WorldWideScience

Sample records for fy06 ipv6 deployment

  1. A report on FY06 IPv6 deployment activities and issues at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2006-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. IPv6 deployment in government network backbones has been mandated to occur by 2008. This paper explores the readiness of the Sandia National Laboratories' network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint, work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution and Network System Design & Implementation Departments.

  2. Deployment IPv6 over IPv4 network infrastructure

    OpenAIRE

    Hoang, Tien Dung

    2015-01-01

    The purpose of this thesis is doing the research about IPv6, concentrate in how to deploy an IPv6 network based on IPv4 network without making any interruption to IPv4 network. This thesis is made for Financing and Promoting Technology Corporation (FPT) in Vietnam. This thesis is completed in two main parts. The theoretical part is making research about IPv4 and IPv6 to have the point of view about IPv4 and IPv6 basically, and from those one, seeing the advantages of IPv6 comparing wit...

  3. IPv6 deployment and management

    CERN Document Server

    Dooley, Michael

    2013-01-01

    A guide for understanding, deploying, and managing Internet Protocol version 6 The growth of the Internet has created a need for more addresses than are available with Internet Protocol version 4 (IPv4)-the protocol currently used to direct almost all Internet traffic. Internet Protocol version 6 (IPv6)-the new IP version intended to ultimately succeed IPv4-will expand the addressing capacity of the Internet to support the explosive growth of users and devices on the Internet as well as add flexibility to allocating addresses and efficiency for routing traffic. IPv6 Deploy

  4. A report on IPv6 deployment activities and issues at Sandia National Laboratories:FY2007.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang; Maestas, Joseph H.

    2007-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. As the emerging Internet network protocol, SNL needs to prepare for its eventual deployment in international, national, customer, and local networks. Additionally, the United States Office of Management and Budget has mandated that IPv6 deployment in government network backbones occurs by 2008. This paper explores the readiness of the Sandia National Laboratories network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution, the Communication & Network Systems, and Network System Design & Implementation Departments.

  5. The production deployment of IPv6 on WLCG

    Science.gov (United States)

    Bernier, J.; Campana, S.; Chadwick, K.; Chudoba, J.; Dewhurst, A.; Eliáš, M.; Fayer, S.; Finnern, T.; Grigoras, C.; Hartmann, T.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Macmahon, E.; Martelli, E.; Millar, A. P.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Voicu, R.; Walker, C. J.; Wildish, T.

    2015-12-01

    The world is rapidly running out of IPv4 addresses; the number of IPv6 end systems connected to the internet is increasing; WLCG and the LHC experiments may soon have access to worker nodes and/or virtual machines (VMs) possessing only an IPv6 routable address. The HEPiX IPv6 Working Group has been investigating, testing and planning for dual-stack services on WLCG for several years. Following feedback from our working group, many of the storage technologies in use on WLCG have recently been made IPv6-capable. This paper presents the IPv6 requirements, tests and plans of the LHC experiments together with the tests performed on the group's IPv6 test-bed. This is primarily aimed at IPv6-only worker nodes or VMs accessing several different implementations of a global dual-stack federated storage service. Finally the plans for deployment of production dual-stack WLCG services are presented.

  6. Deployment of IPv6-only CPU resources at WLCG sites

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.

    2017-10-01

    The fraction of Internet traffic carried over IPv6 continues to grow rapidly. IPv6 support from network hardware vendors and carriers is pervasive and becoming mature. A network infrastructure upgrade often offers sites an excellent window of opportunity to configure and enable IPv6. There is a significant overhead when setting up and maintaining dual-stack machines, so where possible sites would like to upgrade their services directly to IPv6 only. In doing so, they are also expediting the transition process towards its desired completion. While the LHC experiments accept there is a need to move to IPv6, it is currently not directly affecting their work. Sites are unwilling to upgrade if they will be unable to run LHC experiment workflows. This has resulted in a very slow uptake of IPv6 from WLCG sites. For several years the HEPiX IPv6 Working Group has been testing a range of WLCG services to ensure they are IPv6 compliant. Several sites are now running many of their services as dual-stack. The working group, driven by the requirements of the LHC VOs to be able to use IPv6-only opportunistic resources, continues to encourage wider deployment of dual-stack services to make the use of such IPv6-only clients viable. This paper presents the working group’s plan and progress so far to allow sites to deploy IPv6-only CPU resources. This includes making experiment central services dual-stack as well as a number of storage services. The monitoring, accounting and information services that are used by jobs also need to be upgraded. Finally the VO testing that has taken place on hosts connected via IPv6-only is reported.

  7. IPV6 Deployment - Mauritius to benefit from Opportunities and World ...

    African Journals Online (AJOL)

    user1

    gaming, and many other new applications cost even higher to be deployed on IPv4 ... mitigate the effects of the imminent depletion of the IPv4 address space and .... The government of Korea plans to achieve complete IPv6 transition in the.

  8. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  9. Deployment of 464XLAT (RFC6877) alongside IPv6-only CPU resources at WLCG sites

    Science.gov (United States)

    Froy, T. S.; Traynor, D. P.; Walker, C. J.

    2017-10-01

    IPv4 is now officially deprecated by the IETF. A significant amount of effort has already been expended by the HEPiX IPv6 Working Group on testing dual-stacked hosts and IPv6-only CPU resources. Dual-stack adds complexity and administrative overhead to sites that may already be starved of resource. This has resulted in a very slow uptake of IPv6 from WLCG sites. 464XLAT (RFC6877) is intended for IPv6 single-stack environments that require the ability to communicate with IPv4-only endpoints. This paper will present a deployment strategy for 464XLAT, operational experiences of using 464XLAT in production at a WLCG site and important information to consider prior to deploying 464XLAT.

  10. Evaluating IPv6 Adoption in the Internet

    Science.gov (United States)

    Colitti, Lorenzo; Gunderson, Steinar H.; Kline, Erik; Refice, Tiziana

    As IPv4 address space approaches exhaustion, large networks are deploying IPv6 or preparing for deployment. However, there is little data available about the quantity and quality of IPv6 connectivity. We describe a methodology to measure IPv6 adoption from the perspective of a Web site operator and to evaluate the impact that adding IPv6 to a Web site will have on its users. We apply our methodology to the Google Web site and present results collected over the last year. Our data show that IPv6 adoption, while growing significantly, is still low, varies considerably by country, and is heavily influenced by a small number of large deployments. We find that native IPv6 latency is comparable to IPv4 and provide statistics on IPv6 transition mechanisms used.

  11. Deploying IPv6 in 3GPP networks evolving mobile broadband from 2G to LTE and beyond

    CERN Document Server

    Korhonen, Jouni; Soininen, Jonne

    2013-01-01

    Deploying IPv6 in 3GPP Networks - Evolving Mobile Broadband from 2G to LTE and Beyond  A practical guide enabling mobile operators to deploy IPv6 with confidence The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of the 3GPP technology is in the Global Mobile Service (GSM) technology and the work done in European Telecommunications Standards Institute (ETSI). This primary voice service network has evolved to be the dominant mobile Internet access technology. Deploying IPv6 in

  12. IPv6 testing and deployment at Prague Tier 2

    Science.gov (United States)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-12-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  13. IPv6 testing and deployment at Prague Tier 2

    International Nuclear Information System (INIS)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-01-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  14. Comparison Between IPv4 to IPv6 Transition Techniques

    OpenAIRE

    Cordeiro, Edwin; Carnier, Rodrigo; Zucchi, Wagner L

    2016-01-01

    The IPv4 addresses exhaustion demands a protocol transition from IPv4 to IPv6. The original transition technique, the dual stack, is not widely deployed yet and it demanded the creation of new transition techniques to extend the transition period. This work makes an experimental comparison of techniques that use dual stack with a limited IPv4 address. This limited address might be a RFC 1918 address with a NAT at the Internet Service Provider (ISP) gateway, also known as Carrier Grade NAT (CG...

  15. IPv6 in ESnet

    International Nuclear Information System (INIS)

    Matthews, W.; Fink, B.; Hicks, S.; Grigaliunas, V.

    2001-01-01

    The importance of the Internet to modern High Energy Physics collaborators is clearly immense, and understanding how new developments in network technology impact networks is critical to the future design of experiments. The next generation Internet Protocol (IPv6) is being deployed on testbeds and production networks throughout the world. The protocol has been designed to solve todays internet problems, and many of the features will be core Internet services in the future. In this talk the features of the protocol will be described. Details will be given on the deployment at sites important to High Energy Physics Research and the network services operating at these sites. In particular IPv6 deployment on the U.S. Energy Sciences Network (ESnet) will be reviewed. The connectivity and performance between High Energy Physics Laboratories, Universities and Institutes will be discussed

  16. Implementation of IPv6 at the PřF JU

    OpenAIRE

    JOUDAL, Jakub

    2011-01-01

    Aspects of IPv6 implementation. Is the current network structure capable of deploying IPv6 JU? What would this change mean? What will be the financial costs of transition? The advantages of IPv6 in terms of high schools.

  17. IPV6 Deployment - Mauritius to benefit from Opportunities and World ...

    African Journals Online (AJOL)

    The current standard protocol, IPV4, has reached its limit in terms of addressing possibilities, being limited by the 32-bits addressing scheme. Its successor, IPV6, had been devised since the mid 1990's. In addition to handling the address limitations, IPV6 also includes a number of improved features, making it superior to ...

  18. The Deployment of IPv6 in an IPv4 World and Transition Strategies.

    Science.gov (United States)

    Bouras, C.; Ganos, P.; Karaliotas, A.

    2003-01-01

    The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…

  19. IPv6-protokolla

    OpenAIRE

    Hautanen, Jukka-Pekka

    2012-01-01

    Tämän työn tarkoituksena on tutkia IPv6-protokollaa ja IPv6-protokollan yhteensopivuutta IPv4-protokollan kanssa. Työn alussa tarkastellaan IPv6-protokollan historiaa ja tämän hetkistä levinneisyyttä. Työssä paneudutaan tarkemmin IPv6-protokollan pääpiirteisiin: IPv6-protokollan osoitetyypit ja niiden esitystavat, aliverkotus, IPv6-protokollan uudistetun otsikon rakenne ja uudet lisäotsikot. Edellä mainittuja pääpiirteitä verrataan tarvittaessa IPv4-protokollaan, jotta nähdään parannukset...

  20. Implementasi Migrasi Ipv4 Ke Ipv6

    OpenAIRE

    Syafrizal, Melwin; Qamar, Syamsul; Aji, Damawan Bayu

    2013-01-01

    IPv4 yang digunakan di jaringan publik (internet) sudah habis, sehingga kebutuhan koneksi internet baru tidak dapat dilayani. Layanan baru, konten baru, domain name baru, server baru, router baru tidak dapat koneksi ke internet, kecuali menggunakan IPv6. Migrasi IPv4 ke IPv6 bukan hal yang mudah, pengetahuan baru tentang IPv6 perlu dipelajari, kondisi-kondisi yang akan dialami akibat Perubahan IP, mekanisme transisi, atau mekanisme routing perlu dipahami. Cara-cara konfigurasi IPv6 pada berba...

  1. IPv4-protokollasta siirtyminen IPv6-protokollaan

    OpenAIRE

    Ylituomaala, Jaakko

    2011-01-01

    Tässä työssä tutkitaan IPv6-osoiteavaruutta, sekä IPv6-protokollan yhteensopivuutta IPv4-protokollan kanssa. Työssä käydään läpi myös yleisimmät IPv4-yhteensopivat IPv6-reititysmenetelmät. Tutkimuksessa tutustutaan pääpiirteittäin IPv4-osoiteluokkiin, itse osoitteisiin ja IPv4-headeriin. IPv4 osoiteryhmiä on viisi, jotka ovat A, B, C, D ja E. Lisäksi luodaan katsaus IPv4-headerin eri osioihin ja tutustutaan niiden käyttötarkoituksiin. Työssä käydään läpi myös osittain NAT-toiminto. Tu...

  2. IPv6 Essentials

    CERN Document Server

    Hagen, Silvia

    2006-01-01

    IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. Aimed at system and network administrators, engineers, network designers, and IT managers, this book will help you understand, plan for, design, and integrate IPv6 into your current IPv4 infrastructure

  3. A Brief History of MPLS Usage in IPv6

    OpenAIRE

    Vanaubel, Yves; Mérindol, Pascal; Pansiot, Jean-Jacques; Donnet, Benoît

    2016-01-01

    Recent researches have stated the fast deployment of IPv6. It has been demonstrated that IPv6 grows much faster, being so more and more adopted by both Internet service providers but also by servers and end-hosts. In parallel, researches have been conducted to discover and assess the usage of MPLS tunnels. Indeed, recent developments in the ICMP protocol make certain categories of MPLS tunnels transparent to traceroute probing. However, these studies focus only on IPv4, where MPLS is st...

  4. Transition from IPv4 to IPv6

    DEFF Research Database (Denmark)

    Henten, Anders; Tadayoni, Reza

    The paper examines the transition from IPv4 to IPv6. More specifically, the aim of the paper is to present information on the status of the transition process and on the drivers and barriers concerning this transition. This includes an update on the availability of IPv4 addresses and on how far t...... the adoption of IPv6 has come. It also includes a discussion on what but also who the drivers and barriers are, including an examination of the implications of implementing transfer markets for IPv4 addresses.......The paper examines the transition from IPv4 to IPv6. More specifically, the aim of the paper is to present information on the status of the transition process and on the drivers and barriers concerning this transition. This includes an update on the availability of IPv4 addresses and on how far...

  5. A Discussion on Internet Security Based on the IPv6 agreement%基于IPv6协议的网络安全问题探讨

    Institute of Scientific and Technical Information of China (English)

    张贵军

    2011-01-01

    With the increase of the Internet application of next generation, our government、net service providers and consumers paid more attention to the safety of IPv6. This essay introduced the IPv6 agreement first, then analyzed some security issues. We hope these problems can be solved in the deploy process of IPv6 agreement.%随着下一代互联网应用的不断增加,国家、网络运营商和用户对于IPv6的安全问题日益重视。本文在对IPv6协议简单介绍的基础上,分析了IPv6网络目前存在的一些安全问题,希望在部署IPv6协议的过程中能够不断地解决这些问题。

  6. WLCG and IPv6 - the HEPiX IPv6 working group

    Science.gov (United States)

    Campana, S.; Chadwick, K.; Chen, G.; Chudoba, J.; Clarke, P.; Eliáš, M.; Elwell, A.; Fayer, S.; Finnern, T.; Goossens, L.; Grigoras, C.; Hoeft, B.; Kelsey, D. P.; Kouba, T.; López Muñoz, F.; Martelli, E.; Mitchell, M.; Nairz, A.; Ohrenberg, K.; Pfeiffer, A.; Prelz, F.; Qi, F.; Rand, D.; Reale, M.; Rozsa, S.; Sciaba, A.; Voicu, R.; Walker, C. J.; Wildish, T.

    2014-06-01

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applying for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). This paper describes the work done by the working group and its future plans.

  7. WLCG and IPv6 – the HEPiX IPv6 working group

    International Nuclear Information System (INIS)

    Campana, S; Elwell, A; Goossens, L; Grigoras, C; Martelli, E; Nairz, A; Pfeiffer, A; Chadwick, K; Chen, G; Chudoba, J; Eliáš, M; Kouba, T; Clarke, P; Fayer, S; Finnern, T; Ohrenberg, K; Hoeft, B; Kelsey, D P; Muñoz, F López; Mitchell, M

    2014-01-01

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applying for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). This paper describes the work done by the working group and its future plans.

  8. Packet traffic features of IPv6 and IPv4 protocol traffic

    OpenAIRE

    ÇİFLİKLİ, Cebrail; GEZER, Ali; ÖZŞAHİN, Abdullah Tuncay

    2012-01-01

    Nowadays, the IPv6 protocol is in a transition phase in operational networks. The ratio of its traffic volume is increasing day by day. The many provided facilities for IPv6 connection increasethe total IPv6 traffic load. IPv6-over-IPv4 tunnels, pilot programsto provide IPv6 connections, IPv6/IPv4 dual stack operating systems,and free IPv6 tunnel brokers cause the IPv6 protocol to expand quickly. For efficient resource utilization, the characteristics of network traffic should be determ...

  9. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  10. A Comparison of Internet Protocol (IPv6 Security Guidelines

    Directory of Open Access Journals (Sweden)

    Steffen Hermann

    2014-01-01

    Full Text Available The next generation of the Internet Protocol (IPv6 is currently about to be introduced in many organizations. However, its security features are still a very novel area of expertise for many practitioners. This study evaluates guidelines for secure deployment of IPv6, published by the U.S. NIST and the German federal agency BSI, for topicality, completeness and depth. The later two are scores defined in this paper and are based on the Requests for Comments relevant for IPv6 that were categorized, weighted and ranked for importance using an expert survey. Both guides turn out to be of practical value, but have a specific focus and are directed towards different audiences. Moreover, recommendations for possible improvements are presented. Our results could also support strategic management decisions on security priorities as well as for the choice of security guidelines for IPv6 roll-outs.

  11. IPv6 testing and deployment at Prague Tier 2

    Czech Academy of Sciences Publication Activity Database

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek; Fiala, Lukáš

    2012-01-01

    Roč. 396, č. 4 (2012), s. 1-6 ISSN 1742-6588. [International Conference on Computing in High Energy and Nuclear Physics 2012 (CHEP2012). New York, 21.05.2012-25.05.2012] Institutional research plan: CEZ:AV0Z10100502 Keywords : IPv6 grid computing HEP Subject RIV: BF - Elementary Particles and High Energy Physics http://iopscience.iop.org/1742-6596/396/4/042034

  12. IPv4 to IPv6 Transformation Schemes

    Science.gov (United States)

    Miyakawa, Shin

    According to the recent observations of IPv4 (Internet Protocol version 4) address allocation status, it will be running out within few years. Consequently, to ensure the continuous extension of the Internet operation, introducing IPv6 (Internet Protocol version 6) protocol is surely needed. But at the same time, such transformation must be “smooth” for every Internet users and be compatible with today's IPv4 based practices. This paper describes several techniques and usage scenario which are discussed mainly in the IETF — Internet Engineering Task Force — and tried to be implemented as prototype products to transform today's Internet towards the IPv6 based one.

  13. Problems of the internet transition from protocol IPv4 to IPv6

    OpenAIRE

    Potrebuješ , Nejc

    2013-01-01

    Internet currently coexist of older IPv4 networks, new IPv6 network and networks that supports both IPv6 and IPv4 stack. IPv4 and IPv6 networks are unfortunately incompatible. To enable communication between these two networks several mechanisms were developed. These mechanisms are so called »IPv4/v6 transition mechanisms«. In this thesis first there are IPv4 and IPv6 protocols presented, disadvantages of an IPv4 protocol and advantages of an IPv6 protocol. Further there are some transitio...

  14. IPv6:n tietoturvaominaisuudet

    OpenAIRE

    Sorsa, Kari

    2013-01-01

    Opinnäytetyön tavoitteena on esitellä IPv6-protokolla ja selvittää sen tärkeimmät tietoturvaominaisuudet ja -riskit. Työtä tullaan käyttämään teoreettisena apuna Turun Ammattikorkeakoulun Lemminkäisenkadun toimipisteen laboratorioverkon siirtämisessä IPv6:een. Opinnäytetyö on jaettu kolmeen osaan. Ensimmäisessä esitellään lyhyesti IPv6:n historia ja kehitysvaiheet sekä uuden protokollan ominaisuudet. Toinen osa koostuu ominaisuus- ja tietoturvavertailusta IPv4:n ja IPv6:n välillä, jo...

  15. Planning for IPv6

    CERN Document Server

    Hagen, Silvia

    2011-01-01

    It's official: with IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level overview of the technical-and nontechnical-steps involved. Many of the challenges for your enterprise are on the organizational level, and solutions differ from company to company. IPv6 Essentials author Silvia Hagen, a protocol analysis and directory service expert who's worked with IPv6 international groups and forums for 10 years, supplies answers to the issues most frequently discussed by the clients she co

  16. A Case Study of IPv6 Network Performance: Packet Delay, Loss, and Reordering

    Directory of Open Access Journals (Sweden)

    Fuliang Li

    2017-01-01

    Full Text Available Internet Protocol (IP is used to identify and locate computers on the Internet. Currently, IPv4 still routes most Internet traffic. However, with the exhausting of IPv4 addresses, the transition to IPv6 is imminent, because, as the successor of IPv4, IPv6 can provide a larger available address space. Existing studies have addressed the notion that IPv6-centric next generation networks are widely deployed and applied. In order to gain a deep understanding of IPv6, this paper revisits several critical IPv6 performance metrics. Our extensive measurement shows that packet delay and loss rate of IPv6 are similar to IPv4 when the AS-level paths are roughly the same. Specifically, when the link utilization exceeds a threshold, for example, 0.83 in our study, variation of packet delay presents a similar pattern with the variation of link utilization. If packet delay of a path is large, packet-loss rate of that path is more likely to fluctuate. In addition, we conduct a first-ever analysis of packet reordering in IPv6 world. Few IPv6 probe packets are out-of-order and the reordering rate is 2.3⁎10-6, which is much lower than that of 0.79% in IPv4 world. Our analysis consolidates an experimental basis for operators and researchers of IPv6 networks.

  17. IPv6 Network Security using Snort

    OpenAIRE

    Kaur, Ravreet; Kumar, Sumit

    2013-01-01

    IPv6 is new routing protocol. IPv6 is introduced by IETF mainly due IPv4 address exhaustion but it is also an enhanced version of IPv4. There are many changes in IPv6 header, some fields from IPv6 header has been deprecated from IPv6 and some are newly added. There is also common misconception among people that IPv6 is more secure than IPv4, which is not true. Now a day's intruders are targeting IPv6 networks as it is widely being accepted by many organization for their network. An intruder c...

  18. PERFORMANCE ANALYSIS OF IPv4 AND IPv6 INTERNET TRAFFIC

    Directory of Open Access Journals (Sweden)

    Rupesh Jaiswal

    2015-12-01

    Full Text Available The gigantic growth of the internet communication technology has illustrated its value and benefits to private businesses, government organizations, worldwide professionals, academic institutes and individuals over the past few years. The size and range of computing devices connected to the internet, substantially increased because of IPv6 and offers the potential to establish a much more powerful internet compared to the IPv4. IPV6 developed by the IETF to deal with a shortage of IP addresses under IPv4. New features of IPv6 enhance packet processing speeds over routers, switches and end systems. These improved features will have different traffic characteristics than IPv4. The internet traffic which was earlier assumed as Poisson is now shown to have fractal characteristics as; heavy tailedness, self-similarity and long range dependency. Internet traffic showing above characteristics are found to have burstiness at multiple timescales. This behavior impacts network performance and degrades it substantially. It also increases complexity for network design and create difficulties to maintain desired QoS. IPv4 traffic has been well established as self-similar traffic. Nowadays, IPv6 forming a larger share of the internet traffic and it is pivotal to asses IPv6 with regards to fractal behavior. This will enable network designers to do necessary changes in the existing network to reconcile with IPv6. In this paper we compared IPv4 and IPv6 with respect to fractal behavioral characteristics. It is found that IPv6 shows higher degree of heavy tailedness, higher values of Hurst parameter values, higher fractal dimension values i.e. it is more self-similar, greater autocorrelation achieved even at larger lag and thus showing more burstiness.

  19. Perancangan dan Analisis Perbandingan Implementasi OSPF pada Jaringan IPv4 dan IPv6

    Directory of Open Access Journals (Sweden)

    PAULINE RAHMIATI

    2016-02-01

    Full Text Available Abstrak OSPF (Open Shortest Path First adalah suatu routing protokol bersifat terbuka dan didukung oleh berbagai perangkat network. IPv4 telah mencapai batas maksimum dalam jumlah alamat sehingga IPv6 merupakan solusi dalam hal tersebut. Seperti IPv4, IPv6 juga sudah mulai diimplementasikan untuk routing protokol OSPF, oleh karena itu pada penelitian ini akan dirancang suatu routing protokol OSPF IPv6 dan sebagai bahan perbandingan akan dibandingkan dengan OSPF IPv4. Software Cisco Packet Tracer 5.3 digunakan untuk mensimulasikan perancangan jaringan yang dibuat. Pada penelitian ini akan dibandingkan 2 buah jaringan berbasis routing protokol OSPF, yaitu OSPF untuk IPv4 dan IPv6. Skenario pertama dilakukan 100 kali dalam 5 kasus untuk mengetahui nilai delay OSPF IPv4 dan OSPF IPv6. Skenario kedua dilakukan pemutusan link dilakukan sebanyak 30 kali, hal yang dilihat dari pengujian ini adalah hasil trace route dari cost yang ada. Skenario ketiga dilakukan dengan mengamati waktu konvergensi dari OSPF IPv4 dan IPv6. Secara keseluruhan nilai delay OSPF IPv6 lebih kecil dibandingkan dengan OSPF IPv4 sebesar 3-6%, Trace route dan nilai cost pada OSPF IPv6 dan OSPF IPv4 sama tetapi nilai delay OSPF IPv6 lebih kecil sebesar 3-6% dan waktu konvergensi OSPF IPv4 bernilai sama dengan OSPF IPv6 yaitu 10 detik. Kata kunci: OSPF, IPv4, Ipv6, delay, konvergensi Abstract OSPF (Open Shortest Path First is a routing protocol that opened and supported by a wide range of network devices. IPv4 has reached the maximum limit on the number of addresses that IPv6 are a solution in this case. Same as IPv4, IPv6 also has begun to be implemented for the OSPF routing protocol, therefore this study wiould design an IPv6 OSPF routing protocol and as a comparison will be compared to IPv4 OSPF. Cisco Packet Tracer 5.3 software was used to simulate the made network design. This research would compare two pieces of network-based routing protocol OSPF, OSPF for IPv4 and IPv6. The

  20. Current Status of IPv6 Management

    OpenAIRE

    Astic , Isabelle; Festor , Olivier

    2002-01-01

    Nowadays, we are at an important time of the development of the IPv6 (Internet Protocol version 6) network. Until now, this protocol was used only between IPv6 «islands». These islands were connected by IPv4 (Internet Protocol version 4) networks. So the transport of IPv6 packets was made through IPv4 ones, or into MPLS (MultiProtocol Label Switching) tunnels. Now, that real IPv6 native equipment appears, it is possible to create real native IPv6 networks.Because in these networks, IPv4 does ...

  1. Esimerkkiyrityksen IPv6-lähiverkko

    OpenAIRE

    Palkki, Ville

    2013-01-01

    Insinöörityön tavoitteena oli suunnitella ja toteuttaa esimerkkiyrityksen IPv6-lähiverkko. Toisena tavoitteena oli suunnitella esimerkkiyrityksen siirtyminen IPv4-protokollasta IPv6-protokollaan. Työssä käsiteltiin IPv6-protokollaa ensin teoreettisesti ja tämän jälkeen suunniteltiin sekä rakennettiin toimiva IPv6-lähiverkko. Aluksi työssä käytiin läpi IPv6-protokollan etuja verrattuna vanhaan IPv4-protokollaan. Teoriaosuudessa selvitettiin myös IPv6-protokollan rakennetta ja lähetysformaa...

  2. DNS and BIND on IPv6

    CERN Document Server

    Liu, Cricket

    2011-01-01

    If you're preparing to roll out IPv6 on your network, this concise book provides the essentials you need to support this protocol with DNS. You'll learn how DNS was extended to accommodate IPv6 addresses, and how you can configure a BIND name server to run on the network. This book also features methods for troubleshooting problems with IPv6 forward- and reverse-mapping, and techniques for helping islands of IPv6 clients communicate with IPv4 resources. Topics include: DNS and IPv6-Learn the structure and representation of IPv6 addresses, and the syntaxes of AAAA and PTR records in the ip6.a

  3. RENEW: a real-time and effective network emulator of windows for IPv6

    Science.gov (United States)

    Zhao, Bing; Jin, Zhigang; Shu, Yantai; Li, Yu; Cen, Dan

    2007-09-01

    Although IPv4 is still working, IPv6 is considered as the backbone and characteristic of the NGI. With the development of Internet, new protocols and network equipments are required to develop. It is necessary to test the new protocols and network equipments extensively before deployment. This paper proposes the design and implementation of RENEW, a useable and accurate network emulator which supports both IPv4 and IPv6 protocols. Besides, it also works on Windows platform. In our IPv6 testbed, we use RENEW to emulate various network characteristics and conditions including bandwidth, delay packet loss and jitter. Compared with the expected values, results are acceptable. Through implementation and experimentation study, we have shown that RENEW does provide the real-time control and change on the parameters of IPv6 network conditions effectively and expediently on Windows. It also gives enough accuracy and more satisfactory convenience to the development and test work for the new protocols.

  4. IPv6 Testing

    National Research Council Canada - National Science Library

    Landis, Christopher B

    2006-01-01

    .... The DoD is also forming working relationships to conduct testing and share information. IPv6 was developed to resolve the issues of IPv4, mainly the limited amount of addresses and lack of security...

  5. Linear and non-linear video and TV applications using IPv6 and IPv6 multicast

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Provides options for implementing IPv6 and IPv6 multicast in service provider networks New technologies, viewing paradigms, and content distribution approaches are taking the TV/video services industry by storm. Linear and Nonlinear Video and TV Applications: Using IPv6 and IPv6 Multicast identifies five emerging trends in next-generation delivery of entertainment-quality video. These trends are observable and can be capitalized upon by progressive service providers, telcos, cable operators, and ISPs. This comprehensive guide explores these evolving directions in the TV/v

  6. IPv6 Geolocation Using Latency Constraints

    Science.gov (United States)

    2014-03-01

    ground truth datasets. In doing so, we investigate the following: • What is the accuracy of CBG when geolocating IPv6 hosts? • What are the accuracy...the overall PL is shorter for IPv6 than IPv4 which is consistent to what was found in recent work discussed in Section 3.5. Note that the average PL...growth of IPv6 addresses has increased significantly since 2010.The rate of increase of IPv6 usage is expected to continue; thus the need to determine

  7. IPv6-specific misconfigurations in the DNS

    NARCIS (Netherlands)

    Hendriks, Luuk; de Boer, Pieter-Tjerk; Pras, Aiko

    2017-01-01

    With the Internet transitioning from IPv4 to IPv6, the number of IPv6-specific DNS records (AAAA) increases. Misconfigurations in these records often go unnoticed, as most systems are provided with connectivity over both IPv4 and IPv6, and automatically fall back to IPv4 in case of connection

  8. CORPORATE MIGRATION FROM IPv4 TO IPv6 USING DIFFERENT TRANSITION MECHANISMS

    OpenAIRE

    Nellore Karthikeyan*, K.Chandra Mouli

    2016-01-01

    Currently, the Internet world is confronting the huge issue that is exhaustion of IP addresses with the IPv4 protocol. This paper contains the imperative hypothetical ideas of new era Internet Protocol IPv6 which tackles the issue of IP tending to furthermore concentrate on IPv6 address design, directing and three mechanisms of migration from IPv4 to IPv6 system: Dual Stack, Translation and Tunneling utilizing Network Simulator as Packet tracer. This paper more accentuation on network migrati...

  9. Siirtyminen IPv6-protokollaan yrityksen verkkolaitteistossa

    OpenAIRE

    Lindén, Kalle

    2012-01-01

    Tämän opinnäytetyön tarkoituksena on selvittää, mitä muutoksia Päijät-Hämeen koulutuskonsernin (PHKK) tietoverkon runkolaitteissa tarvitsee tehdä, jotta voidaan ottaa IPv6-protokolla käyttöön. Siirtyminen IPv6-protokollaan tulee olemaan välttämätön toimenpide, koska IPv4-protokollasta loppuvat uudet yksilölliset osoitteet. IPv4- ja IPv6-protokollien suurimmat erot ovat osoitekentän koon kasvaminen 32 bitistä 128 bittiin. Aluksi IPv4-osoitteistuksessa oli käytössä luokallinen osoitejärjest...

  10. A review of IPv6 security concerns

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-08-01

    Full Text Available This study focuses on the security concerns of IPv6. We make a broad introduction to IPv6 then briefly look at the differences between the IPv6 and IPv4 protocols, their known vulnerabilities and identify some security concerns when implementing IPv...

  11. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    Science.gov (United States)

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  12. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    Science.gov (United States)

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  13. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6

    Directory of Open Access Journals (Sweden)

    Peter Kirstein

    2013-05-01

    Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  14. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    Science.gov (United States)

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145

  15. Design and implementation of scalable IPv4-IPv6 internetworking gateway

    Science.gov (United States)

    Zhu, Guo-sheng; Yu, Shao-hua; Dai, Jin-you

    2008-11-01

    This paper proposed a scalable architecture of IPv4-IPv6 internetworking gateway based on EZchip 10Gbps network processor NP-1c. The Application Layer Gateway(ALG) of control plane can be upgraded without needing to modify the data forwarding plane.A SIP ALG of 3GPP IMS(IP Multimedia Subsystem)was implemented and tested under real China Next Generation Internet(CNGI) network environment.IPv4 SIP UEs can communicate with IPv6 SIP UEs through the gateway.

  16. Migrating Applications to IPv6

    CERN Document Server

    York, Dan

    2011-01-01

    If IPv6 is to be adopted on a large scale, the applications running on desktop systems, laptops, and even mobile devices need to work just as well with this protocol as they do with IPv4. This concise book takes you beyond the network layer and helps you explore the issues you need to address if you are to successfully migrate your apps to IPv6. It's ideal for application developers, system/network architects, product managers, and others involved in moving your network to IPv6. Explore changes you need to make in your application's user interfaceMake sure your application is retrieving corre

  17. A review of IPv6 security concerns

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-11-01

    Full Text Available This study focuses on the security concerns of IPv6. A broad introduction to IPv6 is made then briefly the differences between the IPv6 and IPv4 protocols are looked at, their known vulnerabilities and this identifies some security concerns when...

