacher's instruction and student performance. The pedagogical practices of the classroom teacher were measured as moderately authentic on average. However, the authenticity model revealed the teacher's strategy of interspersing relatively low authenticity instructional units focused on building science knowledge with much higher authenticity tasks requiring students to apply these concepts and skills. The authenticity of the construction of knowledge and science meaning-making processes components of authentic pedagogy were found to be greater, than the authenticity of affordances for students to find value in classroom activities beyond demonstrating success in school. Instruction frequently included one aspect of value beyond school, connections to the world outside the classroom, but students were infrequently afforded the opportunity to present their classwork to audiences beyond the teacher. When the science instruction in the case was measured to afford a greater level of authentic intellectual work, a higher level of authentic student performance on

  4. State Authenticity as Fit to Environment: The Implications of Social Identity for Fit, Authenticity, and Self-Segregation.

    Science.gov (United States)

    Schmader, Toni; Sedikides, Constantine

    2017-10-01

    People seek out situations that "fit," but the concept of fit is not well understood. We introduce State Authenticity as Fit to the Environment (SAFE), a conceptual framework for understanding how social identities motivate the situations that people approach or avoid. Drawing from but expanding the authenticity literature, we first outline three types of person-environment fit: self-concept fit, goal fit, and social fit. Each type of fit, we argue, facilitates cognitive fluency, motivational fluency, and social fluency that promote state authenticity and drive approach or avoidance behaviors. Using this model, we assert that contexts subtly signal social identities in ways that implicate each type of fit, eliciting state authenticity for advantaged groups but state inauthenticity for disadvantaged groups. Given that people strive to be authentic, these processes cascade down to self-segregation among social groups, reinforcing social inequalities. We conclude by mapping out directions for research on relevant mechanisms and boundary conditions.

  5. Toward Developing Authentic Leadership: Team-Based Simulations

    Science.gov (United States)

    Shapira-Lishchinsky, Orly

    2014-01-01

    Although there is a consensus that authentic leadership should be an essential component in educational leadership, no study to date has ever tried to find whether team-based simulations may promote authentic leadership. The purpose of this study was to identify whether principal trainees can develop authentic leadership through ethical decision…

  6. The embodiment of authentic leadership.

    Science.gov (United States)

    Waite, Roberta; McKinney, Nicole; Smith-Glasgow, Mary Ellen; Meloy, Faye A

    2014-01-01

    Development of student leadership capacity and efficacy is critical to the nursing profession, and vital to this process is a strong foundation in critical thinking that includes a depth of understanding of self (i.e., authentic leadership development). This article will (a) present a theoretical overview of authentic leadership as compared with other popular leadership theories, (b) provide an overview of development/implementation of an authentic leadership course, the first in a series of six one-credit courses as an integral component of the Macy Undergraduate Leadership Fellows Program for upper-level nursing students, and (c) discuss related implications for nursing education. Findings from an investigator-developed quantitative pre-post survey and qualitative evaluation questions are provided. Student feedback regarding the comprehensive nature of the course was extremely positive and affirmed the value of introspection associated with authentic leadership in ongoing personal and professional development. Critical pedagogy and action-oriented learning strategies also proved beneficial to student engagement. Copyright © 2014 Elsevier Inc. All rights reserved.

  7. An Authentic Interpretation of Laws

    Directory of Open Access Journals (Sweden)

    Teodor Antić

    2015-01-01

    Full Text Available Authentic interpretation of laws is a legal institute whereby a legislator gives the authentic meaning to a specific legal norm in case of its incorrect or diversified interpretation in practice. It has the same legal force as the law. Retroactivity and influence on pending cases are its inherent characteristics. Due to these characteristics and their relation to the principles of the rule of law, legal certainty and separation of powers, it is subjected to severe criticism not only by legal theory but also legal practice. The author analyses the institute of authentic interpretation from historical and comparative point of view and through the Croatian normative regulation, practice of the Croatian Parliament and academic debate, including opinions in favour as well as against it. On these grounds the author concludes that higher quality of law making procedure could make the authentic interpretation dispensable. On the other hand, should this institute be kept in the legal order it is essential to receive more effective constitutional control.

  8. Introduction to Methods Demonstrations for Authentication

    International Nuclear Information System (INIS)

    Kouzes, Richard T.; Hansen, Randy R.; Pitts, W. K.

    2002-01-01

    During the Trilateral Initiative Technical Workshop on Authentication and Certification, PNNL will demonstrate some authentication technologies. This paper briefly describes the motivation for these demonstrations and provide background on them

  9. Authentic Leadership: Application to Women Leaders

    Directory of Open Access Journals (Sweden)

    Margaret M. Hopkins

    2015-07-01

    Full Text Available This article provides an overview and critique of authentic leadership, with particular arguments given to support the premise that authentic leadership is a gendered representation of leadership.

  10. Multi-modal Behavioural Biometric Authentication for Mobile Devices

    OpenAIRE

    Saevanee , Hataichanok; Clarke , Nathan ,; Furnell , Steven ,

    2012-01-01

    Part 12: Authentication and Delegation; International audience; The potential advantages of behavioural biometrics are that they can be utilised in a transparent (non-intrusive) and continuous authentication system. However, individual biometric techniques are not suited to all users and scenarios. One way to increase the reliability of transparent and continuous authentication systems is create a multi-modal behavioural biometric authentication system. This research investigated three behavi...

  11. Authentic leadership: What's in the construct?

    OpenAIRE

    Endrissat, Nada; Müller, Werner R.

    2006-01-01

    In a qualitative leadership study conducted in the German-speaking part of Switzerland the quest to be oneself i.e., to be authentic was found to be central for leadership. We will present the results in detail and highlight the difficulties leaders experience when trying to be authentic in their daily interaction. By providing a contextually rich description of authentic leadership from practitioners' point of views, our study contributes to the current endeavor to understand and define auth...

  12. Activity report for feasibility study on PKI authentication method with IC card in authentication system sub group of J-PARC information system group

    International Nuclear Information System (INIS)

    Teshima, Naoya; Aoyagi, Tetsuo; Nakajima, Norihiro; Hashimoto, Kiyoharu; Manabe, Atsushi; Yuasa, Fukuko

    2009-06-01

    The Authentication System Sub Group of J-PARC Information System Group completed the mapping of the several authentication methods in terms of the level of security. Of the methods, the PKI authentication method with IC card provides the Super High Security Level and will be adopted as the authentication method of several J-PARC Information Systems. We study the feasibility of this method with following four examples; (1) 'The EAP-TLS wireless LAN authentication method'. (2) 'The Web-SSL client authentication method in SSL-VPN connection'. (3) 'The PKI authentication method with a certificate issued by NAREGI-CA software stored in IC card.' (4) 'The PKI authentication method with Dual interface FeliCa card'. In each example, we confirmed the feasibility of the method in a practical way. In this report we present the details of the study. (author)

  13. Developmental Changes in Judgments of Authentic Objects

    Science.gov (United States)

    Frazier, Brandy N.; Gelman, Susan A.

    2009-01-01

    This study examined the development of an understanding of authenticity among 112 children (preschoolers, kindergarten, 1st graders, and 4th graders) and 119 college students. Participants were presented with pairs of photographs depicting authentic and non-authentic objects and asked to pick which one belongs in a museum and which one they would…

  14. A Novel Multifactor Authentication System Ensuring Usability and Security

    OpenAIRE

    Mathew, Gloriya; Thomas, Shiney

    2013-01-01

    User authentication is one of the most important part of information security. Computer security most commonly depends on passwords to authenticate human users. Password authentication systems will be either been usable but not secure, or secure but not usable. While there are different types of authentication systems available alphanumeric password is the most commonly used authentication mechanism. But this method has significant drawbacks. An alternative solution to the text based authenti...

  15. 2016 Fermilab Laboratory Directed Research & Development Program Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wester, W. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States)

    2016-05-25

    Fermilab is executing Laboratory Directed Research and Development (LDRD) as outlined by order DOE O 413.2B in order to enhance and realize the mission of the laboratory in a manner that also supports the laboratory’s strategic objectives and the mission of the Department of Energy. LDRD funds enable scientific creativity, allow for exploration of “high risk, high payoff” research, and allow for the demonstration of new ideas, technical concepts, and devices. LDRD also has an objective of maintaining and enhancing the scientific and technical vitality of Fermilab. LDRD is able to fund employee-initiated proposals that address the current strategic objectives and better position Fermilab for future mission needs. The request for such funds is made in consideration of the investment needs, affordability, and directives from DOE and Congress. Review procedures of the proposals will insure that those proposals which most address the strategic goals of the DOE and the Laboratory or which best position Fermilab for the future will be recommended to the Laboratory Director who has responsibility for approval. The execution of each approved project will be the responsibility of the Principal Investigator, PI, who will follow existing Laboratory guidelines to ensure compliance with safety, environmental, and quality assurance practices. A Laboratory Director-appointed LDRD Coordinator will work with Committees, Laboratory Management, other Fermilab Staff, and the PI’s to oversee the implementation of policies and procedures of LDRD and provide the management and execution of this Annual Program Plan. FY16 represents third fiscal year in which LDRD has existed at Fermilab. The number of preliminary proposals (117) submitted in response to the LDRD Call for Proposals indicates very strong interest of the program within the Fermilab community. The first two Calls have resulted in thirteen active LDRD projects – and it is expected that between five and seven new

  16. Picturing the authenticity of emotions

    NARCIS (Netherlands)

    Kraemer, U.A.F.; Salmela, M.; Mayer, V.

    2009-01-01

    In our everyday lives, we talk about authentic and inauthentic emotions. Is this just a façon de parler that does not have any reference in the "real world?" I will support the thesis that it makes sense to talk about the authenticity of emotions in our everyday practice, disregarding the question

  17. Managing Authentic Experience in the Hypermodern Knowledge Economy

    DEFF Research Database (Denmark)

    Rendtorff, Jacob Dahl

    2017-01-01

    Modern experience economy is about buying and selling experiences, to make intimate experiences and search for customer satisfaction the driving motor of capitalist economies. The concept of experience and more recently the notion of authentic experience (e.g. Pine and Gilmore: Authenticity: What...... Customers Really Want) has thereby become central to management theory and management philosophy. In this paper, I want to discuss some fundamental and foundational aspects of the concept of authentic experience in the framework of the experience economy as a social reality of late modernity. 1. I...... will start with a phenomenological perspective on the concept of experience and relate this concept to the idea of authenticity. This will be based on comparison between different concepts of authenticity. 2. After this I will analyze this concept of authenticity in the framework of the kind of society...

  18. Image content authentication based on channel coding

    Science.gov (United States)

    Zhang, Fan; Xu, Lei

    2008-03-01

    The content authentication determines whether an image has been tampered or not, and if necessary, locate malicious alterations made on the image. Authentication on a still image or a video are motivated by recipient's interest, and its principle is that a receiver must be able to identify the source of this document reliably. Several techniques and concepts based on data hiding or steganography designed as a means for the image authentication. This paper presents a color image authentication algorithm based on convolution coding. The high bits of color digital image are coded by the convolution codes for the tamper detection and localization. The authentication messages are hidden in the low bits of image in order to keep the invisibility of authentication. All communications channels are subject to errors introduced because of additive Gaussian noise in their environment. Data perturbations cannot be eliminated but their effect can be minimized by the use of Forward Error Correction (FEC) techniques in the transmitted data stream and decoders in the receiving system that detect and correct bits in error. This paper presents a color image authentication algorithm based on convolution coding. The message of each pixel is convolution encoded with the encoder. After the process of parity check and block interleaving, the redundant bits are embedded in the image offset. The tamper can be detected and restored need not accessing the original image.

  19. 22 CFR 92.38 - Forms of certificate of authentication.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Forms of certificate of authentication. 92.38... SERVICES Specific Notarial Acts § 92.38 Forms of certificate of authentication. The form of a certificate of authentication depends on the statutory requirements of the jurisdiction where the authenticated...

  20. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  1. Brand new authentic places

    DEFF Research Database (Denmark)

    Stender, Marie

    the relation and interplay between the two. This study strives to fill this gap by ethnographically tracing the process from design to occupancy including the role of branding as a means to create authenticity. The concept of authenticity is often associated with old houses and neighbourhoods, but also in new......How are places and material surroundings ascribed with meaning when new residential neighbourhoods are designed, branded and taken into use? Existing research on housing, neighbourhoods and urban design tends to take the perspective of either the architect or the user rather than to explore...... neighbourhoods stories of authenticity seems to be of great importance giving value and identity to place and people. By way of design and branding new places are implied with notions of the real, the original and the unique referring to e.g. its historical past, architectural uniqueness, sustainability or sense...

  2. Improving a Field School Curriculum Using Modularized Lessons and Authentic Case-Based Learning

    Science.gov (United States)

    Rea, Roy V.; Hodder, Dexter P.

    2007-01-01

    University course evaluations are replete with student comments expressing frustration with taking time out of work, paying money for, and putting energy into field education projects that lack authentic "real-world" problem-solving objectives. Here, we describe a model for field school education that borrows on pedagogical tools such as…

  3. Authentic texts in teaching French as a foreign language

    Directory of Open Access Journals (Sweden)

    Meta Lah

    2010-12-01

    Full Text Available The present paper is aimed at providing a ref lection on the use of authentic texts in French as a foreign language classroom. The author bases herself on an analysis of texts taken from four textbook sets (Le nouveau sans fronti`eres, Panorama, Campus and Rond point, which were or are still used in teaching French as a foreign language. Initially, a definition of authenticity and a survey of authentic material usage through history are provided. In the overview of the texts forming the corpus the texts are divided into authentic, adapted, apparently authentic and those for which no assumption can be made as to their authenticity. The authenticity analysis is also carried out by taking into account the analysis of/categorisation into text types (according to Adam. The author proceeds from two premises, i.e. firstly she foresees that authentic texts will be present in all text books analysed and secondly, considering the greater accessibility of materials, that their presence will be more pronounced in recent textbooks. However, none of the two hypo theses is confirmed, as authentic texts are found in the first three textbook sets, but not in the most recent one, while their presence is most pronounced in the oldest textbook set, i.e. in Le nouveau sans fronti`eres. The result of the analysis is thus somehow surprising given the overall accessibility of all kinds of authentic materials. In the author's opinion more authentic texts should be included into textbooks to thus enhance the purposeful ness of the foreign language classroom.

  4. Authenticity and Empathy in Education

    Science.gov (United States)

    Bialystok, Lauren; Kukar, Polina

    2018-01-01

    The educational enthusiasm for both authenticity and empathy makes a number of assumptions about universal virtues, self-hood, the role of emotion in education, and the role of the teacher. In this article, we argue that authenticity and empathy are both nebulous virtues that teachers and students are called to embody with little reflection on how…

  5. Identity-Based Authentication for Cloud Computing

    Science.gov (United States)

    Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao

    Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.

  6. Instant Java password and authentication security

    CERN Document Server

    Mayoral, Fernando

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication, detailing advanced topics in a recipe format.This book is ideal for developers new to user authentication and password security, and who are looking to get a good grounding in how to implement it in a reliable way.It's assumed that the reader will have some experience in Java already, as well as being familiar with the basic idea behind user authentication.

  7. A video authentication technique

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1987-01-01

    Unattended video surveillance systems are particularly vulnerable to the substitution of false video images into the cable that connects the camera to the video recorder. New technology has made it practical to insert a solid state video memory into the video cable, freeze a video image from the camera, and hold this image as long as desired. Various techniques, such as line supervision and sync detection, have been used to detect video cable tampering. The video authentication technique described in this paper uses the actual video image from the camera as the basis for detecting any image substitution made during the transmission of the video image to the recorder. The technique, designed for unattended video systems, can be used for any video transmission system where a two-way digital data link can be established. The technique uses similar microprocessor circuitry at the video camera and at the video recorder to select sample points in the video image for comparison. The gray scale value of these points is compared at the recorder controller and if the values agree within limits, the image is authenticated. If a significantly different image was substituted, the comparison would fail at a number of points and the video image would not be authenticated. The video authentication system can run as a stand-alone system or at the request of another system

  8. Secure authentication of classical messages with single photons

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen; Fu-Chen, Zhu

    2009-01-01

    This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical. (general)

  9. Authentication/authorization issues and fulltext document migration for the CERN Document Server

    CERN Document Server

    Kaplun, Samuele; Farina, Fabio; Šimko, Tibor

    2007-01-01

    This thesis describes a master degree project, ending studies at Università degli Studi di Milano-Bicocca of Computer Science, Milano. This work has been realized at the European Organization of Nuclear Research (CERN), in Geneva. The aim of the project was to enhance CDS Invenio, a digital library software developed by CERN, in the authentication/authorization area, to develop an automatic migration tool for moving documents from the legacy architecture and to develop an extension to Python in C for solving indexing time issues.

  10. Authenticity, life satisfaction, and distress: a longitudinal analysis.

    Science.gov (United States)

    Boyraz, Güler; Waits, J Brandon; Felix, Victoria A

    2014-07-01

    The purpose of the present study was to examine the reciprocal relationships between authenticity and measures of life satisfaction and distress using a 2-wave panel study design. Data were collected from 232 college students attending 2 public universities. Structural equation modeling was used to analyze the data. The results of the cross-lagged panel analysis indicated that after controlling for temporal stability, initial authenticity (Time 1) predicted later distress and life satisfaction (Time 2). Specifically, higher levels of authenticity at Time 1 were associated with increased life satisfaction and decreased distress at Time 2. Neither distress nor life satisfaction at Time 1 significantly predicted authenticity at Time 2. However, the relationship between Time 1 distress and Time 2 authenticity was not significantly different from the relationship between Time 1 authenticity and Time 2 distress. Results are discussed in light of humanistic-existential theories and the empirical research on well-being. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  11. Location-assured, multifactor authentication on smartphones via LTE communication

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.

  12. Hash-chain-based authentication for IoT

    Directory of Open Access Journals (Sweden)

    Antonio PINTO

    2016-12-01

    Full Text Available The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT. Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they use batteries and may be required to operate over long periods of time. The majority of these devices perform data collection. The collected data is stored on-line using web-services that, sometimes, operate without any special considerations regarding security and privacy. The current work proposes a modified hash-chain authentication mechanism that, with the help of a smartphone, can authenticate each interaction of the devices with a REST web-service using One Time Passwords (OTP while using open wireless networks. Moreover, the proposed authentication mechanism adheres to the stateless, HTTP-like behavior expected of REST web-services, even allowing the caching of server authentication replies within a predefined time window. No other known web-service authentication mechanism operates in such manner.

  13. Disambiguating authenticity: Interpretations of value and appeal.

    Directory of Open Access Journals (Sweden)

    Kieran O'Connor

    Full Text Available While shaping aesthetic judgment and choice, socially constructed authenticity takes on some very different meanings among observers, consumers, producers and critics. Using a theoretical framework positing four distinct meanings of socially constructed authenticity-type, moral, craft, and idiosyncratic-we aim to document empirically the unique appeal of each type. We develop predictions about the relationships between attributed authenticity and corresponding increases in the value ascribed to it through: (1 consumer value ratings, (2 willingness to pay, and (3 behavioral choice. We report empirical analyses from a research program of three multi-method studies using (1 archival data from voluntary consumer evaluations of restaurants in an online review system, (2 a university-based behavioral lab experiment, and (3 an online survey-based experiment. Evidence is consistent across the studies and suggests that perceptions of four distinct subtypes of socially constructed authenticity generate increased appeal and value even after controlling for option quality. Findings suggest additional directions for research on authenticity.

  14. Affordances and Constraints of Using the Socio-Political Debate for Authentic Summative Assessment

    Science.gov (United States)

    Anker-Hansen, Jens; Andrée, Maria

    2015-01-01

    This article reports from an empirical study on the affordances and constraints for using staged socio-political debates for authentic summative assessment of scientific literacy. The article focuses on conditions for student participation and what purposes emerge in student interaction in a socio-political debate. As part of the research project,…

  15. Information barriers and authentication

    International Nuclear Information System (INIS)

    MacArthur, D.W.; Wolford, J.K.

    2001-01-01

    Acceptance of nuclear materials into a monitoring regime is complicated if the materials are in classified shapes or have classified composition. An attribute measurement system with an information barrier can be emplo,yed to generate an unclassified display from classified measurements. This information barrier must meet two criteria: (1) classified information cannot be released to the monitoring party, and (2) the monitoring party must be convinced that the unclassified output accurately represents the classified input. Criterion 1 is critical to the host country to protect the classified information. Criterion 2 is critical to the monitoring party and is often termed the 'authentication problem.' Thus, the necessity for authentication of a measurement system with an information barrier stems directly from the description of a useful information barrier. Authentication issues must be continually addressed during the entire development lifecycle of the measurement system as opposed to being applied only after the system is built.

  16. Designing assignment using authentic assessment

    Science.gov (United States)

    Arlianty, Widinda Normalia; Febriana, Beta Wulan; Diniaty, Artina; Fauzi'ah, Lina

    2017-12-01

    This research is conducted to get an overview of the use of authentic assessment in the department of chemistry education, Islamic University of Indonesia. This research was conducted on the students of semester five, odd semester of academic year 2016/2017. Authentic assessment is an assessment process that is capable of measuring the knowledge, attitudes and skills of learners. Chemistry teacher candidates are required to be equipped with teaching and judging skills. Teachers were required can design and carry out assessment of the process and learning outcomes of students in an objective, accountable, and informative. Teacher creativity is required in the assessment. Therefore, authentic assessment is very appropriate used to improve the competence of students in education department as teachers candidates in the preparation of learning assessments.

  17. `INCLUDING' Partnerships to Build Authentic Research Into K-12 Science Education

    Science.gov (United States)

    Turrin, M.; Lev, E.; Newton, R.; Xu, C.

    2017-12-01

    Opportunities for authentic research experiences have been shown effective for recruiting and retaining students in STEM fields. Meaningful research experiences entail significant time in project design, modeling ethical practice, providing training, instruction, and ongoing guidance. We propose that in order to be sustainable, a new instructional paradigm is needed, one that shifts from being top-weighted in instruction to a distributed weight model. This model relies on partnerships where everyone has buy-in and reaps rewards, establishing broadened networks for support, and adjusting the mentoring model. We use our successful Secondary School Field Research Program as a model for this new paradigm. For over a decade this program has provided authentic geoscience field research for an expanding group of predominantly inner city high school youth from communities underrepresented in the sciences. The program has shifted the balance with returning participants now serving as undergraduate mentors for the high school student `researchers', providing much of the ongoing training, instruction, guidance and feedback needed. But in order to be sustainable and impactful we need to broaden our base. A recent NSF-INCLUDES pilot project has allowed us to expand this model, linking schools, informal education non-profits, other academic institutions, community partners and private funding agencies into geographically organized `clusters'. Starting with a tiered mentoring model with scientists as consultants, teachers as team members, undergraduates as team leaders and high school students as researchers, each cluster will customize its program to reflect the needs and strengths of the team. To be successful each organization must identify how the program fits their organizational goals, the resources they can contribute and what they need back. Widening the partnership base spreads institutional commitments for research scientists, research locations and lab space

  18. Development of anti-counterfeit consumer product authentication system

    Directory of Open Access Journals (Sweden)

    Olena V. Narimanova

    2015-06-01

    Full Text Available Aim of the research is to develop an anti-counterfeit consumer product authentication system. The main requirements for this system are formulated, the choice of method of consumer product authentication is substantiated. The scheme of anti-counterfeit consumer product authentication system is developed basing on previously proposed method of checking the QR-code integrity and authenticity. The proposed within the system consumer product authentication technology is simple, economical for implementation, does not require the external changes of product packaging, does not affect existing production process. The technology can be recommended for the use to private businesses and government institutions that are interested in the security of their products from counterfeiting, as well as tracking and removing from circulation the counterfeit consumer products.

  19. ECG authentication in post-exercise situation.

    Science.gov (United States)

    Dongsuk Sung; Jeehoon Kim; Myungjun Koh; Kwangsuk Park

    2017-07-01

    Human authentication based on electrocardiogram (ECG) has been a remarkable issue for recent ten years. This paper proposed an authentication technology with the ECG data recorded after the harsh exercise. 55 subjects voluntarily attended to this experiment. A stepper was used as an exercise equipment. The subjects are asked to do stepper for 5 minutes and their ECG signals are acquired before and after the exercise in rest, sitting posture. Linear discriminant analysis (LDA) was used for both feature extraction and classification. Even though, within the first 1 minute recording, the subject recognition accuracy was 59.64%, which is too low to utilize, after one minute the accuracy was higher than 90% and it increased up to 96.22% within 5 minutes, which is plausible to use in authentication circumstances. Therefore, we have concluded that ECG authentication techniques will be able to be used after 1 minute of catching breath.

  20. Laboratory Directed Research and Development Program Assessment for FY 2015

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, Diane [Brookhaven National Lab. (BNL), Upton, NY (United States); Barkigia, K. [Brookhaven National Lab. (BNL), Upton, NY (United States); Giacalone, P. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-03-01

    This report provides an overview of the BNL LDRD program and a summary of the management processes, project peer review, a financial overview, and the relation of the portfolio of LDRD projects to BNL's mission, initiatives, and strategic plan. Also included are a summary of success indicators and a self-assessment.

  1. Laboratory Directed Research and Development FY 1998 Progress Report

    Energy Technology Data Exchange (ETDEWEB)

    John Vigil; Kyle Wheeler

    1999-04-01

    This is the FY 1998 Progress Report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes work done on individual research projects, relates the projects to major Laboratory program sponsors, and provides an index to the principle investigators. Project summaries are grouped by their LDRD component: Competency Development, Program Development, and Individual Projects. Within each component, they are further grouped into nine technical categories: (1) materials science, (2) chemistry, (3) mathematics and computational science, (4) atomic, molecular, optical, and plasma physics, fluids, and particle beams, (5) engineering science, (6) instrumentation and diagnostics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) bioscience.

  2. Laboratory directed research and development: FY 1997 progress report

    Energy Technology Data Exchange (ETDEWEB)

    Vigil, J.; Prono, J. [comps.

    1998-05-01

    This is the FY 1997 Progress Report for the Laboratory Directed Research and Development (LDRD) program at Los Alamos National Laboratory. It gives an overview of the LDRD program, summarizes work done on individual research projects, relates the projects to major Laboratory program sponsors, and provides an index to the principal investigators. Project summaries are grouped by their LDRD component: Competency Development, Program Development, and Individual Projects. Within each component, they are further grouped into nine technical categories: (1) materials science, (2) chemistry, (3) mathematics and computational science, (4) atomic and molecular physics and plasmas, fluids, and particle beams, (5) engineering science, (6) instrumentation and diagnostics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) bioscience.

  3. South African managers in public service: On being authentic

    Directory of Open Access Journals (Sweden)

    Antoni Barnard

    2014-01-01

    Full Text Available South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work–life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.

  4. South African managers in public service: on being authentic.

    Science.gov (United States)

    Barnard, Antoni; Simbhoo, Nirvana

    2014-01-01

    South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work-life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.

  5. Towards distortion-free robust image authentication

    International Nuclear Information System (INIS)

    Coltuc, D

    2007-01-01

    This paper investigates a general framework for distortion-free robust image authentication by multiple marking. First, by robust watermarking a subsampled version of image edges is embedded. Then, by reversible watermarking the information needed to recover the original image is inserted, too. The hiding capacity of the reversible watermarking is the essential requirement for this approach. Thus in case of no attacks not only image is authenticated but also the original is exactly recovered. In case of attacks, reversibility is lost, but image can still be authenticated. Preliminary results providing very good robustness against JPEG compression are presented

  6. Heidegger's Concept of Authenticity and Sport Experience

    OpenAIRE

    Higuchi, Satoshi

    1991-01-01

    Carolyne Thomas regarded the aesthetic experience in sport as authentic in the meaning from Martin Heidegger's Being and Time. To examine the adequacy of the interpretation, the comparison between Thomas' concept of authenticity and the Heidegger's was attempted in this paper. Thomas' concept of authenticity is opposite to accidentality. It is also positive realization of a self, positive movement toward a capable being, a unique self, a unique experience, and honesty in a sport situation...

  7. The influence of trait-emotional intelligence on authentic leadership

    Directory of Open Access Journals (Sweden)

    Martina Kotzé

    2015-11-01

    Full Text Available Orientation: Authentic leadership is a relatively new construct that has recently gained increasing attention resulting from challenges faced by organisations relating to ethical meltdowns, corruption and fraud. Research purpose: This study seeks to explore the relationship between components of emotional intelligence and authentic leadership. Motivation for the study: Several authors called for more empirical investigations into the antecedents of authentic leadership. Despite the important role that emotions play in leadership, empirical studies were lacking about the influence of different components of emotional intelligence to authentic leadership. Research design, approach and method: Data were collected, using questionnaires obtained from 341 full-time employed applicants to MBA and leadership programmes in a South African Business School. Relationships between variables were analysed, using Pearson product-moment correlations and stepwise multiple regression. Main findings: The results indicated that emotional intelligence has positive statistically significant associations with authentic leadership. Specifically, those who scored high on all the emotional intelligence components also scored high on authentic leadership. In addition, the emotional intelligence component of empathy was a statistically significant predictor of authentic leadership. Practical/managerial implications: Initial findings suggest the potential value of recognising and developing the emotional intelligence of leaders to enable them to lead their organisations authentically to desired, successful outcomes. As empathy has been shown to be the most important emotional intelligence predictor of authentic leadership, leaders need to understand when subordinates perceive a leader as displaying empathic emotion. Contribution: This study contributes to the literature and empirical research on the antecedents of authentic leadership.

  8. WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)

    International Nuclear Information System (INIS)

    SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

    2000-01-01

    The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements

  9. Context-Aware Active Authentication using Touch Gestures, Typing Patterns and Body Movement

    Science.gov (United States)

    2016-03-01

    Division Information Directorate This report is published in the interest of scientific and technical information exchange, and its publication does...CA policy clarification memorandum dated 16 Jan 09. 13. SUPPLEMENTARY NOTES 14. ABSTRACT Design, develop and evaluate a desktop based active...of this project was to design, develop and evaluate a desktop active authentication system that uses the following keystroke timing based biometric

  10. Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

    International Nuclear Information System (INIS)

    Yang Jing; Wang Chuan; Zhang Ru

    2010-01-01

    In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.

  11. Multi-factor authentication using quantum communication

    Science.gov (United States)

    Hughes, Richard John; Peterson, Charles Glen; Thrasher, James T.; Nordholt, Jane E.; Yard, Jon T.; Newell, Raymond Thorson; Somma, Rolando D.

    2018-02-06

    Multi-factor authentication using quantum communication ("QC") includes stages for enrollment and identification. For example, a user enrolls for multi-factor authentication that uses QC with a trusted authority. The trusted authority transmits device factor information associated with a user device (such as a hash function) and user factor information associated with the user (such as an encrypted version of a user password). The user device receives and stores the device factor information and user factor information. For multi-factor authentication that uses QC, the user device retrieves its stored device factor information and user factor information, then transmits the user factor information to the trusted authority, which also retrieves its stored device factor information. The user device and trusted authority use the device factor information and user factor information (more specifically, information such as a user password that is the basis of the user factor information) in multi-factor authentication that uses QC.

  12. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  13. Development of Authentic Assessment instruments for Critical Thinking skills in Global Warming with a Scientific Approach

    Directory of Open Access Journals (Sweden)

    R. Surya Damayanti

    2017-12-01

    Full Text Available This study aims to develop an authentic assessment instrument to measure critical thinking skills in global warming learning and to describe the suitability, easiness, and usefulness of the use instruments which are developed base on the teacher’s opinion.   The development design is carried out by Borg & Gall (2003 development model, which is conducted with seven stages: information gathering stage, planning stage, product development stage, product test stage, product revision stage, field trial stage, and final product. The test subjects are students and teachers in SMA Lampung Tengah by using purposive sampling technique.  Global warming learning using authentic assessment consists of a series of learning activities, including observing, discussing, exploring, associating and communicating.  The results show the authentic assessment techniques global warming to measure and cultivate critical thinking skills consisting of written tests, performance, portfolios, projects, and attitudes.  The developed assessment model meets content and constructs validity, and effectively improves students' critical thinking skills and has a high level of suitability, easiness, and usefulness well-being. The assessment techniques are used in global warming learning are performance assessment techniques, portfolios, projects, products, and attitude that together contribute to the improvement of critical thinking skills on 97,4% of global warming learning.

  14. Quantum Secure Direct Communication Based on Authentication

    International Nuclear Information System (INIS)

    Min-Jie, Wang; Wei, Pan

    2008-01-01

    We propose two schemes of quantum secure direct communication (QSDC) combined ideas of user authentication [Phys. Rev. A 73 (2006) 042305] and direct communication with dense coding [Phys. Rev. A. 68 (2003) 042317]. In these protocols, the privacy of authentication keys and the properties of the EPR pairs not only ensure the realization of identity authentication but also further improve the security of communication, and no secret messages are leaked even if the messages were broken. (general)

  15. Enhancing Authentication Models Characteristic Metrics via ...

    African Journals Online (AJOL)

    In this work, we derive the universal characteristic metrics set for authentication models based on security, usability and design issues. We then compute the probability of the occurrence of each characteristic metrics in some single factor and multifactor authentication models in order to determine the effectiveness of these ...

  16. Entity Authentication:Analysis using Structured Intuition

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    In this paper, we propose a new method for the analysis that uses intuition of the analyst in a structured way. First we define entity authentication in terms of fine level authentication goals (FLAGs). Then we use some relevant structures in protocol narrations and use them to justify FLAGs...

  17. A Research on the Consequences of Authentic Leadership

    OpenAIRE

    Akif Tabak; Mustafa Polat; Serkan Cosar; Tolga Turkoz

    2013-01-01

    The present study examined the relationship between employees' authentic leadership perceptions and three relevant authentic leadership consequences, organizational trust, organizational commitment and organizational cynicism. With 371 employees in a Turkish firm, correlation analysis results showed that authentic leadership perceptions of employees were positively related to organizational trust and organizational commitment, but was negatively related with organizational cynicism. Moreover,...

  18. 18 CFR 375.102 - Custody and authentication of Commission records.

    Science.gov (United States)

    2010-04-01

    ... authentication of Commission records. 375.102 Section 375.102 Conservation of Power and Water Resources FEDERAL... Provisions § 375.102 Custody and authentication of Commission records. (a) Custody of official records. (1...) Authentication of Commission action. All orders and other actions of the Commission shall be authenticated or...

  19. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  20. Modern Methods of Voice Authentication in Mobile Devices

    Directory of Open Access Journals (Sweden)

    Vladimir Leonovich Evseev

    2016-03-01

    Full Text Available Modern methods of voice authentication in mobile devices.The proposed evaluation of the probability errors of the first and second kind for multi-modal methods of voice authentication. The advantages of multimodal multivariate methods before, when authentication takes place in several stages – this is the one-stage, which means convenience for customers. Further development of multimodal methods of authentication will be based on the significantly increased computing power of mobile devices, the growing number and improved accuracy built-in mobile device sensors, as well as to improve the algorithms of signal processing.

  1. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Yo-Hsuan Chuang

    2018-04-01

    Full Text Available Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs. Within this kind of Internet of Things (IoT environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  2. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Science.gov (United States)

    Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-01-01

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168

  3. A Lightweight Continuous Authentication Protocol for the Internet of Things.

    Science.gov (United States)

    Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-04-05

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  4. Laboratory Directed Research and Development Program Activities for FY 2008.

    Energy Technology Data Exchange (ETDEWEB)

    Looney,J.P.; Fox, K.

    2009-04-01

    Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that maintains a primary mission focus the physical sciences, energy sciences, and life sciences, with additional expertise in environmental sciences, energy technologies, and national security. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's Fiscal year 2008 budget was $531.6 million. There are about 2,800 employees, and another 4,300 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, 'Laboratory Directed Research and Development,' April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Developlnent at the Department of Energy/National Nuclear Security Administration Laboratories dated June 13, 2006. Accordingly, this is our Annual Report in which we describe the Purpose, Approach, Technical Progress and Results, and Specific Accomplishments of all LDRD projects that received funding during Fiscal Year 2008. BNL expended $12 million during Fiscal Year 2008 in support of 69 projects. The program has two categories, the annual Open Call LDRDs and Strategic LDRDs, which combine to meet the overall objectives of the LDRD Program. Proposals are solicited annually for review and approval concurrent with the next fiscal year, October 1. For the open call for proposals, an LDRD Selection Committee, comprised of the Associate Laboratory Directors (ALDs) for the Scientific Directorates, an equal number of scientists recommended by the Brookhaven Council, plus the Assistant Laboratory Director for Policy and Strategic Planning, review the proposals submitted in response to the solicitation. The Open Can LDRD category emphasizes innovative research concepts

  5. Pathways to Authenticity in Operatic Interpretation

    DEFF Research Database (Denmark)

    Grund, Cynthia M.; Westney, WIlliam

    is authentic in the sense of being believable, honest and compelling. Mastering pronunciation and knowing the literal narrative of an opera is one thing, but how can an opera singer find ways to transcend the libretto in order to really grip an audience through authenticity of a deeper and more personal kind...

  6. Authenticity in the Context of Technologically Enriched ESP

    Directory of Open Access Journals (Sweden)

    Vilhelmina Vaičiūnienė

    2013-01-01

    Full Text Available Purpose—to determine student attitudes towards authenticity and the interrelation between authenticity and the use of ICT in the ESP learning context. Design/methodology/approach—the research conducted in autumn 2011 was aimed at comparative analysis of students of two study modes—full-time and part-time. It followed research focusing on Bachelor study programme student attitudes (Business Informatics and Finance Economics to authentic resources carried out in spring of 2010. The survey participants were Bachelor study cycle first year students from several faculties of MRU (Law, Politics and Management, Economics and Finance Management, Social Informatics, Social Policy. The paper discusses the ESP learning experience at Mykolas Romeris University and presents research findings obtained through the questionnaire survey. Findings—comparative analysis between full-time and part-time study mode student responses reveals similar learning patterns; however, certain differences can also be observed. The full-time students are motivated by more advanced authentic learning materials and they are more computer literate and able to access these materials, whereas the respondents from the part-time study mode appreciate more traditional Internet-based language learning tools. Research limitations/implications—the research sample was composed of first year Bachelor study programme students, therefore the results cannot be generalised and applied to Master level students. Practical implications—awareness of student needs and problems encountered in authentic learning environment may help improve ESP teaching methods. Originality/Value—gaining insight into student perception of authenticity in learning process and technological proficiency to access authentic resources Keywords: authenticity, student autonomy, ESP context, information communication technologies (ICT. Research type: research paper.

  7. Authenticity in the Context of Technologically Enriched ESP

    Directory of Open Access Journals (Sweden)

    Vilhelmina Vaičiūnienė

    2012-07-01

    Full Text Available Purpose—to determine student attitudes towards authenticity and the interrelation between authenticity and the use of ICT in the ESP learning context.Design/methodology/approach—the research conducted in autumn 2011 was aimed at comparative analysis of students of two study modes—full-time and part-time. It followed research focusing on Bachelor study programme student attitudes (Business Informatics and Finance Economics to authentic resources carried out in spring of 2010. The survey participants were Bachelor study cycle first year students from several faculties of MRU (Law, Politics and Management, Economics and Finance Management, Social Informatics, Social Policy. The paper discusses the ESP learning experience at Mykolas Romeris University and presents research findings obtained through the questionnaire survey.Findings—comparative analysis between full-time and part-time study mode student responses reveals similar learning patterns; however, certain differences can also be observed. The full-time students are motivated by more advanced authentic learning materials and they are more computer literate and able to access these materials, whereas the respondents from the part-time study mode appreciate more traditional Internet-based language learning tools.Research limitations/implications—the research sample was composed of first year Bachelor study programme students, therefore the results cannot be generalised and applied to Master level students.Practical implications—awareness of student needs and problems encountered in authentic learning environment may help improve ESP teaching methods.Originality/Value—gaining insight into student perception of authenticity in learning process and technological proficiency to access authentic resourcesKeywords: authenticity, student autonomy, ESP context, information communication technologies (ICT.Research type: research paper.

  8. 29 CFR 18.901 - Requirement of authentication or identification.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Requirement of authentication or identification. 18.901... HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES Rules of Evidence Authentication and Identification § 18.901 Requirement of authentication or identification. (a) General provision. The requirement of...

  9. Polymeric self-authenticating banknotes

    Science.gov (United States)

    Zientek, Paul

    1998-04-01

    This paper discusses a new concept in overt security called the self-authenticating banknote. The self-authenticating banknote concept is built around the transparent window feature of the polymer banknote. This feature allows the incorporation of transmission based optical devices on a banknote so that the user, by folding the note over on itself and looking through an optical device which is a part of the note itself, can visually inspect and verify certain security features on the banknote. This paper presents a number of examples of optical devices which are presently being developed for this purpose.

  10. Simulations in nursing practice: toward authentic leadership.

    Science.gov (United States)

    Shapira-Lishchinsky, Orly

    2014-01-01

    Aim  This study explores nurses' ethical decision-making in team simulations in order to identify the benefits of these simulations for authentic leadership. Background  While previous studies have indicated that team simulations may improve ethics in the workplace by reducing the number of errors, those studies focused mainly on clinical aspects and not on nurses' ethical experiences or on the benefits of authentic leadership. Methods  Fifty nurses from 10 health institutions in central Israel participated in the study. Data about nurses' ethical experiences were collected from 10 teams. Qualitative data analysis based on Grounded Theory was applied, using the atlas.ti 5.0 software package. Findings  Simulation findings suggest four main benefits that reflect the underlying components of authentic leadership: self-awareness, relational transparency, balanced information processing and internalized moral perspective. Conclusions  Team-based simulation as a training tool may lead to authentic leadership among nurses. Implications for nursing management  Nursing management should incorporate team simulations into nursing practice to help resolve power conflicts and to develop authentic leadership in nursing. Consequently, errors will decrease, patients' safety will increase and optimal treatment will be provided. © 2012 John Wiley & Sons Ltd.

  11. Authentication of data for monitoring a comprehensive test ban treaty

    International Nuclear Information System (INIS)

    Craft, R.L.; Draelos, T.J.

    1996-05-01

    The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations

  12. Biometric authentication and authorisation infrastructures

    OpenAIRE

    Olden, Matthias

    2010-01-01

    Nowadays, replacing traditional authentication methods with authentication and authorization infrastructures (AAIs) comes down to trading several passwords for one master password, which allows users to access all services in a federation. Having only one password may be comfortable for the user, but it also raises the interest of potential impostors, who may try to overcome the weak security that a single password provides. A solution to this issue would be a more-factor AAI, combining the p...

  13. Development of a Mobile EEG-based Biometric Authentication System

    DEFF Research Database (Denmark)

    Klonovs, Juris; Petersen, Christoffer Kjeldgaard; Olesen, Henning

    In recent years the need for greater security for storing personal and business data or accessing corporate networks on mobile devices is growing rapidly, and one of the potential solutions is to employ the innovative biometric authentication techniques. This paper presents the development...... and present a mobile prototype system capable of authenticating users based on the uniqueness of their brainwaves. Furthermore, we implement a novel authentication process, which leads the authentication system to be more secure. We also give suggestions for future improvements of the system....

  14. Vein matching using artificial neural network in vein authentication systems

    Science.gov (United States)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  15. [Application of rapid PCR to authenticate medicinal snakes].

    Science.gov (United States)

    Chen, Kang; Jiang, Chao; Yuan, Yuan; Huang, Lu-Qi; Li, Man

    2014-10-01

    To obtained an accurate, rapid and efficient method for authenticate medicinal snakes listed in Chinese Pharmacopoeia (Zaocysd humnades, Bungarus multicinctus, Agkistrodon acutus), a rapid PCR method for authenticate snakes and its adulterants was established based on the classic molecular authentication methods. DNA was extracted by alkaline lysis and the specific primers were amplified by two-steps PCR amplification method. The denatured and annealing temperature and cycle numbers were optimized. When 100 x SYBR Green I was added in the PCR product, strong green fluorescence was visualized under 365 nm UV whereas adulterants without. The whole process can complete in 30-45 minutes. The established method provides the technical support for authentication of the snakes on field.