  18. IPv6 geolokace a vizualizace

    OpenAIRE

    Suchomel, Tomáš

    2011-01-01

    Tato diplomová práce se zabývá problematikou geolokace IPv6 adres a vizualizace jejich lokalit. Má za úkol prozkoumat oblast IPv6, dále porovnává současné přístupy ke geolokaci. Jejím hlavním cílem je vybudovat systém, který dokáže vytvořit geolokační databázi s pravidelnou aktualizací a který bude schopen zobrazit geografickou lokalitu IPv6 adresy na světové mapě. Geolokační systém nejprve získá geografické adresy pro jednotlivé prefixy IPv6 z veřejně přístupného systému Whois. Tyto adresy t...

  19. IPv6 Network Administration

    CERN Document Server

    Murphy, Niall Richard

    2009-01-01

    This essential guide explains what works, what doesn't, and most of all, what's practical about IPv6--the next-generation Internet standard. A must-have for network administrators everywhere looking to fix their network's scalability and management problems. Also covers other IPv6 benefits, such as routing, integrated auto-configuration, quality-of-services (QoS), enhanced mobility, and end-to-end security.

  20. Analisis Performa File Transport Protocol pada Perbandingan Metode IPv4 Murni, IPv6 Murni dan Tunneling 6to4 Berbasis Router Mikrotik

    Directory of Open Access Journals (Sweden)

    Siswo Wardoyo

    2014-09-01

    Full Text Available The use of IPv4 which has more than 30 years led to the capacity of available addresses is running out availability. Currently emerging new generation IP (IPnext generation is IPv6. Many methods for the implementation of IPv6, one with tunneling. 6to4 is a tunneling method that can be directly implemented on an IPv4 network. This study compared the performance level of a pure IPv4 network, IPv6 6to4 tunneling with pure and searching FTP throughput performance. Throughput results obtained pure IPv6 is smaller than the value of 42.9% pure IPv4 throughput, 6to4 tunneling is smaller than 39.4% pure IPv4 and IPv6 pure value 53.626% greater throughput than 6to4 tunneling configuration.

  1. Caracterización de IPv6

    Directory of Open Access Journals (Sweden)

    Carlos A. Castillo Medina

    2013-05-01

    Full Text Available The present paper attempts to survey the current state of the network protocol called IPv6; starting from the evolution of IPv4 (which motivated the design of new features to the details that are comprised in the new version of the Internet Protocol. The main sections explain the drawbacks of IPv4 that can be overcome by implementing IPv6, highlighting aspects such as security, mobility, and Quality of Service (QoS.

  2. From IPv4 to eternity - the HEPiX IPv6 working group

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    The much-heralded exhaustion of the IPv4 networking address space has finally started. While many of the research and education networks have been ready and poised for years to carry IPv6 traffic, there is a well-known lack of academic institutes using the new protocols. One reason for this is an obvious absence of pressure due to the extensive use of NAT or that most currently still have sufficient IPv4 addresses. More importantly though, the fact is that moving your distributed applications to IPv6 involves much more than the routing, naming and addressing solutions provided by your campus and national networks. Application communities need to perform a full analysis of their applications, middleware and tools to confirm how much development work is required to use IPv6 and to plan a smooth transition. A new working group of HEPiX (http://www.hepix.org) was formed in Spring 2011 to address exactly these issues for the High Energy Physics community. The HEPiX IPv6 Working Group has been investigating the ma...

  3. Interworking between IP security and NAT-PT under IPv4/IPv6 co-existent environments

    Science.gov (United States)

    Ye, Run-Guo; Yu, Shu-Yao; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    Similar to conventional NAT gateways, NAT-PT gateways break traditional TCP/IP"s end-to-end argument property; hence, any IP-based applications protected by IPSec protocol cannot traverse NAT-PT gateways properly. The interworking issues between IPSec and NAT-PT gateways under IPv4/IPv6 co-existent environments were studied: this paper first pointed out the deficiency of current NAT-Traversal scheme when interworking with NAT-PT gateways and proposed an enhanced scheme, which enabled interworking between IPSec and NAT-PT gateways and served the following three scenarios: 1) secure communication between IPv6 hosts and IPv4 hosts; 2) secure communication between IPv6 subnets and IPv4 subnets; 3) secure communication between remote IPv6 hosts and legacy IPv4 subnets.

  4. Home networking architecture for IPv6

    OpenAIRE

    Arkko, Jari; Weil, Jason; Troan, Ole; Brandt, Anders

    2012-01-01

    This text describes evolving networking technology within increasingly large residential home networks. The goal of this document is to define an architecture for IPv6-based home networking while describing the associated principles, considerations and requirements. The text briefly highlights the specific implications of the introduction of IPv6 for home networking, discusses the elements of the architecture, and suggests how standard IPv6 mechanisms and addressing can be employed in home ne...

  5. Dynamics of Abusive IPv6 Networks

    Science.gov (United States)

    2014-09-01

    39 List of References 43 Initial Distribution List 47 vii THIS PAGE INTENTIONALLY LEFT BLANK viii List of Figures Figure 1.1 Google User IPv6 Adoption...2 Figure 1.1: Google User IPv6 Adoption Statistics, from June 2014 [3] For example, as a result of expanding use of IPv6, it is hypothesized that a...excessive annoyance of poorly crafted advertising emails, they can sometimes contain attachments or links to scam offers, phishing attempts, or malicious

  6. eHealth Service Support in Future IPv6 Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Véronique Vèque

    2013-06-01

    Full Text Available Recent vehicular networking activities include novel automotive applications, such as public vehicle to vehicle/infrastructure (V2X, large scale deployments, machine-to-machine (M2M integration scenarios, and more. The platform described in this paper focuses on the integration of eHealth in a V2I setting. This is to allow the use of Internet from a vehicular setting to disseminate health-related information. From an eHealth viewpoint, the use of remote healthcare solutions to record and transmit a patient’s vital signs is a special telemedicine application that helps hospital resident health professionals to optimally prepare the patient’s admittance. From the automotive perspective, this is a typical vehicle-to-infrastructure (V2I communication scenario. This proposal provides an IPv6 vehicular platform, which integrates eHealth devices and allows sending captured health-related data to a personal health record (PHR application server in the IPv6 Internet. The collected data is viewed remotely by a doctor and supports his diagnostic decision. In particular, our work introduces the integration of vehicular and eHealth testbeds, describes related work and presents a lightweight auto-configuration method based on a DHCPv6 extension to provide IPv6 connectivity with a few numbers of messages.

  7. An IPv6 Multihomed Host for Outbound Traffic

    Science.gov (United States)

    Chen, Chin-Ling; Cao, Sheng-Lung

    Though the technology of IPv6 network has become mature in recent years, it still takes long to dispose IPv6 in an all-round way in the internet. In this research, we have designed an IPv6 multihomed host architecture to connect both IPv6 network and 6to4 network. This paper describes a load balance mechanism that allows applications on multihomed devices to utilize the individual networks efficiently to transmit streams that could be part of a session. We experiment the relevant parameters in the IPv6 testbed environment to demonstrate its effectiveness.

  8. Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation

    Directory of Open Access Journals (Sweden)

    Rosli Athirah

    2018-01-01

    Full Text Available The deployment of Internet Protocol version 6 (IPv6 has raised security concerns among the network administrators. Thus, in strengthening the network security, administrator requires an appropriate method to assess the possible risks that occur in their networks. Aware of the needs to calculate risk in IPv6 network, it is essential to an organization to have an equation that is flexible and consider the requirements of the network. However, the existing risk assessment equations do not consider the requirement of the network. Therefore, this paper presents the adaptation of grounded theory to search for elements that are needed to develop IPv6 risk assessment (IRA6 equation. The attack scenarios’ experiments; UDP Flooding, TCP Flooding and Multicast attacks were carried out in different network environment to show how the IPv6 risk assessment equation being used. The result shows that the IRA6 equation is more flexible to be used regardless the network sizes and easier to calculate the risk value compared to the existing risk assessment equations. Hence, network administrators can have a proper decision making and strategic planning for a robust network security.

  9. PROPUESTA DE CONEXIÓN DE ENTORNOS IPv6 MEDIANTE UN BACKBONE MPLS/IPv4

    Directory of Open Access Journals (Sweden)

    Nancy Yaneth Gelvez García

    2013-09-01

    Full Text Available Las redes actuales MPLS/IPv4 presentan las ventajas de poder implementar ingeniería de tráfico, así como realizar diferenciación de flujos mediante clases de servicio (CoS frente a las redes con enrutamiento IP tradicional. En aras de aprovechar cualidades estratégicas durante la etapa de coexistencia entre IPv4 e IPv6 existen 4 métodos para proveer conectividad a islas IPv6 [1] remotas a través de una infraestructura de core MPLS con IPv4 nativo [2], sin embargo una de las formas que permite un rápida y fácil provisión de la misma dados los mínimos requisitos de configuración y de equipos es la de disponer túneles IPv6 en los enrutadores de acceso (CE de la red. No obstante, sus cuatro variantes (manual, GRE, 6to4 e IPv6 compatible IPv4 [3] resultan adecuadas o no según las características inherentes de la red a interconectar; por tanto este artículo presenta las ventajas y desventajas propias de la utilización de cada técnica de entunelamiento como resultado de la interconexión con los cuatro tipos de túneles de una red emulada mediante GNS3+Dynamips.

  10. Mobile video with mobile IPv6

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Increased reliance on mobile devices and streaming of video content are two of the most recent changes that have led those in the video distribution industry to be concerned about the shifting or erosion of traditional advertising revenues. Infrastructure providers also need to position themselves to take advantage of these trends. Mobile Video with Mobile IPv6provides an overview of the current mobile landscape, then delves specifically into the capabilities and operational details of IPv6. The book also addresses 3G and 4G services, the application of Mobile IPv6 to streaming and other mobil

  11. A comparison of two IPv4/IPv6 transition mechanisms - OpenVPN and IVI

    Science.gov (United States)

    Vu, Cong Tuan; Tran, Quang Anh; Jiang, Frank

    2012-09-01

    This document presents a comparison of two IPv4/IPv6 transition mechanisms. They are OpenVPN and IVI. Meanwhile OpenVPN is based on tunneling technology, IVI is a stateless IPv4/IPv6 translation technique which is developed by China Education and Research Network (CERNET). This research focus on the quantitative and qualitative comparison of these two main mechanisms; how they are applied in practical situation by the Internet Service Providers, as well as their advantages and drawbacks.

  12. A Literature Survey on Handoff for Mobile IPv6

    OpenAIRE

    Zongpu Jia; Gaolei Wang; Ran Zhao

    2011-01-01

    With the development of network technology, IPv6 will be widely used in the next generation Internet, IPv6 will be used in the next generation Internet, IPv6 could combine mobile networks and fixed wireless networks closely, which brings great convenience to people’s live. The handoff delay of Mobile IPv6 seriously affected the real-time communication service quality, therefore various improvement methods based on the basic Mobile IPv6 protocol are proposed. The working principle of Mob...

  13. IPv6 Test Bed for Testing Aeronautical Applications

    Science.gov (United States)

    Wilkins, Ryan; Zernic, Michael; Dhas, Chris

    2004-01-01

    Aviation industries in United States and in Europe are undergoing a major paradigm shift in the introduction of new network technologies. In the US, NASA is also actively investigating the feasibility of IPv6 based networks for the aviation needs of the United States. In Europe, the Eurocontrol lead, Internet Protocol for Aviation Exchange (iPAX) Working Group is actively investigating the various ways of migrating the aviation authorities backbone infrastructure from X.25 based networks to an IPv6 based network. For the last 15 years, the global aviation community has pursued the development and implementation of an industry-specific set of communications standards known as the Aeronautical Telecommunications Network (ATN). These standards are now beginning to affect the emerging military Global Air Traffic Management (GATM) community as well as the commercial air transport community. Efforts are continuing to gain a full understanding of the differences and similarities between ATN and Internet architectures as related to Communications, Navigation, and Surveillance (CNS) infrastructure choices. This research paper describes the implementation of the IPv6 test bed at NASA GRC, and Computer Networks & Software, Inc. and these two test beds are interface to Eurocontrol over the IPv4 Internet. This research work looks into the possibility of providing QoS performance for Aviation application in an IPv6 network as is provided in an ATN based network. The test bed consists of three autonomous systems. The autonomous system represents CNS domain, NASA domain and a EUROCONTROL domain. The primary mode of connection between CNS IPv6 testbed and NASA and EUROCONTROL IPv6 testbed is initially a set of IPv6 over IPv4 tunnels. The aviation application under test (CPDLC) consists of two processes running on different IPv6 enabled machines.

  14. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    Science.gov (United States)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  15. TRANSPORTE DE VOZ (VoIP SOBRE REDES IPv4 e IPv6

    Directory of Open Access Journals (Sweden)

    Fausto Alexander Gamboa

    2012-05-01

    Full Text Available El presente artículo tiene como finalidad evaluar el comportamiento de la VoIP en redes IPv6 y compararlo con IPv4, de igual manera presentar las arquitecturas que la soportan. Con el fin de que los resultados sean los más cercanos a la realidad, el artículo no solo se soporta en simulaciones si no en implementaciones reales. Dentro de las conclusiones más sobresalientes se encontró que la VoIP6 presenta mejor rendimiento ante el Jitter y el retardo que VoIPv4.

  16. Investigating the Performance of the MPT Multipath Communication Library in IPv4 and IPv6

    Directory of Open Access Journals (Sweden)

    Béla Almási

    2016-01-01

    Full Text Available The currently used mobile devices (laptops, tablets, mobile phones contain many built-in network cards for communication (e.g. Wi-Fi, 3G, Bluetooth, etc.. A natural request could be combining the resources of the different network connection possibilities in order to increase the throughput of the communication. Unfortunately the standard IP communication technology does not support it: the communication is restricted to one IP address (i.e. to one interface. The Multipath TCP (MPTCP specification (appeared in January 2013 offers a Transport layer solution of using more than one interface in a TCP communication session. In this paper we investigate a Network layer solution. The MPT multipath communication library opens the multipath communication possibility in the Network layer. Using the MPT library, applications built on the UDP protocol are also able to perform multipath communication. The MPT library was developed by using a full dual-stack technology, which means the MPT based multipath environment can be used both in IPv4 and IPv6. Protocol version change is also possible: an IPv6 based application is able to run in an IPv4 multipath environment, and an IPv4 application can be used in an IPv6 multipath environment. In this paper we give a short overview on the MPT communication library’s working mechanism and detailed numerical examples will be shown to present how the MPT library aggregates the paths’ throughput in IPv4 and IPv6 environments. The main contribution of the paper is to demonstrate the effective throughput aggregation property of the MPT library in IPv6 and in mixed (i.e. protocol version change environments.

  17. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    OpenAIRE

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing spa...

  18. Konsep Tingkat Kematangan penerapan Internet Protokol versi 6 (Capability Maturity Model for IPv6 Implementation

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2015-03-01

    Full Text Available Internet Protocol atau IP merupakan standar penomoran internet di dunia yang jumlahnya terbatas. Di dunia, alokasi IP diatur oleh Internet Assignd Number Authority (IANA dan didelegasikan ke melalui otoritas masing-masing benua. IP sendiri terdiri dari 2 jenis versi yaitu IPv4 dan IPv6 dimana alokasi IPv4 dinyatakan habis di tingkat IANA pada bulan April 2011. Oleh karena itu, penggunaan IP diarahkan kepada penggunaan IPv6. Untuk melihat bagaimana kematangan suatu organisasi terhadap implementasi IPv6, penelitian ini mencoba membuat sebuah model tingkat kematangan penerapan IPv6. Konsep dasar dari model ini mengambil konsep Capability Maturity Model Integrated (CMMI, dengan beberapa tambahan yaitu roadmap migrasi IPv6 di Indonesia, Request for Comment (RFC yang terkait dengan IPv6 serta beberapa best-practice implementasi dari IPv6. Dengan konsep tersebut, penelitian ini menghasilkan konsep Capability Maturity for IPv6 Implementation.

  19. Kondisi Migrasi Internet Protocol version 6 (IPv6 di Indonesia

    Directory of Open Access Journals (Sweden)

    Fahrizal Lukman Budiono

    2011-06-01

    Full Text Available    Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri. Saat ini, jaringan Internet di Indonesia berikut perangkat-perangkat pendukungnya hingga di tingkat end user masih menggunakan Internet Protocol version 4 (IPv4. Kenyataan yang dihadapi dunia sekarang adalah menipisnya persediaan alamat IPv4 yang dialokasikan. Hal ini dikarenakan jumlah alamat yang dapat didukung oleh IPv4 adalah 232 bits, sedangkan data terakhir didapatkan bahwa alokasi IPv4 telah habis dialokasikan pada akhir April 2011 di tingkat Internet Assigned Numbers Authority (IANA, organisasi yang mengelola sumberdaya protokol Internet dunia. Untuk mempercepat migrasi, stakeholder internet di Indonesia yaitu Kementerian Komunikasi dan Informatika dan Industri Penyelenggara Internet membentuk ID-IPv6TF. Dalam studi ini, ditemukan bahwa implementasi IPv6 di Indonesia termasuk dalam kategori baik dibandingkan dengan negara lain di dunia. Namun, terlihat bahwa perkembangan ini masih sporadis dengan kurangnya peran koordinator, serta sosialiasi ke masyarakat yang tidak ada.

  20. IPv4 to IPv6 Transition: Optimal Routing Protocol within Dual Stack and Tunneling

    OpenAIRE

    Aparna Sivaprakash; S. Kayalvizhi

    2016-01-01

    The number of global internet users has been growing exponentially, necessitating a much larger number of unique IP addresses for all the connected networking devices. The prevalent IP version 4 is not able to meet the current requirement for IP addresses. To meet the future IP address requirement, a new version IPv6 has been introduced since 1999. However IPv6 is not backward compatible with IPv4.since it is not possible to migrate all the networking devices to ...

  1. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 4. IPv6: The Next Generation Internet Protocol - New Features in IPv6. Harsha Srinath. General Article Volume 8 Issue 4 April 2003 pp 8-16. Fulltext. Click here to view fulltext PDF. Permanent link:

  2. Discovery of IPV6 Router Interface Addresses via Heuristic Methods

    Science.gov (United States)

    2015-09-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS DISCOVERY OF IPV6 ROUTER INTERFACE ADDRESSES VIA HEURISTIC METHODS by Matthew D. Gray September...AND SUBTITLE DISCOVERY OF IPV6 ROUTER INTERFACE ADDRESSES VIA HEURISTIC METHODS 5. FUNDING NUMBERS CNS-1111445 6. AUTHOR(S) Matthew D. Gray 7...Internet Assigned Numbers Authority, there is continued pressure for widespread IPv6 adoption. Because the IPv6 address space is orders of magnitude

  3. Analisis Kesiapan Penyelenggara Jaringan Internet di Indonesia dalam Migrasi ke IPv6

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2012-06-01

    Full Text Available Internet Protocol merupakan sumberdaya pengalamatan jaringan yang sifatnya terbatas. Sejak dikembangkankan konsep TCP/IP, sumberdaya pengalamatan jaringan dan internet berbasiskan pada Internet Protokol versi 4 (IPv4 yang memiliki 4 miliar alamat unik. Data dari potaroo.net pada 18 maret 2011, diperkirakan alokasi IPv4 berakhir pada bulan May 2011. Dalam menghadapi keterbatasan IPv4 tersebut, dibuatlah konsep pengalamatan baru IPv6 yang memiliki jumlah alamat 6,5 x 1038 alamat unik. Di Indonesia sendiri dalam rangka mengantisipasi habisnya penggunaan IPv4 tersebut, stakeholder internet di Indonesia yang dikomandoi oleh Kementerian Komunikasi dan Informatika cq. Ditjen Postel membentuk Indonesia IPv6 Task Force (ID-IPv6TF. ID-IPv6TF merumuskan peta jalan / roadmap migrasi ke IPv6 versi 2 yang berakhir pada 2012. Studi ini melakukan evaluasi formatif sejauhmana kesiapan migrasi dari IPv4 ke IPv6 di Indonesia pada tingkat Penyelenggara Jaringan Internet  dengan melihat dari dimensi kesiapan aplikasi, strategi migrasi dan kesiapan infrastruktur. Kesiapan migrasi tersebut dikategorkan menjadi 5 level yaitu IPv6 Agnostic, IPv6 Aware,. Hasil studi menunjukkan bahwa Indonesia berada pada level IPv6 Savvy dengan distribusi level yang beragam.

  4. IPv6 Monitoring in Nederland : De Nulmeting

    NARCIS (Netherlands)

    Boen-Leo, M.; Holtzer, A.; Tijmes, M.R.; Smets, R.

    2010-01-01

    In dit document wordt de mate van uitrol van IPv6 in Nederland per april 2010 beschreven. De 'nulmeting' is uitgevoerd in opdracht van het Ministerie van Ecnomische Zaken en is de eerste van twee metingen die in 2010 worden uitgevoerd. Allereerst wordt een korte uitleg gegeven over IPv6 en het

  5. Implantación de IPv6 : red, mecanismos de transición IPv4-IPv6, servicios de aplicación y migración de aplicaciones

    OpenAIRE

    Rodríguez Hervella, Juan Francisco

    2003-01-01

    El presente proyecto fin de carrera trata los aspectos más importantes de la gestión y migración de las redes IP hacia el nuevo protocolo de red IPv6 y pone gran énfasis en experiencias de implantación de los mismos. A lo largo de este proyecto se profundiza sobre los distintos mecanismos de transición IPv4/IPv6 existentes, concretamente se describen y se prueban (en entornos Linux y FreeBSD) los siguientes: .Túneles 6t04, automáticos, configurados. .Mecanismo DSTM, TRT, ISATAP, NAT-PT. Tambi...

  6. Measuring and Comparing the Stability of Internet Paths over IPv4 & IPv6

    OpenAIRE

    Golkar, Forough

    2014-01-01

    Enormous Internet growth is an obvious trend nowadays while Internet protocol version 4 address space exhaustion led into the invention of Internet protocol version 6 and subsequently raised the transitioning challenges from one protocol to the other one. As the Internet protocol version 6 have not been around for a long time, thus there is a limitation knowledge in topology, routing change and performance of IPv6. Several studies are going on in order to getting the information about IPv6 wh...

  7. Application of IPv6 in GIS

    Science.gov (United States)

    Wang, Zhen-feng; Wang, Liang

    2008-10-01

    The inherent flaws in current network, especially the inadequate IP address space, make the born of NGN (Next Generation Network). The NGN aims to enable the information sharing and inter-operation of heterogeneous networks. As the core of NGN, IPv6 (Internet Protocol version 6), which is designed as the successor of IPv4 running now, brings us many new features. It provides larger address space, supports mobile devices, and has built-in security policy, and so on. Although it brings us so many advantages and the backbone of NGN also has been constructed in many countries, we have difficulties moving to NGN. One of the main reasons is there are few killer applications for it. So what features can be employed by GIS, and how to use them is the main content of this paper. The IPv6 certainly offers new entry to solve some problems in GIS.

  8. Modeling the IPv6 internet AS-level topology

    Science.gov (United States)

    Xiao, Bo; Liu, Lian-dong; Guo, Xiao-chen; Xu, Ke

    2009-02-01

    To measure the IPv6 internet AS-level topology, a network topology discovery system, called Dolphin, was developed. By comparing the measurement result of Dolphin with that of CAIDA’s Scamper, it was found that the IPv6 Internet at AS level, similar to other complex networks, is also scale-free but the exponent of its degree distribution is 1.2, which is much smaller than that of the IPv4 Internet and most other scale-free networks. In order to explain this feature of IPv6 Internet we argue that the degree exponent is a measure of uniformity of the degree distribution. Then, for the purpose of modeling the networks, we propose a new model based on the two major factors affecting the exponent of the EBA model. It breaks the lower bound of degree exponent which is 2 for most models. To verify the validity of this model, both theoretical and experimental analyses have been carried out. Finally, we demonstrate how this model can be successfully used to reproduce the topology of the IPv6 Internet.

  9. High-frequency mapping of the IPv6 Internet using Yarrp

    OpenAIRE

    Gaston, Eric W.

    2017-01-01

    Approved for public release; distribution is unlimited Both the number of hosts using Internet Protocol version 6 (IPv6), and the volume of IPv6 traffic, has increased exponentially since 2012.With this adoption, the IPv6 routed infrastructure becomes an increasingly important component of global critical infrastructure and network policy. Unfortunately, the tools and techniques used to perform active network topology discovery were designed for Internet Protocol version 4 (IPv4), leading ...

  10. So you've got IPv6 address space. Can you defend it?

    OpenAIRE

    Sande, Mikal

    2014-01-01

    Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will become the next standard networking protocol on the Internet. It brings with it a great increase in address space, changes to network operations, and new network security concerns. In this thesis we examine IPv6 from a security perspective. The security of IPv6 is important to all protocols that use IPv6 on the Internet. The goal of this thesis is to introduce the reader to existing IPv6 secur...

  11. Inkubasi Implementasi Ipv6 di Lingkungan PT Telekomunikasi Indonesia Tbk

    Directory of Open Access Journals (Sweden)

    Lunel Candra

    2013-12-01

    ABSTRACT As a network and information service provider in Indonesia, PT Telekomunikasi Indonesia (Telkom is facing a number of problems of exhausted IP addresses, which is also being faced by global telecommunications world. IP addresses widely used todays, i.e. IPv4, have a limitation in terms of number and will be out soon. However, there are some solutions that can be done by telecom operators including implementation of NAT (Network Address Translation 444, dual stack IPv4 and IPv6, tunneling, and native IPv6. Each of the solutions mentioned above have advantages and disadvantages, but the target native IPv6 as main target seems to be the only feasible solution to be addressed by IT industry players, including Telkom. Telkom RDC as the unit mainly focusing in the research of IT technology has been reviewing and testing a lab-scale IPv6 implementation. This also focused on the capabilities incubation for enabling IPv6 on existing telecommunications equipment and interoperability test between the devices. This study provides the result of function, multi-layer integration and interoperability test of IPv6 conducted in Telkom RDC OASIS v6 lab, which also can be considered as references for decision makers within the company to adopt IP technology to be implemented in the future.

  12. IPv6 for Future Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard

    2001-01-01

    The functionalities of the next generation Internet protocol, IPv6, havebecome increasingly interesting due to the current merging of the traditionalcellular mobile communications and the traditional data-communications intothe future wireless systems, as e.g., UMTS. IPv6 provides several...... enhancedfunctionalities requested for the future mobile systems. In this article thelargest advantages in relation to mobile systems are presented. Variousaspects of introducing IP throughout the entire mobile network (core, accessand termainals) are also presented along with an illustration of the abilitiesof the future...

  13. Spatial data efficient transmission in WebGIS based on IPv6

    Science.gov (United States)

    Wang, Zhen-feng; Liu, Ji-ping; Wang, Liang; Tao, Kun-wang

    2008-12-01

    Large-size of spatial data and limited bandwidth of network make it restricted to transmit spatial data in WebGIS. This paper employs IPv6 (Internet Protocol version 6), the successor of IPv4 running now, to transmit spatial data efficiently. As the core of NGN (Next Generation Network), IPv6 brings us many advantages to resolve performance problems in current IPv4 network applications. Multicast, which is mandatory in IPv6 routers, can make one server serve many clients simultaneously efficiently, thus to improve capacity of network applications. The new type of anycast address in IPv6 will make network client applications possible to find the nearest server. This makes data transmission between client and server fastest. The paper introduces how to apply IPv6 multicast and anycast in WebGIS to transmit data efficiently.

  14. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  15. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 3. IPv6: The Next Generation Internet Protocol - IPv4 and its Shortcomings. Harsha Srinath. General Article Volume 8 Issue 3 March 2003 pp 33-41. Fulltext. Click here to view fulltext PDF. Permanent link:

  16. The Impact of IPv6 on Penetration Testing

    NARCIS (Netherlands)

    Ottow, Christiaan; van Vliet, Frank; de Boer, Pieter-Tjerk; Pras, Aiko

    In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6. Among these modifications are ways of performing fragmentation attacks, host discovery and

  17. Simulasi Penggunaan Ipv6 Pada PD. Pumas Jaya Menggunakan Metode Manual Tunneling

    Directory of Open Access Journals (Sweden)

    Elidjen Elidjen

    2010-12-01

    Full Text Available Internet usage trends with IPv4 addresses that only have 32-bit addresses could no longer cope with the large allocation of the required addresses. Internet Engineering Task Force (IETF has issued a new standard of Internet protocol called IPv6 to anticipate this problem. PD. Pumas Jaya, which started in 1996 in the field of marine products in particular marinated seafood, such as salted fish, rebon shrimp, cuttlefish, anchovies and other marine products to anticipate the need for this in its network. However, IPv6 can not simply be used to replace IPv4 as the existing network infrastructure with IPv4. This research discussed IPv6 simulation tunneling with manual methods so that an IPv6 site can communicate with other IPv6 site even if separated by an infrastructure that supports only IPv4. 

  18. Flow-based detection of IPv6-specific network layer attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; Velan, Petr; de O. Schmidt, Ricardo; de Boer, Pieter-Tjerk; Pras, Aiko; Tuncer, Daphne; Koch, Robert; Badonne, Rémi; Stiller, Burkhard

    2017-01-01

    With a vastly different header format, IPv6 introduces new vulnerabilities not possible in IPv4, potentially requiring new detection algorithms. While many attacks specific to IPv6 have proven to be possible and are described in the literature, no detection solutions for these attacks have been

  19. Protocolo IPv6 com pilha dupla em um campus universitário

    Directory of Open Access Journals (Sweden)

    Fernando Barreto

    2015-11-01

    Full Text Available Com o esgotamento do endereçamento IPv4 sendo uma realidade, a adoção do IPv6 se torna cada vez mais necessária. Os protocolos IPv4 e IPv6 são incompatíveis e têm questões de operação diferentes, o que torna a implementação do IPv6 relativamente difícil para administradores de rede IPv4. Com o objetivo de reduzir essa dificuldade, este artigo apresenta uma comparação entre IPv4 e IPv6 com foco no dia a dia de administração de rede de campus. Esse artigo também apresenta as soluções, experiências e lições adquiridas de uma implementação de sucesso do IPv6, utilizando a técnica de Pilha Dupla em um pequeno campus universitário.

  20. Analisis Kematangan Implementasi Internet Protocol versi 6 (IPv6 di Indonesia dengan Interim Maturity Level (IML

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2012-12-01

    Full Text Available Cepat atau lambat, IPv6 akan menggantikan IPv4 dalam penomoran internet. Hal ini dikarenakan IANA telah mengalokasikan blok IPv4 terakhirnya pada Januari 2011 lalu. Pesatnya permintaan terhadap IP ini dikarenakan boomingnya .com sejak tahun 2000. Dengan habisnya IPv4, terdapat beberapa metode untuk melakukan migrasi ke peenomoran baru IPv6. Terkait dengan hal tersebut, penelitian ini mencoba mengukur tingkat kematangan beberapa penyelenggara jasa internet di Indonesia dalam hal implementasi IPv6 dengan menggunakan konsep Capability Maturity Model for IPv6 Implementation. Metode assesmen yang dilakukan dengan Interim Maturity Level, yaitu dengan memberikan seperangkat pertanyaan yang diisi sendiri oleh penyelenggara jasa internet. Hasil yang didapat adalah, sebagian besar penyelenggara internet masih berada pada Level 2 – Savvy.

  1. FY2000 Hanford Technology Deployment Accomplishments Fact Sheets

    International Nuclear Information System (INIS)

    WIBLE, R.A.

    2001-01-01

    Cleaning up the Hanford Site is one of the top priorities for the U. S. Department of Energy. The department is continually looking for ways to expedite cleanup and reduce costs. During Fiscal Year (FY) 2000. Hanford Site staff deployed 24 new technologies, which produced an estimated lifecycle cost savings of 479 million dollars. This is a clear indicator of the impacts new technology has had and will have on the cleanup efforts. The Hanford Site cleanup is focused on the following: Restoring the Columbia River Corridor; Building and operating the tank waste treatment complex to complete the cleanup of highly radioactive tank waste at Hanford; and Transitioning the Central Plateau. Applying innovative science and technology from national laboratories, universities, and private industry is critical to our complex cleanup mission. The 24 new technologies deployed in FY 2000 are significantly higher than our goal of 14 technological deployments. Eleven of these technologies supported restoring the Columbia River Corridor, and seven were involved with the remediation of radioactive tank waste. These deployments produced valuable information to determine the effectiveness of the new technologies in the field and the efficiencies gained over existing cleanup methods. In several cases, the technology deployed presented a solution to a problem where a clear path of remediation had not yet been determined. New and innovative technologies will play a significant role in the cleanup of the Hanford Site and enable remediation to be done more efficiently. Technology is being developed at a staggering pace. This requires excellent communication throughout the scientific and industry arenas. To effect this communication, we have implemented a technology needs process in conjunction with the multi-year work planning process. Through the combination of these two processes, technology developments and deployments address the near-term technology needs and enable us to plan for the

  2. Enabling IPv6 at FZU - WLCG Tier2 in Prague

    International Nuclear Information System (INIS)

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek

    2014-01-01

    The usage of the new IPv6 protocol in production is becoming reality in the HEP community and the Computing Centre of the Institute of Physics in Prague participates in many IPv6 related activities. Our contribution presents experience with monitoring in HEPiX distributed IPv6 testbed which includes 11 remote sites. We use Nagios to check availability of services and Smokeping for monitoring the network latency. Since it is not always trivial to setup DNS in a dual stack environment properly, we developed a Nagios plugin for checking whether a domain name is resolvable when using only IP protocol version 6 and only version 4. We will also present local area network monitoring and tuning related to IPv6 performance. One of the most important software for a grid site is a batch system for a job execution. We will present our experience with configuring and running Torque batch system in a dual stack environment. We also discuss the steps needed to run VO specific jobs in our IPv6 testbed.