  16. Computer Security: Cryptography and authentication (2/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Remi Mollon studied computer security at University and he first worked on Grids, with the EGEE project, for a French Bioinformatics institute. Information security being crucial in that field, he developed an encrypted file management system on top of Grid middleware, and he contributed in integrating legacy applications with Grids. Then, he was hired by CERN as a Grid Data Management developer, and he joined the Grid Operational Security Coordination Team. Remi has now moved to CERN Computer Security Team. Remi is involved in the daily security operations, in addition to be responsible to design Team's computer infrastructure, and to participate to several projects, like multi-factor authentication at CERN. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have s...

  17. A Multifactor Secure Authentication System for Wireless Payment

    Science.gov (United States)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  18. Laboratory Directed Research and Development Annual Report - Fiscal Year 2000; FINAL

    International Nuclear Information System (INIS)

    Fisher, Darrell R; Hughes, Pamela J; Pearson, Erik W

    2001-01-01

    The projects described in this report represent the Laboratory's investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. In accordance with DOE guidelines, the report provides, (a) a director's statement, (b) an overview of the laboratory's LDRD program, including PNNL's management process and a self-assessment of the program, (c) a five-year project funding table, and (d) project summaries for each LDRD project

  19. Quantum direct communication with authentication

    International Nuclear Information System (INIS)

    Lee, Hwayean; Lim, Jongin; Yang, HyungJin

    2006-01-01

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states

  20. Authentic Italian food as Mamma used to make it

    DEFF Research Database (Denmark)

    d'Ambrosio, Luigi; Madsen, Jan Halberg

    2014-01-01

    Research description and purpose: The purpose of this investigation is to explore how Italian restaurants define authentic Italian culinary experiences and how these experiences are designed and rendered to the restaurants’ guests. Design/Methodology: The purpose of this research is exploratory...... are unique to this case and cannot be expected replicated, nor generalized. Originality/value: This article investigates how the authentic Italian culinary experience is defined and designed by restaurant owners or managers in the specific context of the city of Aalborg, Denmark. The originality...... of this research resides in the contribution to a better understanding of how authentic experiences are defined and designed at the supply side in the restaurant industry. Moreover, this article takes on a critical perspective on Gilmore and Pine’s genres of authenticity. Keywords: Genres of authenticity, culinary...

  1. An Investigation of the Effects of Authentic Science Experiences Among Urban High School Students

    Science.gov (United States)

    Chapman, Angela

    Providing equitable learning opportunities for all students has been a persistent issue for some time. This is evident by the science achievement gap that still exists between male and female students as well as between White and many non-White student populations (NCES, 2007, 2009, 2009b) and an underrepresentation of female, African-American, Hispanic, and Native Americans in many science, technology, engineering, and mathematics (STEM) related careers (NCES, 2009b). In addition to gender and ethnicity, socioeconomic status and linguistic differences are also factors that can marginalize students in the science classroom. One factor attributed to the achievement gap and low participation in STEM career is equitable access to resources including textbooks, laboratory equipment, qualified science teachers, and type of instruction. Extensive literature supports authentic science as one way of improving science learning. However, the majority of students do not have access to this type of resource. Additionally, extensive literature posits that culturally relevant pedagogy is one way of improving education. This study examines students' participation in an authentic science experience and argues that this is one way of providing culturally relevant pedagogy in science classrooms. The purpose of this study was to better understand how marginalized students were affected by their participation in an authentic science experience, within the context of an algae biofuel project. Accordingly, an interpretivist approach was taken. Data were collected from pre/post surveys and tests, semi-structured interviews, student journals, and classroom observations. Data analysis used a mixed methods approach. The data from this study were analyzed to better understand whether students perceived the experience to be one of authentic science, as well as how students science identities, perceptions about who can do science, attitudes toward science, and learning of science practices

  2. Athos: Efficient Authentication of Outsourced File Systems

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Goodrich, Michael T.; Papamanthou, Charalampos

    2008-01-01

    We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system's integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated...

  3. Teacher Professional Development to Foster Authentic Student Research Experiences

    Science.gov (United States)

    Conn, K.; Iyengar, E.

    2004-12-01

    This presentation reports on a new teacher workshop design that encourages teachers to initiate and support long-term student-directed research projects in the classroom setting. Teachers were recruited and engaged in an intensive marine ecology learning experience at Shoals Marine Laboratory, Appledore Island, Maine. Part of the weeklong summer workshop was spent in field work, part in laboratory work, and part in learning experimental design and basic statistical analysis of experimental results. Teachers were presented with strategies to adapt their workshop learnings to formulate plans for initiating and managing authentic student research projects in their classrooms. The authors will report on the different considerations and constraints facing the teachers in their home school settings and teachers' progress in implementing their plans. Suggestions for replicating the workshop will be offered.

  4. Cross-disciplinary, authentic student research projects

    NARCIS (Netherlands)

    Heck, A.; Uylings, P.; Kędzierska, E.; Ellermeijer, T.

    2010-01-01

    In the Dutch secondary education system, students must carry out at the end of their school career a rather large research or design project to demonstrate their ability to apply acquired knowledge and skills while pursuing a research question or design goal in some depth. They are encouraged to

  5. Authentication codes from ε-ASU hash functions with partially secret keys

    NARCIS (Netherlands)

    Liu, S.L.; Tilborg, van H.C.A.; Weng, J.; Chen, Kefei

    2014-01-01

    An authentication code can be constructed with a family of e-Almost strong universal (e-ASU) hash functions, with the index of hash functions as the authentication key. This paper considers the performance of authentication codes from e-ASU, when the authentication key is only partially secret. We

  6. Advances in isotopic analysis for food authenticity testing

    DEFF Research Database (Denmark)

    Laursen, Kristian Holst; Bontempo, L.; Camin, Federica

    2016-01-01

    Abstract Stable isotope analysis has been used for food authenticity testing for more than 30 years and is today being utilized on a routine basis for a wide variety of food commodities. During the past decade, major analytical method developments have been made and the fundamental understanding...... authenticity testing is currently developing even further. In this chapter, we aim to provide an overview of the latest developments in stable isotope analysis for food authenticity testing. As several review articles and book chapters have recently addressed this topic, we will primarily focus on relevant...... literature from the past 5 years. We will focus on well-established methods for food authenticity testing using stable isotopes but will also include recent methodological developments, new applications, and current and future challenges....

  7. The influence of authentic leadership on safety climate in nursing.

    Science.gov (United States)

    Dirik, Hasan Fehmi; Seren Intepeler, Seyda

    2017-07-01

    This study analysed nurses' perceptions of authentic leadership and safety climate and examined the contribution of authentic leadership to the safety climate. It has been suggested and emphasised that authentic leadership should be used as a guidance to ensure quality care and the safety of patients and health-care personnel. This predictive study was conducted with 350 nurses in three Turkish hospitals. The data were collected using the Authentic Leadership Questionnaire and the Safety Climate Survey and analysed using hierarchical regression analysis. The mean authentic leadership perception and the safety climate scores of the nurses were 2.92 and 3.50, respectively. The percentage of problematic responses was found to be less than 10% for only four safety climate items. Hierarchical regression analysis revealed that authentic leadership significantly predicted the safety climate. Procedural and political improvements are required in terms of the safety climate in institutions, where the study was conducted, and authentic leadership increases positive perceptions of safety climate. Exhibiting the characteristics of authentic leadership, or improving them and reflecting them on to personnel can enhance the safety climate. Planning information sharing meetings to raise the personnel's awareness of safety climate and systemic improvements can contribute to creating safe care climates. © 2017 John Wiley & Sons Ltd.

  8. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  9. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  10. Authentic leaders creating healthy work environments for nursing practice.

    Science.gov (United States)

    Shirey, Maria R

    2006-05-01

    Implementation of authentic leadership can affect not only the nursing workforce and the profession but the healthcare delivery system and society as a whole. Creating a healthy work environment for nursing practice is crucial to maintain an adequate nursing workforce; the stressful nature of the profession often leads to burnout, disability, and high absenteeism and ultimately contributes to the escalating shortage of nurses. Leaders play a pivotal role in retention of nurses by shaping the healthcare practice environment to produce quality outcomes for staff nurses and patients. Few guidelines are available, however, for creating and sustaining the critical elements of a healthy work environment. In 2005, the American Association of Critical-Care Nurses released a landmark publication specifying 6 standards (skilled communication, true collaboration, effective decision making, appropriate staffing, meaningful recognition, and authentic leadership) necessary to establish and sustain healthy work environments in healthcare. Authentic leadership was described as the "glue" needed to hold together a healthy work environment. Now, the roles and relationships of authentic leaders in the healthy work environment are clarified as follows: An expanded definition of authentic leadership and its attributes (eg, genuineness, trustworthiness, reliability, compassion, and believability) is presented. Mechanisms by which authentic leaders can create healthy work environments for practice (eg, engaging employees in the work environment to promote positive behaviors) are described. A practical guide on how to become an authentic leader is advanced. A research agenda to advance the study of authentic leadership in nursing practice through collaboration between nursing and business is proposed.

  11. A study on user authentication methodology using numeric password and fingerprint biometric information.

    Science.gov (United States)

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  12. Authenticated communication from quantum readout of PUFs

    NARCIS (Netherlands)

    Skoric, Boris; Pinkse, Pepijn Willemszoon Harry; Mosk, Allard

    2016-01-01

    Quantum Readout of Physical Unclonable Functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: a verifier can check if received classical data was sent by the PUF holder. We call this

  13. AIS authentication

    CERN Multimedia

    2006-01-01

    Users are invited to use the NICE password for AIS authentication. As announced in CNL June-August 2006 (see http://www.cerncourier.com/articles/cnl/3/6/14/1) it is possible to use the NICE username and password to log on to AIS. The procedure is now fully operational and users can themselves reset the AIS password such that the NICE password will be used for authentication required by AIS applications. We strongly recommend CERN users who have a NICE account (this is the case of most users) to do this, with the objective to reduce the number of passwords they need to remember. This can be achieved very easily, directly from the Change Password option on the AIS login (https://aislogin.cern.ch/). Users should just select the '[Change Password]' option displayed at the bottom of the page, provide the 'Old Password' and then click on the button 'Use Nice password' followed by 'Submit'. Change Password option on the AIS login windowSetting the AIS password - Use Nice Password It should be noted that the proce...

  14. Pre-Authentication Schemes for UMTS-WLAN Interworking

    Directory of Open Access Journals (Sweden)

    Ali Al Shidhani

    2009-01-01

    Full Text Available Interworking Universal Mobile Telecommunication System (UMTS and IEEE 802.11 Wireless Local Area Networks (WLANs introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS of the applications running on the User Equipment (UE. There is a need to design fast and secured handover protocols to operate in UMTS-WLAN interworking architectures. This paper proposes two secured pre-authentication protocols in the UMTS-WLAN interworking architectures. Performance analysis of the proposed protocols show superior results in comparison to existing protocols in terms of authentication signaling cost, authentication delay and load on critical nodes involved in the authentication procedure. Additionally, the security of the proposed protocols was verified by the Automated Validation of Internet Security Protocols and Applications (AVISPA security analyzer.

  15. Authenticity: is it real or is it marketing?

    Science.gov (United States)

    Weinberger, David

    2008-03-01

    Marty Echt, the new head of marketing at Hunsk Engines, is determined to bring the motorcycle maker back to its roots. He says it's not enough to project authenticity to customers--employees must personally subscribe to the brand's values. Should the company's CEO support Marty's "real deal" vision? Five experts comment on this fictional case study. Bruce Weindruch, the founder and CEO of the History Factory, says that an authenticity-based campaign can be effective--but only if it's truly drawn from history. Marketers like Marty often remember their organization's past in a golden haze. Weindruch recommends exploring old engineering drawings, ads, and product photos in order to understand what customers and employees really valued back in the day. Gillian Arnold, a consultant to luxury fashion and fine jewelry brands, thinks Marty's approach is right: People in key marketing posts must be passionate about their products and know them inside and out. She argues that the CEO needs to commit more fully to the new campaign and address the significant gap between the staff and the brand. James H. Gilmore and B. Joseph Pine II, the cofounders of Strategic Horizons, point out that Hunsk needs to manage customers' perceptions rather than trying to be a "real company" or forming a management team whose personal interests match the brand. People purchase a product if it conforms to their self-image; that alone determines the brand's authenticity. Glenn Brackett of Sweetgrass Rods, a maker of bamboo fly-fishing rods, says Marty seems to be one of the few people who understand Hunsk motorcycles. If employees bring blood, sweat, heart, and soul to a product, it will manifest that spirit, and customers will line up for it.

  16. EVALUATION OF AUTHENTICITY ON THE BASIS OF THE NARA GRID IN ADAPTIVE REUSE OF MANOCHEHRI HISTORICAL HOUSE KASHAN, IRAN

    Directory of Open Access Journals (Sweden)

    Parastoo Eshrati

    2017-11-01

    Full Text Available Since it is highly desirable in the reuse of historic monuments not only to maintain their values but to promote them in contemporary life, authenticity is considered one of the measures of success in adaptive reuse projects. Nara Grid, which is designed concerning authenticity, is used as a tool to assess the authenticity of cultural heritage. This paper investigates authenticity in the adaptive reuse of Manouchehri House in Kashan based on the Nara Grid. The importance of this house lies in the fact that it is one of the first which has been reused by the private sector in this city and also has managed to encourage private sector partnership in the reuse of houses in this city and other historic cities of Iran. It has also been able to increase government trust, which shifts from top-down to a bottom-up approach in the field of cultural heritage, in the private sector. In this research, using Statistical Analysis methods, it is determined within the adaptive reuse of this house which ‘Dimensions’ and ‘Aspects’ of authenticity have received more attention and which ones received less; and also significant differences among individual’s viewpoints according to their gender, field, education, and age were investigated.

  17. FPGA Authentication Methods.

    Energy Technology Data Exchange (ETDEWEB)

    Brotz, Jay Kristoffer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hymel, Ross W [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Punnoose, Ratish J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mannos, Tom [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Grant, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom); Evans, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom)

    2017-05-01

    One of the greatest challenges facing designers of equipment to be used in a nuclear arms control treaty is how to convince the other party in the treaty to trust its results and functionality. Whether the host provides equipment meant to prove treaty obligations and the inspector needs to gain that trust (commonly referred to as authentication), or the inspector provides this equipment and the host needs to gain this trust (commonly considered to be included in certification), one party generally has higher confidence in the equipment at the start of a treaty regime and the other party needs to gain that confidence prior to use. While we focus on authentication in this document—that is, the inspector gaining confidence in host-provided equipment—our conclusions will likely apply to host certification of inspector-provided equipment.

  18. A Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication

    Directory of Open Access Journals (Sweden)

    Susan Gottschlich

    2017-12-01

    Full Text Available Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the user is authorized to access. While multiple authentication steps, known as multifactor authentication, are being used more widely throughout the military, government, businesses, and consumer sectors, the selection and implementation of which authentication factors to require is typically defined by security policy. Security policy is in turn typically established by a security organization that may have no formal metrics or means to guide its selection of authentication factors. This paper will present a taxonomy for describing authentication factors including important attributes that characterize authentication robustness to aid in the selection of factors that are consistent with the user’s mission. One particular authentication factor that I have developed will be discussed in the context of this taxonomy to motivate the need to broaden current definitions and security policies. The ultimate goal of this paper is to inspire the development of standards for authentication technologies to both support mission aware authentication innovation and to inform decision making about security policies concerning user authentication and authorization. Further, this paper aims to demonstrate that such an approach will fundamentally enhance both security and usability of increasingly networked, software-defined devices, equipment and software applications.

  19. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    Directory of Open Access Journals (Sweden)

    Seung-hwan Ju

    2013-01-01

    Full Text Available The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  20. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    Science.gov (United States)

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  1. Strengthening Authentication

    Science.gov (United States)

    Gale, Doug

    2007-01-01

    The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…

  2. FPGAs in High Perfomance Computing: Results from Two LDRD Projects.

    Energy Technology Data Exchange (ETDEWEB)

    Underwood, Keith D; Ulmer, Craig D.; Thompson, David; Hemmert, Karl Scott

    2006-11-01

    Field programmable gate arrays (FPGAs) have been used as alternative computational de-vices for over a decade; however, they have not been used for traditional scientific com-puting due to their perceived lack of floating-point performance. In recent years, there hasbeen a surge of interest in alternatives to traditional microprocessors for high performancecomputing. Sandia National Labs began two projects to determine whether FPGAs wouldbe a suitable alternative to microprocessors for high performance scientific computing and,if so, how they should be integrated into the system. We present results that indicate thatFPGAs could have a significant impact on future systems. FPGAs have thepotentialtohave order of magnitude levels of performance wins on several key algorithms; however,there are serious questions as to whether the system integration challenge can be met. Fur-thermore, there remain challenges in FPGA programming and system level reliability whenusing FPGA devices.4 AcknowledgmentArun Rodrigues provided valuable support and assistance in the use of the Structural Sim-ulation Toolkit within an FPGA context. Curtis Janssen and Steve Plimpton provided valu-able insights into the workings of two Sandia applications (MPQC and LAMMPS, respec-tively).5

  3. Authentic Research in the Classroom: NITARP Teachers Connect Astronomy with NGSS.

    Science.gov (United States)

    Pruett, Lee; Gibbs, John; Palmer, Robert; Young, Diedre; Gorjian, Varoujan

    2016-01-01

    The NASA/IPAC Teacher Archive Research Program (NITARP) uses authentic astronomical research to bring the Next Generation Science Standards (NGSS) into the classroom. The creation of the NGSS was a collaborative effort between teams composed of teachers, scientists and other professionals from twenty-six states. These standards provide a framework for the change in how science is taught at all levels from kindergarten to twelfth grade in participating states. Scientific concepts are grouped into broad categories (physical, biological and earth sciences), and call for an interdisciplinary approach to content, along with the integration of engineering practices into the curriculum. This approach to the teaching of science has led educators to place more emphasis on authentic learning and problem-solving in their curricula. Project-based learning is a strategy that can effectively allow students to learn core scientific concepts within the context of a focused and complex scientific problem.The NASA/IPAC Teacher Archive Research Program (NITARP) pairs teams of teachers and students with NASA astronomers. These teams are immersed in an astronomy research project over the course of the year, and are responsible for writing a project proposal, doing original research and presenting that research at a professional conference. The students who are involved in the NITARP research are provided with a rich hands-on experience that both exposes them to a deep understanding of an astronomical problem (and the core physics and math behind it), as well as the process of doing real science. The NITARP program offers a unique opportunity to bring project-based learning into K-12 science classrooms. We will highlight the ways in which this program has been implemented in classrooms across the country, as well as the connections to the NGSS.This research was made possible through the NASA/IPAC Teacher Archive Research Program (NITARP) and was funded by NASA Astrophysics Data Program.

  4. Infusing Authentic Inquiry into Biotechnology

    Science.gov (United States)

    Hanegan, Nikki L.; Bigler, Amber

    2009-10-01

    Societal benefit depends on the general public's understandings of biotechnology (Betsch in World J Microbiol Biotechnol 12:439-443, 1996; Dawson and Cowan in Int J Sci Educ 25(1):57-69, 2003; Schiller in Business Review: Federal Reserve Bank of Philadelphia (Fourth Quarter), 2002; Smith and Emmeluth in Am Biol Teach 64(2):93-99, 2002). A National Science Foundation funded survey of high school biology teachers reported that hands-on biotechnology education exists in advanced high school biology in the United States, but is non-existent in mainstream biology coursework (Micklos et al. in Biotechnology labs in American high schools, 1998). The majority of pre-service teacher content preparation courses do not teach students appropriate content knowledge through the process of inquiry. A broad continuum exists when discussing inquiry-oriented student investigations (Hanegan et al. in School Sci Math J 109(2):110-134, 2009). Depending on the amount of structure in teacher lessons, inquiries can often be categorized as guided or open. The lesson can be further categorized as simple or authentic (Chinn and Malhotra in Sci Educ 86(2):175-218, 2002). Although authentic inquiries provide the best opportunities for cognitive development and scientific reasoning, guided and simple inquiries are more often employed in the classroom (Crawford in J Res Sci Teach 37(9):916-937, 2000; NRC in Inquiry and the national science education standards: a guide for teaching and learning, 2000). For the purposes of this study we defined inquiry as "authentic" if original research problems were resolved (Hanegan et al. in School Sci Math J 109(2):110-134, 2009; Chinn and Malhotra in Sci Educ 86(2):175-218, 2002; Roth in Authentic school science: knowing and learning in open-inquiry science laboratories, 1995). The research question to guide this study through naturalistic inquiry research methods was: How will participants express whether or not an authentic inquiry experience enhanced

  5. Design of a Super-Pixel-Based Quantum Secure Authentication Demonstrator

    NARCIS (Netherlands)

    Toebes, Chris; Tentrup, Tristan B.H.; Pinkse, Pepijn W.H.

    2017-01-01

    Quantum Secure Authentication (QSA) is a method recently developed to authenticate a multiple-scattering key [1]. Previous implementations only showed proof-of-principle setups. We present a design of a compact and robust demonstration device for Quantum Secure Authentication. The challenge and

  6. Authenticating a tamper-resistant module in a base station router

    NARCIS (Netherlands)

    Bosch, H.G.P.; Kraml, M.; Mullender, Sape J.; Polakos, P.; Samuel, L.G.

    2007-01-01

    The present invention provides a method involving a tamper-resistant module and an authentication server. The method includes receiving, at the tamper-resistant module, information encrypted using a first secret key stored in the authentication server. The method also includes authenticating the

  7. Authentic tasks in higher education: Studying design principles for assessment

    NARCIS (Netherlands)

    van Keulen, H.; van den Berg, I.; Ramaekers, S.

    2006-01-01

    Students may benefit significantly from learning through authentic tasks. But how do we assess their learning outcomes, taking into account the specific characteristics of authentic tasks? In the second presentation of this symposium on design principles for authentic tasks we present and discuss

  8. Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

    OpenAIRE

    Lee, Wei-Han; Lee, Ruby B.

    2017-01-01

    Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the...