  3. Enabling IPv6 at FZU - WLCG Tier2 in Prague

    Science.gov (United States)

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek

    2014-06-01

    The usage of the new IPv6 protocol in production is becoming reality in the HEP community and the Computing Centre of the Institute of Physics in Prague participates in many IPv6 related activities. Our contribution presents experience with monitoring in HEPiX distributed IPv6 testbed which includes 11 remote sites. We use Nagios to check availability of services and Smokeping for monitoring the network latency. Since it is not always trivial to setup DNS in a dual stack environment properly, we developed a Nagios plugin for checking whether a domain name is resolvable when using only IP protocol version 6 and only version 4. We will also present local area network monitoring and tuning related to IPv6 performance. One of the most important software for a grid site is a batch system for a job execution. We will present our experience with configuring and running Torque batch system in a dual stack environment. We also discuss the steps needed to run VO specific jobs in our IPv6 testbed.

  4. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  5. Análise de campo do desempenho de acessos Web em IPv6.

    OpenAIRE

    Pirani, Deivis Fernandes

    2014-01-01

    Este trabalho apresenta um estudo de campo, comparativo, sobre a utilização dos protocolos IPv4 e IPv6 no acesso a páginas web. Foi considerada a perspectiva de um usuário real deste tipo de serviço, no atual período de transição do IPv4 para o IPv6. Para que tal estudo pudesse ser realizado, foi desenvolvido um arranjo no qual três configurações de endereçamento do Protocolo de Internet, IPv4, IPv6 e Pilha Dupla (IPv4+IPv6), foram utilizadas nos acessos às 100 páginas web, com suporte ao I v...

  6. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    Science.gov (United States)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  7. The design of IPv6's transitional scheme in university

    Science.gov (United States)

    Li, Biqing; Li, Zhao

    2017-05-01

    According to the current network environment of campus, the specific scheme of network transition is proposed, which has conducted detailed analyses for the basic concepts, the types of address, the necessary technology for transition and the agreement and principle of transition. According to the tunneling technology of IPv6, the IPv4 network and IPv6 network can communicate with each other, and the network of whole campus can operate well.

  8. Nivel de desempeño en redes IPv4 con respecto a redes IPv6 con MPLS y RSVP

    Directory of Open Access Journals (Sweden)

    Alexis Guevara Peña

    2011-06-01

    Full Text Available This paper contains relevant information of the state of art of traffic engineering, MPLS (Multiprotocol Lable Switching and RSVP (Resource Reservation Protocol, as a case study and the techniques used under the new version of IPV6, against IPV4 version. The paper is intended to serve as a framework for the study of Engineering Traffic Based on the new version of IPV6, specifically MPLS and RSVP, takinginto account relevant considerations necessary when making decisions regarding the stability of the Backbone remains the key to Internet service providers that have recently stabilized its IPv4 infrastructure.

  9. Evaluation de la mise en ceuvre des services du protocole IPV6 ...

    African Journals Online (AJOL)

    At present, the configurations of networks are based on the protocol ipv4. The addresses ipv4 begin to run out. Groups of search work on the new version of the protocol IPV6 (in France, in United States, in Japan). Certain networks run under ipv6. However the great majority of the existing networks always use the ...

  10. Modelo para la integración de redes IPv4 – IPv6 basado en túneles

    Directory of Open Access Journals (Sweden)

    Danilo López

    2010-12-01

    Full Text Available The intention of this paper is to set up a general model in order to interconnect heterogeneous nets IPv4-IPv6, guarantying the integrity of the data, making use of transition techniques.

  11. RIPng- A next Generation Routing Protocal (IPv6) | Falaye | Journal ...

    African Journals Online (AJOL)

    ... Information Protocol Next Generation (RIPng) owing to the current depletion rate of IPv4. ... that support the Internet Protocol Version 6 (IPv6).addressing scheme. ... A brief history is given; its various versions are discussed, and detailed ...

  12. IPv6:n käyttöönotto PK-yrityksessä

    OpenAIRE

    Salonen, Arttu Petteri

    2011-01-01

    Tämän opinnäytetyön tarkoituksena on selvittää, kuinka IPv6-yhteydet otetaan käyt-töön PK-yrityksessä. Työssä selvitetään minkälaiset vaatimukset IPv6 asettaa lait-teistolle ja minkälaisia käytännön asioita yrityksen täytyy huomioida IPv6:n käyt-töönotossa. Lisäksi työssä on laboratoriosimulaation avulla havainnollistettu eri käyt-töjärjestelmien tukea IPv6:lle ja käyttöönottoon liittyviä reititin- ja osoitekonfiguraati-oita. Käyttöönoton lisäksi opinnäytetyössä esitellään IPv6-protokoll...

  13. MULTI-LINK SUPPORT FOR IPV6 NETWORKS

    Directory of Open Access Journals (Sweden)

    Cüneyt Akınlar

    2016-03-01

    Full Text Available IPv6 ağ konfigürasyonu için genel pratik ağ üzerindeki her fiziksel bağ için ayrı bir altağ öneki atamaktır. Bu uygulama hem birden fazla ağ öneki gereksimine sebep olur, hem de elle yönetim ve konfigürasyon gerektirir. Buna alternatif konfigürasyon yöntemi bütün bağları IPv6 seviyesinde bir köprü ile bağlamak ve bu sayede bütün ağ için tek bir ağ öneki ataması yapmaktır. Bu metoda çoklu-bağ öneki ismi verilir. Bu makalede IPv6 ağları için çoklu-bağ öneki oto-konfigürasyonu konusu ele alınmıştır. Öncelikle tek yönlendiricili ağlar için coklu-bağ desteğinin nasıl gerçekleneceği tarif edilmiş, daha sonra bu yöntemin çok yönlendiricili ağlara nasıl uygulanacağı anlatılmıştır. Önerilen oto-konfigürasyon yöntemleri standart alıcı otokonfigürasyon protokollerini tamamlamakta ve IPv6 ağlarının yaygın kurulum ve kullanımları için gerekli tak-çalıştır metodolojine olanak sağlamaktadır

  14. Initial results from an IPv6 Darknet

    OpenAIRE

    Ronan, John; Ford, Matthew; Stevens, Jonathan

    2006-01-01

    A darknet is an advertised and routed portion of Internet address space that contains no advertised services. Any traffic observed on a darknet is therefore illegitimate and darknets are useful tools for observing the level of background ‘noise’ on a larger network. Darknets have been used in existing IPv4 networks to help to identify malicious traffic, malware trends, or the consequences of misconfiguration. We have created what may be the world’s first IPv6 darknet to help us observe the ‘n...

  15. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  16. Optimization in Mobile IPv6 with Dynamic DNS

    OpenAIRE

    塩津, 達郎

    2005-01-01

    機器の高性能化により、モバイル端末においてもインターネットを利用した様々なアプリケーションを利用する要求が増え、無線通信環境の充実により、モバイル端末への通信を継続する仕組みが求められるようになった。 移動中の継続的な通信を可能とする技術の一つとして Mobile IPv6 がある。Mobile IPv6 にり、端末が移動しても通信を継続できる移動透過性が提供される。この移動透過性を実現するために、Mobile IPv6 では移動する端末とその端末と通信をしている端末の仲介役となる Home Agent が必要になる。ところが、仲介役となる必要のない場合でも Home Agent が仲介役として動き、無駄なパケットがインターネット上に流れてしまう。 本論文では、Mobile IPv6 という技術に加えて、Dynamic DNS という技術を用いて、Mobile IPv6 ネットワークの最適化を行う手法を提案し、性能評価を行った。...

  17. IPv6 ネットワークの構築

    OpenAIRE

    山田, 純一

    2008-01-01

    富山大学では2006年,国立情報学研究所より,IPv6(Internet Protocol Version 6)の割り当てが承認された。IPv6は現在使用されているIPアドレスであるIPv4(Internet Protocol Version 4)の枯渇問題を解消するために開発されたIPアドレスである。このIPv6が誕生してから数年,今さらではあるがローカル環境にてIPv6ネットワークを構築し,検証を行ったので,ここに報告する。

  18. HIV Positive Diagnosis During Pregnancy Increases Risk of IPV Postpartum Among Women with No History of IPV in Their Relationship.

    Science.gov (United States)

    Groves, Allison K; Reyes, H Luz McNaughton; Moodley, Dhayendre; Maman, Suzanne

    2017-07-24

    There has been limited study of whether and for whom physical intimate partner violence (IPV) is a consequence of an HIV-positive diagnosis. Per the diathesis stress model, the consequences of HIV infection may be worse for women with a history of IPV. We hypothesize that the positive association between HIV diagnosis in pregnancy and postpartum IPV will be exacerbated for women with a history of IPV. Data come from a prospective cohort study with 1015 participants who completed a baseline antenatal and 9-month postpartum visit. Using logistic regression analyses, we found a statistically significant interaction between HIV diagnosis, history of IPV and postpartum IPV (AOR: 0.40, 95% CI 0.17-0.96). The findings were in the opposite direction as expected: HIV-diagnosis was not associated with IPV for women with a history of IPV (AOR: 2.17, 95% CI 1.06, 4.42). However, HIV-positive women without a history of IPV faced more than two times the risk of incident postpartum IPV than HIV-negative women (AOR: 2.17, 95% CI 1.06, 4.42). Interventions to reduce incident and ongoing IPV during the perinatal period are needed.

  19. Something From Nothing (There): Collecting Global IPv6 Datasets from DNS

    NARCIS (Netherlands)

    Fiebig, T.; Borgolte, Kevin; Hao, Shuang; Kruegel, Christopher; Vigna, Giovanny; Spring, Neil; Riley, George F.

    2017-01-01

    Current large-scale IPv6 studies mostly rely on non-public datasets, asmost public datasets are domain specific. For instance, traceroute-based datasetsare biased toward network equipment. In this paper, we present a new methodologyto collect IPv6 address datasets that does not require access to

  20. The Department of Defense's Transition of Program of Record (POR) Systems from Internet Protocol Version Four (IPv4) to Internet Protocol Version Six (IPv6)

    National Research Council Canada - National Science Library

    Perkins, Kyle L; Scott, Michael A

    2006-01-01

    .... The research outlines the initial intended useful life and limitations of IPv4 and IPv6. The financial aspects of transitioning to IPv6 are examined from a programs perspective, relative to the Program Objective Memorandum (POM...

  1. IPv6 sobre AT

    Directory of Open Access Journals (Sweden)

    Octavio José Salcedo

    2011-12-01

    Full Text Available Providing Quality of Service (QoS from communication networks in a global environment, is now one of the main fields of research, mainly due to the increasing importance of applications such as VoIP, video conferencing, stream video and audio, distance education, among others. This article is presented as a technology for providing uality service, the integration of IPv6 and ATM. The main objective is to present and discuss the main considerations and solutions that exist in the integration of IP trafÞ c in ATM technology.

  2. IPv6 Monitoring in Nederland: De derde meting : TNO-White paper

    NARCIS (Netherlands)

    Boen-Leo, M.S.A.; Hartog, T.; Holtzer, A.C.G.; Schotanus, H.A.; Smets, R.C.J.; Tijmes, M.R.

    2011-01-01

    Dit whitepaper beschrijft de derde meting in het kader van IPv6 monitoring in Nederland. Eerder zijn de Nulmeting2 en Tweede Meting3 gepubliceerd. In de tweede helft van 2011 zal nog een vierde meting gepubliceerd worden. Uit de vorige metingen is gebleken dat IPv6 bewustzijn toeneemt, maar dat het

  3. The Rise of IPv6: Benefits and Costs of Transforming Military Cyberspace

    Science.gov (United States)

    2015-04-01

    people, the structure of the Internet is changing for the first time in its history with the ex- haustion of the IP version four ( IPv4 ) protocol and the...have.4 The need to transition from IPv4 to IPv6 is not hy- pothetical since the global supply of IP addresses in IPv4 is quickly be- ing exhausted...Registry (RIR) IPv4 Address Run-Down Model Year RI R Ad dr es s Po ol (/ 8s ) 2013 2014 2015 2016 2017 2018 2019 2020 4.5 4 3.5 3 2.5 2 1.5 1 0.5

  4. DOE FY 2010 Budget Request and Recovery Act Funding for Energy Research, Development, Demonstration, and Deployment: Analysis and Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Anadon, Laura Diaz; Gallagher, Kelly Sims; Bunn, Matthew

    2009-06-01

    The combination of the FY 2010 budget request for the Department of Energy (DOE) and the portion of the American Recovery and Reinvestment Act of 2009 (ARRA) funds likely to be available in 2010 would (assuming that they would be split evenly between FY 2010 and FY 2011) result in a doubling in funding available for energy research, development, and deployment (ERD and D) from $3.6 billion in FY 2009 to $7.2 billion in FY 2010. Without the stimulus funds, DOE ERD and D investments in FY 2010 would decrease very slightly when compared to FY 2009. Excluding the $7.5 billion for the Advanced Technology Vehicles Manufacturing Loans in FY 2009, the FY 2010 budget request for deployment represents a 33 percent decrease from the FY 2009 levels from $520 million to $350 million. This decrease is largely due to the large amounts of funds appropriated in ARRA for DOE deployment programs, or $23.6 billion, which are three times greater than those appropriated in the FY 2009 budget. These very substantial funding amounts, coupled with the broad range of institutional innovations the administration is putting in place and movement toward putting a price on carbon emissions, will help accelerate innovation for a broad range of energy technologies. DOE's Advanced Research Projects Agency-Energy (ARPA-E) and the Energy Innovation Hubs are important initiatives that could contribute to two weak points of the government's energy innovation effort, namely funding high-risk projects in transformational technologies and in companies that have not traditionally worked with the government and strengthening the integration of basic and applied research in priority areas. Increasing the funding for different types of energy storage research, providing some support for exploring opportunities in coal-to-liquids with carbon capture and storage (CCS) and coal-and-biomass-to-liquids with CCS, and reducing funding for fission RD and D are other actions that Congress could take in the

  5. Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies

    Science.gov (United States)

    Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio

    2012-04-01

    This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.

  6. Duplicate Address Detection Table in IPv6 Mobile Networks

    Science.gov (United States)

    Alisherov, Farkhod; Kim, Taihoon

    In IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 is used in next generatoion mobile communication. Although IPv6 improves the existing IPv4 Internet protocol, Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to ensure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, the author proposes a new DAD mechanism to speed up the DAD procedure. A DAD table is created in access or mobility routers in IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address.

  7. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    addressing, new generation internet. 2. ... required the creation of the next generation of Internet ... IPv6 standards have defined the following Extension headers ..... addresses are represented as x:x:x:x:x:x:x:x, where each x is the hexadecimal ...

  8. System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kresimir Grgic

    2016-01-01

    Full Text Available The trend of implementing the IPv6 into wireless sensor networks (WSNs has recently occurred as a consequence of a tendency of their integration with other types of IP-based networks. The paper deals with the security aspects of these IPv6-based WSNs. A brief analysis of security threats and attacks which are present in the IPv6-based WSN is given. The solution to an adaptive distributed system for malicious node detection in the IPv6-based WSN is proposed. The proposed intrusion detection system is based on distributed algorithms and a collective decision-making process. It introduces an innovative concept of probability estimation for malicious behaviour of sensor nodes. The proposed system is implemented and tested through several different scenarios in three different network topologies. Finally, the performed analysis showed that the proposed system is energy efficient and has a good capability to detect malicious nodes.

  9. Dual stack deployment in a carrier grade network to fulfill the demands of next generation of internet

    International Nuclear Information System (INIS)

    Khanzada, T.J.S.

    2013-01-01

    The Internet is migrating from IPv4 (Internet Protocol version 4) to IPv6 (Internet Protocol version 6). The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority) and will be soon exhausted in RIR (Regional Internet Registry) while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge. (author)

  10. Dual Stack Deployment in a Carrier Grade Network to Fulfill the Demands of Next Generation of Internet

    Directory of Open Access Journals (Sweden)

    Tarique Jamil Saifullah Khanzada

    2013-07-01

    Full Text Available The Internet is migrating from IPv4 (Internet Protocol version 4 to IPv6 (Internet Protocol version 6. The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority and will be soon exhausted in RIR (Regional Internet Registry while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge

  11. Manfacturers, service providers gear up for the next Big Thing IPV6

    CERN Multimedia

    2003-01-01

    "IPv6 apparently is the heir apparent to the current communication standard, IPv4, and communications equipment manufacturers are taking this into consideration as they design their next-generation gear" (1/2 page).

  12. Metadata Modelling of the IPv6 Wireless Sensor Network in the Heihe River Watershed

    Directory of Open Access Journals (Sweden)

    Wanming Luo

    2013-03-01

    Full Text Available Environmental monitoring in ecological and hydrological watershed-scale research is an important and promising area of application for wireless sensor networks. This paper presents the system design of the IPv6 wireless sensor network (IPv6WSN in the Heihe River watershed in the Gansu province of China to assist ecological and hydrological scientists collecting field scientific data in an extremely harsh environment. To solve the challenging problems they face, this paper focuses on the key technologies adopted in our project, metadata modeling for the IPv6WSN. The system design introduced in this paper provides a solid foundation for effective use of a self-developed IPv6 wireless sensor network by ecological and hydrological scientists.

  13. IPv6 races across the Atlantic

    CERN Multimedia

    2003-01-01

    "...Scientists at the California Institute of Technology and the European Organization for Nuclear Research (CERN) have set a new Internet2 land speed record using IPv6, the next-generation Internet protocol. The team sustained a single stream transmission control protocol (TCP) rate of 983 Mbits/s for more than an hour between CERN's facility in Geneva and Chicago, spanning more than 7000 km" (1/2 page).

  14. Integrated Service Provisioning in an Ipv6 over ATM Research Network

    Energy Technology Data Exchange (ETDEWEB)

    Eli Dart; Helen Chen; Jerry Friesen; Jim Brandt; Jim Hutchins; Perry Robertson

    1999-02-01

    During the past few years, the worldwide Internet has grown at a phenomenal rate, which has spurred the proposal of innovative network technologies to support the fast, efficient and low-latency transport of a wide spectrum of multimedia traffic types. Existing network infrastructures have been plagued by their inability to provide for real-time application traffic as well as their general lack of resources and resilience to congestion. This work proposes to address these issues by implementing a prototype high-speed network infrastructure consisting of Internet Protocol Version 6 (IPv6) on top of an Asynchronous Transfer Mode (ATM) transport medium. Since ATM is connection-oriented whereas IP uses a connection-less paradigm, the efficient integration of IPv6 over ATM is especially challenging and has generated much interest in the research community. We propose, in collaboration with an industry partner, to implement IPv6 over ATM using a unique approach that integrates IP over fast A TM hardware while still preserving IP's connection-less paradigm. This is achieved by replacing ATM's control software with IP's routing code and by caching IP's forwarding decisions in ATM's VPI/VCI translation tables. Prototype ''VR'' and distributed-parallel-computing applications will also be developed to exercise the realtime capability of our IPv6 over ATM network.

  15. Desempeño de la calidad del servicio (QoS sobre IPv6

    Directory of Open Access Journals (Sweden)

    Octavio José Salcedo Parra

    2011-06-01

    Full Text Available New applications such as VoIP, e-commerce and video conferencing are sensitive to network performance, making the network capacity to provide quality of service is increasingly important. IPv6 was developed to solve some of the problems of IPv4, such as QoS, security and IP address exhaustion. Current IP networks provide better trafficdelivery effort, therefore, offer no guarantee of quality service. However, there are services, including voice, with stringent requirements for delay and delay variation (jitter, which makes it necessary to add functionality to IP networks based on this protocol are capable of supporting such services. For its part, IPv6 uses 2 fields that can be used to implement QoS, which are: Flow Label and Traffic Class. This article describes the mechanisms and architectures that are used to provide QoS on a network. Later, you specify the features that use both IPv4 and IPv6 to implement QoS. In the last sections present the results of the comparison of 2 scenarios, which are evaluated.

  16. Teoretisk och praktisk genomgång av IPv6 och dess säkerhetsaspekter

    OpenAIRE

    Andersson, David

    2012-01-01

    Den här uppsatsen går teoretiskt och praktiskt igenom IPv6 för att skapa en förståelse för det nya protokollet. Uppsatsen beskriver utöver den teoretiska genomgången av protokollet även det praktiska arbete som ligger bakom implementationen som är tänkt att kunna ge såväl privatpersoner som mindre organisationer tillgång till en säker IPv6 lösning även om Internetleverantören endast kan erbjuda IPv4.   Arbetet är gjort på eget initiativ då behovet av kunskap kring IPv6 växer lavinartat och då...

  17. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    Science.gov (United States)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  18. I6-FPS: Automating the ICMPv6 Filtering Rules

    Directory of Open Access Journals (Sweden)

    Wan Ali Wan Nor Ashiqin

    2018-01-01

    Full Text Available Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6 when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP is aggressively filtered by a network administrator while in IPv6, ICMPv6 messages cannot be aggressively filtered due to the function of ICMPv6 message. ICMPv6 security risks increase when ICMPv6 threats and vulnerabilities are exploited. Thus, it is very crucial for enterprises to address the issues. In practice, network researchers must review several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6 vulnerabilities. Overlooking any of these issues will jeopardize the security of ICMPv6. While conducting the attack scenarios testing, IPv6-Filtering Prototype System (I6-FPS was developed to overcome the deficiency and limited filtering tools that supported IPv6 filtering rules (ip6table. I6-FPS is used to automate and simplify the writing of ip6table and it was developed using PHP5 and Shell script languages. This research revealed that I6-FPS is significant in the initial phase of securing IPv6 deployment as well as focusing on the ICMPv6 filtering rules. The I6-FPS has the potential to be enhanced and developed over time by including more functions to that system in generating specific filtering ip6table rules.

  19. IPv6 Convergence for IoT Cyber–Physical Systems

    Directory of Open Access Journals (Sweden)

    Keith Nolan

    2018-03-01

    Full Text Available We describe the evolution of the IoT towards a heterogeneous multitopology network subject to dynamic change and volatility yet still capable of secure and dependable operation. As part of this evolution, we outline the key changes in wireless communications technologies and heterogeneous networking that have arisen during the development of the IoT. We briefly outline the emerging area of cyber–physical systems, and associated technical challenges. We then describe how IP convergence can be viewed as the narrow waist connecting endpoint devices and fieldbus devices with applications and services in new Industry 4.0, and cyber–physical system use cases. We outline how a protocol-packing approach can be used for encapsulating LoRaWAN frames with IEEE 802.15.4 and IEEE 802.11 frames. Extending this, we propose a method for ultracompressed IPv6 signaling, and detail how this can be achieved in an example low-power wide-area technology, namely LoRaWAN. To support our proposed approach, we provide real-world analyses where IPv6 commands undergo a process of ultracompression and are then conveyed to a LoRaWAN endpoint. We find that IPv6 command ultracompression can potentially support command packet sizes that are over 20x smaller than the reported worst-case maximum protocol data unit size of 81 bytes.

  20. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  1. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  2. Enhanced Predictive Handover for Fast Proxy Mobile IPv6

    Science.gov (United States)

    Jeon, Seil; Kang, Namhi; Kim, Younghan

    Proxy Mobile IPv6 (PMIPv6) has been proposed in order to overcome the limitations of host-based mobility management in IPv6 networks. However, packet losses during doing handover are still a problem. To solve this issue, several schemes have been developed, and can be classified into two approaches: predictive and reactive handover. Both approaches commonly use bi-directional tunnel between mobile access gateways (MAGs). In predictive schemes especially, mobility support for a mobile node (MN) is triggered by simplified link signal strength. Thereafter, the MN sends handover notification to its serving MAG, and is then able to initiate packet forwarding. Therefore, if the MN moves toward an unexpected MAG that does not have any pre-established tunnel with the serving MAG, it may lead to packet losses. In this paper, we define this problem as Early Packet Forwarding (EPF). As a solution, we propose an enhanced PMIPv6 scheme using two-phase tunnel control based on the IEEE 802.21 Media Independent Handover (MIH).

  3. Estudi d'implantació de la IPv6 al CTTC

    OpenAIRE

    Escoda Ramon, Jordi

    2017-01-01

    In recent years, the number of devices connected to Internet has increased exponentially and in fact, it is estimated that the demand keep on increasing. When IPv4 protocol was introduced, this evolution was not expected. Over the years several limitations have arosen, including scalability and the unsustainable growth of the Internet routing table. In the late 90s, IPv6 protocol was defined to solve these issues and add new features. Currently, the Centre Tecnològic de Telecomunicacions de C...

  4. Threats and surprises behind IPv6 extension headers

    NARCIS (Netherlands)

    Hendriks, Luuk; Velan, Petr; de Oliveira Schmidt, Ricardo; De Boer, Pieter Tjerk; Pras, Aiko

    2017-01-01

    The concept of Extension Headers, newly introduced with IPv6, is elusive and enables new types of threats in the Internet. Simply dropping all traffic containing any Extension Header - a current practice by operators-seemingly is an effective solution, but at the cost of possibly dropping legitimate

  5. Implementation and Evaluation of DSMIPv6 for MIPL

    Science.gov (United States)

    Wang, Mingli; Hu, Bo; Chen, Shanzhi; Sun, Qinxue

    Mobile IPv6 performs mobility management to mobile node within IPv6 networks. Since IPv6 is not widely deployed yet, it’s an important feature to let Mobile IPv6 support mobile node moving to IPv4 network and maintaining the established communications. DSMIPv6 specification extends Mobile IPv6 capabilities to allow dual stack mobile nodes to move within IPv4 and IPv6 networks. This paper describes the implementation of this feature based on open source MIPL under Linux. By performing experiments on testbed using the implementation, it is confirmed that the DSMIPv6 works as expected.

  6. IPV6 Network Infrastructure and Stability Inference

    Science.gov (United States)

    2014-09-01

    the Too Big Trick ( TBT ) to induce the remote targets to return fragmented responses. By evaluating the responses, the uptime for approximately 35% of...Internet. Approximately 50,000 IPv6 addresses were probed continuously from March to June 2014, using the Too Big Trick ( TBT ) to induce the remote targets...SNMP Simple Network Management Protocol TSval Timestamp Value TCP Transmission Control Protocol TBT Too Big Trick USG U.S. government xiv

  7. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  8. Characterizing the IPv6 Security Landscape by Large-Scale Measurements

    NARCIS (Netherlands)

    Hendriks, Luuk; Sperotto, Anna; Pras, Aiko

    2015-01-01

    Networks are transitioning from IP version 4 to the new version 6. Fundamental differences in the protocols introduce new security challenges with varying levels of evidence. As enabling IPv6 in an existing network is often already challenging on the functional level, security aspects are

  9. Buried Waste Integrated Demonstration FY-95 Deployment Plan

    Energy Technology Data Exchange (ETDEWEB)

    Stacey, D.E.

    1995-03-01

    The Buried Waste Integrated Demonstration (BWID) is a program funded by the U.S. Department of Energy Office of Technology Development. BWID supports the applied research, development, demonstration, testing, and evaluation of a suite of advanced technologies that together form a comprehensive remediation system for the effective and efficient remediation of buried waste. The FY-95 effort will fund 24 technologies in five areas of buried waste site remediation: site characterization, waste characterization, retrieval, treatment, and containment/stabilization. Ten of these technologies will take part in the integrated field demonstration that will take place at the Idaho National Engineering Laboratory (INEL) facilities in the summer of 1995. This document is the basic operational planning document for deployment of all BWID projects funded in FY-95. Discussed in this document are the BWID preparations for the INEL integrated field demonstration, INEL research and development (R&D) demonstrations, non-INEL R&D demonstrations, and office research and technical review meetings. Each project will have a test plan detailing the specific procedures, objectives, and tasks of the test. Therefore, information that is specific to testing each technology is intentionally limited in this document.

  10. Buried Waste Integrated Demonstration FY-95 Deployment Plan

    International Nuclear Information System (INIS)

    Stacey, D.E.

    1995-03-01

    The Buried Waste Integrated Demonstration (BWID) is a program funded by the U.S. Department of Energy Office of Technology Development. BWID supports the applied research, development, demonstration, testing, and evaluation of a suite of advanced technologies that together form a comprehensive remediation system for the effective and efficient remediation of buried waste. The FY-95 effort will fund 24 technologies in five areas of buried waste site remediation: site characterization, waste characterization, retrieval, treatment, and containment/stabilization. Ten of these technologies will take part in the integrated field demonstration that will take place at the Idaho National Engineering Laboratory (INEL) facilities in the summer of 1995. This document is the basic operational planning document for deployment of all BWID projects funded in FY-95. Discussed in this document are the BWID preparations for the INEL integrated field demonstration, INEL research and development (R ampersand D) demonstrations, non-INEL R ampersand D demonstrations, and office research and technical review meetings. Each project will have a test plan detailing the specific procedures, objectives, and tasks of the test. Therefore, information that is specific to testing each technology is intentionally limited in this document

  11. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  12. Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN: A Survey

    Directory of Open Access Journals (Sweden)

    Vinay Kumar

    2012-01-01

    Full Text Available 6LoWPANs (IPv6-based Low-Power Personal Area Networks are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6 and data link layer (IEEE802.15.4 MAC to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.

  13. CONFIGURACIÓN DE UNA RED DE NUEVA GENERACIÓN PARA CONECTIVIDAD CON INTERNET RESPALDADO POR UN SERVICIO DNS CON SOPORTE PARA IPV4 E IPV6.

    Directory of Open Access Journals (Sweden)

    Carlos Andrés Martínez

    2012-05-01

    Full Text Available Se presentan las características mas representativas de la implementación de la isla ipv6 del centro de computación de alto desempeño CECAD, realizando pruebas de conexión y desempeño en el tráfico interno con las subredes de la Universidad Distrital y posteriormente con su conexión a Internet a través del protocolo NAT-PT secundado por un servidor de nombres de domino recursivo como base de conectividad y soporte sobre estructuras Ipv4 e Ipv6 nativas.

  14. Implementation of a Network Address Translation Mechanism Over IPv6

    National Research Council Canada - National Science Library

    Baumgartner, Trevor

    2004-01-01

    ...; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet - IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing...

  15. Wind Powering America FY06 Activities Summary

    Energy Technology Data Exchange (ETDEWEB)

    2007-02-01

    The Wind Powering America FY06 Activities Summary reflects the accomplishments of our state wind working groups, our programs at the National Renewable Energy Laboratory, and our partner organizations. The national WPA team remains a leading force for moving wind energy forward in the United States. WPA continues to work with its national, regional, and state partners to communicate the opportunities and benefits of wind energy to a diverse set of stakeholders. WPA now has 29 state wind working groups (welcoming New Jersey, Indiana, Illinois, and Missouri in 2006) that form strategic alliances to communicate wind's benefits to the state stakeholders. More than 120 members of national and state public and private sector organizations from 34 states attended the 5th Annual WPA All-States Summit in Pittsburgh in June.

  16. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  17. Evaluation of IPV6 and MOFI IOT

    OpenAIRE

    Shahjehan , Waleed; Zafar , Mohammad ,; Hussain , Irshad; Farooq , Muhammad

    2017-01-01

    International audience; One of the internet’s new revolution is Internet of Things (IOT) due to this objects themselves can recognize one another, get intelligence, transfer information to each other about their own and their ability to access the information that has been combined by other things.. The basic design of the IPV6 was that only end devices are the one with high intelligence and network is used for delivery of packets simply. In present Internet it is observed that inefficiency i...

  18. Evaluation of IPV6 and MOFI IOT

    OpenAIRE

    Waleed Shahjehan; Dr. Mohammad Haseeb Zafar

    2017-01-01

    One of the internet’s new revolution is Internet of Things (IOT) due to this objects themselves can recognize one another, get intelligence, transfer information to each other about their own and their ability to access the information that has been combined by other things.. The basic design of the IPV6 was that only end devices are the one with high intelligence and network is used for delivery of packets simply. In present Internet it is observed that inefficiency is created in Internet Pr...

  19. Intelligent IPv6 based iot network monitoring and altering system on ...

    African Journals Online (AJOL)

    Intelligent IPv6 based iot network monitoring and altering system on Cooja framework. ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS ... Keywords: IoT; Cooja framework; Contiki OS; packet monitoring.

  20. Strategic Studies Quarterly. Volume 6, Number 3. Fall 2012

    Science.gov (United States)

    2012-01-01

    in use, down to the level of specific version, the build number in use, and the history of security patches applied to it; • IP addresses of...IP addresses from 4,294,967,296 in IPv4 to 2128 in IPv6. It is recognized today that “deploying IPv6 is the only perennial way to ease pressure on...the public IPv4 address pool.”41 As the world begins a transition from using IPv4 to IPv6 as the dominant communications protocol for the global

  1. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  2. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  3. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP

  4. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    2013-01-01

    Full Text Available Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  5. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  6. Tcam от IPv4 к IPv6

    OpenAIRE

    Багинян, А.; Долбилов, А.

    2013-01-01

    Статья посвящена проблемам современной маршрутизации сети Интернет. Рассматриваются проблемы выборки маршрутов сетей, использования политик безопасности и качества обслуживания передаваемой информации. Отдельный раздел посвящен примерам использования свойств маски сетей для сокращения размеров таблиц маршрутизации. Рассмотрены различные возможные варианты компоновки адресной памяти, проведено сравнение между маршрутизацией по протоколу Ipv4 и Ipv6, а так же рассмотрены варианты программных и ...

  7. Analysing efficiency of IPv6 packet transmission over 6LoWPAN network

    Science.gov (United States)

    Kozłowski, Adam; Sosnowski, Janusz

    2017-08-01

    Practical proliferation of Internet of Things (IoT) concept depends upon communication efficiency in the related network. In the paper we outline basic features of wireless communication protocols used in IoT and concentrate on analysing communication overheads. In particular, we discuss the impact of IPv6 packet length on 6LoWPAN network operation with physical and MAC layer defined by IEEE 802.15.4 standard. The presented analysis methodology is useful in estimation of the total goodput (throughput at the application level) and energy consumptions within the whole traffic model which are the crucial features of IoT networks.

  8. A TOTP-based enhanced route optimization procedure for mobile IPv6 to reduce handover delay and signalling overhead.

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).

  9. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398

  10. The Unexplored Impact of IPv6 on Intrusion Detection Systems

    Science.gov (United States)

    2012-03-01

    Protocol Version 4 IPv4 Internet Protocol Version 6 IRC Internet Relay Chat LAN Local Area Network xv MiTM Man in the Middle MLD Multicast Listener...section. 1. Sniffing 2. Application Layer Attacks 3. Rogue Devices 4. Man In the Middle ( MITM ) 5. Flooding 6. Reconnaissance 7. Unauthorized access 8...the method by which worms find hosts may have to change. Man In The Middle ( MITM ) The general theory of the Man in the Middle ( MITM ) threat does not

  11. How Secure is the Next-Generation Internet? An Examination of IPv6

    Science.gov (United States)

    2013-10-01

    pp. 329 – 336. 87. World IPv6 Launch (2012) http://www.worldipv6launch.org. 88. Feilner, M. (2006) OpenVPN : Building and Integrating Virtual Private...traditionally based on IPsec, OpenVPN is actually a TLS-based VPN solution [88]. A.3 Conclusions This case study has demonstrated the ease with which an

  12. Buried waste integrated demonstration FY 94 deployment plan

    International Nuclear Information System (INIS)

    Hyde, R.A.; Walker, S.; Garcia, M.M.

    1994-05-01

    The Buried Waste Integrated Demonstration (BWID) is a program funded by the U.S. Department of Energy Office of Technology Development. BWID supports the applied research, development, demonstration, testing, and evaluation of a suite of advanced technologies that together form a comprehensive remediation system for the effective and efficient remediation of buried waste. The fiscal year (FY) 1994 effort will fund thirty-eight technologies in five areas of buried waste site remediation: site characterization, waste characterization, retrieval, treatment, and containment/stabilization. This document is the basic operational planning document for deployment of all BWID projects. Discussed in this document are the BWID preparations for INEL field demonstrations, INEL laboratory demonstrations, non-INEL demonstrations, and paper studies. Each technology performing tests will prepare a test plan to detail the specific procedures, objectives, and tasks of each test. Therefore, information specific to testing each technology is intentionally omitted from this document

  13. Wireless robot teleoperation via internet using IPv6 over a bluetooth personal area network

    Directory of Open Access Journals (Sweden)

    Carlos Araque Rodríguez

    2010-01-01

    Full Text Available En este artículo se presenta el diseño, construcción y pruebas de un sistema que permite la manipulación y visualización del robot Microbot Teachmover usando una conexión inalámbrica Bluetooth con dirección IPv6, brindando la posibilidad de manejar el robot desde diferentes escenarios: desde un dispositivo móvil que se encuentra en la misma piconet del robot; desde un computador que se encuentre en la misma piconet del robot y desde un computador que se encuentre conectado a Internet con una dirección IPv6.

  14. Análisis de rendimiento en redes IPv6

    Directory of Open Access Journals (Sweden)

    Andrés Eugenio Enríquez-Lenis

    2015-01-01

    Full Text Available El objetivo principal de esta investigación es determinar el desempeño de diferentes servicios en Internet sobre una arquitectura de red IPv6 por medio de experimentación. El método utilizado fue el empírico, y la metodología seguida, el modelo en cascada, paradigma del ciclo de vida clásico en ingeniería que exige un enfoque sistemático y secuencial. El experimento se desarrolló en el laboratorio de telemática de la Facultad de Ingeniería, en la Universidad Libre en Cali, donde se dispuso de 8 enrutadores, 4 conmutadores y 5 computadores personales. Los instrumentos utilizados fueron el analizador de protocolos Wireshark, analizador de paquetes PRTG, SYSLOG y SNMP server para captura de alarmas y eventos, y herramientas para pruebas en la red: tracert/ traceroute, ping y telnet. Como resultados se observa que el rendimiento de una red IPv6 depende del grado de congestión y del tipo de tráfico que circula en la misma. La investigación permite concluir que aunque se disponga de mecanismos complejos de Calidad de Servicio y Diferenciación de Servicios en Internet, en condiciones de saturación, ninguno de estos mecanismos permite garantizar que los servicios y aplicaciones sensibles, funcionen adecuadamente.

  15. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Directory of Open Access Journals (Sweden)

    Peer Azmat Shah

    2014-01-01

    Full Text Available Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP, video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node’s reachability at the home address and at the care-of address (home test and care-of test that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO, for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP along with verification of the mobile node via direct communication and maintaining the status of correspondent node’s compatibility. The TOTP-RO was implemented in network simulator (NS-2 and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6’s Return-Routability-based Route Optimization (RR-RO.

  16. IPv6 and IPsec Tests of a Space-Based Asset, the Cisco Router in Low Earth Orbit (CLEO)

    Science.gov (United States)

    Ivancic, William; Stewart, David; Wood, Lloyd; Jackson, Chris; Northam, James; Wilhelm, James

    2008-01-01

    This report documents the design of network infrastructure to support testing and demonstrating network-centric operations and command and control of space-based assets, using IPv6 and IPsec. These tests were performed using the Cisco router in Low Earth Orbit (CLEO), an experimental payload onboard the United Kingdom--Disaster Monitoring Constellation (UK-DMC) satellite built and operated by Surrey Satellite Technology Ltd (SSTL). On Thursday, 29 March 2007, NASA Glenn Research Center, Cisco Systems and SSTL performed the first configuration and demonstration of IPsec and IPv6 onboard a satellite in low Earth orbit. IPv6 is the next generation of the Internet Protocol (IP), designed to improve on the popular IPv4 that built the Internet, while IPsec is the protocol used to secure communication across IP networks. This demonstration was made possible in part by NASA s Earth Science Technology Office (ESTO) and shows that new commercial technologies such as mobile networking, IPv6 and IPsec can be used for commercial, military and government space applications. This has direct application to NASA s Vision for Space Exploration. The success of CLEO has paved the way for new spacebased Internet technologies, such as the planned Internet Routing In Space (IRIS) payload at geostationary orbit, which will be a U.S. Department of Defense Joint Capability Technology Demonstration. This is a sanitized report for public distribution. All real addressing has been changed to psueco addressing.

  17. Glowbal IP: An Adaptive and Transparent IPv6 Integration in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2012-01-01

    Full Text Available The Internet of Things (IoT requires scalability, extensibility and a transparent integration of multi-technology in order to reach an efficient support for global communications, discovery and look-up, as well as access to services and information. To achieve these goals, it is necessary to enable a homogenous and seamless machine-to-machine (M2M communication mechanism allowing global access to devices, sensors and smart objects. In this respect, the proposed answer to these technological requirements is called Glowbal IP, which is based on a homogeneous access to the devices/sensors offered by the IPv6 addressing and core network. Glowbal IP's main advantages with regard to 6LoWPAN/IPv6 are not only that it presents a low overhead to reach a higher performance on a regular basis, but also that it determines the session and identifies global access by means of a session layer defined over the application layer. Technologies without any native support for IP are thereby adaptable to IP e.g. IEEE 802.15.4 and Bluetooth Low Energy. This extension towards the IPv6 network opens access to the features and methods of the devices through a homogenous access based on WebServices (e.g. RESTFul/CoAP. In addition to this, Glowbal IP offers global interoperability among the different devices, and interoperability with external servers and users applications. All in all, it allows the storage of information related to the devices in the network through the extension of the Domain Name System (DNS from the IPv6 core network, by adding the Service Directory extension (DNS-SD to store information about the sensors, their properties and functionality. A step forward in network-based information systems is thereby reached, allowing a homogenous discovery, and access to the devices from the IoT. Thus, the IoT capabilities are exploited by allowing an easier and more transparent integration of the end users applications with sensors for the future evaluations and

  18. An IPv6 routing lookup algorithm using weight-balanced tree based on prefix value for virtual router

    Science.gov (United States)

    Chen, Lingjiang; Zhou, Shuguang; Zhang, Qiaoduo; Li, Fenghua

    2016-10-01

    Virtual router enables the coexistence of different networks on the same physical facility and has lately attracted a great deal of attention from researchers. As the number of IPv6 addresses is rapidly increasing in virtual routers, designing an efficient IPv6 routing lookup algorithm is of great importance. In this paper, we present an IPv6 lookup algorithm called weight-balanced tree (WBT). WBT merges Forwarding Information Bases (FIBs) of virtual routers into one spanning tree, and compresses the space cost. WBT's average time complexity and the worst case time complexity of lookup and update process are both O(logN) and space complexity is O(cN) where N is the size of routing table and c is a constant. Experiments show that WBT helps reduce more than 80% Static Random Access Memory (SRAM) cost in comparison to those separation schemes. WBT also achieves the least average search depth comparing with other homogeneous algorithms.

  19. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    OpenAIRE

    Pau, Louis-François

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP mobility , security, and flow label. Three operational cash flow focussed performance indexes are defined for respectively an Internet operator or ISP, for the address domain owner, and for the end user...

  20. Methods for Intelligent Mapping of the IPV6 Address Space

    Science.gov (United States)

    2015-03-01

    the " Internet of Things " ( IoT ). (2013, Jan. 7). Forbes. [Online]. Available: http://www.forbes.com/sites/quora/2013/01/07/ how-many- things -are...currently-connected-to-the- internet -of- things - iot / 57 [13] G. Huston, “IPv4 address report,” Mar 2015. [Online]. Available: http://www.potaroo.net/tools/ipv4...distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Due to the rapid growth of the Internet , the available pool of unique

  1. An improved network layer protocol based on mobile IPv6

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The mobile [Pv6 proposed by the IETF aims at providing mobility support on the next generation Internet. First, the authors described the basic principle of mobile lPv6 in brief and analyzed the advantages and disadvantages of it, presented a new idea of allocating a specific address space for mobile node ( MN ) and developed a new extension header and two ICMP message types for mobile IPv6. Lastly the authors proposed an optimization strategy, for mobile IPv6 based on these extensions of protocol, which has the following advantages:1 ) It is more convenient to manage the MNs because MN can be judged from its IP address; 2) When the correspondent node (CN) is not actively communicating with a MN, the MN and its home agent (HA) need not send Binding Update to tire CN, and the CN need not send Binding Request to the MN. Only when the CN really wants to send a packet to the MN, will the CN voluntarily send a MN Discover Request message to acquire the MN's care-of address. In this way, the transmission of Binding Update and Binding Request is greatly reduced, consequently the network overhead is also decreased; 3) While sending packets, the CN simply uses a MN Home Address Extension Header without using IPinlP encapsulation and routing header, which can reduce the redundant information in the packet and the message delay; 4) All the packets sent by the CN can be directly routed to the MN and the triangle routing can be completely avoided. By using these protocol extensions, the overhead of the network is greatly reduced and the network quality of services (QoS) is improved.

  2. An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2017-01-01

    Full Text Available The Neighbor Discovery Protocol (NDP is one of the main protocols in the Internet Protocol version 6 (IPv6 suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN, such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes, which is inevitable in the traditional distributed networks. Nevertheless, Software-Defined Networking (SDN provides a new perspective to think about protecting NDP. In this paper, we proposed an SDN-based authentication mechanism to verify the identity of NDP packets transmitted in a LAN. Using the centralized control and programmability of SDN, it can effectively prevent the spoofing attacks and other derived attacks based on spoofing. In addition, this mechanism needs no additional protocol supporting or configuration at hosts and routers and does not introduce any dedicated devices.

  3. Revisión de la seguridad en la implementación de servicios sobre IPv6

    Directory of Open Access Journals (Sweden)

    Raul Bareño Gutierrez

    2016-01-01

    Full Text Available En la actualidad los sistemas de transmisión e interconexión presentan varias vulnerabilidades, entre ellas, la facilidad de analizar tráfico que permite una tasa alta de ataques propios del protocolo IPv4, por ello se hace necesario que servicios como FTP, DHCP y SSH busquen la migración e implementación de redes IP bajo IPv6, la cual cuenta con características propias de la seguridad informática mediante el protocolo IPsec, sin importar el sistema operativo libre o propietario de los clientes finales. El presente artículo evalúa, mediante pruebas de configuración, la funcionalidad del estándar o protocolo IPv6 y sus características de seguridad en la implementación como opción de configuración en un escenario controlado para mitigar ataques en la autenticación, integridad y confidencialidad de la información, permitiendo determinar que los servicios analizados garantizan un mayor nivel de confiabilidad propio y nativo a través de IPsec por cualquier medio sobre el cual viajen los datos.

  4. Propuesta de interconexión mediante técnicas de entunelamiento de Islas IPv6 a través de una infraestructura de core MPLS/IPv4 con enrutadores de distribución doble

    Directory of Open Access Journals (Sweden)

    Danilo López

    2012-06-01

    Full Text Available The tunneling techniques have been widely used to interconnect IPv6 islands over native MPLS Core Infrastructure IPv4. However, due to limited scalability, it is usual to adopt other strategies as 6PE or 6VPE interconnection, which are much more complex to implement. This article proposes and implements level simulation using GNS3+Dynamips, a solution that makes use of tunneling techniques in the PE (Provider Edge (type double-stack of the network, reducing the drawbacks of the mesh scalability own tunnels on routers CE (Customer Edge and without the complexity and requirements regarding proper equipment and solutions 6VPE 6PE.

  5. Evolution of IPv6 Internet topology with unusual sudden changes

    International Nuclear Information System (INIS)

    Ai Jun; Su Zhan; Li Hui; Zhao Hai; Carley, Kathleen M.

    2013-01-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased

  6. Evolution of IPv6 Internet topology with unusual sudden changes

    Science.gov (United States)

    Ai, Jun; Zhao, Hai; Kathleen, M. Carley; Su, Zhan; Li, Hui

    2013-07-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased.

  7. Extending the Internet of Things to the Future Internet Through IPv6 Support

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2014-01-01

    Full Text Available Emerging Internet of Things (IoT/Machine-to-Machine (M2M systems require a transparent access to information and services through a seamless integration into the Future Internet. This integration exploits infrastructure and services found on the Internet by the IoT. On the one hand, the so-called Web of Things aims for direct Web connectivity by pushing its technology down to devices and smart things. On the other hand, the current and Future Internet offer stable, scalable, extensive, and tested protocols for node and service discovery, mobility, security, and auto-configuration, which are also required for the IoT. In order to integrate the IoT into the Internet, this work adapts, extends, and bridges using IPv6 the existing IoT building blocks (such as solutions from IEEE 802.15.4, BT-LE, RFID while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation. Specifically, this work presents an extended Internet stack with a set of adaptation layers from non-IP towards the IPv6-based network layer in order to enable homogeneous access for applications and services.

  8. Enhancing MISP with Fast Mobile IPv6 Security

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  9. First-in-human safety and immunogenicity investigations of three adjuvanted reduced dose inactivated poliovirus vaccines (IPV-Al SSI) compared to full dose IPV Vaccine SSI when given as a booster vaccination to adolescents with a history of IPV vaccination at 3, 5, 12months and 5years of age.

    Science.gov (United States)

    Lindgren, Line M; Tingskov, Pernille N; Justesen, Annette H; Nedergaard, Bettina S; Olsen, Klaus J; Andreasen, Lars V; Kromann, Ingrid; Sørensen, Charlotte; Dietrich, Jes; Thierry-Carstensen, Birgit

    2017-01-23

    There is a demand of affordable IPV in the World. Statens Serum Institut (SSI) has developed three reduced dose IPV formulations adsorbed to aluminium hydroxide; 1/3 IPV-Al, 1/5 IPV-Al and 1/10 IPV-Al SSI, and now report the results of the first investigations in humans. 240 Danish adolescents, aged 10-15years, and childhood vaccinated with IPV were booster vaccinated with 1/3 IPV-Al, 1/5 IPV-Al, 1/10 IPV-Al or IPV Vaccine SSI. The booster effects (GMTRs) of the three IPV-Al SSI were compared to IPV Vaccine SSI, and evaluated for non-inferiority. The pre-vaccination GMTs were similar across the groups; 926 (type 1), 969 (type 2) and 846 (type 3) in the total trial population. The GMTRs by poliovirus type and IPV formulation were: Type 1: 17.0 (1/3 IPV-Al), 13.0 (1/5 IPV-Al), 7.1 (1/10 IPV-Al) and 42.2 (IPV Vaccine SSI). Type 2: 12.5 (1/3 IPV-Al), 13.1 (1/5 IPV-Al), 7.6 (1/10 IPV-Al) and 47.8 (IPV Vaccine SSI). Type 3: 14.5 (1/3 IPV-Al), 16.2 (1/5 IPV-Al), 8.9 (1/10 IPV-Al) and 62.4 (IPV Vaccine SSI) Thus, the three IPV-Al formulations were highly immunogenic, but inferior to IPV Vaccine SSI, in this booster vaccination trial. No SAE and no AE of severe intensity occurred. 59.2% of the subjects reported at least one AE. Injection site pain was the most frequent AE in all groups; from 24.6% to 43.3%. Injection site redness and swelling frequencies were<5% in most and<10% in all groups. The most frequent systemic AEs were fatigue (from 8.2% to 15.0%) and headache (from 15.0% to 28.3%). Most AEs were of mild intensity. In conclusion, the three IPV-Al SSI were safe in adolescents and the booster effects were satisfactory. ClinicalTrials.gov registration number: NCT02280447. Copyright © 2016. Published by Elsevier Ltd.

  10. IPV Screening and Readiness to Respond to IPV in Ob-Gyn Settings: A Patient-Physician Study

    Directory of Open Access Journals (Sweden)

    Katherine M. Jones

    2018-01-01

    Full Text Available Purpose. Intimate partner violence (IPV is a serious, preventable public health concern that largely affects women of reproductive age. Obstetrician-gynecologists (ob-gyns have a unique opportunity to identify and support women experiencing IPV to improve women’s health. Considering recent efforts to increase IPV awareness and intervention, the present study aimed to provide a current evaluation of nationally representative samples to assess ob-gyn readiness to respond to IPV as well as patient IPV-related experiences. Methods. 400 ob-gyns were randomly selected from American College of Obstetricians and Gynecologists’ (ACOG Collaborative Ambulatory Research Network. Each physician was mailed one physician survey and 25 patient surveys. Results. IPV training/education and IPV screening practices were associated with most measures of ob-gyn readiness to respond to IPV. Among respondents, 36.8% endorsed screening all patients at annual exams; however, 36.8% felt they did not have sufficient training to assist individuals in addressing IPV. Workplace encouragement of IPV response was associated with training, screening, detection, preparation/knowledge, response practices, and resources. Thirty-one percent of patients indicated their ob-gyn had asked about possible IPV experiences during their medical visit. Conclusion. Findings highlight specific gaps in ob-gyns’ IPV knowledge and response practices to be further addressed by IPV training.

  11. Movilidad en IPV6: simulación con Network Simulator

    Directory of Open Access Journals (Sweden)

    Javier Eduardo Carvajal Escobar

    2013-07-01

    Full Text Available IP Móvil es la propuesta de Internet Engineering Task Force (IETF para el protocolo de movilidad llamado MIPv6. Este protocolo se ha convertido en la columna vertebral de las nuevas tecnologías de redes inalámbricas mediante las cuales se busca proveer de un servicio ininterrumpido mientras se está en movimiento. Este artículo presenta una visión general del funcionamiento de dicho protocolo, los términos relacionados con este y los nuevos ensajes que vienen dentro del encabezado de movilidad en IPv6. Después se realiza una simulación de dicho protocolo con el software Network Simulator 2, bajo licencia GNU de distribución libre. Como resultado de la simulación se obtiene un archivo de trazas en el cual se plasman todos los eventos.

  12. Funcionalidad, diseño, simulación y configuración de dispositivos para una red MPLS en entorno IPV6

    OpenAIRE

    Reyes Altamirano, Rolando Javier

    2014-01-01

    The final degree is intended to raise awareness of the operation, design, infrastructure elements, simulating a MPLS network in IPv6 environment due to high demand from users to the internet, increased smartphone devices, pc, tablet, high QoS, video conference, VoIP, data. MPLS is the dominant technology in the core of the network is able to open multiple paths between a source and a destination, and integrate multiple services for the same channel, this joined the IPV6 protocol that supplies...

  13. Operation Iraqi Freedom 06-08

    Science.gov (United States)

    2008-02-14

    Managemen 15.6.6 Results Related t 15.6.7 NCOs and Multiple-Deployments 15.6.8 Validated Trainin 15.6.9 Theater Suicide Prevention Program and Suicide...include mental health providers who have deployed to the IT0 and are experienced using AHLTA- T . As noted above, as the operational theater matures in...Mental Health Advisory Team (MHAT) V Operation Iraqi Freedom 06-08 14 February 2008 Office of the Surgeon Multi-National Force-Iraq and Office

  14. Happy World IPv6 Day!

    CERN Multimedia

    Adrian Giordani (iSGTW)

    2011-01-01

    Almost 20 years after Tim Berners-Lee posted a summary of his World Wide Web project on the newsgroup, there are more than two billion users worldwide, and billions more web pages. It has transformed the way we socialize, conduct business, and even changed the way we do science. But unfortunately, the number of available Internet addresses has not grown at the same place to accommodate these changes.   The number of Internet addresses is fixed because of the way the Internet operates: data is routed through the Internet in packets that use numeric addresses to encode its origin and its destination. The layer of communication at this level is called Internet Protocol (IP), originally developed by Vint Cerf, a program manager at the US Department of Defense Advanced Research Projects Agency and now Vice President and Chief Internet Evangelist of Google, USA, and member of numerous boards including as Commissioner for the Broadband Commission for Digital Development in 2010. IPv4 addresses, w...

  15. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    Science.gov (United States)

    Anwar, Farhat; Masud, Mosharrof H.; Latif, Suhaimi A.

    2013-12-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6.

  16. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    International Nuclear Information System (INIS)

    Anwar, Farhat; Masud, Mosharrof H; Latif, Suhaimi A

    2013-01-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6

  17. IPv6 ネットワークにおける BGP 経路制御トラヒックの解析

    OpenAIRE

    有田, 真也

    2004-01-01

    インターネットは 1990 年代に急速に普及し、我々の生活やビジネスを変えるまでに至っている。現在、インターネットのパケット通信において主に利用されているのは IPv4 である。しかし、インターネットが爆発的に普及するにつれて IP アドレスの枯渇など、IPv4 の欠点がいくつか明らかになり、新たなインターネットプロトコルであるIPv6 が開発された。最近では、IPv6 の実装も着実に進んでおり、日本ではさまざまな応用分野で IPv6 のビジネス化を狙った実証実験が行われている。こうした状況で、本論文は IPv6 ネットワークの BGP 経路制御トラヒックの解析を行った。そして、少数の不安定な経路が IPv6 ネットワークにおける Routing Instability に大きな影響を与えていることや Routing Instability の統計的特徴を明らかにした。...

  18. Production of high titer attenuated poliovirus strains on the serum-free PER.C6(®) cell culture platform for the generation of safe and affordable next generation IPV.

    Science.gov (United States)

    Sanders, Barbara P; Oakes, Isabel de los Rios; van Hoek, Vladimir; Liu, Ying; Marissen, Wilfred; Minor, Philip D; Wimmer, Eckard; Schuitemaker, Hanneke; Custers, Jerome H H V; Macadam, Andrew; Cello, Jeronimo; Edo-Matas, Diana

    2015-11-27

    As poliovirus eradication draws closer, alternative Inactivated Poliovirus Vaccines (IPV) are needed to overcome the risks associated with continued use of the Oral Poliovirus Vaccine and of neurovirulent strains used during manufacture of conventional (c) IPV. We have previously demonstrated the susceptibility of the PER.C6(®) cell line to cIPV strains; here we investigated the suspension cell culture platform for growth of attenuated poliovirus strains. We examined attenuated Sabin strain productivity on the PER.C6(®) cell platform compared to the conventional Vero cell platform. The suitability of the suspension cell platform for propagation of rationally-attenuated poliovirus strains (stabilized Sabin type 3 S19 derivatives and genetically attenuated and stabilized MonoCre(X) strains), was also assessed. Yields were quantified by infectious titer determination and D-antigen ELISA using either serotype-specific polyclonal rabbit sera for Sabin strains or monoclonal cIPV-strain-specific antibodies for cIPV, S19 and MonoCre(X) strains. PER.C6(®) cells supported the replication of Sabin strains to yields of infectious titers that were in the range of cIPV strains at 32.5°C. Sabin strains achieved 30-fold higher yields (pSabin strain productivity on the PER.C6(®) cell platform was maintained at 10l scale. Yields of infectious titers of S19 and MonoCre(X) strains were 0.5-1 log10 lower than seen for cIPV strains, whereas D-antigen yield and productivities in doses/ml using rationally-attenuated strains were in line with yields reported for cIPV strains. Sabin and rationally-attenuated polioviruses can be grown to high infectious titers and D-antigen yields. Sabin strain infection shows increased productivity on the PER.C6(®) cell platform as compared to the conventional Vero cell platform. Novel cell platforms with the potential for higher yields could contribute to increased affordability of a next generation of IPV vaccines needed for achieving and

  19. Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs

    OpenAIRE

    Dominic Savio, Lourdes Gino

    2016-01-01

    Covert Channels are communication channels used for information transfer, and created by violating the security policies of a system (Latham, 1986, p. 80). Research in the field has shown that, like many communication channels, IPv4 and the TCP/IP protocol suite has features, functionality and options which could be exploited by cyber criminals to leak data or for anonymous communications, through covert channels. With the advent of IPv6, researchers are on the lookout for covert channels in ...

  20. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Science.gov (United States)

    Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  1. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Directory of Open Access Journals (Sweden)

    Byungseok Kang

    Full Text Available Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6 is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6 protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN to an MN. Since the problem affects the quality of service (QoS of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  2. Complexity attack resistant flow lookup achemes for IPv6: a measurement based comparison

    OpenAIRE

    Malone, David; Tobin, R. Joshua

    2008-01-01

    In this paper we look at the problem of choosing a good flow state lookup scheme for IPv6 firewalls. We want to choose a scheme which is fast when dealing with typical traffic, but whose performance will not degrade unnecessarily when subject to a complexity attack. We demonstrate the existing problem and, using captured traffic, assess a number of replacement schemes that are hash and tree based. Our aim is to improve FreeBSD’s ipfw firewall, and so finally we implement the most pro...

  3. Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones

    NARCIS (Netherlands)

    Borgolte, Kevin; Hao, Shuang; Fiebig, T.; Vigna, Giovanny

    2018-01-01

    Security research has made extensive use of exhaustive Internet-wide scans over the recent years, as they can provide significant insights into the overall state of security of the Internet, and ZMap made scanning the entire IPv4 address space practical. However, the IPv4 address space is exhausted,

  4. IPv6-Based Smart Metering Network for Monitoring Building Electricity

    Directory of Open Access Journals (Sweden)

    Dong Xu

    2013-01-01

    Full Text Available A smart electricity monitoring system of building is presented using ZigBee and internet to establish the network. This system consists of three hardware layers: the host PC, the router, and the sensor nodes. A hierarchical ant colony algorithm is developed for data transmission among the wireless sensor nodes. The wireless communication protocol is also designed based on IPv6 protocol on IEEE 802.15.4 wireless network. All-IP approach and peer-to-peer mode are integrated to optimize the network building. Each node measures the power, current, and voltage and transmits them to the host PC through the router. The host software is designed for building test characteristics, having a tree hierarchy and a friendly interface for the user. The reliability and accuracy of this monitoring system are verified in the experiment and application.

  5. ESTADO DEL ARTE DE IPTV Y CONSIDERACIONES TÉCNICAS PARA SU MIGRACIÓN A IPV6 EN COLOMBIA

    Directory of Open Access Journals (Sweden)

    Danilo Alfonso López Sarmiento

    2011-08-01

    Full Text Available El artículo tiene como objetivos centrales hacer una revisión del estado del arte de IPTV (Televisión a través de IP y una propuesta para la implementación de esta tecnología en Colombia sobre una red IPv6. La convergencia de las teleco-municaciones ha dado origen a aplicaciones IP que permiten acceso a contenidos audiovisuales digitalizados a través de re-des que hacen uso de dicho protocolo. Se abordanestudios ac-tuales que tratan características fundamentales de televisión sobre la red de datos,  como el funcionamiento, la arquitectura, los estándares en los que se basa, propuestas para evaluar las políticas de calidad de servicio y por ultimo consideraciones técnicas para su implementación en una red IPv6.

  6. IPv6 (Internet Protocol version 6) heterogeneous networking infrastructure for energy efficient building

    International Nuclear Information System (INIS)

    Ben Saad, Leila; Chauvenet, Cedric; Tourancheau, Bernard

    2012-01-01

    In the context of increasing developments of home, building and city automation, Power Line Communication (PLC) networking is called for unprecedented usage, especially for energy efficiency improvement. Our view of the future building networking infrastructure places PLC as the central point. We point that while Wireless Sensor Network (WSN) is necessary in the sensor and actuator networking infrastructure, PLC is mandatory for the smart-grid metering and command infrastructure. PLC will also serve the sensor/actuator infrastructure when the energy requirement of the probing system itself cannot be fulfilled by autonomous battery and harvesting based nodes. PLC may also provide the numerous bridges necessary to sustain a long lifetime (years) with the battery based WSN part of the infrastructure. This new role of PLC networking will be possible only if the interoperability between all media and technology is made possible. Thanks to the converging design of Internet Protocol version 6 (IPv6) networking layers, we show that such a full inter-interoperability is already possible even in very tiny constrained networking devices. Moreover, the low power PLC technology used in our experiments will be able to provide this smart grid monitoring without impacting noticeably the overall energy balance of the monitored system.

  7. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  8. Intimate partner violence (IPV)

    DEFF Research Database (Denmark)

    Rasch, Vibeke; Van, Toan Ngo; Nguyen, Hanh Thi Thuy

    2018-01-01

    BACKGROUND: Intimate partner violence (IPV) is a global problem that affects one-third of all women. The present study aims to develop and determine the validity of a screening instrument for the detection of IPV in pregnant women in Tanzania and Vietnam and to determine the minimum number...

  9. Modelo test-bed de simulación y evaluación de criptografía de curva elíptica en redes IPv6 de próxima generación

    OpenAIRE

    Nelson Enrique Vera Parra; Danilo Alfonso López; Héctor Cristyan Manta Caro

    2014-01-01

    En la actualidad, las redes móviles e inalámbricas de nueva generación, tales como las redes de área personal IPv6 de baja potencia (6LoWPAN), redes de sensores inalámbricos sobre IPv6 y redes móviles IPv6 jerárquicas se encuentran bajo rigurosa investigación y desarrollo, pues representan el paso por seguir en la evolución de las redes Machine-to-Machine (M2M), al tiempo que apoyan el acceso de banda ancha de la próxima generación de tecnologías y sistemas inteligentes sobre Internet futuro....

  10. The association between child exposure to intimate partner violence (IPV) and perpetration of IPV in adulthood-A systematic review.

    Science.gov (United States)

    Kimber, Melissa; Adham, Sami; Gill, Sana; McTavish, Jill; MacMillan, Harriet L

    2018-02-01

    Increasingly recognized as a distinct form of childhood maltreatment, children's exposure to intimate partner violence (IPV) has been shown to be associated with an array of negative psychosocial outcomes, including elevated risk for additional violence over the life course. Although studies have identified child exposure to IPV as a predictor of IPV perpetration in adulthood, no review has critically evaluated the methodology of this quantitative work. The present study examines the association between childhood exposure to IPV and the perpetration of IPV in adulthood based on a systematic review of the literature from inception to January 4, 2016. Databases searched included Medline, Embase, PsycINFO, CINAHL, Cochrane Database of Systematic Reviews, Sociological Abstracts and ERIC. Database searches were complemented with backward and forward citation chaining. Studies were critically appraised using the Quality Assessment Tool for Observational Cohort and Cross-Sectional Studies. Of 5601 articles identified by the search, 19 studies were included for data extraction. Sixteen of these studies found that child exposure to IPV was significantly and positively associated with adult IPV perpetration; three studies reported null findings. The methodological quality of the studies was low. Work thus far has tended to focus on child exposure to physical IPV and the perpetration of physical IPV within heterosexual contexts. In addition, measures of child exposure to IPV vary in their classification of what exposure entails. We critically discuss the strengths and limitations of the existing evidence and the theoretical frameworks informing this work. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Domain Name Server Security (DNSSEC) Protocol Deployment

    Science.gov (United States)

    2014-10-01

    Platform How IPv6 and DNSSEC Change the Intranets OARC Workshop San Francisco, March 2011 Materials available at: https://indico.dns-oarc.net...DNSSEC In Operation NIC .sn The Mensa project - Measuring DNS Health and Security How IPv6 and DNSSEC change the Intranets DNSSEC Update for DE...Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP Bill Global IPv6 Summit, Taipei, Taiwan, November 2011 TWCERT/CC

  12. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Nursimloo DeeyaS

    2008-01-01

    Full Text Available Abstract This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  13. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Deeya S. Nursimloo

    2007-12-01

    Full Text Available This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  14. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    Science.gov (United States)

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  15. Sensor Proxy Mobile IPv6 (SPMIPv6—A Novel Scheme for Mobility Supported IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-02-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6. We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  16. Connecting the snowpack to the internet of things: an IPv6 architecture for providing real-time measurements of hydrologic systems

    Science.gov (United States)

    Kerkez, B.; Zhang, Z.; Oroza, C.; Glaser, S. D.; Bales, R. C.