  9. A process for supporting risk-aware web authentication mechanism choice

    International Nuclear Information System (INIS)

    Renaud, Karen

    2007-01-01

    Web authentication is often treated as a one-size-fits-all problem with ubiquitous use of the password. Indeed, authentication is seldom tailored to the needs of either the site or the target users. This paper does an in-depth analysis of all the vulnerabilities of authentication mechanisms, and proposes a structured and simple process which, if followed, will enable developers to choose a web authentication mechanism so that it matches the needs of their particular site

  10. Screen Fingerprints as a Novel Modality for Active Authentication

    Science.gov (United States)

    2014-03-01

    Screen fingerprint is the new cyber biometric modality that we have proposed to measure and analyze active authentication. The screen finger ...as a new biometric modality for active authentication. Such a fingerprint is acquired by taking a screen recording of the computer being used and...extracting discriminative visual feature from the recording. 15. SUBJECT TERMS Active authentication, screen fingerprints, biometrics 16. SECURITY

  11. Authentication systems for securing clinical documentation workflows. A systematic literature review.

    Science.gov (United States)

    Schwartze, J; Haarbrandt, B; Fortmeier, D; Haux, R; Seidel, C

    2014-01-01

    Integration of electronic signatures embedded in health care processes in Germany challenges health care service and supply facilities. The suitability of the signature level of an eligible authentication procedure is confirmed for a large part of documents in clinical practice. However, the concrete design of such a procedure remains unclear. To create a summary of usable user authentication systems suitable for clinical workflows. A Systematic literature review based on nine online bibliographic databases. Search keywords included authentication, access control, information systems, information security and biometrics with terms user authentication, user identification and login in title or abstract. Searches were run between 7 and 12 September 2011. Relevant conference proceedings were searched manually in February 2013. Backward reference search of selected results was done. Only publications fully describing authentication systems used or usable were included. Algorithms or purely theoretical concepts were excluded. Three authors did selection independently. DATA EXTRACTION AND ASSESSMENT: Semi-structured extraction of system characteristics was done by the main author. Identified procedures were assessed for security and fulfillment of relevant laws and guidelines as well as for applicability. Suitability for clinical workflows was derived from the assessments using a weighted sum proposed by Bonneau. Of 7575 citations retrieved, 55 publications meet our inclusion criteria. They describe 48 different authentication systems; 39 were biometric and nine graphical password systems. Assessment of authentication systems showed high error rates above European CENELEC standards and a lack of applicability of biometric systems. Graphical passwords did not add overall value compared to conventional passwords. Continuous authentication can add an additional layer of safety. Only few systems are suitable partially or entirely for use in clinical processes. Suitability

  12. Authentication Binding between SSL/TLS and HTTP

    Science.gov (United States)

    Saito, Takamichi; Sekiguchi, Kiyomi; Hatsugai, Ryosuke

    While the Secure Socket Layer or Transport Layer Security (SSL/TLS) is assumed to provide secure communications over the Internet, many web applications utilize basic or digest authentication of Hyper Text Transport Protocol (HTTP) over SSL/TLS. Namely, in the scheme, there are two different authentication schemes in a session. Since they are separated by a layer, these are not convenient for a web application. Moreover, the scheme may also cause problems in establishing secure communication. Then we provide a scheme of authentication binding between SSL/TLS and HTTP without modifying SSL/TLS protocols and its implementation, and we show the effectiveness of our proposed scheme.

  13. UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts

    Directory of Open Access Journals (Sweden)

    Yazhe Wang

    2015-10-01

    Full Text Available In this paper we present UAuth, a two-layer authentication framework that provides more security assurances than two-factor authentication while offering a simpler authentication experience. When authenticating, users first verified their static credentials (such as password, fingerprint, etc. on their devices to achieve the local-layer authentication, then submit the OTP-signed response generated by their device to the server to complete the server-layer authentication. We also propose the three-level account association mechanism, which establishes the association among devices, users and services, and then creates a mapping from user’s devices to user’s accounts. Users can gain access to different service via any device in the association easily. Our goal is to provide a quick and convenient SSO-like login process on the basis of security authentication. To meet the goal, we implement our UAuth, and evaluate our designs.

  14. Defining the questions: a research agenda for nontraditional authentication in arms control

    Energy Technology Data Exchange (ETDEWEB)

    Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  15. 21 CFR 1311.115 - Additional requirements for two-factor authentication.

    Science.gov (United States)

    2010-04-01

    ... authentication. 1311.115 Section 1311.115 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE... Additional requirements for two-factor authentication. (a) To sign a controlled substance prescription, the... authentication protocol that uses two of the following three factors: (1) Something only the practitioner knows...

  16. 36 CFR 1275.66 - Reproduction and authentication of other materials.

    Science.gov (United States)

    2010-07-01

    ... authentication of other materials. 1275.66 Section 1275.66 Parks, Forests, and Public Property NATIONAL ARCHIVES... Reproduction and authentication of other materials. (a) Copying of materials, including tape recordings... materials when necessary for the purpose of the research. (c) The fees for reproduction and authentication...

  17. Authentic leadership: a new theory for nursing or back to basics?

    Science.gov (United States)

    Wong, Carol; Cummings, Greta

    2009-01-01

    Authentic leadership is an emerging theoretical model purported to focus on the root component of effective leadership. The purpose of this paper is to describe the relevance of authentic leadership to the advancement of nursing leadership practice and research and address the question of whether this is a new theory for leadership or an old one in new packaging. The paper outlines the origins and key elements of the model, assesses the theoretical, conceptual and measurement issues associated with authentic leadership and compares it with other leadership theories frequently reported in the nursing literature. The emerging authentic leadership theory holds promise for explaining the underlying processes by which authentic leaders and followers influence work outcomes and organizational performance. Construct validity of authentic leadership has preliminary documentation and a few studies have shown positive relationships between authenticity and trust. Furthermore, the clarity of the authenticity construct and comprehensiveness of the overall theoretical framework provide a fruitful base for future research examining the relationship between authentic leadership and the creation of healthier work environments. A clear focus on the relational aspects of leadership, the foundational moral/ethical component, a potential linkage of positive psychological capital to work engagement and the emphasis on leader and follower development in the authentic leadership framework are closely aligned to current and future nursing leadership practice and research priorities for the creation of sustainable changes in nursing work environments.

  18. Authenticity in the Teaching of ESP: An Evaluation Proposal

    Directory of Open Access Journals (Sweden)

    María Luisa Pérez Cañado

    2015-10-01

    Full Text Available Although authentic materials are a very rich source for the selection of teaching materials in the field of ESP (English for Specific Purposes in general and of Business English in particular, the ultimate purpose should be authentic communication between the text (oral or written and its recipient as a result of the interpretation brought to the text by the latter. To speak of authenticity implies therefore a dual focus: that of “authentic material” and that of “authenticity”. The literature in the field is vast and deserves an in-depth analysis, as in many cases the previous terms are treated as synonyms. Thus, an original proposal for the evaluation of authenticity is called for, an aspect rarely considered in the evaluation of teaching materials. This proposal will build upon a review of the literature on authenticity, as well as on the most important proposals for the evaluation of teaching materials. The proposal set forth in this paper is completed with a checklist which integrates the consideration of the inherent characteristics in the material being evaluated, together with the teacher’s view on this score.

  19. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  20. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  1. Laboratory Directed Research and Development FY 2000 Annual Progress Report

    Energy Technology Data Exchange (ETDEWEB)

    Los Alamos National Laboratory

    2001-05-01

    This is the FY00 Annual Progress report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes progress on each project conducted during FY00, characterizes the projects according to their relevance to major funding sources, and provides an index to principal investigators. Project summaries are grouped by LDRD component: Directed Research and Exploratory Research. Within each component, they are further grouped into the ten technical categories: (1) atomic, molecular, optical, and plasma physics, fluids, and beams, (2) bioscience, (3) chemistry, (4) computer science and software engineering, (5) engineering science, (6) geoscience, space science, and astrophysics, (7) instrumentation and diagnostics, (8) materials science, (9) mathematics, simulation, and modeling, and (10) nuclear and particle physics.

  2. Authentic Assessment of Special Learners: Problem or Promise?

    Science.gov (United States)

    Choate, Joyce S.; Evans, Susan S.

    1992-01-01

    This article outlines differences between traditional assessment and authentic assessment procedures, discusses problems with each type of assessment in relation to special learners, and offers certain cautions that must be observed when implementing authentic assessment. (JDD)

  3. An Authentication Gateway for Integrated Grid and Cloud Access

    International Nuclear Information System (INIS)

    Ciaschini, V; Salomoni, D

    2011-01-01

    The WNoDeS architecture, providing distributed, integrated access to both Cloud and Grid resources through virtualization technologies, makes use of an Authentication Gateway to support diverse authentication mechanisms. Three main use cases are foreseen, covering access via X.509 digital certificates, federated services like Shibboleth or Kerberos, and credit-based access. In this paper, we describe the structure of the WNoDeS authentication gateway.

  4. Authenticity in the Perspective of Sport Tourism: Some Selected Examples

    Directory of Open Access Journals (Sweden)

    Hurych Emanuel

    2017-03-01

    Full Text Available Authenticity is usually understood as something similar to truth, or as a kind of ability of one “to be oneself”. However, for the philosophical approach, authenticity presents a more complex and complicated term. This conception has been followed in existentialism and fundamental ontology, where it has been examined and analyzed in depth (especially by Martin Heidegger. This paper deals with the search for some potentiality of the authentic modus of being through the practice of some forms of sport tourism. We selected and described four model types of sport tourism activities. Then, we designed and selected some factors of authenticity. The evaluation of authenticity within the selected activities according to the factors was applied in a two-round process of evaluation. The results of the process are explained and discussed. In conclusion, authenticity is presented as a concept that is not strongly influenced by outer settings, but is rather strongly connected with personal attunement and individual (or group perception of the outer world.

  5. Physics of intense, high energy radiation effects

    International Nuclear Information System (INIS)

    Hjalmarson, Harold Paul; Hartman, E. Frederick; Magyar, Rudolph J.; Crozier, Paul Stewart

    2011-01-01

    This document summarizes the work done in our three-year LDRD project titled 'Physics of Intense, High Energy Radiation Effects.' This LDRD is focused on electrical effects of ionizing radiation at high dose-rates. One major thrust throughout the project has been the radiation-induced conductivity (RIC) produced by the ionizing radiation. Another important consideration has been the electrical effect of dose-enhanced radiation. This transient effect can produce an electromagnetic pulse (EMP). The unifying theme of the project has been the dielectric function. This quantity contains much of the physics covered in this project. For example, the work on transient electrical effects in radiation-induced conductivity (RIC) has been a key focus for the work on the EMP effects. This physics in contained in the dielectric function, which can also be expressed as a conductivity. The transient defects created during a radiation event are also contained, in principle. The energy loss lead the hot electrons and holes is given by the stopping power of ionizing radiation. This information is given by the inverse dielectric function. Finally, the short time atomistic phenomena caused by ionizing radiation can also be considered to be contained within the dielectric function. During the LDRD, meetings about the work were held every week. These discussions involved theorists, experimentalists and engineers. These discussions branched out into the work done in other projects. For example, the work on EMP effects had influence on another project focused on such phenomena in gases. Furthermore, the physics of radiation detectors and radiation dosimeters was often discussed, and these discussions had impact on related projects. Some LDRD-related documents are now stored on a sharepoint site (https://sharepoint.sandia.gov/sites/LDRD-REMS/default.aspx). In the remainder of this document the work is described in catergories but there is much overlap between the atomistic calculations, the

  6. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  7. 22 CFR 52.2 - Authentication of marriage and divorce documents.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication of marriage and divorce....2 Authentication of marriage and divorce documents. (a) Whenver a consular officer is requested to... marriage, he shall include in the body of his certificate of authentication the qualifying statement, “For...

  8. School Principals' Authentic Leadership and Teachers' Psychological Capital: Teachers' Perspectives

    Science.gov (United States)

    Feng, Feng-I

    2016-01-01

    This study examined teachers' perceptions of principals' authentic leadership and the relationship of authentic leadership to teachers' psychological capital in Taiwan. A total of 1,429 elementary and secondary school teachers were surveyed. The results showed that teachers perceived their principals' authentic leadership as moderate and that the…

  9. Do We Need to Design Course-Based Undergraduate Research Experiences for Authenticity?

    Science.gov (United States)

    Rowland, Susan; Pedwell, Rhianna; Lawrie, Gwen; Lovie-Toon, Joseph; Hung, Yu

    2016-01-01

    The recent push for more authentic teaching and learning in science, technology, engineering, and mathematics indicates a shared agreement that undergraduates require greater exposure to professional practices. There is considerable variation, however, in how "authentic" science education is defined. In this paper we present our definition of authenticity as it applies to an "authentic" large-scale undergraduate research experience (ALURE); we also look to the literature and the student voice for alternate perceptions around this concept. A metareview of science education literature confirmed the inconsistency in definitions and application of the notion of authentic science education. An exploration of how authenticity was explained in 604 reflections from ALURE and traditional laboratory students revealed contrasting and surprising notions and experiences of authenticity. We consider the student experience in terms of alignment with 1) the intent of our designed curriculum and 2) the literature definitions of authentic science education. These findings contribute to the conversation surrounding authenticity in science education. They suggest two things: 1) educational experiences can have significant authenticity for the participants, even when there is no purposeful design for authentic practice, and 2) the continuing discussion of and design for authenticity in UREs may be redundant. © 2016 S. Rowland et al. CBE—Life Sciences Education © 2016 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  10. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    Science.gov (United States)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  11. Structured Intuition: A Methodology to Analyse Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed

    and the level of abstraction used in the analysis. Thus, the goal of developing a high level methodology that can be used with different notions of security, authentication, and abstraction is worth considering. In this thesis, we propose a new methodology, called the structured intuition (SI), which addresses...... in our methodology, which is called canonicity, which is a weaker form of message authenticity. As compared to many contemporary analysis techniques, an SI based analysis provides detailed results regarding the design rationales and entity authentication goals of a protocol....... consequences for the security of the system, e.g., private information of legitimate parties may be leaked or the security policy of a trusted system may be violated. At a corporate level, such a failure of authentication may result in loss of proprietary technology or customers' credit card information...

  12. Laboratory Directed Research and Development Annual Report FY 2017

    Energy Technology Data Exchange (ETDEWEB)

    Sullivan, Kelly O.

    2018-03-30

    A national laboratory must establish and maintain an environment in which creativity and innovation are encouraged and supported in order to fulfill its missions and remain viable in the long term. As such, multiprogram laboratories are given discretion to allocate a percentage of their operating budgets to support research and development projects that align to PNNL’s and DOE’s missions and support the missions of other federal agencies, including DHS, DOD, and others. DOE Order 413.2C sets forth DOE’s Laboratory Directed Research and Development (LDRD) policy and guidelines for DOE multiprogram laboratories, and it authorizes the national laboratories to allocate up to 6 percent of their operating budgets to fund the program. LDRD is innovative research and development, selected by the Laboratory Director or his/her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory. The projects supported by LDRD funding all have demonstrable ties to DOE/DHS missions and may also be relevant to the missions of other federal agencies that sponsor work at the Laboratory. The program plays a key role in attracting the best and brightest scientific staff, which is needed to serve the highest priority DOE mission objectives. Individual project reports comprise the bulk of this LDRD report. The Laboratory focuses its LDRD research on scientific assets that often address more than one scientific discipline.

  13. Laboratory Directed Research and Development Annual Report FY 2016

    Energy Technology Data Exchange (ETDEWEB)

    Sullivan, Kelly O. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-03-30

    A national laboratory must establish and maintain an environment in which creativity and innovation are encouraged and supported in order to fulfill its missions and remain viable in the long term. As such, multiprogram laboratories are given discretion to allocate a percentage of their operating budgets to support research and development projects that align to PNNL’s and DOE’s missions and support the missions of other federal agencies, including DHS, DOD, and others. DOE Order 413.2C sets forth DOE’s Laboratory Directed Research and Development (LDRD) policy and guidelines for DOE multiprogram laboratories, and it authorizes the national laboratories to allocate up to 6 percent of their operating budgets to fund the program. LDRD is innovative research and development, selected by the Laboratory Director or his/her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory. The projects supported by LDRD funding all have demonstrable ties to DOE/DHS missions and may also be relevant to the missions of other federal agencies that sponsor work at the Laboratory. The program plays a key role in attracting the best and brightest scientific staff, which is needed to serve the highest priority DOE mission objectives. Individual project reports comprise the bulk of this LDRD report. The Laboratory focuses its LDRD research on scientific assets that often address more than one scientific discipline.

  14. A robust cloud access scheme with mutual authentication

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2016-01-01

    Full Text Available Due to the progress of network technology, we can access some information through remote servers, and we also can save and access lots of personal data in remote servers. Therefore, to protect these data and resist unauthorized access is an important issue. Some researchers proposed authentication scheme, but there still exist some security weaknesses. This article is based on the concept of HDFS (Hadoop Distributed File System, and offers a robust authentication scheme. The proposed scheme achieves mutual authentication, prevents re-play attack, solves asynchronous issue, and prevents offline password guessing attack.

  15. Authenticated Encryption for Low-Power Reconfigurable Wireless Devices

    DEFF Research Database (Denmark)

    Khajuria, Samant; Andersen, Birger

    2013-01-01

    this enabling technology, these radios have to propose cryptographic services such as con- fidentiality, integrity and authentication. Therefore, integration of security services to these low-power devices is very challenging and crucial as they have limited resources and computational capabilities....... In this paper, we present a crypto solution for reconfigurable devices. The solution is a single pass Authenticated Encryption (AE) scheme that is designed for protecting both message confidentiality and its authenticity. This makes AE very attractive for low-cost low-power hardware implementation. For test...

  16. Controlled mutual quantum entity authentication using entanglement swapping

    International Nuclear Information System (INIS)

    Kang, Min-Sung; Hong, Chang-Ho; Heo, Jino; Lim, Jong-In; Yang, Hyung-Jin

    2015-01-01

    In this paper, we suggest a controlled mutual quantum entity authentication protocol by which two users mutually certify each other on a quantum network using a sequence of Greenberger–Horne–Zeilinger (GHZ)-like states. Unlike existing unidirectional quantum entity authentication, our protocol enables mutual quantum entity authentication utilizing entanglement swapping; moreover, it allows the managing trusted center (TC) or trusted third party (TTP) to effectively control the certification of two users using the nature of the GHZ-like state. We will also analyze the security of the protocol and quantum channel. (paper)

  17. Secure authentication system that generates seed from biometric information.

    Science.gov (United States)

    Kim, Yeojin; Ahn, Jung-Ho; Byun, Hyeran

    2005-02-10

    As biometric recognition techniques are gradually improved, the stability of biometric authentication systems are enhanced. Although bioinformation has properties that make it resistant to fraud, biometric authentication systems are not immune to hacking. We show a secure biometric authentication system (1) to guarantee the integrity of biometric information by mixing data by use of a biometric key and (2) to raise recognition rates by use of bimodal biometrics.

  18. Beneficiary contact moderates relationship between authentic leadership and engagement

    Directory of Open Access Journals (Sweden)

    Caren B. Scheepers

    2016-07-01

    Full Text Available Orientation: Beneficiary contact moderates the relationship between authentic leadership and work engagement. Research purpose: The objective of this study was to examine the moderating effect of the breadth, depth and frequency of employee interaction with the beneficiaries of their work on the positive impact of authentic leadership on work engagement. Motivation for the study: Investigating the boundary conditions of the relationship between leaders and followers is vital to enhance the positive effect of leadership. Authentic leadership has not previously been examined with respect to beneficiary contact as a specific situational factor. The researchers therefore set out to ascertain whether beneficiary contact has a strengthening or weakening effect on the impact of authentic leadership on work engagement. Research design, approach and method: The researchers administered the Authentic Leadership Questionnaire (ALQ, the Utrecht Work Engagement Scale (UWES-9 and Grant’s scale on Beneficiary Contact. Main findings: The findings showed that beneficiary contact had a weakening effect on the positive relationship between authentic leadership and work engagement. Practical/managerial implications: Ideally, organisations create environments conducive to work engagement in which leadership plays an important role. This study found that one factor in the work environment, namely beneficiary contact, might have an adverse effect on the positive relationship that authentic leadership has on work engagement. Leaders should therefore take organisational contextual realities into account, such as regular, intense interaction of employees with the beneficiaries of their work. This situation could create strain for individual employees, requiring additional organisational support. Contribution/value-add: Organisations need to recognise the impact of beneficiary contact on the relationship between authentic leadership and work engagement. The researchers

  19. Laboratory Directed Research and Development Annual Report - Fiscal Year 2000

    Energy Technology Data Exchange (ETDEWEB)

    Fisher, Darrell R.; Hughes, Pamela J.; Pearson, Erik W.

    2001-04-01

    The projects described in this report represent the Laboratory's investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. In accordance with DOE guidelines, the report provides, a) a director's statement, b) an overview of the laboratory's LDRD program, including PNNL's management process and a self-assessment of the program, c) a five-year project funding table, and d) project summaries for each LDRD project.

  20. Laboratory directed research and development FY98 annual report; TOPICAL

    International Nuclear Information System (INIS)

    Al-Ayat, R; Holzrichter, J

    1999-01-01

    In 1984, Congress and the Department of Energy (DOE) established the Laboratory Directed Research and Development (LDRD) Program to enable the director of a national laboratory to foster and expedite innovative research and development (R and D) in mission areas. The Lawrence Livermore National Laboratory (LLNL) continually examines these mission areas through strategic planning and shapes the LDRD Program to meet its long-term vision. The goal of the LDRD Program is to spur development of new scientific and technical capabilities that enable LLNL to respond to the challenges within its evolving mission areas. In addition, the LDRD Program provides LLNL with the flexibility to nurture and enrich essential scientific and technical competencies and enables the Laboratory to attract the most qualified scientists and engineers. The FY98 LDRD portfolio described in this annual report has been carefully structured to continue the tradition of vigorously supporting DOE and LLNL strategic vision and evolving mission areas. The projects selected for LDRD funding undergo stringent review and selection processes, which emphasize strategic relevance and require technical peer reviews of proposals by external and internal experts. These FY98 projects emphasize the Laboratory's national security needs: stewardship of the U.S. nuclear weapons stockpile, responsibility for the counter- and nonproliferation of weapons of mass destruction, development of high-performance computing, and support of DOE environmental research and waste management programs

  1. Massive Machine-Type Communication (mMTC) Access with Integrated Authentication

    DEFF Research Database (Denmark)

    Pratas, Nuno; Pattathil, Sarath; Stefanovic, Cedomir

    2017-01-01

    We present a connection establishment protocol with integrated authentication, suited for Massive Machine-Type Communications (mMTC). The protocol is contention-based and its main feature is that a device contends with a unique signature that also enables the authentication of the device towards...... the network. The signatures are inspired by Bloom filters and are created based on the output of the MILENAGE authentication and encryption algorithm set, which is used in the authentication and security procedures in the LTE protocol family.We show that our method utilizes the system resources more...

  2. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    Science.gov (United States)

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  3. Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things.

    Science.gov (United States)

    Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido

    2016-01-07

    This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie-Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes.

  4. Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Francisco Martín-Fernández

    2016-01-01

    Full Text Available This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie–Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes.

  5. Sustainable Development Mechanism of Food Culture’s Translocal Production Based on Authenticity

    Directory of Open Access Journals (Sweden)

    Guojun Zeng

    2014-10-01

    Full Text Available Food culture is a kind of non-material culture with authenticity. To achieve sustainable development of translocal heritage and food culture, we must protect its authenticity. By selecting the cases of the Dongbeiren Flavor Dumpling Restaurant and the Daozanjia Northeast Dumpling Restaurant and using the in-depth interview method, this study discusses how northeastern Cuisine in Guangzhou balances the inheritance and innovation of authenticity, how producers and customers negotiate, and how to realize sustainable development. The main conclusions are: first, there are two different paths of translocal food culture production, which are “authentic food culture production” and “differentiated food culture production”. Second, what translocal enterprises produce is not objective authenticity, but constructive authenticity, or even existential authenticity. Third, compared with differentiated food culture production, authentic food culture production is helpful for the sustainable development of local food culture production. It protects the locality while transmitting and developing the local culture. Fourth, translocal food culture production is a process in which the producers and consumers continue to interact to maintain a state of equilibrium, which informs the sustainable development mechanism with a high degree of authenticity.

  6. Authentication of monitoring systems for non-proliferation and arms control

    International Nuclear Information System (INIS)

    Fuller, J.L.; Kouzes, R.T.

    2001-01-01

    Full text: Radiation measurement and systems are central to the affirmation of compliance with nuclear material control agreements associated with a variety of arms control and non-proliferation regimes. A number of radiation measurement systems are under development for this purpose, and the correct functioning of these systems will be authenticated. Authentication is the process by which a monitoring party to an agreement is assured that measurement systems are assembled as designed, function as designed, and do not contain hidden features that allow the passing of material inconsistent with an accepted declaration. Attribute measurement systems are specific examples of radiation measurement systems that are being developed in the United States and the Russian Federation. Under one bilateral agreement, the U.S. Department of Defense, Defense Threat Reduction Agency, Cooperative Threat Reduction (DoD DTRA/CTR) Program is constructing a Fissile Material Storage Facility (FMSF) at Mayak to hold up to 50 tons of plutonium from the disassembly of Russian Federation nuclear weapons. Negotiations are being held between the U.S. and the Russian Federation for cooperative development of attribute measurement systems to provide confidence that the material is of weapons origin and other purposes. Pacific Northwest National Laboratory is leading the authentication effort for U.S. interests at FMSF. There are two basic requirements for an attribute measurement system: protection of classified information, and assurance of credible performance of the system for the measurement. The technology used to protect classified information is referred to as an information barrier. An information barrier consists of technology and procedures that prevent the release of host-country classified information to a monitoring party during a joint inspection of a sensitive item. Information barriers are used on monitoring systems that are exposed to host-party classified materials

  7. Identification and Authentication Policy

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1999-01-01

    .... We will accomplish the audit objective in two phases. In this phase, we reviewed current DoD Component policies on the use of identification and authentication controls to access information systems...

  8. 46 CFR 201.42 - Subscription, authentication of documents.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Subscription, authentication of documents. 201.42 Section 201.42 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION POLICY, PRACTICE AND... Subscription, authentication of documents. (a) Documents filed shall be subscribed: (1) By the person or...

  9. Authentic Leadership: Practices to Promote Integrity.

    Science.gov (United States)

    Hughes, Vickie

    Integrity is a highly desired leadership trait. Authentic leaders reflect on their behavior and seek feedback about how their actions affect others. How can a nurse develop as an authentic leader who consistently demonstrates integrity? The following are discussed: Reflection; Connection to Christ and others; Social and Emotional Intelligence providing perceptive competency and social awareness; Aesthetic Qualities whereby leaders apply experiential knowing in leadership situations; and effective expression of Gratitude as a meaningful act of valuing others.

  10. Combined machine-readable and visually authenticated optical devices

    Science.gov (United States)

    Souparis, Hugues

    1996-03-01

    Optical variable devices are now widely used on documents or values. The most recent optical visual features with high definition, animation, brightness, special color tune, provide excellent first and second levels of authentication. Human eye is the only instrument required to check the authenticity. This is a major advantage of OVDs in many circumstances, such as currency exchange, ID street control . . . But, under other circumstances, such as automatic payments with banknotes, volume ID controls at boarders, ID controls in shops . . . an automatic authentication will be necessary or more reliable. When both a visual and automated authentication are required, the combination, on the same security component, of a variable image and a machine readable optical element is a very secure and cost effective solution for the protection of documents. Several techniques are now available an can be selected depending upon the respective roles of the machine readability and visual control.

  11. Authentication Approaches for Standoff Video Surveillance

    International Nuclear Information System (INIS)

    Baldwin, G.; Sweatt, W.; Thomas, M.

    2015-01-01

    Video surveillance for international nuclear safeguards applications requires authentication, which confirms to an inspector reviewing the surveillance images that both the source and the integrity of those images can be trusted. To date, all such authentication approaches originate at the camera. Camera authentication would not suffice for a ''standoff video'' application, where the surveillance camera views an image piped to it from a distant objective lens. Standoff video might be desired in situations where it does not make sense to expose sensitive and costly camera electronics to contamination, radiation, water immersion, or other adverse environments typical of hot cells, reprocessing facilities, and within spent fuel pools, for example. In this paper, we offer optical architectures that introduce a standoff distance of several metres between the scene and camera. Several schemes enable one to authenticate not only that the extended optical path is secure, but also that the scene is being viewed live. They employ optical components with remotely-operated spectral, temporal, directional, and intensity properties that are under the control of the inspector. If permitted by the facility operator, illuminators, reflectors and polarizers placed in the scene offer further possibilities. Any tampering that would insert an alternative image source for the camera, although undetectable with conventional cryptographic authentication of digital camera data, is easily exposed using the approaches we describe. Sandia National Laboratories is a multi-programme laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. Support to Sandia National Laboratories provided by the NNSA Next Generation Safeguards Initiative is gratefully acknowledged. SAND2014-3196 A. (author)

  12. Authentic leadership and its effect on employees' organizational citizenship behaviours.

    Science.gov (United States)

    Edú Valsania, Sergio; Moriano León, Juan A; Molero Alonso, Fernando; Topa Cantisano, Gabriela

    2012-11-01

    The studies that have verified the positive association of authentic leadership with organizational citizenship behaviours (OCBs), have used global measures of both constructs. Therefore, the goal of this work is to analyze the effect of authentic leadership on employees' OCBs, specifically focusing on the relations of the four components of authentic leadership with the individual and organizational dimensions of the OCBs. The participants of this study were 220 Spanish employees (30.9% men and 69.1% women) who completed a questionnaire that included the variables of interest in this study: Authentic Leadership, OCB and Sociobiographical control variables. The results, obtained with stepwise multiple regression analysis, show that two components of authentic leadership-moral perspective and relational transparency-present significant relationships with OCB. Moreover, authentic leadership is a better predictor of employees' OCB when these behaviors are impersonal and directed towards the organization than when they are directed towards other people. These results have practical implications for human resources management in organizations, especially in selection processes and when training top executives.

  13. Servant leadership behaviors of aerospace and defense project managers and their relation to project success

    Science.gov (United States)

    Dominik, Michael T.

    The success of a project is dependent in part on the skills, knowledge, and behavior of its leader, the project manager. Despite advances in project manager certifications and professional development, the aerospace and defense industry has continued to see highly visible and expensive project failures partially attributable to failures in leadership. Servant leadership is an emerging leadership theory whose practitioners embrace empowerment, authenticity, humility, accountability, forgiveness, courage, standing back, and stewardship, but has not yet been fully examined in the context of the project manager as leader. The objective of this study was to examine the relationship between servant leadership behaviors demonstrated by aerospace and defense project managers and the resulting success of their projects. Study participants were drawn from aerospace and defense oriented affinity groups from the LinkedInRTM social media web system. The participants rated their project managers using a 30-item servant leadership scale, and rated the success of their project using a 12-item project success scale. One hundred and fifteen valid responses were analyzed from 231 collected samples from persons who had worked for a project manager on an aerospace and defense project within the past year. The results of the study demonstrated statistically significant levels of positive correlation to project success for all eight servant leadership factors independently evaluated. Using multiple linear regression methods, the servant leadership factors of empowerment and authenticity were determined to be substantial and statistically significant predictors of project success. The study results established the potential application of servant leadership as a valid approach for improving outcomes of projects.

  14. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    Science.gov (United States)

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  15. Robust authentication through stochastic femtosecond laser filament induced scattering surfaces

    International Nuclear Information System (INIS)

    Zhang, Haisu; Tzortzakis, Stelios

    2016-01-01

    We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.

  16. Robust authentication through stochastic femtosecond laser filament induced scattering surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Haisu [Institute of Electronic Structure and Laser, Foundation for Research and Technology Hellas, Heraklion 71110 (Greece); Tzortzakis, Stelios, E-mail: stzortz@iesl.forth.gr [Institute of Electronic Structure and Laser, Foundation for Research and Technology Hellas, Heraklion 71110 (Greece); Materials Science and Technology Department, University of Crete, 71003 Heraklion (Greece); Science Program, Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar)

    2016-05-23

    We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.

  17. The Impact of Authentic Materials and Tasks on Students’ Communicative Competence at a Colombian Language School

    Directory of Open Access Journals (Sweden)

    César Augusto Castillo Losada

    2017-01-01

    Full Text Available This article reports on a study carried out in a foreign language school at a Colombian public university. Its main purpose was to analyze the extent to which the use of authentic materials and tasks contributes to the enhancement of the communicative competence on an A2 level English course. A mixed study composed of a quasi-experimental and a descriptive-qualitative research design was implemented by means of a pre-test, a post-test, observations, semi-structured interviews, surveys, and diaries. The findings showed that the use of authentic materials and tasks, within the framework of a pedagogical project, had an impact on students’ communicative competence progress and on the teaching practices of the experimental group teacher.

  18. Capturing Cognitive Processing Time for Active Authentication

    Science.gov (United States)

    2014-02-01

    the password with password -based access control to generate a hardened password [4]. Here, we present a biometric -based active authentication...typing rhythm (CTR), Support Vector Machine (SVM), Behavioral Biometrics 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF... biometrics , extracted from keystroke dynamics, as “something a user is” for active authentication. This scheme performs continual verification in the

  19. UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks

    Directory of Open Access Journals (Sweden)

    Jin Cao

    2018-01-01

    Full Text Available Machine Type Communication (MTC, as one of the most important wireless communication technologies in the future wireless communication, has become the new business growth point of mobile communication network. It is a key point to achieve seamless handovers within Evolved-Universal Terrestrial Radio Access Network (E-UTRAN for massive MTC (mMTC devices in order to support mobility in the Long Term Evolution-Advanced (LTE-A networks. When mMTC devices simultaneously roam from a base station to a new base station, the current handover mechanisms suggested by the Third-Generation Partnership Project (3GPP require several handover signaling interactions, which could cause the signaling load over the access network and the core network. Besides, several distinct handover procedures are proposed for different mobility scenarios, which will increase the system complexity. In this paper, we propose a simple and secure uniform group-based handover authentication scheme for mMTC devices based on the multisignature and aggregate message authentication code (AMAC techniques, which is to fit in with all of the mobility scenarios in the LTE-A networks. Compared with the current 3GPP standards, our scheme can achieve a simple authentication process with robust security protection including privacy preservation and thus avoid signaling congestion. The correctness of the proposed group handover authentication protocol is formally proved in the Canetti-Krawczyk (CK model and verified based on the AVISPA and SPAN.

  20. Towards an ethics of authentic practice.

    Science.gov (United States)

    Murray, Stuart J; Holmes, Dave; Perron, Amélie; Rail, Geneviève

    2008-10-01

    This essay asks how we might best elaborate an ethics of authentic practice. Will we be able to agree on a set of shared terms through which ethical practice will be understood? How will we define ethics and the subject's relation to authoritative structures of power and knowledge? We begin by further clarifying our critique of evidence-based medicine (EBM), reflecting on the intimate relation between theory and practice. We challenge the charge that our position amounts to no more than 'subjectivism' and 'antiauthoritarian' theory. We argue that an ethical practice ought to question the authority of EBM without falling into the trap of dogmatic antiauthoritarianism. In this, we take up the work of Hannah Arendt, who offers terms to help understand our difficult political relation to authority in an authentic ethical practice. We continue with a discussion of Michel Foucault's use of 'free speech' or parrhesia, which he adopts from Ancient Greek philosophy. Foucault demonstrates that authentic ethical practice demands that we 'speak truth to power.' We conclude with a consideration of recent biotechnologies, and suggest that these biomedical practices force us to re-evaluate our theoretical understanding of the ethical subject. We believe that we are at a crucial juncture: we must develop an ethics of authentic practice that will be commensurable with new and emergent biomedical subjectivities.

  1. CLAS: A Novel Communications Latency Based Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Zuochao Dou

    2017-01-01

    Full Text Available We design and implement a novel communications latency based authentication scheme, dubbed CLAS, that strengthens the security of state-of-the-art web authentication approaches by leveraging the round trip network communications latency (RTL between clients and authenticators. In addition to the traditional credentials, CLAS profiles RTL values of clients and uses them to defend against password compromise. The key challenges are (i to prevent RTL manipulation, (ii to alleviate network instabilities, and (iii to address mobile clients. CLAS addresses the first challenge by introducing a novel network architecture, which makes it extremely difficult for attackers to simulate legitimate RTL values. The second challenge is addressed by outlier removal and multiple temporal profiling, while the last challenge is addressed by augmenting CLAS with out-of-band-channels or other authentication schemes. CLAS restricts login to profiled locations while demanding additional information for nonprofiled ones, which highly reduces the attack surface even when the legitimate credentials are compromised. Additionally, unlike many state-of-the-art authentication mechanisms, CLAS is resilient to phishing, pharming, man-in-the-middle, and social engineering attacks. Furthermore, CLAS is transparent to users and incurs negligible overhead. The experimental results show that CLAS can achieve very low false positive and false negative rates.

  2. AUTHENTICITY, IDENTITY AND SUSTAINABILITY IN POST-WAR IRAQ: Reshaping the Urban Form of Erbil City

    Directory of Open Access Journals (Sweden)

    Rebwar Ibrahim

    2014-12-01

    Full Text Available Issues of authenticity and identity are particularly significant in cities where social and cultural change is shaping active transformation of its urban fabric and structure in the post-war condition. In search of sustainable future, Iraqi cities are stretched between the two ends of the spectrum, authentic quarters with its traditional fabric and modern districts with their global sense of living. This paper interrogates the reciprocal influences and distinct qualities and sustainable performance of both authentic and modern quarters of Erbil, the capital of the Iraqi province of Kurdistan, as factors in shaping sustainable urban forms for Iraqi cities. In doing so, the paper, firstly, seeks to highlight the urban identity as an effective factor in relation to sustainable urban form. Secondly, the city of Erbil in Iraq has been chosen as a field study, due to its regional, social, political and historical role in the region. Thirdly, the study emphasises the dynamic activities and performance of residential projects according to rational sustainable criteria. The research concludes that urban identity and the sense of place in traditional and historical places should inform design strategies in order to achieve a more sustainable urban context.

  3. Idaho National Laboratory Directed Research and Development FY-2009

    Energy Technology Data Exchange (ETDEWEB)

    2010-03-01

    appropriately handled. The LDRD Program is assessed annually for both output and process efficiency to ensure the investment is providing expected returns on technical capability enhancement. The call for proposals and project selection process for the INL LDRD program begins typically in April, with preliminary budget allocations, and submittal of the technical requests for preproposals. A call for preproposals is made at this time as well, and the preparation of full proposals follows in June and closes in July. The technical and management review follows this, and the portfolio is submitted for DOE-ID concurrence in early September. Project initiation is in early October. The technical review process is independent of, and in addition to the management review. These review processes are very stringent and comprehensive, ensuring technical viability and suitable technical risk are encompassed within each project that is selected for funding. Each proposal is reviewed by two or three anonymous technical peers, and the reviews are consolidated into a cohesive commentary of the overall research based on criteria published in the call for proposals. A grade is assigned to the technical review and the review comments and grade are released back to the principal investigators and the managers interested in funding the proposals. Management criteria are published in the call for proposals, and management comments and selection results are available for principal investigator and other interested management as appropriate. The DOE Idaho Operations Office performs a final review and concurs on each project prior to project authorization, and on major scope/budget changes should they occur during the project's implementation. This report begins with several research highlights that exemplify the diversity of scientific and engineering research performed at the INL in FY 2009. Progress summaries for all projects are organized into sections reflecting the major areas of research

  4. Learning in Authentic Earth and Planetary Contexts

    Science.gov (United States)

    Fergusson, J. A.; Oliver, C. A.

    2006-12-01

    A Virtual Field Trip project has been developed in collaboration with NASA Learning Technologies to allow students, internationally, to accompany scientists on a field trip to the Pilbara region of Western Australia to debate the relevance of ancient structures called stromatolites, to the origins of life on Earth and the search for life on Mars. The project was planned with the aim of exposing high school students to `science in the making', including exposure to the ongoing debate and uncertainties involved in scientific research. The development of the project stemmed from both research-based and anecdotal evidence that current science education programs are not providing secondary students with a good understanding of the processes of science. This study seeks to examine the effectiveness of student use of the tools to increase awareness of the processes of science and to evaluate the effectiveness of the tools in terms of student learning. The literature reports that there is a need for learning activities to be conducted within meaningful contexts. The virtual field trip tools create an environment that simulates key elements in the scientific process. Such an approach allows students to learn by doing, to work like scientists and apply their learning in an authentic context.

  5. Using SIM for strong end-to-end Application Authentication

    OpenAIRE

    Lunde, Lars; Wangensteen, Audun

    2006-01-01

    Today the Internet is mostly used for services that require low or none security. The commercial and governmental applications have started to emerge but met problems since they require strong authentication, which is both difficult and costly to realize. The SIM card used in mobile phones is a tamper resistant device that contains strong authentication mechanisms. It would be very convenient and cost-efficient if Internet services could use authentication methods based on the SIM. This mast...

  6. Network-based Fingerprint Authentication System Using a Mobile Device

    OpenAIRE

    Zhang, Qihu

    2016-01-01

    Abstract— Fingerprint-based user authentication is highly effective in networked services such as electronic payment, but conventional authentication solutions have problems in cost, usability and security. To resolve these problems, we propose a touch-less fingerprint authentication solution, in which a mobile device's built-in camera is used to capture fingerprint image, and then it is sent to the server to determine the identity of the user. We designed and implemented a prototype as an a...

  7. The Failure of Inquiry: Preparing Science Teachers with an Authentic Investigation

    Science.gov (United States)

    Lustick, David

    2009-12-01

    This mixed methodology action research study examined the impact of a curricular innovation designed to provide an authentic science inquiry learning experience for 15 secondary science teacher candidates enrolled in a master’s level initial certification program. The class investigated the question “How can peak autumn color in New England be determined?” The project goals were to help teacher candidates acquire the skills, knowledge, and dispositions necessary to foster learning through inquiry in their respective content areas as defined by teacher preparation professional standards. Though the teacher candidates were successful at identifying a likely answer to the question, the project failed to achieve its learning goals. Reasons for the project’s failure and implications for the science education community are discussed.

  8. Authentic Voices Authentic Singing : A Multicultural Approach To Vocal Music Therapy

    NARCIS (Netherlands)

    Uhlig, S.

    2006-01-01

    This book presents the exclusive use of the authentic voice to highlight its virtuosity, healing potency and its importance to well-being. It demonstrates the powerful impact of the voice with clinical examples from mental health, medical and special education settings. In the book the undiscovered

  9. Secure Biometric Multi-Logon System Based on Current Authentication Technologies

    Science.gov (United States)

    Tait, Bobby L.

    The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.

  10. Teacher Perception of Project-Based Learning in a Technology-Infused Secondary School Culture: A Critical Cine-Ethnographic Study

    Science.gov (United States)

    Gratch, Jonathan

    2012-01-01

    Project-based learning has long been used in the educational realm as it emphasis a student-centered strategy which promotes meaning, enriched learning that enhances inquiry and problem-solving skills in a rich, authentic environment. The relevance and authentic design of projects may further be enhanced by the use of technology in the classroom.…

  11. Integrated circuit authentication using photon-limited x-ray microscopy.

    Science.gov (United States)

    Markman, Adam; Javidi, Bahram

    2016-07-15

    A counterfeit integrated circuit (IC) may contain subtle changes to its circuit configuration. These changes may be observed when imaged using an x-ray; however, the energy from the x-ray can potentially damage the IC. We have investigated a technique to authenticate ICs under photon-limited x-ray imaging. We modeled an x-ray image with lower energy by generating a photon-limited image from a real x-ray image using a weighted photon-counting method. We performed feature extraction on the image using the speeded-up robust features (SURF) algorithm. We then authenticated the IC by comparing the SURF features to a database of SURF features from authentic and counterfeit ICs. Our experimental results with real and counterfeit ICs using an x-ray microscope demonstrate that we can correctly authenticate an IC image captured using orders of magnitude lower energy x-rays. To the best of our knowledge, this Letter is the first one on using a photon-counting x-ray imaging model and relevant algorithms to authenticate ICs to prevent potential damage.