    2012-12-01

    We describe our improved, robust, and scalable architecture by which to rapidly instrument large-scale watersheds, while providing the resulting data in real-time. Our system consists of more than twenty wireless sensor networks and thousands of sensors, which will be deployed in the American River basin (5000 sq. km) of California. The core component of our system is known as a mote, a tiny, ultra-low-power, embedded wireless computer that can be used for any number of sensing applications. Our new generation of motes is equipped with IPv6 functionality, effectively giving each sensor in the field its own unique IP address, thus permitting users to remotely interact with the devices without going through intermediary services. Thirty to fifty motes will be deployed across 1-2 square kilometer regions to form a mesh-based wireless sensor network. Redundancy of local wireless links will ensure that data will always be able to traverse the network, even if hash wintertime conditions adversely affect some network nodes. These networks will be used to develop spatial estimates of a number of hydrologic parameters, focusing especially on snowpack. Each wireless sensor network has one main network controller, which is responsible with interacting with an embedded Linux computer to relay information across higher-powered, long-range wireless links (cell modems, satellite, WiFi) to neighboring networks and remote, offsite servers. The network manager is also responsible for providing an Internet connection to each mote. Data collected by the sensors can either be read directly by remote hosts, or stored on centralized servers for future access. With 20 such networks deployed in the American River, our system will comprise an unprecedented cyber-physical architecture for measuring hydrologic parameters in large-scale basins. The spatiotemporal density and real-time nature of the data is also expected to significantly improve operational hydrology and water resource

  17. Safety and immunogenicity of a primary series of Sabin-IPV with and without aluminum hydroxide in infants.

    Science.gov (United States)

    Verdijk, Pauline; Rots, Nynke Y; van Oijen, Monique G C T; Weldon, William C; Oberste, M Steven; Okayasu, Hiromasa; Sutter, Roland W; Bakker, Wilfried A M

    2014-09-03

    An inactivated poliovirus vaccine (IPV) based on attenuated poliovirus strains (Sabin-1, -2 and -3) was developed for technology transfer to manufacturers in low- and middle-income countries in the context of the global polio eradication initiative. Safety and immunogenicity of Sabin-IPV (sIPV) was evaluated in a double-blind, randomized, controlled, dose-escalation trial in the target population. Healthy infants (n=20/group) aged 56-63 days, received a primary series of three intramuscular injections with low-, middle- or high-dose sIPV with or without aluminum hydroxide or with the conventional IPV based on wild poliovirus strains (wIPV). Virus-neutralizing titers against both Sabin and wild poliovirus strains were determined before and 28 days after three vaccinations. The incidence of local and systemic reactions was comparable with the wIPV. Seroconversion rates after three vaccinations were 100% for type 2 and type 3 polioviruses (both Sabin and wild strains) and 95-100% for type 1 polioviruses. Median titers were high in all groups. Titers were well above the log2(titer) correlated with protection (=3) for all groups. Median titers for Sabin-2 were 9.3 (range 6.8-11.5) in the low-dose sIPV group, 9.2 (range 6.8-10.2) in the low-dose adjuvanted sIPV group and 9.8 (range 5.5-15.0) in the wIPV group, Median titers against MEF-1 (wild poliovirus type 2) were 8.2 (range 4.8-10.8) in the low-dose sIPV group, 7.3 (range 4.5-10.2) in the low-dose adjuvanted Sabin-IPV group and 10.3 (range 8.5-17.0) in the wIPV group. For all poliovirus types the median titers increased with increasing dose levels. sIPV and sIPV adjuvanted with aluminum hydroxide were immunogenic and safe at all dose levels, and comparable with the wIPV. EudraCTnr: 2011-003792-11, NCT01709071. Copyright © 2014. Published by Elsevier Ltd.

  18. АНАЛІЗ МЕТОДІВ ВИРІШЕННЯ ПРОБЛЕМ ЩОДО ВПРОВАДЖЕННЯ ПРОТОКОЛУ IPV6

    OpenAIRE

    Созонник, Галина Дмитрівна; Гамза, Дмитро Євгенійович

    2017-01-01

    IPv6 implementation problems research IPv6 implementation problems research, analysis of the IPv6 advantages and its’ compatibility with IPv4; methods of transition from IPv6 to IPv4, transitional technologies

  19. Adaptable Deployable Entry & Placement Technology (ADEPT) for Cubesat Delivery to Mars Surface

    Science.gov (United States)

    Wercinski, Paul

    2014-01-01

    The Adaptable, Deployable Entry and Placement Technology (ADEPT), uses a mechanical skeleton to deploy a revolutionary carbon fabric system that serves as both heat shield and primary structure during atmospheric entry. The NASA ADEPT project, currently funded by the Game Changing Development Program in STMD is currently focused on 1m class hypersonic decelerators for the delivery of very small payloads ( 5 kg) to locations of interest in an effort to leverage low-cost platforms to rapidly mature the technology while simultaneously delivering high-value science. Preliminary mission design and aerothermal performance testing in arcjets have shown the ADEPT system is quite capable of safe delivery of cubesats to Mars surface. The ability of the ADEPT to transit to Mars in a stowed configuration (similar to an umbrella) provides options for integration with the Mars 2020 cruise stage, even to consider multiple ADEPTs. System-level test campaigns are underway for FY15 execution or planning for FY16. These include deployment testing, wind tunnel testing, system-level arc jet testing, and a sounding rocket flight test. The goal is system level maturation (TRL 6) at a 1m class Mars design reference mission configuration.

  20. Modelování IPv6 v prostředí OMNeT++

    OpenAIRE

    Černý, Marek

    2011-01-01

    OMNeT++ je diskrétní simulátor hojně používaný k vytváření nejrůznějších síťových simulací. Lze jej dále rozšířit např. frameworkem INET, který obsahuje modely protokolů a zařízení z prostředí TCP/IP síti. V této práci se soustředíme na zkoumání současných možností balíku INET modelovat internetový protokol verze 6. Obzvláště se zaměřujeme na podporu směrování. V rámci implementace pak byly vytvořeny moduly dual-stack směrovače a dual-stack klienta s podporou manuální i automatické IPv6 adres...

  1. Antibody responses of Macaca fascicularis against a new inactivated polio vaccine derived from Sabin strains (sIPV) in DTaP-sIPV vaccine.

    Science.gov (United States)

    Sato, Y; Shiosaki, K; Goto, Y; Sonoda, K; Kino, Y

    2013-05-01

    Antibody responses of Macaca fascicularis against a new tetravalent vaccine composed of diphtheria toxoid, tetanus toxoid, acellular pertussis antigens, and inactivated poliovirus derived from Sabin strains (sIPV) was investigated to predict an optimal dose of sIPV in a new tetravalent vaccine (DTaP-sIPV) prior to conducting a dose-defined clinical study. Monkeys were inoculated with DTaP-sIPVs containing three different antigen units of sIPVs: Vaccine A (types 1:2:3 = 3:100:100 DU), Vaccine B (types 1:2:3 = 1.5:50:50 DU), and Vaccine C (types 1:2:3 = 0.75:25:25 DU). There was no difference in the average titers of neutralizing antibody against the attenuated or virulent polioviruses between Vaccines A and B. The average neutralizing antibody titers of Vaccine C tended to be lower than those of Vaccines A and B. The sIPV antigens did not affect the anti-diphtheria or anti-tetanus antibody titers of DTaP-sIPV. Furthermore, the average neutralizing antibody titers of Vaccine A against the attenuated and virulent polioviruses were comparable between M. fascicularis and humans. These results suggest that M. fascicularis may be a useful animal model for predicting the antibody responses to sIPVs in humans, and that it may be likely to reduce the amount of sIPVs contained in DTaP-sIPVs, even for humans. Copyright © 2013 The International Alliance for Biological Standardization. Published by Elsevier Ltd. All rights reserved.

  2. Immunogenicity and safety of three aluminium hydroxide adjuvanted vaccines with reduced doses of inactivated polio vaccine (IPV-Al) compared with standard IPV in young infants in the Dominican Republic: a phase 2, non-inferiority, observer-blinded, randomised, and controlled dose investigation trial.

    Science.gov (United States)

    Rivera, Luis; Pedersen, Rasmus S; Peña, Lourdes; Olsen, Klaus J; Andreasen, Lars V; Kromann, Ingrid; Nielsen, Pernille I; Sørensen, Charlotte; Dietrich, Jes; Bandyopadhyay, Ananda S; Thierry-Carstensen, Birgit

    2017-07-01

    Cost and supply constraints are key challenges in the use of inactivated polio vaccine (IPV). Dose reduction through adsorption to aluminium hydroxide (Al) is a promising option, and establishing its effectiveness in the target population is a crucial milestone in developing IPV-Al. The aim of this clinical trial was to show the non-inferiority of three IPV-Al vaccines to standard IPV. In this phase 2, non-inferiority, observer-blinded, randomised, controlled, single-centre trial in the Dominican Republic, healthy infants aged 6 weeks, not previously polio vaccinated, were allocated after computer-generated randomisation by block-size of four, to receive one of four IPV formulations (three-times reduced dose [1/3 IPV-Al], five-times reduced dose [1/5 IPV-Al], ten-times reduced dose [1/10 IPV-Al], or IPV) intramuscularly in the thigh at 6, 10, and 14 weeks of age. The primary outcome was seroconversion for poliovirus types 1, 2, and 3 with titres more than or equal to four-fold higher than the estimated maternal antibody titre and more than or equal to 8 after three vaccinations. Non-inferiority was concluded if the lower two-sided 90% CI of the seroconversion rate difference between IPV-Al and IPV was greater than -10%. The safety analyses were based on the safety analysis set (randomly assigned participants who received at least one trial vaccination) and the immunogenicity analyses were based on the per-protocol population. This study is registered with ClinicalTrials.gov registration, number NCT02347423. Between Feb 2, 2015, and Sept 26, 2015, we recruited 824 infants. The per-protocol population included 820 infants; 205 were randomly assigned to receive 1/3 IPV-Al, 205 to receive 1/5 IPV-Al, 204 to receive 1/10 IPV-Al, and 206 to receive IPV. The proportion of individuals meeting the primary endpoint of seroconversion for poliovirus types 1, 2, and 3 was already high for the three IPV-Al vaccines after two vaccinations, but was higher after three vaccinations

  3. Application modeling ipv6 (internet protocol version 6) on e-id card for identification number for effectiveness and efficiency of registration process identification of population

    Science.gov (United States)

    Pardede, A. M. H.; Maulita, Y.; Buaton, R.

    2018-03-01

    When someone wants to be registered in an institution such as Birth Certificate, School, Higher Education, e-ID card, Tax, BPJS, Bank, Driving License, Passport and others then have to register and do registration one by one and have registration number or account respectively agency. It may be said that everyone is bothered with the registration process, from the moment of birth must be registered to be registered as a resident, to enter the school must also registration, it is considered ineffective and efficient because one must continue to register one by one and there is repetition of ownership registration number which vary each agency. Seeing these problems need to find a solution or attempt how to keep the affairs of registration is not repetitive and quite once and the number applies to all agencies. The presence of the latest technology that IPv6 brings opportunities for the efficiency and effectiveness of the registration system. The method used in this research is the exploration and modeling of system development with NDLC (Network Development Life Cycle) to produce a model to build IPv6 implementation on e-ID card. The results of the study will show that the public has one registration number.

  4. Intimate partner violence: IPV in the LGBT community.

    Science.gov (United States)

    Chen, Ping-Hsin; Jacobs, Abbie; Rovi, Susan L D

    2013-09-01

    Nationally, the rates of intimate partner violence (IPV) among lesbian, gay, bisexual, or transgender (LGBT) individuals are similar to or greater than rates for heterosexuals. Many have experienced psychological and physical abuse as sexual minorities, making it difficult for them to seek help for IPV. Physician behavior, such as not assuming that all patients are heterosexual, being nonjudgmental, and using inclusive language, can empower LGBT patients to disclose IPV. Also, physicians should ascertain the degree to which the patient is out. The threat of being outed can be an aspect of the power and control exerted by an abusive partner and a significant barrier to seeking help. Physicians should screen for IPV and intervene in a similar manner with LGBT and non-LGBT patients, but they should be aware of potential limitations in resources for LGBT patients, such as shelters. As sexual minorities experiencing IPV, LGBT individuals are at greater risk of depression and substance abuse than are non-LGBT individuals. Minority stress, resulting from stigmatization and discrimination, can be exacerbated by IPV. Physicians should learn about legal issues for LGBT individuals and the availability of community or advocacy programs for LGBT perpetrators or victims of IPV. Written permission from the American Academy of Family Physicians is required for reproduction of this material in whole or in part in any form or medium.

  5. OpenFlow Deployment and Concept Analysis

    Directory of Open Access Journals (Sweden)

    Tomas Hegr

    2013-01-01

    Full Text Available Terms such as SDN and OpenFlow (OF are often used in the research and development of data networks. This paper deals with the analysis of the current state of OpenFlow protocol deployment options as it is the only real representative protocol that enables the implementation of Software Defined Networking outside an academic world. There is introduced an insight into the current state of the OpenFlow specification development at various levels is introduced. The possible limitations associated with this concept in conjunction with the latest version (1.3 of the specification published by ONF are also presented. In the conclusion there presented a demonstrative security application addressing the lack of IPv6 support in real network devices since most of today's switches and controllers support only OF v1.0.

  6. Magnetic and charge ordering properties of Bi0.6−xEuxCa0.4MnO3 (0.0≤x≤0.6)

    International Nuclear Information System (INIS)

    Yadav, Kamlesh; Singh, M.P.; Razavi, F.S.; Varma, G.D.

    2012-01-01

    We have studied structure, magnetic and transport properties of polycrystalline Bi 0.6−x Eu x Ca 0.4 MnO 3 (x=0.0, 0.1, 0.2, 0.3, 0.4, 0.5 and 0.6) perovskite manganites. Magnetic measurements show that the charge-ordering temperature (T CO ) decreases with increasing x up to x=0.4 and then slightly increases with further increasing x up to x=0.6. Further, the antiferromagnetic (AFM) ordering temperature (T N ) decreases with increasing x. At T N a transition to metamagnetic glass like state is also seen. Eu doping also leads to enhancement in the magnetic moment and a concomitant decrease in resistivity up to x=0.2 and then an increase in resistivity up to x=0.5. We propose that the local lattice distortion induced by the size mismatch between the A-site cations and 6s 2 character of Bi 3+ lone pair electron are responsible for the observed variation in physical properties. - Highlights: ► We have studied structure, magnetic and transport properties of Bi 0.6−x Eu x Ca 0.4 MnO 3 (0.0≤x≤0.6). ► Substitution of Eu at Bi-site induces a strong interplay between the magnetic and charge-ordering properties. ► T CO decreases with increasing x up to x=0.4 and then slightly increases with further increasing x up to x=0.6. ► The antiferromagnetic ordering temperature (T N ) decreases with increasing x. ► The A-site cations size mismatch and 6s 2 character of Bi 3+ lone pair electron explain variation in physical properties.

  7. Charges Assessed the Army by the Defense Logistics Agency for Deployable Medical Systems

    National Research Council Canada - National Science Library

    1995-01-01

    .... Deployable medical systems are standardized modular field hospitals that can be prepositioned in the event of a contingency, national emergency, or war operations. In FY 1994, the Defense Personnel Support Center billed the Army $25 million for acquiring and assembling deployable medical systems.

  8. Inactivated polio vaccine development for technology transfer using attenuated Sabin poliovirus strains to shift from Salk-IPV to Sabin-IPV.

    Science.gov (United States)

    Bakker, Wilfried A M; Thomassen, Yvonne E; van't Oever, Aart G; Westdijk, Janny; van Oijen, Monique G C T; Sundermann, Lars C; van't Veld, Peter; Sleeman, Eelco; van Nimwegen, Fred W; Hamidi, Ahd; Kersten, Gideon F A; van den Heuvel, Nico; Hendriks, Jan T; van der Pol, Leo A

    2011-09-22

    Industrial-scale inactivated polio vaccine (IPV) production dates back to the 1960s when at the Rijks Instituut voor de Volksgezondheid (RIV) in Bilthoven a process was developed based on micro-carrier technology and primary monkey kidney cells. This technology was freely shared with several pharmaceutical companies and institutes worldwide. In this contribution, the history of one of the first cell-culture based large-scale biological production processes is summarized. Also, recent developments and the anticipated upcoming shift from regular IPV to Sabin-IPV are presented. Responding to a call by the World Health Organization (WHO) for new polio vaccines, the development of Sabin-IPV was continued, after demonstrating proof of principle in the 1990s, at the Netherlands Vaccine Institute (NVI). Development of Sabin-IPV plays an important role in the WHO polio eradication strategy as biocontainment will be critical in the post-OPV cessation period. The use of attenuated Sabin strains instead of wild-type Salk polio strains will provide additional safety during vaccine production. Initially, the Sabin-IPV production process will be based on the scale-down model of the current, and well-established, Salk-IPV process. In parallel to clinical trial material production, process development, optimization and formulation research is being carried out to further optimize the process and reduce cost per dose. Also, results will be shown from large-scale (to prepare for future technology transfer) generation of Master- and Working virus seedlots, and clinical trial material (for phase I studies) production. Finally, the planned technology transfer to vaccine manufacturers in low and middle-income countries is discussed. Copyright © 2011 Elsevier Ltd. All rights reserved.

  9. Návrh integrace IPv6 do počítačové sítě Mendelovy univerzity v Brně v oblasti směrování

    OpenAIRE

    Filip, Tomáš

    2015-01-01

    This master thesis deals with integration of IPv6 network protocol into production computer network of Mendel University in Brno in the routing field. The integration includes the Dual Stack transition mechanism, IPv6 address plan, static routing at the perimeter of the university network, and OSPFv3 and MP-BGP routing protocols. Proposed integration plan was verified in the Laboratory of computer networking at the Department of Informatics at FBE MENDELU, and it serves as a template for a fi...

  10. A Secure and Lightweight Approach for Routing Optimization in Mobile IPv6

    Directory of Open Access Journals (Sweden)

    Sehwa Song

    2009-01-01

    Full Text Available Mobility support is an essential part of IPv6 because we have recently seen sharp increases in the number of mobile users. A security weakness in mobility support has a direct consequence on the security of users because it obscures the distinction between devices and users. Unfortunately, a malicious and unauthenticated message in mobility support may open a security hole for intruders by supplying an easy mean to launch an attack that hijacks an ongoing session to a location chosen by the intruder. In this paper, we show how to thwart such a session hijacking attack by authenticating a suspicious message. Although much research has been directed toward addressing similar problems, we contend that our proposed protocol would outperform other proposals that have been advanced. This claim is based on observations that the proposed protocol has strengths such as light computational load, backward compatibility, and dependable operation. The results of in-depth performance evaluation show that our protocol achieves strong security and at the same time requires minimal computational overhead.

  11. Evaluación de ancho de banda en transmisiones multicast sparse mode implementadas en redes IPV6

    OpenAIRE

    Pineda Ancco, Ferdinand; Directora Asociada de Investigación, Universidad Peruana Unión. Lima; Cruz de la Cruz, José; Mamani Pari, David

    2017-01-01

    En el trabajo de investigación se describió el diseño e implementación del protocolo multicast de tipo Sparsemode con el objetivo de mejorar el tráfico de datos en redes que transporten información unidireccional. Eldiseño se realiza sobre una red que implementa IPV6 como protocolo de capa 3 del modelo de referencia OSI.Para validar el método, la evaluación del tráfico se realizó analizando el ancho de banda, retardos y cantidad debits enviados por el protocolo multicast Sparse mode cursado e...

  12. ERADIKASI POLIO DAN IPV (INACTIVATED POLIO VACCINE

    Directory of Open Access Journals (Sweden)

    Gendrowahyuhono Gendrowahyuhono

    2012-09-01

    Full Text Available In the year 1988, World Health Organization (WHO claims that polio viruses should be eradicated after year 2000. However, until year 2010 the world have not been free from polio viruses circulation. So many effort had been achieved and it is estimated that the world will be free from polio virus after the year 2013. Control of poliomyelitis in Indonesia has been commenced since 1982 with routine immunization of polio program and the National Immunization Days (NID has been commenced since 1995,1996,2005 and 2006. When the world is free from polio virus, WHO suggests several alternative effort to maintain the world free from polio viruses : I stop the OPV (Oral Polio Vaccine and no polio immunization, 2 stop OPV and stock pile mOPV (monovalent OPV, 3 use OPV and IPV (Inactivated Polio Vaccine in a certain times, 4 use IPV only in a certain times. IPV has been used routinely in develop countries but has not been used in the developing countries. Several studies in development countries has been conducted, but had not been done in the developing countries. Indonesia collaboration with WHO has conducted the study of IPV in Yogyakarta Province since year 2002 until year 2010. The overall aim of the study is to compile the necessary data that will inform global and national decision-making regarding future polio immunization policies for the OPV cessation era. The data generated from the study will be particularly important to make decisions regarding optimal IPV use in developing tropical countries. It is unlikely that this data can be assembled through other means than through this study. The tentative result of the study shows that OPV immunization coverage in the year 2004 is 99% in four district and 93 % in the Yogyakarta city. Environment surveillance shows that there are 65.7% polio virus detected from 137 sewage samples pre IPV swich, and 4.8% polio virus detected from 83 sewage samples post IPV swich. Survey polio antibody serologis shows

  13. FY 1999 annual work plan for infrastructure program WBS 6

    Energy Technology Data Exchange (ETDEWEB)

    Donley, C.D.

    1998-08-27

    The Fiscal Year (FY) 1999 DynCorp Annual Work Plan (AWP) relates DOE-RL work breakdown structure (WBS) to Cost Accounts and to Organizational Structure. Each Cost Account includes a workscope narrative and justification performance and service standards, goals, and deliverables. Basis of estimates are included within each Cost Account to demonstrate the relationship of budget to defined workscope. The FY 1999 AWP reflects the planning assumptions and initiatives that are included in the PHMC Strategic Plan for Infrastructure Optimization which was established in FY 1998. Development of the FY 1999 AWP was in accordance with a sequential series of events and efforts described in the Infrastructure Annual Work Planning and Budget Cycle which was developed and established in conjunction with the Strategic Plan. The Strategic Plan covers a rolling five year span of time and is updated at the start of each fiscal year as the beginning of the annual work planning and budget cycle for the following fiscal year. Accordingly the planning for the FY 1999 AWP began in January 1998. Also included in the annual work planning and budget cycle, and the basis for the budget in this AWP, is the development of a requirements-based budget.

  14. Reclaiming unused IPv4 addresses

    CERN Multimedia

    IT Department

    2016-01-01

    As many people might know, the number of IPv4 addresses is limited and almost all have been allocated (see here and here for more information).   Although CERN has been allocated some 340,000 addresses, the way these are allocated across the site is not as efficient as we would like. As we face an increasing demand for IPv4 addresses with the growth in virtual machines, the IT Department’s Communication Systems Group will be reorganising address allocation during 2016 to make more efficient use of the IPv4 address ranges that have been allocated to CERN. We aim, wherever possible, to avoid giving out fixed IP addresses, and have all devices connected to the campus network obtain an address dynamically each time they connect. As a first stage, starting in February, IP addresses that have not been used for more than 9 months will be reclaimed. No information about the devices concerned will be deleted from LANDB, but a new IP address will have to be requested if they are ever reconnected to t...

  15. Japanese Women’s Perceptions of Intimate Partner Violence (IPV)

    Science.gov (United States)

    Nagae, Miyoko; Dancy, Barbara L.

    2013-01-01

    Intimate partner violence (IPV) is a serious problem in Japan. The purpose of this study was to describe IPV as perceived by Japanese adult females who were in a heterosexual marriage and lived with their spouses at the time of IPV. Using a cross-sectional retroactive qualitative description research design with individual face-to-face in-depth interviews, a purposive sample of 11 Japanese adult females from three urban areas in Japan was interviewed. All women reported that they and their husbands were born in Japan. At the time of the interview, the women had a mean age of 38 years whereas at the time of the IPV, their mean age was 28 years. Data was analyzed using the directed qualitative content analysis method. The results revealed that IPV occurred at the women’s homes primarily at night. All the women reported that they experienced physical and emotional abuse and 82% reported experiencing sexual abuse. Additionally, 64% reported that their parents-in-law emotionally abused them. Communication between these women and their husbands were characterized as unilateral with the husbands initiating and dominating the conversations with orders, lectures, and reprimands. The women identified that the cultural influences of the Japanese patriarchal system that reinforces male superiority and dominance and women inferiority were directly related to IPV. The implication is that health professionals need to actively advocate for effective legislation and policies to address IPV in Japan. PMID:19465572

  16. RAZVOJ MODELA IN SIMULACIJA IZČRPANJA IPv4 NASLOVNEGA PROSTORA

    OpenAIRE

    Ciber, Peter

    2014-01-01

    Magistrsko delo obravnava razvoj modela in simulacijo izčrpanja IPv4 naslovnega prostora. Za dodeljevanje IPv4 naslovnega prostora skrbi organizacija IANA, ki je po petih celinah sveta dodelila velike kose IPv4 naslovnega prostora. V Evropi tako za nadaljnjo razdelitev skrbi organizacija RIPE NCC, v Afriki AFRINIC, v azijsko-pacifiški regiji APNIC, v Ameriki ARIN v Latinski Ameriki in Karibih pa LACNIC. Zanimalo nas je koliko in kako je IANA razdelila IPv4 naslove po celinah in kako so region...

  17. Appendix C: Biomass Program inputs for FY 2008 benefits estimates

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2009-01-18

    Document summarizes the results of the benefits analysis of EERE’s programs, as described in the FY 2008 Budget Request. EERE estimates benefits for its overall portfolio and nine Research, Development, Demonstration, and Deployment (RD3) programs.

  18. Decay of Sabin inactivated poliovirus vaccine (IPV)-boosted poliovirus antibodies.

    Science.gov (United States)

    Resik, Sonia; Tejeda, Alina; Fonseca, Magile; Sein, Carolyn; Hung, Lai Heng; Martinez, Yenisleidys; Diaz, Manuel; Okayasu, Hiromasa; Sutter, Roland W

    We conducted a follow-on study to a phase I randomized, controlled trial conducted in Cuba, 2012, to assess the persistence of poliovirus antibodies at 21-22 months following booster dose of Sabin-IPV compared to Salk-IPV in adults who had received multiple doses of oral poliovirus vaccine (OPV) during childhood. In 2012, 60 healthy adult males aged 19-23 were randomized to receive one booster dose, of either Sabin-inactivated poliovirus vaccine (Sabin-IPV), adjuvanted Sabin-IPV (aSabin-IPV), or conventional Salk-IPV. In the original study, blood was collected at days 0 (before) and 28 (after vaccination), respectively. In this study, an additional blood sample was collected 21-22 months after vaccination, and tested for neutralizing antibodies to Sabin poliovirus types 1, 2 and 3. We collected sera from 59/60 (98.3%) subjects; 59/59 (100%) remained seropositive to all poliovirus types, 21-22 months after vaccination. The decay curves were very similar among the study groups. Between day 28 and 21-22 months, there was a reduction of ⩾87.4% in median antibody levels for all poliovirus types in all study groups, with no significant differences between the study groups. The decay of poliovirus antibodies over a 21-22-month period was similar regardless of the type of booster vaccine used, suggesting the scientific data of Salk IPV long-term persistence and decay may be broadly applicable to Sabin IPV.

  19. Projected Benefits of Federal Energy Efficiency and Renewable Energy Programs - FY 2008 Budget Request

    Energy Technology Data Exchange (ETDEWEB)

    2007-03-01

    This document summarizes the results of the benefits analysis of EERE's programs, as described in the FY 2008 Budget Request. EERE estimates benefits for its overall portfolio and for each of its nine Research, Development, Demonstration, and Deployment (RD3) programs. Benefits for the FY 2008 budget request are estimated for the midterm (2008-2030) and long term (2030-2050).

  20. Diseño e implementación de IPv6 en un sistema embebido

    Directory of Open Access Journals (Sweden)

    Danilo Alfonso López Sarmiento

    2013-09-01

    Full Text Available This paper presents a procedure for the implementation of new-generation protocols in an embedded system. The aim is to show that such an implementation can be connected to the Internet via IPv6. This, for its part, reveals some necessary aspects for supporting the procedure and for actual implementation of a web server (as proof of successful operation. A microcontroller that allows the use of Ethernet (FreescaleColdfire V1 was selected to facilitate handling FreeRTOS and the uIP protocol stack. We found it necessary to write an additional algorithm for the management of the link layer. Since there is no established standard or methodology for these developments in different microcontrollers, characterization must be achieved depending on the particular hardware being used, including certain files that ensure the performance of each of the layers regarding the protocol stack in question.

  1. to the Question of IPv6-protocol Logical Characteristics Properties Using in order to Increase of the Security Level of the Russian Federation National Information Technology Infrastructure

    Directory of Open Access Journals (Sweden)

    Dmitry Anatolevich Melnikov

    2014-02-01

    Full Text Available This paper proposes a method of IPv6-protocol logical characteristics using in order to increase the security level of the Russian Federation national information technology infrastructure and the global information society.

  2. Modelo test-bed de simulación y evaluación de criptografía de curva elíptica en redes IPv6 de próxima generación

    Directory of Open Access Journals (Sweden)

    Nelson Enrique Vera Parra

    2014-04-01

    Full Text Available En la actualidad, las redes móviles e inalámbricas de nueva generación, tales como las redes de área personal IPv6 de baja potencia (6LoWPAN, redes de sensores inalámbricos sobre IPv6 y redes móviles IPv6 jerárquicas se encuentran bajo rigurosa investigación y desarrollo, pues representan el paso por seguir en la evolución de las redes Machine-to-Machine (M2M, al tiempo que apoyan el acceso de banda ancha de la próxima generación de tecnologías y sistemas inteligentes sobre Internet futuro. Estas redes de nueva generación imponen restricciones en cuanto al poder de procesamiento, ancho de banda y recursos de energía, lo que re¬presenta una gran limitante en la implementación de mecanismos de seguridad. En este sentido, en lo últimos años han surgido diversas propuestas para la administración de claves, procedimientos de firma digital y cifrado de datos basados en curvas elípticas e híper-elípticas, que logran niveles de seguridad equivalentes a los algoritmos convencionales basados en algoritmos Diffie-Hellman y Rivest-Shamir-Adleman (RSA, pero que reducen la longitud de clave y, por ende, los recursos computacionales y de red asociados. Este artículo examina los algoritmos basados en criptografía de curvas elípticas (ECC y su aplicación a redes móviles e inalámbricas de nueva generación habilitadas para IPv6. Así mismo, describe un modelo de simulación para la evaluación de ECC, donde se comparan los recursos computacionales necesarios y las limitaciones en mecanismos ligeros de seguridad.

  3. Implementasi Dan Perancangan Online Charging System (OCS IPTV Multichannel pada Jaringan IPv6

    Directory of Open Access Journals (Sweden)

    Bagus Wahyu Nugraha

    2014-03-01

    Full Text Available IPTV didefinisikan sebagai layanan multimedia berbentuk data seperti televisi, video, audio, text, grafik yang dikirimkan melalui jaringan berbasisi IP tetapi harus diberikan dengan persyaratan seperti QOS dan experience, security, interactivity dan reliability.  Beberapa  feature yang  dimiliki oleh IPTV ini adalah IPTV dapat menyiarkan secara live  atau prerecorded digital video program-program pendidikan, komersial, scheduling / penjadwalan program dsb. Tentunya hal ini menggunakan IPTV akan menguntungkan dari sisi bisnis mengingat semakin banyaknya pengguna broadband. Dengan konvergen antara televisi, telephone dan access internet, IPTV dapat berkembang sesuai dengan tren masa kini yaitu IP based, sehingga mudah di akses oleh pengguna dan proses charging/billing yang sesuai dengan standar bisnis yang ada. Oleh karena itu, “Design and Implementation Online Charging System (OCS IPTV Multichannel on IPv6 Network“ dibuat sebagai layanan konten yang dapat digunakan untuk teknologi yang menggunakan IP based. Dalam pembuatan rancang bangun system billing pada IPTV ini dihasilkan sebuah software yang user friendly sehingga penyedia layanan IPTV dapat dengan mudah menggunakan software yang telah dibuat.

  4. Appendix E: Wind Technologies Program inputs for FY 2008 benefits estimates

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2009-01-18

    Document summarizes the results of the benefits analysis of EERE’s programs, as described in the FY 2008 Budget Request. EERE estimates benefits for its overall portfolio and nine Research, Development, Demonstration, and Deployment (RD3) programs.