  12. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  13. Implementing New-age Authentication Techniques using OpenID for Security Automation

    OpenAIRE

    Dharmendra Choukse; Umesh Kumar Singh; Deepak Sukheja; Rekha Shahapurkar

    2010-01-01

    Security of any software can be enhanced manifolds if multiple factors for authorization and authentication are used .The main aim of this work was to design and implement an Academy Automation Software for IPS Academy which uses OpenID and Windows CardSpace as Authentication Techniques in addition to Role Based Authentication (RBA) System to ensure that only authentic users can access the predefined roles as per their Authorization level. The Automation covers different computing hardware an...

  14. 26 CFR 301.6064-1 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Signature presumed authentic. 301.6064-1 Section 301.6064-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED....6064-1 Signature presumed authentic. An individual's name signed to a return, statement, or other...

  15. Authenticity Anyone? The Enhancement of Emotions via Neuro-Psychopharmacology.

    Science.gov (United States)

    Kraemer, Felicitas

    2011-04-01

    This article will examine how the notion of emotional authenticity is intertwined with the notions of naturalness and artificiality in the context of the recent debates about 'neuro-enhancement' and 'neuro-psychopharmacology.' In the philosophy of mind, the concept of authenticity plays a key role in the discussion of the emotions. There is a widely held intuition that an artificial means will always lead to an inauthentic result. This article, however, proposes that artificial substances do not necessarily result in inauthentic emotions. The literature provided by the philosophy of mind on this subject usually resorts to thought experiments. On the other hand, the recent literature in applied ethics on 'enhancement' provides good reasons to include real world examples. Such case studies reveal that some psychotropic drugs such as antidepressants actually cause people to undergo experiences of authenticity, making them feel 'like themselves' for the first time in their lives. Beginning with these accounts, this article suggests three non-naturalist standards for emotions: the authenticity standard, the rationality standard, and the coherence standard. It argues that the authenticity standard is not always the only valid one, but that the other two ways of assessing emotions are also valid, and that they can even have repercussions on the felt authenticity of emotions. In conclusion, it sketches some of the normative implications if not ethical intricacies that accompany the enhancement of emotions.

  16. AUTHENTIC LEADERSHIP BEHAVIOR IN MADRASAH ALIYAH IN TASIKMALAYA REGENCY AAN KOMARIAH

    Directory of Open Access Journals (Sweden)

    Aan Komariah

    2016-03-01

    Full Text Available This research aims to know the relation between Spiritual Intelligence and Leader Personality with Authentic Leadership Behaviour. This research uses quantitative research approach with type of correlation approach. This research is done at 77 headmasters of Mardasah Aliyah in Tasikmalaya Regency. The samples are done by using simple random sampling technique. The research result shows that there is positive between Spiritual Intelligence and Leader Personality with Authentic Leadership Behaviour. The positive correlation coefficient shows that if the Spiritual Intelligence increases, so the authentic leadership behaviour will also increase. Also with the increasing of Leader Personality will increase the Authentic Leadership behaviour. The Spiritual Intelligence and Leader Personality all together affect significantly to the Authentic Leadership Behaviour.

  17. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  18. A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics.

    Science.gov (United States)

    Wu, Guannan; Wang, Jian; Zhang, Yongrong; Jiang, Shuai

    2018-01-10

    Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot provide continuous certification. To address this issue, we present a two-step authentication method based on an own-built fingertip sensor device which can capture motion data (e.g., acceleration and angular velocity) and physiological data (e.g., a photoplethysmography (PPG) signal) simultaneously. When the device is worn on the user's fingertip, it will automatically recognize whether the wearer is a legitimate user or not. More specifically, multisensor data is collected and analyzed to extract representative and intensive features. Then, human activity recognition is applied as the first step to enhance the practicability of the authentication system. After correctly discriminating the motion state, a one-class machine learning algorithm is applied for identity authentication as the second step. When a user wears the device, the authentication process is carried on automatically at set intervals. Analyses were conducted using data from 40 individuals across various operational scenarios. Extensive experiments were executed to examine the effectiveness of the proposed approach, which achieved an average accuracy rate of 98.5% and an F1-score of 86.67%. Our results suggest that the proposed scheme provides a feasible and practical solution for authentication.

  19. Facilitating Authentic Becoming

    Science.gov (United States)

    Eriksen, Matthew

    2012-01-01

    A "Model of Authentic Becoming" that conceptualizes learning as a continuous and ongoing embodied and relational process, and uses social constructionism assumptions as well as Kolb's experiential learning model as its point of departure, is presented. Through a focus on the subjective, embodied, and relational nature of organizational life, the…

  20. Being authentic is the new image : A qualitative study on the authenticity constructions and self-images of Christian millennials in Africa

    NARCIS (Netherlands)

    Counted, Victor

    2016-01-01

    The article is a qualitative study that focuses on the authenticity and self-constructions of Christian millennials in Africa. While exploring how 15 respondents manifested their authentic self-behaviours using a case study design, the hallmark of the study was to observe the common coping mechanism

  1. 22 CFR 61.3 - Certification and authentication criteria.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Certification and authentication criteria. 61.3 Section 61.3 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES WORLD-WIDE FREE FLOW OF AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall...

  2. Authenticity at Work: Its Relations With Worker Motivation and Well-being

    Directory of Open Access Journals (Sweden)

    Ralph Van den Bosch

    2018-05-01

    Full Text Available Drawing on Self-Determination Theory (SDT; Deci et al., 2017, this study examines the associations between authenticity at work, motivation and well-being, assuming that motivation would at least partly mediate the association between authenticty and well-being. Since authentic behavior refers to the degree to which a person acts in agreement with their true self (i.e., one's own core values, high levels of authenticity at work should relate positively to more intrinsic types of motivation regulation and negatively to more extrinsic types of motivation regulation. Moreover, high levels of authenticity should be associated with higher well-being at work (i.e., higher work engagement and lower burnout. Structural equation modeling using cross-sectional data from 546 participants revealed that self-determined motivation (i.e., autonomous motivation showed positive associations with authenticity at work and that non-self-determined motivation (i.e., controlled motivation and amotivation showed negative associations with authenticity at work. The positive associations increased in strength with increasing self-determined motivation. A similar—but reversed—pattern was found for the negative associations. Parallel mediation analysis revealed that self-determined motivation partially mediated the relationship between authenticity and well-being at work.

  3. Password-based authenticated key exchange scheme using smart card

    Science.gov (United States)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  4. Spectroscopically Enhanced Method and System for Multi-Factor Biometric Authentication

    Science.gov (United States)

    Pishva, Davar

    This paper proposes a spectroscopic method and system for preventing spoofing of biometric authentication. One of its focus is to enhance biometrics authentication with a spectroscopic method in a multifactor manner such that a person's unique ‘spectral signatures’ or ‘spectral factors’ are recorded and compared in addition to a non-spectroscopic biometric signature to reduce the likelihood of imposter getting authenticated. By using the ‘spectral factors’ extracted from reflectance spectra of real fingers and employing cluster analysis, it shows how the authentic fingerprint image presented by a real finger can be distinguished from an authentic fingerprint image embossed on an artificial finger, or molded on a fingertip cover worn by an imposter. This paper also shows how to augment two widely used biometrics systems (fingerprint and iris recognition devices) with spectral biometrics capabilities in a practical manner and without creating much overhead or inconveniencing their users.

  5. Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware

    DEFF Research Database (Denmark)

    Bilgin, Begul; Bogdanov, Andrey; Knezevic, Miroslav

    2013-01-01

    In this paper, we present a novel lightweight authenticated cipher optimized for hardware implementations called Fides. It is an online nonce-based authenticated encryption scheme with authenticated data whose area requirements are as low as 793 GE and 1001 GE for 80-bit and 96-bit security...

  6. Exploring the Use of Discrete Gestures for Authentication

    Science.gov (United States)

    Chong, Ming Ki; Marsden, Gary

    Research in user authentication has been a growing field in HCI. Previous studies have shown that peoples’ graphical memory can be used to increase password memorability. On the other hand, with the increasing number of devices with built-in motion sensors, kinesthetic memory (or muscle memory) can also be exploited for authentication. This paper presents a novel knowledge-based authentication scheme, called gesture password, which uses discrete gestures as password elements. The research presents a study of multiple password retention using PINs and gesture passwords. The study reports that although participants could use kinesthetic memory to remember gesture passwords, retention of PINs is far superior to retention of gesture passwords.

  7. LDRD HPC4Energy Wrapup Report - LDRD 12-ERD-074

    Energy Technology Data Exchange (ETDEWEB)

    Dube, E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Grosh, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-01-23

    High-performance computing and simulation has the potential to optimize production, distribution, and conversion of energy. Although a number of concepts have been discussed, a comprehensive research project to establish and quantify the effectiveness of computing and simulation at scale to core energy problems has not been conducted. We propose to perform the basic research to adapt existing high-performance computing tools and simulation approaches to two selected classes of problems common across the energy sector. The first, applying uncertainty quantification and contingency analysis techniques to energy optimization, allows us to assess the effectiveness of LLNL core competencies to problems such as grid optimization and building-system efficiency. The second, applying adaptive meshing and numerical analysis techniques to physical problems at fine scale, could allow immediate impacts in key areas such as efficient combustion and fracture and spallation. By creating an integrated project team with the necessary expertise, we can efficiently address these issues, delivering both near-term results as well as quantifying developments needed to address future energy challenges.

  8. Kierkegaard and Sartre on God and Authenticity

    Directory of Open Access Journals (Sweden)

    Amirabbas Alizamani

    2014-09-01

    Full Text Available To evaluate and judge the notion of humanity, one has to use logic and logical criteria, since every notion's delimitation in logic requires an exact definition to be offered. And it is by definition that one can distinguish between one particular notion or extension and other notions and extensions. Different definitions have been suggested of the nature of humanity throughout the history of ideas every one of which casts light on an aspect of human existence. The intricate and deep nature of human being may have been the main obstacle in the way to an exact definition of human being. The past masters have defined man as a rational animal; i.e. man is inside the family of animals but an animal that have the power of thinking. Human rationality is not merely a matter of speaking, but rather it covers his all internal and external aspects. Since man is consisted of mind and body. Contemporary thinkers have left behind the traditional definition of man and approached him from different perspectives. In any case, what is important for us is human being's humanity.    On the other hand, the notion of humanity has always had an inseparable relationship with ethics. Needless to say, moral rules and maxims comprise a set of determinate oughts and ought-nots which should be adopted and followed by every human individual if s/he seeks to reach happiness. These moral rules are sometimes associated with religious and divine concepts which include a faith background and sometimes they go shoulder to shoulder with the rational rules where there is no occasion for extra-rational elements. One of the fundamental notions of ethics is authenticity, or to put it otherwise, how a man is authentic? What are the criteria of an authentic man? Authenticity can be verbally analyzed to the following notions: Authenticity in the sense of having a determinate family background. Authenticity in the sense of having a steady and impenetrable structure Authenticity in the

  9. Kierkegaard and Sartre on God and Authenticity

    Directory of Open Access Journals (Sweden)

    Alireza Faraji

    2014-08-01

    Full Text Available To evaluate and judge the notion of humanity, one has to use logic and logical criteria, since every notion's delimitation in logic requires an exact definition to be offered. And it is by definition that one can distinguish between one particular notion or extension and other notions and extensions. Different definitions have been suggested of the nature of humanity throughout the history of ideas every one of which casts light on an aspect of human existence. The intricate and deep nature of human being may have been the main obstacle in the way to an exact definition of human being. The past masters have defined man as a rational animal; i.e. man is inside the family of animals but an animal that have the power of thinking. Human rationality is not merely a matter of speaking, but rather it covers his all internal and external aspects. Since man is consisted of mind and body. Contemporary thinkers have left behind the traditional definition of man and approached him from different perspectives. In any case, what is important for us is human being's humanity.    On the other hand, the notion of humanity has always had an inseparable relationship with ethics. Needless to say, moral rules and maxims comprise a set of determinate oughts and ought-nots which should be adopted and followed by every human individual if s/he seeks to reach happiness. These moral rules are sometimes associated with religious and divine concepts which include a faith background and sometimes they go shoulder to shoulder with the rational rules where there is no occasion for extra-rational elements. One of the fundamental notions of ethics is authenticity, or to put it otherwise, how a man is authentic? What are the criteria of an authentic man? Authenticity can be verbally analyzed to the following notions: Authenticity in the sense of having a determinate family background. Authenticity in the sense of having a steady and impenetrable structure Authenticity in the

  10. Study and development of a remote biometric authentication protocol

    OpenAIRE

    Bistarelli, Stefano; Claudio, Viti

    2003-01-01

    This paper reports the phases of study and implementation of a remote biometric authentication protocol developed during my internship at the I.i.t. of the C.n.r. in Pisa. Starting from the study of authentication history we had a look from the first system used since the 60ies to the latest technology; this helped us understand how we could realize a demonstration working protocol that could achieve a web remote authentication granting good reliability: to do this we choosed to modify the SS...

  11. PENGOPTIMALAN KOMPETENSI MAHASISWA JURUSAN BAHASA DAN SASTRA INDONESIA FBS UNNES DALAM MEMBUAT MEDIA PEMBELAJARAN BAHASA INDONESIA MENGGUNAKAN ELEMEN AUTHENTIC ASSESSMENT

    Directory of Open Access Journals (Sweden)

    Mimi Mulyani

    2010-04-01

    Full Text Available The learning-media subject aims for students to have the competence of makinga variety of instructional media. In fact, the student‟s competences in designing, creating, and displaying the instructional media are not maximized since the media made by students is often not discussed in the class. A comprehensive measurement of aspects of learning; covering aspects of the process, performance, and product; can be done using authentic assessment approaches. The results show that the contextual elements of authentic assessment approach can improve students' competence in designing, creating, and displaying graphics media. It also change their attitudes and interests from negative to positive. it is suggested that lecturers discuss the students‟ project in the lecture. Unnes is expected to improve the facilities of learning media that can lead students to be more creative and innovative in creating instructional media. Keywords: competence, instructional media, elements of authentic assessment

  12. Smartphone Sensors for Stone Lithography Authentication

    Directory of Open Access Journals (Sweden)

    Giuseppe Schirripa Spagnolo

    2014-05-01

    Full Text Available Nowadays mobile phones include quality photo and video cameras, access to wireless networks and the internet, GPS assistance and other innovative systems. These facilities open them to innovative uses, other than the classical telephonic communication one. Smartphones are a more sophisticated version of classic mobile phones, which have advanced computing power, memory and connectivity. Because fake lithographs are flooding the art market, in this work, we propose a smartphone as simple, robust and efficient sensor for lithograph authentication. When we buy an artwork object, the seller issues a certificate of authenticity, which contains specific details about the artwork itself. Unscrupulous sellers can duplicate the classic certificates of authenticity, and then use them to “authenticate” non-genuine works of art. In this way, the buyer will have a copy of an original certificate to attest that the “not original artwork” is an original one. A solution for this problem would be to insert a system that links together the certificate and the related specific artwork. To do this it is necessary, for a single artwork, to find unique, unrepeatable, and unchangeable characteristics. In this article we propose an innovative method for the authentication of stone lithographs. We use the color spots distribution captured by means of a smartphone camera as a non-cloneable texture of the specific artworks and an information management system for verifying it in mobility stone lithography.

  13. A Novel Single Pass Authenticated Encryption Stream Cipher for Software Defined Radios

    DEFF Research Database (Denmark)

    Khajuria, Samant

    2012-01-01

    to propose cryptographic services such as confidentiality, integrity and authentication. Therefore, integration of security services into SDR devices is essential. Authenticated Encryption schemes donate the class of cryptographic algorithms that are designed for protecting both message confidentiality....... This makes authenticated encryption very attractive for low-cost low-power hardware implementations, as it allows for the substantial decrease in the circuit area and power consumed compared to the traditional schemes. In this thesis, an authenticated encryption scheme is proposed with the focus of achieving...... high throughput and low overhead for SDRs. The thesis is divided into two research topics. One topic is the design of a 1-pass authenticated encryption scheme that can accomplish both message secrecy and authenticity in a single cryptographic primitive. The other topic is the implementation...

  14. Laboratory Directed Research and Development 1998 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Pam Hughes; Sheila Bennett eds.

    1999-07-14

    The Laboratory's Directed Research and Development (LDRD) program encourages the advancement of science and the development of major new technical capabilities from which future research and development will grow. Through LDRD funding, Pacific Northwest continually replenishes its inventory of ideas that have the potential to address major national needs. The LDRD program has enabled the Laboratory to bring to bear its scientific and technical capabilities on all of DOE's missions, particularly in the arena of environmental problems. Many of the concepts related to environmental cleanup originally developed with LDRD funds are now receiving programmatic support from DOE, LDRD-funded work in atmospheric sciences is now being applied to DOE's Atmospheric Radiation Measurement Program. We also have used concepts initially explored through LDRD to develop several winning proposals in the Environmental Management Science Program. The success of our LDRD program is founded on good management practices that ensure funding is allocated and projects are conducted in compliance with DOE requirements. We thoroughly evaluate the LDRD proposals based on their scientific and technical merit, as well as their relevance to DOE's programmatic needs. After a proposal is funded, we assess progress annually using external peer reviews. This year, as in years past, the LDRD program has once again proven to be the major enabling vehicle for our staff to formulate new ideas, advance scientific capability, and develop potential applications for DOE's most significant challenges.

  15. Research and Mass Deployment of Non-cognitive Authentication Strategy Based on Campus Wireless Network

    Directory of Open Access Journals (Sweden)

    Huangfu Dapeng

    2018-01-01

    Full Text Available With the rapid development of Internet +, the dependence on wireless networks and wireless terminals are increasing. Campus wireless network has become the main network of teachers and students in campus on the internet. As there are uneven clients and a wide variety of intelligent terminals now. Simplified authentication and network security become the most urgent problem for wireless network. This paper used the Portal + Mac authentication method to realize the non-cognitive authentication of teachers and students on basis of the analysis of the advantages and disadvantages of mainstream authentication of campus wireless network, such as 802.1X authentication, Portal authentication, Mac authentication and DHCP authentication. Teachers and students only need portal certification at the first time, then surf the internet with non-perceived authentication at the second time and later. This method increases network security, and is better to meet the needs of teachers and students.

  16. Commonalities and Specificities of Authentic Leadership in Ghana and New Zealand

    Science.gov (United States)

    Owusu-Bempah, Justice; Addison, Ramzi; Fairweather, John

    2014-01-01

    The authentic leadership literature suggests that there are three critical elements that precede the bestowal of authentic leadership: first, the espoused values and actions of authentic leaders must be congruent; second, the expectation of the leaders and the followers must be congruent; and, third, the leaders must behave with high moral…

  17. Authentic Leadership--Is It More than Emotional Intelligence?

    Science.gov (United States)

    Duncan, Phyllis; Green, Mark; Gergen, Esther; Ecung, Wenonah

    2017-01-01

    One of the newest theories to gain widespread interest is authentic leadership. Part of the rationale for developing a model and subsequent instrument to measure authentic leadership was a concern that the more popular theory, the full range model of leadership and its instrument, the Multifactor Leadership Questionnaire (MLQ) (Bass & Avolio,…

  18. Reconceptualising authenticity for English as a global language

    CERN Document Server

    Pinner, Richard S

    2016-01-01

    This book explores authenticity as it relates to second language acquisition with a focus on the instruction of English as a foreign language. It discusses the theoretical issues surrounding authenticity and presents it as a complex dynamic construct that can only be understood by examining it from social, individual and contextual dimensions.

  19. Authentication concept and impact of pit containers on neutron analysis

    Energy Technology Data Exchange (ETDEWEB)

    Goettsche, Malte [Centre for Science and Peace Research, University of Hamburg (Germany)

    2013-07-01

    One part of verifying the dismantlement of nuclear warheads will very likely be the authentication of warheads where their authenticities would be confirmed via radiation measurements. Such authentication would be more achievable if dismantled warhead components were verified as opposed to the entire warhead due to unknown shielding in the warhead that would be replaced in the case of components by shielding of a container where the design might be known. Such a procedure would require a robust chain-of-custody, where confidence would be created that the dismantled warhead components correspond to the former warhead in terms of integrity and identity. The argument is sometimes made though that the containers where the components would be stored act as a strong shielding that might prevent authentication measurements. In this presentation, plausible container configurations are considered and analyzed in regard to measurability of neutron multiplicities using Helium-3 detectors. Such a measurement would allow the determination of fissile mass which is considered one attribute for authenticating warheads.

  20. Integrated analytical assets aid botanical authenticity and adulteration management.

    Science.gov (United States)

    Simmler, Charlotte; Graham, James G; Chen, Shao-Nong; Pauli, Guido F

    2017-11-22

    This article reviews and develops a perspective for the meaning of authenticity in the context of quality assessment of botanical materials and the challenges associated with discerning adulterations vs. contaminations vs. impurities. Authentic botanicals are by definition non-adulterated, a mutually exclusive relationship that is confirmed through the application of a multilayered set of analytical methods designed to validate the (chemo)taxonomic identity of a botanical and certify that it is devoid of any adulteration. In practice, the ever-increasing sophistication in the process of intentional adulteration, as well as the growing number of botanicals entering the market, altogether necessitate a constant adaptation and reinforcement of authentication methods with new approaches, especially new technologies. This article summarizes the set of analytical methods - classical and contemporary - that can be employed in the authentication of botanicals. Particular emphasis is placed on the application of untargeted metabolomics and chemometrics. An NMR-based untargeted metabolomic model is proposed as a rapid, systematic, and complementary screening for the discrimination of authentic vs. potentially adulterated botanicals. Such analytical model can help advance the evaluation of botanical integrity in natural product research. Copyright © 2017. Published by Elsevier B.V.

  1. A Text-Independent Speaker Authentication System for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Florentin Thullier

    2017-09-01

    Full Text Available This paper presents a text independent speaker authentication method adapted to mobile devices. Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning. To this end, we have excluded the need for any network communication. Hence, we opted for the completion of both the training and the identification processes directly on the mobile device through the extraction of linear prediction cepstral coefficients and the naive Bayes algorithm as the classifier. Furthermore, the authentication decision is enhanced to overcome misidentification through access privileges that the user should attribute to each application beforehand. To evaluate the proposed authentication system, eleven participants were involved in the experiment, conducted in quiet and noisy environments. Public speech corpora were also employed to compare this implementation to existing methods. Results were efficient regarding mobile resources’ consumption. The overall classification performance obtained was accurate with a small number of samples. Then, it appeared that our authentication system might be used as a first security layer, but also as part of a multilayer authentication, or as a fall-back mechanism.

  2. Group-ID based RFID Mutual Authentication

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2013-11-01

    Full Text Available For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns. This paper presents a new RFID mutual authentication protocol, which is designed to be configured on EPC Gen2 platform and to meet various security requirements while providing efficiency using PRNG (Pseudo Random Number Generator. Group-ID is used to minimize the authentication time. Security analysis of the proposed protocol is discussed.

  3. Efficient authentication scheme based on near-ring root extraction problem

    Science.gov (United States)

    Muthukumaran, V.; Ezhilmaran, D.

    2017-11-01

    An authentication protocolis the type of computer communication protocol or cryptography protocol specifically designed for transfer of authentication data between two entities. We have planned a two new entity authentication scheme on the basis of root extraction problem near-ring in this article. We suggest that this problem is suitably difficult to serve as a cryptographic assumption over the platform of near-ring N. The security issues also discussed.

  4. LABORATORY DIRECTED RESEARCH AND DEVELOPMENT ANNUAL REPORT TO THE DOE - DECEMBER 2001

    International Nuclear Information System (INIS)

    FOX, K.J.

    2001-01-01

    Brookhaven National (BNL) Laboratory is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, under contract with the U. S. Department of Energy. BNL's total annual budget has averaged about$450 million. There are about 3,000 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 4 13.2, ''Laboratory Directed Research and Development,'' March 5, 1997, and the LDRD Annual Report guidance, updated February 12, 1999. The LDRD Program obtains its funds through the Laboratory overhead pool and operates under the authority of DOE Order 4 13.2. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R and D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology ideas, which becomes a major factor in achieving and maintaining staff excellence

  5. Challenge Measurements For Authentication

    International Nuclear Information System (INIS)

    Pitts, W. Karl

    2009-01-01

    Authentication of systems with an information barrier that protects sensitive information is difficult; in particular, the information barrier can allow a hidden switch to be implemented by the system fabricator and operator. The hidden switch is the operator's ability to subvert the measurement system and force it to produce a desired and false result. It is usually discussed in the context of an attribute measurement in which a faked item is presented in place of a real item regulated by an agreement, with the driving motivation being the ability to preserve a stock of valuable items. In simple terms, the hidden switch enables a shell game with assets, and the information barrier protects the switch. This presentation outlines challenge measurements that could be used to detect the implementation of a hidden switch and assist the authentication process.

  6. Haunted by the authentic

    DEFF Research Database (Denmark)

    d'Ambrosio, Luigi

    2013-01-01

    and individual interviews with relevant guests at the Italian restaurant Sticchi’s in Aalborg, Denmark. Guests have been selected for qualitative interviews on the basis of the quantitative questionnaire that random guests have filled out in February 2013. Moreover, netnographic observation of the restaurant......Research description and purpose: The purpose of this investigation is to explore Danish guests’ experience when consuming ‘authentic’ Italian food in Italian restaurants in Denmark. In this context, the aim of the research is to engage in a discussion of the concept of authenticity in ethnic food...... consumption, and the guests’ experience with and reaction to the authentic culinary experience in ethnic restaurants in the consumers’ home country. Design/Methodology: The paper methodology is based on the use of mixed methods. A collection of primary quantitative and qualitative data through a questionnaire...

  7. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    2018-01-01

    Authenticity is developed and deployed as a criterion variable for a theology of the workplace inquiry that combines theory and methodological development with data analysis. The goal is to show that social science method can offer an empirically valid, prophetic dimension to the study of employm......Authenticity is developed and deployed as a criterion variable for a theology of the workplace inquiry that combines theory and methodological development with data analysis. The goal is to show that social science method can offer an empirically valid, prophetic dimension to the study...... of employment and work parameters in light of religious teachings on the social question at national, organizational, or firm-specific levels. The function of a criterion variable is described, noting that the switch from a dependent variable approach introduces an open-system dynamism to social science...

  8. Adaptable Authentication Model: Exploring Security with Weaker Attacker Models

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    suffer because of the identified vulnerabilities. Therefore, we may need to analyze a protocol for weaker notions of security. In this paper, we present a security model that supports such weaker notions. In this model, the overall goals of an authentication protocol are broken into a finer granularity......; for each fine level authentication goal, we determine the “least strongest-attacker” for which the authentication goal can be satisfied. We demonstrate that this model can be used to reason about the security of supposedly insecure protocols. Such adaptability is particularly useful in those applications...

  9. Using Horses to Teach Authentic Leadership Skills to At-Risk Youth

    Science.gov (United States)

    Adams, Brittany Lee

    2013-01-01

    The primary purpose of this study was to determine the impact of an equine-facilitated authentic leadership development program on at-risk youth. Participants were asked to participate in two focus groups and a 3-day equine-facilitated authentic leadership development program based on Bill George's Model of Authentic Leadership. Participants were…

  10. AVNG authentication features

    Energy Technology Data Exchange (ETDEWEB)

    Thron, Jonathan Louis [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; White, Greg [LLNL; Razinkov, Sergey [VNIIEF; Livke, Alexander [VNIIEF

    2010-01-01

    Any verification measurement performed on potentially classified nuclear material must satisfy two seemingly contradictory constraints. First and foremost, no classified information can be released. At the same time, the monitoring party must have confidence in the veracity of the measurement (called authentication). An information barrier (IB) is included in the measurement system to protect the potentially classified information. To achieve both goals, the IB allows only very limited, previously agreed-on information to be displayed to the monitoring party. In addition to this limited information from the potentially classified measurement, other measurements are performed and procedures are put in place for the monitoring party to gain confidence that the material being measured is consistent with the host's declarations concerning that material. In this presentation, we will discuss the techniques used in the AVNG attribute measuring system to facilitate authentication of the verification measurements by the monitors. These techniques include measuring unclassified items while allowing more information to be displayed; having the monitor understand the system function, design, and implementation; and randomly selecting the order of measurements.

  11. An enhanced iris recognition and authentication system using ...

    African Journals Online (AJOL)

    Iris recognition and authentication has a major issue in its code generation and verification accuracy, in order to enhance the authentication process, a binary bit sequence of iris is generated, which contain several vital information that is used to calculate the Mean Energy and Maximum Energy that goes into the eye with an ...

  12. E-Labs - Learning with Authentic Data

    Energy Technology Data Exchange (ETDEWEB)

    Bardeen, Marjorie G. [Fermilab; Wayne, Mitchell [Notre Dame U.

    2016-01-01

    the success teachers have had providing an opportunity for students to: • Organize and conduct authentic research. • Experience the environment of scientific collaborations. • Possibly make real contributions to a burgeoning scientific field. We've created projects that are problem-based, student driven and technology dependent. Students reach beyond classroom walls to explore data with other students and experts and share results, publishing original work to a worldwide audience. Students can discover and extend the research of other students, modeling the processes of modern, large-scale research projects. From start to finish e-Labs are student-led, teacher-guided projects. Students need only a Web browser to access computing techniques employed by professional researchers. A Project Map with milestones allows students to set the research plan rather than follow a step-by-step process common in other online projects. Most importantly, e-Labs build the learning experience around the students' own questions and let them use the very tools that scientists use. Students contribute to and access shared data, most derived from professional research databases. They use common analysis tools, store their work and use metadata to discover, replicate and confirm the research of others. This is where real scientific collaboration begins. Using online tools, students correspond with other research groups, post comments and questions, prepare summary reports, and in general participate in the part of scientific research that is often left out of classroom experiments. Teaching tools such as student and teacher logbooks, pre- and post-tests and an assessment rubric aligned with learner outcomes help teachers guide student work. Constraints on interface designs and administrative tools such as registration databases give teachers the "one-stop-shopping" they seek for multiple e-Labs. Teaching and administrative tools also allow us to track usage and assess the

  13. Game meat authentication through rare earth elements fingerprinting

    International Nuclear Information System (INIS)

    Danezis, G.P.; Pappas, A.C.; Zoidis, E.; Papadomichelakis, G.; Hadjigeorgiou, I.; Zhang, P.; Brusic, V.; Georgiou, C.A.

    2017-01-01

    Accurate labelling of meat (e.g. wild versus farmed, geographical and genetic origin, organic versus conventional, processing treatment) is important to inform the consumers about the products they buy. Meat and meat products declared as game have higher commercial value making them target to fraudulent labelling practices and replacement with non-game meat. We have developed and validated a new method for authentication of wild rabbit meat using elemental metabolomics approach. Elemental analysis was performed using rapid ultra-trace multi-element measurement by inductively coupled plasma mass spectrometry (ICP-MS). Elemental signatures showed excellent ability to discriminate the wild rabbit from non-wild rabbit meat. Our results demonstrate the usefulness of metabolic markers -rare earth signatures, as well as other trace element signatures for game meat authentication. - Highlights: • Elemental metabolomics is a powerful new methodology for authentication of game rabbit meat. • New method for meat authentication utilizing rare earths elemental signatures. • Samples are compared to group signatures using angular and Euclidean distances. • Meat reference materials (>70 elements) can be used for cross-comparison between studies.

  14. A covert authentication and security solution for GMOs.

    Science.gov (United States)

    Mueller, Siguna; Jafari, Farhad; Roth, Don

    2016-09-21

    Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary. Herein, we present a new crypto protocol, that is applicable in broader settings, and embeds the authentication string indistinguishably from a random element in the signature space and the string is verified or denied without disclosing the actual signature. Results show that in a nucleotide string of 1000, the algorithm gives a correlation of 0.98 or higher between the distribution of the codon and that of E. coli, making the signature virtually invisible. This algorithm may be used to securely authenticate and validate GMOs without disclosing the actual signature. While this protocol uses watermarking, its novelty is in use of more complex cryptographic techniques based on zero knowledge proofs to encode information.

  15. 44 CFR 5.85 - Authentication and attestation of copies.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Authentication and attestation of copies. 5.85 Section 5.85 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT... Authentication and attestation of copies. The Administrator, Deputy Administrators, Regional Administrators...

  16. [Molecular authentication of Jinyinhua formula granule by using allele-specific PCR].

    Science.gov (United States)

    Jiang, Chao; Tu, Li-Chan; Yuan, Yuan; Huang, Lu-Qi; Gao, Wei; Jin, Yan

    2017-07-01

    Traditional authentication method is hard to identify herb's authenticity of traditional Chinese medicine(TCM) formula granules because they have lost all their morphological characteristics. In this study, a new allele-specific PCR method was established for identifying the authentication of Jinyinhua formula granule (made from Lonicerae Japonicae Flos) based on an SNP site in trnL-trnF fragment. Genomic DNA was successfully extracted from Lonicerae Japonicae Flos and its formula granules by using an improved spin column method and then PCR was performed with the designed primer. Approximately 110 bp specific bands was obtained only in the authentic Lonicerae Japonicae Flos and its formula granules, while no bands were found in fake mixed products. In addition, the PCR product sequence was proved from Lonicerae Japonicae Flos trnL-trnF sequence by using BLAST method. Therefore, DNA molecular authentication method could make up the limitations of character identification method and microscopic identification, and quickly identify herb's authenticity of TCM formula granules, with enormous potential for market supervision and quality control. Copyright© by the Chinese Pharmaceutical Association.

  17. Relations between student perceptions of assessment authenticity, study approaches and learning outcome

    NARCIS (Netherlands)

    Gulikers, J.T.M.; Bastiaens, Th.J.; Kirschner, P.A.; Kester, L.

    2006-01-01

    This article examines the relationships between perceptions of authenticity and alignment on study approach and learning outcome. Senior students of a vocational training program performed an authentic assessment and filled in a questionnaire about the authenticity of various assessment

  18. An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

    OpenAIRE

    Pathan, Al-Sakib Khan; Hong, Choong Seon

    2007-01-01

    With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them have been proved to be insecure. In this paper, we propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against a previously proposed timestamp-based password authenti...

  19. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    Science.gov (United States)

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  20. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching

    Directory of Open Access Journals (Sweden)

    Simon Fong

    2012-01-01

    Full Text Available Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user’s activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user’s medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user’s privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  1. CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE

    Directory of Open Access Journals (Sweden)

    Srivatsan Sridharan

    2014-06-01

    Full Text Available The aim of this paper is to provide an introduction towards the architectural design of a bi-fold authenticated agent-monitored transaction model. The focus is primarily on implementation in ATM systems which provide the following facilities of withdrawing currency at any remote terminal, verification of the end users identity using Personal Identification Number and an authentic One-Time-Session-Dependent Key generation and validation through the mobile. This system requires building up of an third party agent which would establish a secure session to the bank application with the terminal only after a series of authentication mechanism without compromising the privacy of any individual. The customers, without any insider privileges, can withdraw currency without being detected by any mechanisms of theft of card and eaves dropping of the Password from the card holders within the terminal software are also a major threat yet to be addressed. A basic solution is the terminals having bi-fold authentication mechanisms where mobile dependent one time session dependent key is being generated with authenticity being ensured and the confidentiality being maintained. In such a system, the correctness burden on the terminal’s code is significantly less as the customers have been given the chance to authorize themselves from their hand-held devices and are allowed to withdraw currency in terminal only after their identity is proved by a series of authentication procedures. In this paper along with the bi-fold authentication implementation, architectural design of the agent which is being introduced is also briefed.

  2. Phone, Email and Video Interactions with Characters in an Epidemiology Game: Towards Authenticity

    Science.gov (United States)

    Ney, Muriel; Gonçalves, Celso; Blacheff, Nicolas; Schwartz, Claudine; Bosson, Jean-Luc

    A key concern in game-based learning is the level of authenticity that the game requires in order to have an accurate match of what the learners can expect in the real world with what they need to learn. In this paper, we show how four challenges to the designer of authentic games have been addressed in a game for an undergraduate course in a medical school. We focus in particular on the system of interaction with different characters of the game, namely, the patients and a number of professionals. Students use their personal phone and email application, as well as various web sites. First, we analyze the authenticity of the game through four attributes, authenticity of the character, of the content of the feedback, of the mode and channel of communication and of the constraints. Second, the perceived authenticity (by students) is analyzed. The later is threefold and defined by an external authenticity (perceived likeness with a real life reference), an internal authenticity (perceived internal coherence of the proposed situations) and a didactical authenticity (perceived relevance with respect to learning goals).

  3. Laboratory Directed Research and Development Program FY 2006 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Sjoreen, Terrence P [ORNL

    2007-04-01

    The Oak Ridge National Laboratory (ORNL) Laboratory Directed Research and Development (LDRD) Program reports its status to the US Departmental of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, 'Laboratory Directed Research and Development' (April 19, 2006), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries all ORNL LDRD research activities supported during FY 2006. The associated FY 2006 ORNL LDRD Self-Assessment (ORNL/PPA-2007/2) provides financial data about the FY 2006 projects and an internal evaluation of the program's management process.

  4. Cipher block based authentication module: A hardware design perspective

    NARCIS (Netherlands)

    Michail, H.E.; Schinianakis, D.; Goutis, C.E.; Kakarountas, A.P.; Selimis, G.

    2011-01-01

    Message Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with encryption algorithms (like Block Ciphers), which are used to encrypt the

  5. 5 CFR 1631.34 - Certification and authentication of records.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Certification and authentication of records. 1631.34 Section 1631.34 Administrative Personnel FEDERAL RETIREMENT THRIFT INVESTMENT BOARD... Certification and authentication of records. (a) Upon request, the records custodian or other qualified...

  6. The role of authenticity in electoral social media campaigns

    NARCIS (Netherlands)

    G. Grow (Gabrielle); J.R. Ward (Janelle)

    2013-01-01

    textabstractAuthenticity is a popular buzzword in electoral politics: Electoral candidates and politicians are expected to be authentic in their public interactions. Since 2008, campaigning via social media has become an integral part of elections in the United States, and continues to gain

  7. Attacks on quantum key distribution protocols that employ non-ITS authentication

    Science.gov (United States)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  8. Authentication Protocols for Internet of Things: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Mohamed Amine Ferrag

    2017-01-01

    Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

  9. Argonne National Laboratory annual report of Laboratory Directed Research and Development Program Activities FY 2009.

    Energy Technology Data Exchange (ETDEWEB)

    Office of the Director

    2010-04-09

    addition to meeting all reporting requirements during fiscal year 2009, our LDRD Office continues to enhance its electronic systems to streamline the LDRD management process. You will see from the following individual project reports that Argonne's researchers have once again done a superb job pursuing projects at the forefront of their respective fields and have contributed significantly to the advancement of Argonne's strategic thrusts. This work has not only attracted follow-on sponsorship in many cases, but is also proving to be a valuable basis upon which to continue realignment of our strategic portfolio to better match the Laboratory's Strategic Plan.

  10. Argonne National Laboratory annual report of Laboratory Directed Research and Development Program Activities FY 2009

    International Nuclear Information System (INIS)

    2010-01-01

    meeting all reporting requirements during fiscal year 2009, our LDRD Office continues to enhance its electronic systems to streamline the LDRD management process. You will see from the following individual project reports that Argonne's researchers have once again done a superb job pursuing projects at the forefront of their respective fields and have contributed significantly to the advancement of Argonne's strategic thrusts. This work has not only attracted follow-on sponsorship in many cases, but is also proving to be a valuable basis upon which to continue realignment of our strategic portfolio to better match the Laboratory's Strategic Plan.

  11. Optical authentication based on moiré effect of nonlinear gratings in phase space

    International Nuclear Information System (INIS)

    Liao, Meihua; He, Wenqi; Wu, Jiachen; Lu, Dajiang; Liu, Xiaoli; Peng, Xiang

    2015-01-01

    An optical authentication scheme based on the moiré effect of nonlinear gratings in phase space is proposed. According to the phase function relationship of the moiré effect in phase space, an arbitrary authentication image can be encoded into two nonlinear gratings which serve as the authentication lock (AL) and the authentication key (AK). The AL is stored in the authentication system while the AK is assigned to the authorized user. The authentication procedure can be performed using an optoelectronic approach, while the design process is accomplished by a digital approach. Furthermore, this optical authentication scheme can be extended for multiple users with different security levels. The proposed scheme can not only verify the legality of a user identity, but can also discriminate and control the security levels of legal users. Theoretical analysis and simulation experiments are provided to verify the feasibility and effectiveness of the proposed scheme. (paper)

  12. Physics of intense, high energy radiation effects.

    Energy Technology Data Exchange (ETDEWEB)

    Hjalmarson, Harold Paul; Hartman, E. Frederick; Magyar, Rudolph J.; Crozier, Paul Stewart

    2011-02-01

    This document summarizes the work done in our three-year LDRD project titled 'Physics of Intense, High Energy Radiation Effects.' This LDRD is focused on electrical effects of ionizing radiation at high dose-rates. One major thrust throughout the project has been the radiation-induced conductivity (RIC) produced by the ionizing radiation. Another important consideration has been the electrical effect of dose-enhanced radiation. This transient effect can produce an electromagnetic pulse (EMP). The unifying theme of the project has been the dielectric function. This quantity contains much of the physics covered in this project. For example, the work on transient electrical effects in radiation-induced conductivity (RIC) has been a key focus for the work on the EMP effects. This physics in contained in the dielectric function, which can also be expressed as a conductivity. The transient defects created during a radiation event are also contained, in principle. The energy loss lead the hot electrons and holes is given by the stopping power of ionizing radiation. This information is given by the inverse dielectric function. Finally, the short time atomistic phenomena caused by ionizing radiation can also be considered to be contained within the dielectric function. During the LDRD, meetings about the work were held every week. These discussions involved theorists, experimentalists and engineers. These discussions branched out into the work done in other projects. For example, the work on EMP effects had influence on another project focused on such phenomena in gases. Furthermore, the physics of radiation detectors and radiation dosimeters was often discussed, and these discussions had impact on related projects. Some LDRD-related documents are now stored on a sharepoint site (https://sharepoint.sandia.gov/sites/LDRD-REMS/default.aspx). In the remainder of this document the work is described in catergories but there is much overlap between the atomistic

  13. Multi-factor challenge/response approach for remote biometric authentication

    Science.gov (United States)

    Al-Assam, Hisham; Jassim, Sabah A.

    2011-06-01

    Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to many attacks when it comes to remote authentication over open networks and raises serious privacy concerns. This paper proposes a biometric-based challenge-response approach to be used for remote authentication between two parties A and B over open networks. In the proposed approach, a remote authenticator system B (e.g. a bank) challenges its client A who wants to authenticate his/her self to the system by sending a one-time public random challenge. The client A responds by employing the random challenge along with secret information obtained from a password and a token to produce a one-time cancellable representation of his freshly captured biometric sample. The one-time biometric representation, which is based on multi-factor, is then sent back to B for matching. Here, we argue that eavesdropping of the one-time random challenge and/or the resulting one-time biometric representation does not compromise the security of the system, and no information about the original biometric data is leaked. In addition to securing biometric templates, the proposed protocol offers a practical solution for the replay attack on biometric systems. Moreover, we propose a new scheme for generating a password-based pseudo random numbers/permutation to be used as a building block in the proposed approach. The proposed scheme is also designed to provide protection against repudiation. We illustrate the viability and effectiveness of the proposed approach by experimental results based on two biometric modalities: fingerprint and face biometrics.