  5. Appendix G: Building Technologies Program inputs for FY 2008 benefits estimates

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2009-01-18

    Document summarizes the results of the benefits analysis of EERE’s programs, as described in the FY 2008 Budget Request. EERE estimates benefits for its overall portfolio and nine Research, Development, Demonstration, and Deployment (RD3) programs.

  6. Preparation and microstructural characterization of TiC and Ti0.6W0.4/TiC0.6 composite thin films obtained by activated reactive evaporation

    International Nuclear Information System (INIS)

    Montes de Oca, J. A.; LePetitcorps, Y.; Manaud, J.-P.; Vargas Garcia, J. R.

    2008-01-01

    Titanium carbide-based coatings were deposited on W substrates at a high coating growth rate by activated reactive evaporation at 500 and 600 deg. C in a L560 Leybold system using propene as reactive atmosphere. The crystal structure, lattice parameter, preferred orientation, and grain size of the coatings were determined by x-ray diffraction technique using Cu Kα. The analysis of the coating morphology was performed by scanning electron microscopy (SEM), and the composition of the films was analyzed by Auger electron spectroscopy and electron-probe microanalysis. Experimental results suggested that temperature was one of the most important parameters in the fabrication of stoichiometric TiC coatings. Thus, TiC coatings were obtained at 600 deg. C, whereas TiC 0.6 nonstoichiometric coatings codeposited with a free Ti phase were obtained at 500 deg. C, giving rise to the formation of a composite thin film. After annealing at 1000 deg. C, the stoichiometric films remained stable, but a crack pattern was formed over the entire coating surface. In addition, Ti 0.6 W 0.4 /TiC 0.6 composite thin coatings were obtained for the films synthesized at 500 deg. C. The formation of a Ti 0.6 W 0.4 ductile phase in the presence of a TiC 0.6 phase was responsible to avoid the coating cracking

  7. 75 FR 56994 - Internet Protocol Version 6 (IPv6) Workshop: The Impact of the Uptake and Deployment of IPv6...

    Science.gov (United States)

    2010-09-17

    ... importance of the Internet to U.S. innovation, prosperity, education, and political and cultural life, NTIA... DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Internet..., the U.S. Government, and the Internet Economy AGENCY: National Telecommunications and Information...

  8. X-ray cine magnification angiography by 0.6 mm focal spot

    International Nuclear Information System (INIS)

    Tanaka, Isao; Wakamatsu, Takashi; Sano, Toshiya

    1983-01-01

    To observe microstructures on the X-ray cinematography by 0.6 mm focal spot, usefulness of enlarged shooting was studied. As a result, even at a focus of 0.6 mm, the enlarged shooting (ca. 1.7-fold) revealed the superior total M.T.F. than that of contact photography. Furthermore, Groedel effect upon magnification was as good as the grid system. In the cardiac catheterization by 0.6 mm focal spot being employed most frequently at present, the enlarged shooting without using grid is a useful method. Thus, it is considered to take up this method as much as possible. (author)

  9. Mobile IPv6における分散ホームエージェントの実現

    OpenAIRE

    福田, 浩章

    2005-01-01

    電子機器端末の小型化技術や通信技術の発達により、身の周りのあらゆる電子機器がなんらかのかたちでインターネットに接続されるようになってきた。こうしたときにさらなる利便性として求められるものが、移動通信のサポートである。Mobile IPv6 技術は、移動中の継続的な通信を支援する技術の一つである。MobileIPv6 では移動中でも同じIP アドレスを使い続けることができる。これはホームエージェントと呼ばれるノードが移動端末の所在を把握し、他の端末との通信を仲介することにより実現される。このホームエージェントは、基本的には1 台の設置を前提として仕様が決められている。本研究では複数のホームエージェントをネットワーク上に分散して配置する仕組みを提案し、実現する。それにより、Mobile IPv6 の運用における全体的なネットワークの効率化と負荷分散を目指す。...

  10. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  11. IPV among Adolescent Reproductive Health Patients: The Role of Relationship Communication

    Science.gov (United States)

    Messinger, Adam M.; Davidson, Leslie L.; Rickert, Vaughn I.

    2011-01-01

    Population-specific data on factors that affect intimate partner violence (IPV) are needed on female adolescents and young adults, a cohort at greatest risk of IPV in the United States (Rennison, 2001). Studies have frequently overlooked the role of relationship communication as a gatekeeper to IPV (Ridley & Feldman, 2003). To address this…

  12. ApertosオペレーティングシステムによるIPv6ルータの構築

    OpenAIRE

    伊藤, 純一郎; 横手, 靖彦; 所, 真理雄; Jun-ichiro, Itoh; Yasuhiko, Yokote; Mario, Tokoro; 慶応義塾大学理工学研究科計算機科学専攻:Sony CSL; ソニー(株)アーキテクチャ研究所; 慶応義塾大学:Sony CSL; Department of Computer Science, Keio University:Sony CSL; Architecture Laboratory, Sony Corporation; Keio University:Sony CSL

    1997-01-01

    インターネットで現在利用されているIPv4プロトコルは,インターネットの爆発的成長に耐えられない,という指摘がある.このため,IPv6プロトコルが提案され,現在移行へ向けた考察が行われている.しかしながら,現在のルータソフトウェア構成法では,今後行われるプロトコル策定やプロトコルの仕様変更などに柔軟に対処することが困難である.本論文では,Apertosオペレーティングシステム上にIPv6ルータのプロトコル処理部を実装することで,これらの問題の解決を目指している.本方法では,並行オブジェクトによるソフトウェア構成によりプロトコル処理部のモジュール間の独立性を確保し,自己反映計算に基づくOSアーキテクチャの利用によりプログラマに最適なプログラミング環境を提供することができる....

  13. Charge-ordering, magnetic and electric-transport properties of Bi0.6-xEuxCa0.4MnO3 (0.0≤x≤0.6)

    International Nuclear Information System (INIS)

    Yadava, Kamlesh; Varma, G.D.; Singh, M.P.; Razavi, F.S.

    2012-01-01

    We have studied structure, magnetic and transport properties of polycrystalline Bi 0.6-x Eu x Ca 0.4 MnO 3 (x=0.0, 0.1, 0.2, 0.3, 0.4, 0.5 and 0.6) perovskite manganites. Magnetic measurements show that the charge-ordering temperature (T CO ) decreases with increasing x up to x=0.4 and then slightly increases with further increasing x up to x=0.6. Further, the antiferromagnetic (AFM) ordering temperature (T N ) decreases with increasing x. At T N a transition to metamagnetic glass like state is also seen. Eu doping also leads to enhancement in the magnetic moment and a concomitant decrease in resistivity up to x=0.2 and then an increase in resistivity up to x=0.5. We propose that the local lattice distortion induced by the size mismatch between the A-site cations and 6s 2 character of Bi 3+ lone pair electron are responsible for the observed variation in physical properties. (author)

  14. Empirical analysis of the effects and the mitigation of IPv4 address exhaustion

    OpenAIRE

    Richter, Philipp

    2017-01-01

    IP addresses are essential resources for communication over the Internet. In IP version 4, an address is represented by 32 bits in the IPv4 header; hence there is a finite pool of roughly 4B addresses available. The Internet now faces a fundamental resource scarcity problem: The exhaustion of the available IPv4 address space. In 2011, the Internet Assigned Numbers Authority (IANA) depleted its pool of available IPv4 addresses. IPv4 scarcity is now reality. In the subsequent years, IPv4 a...

  15. Intimate partner violence: office screening for victims and perpetrators of IPV.

    Science.gov (United States)

    Chen, Ping-Hsin; Jacobs, Abbie; Rovi, Susan L D

    2013-09-01

    Intimate partner violence (IPV) affects more than 12 million individuals annually. Power and control are central concepts underlying abusive relationships. Physicians may see IPV victims, perpetrators, and their children for annual examinations, as well as for injuries and health conditions associated with abuse. In 2013, the US Preventive Services Task Force recommended that women of childbearing age (ie, 14 to 46 years) be screened for IPV. Brief, validated screening tools, such as the 4-item Hurt, Insult, Threaten, and Scream (HITS), can be used to facilitate screening. Physicians should always assess patients whose medical histories or presenting symptoms or injuries are consistent with abuse. Risk factors for IPV and consequences of abuse include general health conditions (eg, asthma, irritable bowel syndrome), reproductive issues (eg, gynecologic disorders, unintended pregnancies), psychological conditions (eg, depression, sleep disturbances), and risky health behaviors (eg, substance use, poor health care adherence). Tools for identifying perpetrators are under investigation. To prepare the practice to address IPV, physicians should educate themselves and staff and learn about community and national resources. By identifying and responding to IPV, clinicians may be able to reduce IPV and interrupt the intergenerational cycle of violence. Written permission from the American Academy of Family Physicians is required for reproduction of this material in whole or in part in any form or medium.

  16. Persistence of hepatitis B immune memory until 9-10 years of age following hepatitis B vaccination at birth and DTaP-IPV-HB-PRP∼T vaccination at 2, 4 and 6 months.

    Science.gov (United States)

    Kosalaraksa, Pope; Chokephaibulkit, Kulkanya; Benjaponpitak, Suwat; Pancharoen, Chitsanu; Chuenkitmongkol, Sunate; B'Chir, Siham; Da Costa, Xavier; Vidor, Emmanuel

    2018-01-15

    To evaluate the long-term persistence of anti-hepatitis B surface (HBs) antibodies and the response to a HB challenge re-vaccination in children who had received a primary series of DTaP-IPV-HB-PRP∼T (Hexaxim™) or DTaP-IPV-HB/PRP∼T (Infanrix hexa™). Two cohorts of participants who had previously received HB vaccine at birth followed by either DTaP-IPV-HB-PRP∼T or DTaP-IPV-HB/PRP∼T co-administered with PCV7 at 2, 4, 6 months of age in a randomized, Phase III, observer-blind study in Thailand, were followed up for anti-HBs antibodies (geometric mean concentrations [GMCs] and seroprotection [SP] rate [% of participants with a titer ≥10 mIU/mL]) at 12-18 months of age and 9-10 years of age. A monovalent HB challenge re-vaccination was administered at 9-10 years of age and the anamnestic response was evaluated. Anti-HBs GMCs and SP rates in the DTaP-IPV-HB-PRP∼T and DTaP-IPV-HB/PRP∼T groups were high and similar post-primary vaccination series (2477 mIU/mL and 99.5% and 2442 mIU/mL and 99.5%, respectively) and declined to a similar extent in each group at 12-18 months (154.5 mIU/mL and 90.8% and 162.3 mIU/mL and 96.5%, respectively). Antibody levels further declined at 9-10 years of age (13.3 mIU/mL and 49.3% and 8.0 mIU/mL and 42.9%) and a strong anamnestic response occurred in each group post-HB challenge re-vaccination (92.8% and 98.7%, respectively). The kinetics of long-term anti-HBs antibody persistence were similar following a primary series of DTaP-IPV-HB-PRP∼T or DTaP-IPV-HB/PRP∼T. The response to a subsequent HB challenge re-vaccination was strong and similar in each group, demonstrating persisting immune memory.

  17. Properties of Mn0.4Zn0.6Fe2O4 and Mn0.6Zn0.4Fe2O4 as Nanocatalyst for Ammonia Production

    Directory of Open Access Journals (Sweden)

    Puspitasari Poppy

    2017-01-01

    Full Text Available Ammonia synthesis requires high pressure and high temperature process. Unfortunately, the capital intensive cost resulting low yield of ammonia by using recent catalyst which is iron oxide. Therefore, manganese zinc ferrite as a soft ferrite material will be introduced as a new nanocatalyst to enhance the ammonia yield. As a new nanocatalyst for ammonia production, study of comparasion two different concentration of MnZn Ferrite is very important. This paper will compare the yield of ammonia by using two different nanocatalyst which are Mn0.4Zn0.6Fe2O4 and Mn0.6Zn0.4Fe2O4. Both were synthesized by sol-gel method and has been characterize by using FESEM (morphology, XRD (phase identification, EDX (elemental analysis and TPR (oxide reduction. The ammonia was produce with and without magnetic field applied. The result shows that the ammonia yield is higher for Mn0.4Zn0.6Fe2O4 nanocatalyst than Mn0.6Zn0.4Fe2O4 by using magnetic field applied. 67.2% of yield has been achieved by using new nanocatalyst Mn0.6Zn0.4Fe2O4 and magnetic field applied at ambient environment.

  18. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  19. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Directory of Open Access Journals (Sweden)

    Mojtaba Alizadeh

    Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  20. NREL Photovoltaic Program FY 1996 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    1997-08-01

    This report summarizes the in-house and subcontract research and development (R&D) activities under the National Renewable Energy Laboratory (NREL) Photovoltaics (PV) Program from October 1, 1995 through September 30, 1996 (fiscal year [FY] 1996). The NREL PV Program is part of the U.S. Department of Energy's (DOE) National Photovoltaics Program, as described in the DOE Photovoltaics Program Plan, FY 1991 - FY 1995. The mission of the DOE National Photovoltaics Program is to: "Work in partnership with U.S. industry to develop and deploy photovoltaic technology for generating economically competitive electric power, making photovoltaics an important contributor to the nation's and the world's energy use and environmental improvement. The two primary goals of the national program are to (1) maintain the U.S. PV industry's world leadership in research and technology development and (2) help the U.S. industry remain a major, profitable force in the world market. The NREL PV Program provides leadership and support to the national program toward achieving its mission and goals.

  1. Decay of Sabin inactivated poliovirus vaccine (IPV)-boosted poliovirus antibodies

    OpenAIRE

    Resik, Sonia; Tejeda, Alina; Fonseca, Magile; Sein, Carolyn; Hung, Lai Heng; Martinez, Yenisleidys; Diaz, Manuel; Okayasu, Hiromasa; Sutter, Roland W.

    2015-01-01

    Introduction: We conducted a follow-on study to a phase I randomized, controlled trial conducted in Cuba, 2012, to assess the persistence of poliovirus antibodies at 21–22 months following booster dose of Sabin-IPV compared to Salk-IPV in adults who had received multiple doses of oral poliovirus vaccine (OPV) during childhood. Methods: In 2012, 60 healthy adult males aged 19–23 were randomized to receive one booster dose, of either Sabin-inactivated poliovirus vaccine (Sabin-IPV), adjuvant...

  2. Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks.

    Science.gov (United States)

    Son, Seungsik; Jeong, Jongpil

    2014-01-01

    In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.

  3. File list: ALL.Emb.50.AllAg.0-6h_embryos [Chip-atlas[Archive

    Lifescience Database Archive (English)

    Full Text Available ALL.Emb.50.AllAg.0-6h_embryos dm3 All antigens Embryo 0-6h embryos SRX030958,SRX030...959 http://dbarchive.biosciencedbc.jp/kyushu-u/dm3/assembled/ALL.Emb.50.AllAg.0-6h_embryos.bed ...

  4. Test plan for FY-94 digface characterization field experiments

    International Nuclear Information System (INIS)

    Josten, N.E.; Roybal, L.G.

    1994-08-01

    The digface characterization concept has been under development at the Idaho National Engineering Laboratory (INEL) since fiscal year (FY) 1992 through the support of the Buried Waste Integrated Demonstration Program. A digface characterization system conducts continuous subsurface characterization simultaneously with retrieval of hazardous and radioactive waste from buried waste sites. The system deploys multiple sensors at the retrieval operation digface and collects data that provide a basis for detecting, locating, and classifying buried materials and hazardous conditions before they are disturbed by the retrieval equipment. This test plan describes ongoing efforts to test the digface characterization concept at the INEL's Cold Test Pit using a simplified prototype deployment apparatus and off-the-shelf sensors. FY-94 field experiments will explore problems in object detection and classification. Detection and classification of objects are fundamental to three of the four primary functions of digface characterization during overburden removal. This test plan establishes procedures for collecting and validating the digface characterization data sets. Analysis of these data will focus on testing and further developing analysis methods for object detection and classification during overburden removal

  5. Appendix J: Weatherization and Intergovernmental Program (WIP) inputs for FY 2008 benefits estimates

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2009-01-18

    Document summarizes the results of the benefits analysis of EERE’s programs, as described in the FY 2008 Budget Request. EERE estimates benefits for its overall portfolio and nine Research, Development, Demonstration, and Deployment (RD3) programs.

  6. Decay of Sabin inactivated poliovirus vaccine (IPV-boosted poliovirus antibodies

    Directory of Open Access Journals (Sweden)

    Sonia Resik

    2015-01-01

    Conclusion: The decay of poliovirus antibodies over a 21–22-month period was similar regardless of the type of booster vaccine used, suggesting the scientific data of Salk IPV long-term persistence and decay may be broadly applicable to Sabin IPV.

  7. The FY2011 Federal Budget

    Science.gov (United States)

    2010-08-04

    long been the largest source of federal revenues, followed by social insurance (payroll) taxes. Federal individual and corporate income tax revenues...915 billion (6.4% of GDP). Corporate income tax revenues fell from $304 billion in FY2008 to $138 billion in FY2009. Federal revenues from other

  8. Analysis of the dose-sparing effect of adjuvanted Sabin-inactivated poliovirus vaccine (sIPV).

    Science.gov (United States)

    Li, Zhuofan; Ding, Wenting; Guo, Qi; Liu, Ze; Zhu, Zhe; Song, Shaohui; Li, Weidong; Liao, Guoyang

    2018-03-30

    Sabin-based inactivated poliovirus vaccine(sIPV) is gradually replacing live-attenuated oral polio vaccine(OPV). Sabin-inactivated poliovirus vaccine(sIPV) has played a vital role in reducing economic burden of poliomyelitis and maintaining appropriate antibody levels in the population. However, due to its high cost and limited manufacturing capacity, sIPV cannot reach its full potential for global poliovirus eradication in developing countries. Therefore, to address this situation, we designed this study to evaluate the dose-sparing effects of AS03, CpG oligodeoxynucleotides (CpG-ODN) and polyinosinic:polycytidylic acid (PolyI:C) admixed with sIPV in rats. Our results showed that a combination of 1/4-dose sIPV adjuvanted with AS03 or AS03 with BW006 provides a seroconversion rate similar to that of full-dose sIPV without adjuvant and that, this rate is 5-fold higher than that of 1/4-dose sIPV without adjuvant after the first immunization. The combination of AS03 or AS03 with BW006 as an adjuvant effectively reduced sIPV dose by at least 4-fold and induced both humoral and cellular immune responses. Therefore, our study revealed that the combination of AS03 or AS03 with BW006 is a promising adjuvant for sIPV development.

  9. Appendix F: FreedomCAR and Vehicle Technologies Program inputs for FY 2008 benefits estimates

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2009-01-18

    Document summarizes the results of the benefits analysis of EERE’s programs, as described in the FY 2008 Budget Request. EERE estimates benefits for its overall portfolio and nine Research, Development, Demonstration, and Deployment (RD3) programs.

  10. Immunogenicity and Reactogenicity of DTPa-IPV/Hib Vaccine Co-administered With Hepatitis B Vaccine for Primary and Booster Vaccination of Taiwanese Infants

    Directory of Open Access Journals (Sweden)

    Pei-Lan Shao

    2011-06-01

    Full Text Available Immunogenicity and reactogenicity of the combined diphtheria-tetanus-acellular pertussis-inactivated poliovirus-Haemophilus influenzae type b (Hib conjugate vaccine (DTPa-IPV/Hib, Infanrix™-IPV + Hib was assessed when co-administered with hepatitis B (HBV vaccine. Seventy healthy infants received DTPa-IPV/Hib at 1.5, 3.5, 6 and 15–18 months, and HBV at birth, 1.5, 6 and 15–18 months of age. Serological responses were assessed. Diphtheria, tetanus, Hib and pertussis seroprotection/seropositivity rates were 100% after primary vaccination. Post-primary immune responses to poliovirus could not be evaluated for technical reasons. However, after the booster dose, seroprotection/seropositivity rates, including poliovirus, were 100%. Over 95% were seroprotected against HBV. Post-booster geometric mean antibody concentrations/titers (GMC/GMTs rose from 14-fold to 45-fold, indicating effective priming against all antigens, including polioviruses. DTPa-IPV/Hib was well tolerated alone or co-administered with HBV. No serious adverse events were considered related to vaccination. Primary and booster vaccination with combined DTPa-IPV/Hib and HBV was immunogenic and well tolerated. Combination vaccines enable vaccine providers to conveniently provide routine pediatric immunizations, with minimal discomfort.

  11. Laboratory directed research and development program FY 2003

    Energy Technology Data Exchange (ETDEWEB)

    Hansen, Todd

    2004-03-27

    The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operate unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. In FY03, Berkeley Lab was authorized by DOE to establish a funding ceiling for the LDRD program of $15.0 M, which equates to about 3.2% of Berkeley Lab's FY03 projected operating and capital equipment budgets. This funding level was provided to develop new scientific ideas and opportunities and allow the Berkeley Lab Director an opportunity to initiate new directions. Budget constraints limited available resources, however, so only $10.1 M was expended for operating and $0.6 M for capital equipment (2.4% of actual Berkeley Lab FY03 costs). In FY03, scientists submitted 168 proposals, requesting over $24.2 M in operating funding. Eighty-two projects were funded, with awards ranging from $45 K to $500 K. These projects are summarized in Table 1.

  12. Buried Waste Integrated Demonstration FY-93 Deployment Plan

    International Nuclear Information System (INIS)

    Bonnenberg, R.W.; Heard, R.E.; Milam, L.M.; Watson, L.R.

    1993-02-01

    The Buried Waste Integrated Demonstration (BWID) is a program funded by the US Department of Energy Office of Technology Development. BWID supports the applied research, development, demonstration, and evaluation of a suite of advanced technologies that together form a comprehensive remediation system for the effective and efficient remediation of buried waste. The fiscal year 1993 effort will deploy seven major field demonstrations at the Idaho National Engineering Laboratory's (INEL's) Radioactive Waste Management Complex Cold Test Pit. These major demonstrations are Remote Characterization System, Remote Excavation System, Overburden Removal, Waste Isolation, Contamination Control Unit, Rapid Monitoring Unit, and Fixation of Soil Surface Contamination. This document is the basic operational planning document for BWID deployment of the INEL field demonstrations. Additional sections deal briefly with four nonINEL field and laboratory demonstrations (Buried Waste Retrieval, Arc Melter Vitrification, Graphite DC Plasma Arc Melter, and Fixed Hearth Plasma Process) and with four INEL laboratory demonstrations (Electrostatic Curtain, Thermal Kinetics, Multiaxis Crane Control System, and Dig-Face Characterization)

  13. Innovative IPV from attenuated Sabin poliovirus or newly designed alternative seed strains.

    Science.gov (United States)

    Hamidi, Ahd; Bakker, Wilfried A M

    2012-11-01

    This article gives an overview of the patent literature related to innovative inactivated polio vaccine (i-IPV) based on using Sabin poliovirus strains and newly developed alternative recombinant poliovirus strains. This innovative approach for IPV manufacturing is considered to attribute to the requirement for affordable IPV in the post-polio-eradication era, which is on the horizon. Although IPV is a well-established vaccine, the number of patent applications in this field was seen to have significantly increased in the past decade. Currently, regular IPV appears to be too expensive for universal use. Future affordability may be achieved by using alternative cell lines, alternative virus seed strains, improved and optimized processes, dose sparing, or the use of adjuvants. A relatively short-term option to achieve cost-price reduction is to work on regular IPV, using wild-type poliovirus strains, or on Sabin-IPV, based on using attenuated poliovirus strains. This price reduction can be achieved by introducing efficiency in processing. There are also multiple opportunities to work on dose sparing, for example, by using adjuvants or fractional doses. Renewed interest in this field was clearly reflected in the number and diversity of patent applications. In a later stage, several innovative approaches may become even more attractive, for example the use of recombinant virus strains or even a totally synthetic vaccine. Currently, such work is mainly carried out by research institutes and universities and therefore clinical data are not available.

  14. Active Time-Domain Reflectometry for Unattended Safeguards Systems FY15 Report

    Energy Technology Data Exchange (ETDEWEB)

    Tedeschi, Jonathan R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Smith, Leon E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Moore, David E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sheen, David M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Conrad, Ryan C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gavric, Gordan [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-09-01

    The International Atomic Energy Agency (IAEA) continues to expand its use of unattended measurement systems. An increasing number of systems and an expanding family of instruments create challenges in terms of deployment efficiency and the implementation of data authentication measures. In collaboration with the IAEA, tamper-indicating measures to address data-transmission authentication challenges with unattended safeguards systems are under investigation. Pacific Northwest National Laboratory (PNNL) is studying the viability of active time-domain reflectometry (TDR) along two parallel but interconnected paths: (1) swept-frequency TDR as the highly flexible, laboratory gold standard to which field-deployable options can be compared, and (2) a low-cost commercially available spread-spectrum TDR technology as one option for field implementation. This report describes PNNL’s FY15 progress in the viability study including: an overview of the TDR methods under investigation; description of the testing configurations and mock tampering scenarios; results from a preliminary sensitivity comparison of the two TDR methods; demonstration of a quantitative metric for estimating field performance that acknowledges the need for high detection probability while minimizing false alarms. FY15 progress reported here sets the stage for a rigorous comparison of the candidate TDR methods, over a range of deployment scenarios and perturbing effects typical of IAEA unattended monitoring systems.

  15. Admission Control for Multiservices Traffic in Hierarchical Mobile IPv6 Networks by Using Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Jung-Shyr Wu

    2012-01-01

    Full Text Available CAC (Call Admission Control plays a significant role in providing QoS (Quality of Service in mobile wireless networks. In addition to much research that focuses on modified Mobile IP to get better efficient handover performance, CAC should be introduced to Mobile IP-based network to guarantee the QoS for users. In this paper, we propose a CAC scheme which incorporates multiple traffic types and adjusts the admission threshold dynamically using fuzzy control logic to achieve better usage of resources. The method can provide QoS in Mobile IPv6 networks with few modifications on MAP (Mobility Anchor Point functionality and slight change in BU (Binding Update message formats. According to the simulation results, the proposed scheme presents good performance of voice and video traffic at the expenses of poor performance on data traffic. It is evident that these CAC schemes can reduce the probability of the handoff dropping and the cell overload and limit the probability of the new call blocking.

  16. Analysis of Well ER-EC-6 Testing, Western Pahute Mesa - Oasis Valley FY 2000 Testing Program

    Energy Technology Data Exchange (ETDEWEB)

    None

    2002-09-30

    This report documents the analysis of the data collected for Well ER-EC-6 during the Western Pahute Mesa-Oasis Valley (WPM-OV) well development and testing program that was conducted during fiscal year (FY) 2000. The data collection for that program is documented in Appendix A, Western Pahute Mesa-Oasis Valley, Well ER-EC-6 Data Report for Development and Hydraulic Testing.

  17. Environmental Systems Research and Analysis FY 2000 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    David L. Miller; Castle, Peter Myer; Steven J. Piet

    2001-01-01

    The Environmental Systems Research (ESR) Program, a part of the Environmental Systems Research and Analysis (ESRA) Program, was implemented to enhance and augment the technical capabilities of the INEEL. Strengthening the Technical capabilities of the INEEL will provide the technical base to serve effectively as the Environmental Management Laboratory for the Office of Environmental Management (EM). This is a progress report for the third year of the ESR Program (FY 2000). A report of activities is presented for the five ESR research investment areas: (1) Transport Aspects of Selective Mass Transport Agents, (2) Chemistry of Environmental Surfaces, (3) Materials Dynamics, (4) Characterization Science, and (5) Computational Simulation of Mechanical and Chemical Systems. In addition to the five technical areas, the report describes activities in the Science and Technology Foundations element of the program, e.g., interfaces between ESR and the EM Science Program (EMSP) and the EM Focus Areas. The five research areas are subdivided into 18 research projects. FY 2000 research in these 18 projects has resulted in more than 50 technical papers that are in print, in press, in review, or in preparation. Additionally, more than 100 presentations were made at professional society meetings nationally and internationally. Work supported by this program was in part responsible for one of our researchers, Dr. Mason Harrup, receiving the Department of Energy’s “Bright Light” and “Energy at 23” awards. Significant accomplishments were achieved. Non-Destructive Assay hardware and software was deployed at the INEEL, enhancing the quality and efficiency of TRU waste characterization for shipment. The advanced tensiometer has been employed at numerous sites around the complex to determine hydrologic gradients in variably saturated vadose zones. An ion trap, secondary ion mass spectrometer (IT-SIMS) was designed and fabricated to deploy at the INEEL site to measure the

  18. Advanced Networks in Motion Mobile Sensorweb

    Science.gov (United States)

    Ivancic, William D.; Stewart, David H.

    2011-01-01

    Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was IPv6 enabled. Successful mobile sensorweb system field tests took place in late August and early September of 2009. The entire network utilized IPv6 and was monitored and controlled using a remote Web browser via IPv6 technology. This paper describes the mobile networking and 6LowPAN sensorweb design, implementation, deployment and testing as well as wireless systems and network monitoring software developed to support testing and validation.

  19. Appendix B: Hydrogen, Fuel Cells, and Infrastructure Technologies Program inputs for FY 2008 benefits estimates

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2009-01-18

    Document summarizes the results of the benefits analysis of EERE’s programs, as described in the FY 2008 Budget Request. EERE estimates benefits for its overall portfolio and nine Research, Development, Demonstration, and Deployment (RD3) programs.

  20. Concomitant administration of diphtheria, tetanus, acellular pertussis and inactivated poliovirus vaccine derived from Sabin strains (DTaP-sIPV) with pentavalent rotavirus vaccine in Japanese infants.

    Science.gov (United States)

    Tanaka, Yoshiyuki; Yokokawa, Ruriko; Rong, Han Shi; Kishino, Hiroyuki; Stek, Jon E; Nelson, Margaret; Lawrence, Jody

    2017-06-03

    Rotavirus is the leading cause of severe acute gastroenteritis in infants and young children. Most children are infected with rotavirus, and the health and economic burdens of rotavirus gastroenteritis on healthcare systems and families are considerable. In 2012 pentavalent rotavirus vaccine (RV5) and diphtheria, tetanus, acellular pertussis and inactivated poliovirus vaccine derived from Sabin strains (DTaP-sIPV) were licensed in Japan. We examined the immunogenicity and safety of DTaP-sIPV when administrated concomitantly with RV5 in Japanese infants. A total of 192 infants 6 to 11 weeks of age randomized to Group 1 (N = 96) received DTaP-sIPV and RV5 concomitantly, and Group 2 (N = 96) received DTaP-sIPV and RV5 separately. Antibody titer to diphtheria toxin, pertussis antigens (PT and FHA), tetanus toxin, and poliovirus type 1, 2, and 3 were measured at 4 to 6 weeks following 3-doses of DTaP-sIPV. Seroprotection rates for all components of DTaP-sIPV were 100% in both groups, and the geometric mean titers for DTaP-sIPV in Group 1 were comparable to Group 2. Incidence of systemic AEs (including diarrhea, vomiting, fever, and nasopharyngitis) were lower in Group 1 than in Group 2. All vaccine-related AEs were mild or moderate in intensity. There were no vaccine-related serious AEs, no deaths, and no cases of intussusception during the study. Concomitant administration of DTaP-sIPV and RV5 induced satisfactory immune responses to DTaP-sIPV and acceptable safety profile. The administration of DTaP-sIPV given concomitantly with RV5 is expected to facilitate compliance with the vaccination schedule and improve vaccine coverage in Japanese infants.

  1. EXAFS and EPR study of La0.6Sr0.2Ca0.2MnO3 and La0.6Sr0.2Ba0.2MnO3

    International Nuclear Information System (INIS)

    Yang, D.-K.Dong-Seok; Ulyanov, A.N.; Phan, Manh-Huong; Kim, Ikgyun; Ahn, Byong-Keun; Rhee, Jang Roh; Kim, Jung Sun; Nguyen, Chau; Yu, Seong-Cho

    2003-01-01

    Extended X-ray absorption fine structure (EXAFS) analysis and electron-paramagnetic resonance (EPR) have been used to examine the local structure and the internal dynamics of La 0.6 Sr 0.2 Ca 0.2 MnO 3 and La 0.6 Sr 0.2 Ba 0.2 MnO 3 lanthanum manganites. The Mn-O bond distance (∼1.94 Angst for both samples) and the Debye-Waller factors (0.36x10 -2 and 0.41x10 -2 Angst 2 for La 0.6 Sr 0.2 Ca 0.2 MnO 3 and for La 0.6 Sr 0.2 Ba 0.2 MnO 3 , respectively) were obtained from the EXAFS analysis. The dependence of the EPR line width on dopant kind (Ca or Ba) showed a decrease of the spin-lattice interaction with an increase of the Curie temperature. For both compositions, the EPR line intensity followed the exponential law I(T)=I 0 exp(E a /k B T), deduced on the basis of the adiabatic polaron hopping model

  2. A giant enhancement of CMR in Eu{sub 0.6}Ca{sub 0.4}B{sub 6}

    Energy Technology Data Exchange (ETDEWEB)

    Glushkov, V V; Bogach, A V; Demishev, S V; Sluchanko, N E [A.M.Prokhorov General Physics Institute of RAS, 38, Vavilov str., Moscow 119991 (Russian Federation); Anisimov, M A [Moscow Institute of Physics and Technology, 9, Institutskii per., Dolgoprudny, Moscow Region 141700 (Russian Federation); Churkin, O A; Kuznetsov, A V [Moscow Engineering Physics Institute, 31, Kashirskoe Shosse, Moscow 115409 (Russian Federation); Filipov, V B; Levchenko, A V; Shitsevalova, N Yu [I. Frantsevich Institute for Problems of Materials Science NAS, 3, Krzhyzhanovsky str., Kiev 03680 (Ukraine); Flachbart, K, E-mail: glushkov@lt.gpi.r [Centre of Low Temperature Physics, IEP SAS and IPS FS UPJS, Kosice SK-04001 (Slovakia)

    2010-01-15

    The transport and magnetic properties of Eu{sub 0.6}Ca{sub 0.4}B{sub 6} single crystals have been studied at temperatures 1.8-300 K in magnetic fields up to 80 kOe. It was found that lowering of temperature results in a drastic increase of magnetoresistance up to the values of {rho}(0)/{rho}(H){approx}7{center_dot}10{sup 5} detected below 6K. The Hall and Seebeck effect measurements showed that colossal magnetoresistance (CMR) observed in Eu{sub 0.6}Ca{sub 0.4}B{sub 6} is accompanied by a crossover from hole-like to electron-like regime of charge transport induced by applied magnetic field. Hall mobility values {mu}{sub H{approx}}200-350 cm{sup 2}/(Vs) estimated for the high conductive state of Eu{sub 0.6}Ca{sub 0.4}B{sub 6} in the presence of strong substitutional disorder were proved to be comparable with these ones measured for undoped EuB{sub 6}. The anomalous behaviour of transport and magnetic parameters is discussed in terms of metal-insulator transition earlier predicted for this low carrier density system within double exchange model by V M Pereira et al., Phys. Rev. Lett. 93 147202 (2004).