  14. Robust Secure Authentication and Data Storage with Perfect Secrecy

    Directory of Open Access Journals (Sweden)

    Sebastian Baur

    2018-04-01

    Full Text Available We consider an authentication process that makes use of biometric data or the output of a physical unclonable function (PUF, respectively, from an information theoretical point of view. We analyse different definitions of achievability for the authentication model. For the secrecy of the key generated for authentication, these definitions differ in their requirements. In the first work on PUF based authentication, weak secrecy has been used and the corresponding capacity regions have been characterized. The disadvantages of weak secrecy are well known. The ultimate performance criteria for the key are perfect secrecy together with uniform distribution of the key. We derive the corresponding capacity region. We show that, for perfect secrecy and uniform distribution of the key, we can achieve the same rates as for weak secrecy together with a weaker requirement on the distribution of the key. In the classical works on PUF based authentication, it is assumed that the source statistics are known perfectly. This requirement is rarely met in applications. That is why the model is generalized to a compound model, taking into account source uncertainty. We also derive the capacity region for the compound model requiring perfect secrecy. Additionally, we consider results for secure storage using a biometric or PUF source that follow directly from the results for authentication. We also generalize known results for this problem by weakening the assumption concerning the distribution of the data that shall be stored. This allows us to combine source compression and secure storage.

  15. The Need for Authenticity-Based Autonomy in Medical Ethics.

    Science.gov (United States)

    White, Lucie

    2017-08-11

    The notion of respect for autonomy dominates bioethical discussion, though what qualifies precisely as autonomous action is notoriously elusive. In recent decades, the notion of autonomy in medical contexts has often been defined in opposition to the notion of autonomy favoured by theoretical philosophers. Where many contemporary theoretical accounts of autonomy place emphasis on a condition of "authenticity", the special relation a desire must have to the self, bioethicists often regard such a focus as irrelevant to the concerns of medical ethics, and too stringent for use in practical contexts. I argue, however, that the very condition of authenticity that forms a focus in theoretical philosophy is also essential to autonomy and competence in medical ethics. After tracing the contours of contemporary authenticity-based theories of autonomy, I consider and respond to objections against the incorporation of a notion of authenticity into accounts of autonomy designed for use in medical contexts. By looking at the typical problems that arise when making judgments concerning autonomy or competence in a medical setting, I reveal the need for a condition of authenticity-as a means of protecting choices, particularly high-stakes choices, from being restricted or overridden on the basis of intersubjective disagreement. I then turn to the treatment of false and contestable beliefs, arguing that it is only through reference to authenticity that we can make important distinctions in this domain. Finally, I consider a potential problem with my proposed approach; its ability to deal with anorexic and depressive desires.

  16. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  17. The role of a positive trigger event in actioning authentic leadership development

    Directory of Open Access Journals (Sweden)

    S. Puente

    2007-11-01

    Full Text Available Authenticity can best be understood in context, and context implies action (Payne, 1996. For the purpose of this study, leadership in general, and authentic leadership in particular, were explored in terms of the actions of former mayor of New York City, Rudolph Giuliani, who displayed authentic leadership in action during the tragic aftermath of the World Trade Centre attacks. Authentic leadership development tends to be triggered by a negative event (as in the case of 9/11 for Giuliani, for example. Since there is limited knowledge of how a positive event may trigger authentic leadership development, the aim of this study was to explore the potential of Appreciative Inquiry (AI - an affirmative mode of action research - as a positive trigger event for authentic leadership development. The results indicated that this positive approach to change could indeed be implemented for this purpose.

  18. Noncontact surface thermometry for microsystems: LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Abel, Mark (Georgia Institute of Technology, Atlanta, GA); Beecham, Thomas (Georgia Institute of Technology, Atlanta, GA); Graham, Samuel (Georgia Institute of Technology, Atlanta, GA); Kearney, Sean Patrick; Serrano, Justin Raymond; Phinney, Leslie Mary

    2006-10-01

    We describe a Laboratory Directed Research and Development (LDRD) effort to develop and apply laser-based thermometry diagnostics for obtaining spatially resolved temperature maps on working microelectromechanical systems (MEMS). The goal of the effort was to cultivate diagnostic approaches that could adequately resolve the extremely fine MEMS device features, required no modifications to MEMS device design, and which did not perturb the delicate operation of these extremely small devices. Two optical diagnostics were used in this study: microscale Raman spectroscopy and microscale thermoreflectance. Both methods use a low-energy, nonperturbing probe laser beam, whose arbitrary wavelength can be selected for a diffraction-limited focus that meets the need for micron-scale spatial resolution. Raman is exploited most frequently, as this technique provides a simple and unambiguous measure of the absolute device temperature for most any MEMS semiconductor or insulator material under steady state operation. Temperatures are obtained from the spectral position and width of readily isolated peaks in the measured Raman spectra with a maximum uncertainty near {+-}10 K and a spatial resolution of about 1 micron. Application of the Raman technique is demonstrated for V-shaped and flexure-style polycrystalline silicon electrothermal actuators, and for a GaN high-electron-mobility transistor. The potential of the Raman technique for simultaneous measurement of temperature and in-plane stress in silicon MEMS is also demonstrated and future Raman-variant diagnostics for ultra spatio-temporal resolution probing are discussed. Microscale thermoreflectance has been developed as a complement for the primary Raman diagnostic. Thermoreflectance exploits the small-but-measurable temperature dependence of surface optical reflectivity for diagnostic purposes. The temperature-dependent reflectance behavior of bulk silicon, SUMMiT-V polycrystalline silicon films and metal surfaces is

  19. 38 CFR 10.46 - Authentication of statements supporting claims.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Authentication of statements supporting claims. 10.46 Section 10.46 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUSTED COMPENSATION Adjusted Compensation; General § 10.46 Authentication of statements...

  20. PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM

    Directory of Open Access Journals (Sweden)

    S. Prasanna

    2014-03-01

    Full Text Available Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.

  1. Cloud Computing Integrated Multi-Factor Authentication Framework Application in Logistics Information Systems

    Directory of Open Access Journals (Sweden)

    Zeynel Erdi Karabulut

    2017-12-01

    Full Text Available As new technology enables firms to perform many daily processes easier the need of authentication and authorization process is becoming an integral part of many businesses. Also mobile applications are very popular nowadays play an important role in our lives. Such demands are not only limited to Logistics Information Systems (LIS but many field of information system as well. In this study multi-dimensional authentication which consist of online biometric face detection integrated as cloud computing software as a Service (SaaS, Near Field Communication (NFC card authentication, location confirmation, and temporal data confirmation are gathered together to fulfill different scenarios of authentication needs of business. Microsoft Face API (Application Program Interface, SAAS (software as a service has been used in face recognition module of developed mobile application. The face recognition module of the mobile application has been tested with Yale Face Database. Location, temporal data and NFC card information are collected and confirmed by the mobile application for authentication and authorization. These images were tested with our facial recognition module and confusion matrices were created. The accuracy of the system after the facial recognition test was found to be 100%. NFC card, location and temporal data authentication not only further increases security level but also fulfils many business authentication scenarios successfully. To the best of our knowledge there is no other authentication model other than implemented one that has a-4-factor confirmation including biometric face identification, NFC card authentication, location confirmation and temporal data confirmation.

  2. A New Quantum Secure Direct Communication Scheme with Authentication

    International Nuclear Information System (INIS)

    Dan, Liu; Chang-Xing, Pei; Dong-Xiao, Quan; Nan, Zhao

    2010-01-01

    A new quantum secure direct communication (QSDC) scheme with authentication is proposed based on polarized photons and EPR pairs. EPR pairs are used to transmit information, while polarized photons are used to detect Eve and their encoding bases are used to transmit authentication information. Alice and Bob have their own identity number which is shared by legal users only. The identity number is encoded on the bases of polarized photons and distilled if there is no Eve. Compared with other QSDC schemes with authentication, this new scheme is considerably easier and less expensive to implement in a practical setting

  3. Teaching Children Foreign-Language Grammar: Are Authentic Materials Appropriate?

    Directory of Open Access Journals (Sweden)

    Olga Malova

    2016-10-01

    Full Text Available The paper discusses authentic materials as a resource for teaching grammar to young learners. Difficulties in foreign-language grammar learning for Russian pupils are presented, and typical challenges are described. The paper provides a pre-/post-intervention study of the development of children’s grammar skills. The research question is, “How does one use authentic materials for teaching grammar in an English as a foreign language (EFL classroom?” A qualitative method is used to assess the learning outcomes of using authentic materials in teaching grammar to eight–nine-year-old pupils (the second year of studying English.

  4. Self-authentication of value documents

    Science.gov (United States)

    Hayosh, Thomas D.

    1998-04-01

    To prevent fraud it is critical to distinguish an authentic document from a counterfeit or altered document. Most current technologies rely on difficult-to-print human detectable features which are added to a document to prevent illegal reproduction. Fraud detection is mostly accomplished by human observation and is based upon the examiner's knowledge, experience and time allotted for examination of a document. Another approach to increasing the security of a value document is to add a unique property to each document. Data about that property is then encoded on the document itself and finally secured using a public key based digital signature. In such a scheme, machine readability of authenticity is possible. This paper describes a patent-applied-for methodology using the unique property of magnetic ink printing, magnetic remanence, that provides for full self- authentication when used with a recordable magnetic stripe for storing a digital signature and other document data. Traditionally the authenticity of a document is determined by physical examination for color, background printing, paper texture, printing resolution, and ink characteristics. On an initial level, there may be numerous security features present on a value document but only a few can be detected and evaluated by the untrained individual. Because security features are normally not standardized except on currency, training tellers and cashiers to do extensive security evaluation is not practical, even though these people are often the only people who get a chance to closely examine the document in a payment system which is back-end automated. In the context of this paper, one should be thinking about value documents such as commercial and personal checks although the concepts presented here can easily be applied to travelers cheques, credit cards, event tickets, passports, driver's licenses, motor vehicle titles, and even currency. For a practical self-authentication system, the false alarms

  5. EAP-Based Authentication for Ad Hoc Network

    OpenAIRE

    Bhakti, Muhammad Agni Catur; Abdullah, Azween; Jung, Low Tan

    2007-01-01

    Wireless network has been deployed worldwide, but some security issues in wireless network might haveprevented its further acceptance. One of the solutions to overcome the limitation of wireless network security isthe IEEE 802.1X specification, a mechanism for port-based network access control, which is based onExtensible Authentication Protocol (EAP). It is an authentication framework that can support multipleauthentication methods. EAP can run over many types of data-link layer and it is fl...

  6. Photon-counting multifactor optical encryption and authentication

    International Nuclear Information System (INIS)

    Pérez-Cabré, E; Millán, M S; Mohammed, E A; Saadon, H L

    2015-01-01

    The multifactor optical encryption authentication method [Opt. Lett., 31 721-3 (2006)] reinforces optical security by allowing the simultaneous authentication of up to four factors. In this work, the photon-counting imaging technique is applied to the multifactor encrypted function so that a sparse phase-only distribution is generated for the encrypted data. The integration of both techniques permits an increased capacity for signal hiding with simultaneous data reduction for better fulfilling the general requirements of protection, storage and transmission. Cryptanalysis of the proposed method is carried out in terms of chosen-plaintext and chosen-ciphertext attacks. Although the multifactor authentication process is not substantially altered by those attacks, its integration with the photon-counting imaging technique prevents from possible partial disclosure of any encrypted factor, thus increasing the security level of the overall process. Numerical experiments and results are provided and discussed. (paper)

  7. Wireless technology infrastructures for authentication of patients: PKI that rings.

    Science.gov (United States)

    Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D

    2005-01-01

    As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system.

  8. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    Science.gov (United States)

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  9. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication of foreign extradition papers. 92.40 Section 92.40 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign...

  10. Enhanced ATM Security using Biometric Authentication and Wavelet Based AES

    Directory of Open Access Journals (Sweden)

    Sreedharan Ajish

    2016-01-01

    Full Text Available The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption Standard (AES algorithm. Two levels of security are provided in this proposed design. Firstly we consider the security level at the client side by providing biometric authentication scheme along with a password of 4-digit long. Biometric authentication is achieved by considering the fingerprint image of the client. Secondly we ensure a secured communication link between the client machine to the bank server using an optimized energy efficient and wavelet based AES processor. The fingerprint image is the data for encryption process and 4-digit long password is the symmetric key for the encryption process. The performance of ATM machine depends on ultra-high-speed encryption, very low power consumption, and algorithmic integrity. To get a low power consuming and ultra-high speed encryption at the ATM machine, an optimized and wavelet based AES algorithm is proposed. In this system biometric and cryptography techniques are used together for personal identity authentication to improve the security level. The design of the wavelet based AES processor is simulated and the design of the energy efficient AES processor is simulated in Quartus-II software. Simulation results ensure its proper functionality. A comparison among other research works proves its superiority.

  11. FAST PALMPRINT AUTHENTICATION BY SOBEL CODE METHOD

    Directory of Open Access Journals (Sweden)

    Jyoti Malik

    2011-05-01

    Full Text Available The ideal real time personal authentication system should be fast and accurate to automatically identify a person’s identity. In this paper, we have proposed a palmprint based biometric authentication method with improvement in time and accuracy, so as to make it a real time palmprint authentication system. Several edge detection methods, wavelet transform, phase congruency etc. are available to extract line feature from the palmprint. In this paper, Multi-scale Sobel Code operators of different orientations (0?, 45?, 90?, and 135? are applied to the palmprint to extract Sobel-Palmprint features in different direc- tions. The Sobel-Palmprint features extracted are stored in Sobel- Palmprint feature vector and matched using sliding window with Hamming Distance similarity measurement method. The sliding win- dow method is accurate but time taking process. In this paper, we have improved the sliding window method so that the matching time reduces. It is observed that there is 39.36% improvement in matching time. In addition, a Min Max Threshold Range (MMTR method is proposed that helps in increasing overall system accuracy by reducing the False Acceptance Rate (FAR. Experimental results indicate that the MMTR method improves the False Acceptance Rate drastically and improvement in sliding window method reduces the comparison time. The accuracy improvement and matching time improvement leads to proposed real time authentication system.

  12. AUTHENTIC MATERIALS VS TEXTBOOKS IN ESP (ENGLISH FOR SPECIFIC PURPOSES

    Directory of Open Access Journals (Sweden)

    Elena Spirovska Tevdovska

    2018-03-01

    Full Text Available The purpose of this study is to analyze and compare the value of authentic materials and textbooks in ESP English for Specific Purposes learning and teaching context. The study compares the characteristics of the authentic materials and the characteristics of textbooks designed and selected for the purpose of teaching and learning English as a foreign language in ESP setting. The study defines the role of materials in ESP setting and compares the benefits and possible drawbacks of both types of materials and resources: the authentic materials in English for Specific Purposes context compared to traditional textbooks designed for the purpose of teaching and learning English for Specific Purposes. The study identifies the benefits of authentic materials, which include the richness as an input source and the authenticity of the tasks offered to learners, as well as the negative sides of authentic materials, which include the level of difficulty that these materials might present to the learner . Furthermore, the study identifies the benefits of textbooks, which include available sources for the learners and less time consuming class preparation for the teachers, as well as the drawbacks which include the impossibility of finding a textbook which corresponds entirely to learners’ needs. In addition, the article focuses on teachers’ attitudes and opinions regarding the appropriateness and exploitability of each source and their preferences and reasons for material selection. The target population consists of eleven lecturers who teach English for Specific Purposes in tertiary education. The lecturers teach various branches of ESP, including ESP for Computer Sciences, Business, Communication and Legal Studies. Data collection is conducted through a specifically designed questionnaire, addressing the questions of materials selection, teachers’ preferences regarding textbooks or authentic materials and the selection criteria applied by the

  13. Anonymous authentication and location privacy preserving schemes for LTE-A networks

    Directory of Open Access Journals (Sweden)

    Zaher Jabr Haddad

    2017-11-01

    Full Text Available Long Term Evaluation Advanced (LTE-A is the third generation partnership project for cellular network that allows subscribers to roam into networks (i.e., the Internet and wireless connections using spacial purpose base-stations, such as wireless access points and home node B. In such LTE-A based networks, neither base-stations, nor the Internet and wireless connections are trusted because base-stations are operated by un-trusted subscribers. Attackers may exploit these vulnerabilities to violate the privacy of the LTE-A subscribers. On the other hand, the tradeoff between privacy and authentication is another challenge in such networks. Therefore, in this paper, we propose two anonymous authentication schemes based on one-time pseudonymes and Schnorr Zero Knowledge Protocols. Instead of the international mobile subscriber identity, these schemes enable the user equipment, base-stations and mobility management entity to mutually authenticate each others and update the location of the user equipment without evolving the home subscriber server. The security analysis demonstrate that the proposed schemes thwart security and privacy attacks, such as malicious, international mobile subscriber identity catching, and tracking attacks. Additionally, our proposed schemes preserve the location privacy of user equipment since no entity except the mobility management entity and Gate-Way Mobile Location Center can link between the pseudonymes and the international mobile subscriber identity. Also attackers have no knowledge about international mobile subscriber identity. Hence, the proposed schemes achieve backward/forward secrecy. Furthermore, the performance evaluation shows that the proposed handover schemes impose a small overhead on the mobile nodes and it has smaller computation and communication overheads than those in other schemes.

  14. Flexible and Transparent User Authentication for Mobile Devices

    Science.gov (United States)

    Clarke, Nathan; Karatzouni, Sevasti; Furnell, Steven

    The mobile device has become a ubiquitous technology that is capable of supporting an increasingly large array of services, applications and information. Given their increasing importance, it is imperative to ensure that such devices are not misused or abused. Unfortunately, a key enabling control to prevent this, user authentication, has not kept up with the advances in device technology. This paper presents the outcomes of a 2 year study that proposes the use of transparent and continuous biometric authentication of the user: providing more comprehensive identity verification; minimizing user inconvenience; and providing security throughout the period of use. A Non-Intrusive and Continuous Authentication (NICA) system is described that maintains a continuous measure of confidence in the identity of the user, removing access to sensitive services and information with low confidence levels and providing automatic access with higher confidence levels. An evaluation of the framework is undertaken from an end-user perspective via a trial involving 27 participants. Whilst the findings raise concerns over education, privacy and intrusiveness, overall 92% of users felt the system offered a more secure environment when compared to existing forms of authentication.

  15. AUTHENTICITY OF HUMAN BEHAVIOR IN FREUD AND HEIDEGGER

    Directory of Open Access Journals (Sweden)

    IONUŢ ŞTEFAN

    2016-11-01

    Full Text Available The research theme is the question of the authenticity of human behavior examined from two perspectives: the psychoanalytical one, developed by Sigmund Freud, and the one of philosophy of being embodied by Martin Heidegger. As concerns the Freudian psychoanalysis, I am primarily interested in the conflict among: self, ego, and superego. Because of the requisitions of the supergo, the subject mostly behaves according to the censorships imposed by this psychic instance. The self, dominated by sexuality and aggressiveness, exhibits the pulsional tendency to manifest itself in the conscious behavior of the individual. As regards the Heideggerian endeavor, I am interested in distinguishing between the authentic and non-authentic existences. In Heidegger’s vision, the nonauthentic existence manifests when we are living together with the others in society. This is the horizon of the impersonal “as it is done”, the Heideggerian das Man, which may be understood by the three dimensions: curiosity, ambiguity, and chatter. The authentic existence manifests when the individuals live on their own, in privacy, and acknowledge the fact that their existence develops over a strictly determined time period, the imminent confrontation with their own death coming closer and closer.

  16. Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations

    Science.gov (United States)

    Donohue, John T.; Critchfield, Anna R.

    2000-01-01

    We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.

  17. Authenticity anyone? : the enhancement of emotions via neuro-psychopharmacology

    NARCIS (Netherlands)

    Kraemer, U.A.F.

    2011-01-01

    This article will examine how the notion of emotional authenticity is intertwined with the notions of naturalness and artificiality in the context of the recent debates about ‘neuro-enhancement’ and ‘neuro-psychopharmacology.’ In the philosophy of mind, the concept of authenticity plays a key role

  18. A novel image authentication scheme based on hyper-chaotic cell neural network

    International Nuclear Information System (INIS)

    Gao Tiegang; Gu Qiaolun; Emmanuel, Sabu

    2009-01-01

    This paper presents a new image authentication scheme based on cell neural network with hyper-chaos characteristics (HCCNN). In the scheme, the authentication code, which is used as secret key and the pixel values of image are used for the input of HCCNN. The secret information that HCCNN produces is transmitted to the receiving end through secret channel. The receiver can then use the received secret information to authenticate the suspect image by comparing the original authentication code with that calculated from the suspect image. Simulations show that the suggested image authentication algorithm has the advantages of large key space and high security, and moreover, it can detect and locate the position of any slightly tampered parts of a suspect image.

  19. The Use of "Real" English in Language Learning: Making Authentic NS Speech Accessible Through a Novel Digital Slow-down Tool

    OpenAIRE

    Meinardi, Marty

    2006-01-01

    This project is concerned with the design of English as a Second Language (ESL) courseware for Computer Assisted Language Learning (CALL). It arises out of the Enterprise Ireland funded DITCALL (Digital Interactive Toolkit for Computer Assisted Language learning) project. The focus of the research for this courseware is on using authentic video and audio material that is as natural and true to life as possible and providing adequate, pedagogically efficient and visually pleasing lesson materi...

  20. USING MAGAZINES AS AUTHENTIC MATERIALS ON TEACHING MORPHOLOGY

    Directory of Open Access Journals (Sweden)

    Maria Yosephin Widarti Lestari

    2017-04-01

    Full Text Available As one of authentic materials, magazines can facilitate English language teaching and learning. Teachers and students can use magazines as the authentic materials since they can afford to buy it, it is easy to find, and its content is in accordance with the changing of time. It is inevitable that learning from authentic materials has strong appeal for students. In teaching Morphology, magazine can be used as a tool to demonstrate how new words are formed and in this kind of mass media, most new words first appeared. In morphological process, there are some types of how new words are created. In this research, four types are described, e.g. compounding which forms a word out of two or more root morphemes, blending which creates words from parts of two other words, clipping which is the word formation process consisting in the reduction of a word to one of its parts and acronyms by taking the initial letters of a phrase and making a word out of it. The paper aims to show an effort to enrich students‘ vocabulary by using magazine articles on technology as authentic materials. The result shows that authentic materials related to articles on technology can be a tool for teachers to introduce how new words are formed, and the students can feel the way of word forming because they use the words in their daily-life communication. The research also shows that most of data are relatively new words because the words are not found in the dictionary.