  3. Galactic vs. extragalactic origin of the peculiar transient SCP 06F6

    Science.gov (United States)

    Soker, Noam; Frankowski, Adam; Kashi, Amit

    2010-02-01

    We study four scenarios for the SCP 06F6 transient event that was announced recently. Some of these were previously briefly discussed as plausible models for SCP 06F6, in particular with the claimed detection of a z = 0.143 cosmological redshift of a Swan spectrum of a carbon rich envelope. We adopt this value of z for extragalactic scenarios. We cannot rule out any of these models, but can rank them from most to least preferred. Our favorite model is a tidal disruption of a CO white dwarf (WD) by an intermediate-mass black hole (IMBH). To account for the properties of the SCP 06F6 event, we have to assume the presence of a strong disk wind that was not included in previous numerical simulations. If the IMBH is the central BH of a galaxy, this explains the non-detection of a bright galaxy in the direction of SCP 06F6. Our second favorite scenario is a type Ia-like SN that exploded inside the dense wind of a carbon star. The carbon star is the donor star of the exploded WD. Our third favorite model is a Galactic source of an asteroid that collided with a WD. Such a scenario was discussed in the past as the source of dusty disks around WDs, but no predictions exist regarding the appearance of such an event. Our least favorite model is of a core collapse SN. The only way we can account for the properties of SCP 06F6 with a core collapse SN is if we assume the occurrence of a rare type of binary interaction.

  4. The Relationship Between Family, Parent, and Child Characteristics and Intimate-Partner Violence (IPV) Among Ukrainian Mothers.

    Science.gov (United States)

    Burlaka, Viktor; Grogan-Kaylor, Andrew; Savchuk, Olena; Graham-Bermann, Sandra A

    2017-07-01

    To assess the prevalence of intimate partner violence (IPV) in a sample of Ukrainian mothers of schoolchildren, and to examine the relationship between IPV and family, parent, and child characteristics utilizing multilevel models. Mothers of children aged 9-16 (n = 278, 93.5% Ukrainians) answered the Revised Conflict Tactics Scale (CTS2) assessing IPV. We also examined the relationship between IPV and maternal age, education, employment and marital status, family income, and rural or urban residence. Eighty-one percent of women reported psychological violence and 58% reported physical assault. On average, women reported 66 instances of IPV during the last year. Multilevel modeling revealed that lower maternal education, unemployment, not living with the husband or partner, and urban residency were associated with higher IPV victimization. Younger age and family income were not significantly related to IPV. IPV was a significant social problem in the present sample of Ukrainian mothers of school age children. Future policy and violence prevention programming should focus on supporting academic and employment opportunities for women, particularly for those living in urban areas.

  5. Forwarding techniques for IP fragmented packets in a real 6LoWPAN network.

    Science.gov (United States)

    Ludovici, Alessandro; Calveras, Anna; Casademont, Jordi

    2011-01-01

    Wireless Sensor Networks (WSNs) are attracting more and more interest since they offer a low-cost solution to the problem of providing a means to deploy large sensor networks in a number of application domains. We believe that a crucial aspect to facilitate WSN diffusion is to make them interoperable with external IP networks. This can be achieved by using the 6LoWPAN protocol stack. 6LoWPAN enables the transmission of IPv6 packets over WSNs based on the IEEE 802.15.4 standard. IPv6 packet size is considerably larger than that of IEEE 802.15.4 data frame. To overcome this problem, 6LoWPAN introduces an adaptation layer between the network and data link layers, allowing IPv6 packets to be adapted to the lower layer constraints. This adaptation layer provides fragmentation and header compression of IP packets. Furthermore, it also can be involved in routing decisions. Depending on which layer is responsible for routing decisions, 6LoWPAN divides routing in two categories: mesh under if the layer concerned is the adaptation layer and route over if it is the network layer. In this paper we analyze different routing solutions (route over, mesh under and enhanced route over) focusing on how they forward fragments. We evaluate their performance in terms of latency and energy consumption when transmitting IP fragmented packets. All the tests have been performed in a real 6LoWPAN implementation. After consideration of the main problems in forwarding of mesh frames in WSN, we propose and analyze a new alternative scheme based on mesh under, which we call controlled mesh under.

  6. Forwarding Techniques for IP Fragmented Packets in a Real 6LoWPAN Network

    Directory of Open Access Journals (Sweden)

    Jordi Casademont

    2011-01-01

    Full Text Available Wireless Sensor Networks (WSNs are attracting more and more interest since they offer a low-cost solution to the problem of providing a means to deploy large sensor networks in a number of application domains. We believe that a crucial aspect to facilitate WSN diffusion is to make them interoperable with external IP networks. This can be achieved by using the 6LoWPAN protocol stack. 6LoWPAN enables the transmission of IPv6 packets over WSNs based on the IEEE 802.15.4 standard. IPv6 packet size is considerably larger than that of IEEE 802.15.4 data frame. To overcome this problem, 6LoWPAN introduces an adaptation layer between the network and data link layers, allowing IPv6 packets to be adapted to the lower layer constraints. This adaptation layer provides fragmentation and header compression of IP packets. Furthermore, it also can be involved in routing decisions. Depending on which layer is responsible for routing decisions, 6LoWPAN divides routing in two categories: mesh under if the layer concerned is the adaptation layer and route over if it is the network layer. In this paper we analyze different routing solutions (route over, mesh under and enhanced route over focusing on how they forward fragments. We evaluate their performance in terms of latency and energy consumption when transmitting IP fragmented packets. All the tests have been performed in a real 6LoWPAN implementation. After consideration of the main problems in forwarding of mesh frames in WSN, we propose and analyze a new alternative scheme based on mesh under, which we call controlled mesh under.

  7. Setup and Operation of the Third-Generation TeleEngineering Communications Equipment - Deployable (TCE-D) System, Version II

    National Research Council Canada - National Science Library

    Williamson, Jeffrey

    2004-01-01

    In FY97, the U.S. Army Engineer Research and Development Center (ERDC) initiated a technology demonstration program to determine the feasibility of providing deployed troops with direct access to subject matter experts (SMEs...

  8. Effects of PREPARE, a Multi-component, School-Based HIV and Intimate Partner Violence (IPV) Prevention Programme on Adolescent Sexual Risk Behaviour and IPV: Cluster Randomised Controlled Trial.

    Science.gov (United States)

    Mathews, Catherine; Eggers, Sander M; Townsend, Loraine; Aarø, Leif E; de Vries, Petrus J; Mason-Jones, Amanda J; De Koker, Petra; McClinton Appollis, Tracy; Mtshizana, Yolisa; Koech, Joy; Wubs, Annegreet; De Vries, Hein

    2016-09-01

    Young South Africans, especially women, are at high risk of HIV. We evaluated the effects of PREPARE, a multi-component, school-based HIV prevention intervention to delay sexual debut, increase condom use and decrease intimate partner violence (IPV) among young adolescents. We conducted a cluster RCT among Grade eights in 42 high schools. The intervention comprised education sessions, a school health service and a school sexual violence prevention programme. Participants completed questionnaires at baseline, 6 and 12 months. Regression was undertaken to provide ORs or coefficients adjusted for clustering. Of 6244 sampled adolescents, 55.3 % participated. At 12 months there were no differences between intervention and control arms in sexual risk behaviours. Participants in the intervention arm were less likely to report IPV victimisation (35.1 vs. 40.9 %; OR 0.77, 95 % CI 0.61-0.99; t(40) = 2.14) suggesting the intervention shaped intimate partnerships into safer ones, potentially lowering the risk for HIV.

  9. A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients

    Directory of Open Access Journals (Sweden)

    Perta Vasile C.

    2015-04-01

    Full Text Available Commercial Virtual Private Network (VPN services have become a popular and convenient technology for users seeking privacy and anonymity. They have been applied to a wide range of use cases, with commercial providers often making bold claims regarding their ability to fulfil each of these needs, e.g., censorship circumvention, anonymity and protection from monitoring and tracking. However, as of yet, the claims made by these providers have not received a sufficiently detailed scrutiny. This paper thus investigates the claims of privacy and anonymity in commercial VPN services. We analyse 14 of the most popular ones, inspecting their internals and their infrastructures. Despite being a known issue, our experimental study reveals that the majority of VPN services suffer from IPv6 traffic leakage. The work is extended by developing more sophisticated DNS hijacking attacks that allow all traffic to be transparently captured.We conclude discussing a range of best practices and countermeasures that can address these vulnerabilities

  10. Stimulated transformation in nano-layered composites with Se0.6Te0.4

    International Nuclear Information System (INIS)

    Malyovanik, M.; Shipljak, M.; Cheresnya, V.; Ivan, I.; Csik, A.; Kokenyesi, S.; Debrecen Univ.

    2005-01-01

    Complete text of publication follows. The main types of the photo-induced structural transformations (PST) in chalcogenide glasses and amorphous layers can be systematized as i) structural transformations within amorphous phase, ii) photo-induced crystallization or amorphyzation, iii) photo-induced mass transport. These main known types of PST can be further detailed, for example concerning photo-induced anisotropy, photo- bleaching, etc., and are widely investigated. But the fundamentals of these effects even in the most known compositions like AsSe, As 2 S 3 are not clear, especially for the nanostructures, where the possible cluster formation, size restrictions and interface conditions may essentially influence the parameters of the material. Furthermore, the basic applied problem related to the PST consists of the possibility of digital or analog optical information storage, phase change memory, fabrication of elements for optics and photonics. These applications require determined spectral and temperature range of functioning, increased sensitivity, transformation rates and stability of the memory at the same time. The realization of such requirements can be expected in nanosized objects made of chalcogenides due to the suitable change of thermodynamical parameters, conductivity, optical and other characteristics. The establishment of correlations between the compositional modulation at nanoscale-dimensions (3-10 nm) in Se 0.6 Te 0.4 and the changes of the optical and electrical parameters as well as the possible improvement of optical recording process in comparison with homogeneous Se 0.6 Te 0.4 films were the aims of the present work. Two types of nano-multilayers, namely Se 0.6 Te 0.4 /SiO x and Se 0.6 Te 0.4 /As 2 S 3 were investigated with respect to the thermo- or light-stimulated structural transformations, since they strongly di r by the possibility of intermixing or crystallization in a steady-state process of heating or laser illumination. Photo

  11. Peer Influence on IPV by Young Adult Males: Investigating the Case for a Social Norms Approach.

    Science.gov (United States)

    McKool, Marissa; Stephenson, Rob; Winskell, Kate; Teten Tharp, Andra; Parrott, Dominic

    2017-08-01

    Nearly 32% of women report experiencing physical violence from an intimate partner and more than 8% report being raped by a significant other in their lifetime. Young people's perceptions that their peers perpetrate relationship violence have been shown to increase the odds of self-reported perpetration. Yet, limited research has been conducted on this relationship as individuals begin to age out of adolescence. The present study sought to examine the link between the perception of peer perpetration of intimate partner violence (IPV) and self-reported IPV perpetration among a sample of predominately young adult (21-35 years) males. This study also explored the discordance between the perception of peer IPV behavior and self-reported perpetration. Data from 101 male peer dyads ( n = 202) were taken from a study on the effects of alcohol and bystander intervention in Atlanta, Georgia. Thirty-six percent ( n = 73) of men reported perpetrating physical IPV and 67% ( n = 135) reported perpetrating sexual IPV in the past 12 months. Nearly 35% ( n = 55) of the sample reported that none of their peers had perpetrated physical IPV, which contradicted their friend's self-report of physical IPV perpetration. Similarly, 68% ( n = 115) of the men perceived none of their peers to have perpetrated sexual IPV, which contradicted their friend's self-report of sexual IPV perpetration. Discordance variables were significantly associated with self-reported perpetration for both physical (χ 2 = 152.7, p peer IPV perpetration among young adult males. Findings suggest a traditional social norms approach to IPV prevention, which seeks to persuade individuals that negative behaviors are less common than perceived, may not be the best approach given a significant number of men believed their friends were nonviolent when they had perpetrated violence.

  12. Large linear magnetoresistance in topological crystalline insulator Pb_0_._6Sn_0_._4Te

    International Nuclear Information System (INIS)

    Roychowdhury, Subhajit; Ghara, Somnath; Guin, Satya N.; Sundaresan, A.; Biswas, Kanishka

    2016-01-01

    Classical magnetoresistance generally follows the quadratic dependence of the magnetic field at lower field and finally saturates when field is larger. Here, we report the large positive non-saturating linear magnetoresistance in topological crystalline insulator, Pb_0_._6Sn_0_._4Te, at different temperatures between 3 K and 300 K in magnetic field up to 9 T. Magnetoresistance value as high as ∼200% was achieved at 3 K at magnetic field of 9 T. Linear magnetoresistance observed in Pb_0_._6Sn_0_._4Te is mainly governed by the spatial fluctuation carrier mobility due to distortions in the current paths in inhomogeneous conductor. - Graphical abstract: Large non-saturating linear magnetoresistance has been evidenced in topological crystalline insulator, Pb_0_._6Sn_0_._4Te, at different temperatures between 3 K and 300 K in magnetic field up to 9 T. - Highlights: • Large non-saturating linear magnetoresistance was achieved in the topological crystalline insulator, Pb_0_._6Sn_0_._4Te. • Highest magnetoresistance value as high as ~200% was achieved at 3 K at magnetic field of 9 T. • Linear magnetoresistance in Pb_0_._6Sn_0_._4Te is mainly governed by the spatial fluctuation of the carrier mobility.

  13. FUNCTIONS AND REQUIREMENTS FOR RUSSIAN PULSATING MONITOR DEPLOYMENT IN THE GUNITE AND ASSOCIATED TANKS AT OAK RIDGE NATIONAL LABORATORY

    International Nuclear Information System (INIS)

    Thomas Albert

    1999-01-01

    This document provides functions and requirements to support deployment of pulsating mixer pump technology in the Oak Ridge National Laboratory (ORNL) Gunite and Associated Tanks to mobilize and mix the settled sludge and solids in these tanks. In FY 1998 pulsating mixer pump technology, a jet mixer powered by a reciprocating air supply, was selected for FY 1999 deployment in one of the GAAT tanks to mobilize settled solids. Pulsating mixer pump technology was identified in FY 1996 during technical exchanges between the US Department of Energy (DOE) Tanks Focus Area Retrieval and Closure program, the DOE Environmental Management International Programs, and delegates from Russia as a promising technology that could be implemented in the US. The pulsating mixer pump technology, provided by the Russian Integrated Mining Chemical Company, was tested at Pacific Northwest National Laboratory (PNNL) to observe its ability to mobilize settled solids. Based on the results of this demonstration, ORNL and DOE staff determined that a modified pulsating mixer pump would meet project needs for bulk mobilization of Gunite tank sludge prior to deployment of other retrieval systems. The deployment of this device is expected to significantly reduce the costs of operation and maintenance of more expensive retrieval systems. The functions and requirements presented here were developed by evaluating the results and recommendations that resulted from the pulsating mixer pump demonstration at PNNL, and by coupling this with the remediation needs identified by staff at ORNL involved with the remediation of the Gunite and Associated Tanks

  14. Hanford, diversification, and the Tri-Cities Economy FY 1998

    International Nuclear Information System (INIS)

    SCOTT, M.J.

    1999-01-01

    The missions of the U.S. Department of Energy's Richland Operations Office (DOE/RL) are to safely manage the Hanford Site, to manage and clean up its legacy wastes, and to develop and deploy new science and technology in the environmental and energy fields. Collectively, DOE/RL and its contractors are the most important single entity in the Tri-Cities local economy (Pasco, Kennewick, and Richland, Washington, and the surrounding area). Although the relevant economic region affected by DOE/RL and its contractors actually embraces a geographic area reaching from Yakima in the west to Walla Walla in the east and from Moses Lake in the north to Pendleton, Oregon, in the south, over 90% of economic impacts likely occur in Benton and Franklin Counties. These two counties are defined as the ''local'' Tri-Cities economy for purposes of this study (see Figure 1). In the federal fiscal year (IV) 1998 (October 1, 1997 through September 30, 1998), the total impact of DOEs local $1.6 billion budget was felt through payrolls of $519 million and local purchases of goods and services of $246 million. The total local spending of $765 million was down slightly from the FY 1997 total of $774 million. Taking into account the slightly greater multiplier effects of this spending due to changes in its mix, the DOE/RL budget sustained an estimated 36% of all local employment (31,200 out of 86,000 jobs) and up to 64% of local wage income ($1.55 billion out of $2.40 billion). This was up slightly from the year before (29,500 jobs, $1.49 billion income). DOE budget increases in FY 1999 are expected to result in a net increase of about 200 local DOE contractor jobs over the September 30, 1998 level, or about equal to the FY 1998 average. In addition, economic diversification more than offset the impact of the local DOE losses in FY 1998 and, together with an initial economic boost from privatization of Hanford's tank waste cleanup, is expected to play a significant expansive role in FY 1999

  15. Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities

    Directory of Open Access Journals (Sweden)

    Dileep Basam

    2016-01-01

    Full Text Available Moving Target IPv6 Defense (MT6D imparts radio-frequency hopping behavior to IPv6 networks by having participating nodes periodically hop onto new addresses while giving up old addresses. Our previous research efforts implemented a solution to identify and acquire these old addresses that are being discarded by MT6D hosts on a local network besides being able to monitor and visualize the incoming traffic on these addresses. This was essentially equivalent to forming a darknet out of the discarded MT6D addresses, but the solution presented in the previous research effort did not include database integration for it to scale and be extended. This paper presents a solution with a new architecture that not only extends the previous solution in terms of automation and database integration but also demonstrates the ability to deploy a honeypot on a virtual LXC (Linux Container on-demand based on any interesting traffic pattern observed on a discarded address. The proposed architecture also allows an MT6D host to query the solution database for network activity on its relinquished addresses as a JavaScript Object Notation (JSON object. This allows an MT6D host to identify suspicious activity on its discarded addresses and strengthen the MT6D scheme parameters accordingly. We have built a proof-of-concept for the proposed solution and analyzed the solution’s feasibility and scalability.

  16. FY 2009 National Renewable Energy Laboratory (NREL) Annual Report: A Year of Energy Transformation

    Energy Technology Data Exchange (ETDEWEB)

    2010-01-01

    This FY2009 Annual Report surveys the National Renewable Energy Laboratory's (NREL) accomplishments in renewable energy and energy efficiency research and development, commercialization and deployment of technologies, and strategic energy analysis. It offers NREL's vision and progress in building a clean, sustainable research campus and reports on community involvement.

  17. InterProScan Result: FY752086 [KAIKOcDNA[Archive

    Lifescience Database Archive (English)

    Full Text Available FY752086 FY752086_4_ORF1 883389819CEEC6A6 PFAM PF00067 p450 2.3e-25 T IPR001128 Cytochrome P450 Molecular... Function: monooxygenase activity (GO:0004497)|Molecular Function: iron ion binding (GO:0005506)|Molecular... Function: electron carrier activity (GO:0009055)|Molecular Function: heme binding (GO:0020037) ...

  18. InterProScan Result: FY005565 [KAIKOcDNA[Archive

    Lifescience Database Archive (English)

    Full Text Available FY005565 FY005565_1_ORF1 21201BC324E6CE7F PFAM PF00067 p450 6.2e-17 T IPR001128 Cytochrome P450 Molecular... Function: monooxygenase activity (GO:0004497)|Molecular Function: iron ion binding (GO:0005506)|Molecular... Function: electron carrier activity (GO:0009055)|Molecular Function: heme binding (GO:0020037) ...

  19. A Randomized Controlled Study of a Fully Liquid DTaP-IPV-HB-PRP-T Hexavalent Vaccine for Primary and Booster Vaccinations of Healthy Infants and Toddlers in Latin America.

    Science.gov (United States)

    López, Pío; Arguedas Mohs, Adriano; Abdelnour Vásquez, Arturo; Consuelo-Miranda, Maria; Feroldi, Emmanuel; Noriega, Fernando; Jordanov, Emilia; B Chir, Siham; Zambrano, Betzana

    2017-11-01

    Hexavalent diphtheria-tetanus-acellular pertussis-inactivated poliovirus-hepatitis B-Haemophilus influenzae type b (DTaP-IPV-HB-PRP-T)-containing vaccines are increasingly the standard of care. This study evaluated the primary series (NCT01177722) and booster (NCT01444781) of a fully liquid DTaP-IPV-HB-PRP-T vaccine in Latin America. Infants (N = 1375) received hepatitis B vaccine at birth and were randomized to one of 3 batches of the investigational DTaP-IPV-HB-PRP-T or licensed control vaccine (DTaP-HB-IPV//PRP-T) at 2-4 to 6 months of age, coadministered with 7-valent pneumococcal conjugate vaccine (PCV7) (2-4-6 months) and rotavirus vaccine (2-4 months). A booster of either DTaP-IPV-HB-PRP-T or control was given at 12-24 months, coadministered with PCV7. Immunogenicity was assessed by validated assays and safety from parental reports. Primary series seroprotection and vaccine response rates were equivalent for DTaP-IPV-HB-PRP-T batches. For pooled batches, noninferiority to the control vaccine was demonstrated for each antigen. There were no descriptive differences in antibody persistence or booster response between DTaP-IPV-HB-PRP-T and the control. The booster responses to either vaccine following DTaP-IPV-HB-PRP-T primary series or to DTaP-IPV-HB-PRP-T following a control vaccine primary series were similar. The anti-aP component (filamentous hemagglutinin [FHA] and pertussis toxin [PT]) vaccine response and anti-Haemophilus influenzae type b (PRP) series seroprotection (≥0.15 µg/mL) rates were ≥73.0% after 2 primary series doses. Antipyretics had no effect on the immune response, and an extra (oral) polio vaccination had no effect on the antipolio booster response. Responses to PCV7 and rotavirus vaccine were similar for each coadministration. There were no safety concerns observed with any vaccine. These results confirm the suitability of the fully liquid DTaP-IPV-HB-PRP-T vaccine for primary and booster vaccination of infants.

  20. Factors associated with recent intimate partner violence experience amongst currently married women in Afghanistan and health impacts of IPV: a cross sectional study.

    Science.gov (United States)

    Gibbs, Andrew; Corboz, Julienne; Jewkes, Rachel

    2018-05-03

    Intimate partner violence (IPV) is exceedingly common in conflict and post-conflict settings. We first seek to describe factors associated with past 12 month IPV amongst currently married women in Afghanistan, focused on the factors typically assumed to drive IPV. Second, to describe whether IPV is independently associated with a range of health outcomes. Cross-sectional analysis of currently married Afghan women, comprising the baseline study of a trial to prevent IPV. We use multinomial regression, reporting adjusted relative-risk ratios to model factors associated with the different forms of IPV, comparing no IPV, emotional IPV only, and physical IPV and emotional IPV. Second we assessed whether experience of emotional IPV, and physical IPV, were independently associated with health outcomes, reporting adjusted ß coefficients and adjusted odds ratios as appropriate. Nine hundred thirty five currently married women were recruited, 11.8% experienced only emotional IPV and 23.1% experienced physical and emotional IPV. Emotional IPV only was associated with attending a women's group, greater food insecurity, her husband having more than one wife, experiencing other forms of family violence, and more inequitable community gender norms. Experiencing both physical IPV and emotional IPV was associated with attending a women's group, more childhood trauma, husband cruelty, her husband having more than one wife, experiencing other forms of family violence, more inequitable community gender norms, and greater reported disability. Emotional IPV and physical IPV were independently associated with worse health outcomes. IPV remains common in Afghanistan. Economic interventions for women alone are unlikely to prevent IPV and potentially may increase IPV. Economic interventions need to also work with husbands and families, and work to transform community level gender norms. NCT03236948 . Registered 28 July 2017, retrospectively registered.

  1. Benchmark Imagery FY11 Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Pope, P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2011-06-14

    This report details the work performed in FY11 under project LL11-GS-PD06, “Benchmark Imagery for Assessing Geospatial Semantic Extraction Algorithms.” The original LCP for the Benchmark Imagery project called for creating a set of benchmark imagery for verifying and validating algorithms that extract semantic content from imagery. More specifically, the first year was slated to deliver real imagery that had been annotated, the second year to deliver real imagery that had composited features, and the final year was to deliver synthetic imagery modeled after the real imagery.

  2. A fully liquid DTaP-IPV-Hep B-PRP-T hexavalent vaccine for primary and booster vaccination of healthy Mexican children.

    Science.gov (United States)

    Aquino, Amalia Guadalupe Becerra; Brito, Maricruz Gutiérrez; Doniz, Carlos E Aranza; Herrera, Juan Francisco Galán; Macias, Mercedes; Zambrano, Betzana; Plennevaux, Eric; Santos-Lima, Eduardo

    2012-10-05

    To evaluate an investigational, fully liquid hexavalent diphtheria-tetanus-acellular pertussis-inactivated poliovirus-hepatitis B-Haemophilus influenzae type b (DTaP-IPV-Hep B-PRP-T: Hexaxim™) vaccine for primary and booster vaccination of healthy children in Mexico. Infants (N=1189) were randomized to receive one of three lots of the DTaP-IPV-Hep B-PRP-T vaccine or a licensed hexavalent control vaccine (Infanrix™ hexa) for primary vaccination at 2, 4 and 6 months. All participants who completed the primary series and agreed to participate in the booster part of the study received a dose of the investigational vaccine at 15-18 months of age. Validated serological assays and parental reports were used to assess immunogenicity and safety, respectively. Post-primary vaccination, ≥95.8% of participants in both the DTaP-IPV-Hep B-PRP-T and control groups were seroprotected (SP) against diphtheria, tetanus, poliovirus, hepatitis B and PRP, or had seroconverted (SC) to the pertussis toxin (PT) and filamentous hemagglutinin (FHA) pertussis antigens. The SP/SC rates induced by the three DTaP-IPV-Hep B-PRP-T lots were equivalent. No differences in SP/SC rates were observed between the pooled lots of investigational vaccine and the control vaccine. Antibody persistence at 15-18 months was comparable between groups, with strong increases in all antibody concentrations post-DTaP-IPV-Hep B-PRP-T booster. Both vaccines were well tolerated for primary vaccination, as was the booster dose of DTaP-IPV-Hep B-PRP-T. These study findings confirm the suitability of the combined, fully liquid DTaP-IPV-Hep B-PRP-T vaccine for inclusion in routine childhood vaccination schedules. Copyright © 2012 Elsevier Ltd. All rights reserved.

  3. Neutron-diffraction study of cubic ErC/sub 0.6/ in the temperature range 1.6--296 K

    International Nuclear Information System (INIS)

    Atoji, M.

    1981-01-01

    Neutron-diffraction measurements have shown that the form of ErC/sub 0.6/ that has a cubic, NaCl-type structure is paramagnetic above 90 K, exhibiting a free Er 3+ moment. Below 90 K, ErC/sub 0.6/ becomes a ferromagnet with a saturation moment of 2.5 Bohr magnetons (only 28% of the maximum free-ion moment), indicating a large crystal-field effect. By measuring the preferential crystallite orientation induced by the applied magnetic field, the direction of the ferromagnetically ordered moment was found to be parallel to the axis. A ferromagnetic, short-range ordering coexists with the ferromagnetic long-range ordering at temperatures down to 1.6 K

  4. Deployment Repeatability

    Science.gov (United States)

    2016-04-01

    evaluating the deployment repeatability builds upon the testing or analysis of deployment kinematics (Chapter 6) and adds repetition. Introduction...material yield or failure during a test. For the purposes of this chapter, zero shift will refer to permanent changes in the structure, while reversible ...the content of other chapters in this book: Gravity Compensation (Chapter 4) and Deployment Kinematics and Dynamics (Chapter 6). Repeating the

  5. Interplay between charge and antiferromagnetic ordering in Bi0.6-xPrxCa0.4MnO3 (0≤x≤0.6) perovskite manganite

    International Nuclear Information System (INIS)

    Yadav, Kamlesh; Singh, H.K.; Varma, G.D.

    2012-01-01

    Structure, magnetic and transport properties of polycrystalline Bi 0.6-x Pr x Ca 0.4 MnO 3 (x=0.0, 0.1, 0.2, 0.3, 0.4, 0.5 and 0.6) have been studied. Systematic substitution of Pr at Bi site induces an interesting interplay between the charge ordering and antiferromagnetism. The charge ordering temperature (T CO ) decreases with increasing x. The antiferromagnetic (AFM) ordering temperature (T N ) increases sharply at both the extremes but remains nearly constant from x=0.2 to 0.4. At temperatures lower than T N a transition to the glassy state is observed. The nature of this glass like state appears to be controlled by the Pr content, and at lower values of x this is akin to a spin glass, while at higher x it has a characteristic of cluster glass. The Pr doping also leads to enhancement in the magnetic moment. In the present work it has been proposed that the local lattice distortion induced due to size mismatch between the A-site cations and 6s 2 character of Bi 3+ lone pair electron is responsible for the observed magnetic and electrical properties.

  6. VT Data - NAIP Color Infrared Imagery (0.6m) 2016, Statewide

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) The NAIP_0_6M_CLRIR_2016 dataset is a (60 centimeter) truecolor and infrared (4 band) NAIP imagery product acquired during the summer of 2016 by...

  7. Structural Pathways between Child Abuse, Poor Mental Health Outcomes and Male-Perpetrated Intimate Partner Violence (IPV)

    Science.gov (United States)

    Machisa, Mercilene T.; Christofides, Nicola; Jewkes, Rachel

    2016-01-01

    Background Violent trauma exposures, including child abuse, are risk factors for PTSD and comorbid mental health disorders. Child abuse experiences of men exacerbate adult male-perpetrated intimate partner violence (IPV). The relationship between child abuse, poor mental health and IPV perpetration is complex but research among the general population is lacking. This study describes the relationship and pathways between history of child abuse exposure and male-perpetrated IPV while exploring the potentially mediating effect of poor mental health. Methods We analysed data from a randomly selected, two-stage clustered, cross-sectional household survey conducted with 416 adult men in Gauteng Province of South Africa. We used multinomial regression modelling to identify associated factors and Structural Equation Modelling (SEM) to test the primary hypothesis that poor mental health (defined as abusing alcohol or having PTSD or depressive symptoms) mediates the relationship between child abuse and IPV perpetration. Results Eighty eight percent of men were physically abused, 55% were neglected, 63% were emotionally abused and 20% were sexually abused at least once in their childhood. Twenty four percent of men had PTSD symptoms, 24% had depressive symptoms and 36% binge drank. Fifty six percent of men physically abused and 31% sexually abused partners at least once in their lifetime. Twenty two percent of men had one episode and 40% had repeat episodes of IPV perpetration. PTSD symptomatology risk increased with severity of child trauma and other trauma. PTSD severity increased the risk for binge drinking. Child trauma, other trauma and PTSD symptomatology increased the severity of depressive symptoms. PTSD symptomatology was comorbid with alcohol abuse and depressive symptoms. Child trauma, having worked in the year before the survey, other trauma and PTSD increased the risk of repeat episodes of IPV perpetration. Highly equitable gender attitudes were protective

  8. Structural Pathways between Child Abuse, Poor Mental Health Outcomes and Male-Perpetrated Intimate Partner Violence (IPV.

    Directory of Open Access Journals (Sweden)

    Mercilene T Machisa

    Full Text Available Violent trauma exposures, including child abuse, are risk factors for PTSD and comorbid mental health disorders. Child abuse experiences of men exacerbate adult male-perpetrated intimate partner violence (IPV. The relationship between child abuse, poor mental health and IPV perpetration is complex but research among the general population is lacking. This study describes the relationship and pathways between history of child abuse exposure and male-perpetrated IPV while exploring the potentially mediating effect of poor mental health.We analysed data from a randomly selected, two-stage clustered, cross-sectional household survey conducted with 416 adult men in Gauteng Province of South Africa. We used multinomial regression modelling to identify associated factors and Structural Equation Modelling (SEM to test the primary hypothesis that poor mental health (defined as abusing alcohol or having PTSD or depressive symptoms mediates the relationship between child abuse and IPV perpetration.Eighty eight percent of men were physically abused, 55% were neglected, 63% were emotionally abused and 20% were sexually abused at least once in their childhood. Twenty four percent of men had PTSD symptoms, 24% had depressive symptoms and 36% binge drank. Fifty six percent of men physically abused and 31% sexually abused partners at least once in their lifetime. Twenty two percent of men had one episode and 40% had repeat episodes of IPV perpetration. PTSD symptomatology risk increased with severity of child trauma and other trauma. PTSD severity increased the risk for binge drinking. Child trauma, other trauma and PTSD symptomatology increased the severity of depressive symptoms. PTSD symptomatology was comorbid with alcohol abuse and depressive symptoms. Child trauma, having worked in the year before the survey, other trauma and PTSD increased the risk of repeat episodes of IPV perpetration. Highly equitable gender attitudes were protective against single and

  9. Crystal structure and physical properties of CePt{sub 2.4}Al{sub 0.6}

    Energy Technology Data Exchange (ETDEWEB)

    Provino, A., E-mail: alessia.sting@gmail.com [Department of Chemistry, University of Genova, Via Dodecaneso 31, 16146 Genova (Italy); Institute SPIN-CNR, Corso Perrone 24, 16152 Genova (Italy); Bhattacharyya, A. [Department of Condensed Matter Physics and Materials Science, Tata Institute of Fundamental Research, Colaba, Mumbai 400005 (India); Science and Technology Facilities Council, Rutherford Appleton Laboratory, Excitations and Polarized Neutrons Group, Harwell Oxford, Didcot OX11 0QX (United Kingdom); Negretti, L. [Department of Chemistry, University of Genova, Via Dodecaneso 31, 16146 Genova (Italy); Kulkarni, R.; Thamizhavel, A.; Dhar, S.K. [Department of Condensed Matter Physics and Materials Science, Tata Institute of Fundamental Research, Colaba, Mumbai 400005 (India)

    2015-02-15

    Highlights: • New CePt{sub 2.4}Al{sub 0.6} compound crystallizes in the hexagonal CeNi{sub 3}-type (hP24, P6{sub 3}/mmc). • This crystal structure is a nearly ordered ternary derivative of CeNi{sub 3} prototype. • CePt{sub 2.4}Al{sub 0.6} compound orders ferromagnetically at 1.6 K; Ce ions in trivalent state. • Magnetization, electrical resistivity, low-T heat capacity have been measured. • Negative magnetoresistivity below ∼15 K shows short-range FM in paramagnetic state. - Abstract: The new compound CePt{sub 2.4}Al{sub 0.6} crystallizes in the hexagonal CeNi{sub 3}-type (hP24, space group P6{sub 3}/mmc, N. 194), with lattice parameters a = 5.5203(3) Å and c = 16.886(1) Å; its crystal structure represents a nearly ordered ternary derivative of this prototype. The cerium ions in CePt{sub 2.4}Al{sub 0.6} are in the normal trivalent state and order magnetically near 1.6 K as inferred from the low temperature heat capacity. The magnetic ordering is presumably ferromagnetic as suggested by the behavior of heat capacity in applied magnetic fields. The magnetoresistivity below ∼15 K is negative and is tentatively attributed to the presence of ferromagnetic short range order in the paramagnetic state.

  10. Tanks focus area multiyear program plan - FY96-FY98

    International Nuclear Information System (INIS)

    1995-07-01

    The Tanks Focus Area (TFA) Multiyear Program Plan (MYPP) presents the recommended TFA technical program. The recommendation covers a 3-year funding outlook (FY96-FY98), with an emphasis on FY96 and FY97. In addition to defining the recommended program, this document also describes the processes used to develop the program, the implementation strategy for the program, the references used to write this report, data on the U.S. Department of Energy (DOE) tank site baselines, details on baseline assumptions and the technical elements, and a glossary

  11. The role of National Strategies in maintaining Competitive Edge in Information and Communication Technologies

    Directory of Open Access Journals (Sweden)

    Ciprian Popoviciu

    2006-12-01

    Full Text Available This paper examines the economical impact of IPv6, Internet Protocol's next generation. Technically, IPv6 represents an upgrade, an evolution that offers the resources necessary for deeper and wider market penetration of the IP technology, to support the needs of a global economy, to build new products and new services. Politically and economically it has the potential of being a quiet revolution. Countries that trailed US into the information revolution recognize this opportunity to take a leading role in its next expansion phase and have developed national strategies to help better position their respective economies. Despite understanding the constraints imposed by the current version of IP, the private sector is currently inclined to largely ignore IPv6 because of its initial deployment costs and long term returns. Forced by high investor expectations to focus exclusively on the immediate bottom line it trades long term growth opportunities for short term benefits revolving around productivity increases. The paper analyses the importance of a National Strategy in driving IPv6 adoption and in closing a widening knowledge and deployment gap between US and countries such as China, Japan, Korea and the EU.

  12. Framework en estructuras con direccionamiento IPV6 sobre OSSTMM para la corrección de vulnerabilidades de seguridad en un laboratorio de la academia CISCO de la ESPOCH

    OpenAIRE

    Martínez Santander, Carlos José

    2015-01-01

    Se elaboró una propuesta para realizar un Framework en estructuras con direccionamiento IPv6 sobre Open Source Security Testing Methodology Manual (OSSTMM) para la corrección de vulnerabilidades de seguridad en un laboratorio de Academia Local de redes (CISCO) de la Escuela Superior Politécnica de Chimborazo.Se recopilo tendencias sobre vulnerabilidades de seguridad, además de una experimentación, análisis y aplicación, para solucionar errores de seguridad en arquitecturas I...

  13. A Randomized, Controlled Study of DTaP-IPV-HB-PRP-T, a Fully Liquid Hexavalent Vaccine, Administered in a 3-, 5- and 11- to 12-month Schedule.

    Science.gov (United States)

    Vesikari, Timo; Silfverdal, Sven-Arne; Jordanov, Emilia; Feroldi, Emmanuel

    2017-01-01

    To assess the immunogenicity and safety of a fully liquid, ready-to-use hexavalent DTaP-IPV-HB-PRP-T vaccine when administered in a 2 + 1 schedule at 3, 5 and 11-12 months of age. Phase III, randomized, active-controlled, observer-blind, multicenter study. Infants were randomized to receive DTaP-IPV-HB-PRP-T (N = 275) or a licensed control hexavalent vaccine (DTaP-IPV-HB//PRP~T: N = 275), both given in coadministration with Prevenar 13. Serum was analyzed for immune responses to all vaccine antigens. Noninferiority of DTaP-IPV-HB-PRP-T to the control vaccine was tested at completion of the primary series using predefined seroprotection (SP) rate and vaccine response (VR) rates. Safety was assessed using parental reports. Noninferiority of DTaP-IPV-HB-PRP-T to the control vaccine was demonstrated postdose 3 for each antigen, and the SP (for D, T, poliovirus 1, 2 and 3, hepatitis B and polyribosylribitol phosphate) and VR rates (for pertussis toxin and filamentous hemagglutinin) were high in each group. SP rates for D, T, polio 1, 2, 3 and VR rates for pertussis toxin and filamentous hemagglutinin were similar in each group. For hepatitis B, SP rate was slightly higher for DTaP-IPV-HB//PRP~T (99.6%) than DTaP-IPV-HB-PRP-T (96.4%), and for PRP, SP rate was higher for DTaP-IPV-HB-PRP-T (93.5%) than DTaP-IPV-HB//PRP~T (85.2%). For Prevenar 13, the SP rate was high for each serotype and similar for both groups. All vaccines were well tolerated. These study findings confirm the safety and immunogenicity and thus the suitability of this fully liquid hexavalent vaccine for administration in a 2 + 1 schedule.

  14. An Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover

    Science.gov (United States)

    Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong

    IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.

  15. PROTOTIPO PARA EL ANÁLISIS DEL RENDIMIENTO EN EL TRÁFICO DE UN SERVICIO BROADCAST UTILIZANDO LOS PROTOCOLOS HTTP Y RTP SOBRE IPV6 EN UNA RED ACADÉMICA DE TECNOLOGÍA AVANZADA

    Directory of Open Access Journals (Sweden)

    Roberto Ferro

    2011-08-01

    Full Text Available En el presente artículo se condensan los resultados obtenidos de la implementación y modelado de un Prototipo de Servicio Streaming sobre el Sistema Operativo Fedora 13 con el Programa VLC en la Red de Investigación y  Tecnología Avanzada de la Universidad Distrital RITA-UD sobre IPV6 utilizando como cliente la Universidad Minuto de Dios vía RUMBO mediante un Tunel 6a4.

  16. Intrusion Detection and light weight Firewall for the 6LoWPAN networks

    OpenAIRE

    Shreenivas, Dharmini

    2014-01-01

    IPv6 over Low power WPAN (6loWPAN) is an adaption layer introduced between the link layer and the network layer in the TCP/IP protocol stack to t the IPv6 datagrams over the IEEE 802.15.4 link layer. 6loWPAN networks comprise of internet enabled resource-constrained smart objects which are interconnected with each other through the Internet Protocol (IPv6). In Internet of Things (IoT), smart devices of the 6loWPAN networks are connected to the unsecured public Internet. RPL (Routing Protocol ...

  17. Dynamic profiles of neutralizing antibody responses elicited in rhesus monkeys immunized with a combined tetravalent DTaP-Sabin IPV candidate vaccine.

    Science.gov (United States)

    Sun, Mingbo; Ma, Yan; Xu, Yinhua; Yang, Huijuan; Shi, Li; Che, Yanchun; Liao, Guoyang; Jiang, Shude; Zhang, Shumin; Li, Qihan

    2014-02-19

    The World Health Organization has recommended that a Sabin inactivated polio vaccine (IPV) should gradually and synchronously replace oral polio vaccines for routine immunizations because its benefits in eliminating vaccine-associated paralytic poliomyelitis have been reported in different phases of clinical trials. It is also considered important to explore new tetravalent diphtheria, tetanus, and acellular pertussis-Sabin IPV (DTaP-sIPV) candidate vaccines for possible use in developing countries. In this study, the immunogenicity of a combined tetravalent DTaP-sIPV candidate vaccine was investigated in primates by evaluating the neutralizing antibody responses it induced. The dynamic profiles of the antibody responses to each of the separate antigenic components and serotypes of Sabin IPV were determined and their corresponding geometric mean titers were similar to those generated by the tetravalent diphtheria, tetanus, and acellular pertussis-conventional IPV (DTaP-cIPV), the tetravalent diphtheria, tetanus, and acellular pertussis (DTaP), and Sabin IPV vaccines in the control groups. This implies that protective immunogenic effects are conferred by this combined tetravalent formulation. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. Cost-optimization of the IPv4 zeroconf protocol

    NARCIS (Netherlands)

    Bohnenkamp, H.C.; van der Stok, Peter; Hermanns, H.; Vaandrager, Frits

    2003-01-01

    This paper investigates the tradeoff between reliability and effectiveness for the IPv4 Zeroconf protocol, proposed by Cheshire/Adoba/Guttman in 2002, dedicated to the selfconfiguration of IP network interfaces. We develop a simple stochastic cost model of the protocol, where reliability is measured

  19. THE ATTENUATING EFFECT OF EMPOWERMENT ON IPV-RELATED PTSD SYMPTOMS IN BATTERED WOMEN LIVING IN DOMESTIC VIOLENCE SHELTERS

    Science.gov (United States)

    Perez, Sara; Johnson, Dawn M.; Wright, Caroline Vaile

    2010-01-01

    Intimate partner violence (IPV) is associated with significant psychological distress, including posttraumatic stress disorder (PTSD). However, factors that attenuate the impact of IPV on PTSD remain largely unknown. Using hierarchical regression, this investigation explored the impact of resource acquisition and empowerment on the relationship between IPV and PTSD. Empowerment demonstrated greater relative importance over resource acquisition. Specifically, empowerment was found to attenuate the impact of IPV severity on PTSD at low and moderate levels of violence. The importance of fostering empowerment and addressing PTSD in addition to provision of resources in battered women is discussed. PMID:22411301

  20. Electrochemical synthesis of photosensitive nano-nest like CdSe{sub 0.6}Te{sub 0.4} thin films

    Energy Technology Data Exchange (ETDEWEB)

    Shinde, Surendra K., E-mail: surendrashinde.phy@gmail.com [Holography and Material Research Laboratory, Department of Physics, Shivaji University, Kolhapur 416004, M.S (India); Thombare, Jagannath V. [Holography and Material Research Laboratory, Department of Physics, Shivaji University, Kolhapur 416004, M.S (India); Dubal, Deepak P. [Department of Electrochemistry, Technische Universität Chemnitz Institut für Chemie, Straße der Nationen 62, D-09111 Chemnitz (Germany); Fulari, Vijay J., E-mail: vijayfulari@gmail.com [Holography and Material Research Laboratory, Department of Physics, Shivaji University, Kolhapur 416004, M.S (India)

    2013-10-01

    Polycrystalline CdSe{sub 0.6}Te{sub 0.4} thin films were deposited on stainless steel and ITO coated glass (ITO) substrates by using simple and inexpensive electrodeposition method. CdSe{sub 0.6} Te{sub 0.4} films are characterized by different characterization techniques such as X-ray diffraction (XRD), Field emission scanning electron microscopy (FE-SEM), Fourier transform infrared spectroscopy (FTIR) and contact angle measurement. The X-ray diffraction analysis shows that the films are polycrystalline with hexagonal crystal structure. FE-SEM studies reveal that the entire substrate surface is covered with CdSe{sub 0.6} Te{sub 0.4} nano-nest. Formation of CdSe{sub 0.6}Te{sub 0.4} compound was confirmed from the FTIR studies. Optical absorption study shows the presence of direct transition and a considerable band gap, E{sub g} = 1.7 eV. Surface wettability with solid–liquid interface showed hydrophilic nature with water contact angle 57° (<90°). Further photovoltaic activity of CdSe{sub 0.6}Te{sub 0.4} films were studied by forming the photoelectrochemical cell having CdSe{sub 0.6}Te{sub 0.4}/1 M (Na{sub 2}S + S + NaOH)/C cell configuration. The efficiency and fill factor of these PEC cells are found to be 0.64% and 0.49 respectively.

  1. Hot rolling effect on the characters of Zr-0.6Nb-0.5Fe-0.5Cr alloy

    International Nuclear Information System (INIS)

    Sungkono; Siti Aidah

    2015-01-01

    Characters of Zr-0.6Nb-0.5Fe-0.5Cr alloy after hot rolling have been studied. The objective of this research was to obtain of hot rolling effect on the characteristics of microstructures, hardness and phases formed in Zr-0.6Nb-0.5Fe-0.5Cr alloy. The hot rolling process of alloy carried out at temperature of 800 °C with retention time of 1.5 and 2 hours and a thickness reduction between 5 to 25 %. The results of this experiment showed that the Zr-0.6Nb-0.5Fe-0.5Cr alloy has Widmanstaetten structure with microstructure evolving into deformed columnar grains and deformed elongated grains with increasing thickness reduction. Besides, the longer the retention time at temperature of 800 °C is the larger are the grain structures and formation of α-Zr and Zr_3Fe phase. The hardness of Zr-0.6Nb-0.5Fe-0.5Cr alloy has same trends i.e the larger thickness reduction gives higher hardness. The Zr-0.6Nb-0.5Fe-0.5Cr alloy can under go hot rolling deformation at a thickness reduction of 25 % and the formation of α-Zr and Zr_3Fe can increased of hardness and strength of Zr-0.6 Nb-0.5 Fe-0.5 Cr alloy. (author)

  2. Lightweight MIPv6 with IPSec Support

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2014-01-01

    Full Text Available Mobility management is a desired feature for the emerging Internet of Things (IoT. Mobility aware solutions increase the connectivity and enhance adaptability to changes of the location and infrastructure. IoT is enabling a new generation of dynamic ecosystems in environments such as smart cities and hospitals. Dynamic ecosystems require ubiquitous access to Internet, seamless handover, flexible roaming policies, and an interoperable mobility protocol with existing Internet infrastructure. These features are challenges for IoT devices, which are usually constrained devices with low memory, processing, communication and energy capabilities. This work presents an analysis of the requirements and desirable features for the mobility support in the IoT, and proposes an efficient solution for constrained environments based on Mobile IPv6 and IPSec. Compatibility with IPv6-existing protocols has been considered a major requirement in order to offer scalable and inter-domain solutions that were not limited to specific application domains in order to enable a new generation of application and services over Internet-enabled dynamic ecosystems, and security support based on IPSec has been also considered, since dynamic ecosystems present several challenges in terms of security and privacy. This work has, on the one hand, analysed suitability of Mobile IPv6 and IPSec for constrained devices, and on the other hand, analysed, designed, developed and evaluated a lightweight version of Mobile IPv6 and IPSec. The proposed solution of lightweight Mobile IPv6 with IPSec is aware of the requirements of the IoT and presents the best solution for dynamic ecosystems in terms of efficiency and security adapted to IoT-devices capabilities. This presents concerns in terms of higher overhead and memory requirements. But, it is proofed and concluded that even when higher memory is required and major overhead is presented, the integration of Mobile IPv6 and IPSec for

  3. Disability Compensation and Patient Expenditures: FY2000 to FY2013

    Data.gov (United States)

    Department of Veterans Affairs — This report contains FY2000 through FY2013 data on disability compensation expenditures and recipients and on VA healthcare system patients and patient expenditures.

  4. Microfinance Participation, Control Over Resources, and Justification of IPV: Results From a Nationally Representative Sample of Women.

    Science.gov (United States)

    Murshid, Nadine Shaanta

    2016-04-13

    A high percentage of men and women are purported to justify intimate partner violence (IPV) in countries that are steeped in patriarchy even in the presence of programs such as microfinance that aim to address gender equity. This article examines two assertions that emerge from the literature on microfinance and its potential for positive outcomes for women who participate in it: (a) Microfinance participation is associated with reduced justification of IPV, and (b) microfinance participants with control over their own resources are less likely to justify IPV when compared with microfinance participants who do not have control over their resources. Couples data from a nationally representative survey, the Bangladesh Demographic and Health Survey, were used in the present study. Propensity score matching and logistic regression analyses were conducted to reveal that (a) microfinance participation was not associated with justification of IPV and that (b) women who participated in microfinance were less likely to justify IPV when they had no control over their resources. Implications for practitioners and policymakers are discussed. © The Author(s) 2016.

  5. Synthesis of LaNi0,6Fe0.4O3-δ

    International Nuclear Information System (INIS)

    Ramos, K.; Wendler, L.P.; Chinelatto, A.S.; Chinelatto, A.L.

    2012-01-01

    The solid oxide fuel cell are an alternative of production clean and efficient energy, because converts chemical energy in electrical energy. An fuel cell is formed basically by an electrolyte, a cathode and an anode.The main electrolyte used for SOFC manufacturing is the ZrO 2 -Y 2 O 3 . The materials for electrode manufacturing must possess thermal expansion characteristics close to electrolyte and have high electrical conductivity in operating temperature.Recently, the perovskite LaNi 0,6 Fe 0,4 O 3-δ , has attracted interest for application as cathode in SOFC's. This work aimed to LaNi 0,6 Fe 0,4 O 3-δ obtained by Pechini method. The powders were characterized by x-ray diffraction, ray-x fluorescence, heliumpicnometry and scanning electron microscopy. The results showed powders obtained with perovskite formation when calcined 600°C during 2 hours. (author)

  6. The IPV-GBM scale: a new scale to measure intimate partner violence among gay and bisexual men.

    Science.gov (United States)

    Stephenson, Rob; Finneran, Catherine

    2013-01-01

    The paper describes the creation of a new scale to measure intimate partner violence (IPV) among gay and bisexual men. Seven focus group discussions were held with gay and bisexual men, focusing on defining intimate partner violence: 30 forms of IPV were identified. A venue-recruited sample of 912 gay and bisexual men was surveyed, examining definitional understanding and recent experiences of each of the 30 forms of IPV. Participants were also asked questions from the CDC definition of intimate partner violence and the short-form of the Conflicts Tactics Scale (CTS2S). Factor analysis of responses to the definitional questions was used to create the IPV-GBM scale, and the prevalence of intimate partner violence was compared with that identified by the CDC and CTS2S measures of intimate partner violence. A 23-item scale, with 5 unique domains, was created, with strong internal reliability (Cronbach Alpha >.90). The IPV-GBM scale mirrored both the CDC and CTS2S definitions of intimate partner violence, but contained additional domains such as controlling violence, monitoring behaviors, emotional violence, and HIV-related violence. The new scale identified a significantly higher prevalence of IPV than either of the more commonly used measures. The results presented here provide encouraging evidence for a new, more accurate measure of intimate partner violence among gay and bisexual men in the U.S.

  7. The IPV-GBM scale: a new scale to measure intimate partner violence among gay and bisexual men.

    Directory of Open Access Journals (Sweden)

    Rob Stephenson

    Full Text Available The paper describes the creation of a new scale to measure intimate partner violence (IPV among gay and bisexual men.Seven focus group discussions were held with gay and bisexual men, focusing on defining intimate partner violence: 30 forms of IPV were identified. A venue-recruited sample of 912 gay and bisexual men was surveyed, examining definitional understanding and recent experiences of each of the 30 forms of IPV. Participants were also asked questions from the CDC definition of intimate partner violence and the short-form of the Conflicts Tactics Scale (CTS2S. Factor analysis of responses to the definitional questions was used to create the IPV-GBM scale, and the prevalence of intimate partner violence was compared with that identified by the CDC and CTS2S measures of intimate partner violence.A 23-item scale, with 5 unique domains, was created, with strong internal reliability (Cronbach Alpha >.90. The IPV-GBM scale mirrored both the CDC and CTS2S definitions of intimate partner violence, but contained additional domains such as controlling violence, monitoring behaviors, emotional violence, and HIV-related violence. The new scale identified a significantly higher prevalence of IPV than either of the more commonly used measures.The results presented here provide encouraging evidence for a new, more accurate measure of intimate partner violence among gay and bisexual men in the U.S.

  8. Migración de redes de voz IPv4 a IPv6

    Directory of Open Access Journals (Sweden)

    Octavio Salcedo

    2012-03-01

    Full Text Available This article discusses the current state of voice networks and IP networks running on version 6, and the different architectures that can be implemented. The results analyze the benefits of voice over IP networks with version 6 over version 4 and its influence on the quality of service, from measuring and evaluating outstanding parametersdelay, jitter and packet loss.

  9. Alternative Electrochemical Salt Waste Forms, Summary of FY11-FY12 Results

    Energy Technology Data Exchange (ETDEWEB)

    Riley, Brian J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mccloy, John S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crum, Jarrod V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lepry, William C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rodriguez, Carmen P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Windisch, Charles F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Matyas, Josef [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Westman, Matthew P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rieck, Bennett T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lang, Jesse B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Olszta, Matthew J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Pierce, David A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-01-17

    The Fuel Cycle Research and Development Program, sponsored by the U.S. Department of Energy Office of Nuclear Energy, is currently investigating alternative waste forms for wastes generated from nuclear fuel processing. One such waste results from an electrochemical separations process, called the “Echem” process. The Echem process utilizes a molten KCl-LiCl salt to dissolve the fuel. This process results in a spent salt containing alkali, alkaline earth, lanthanide halides and small quantities of actinide halides, where the primary halide is chloride with a minor iodide fraction. Pacific Northwest National Laboratory (PNNL) is concurrently investigating two candidate waste forms for the Echem spent-salt: high-halide minerals (i.e., sodalite and cancrinite) and tellurite (TeO2)-based glasses. Both of these candidates showed promise in fiscal year (FY) 2009 and FY2010 with a simplified nonradioactive simulant of the Echem waste. Further testing was performed on these waste forms in FY2011 and FY2012 to assess the possibility of their use in a sustainable fuel cycle. This report summarizes the combined results from FY2011 and FY2012 efforts.

  10. How do primary health care teams learn to integrate intimate partner violence (IPV) management? A realist evaluation protocol.

    Science.gov (United States)

    Goicolea, Isabel; Vives-Cases, Carmen; San Sebastian, Miguel; Marchal, Bruno; Kegels, Guy; Hurtig, Anna-Karin

    2013-03-23

    Despite the existence of ample literature dealing, on the one hand, with the integration of innovations within health systems and team learning, and, on the other hand, with different aspects of the detection and management of intimate partner violence (IPV) within healthcare facilities, research that explores how health innovations that go beyond biomedical issues-such as IPV management-get integrated into health systems, and that focuses on healthcare teams' learning processes is, to the best of our knowledge, very scarce if not absent. This realist evaluation protocol aims to ascertain: why, how, and under what circumstances primary healthcare teams engage (if at all) in a learning process to integrate IPV management in their practices; and why, how, and under what circumstances team learning processes lead to the development of organizational culture and values regarding IPV management, and the delivery of IPV management services. This study will be conducted in Spain using a multiple-case study design. Data will be collected from selected cases (primary healthcare teams) through different methods: individual and group interviews, routinely collected statistical data, documentary review, and observation. Cases will be purposively selected in order to enable testing the initial middle-range theory (MRT). After in-depth exploration of a limited number of cases, additional cases will be chosen for their ability to contribute to refining the emerging MRT to explain how primary healthcare learn to integrate intimate partner violence management. Evaluations of health sector responses to IPV are scarce, and even fewer focus on why, how, and when the healthcare services integrate IPV management. There is a consensus that healthcare professionals and healthcare teams play a key role in this integration, and that training is important in order to realize changes. However, little is known about team learning of IPV management, both in terms of how to trigger such learning

  11. A DTAP–IPV//PRP~T VACCINE: A REVIEW OF 16 YEARS’ CLINICAL EXPERIENCE

    Directory of Open Access Journals (Sweden)

    Stanley A. Plotkin

    2012-01-01

    Full Text Available Owing to their low reactogenicity, confirmed efficacy and availability in combination vaccines, acellular pertussis (aP-inactivated poliovirus (IPV combined vaccines are now included in various national immunization programs worldwide. We provide an overview of 16 years of clinical experience with a diphtheria (D, tetanus (T, aP, IPV and Haemophilus influenzae type b (Hib polysaccharide conjugated to tetanus protein (PRP~T combined vaccine (DTaP–IPV//PRP~T — Pentaxim, Sanofi Pasteur, France. Good immunogenicity has been demonstrated after primary vaccination with Pentaxim, regardless of the population ethnicity and primary vaccination schedule. A booster vaccination in the second year of life also resulted in a high immune response for each antigen. Furthermore, 10 years of national surveillance in Sweden has demonstrated the effectiveness of Pentaxim in controlling pertussis. As is the case for other aP-containing combined vaccines, Pentaxim is well tolerated, with the safety profile being better than for whole-cell pertussiscontaining combination vaccines for primary and booster vaccinations.

  12. The impact of perceived childhood victimization and patriarchal gender ideology on intimate partner violence (IPV) victimization among Korean immigrant women in the USA.

    Science.gov (United States)

    Kim, Chunrye

    2017-08-01

    Childhood victimization experiences are common among intimate partner violence (IPV) victims. This study examines the link between childhood physical and sexual victimization experiences and adulthood IPV among Korean immigrant women in the USA. As Korean immigrants often use physical punishment to discipline their children, and reporting sexual abuse is discouraged due to stigmatization in this community, cultural factors (e.g. patriarchal values) related to childhood victimization and IPV were also examined. Survey data from Korean immigrant women in the USA were collected. Using a case-control design, we compared 64 Korean immigrant women who have experienced IPV in the past year with 63 Korean immigrant women who have never experienced IPV in their lifetime. The findings of this study reveal that IPV victims, compared with non-victims, experienced higher childhood victimization rates. Logistic regression analysis demonstrated that childhood victimization and patriarchal gender ideology strongly predict IPV victimization among Korean immigrants. However, patriarchal values did not moderate the relationship between childhood victimization and IPV. To prevent IPV among Korean immigrant population, we need to make special efforts to prevent childhood abuse and change ingrained cultural attitudes about child physical and sexual abuse among immigrant communities through culturally sensitive programs. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Fabrication of magnetic Fe@ZnO_0_._6S_0_._4 nanocomposite for visible-light-driven photocatalytic inactivation of Escherichia coli

    International Nuclear Information System (INIS)

    Peng, Ziling; Wu, Dan; Wang, Wei; Tan, Fatang; Ng, Tsz Wai; Chen, Jianguo; Qiao, Xueliang; Wong, Po Keung

    2017-01-01

    Highlights: • Fe@ZnO_0_._6S_0_._4 was prepared by a facile two-step precipitation method. • Fe@ZnO_0_._6S_0_._4 exhibited high photocatalytic activity under LED lamp irradiation. • Fe@ZnO_0_._6S_0_._4 possessed good stability and reusability for bacterial inactivation. • Fe@ZnO_0_._6S_0_._4 could be easily collected from the reaction solution by a magnet. • The release rate of metal ions from nanocomposite was kept at a very low level. - Abstract: Bacterial inactivation by magnetic photocatalysts has now received growing interests due to the easy separation for recycle and reuse of photocatalysts. In this study, magnetic Fe@ZnO_0_._6S_0_._4 photocatalyst was prepared by a facile two-step precipitation method. Multiple techniques such as X-ray diffraction (XRD), transmission electron microscope (TEM), scanning electron microscope (SEM), X-ray photoelectron spectroscopy (XPS), UV–vis diffused reflectance spectra (UV-vis DRS) and vibrating sample magnetometer (VSM) were employed to characterize the structure, morphology and physicochemical properties of the photocatalyst. The as-obtained Fe@ZnO_0_._6S_0_._4 possessing magnetic property was easily collected from the reaction system by a magnet. Under white light-emitting-diode (LED) lamp irradiation, Fe@ZnO_0_._6S_0_._4 nanocomposite could completely inactivate 7-log of Escherichia coli K-12 within 5 h. More importantly, almost no decrease of photocatalytic efficiency in bacterial inactivation was observed even after five consecutive cycles, demonstrating Fe@ZnO_0_._6S_0_._4 exhibited good stability for reuse. The low released rate of Fe"2"+/Fe"3"+ and Zn"2"+ from Fe@ZnO_0_._6S_0_._4 composite further indicated the photocatalyst showed low cytotoxicity to bacterium and high stability under LED lamp irradiation. Facile preparation, high photocatalytic efficiency, good stability and reusability, and magnetic recovery property endow Fe@ZnO_0_._6S_0_._4 nanocomposite to be a promising photocatalytic material

  14. Influence of Ti addition and sintering method on microstructure and mechanical behavior of a medium-entropy Al0.6CoNiFe alloy

    International Nuclear Information System (INIS)

    Fu, Zhiqiang; Chen, Weiping; Chen, Zhen; Wen, Haiming; Lavernia, Enrique J.

    2014-01-01

    The influence of Ti addition and sintering method on the microstructure and mechanical behavior of a medium-entropy alloy, Al 0.6 CoNiFe alloy, was studied in detail. Alloying behavior, microstructure, phase evolution and mechanical properties of Al 0.6 CoNiFe and Ti 0.4 Al 0.6 CoNiFe alloys were investigated by X-ray diffraction (XRD), scanning electron microscopy (SEM) and transmission electron microscopy (TEM), as well as by mechanical testing. During the mechanical alloying (MA) process, a supersaturated solid solution consisting of both BCC and FCC phases was formed in the Al 0.6 CoNiFe alloy. With Ti addition, the Ti 0.4 Al 0.6 CoNiFe alloy exhibited a supersaturated solid solution with a single FCC phase. Following hot pressing (HP), the HP sintered (HP’ed) Al 0.6 CoNiFe bulk alloy was composed of a major BCC phase and a minor FCC phase. The HP’ed Ti 0.4 Al 0.6 CoNiFe alloy exhibited a FCC phase, two BCC phases and a trace unidentified phase. Nanoscale twins were present in the HP’ed Ti 0.4 Al 0.6 CoNiFe alloy, where deformation twins were observed in the FCC phase. Our results suggest that the addition of Ti facilitated the formation of nanoscale twins. The compressive strength and Vickers hardness of HP’ed Ti 0.4 Al 0.6 CoNiFe alloy were slightly lower than the corresponding values of the HP’ed Al 0.6 CoNiFe alloy. In contrast with HP’ed Al 0.6 CoNiFe alloy, spark plasma sintered (SPS’ed) Al 0.6 CoNiFe alloy exhibited a major FCC phase and a minor BCC phase. Moreover, the SPS’ed Al 0.6 CoNiFe alloy exhibited a lower compressive strength and Vickers hardness, but singificantly higher plasticity, as compared to those of the HP’ed counterpart material

  15. Feasibility of a Fieldable Mass Spectrometer FY 2015 Year-end Report

    Energy Technology Data Exchange (ETDEWEB)

    Barinaga, Charles J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hager, George J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hoegg, Edward D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Carman, April J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hart, Garret L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-10-01

    Currently, the International Atomic Energy Agency (IAEA) monitors the production of enriched uranium hexafluoride (UF6) at declared facilities by collecting a few grams of product in sample tubes that are then sent to central laboratories for processing and isotope ratio analysis by thermal ionization mass spectrometry. Analysis of results may not be available for some time after collection. In addition, new shipping regulations will make it more difficult to transport this amount of UF6 to a laboratory. The IAEA is interested in an isotope ratio technique for uranium in UF6 that can be moved to and operated at the enrichment facility itself. This report covers the tasks and activities of the Feasibility of a Fieldable Mass Spectrometer Project for FY 2015, which investigates the feasibility of an in-field isotope ratio technique— the forward deployment of a technique to the non-laboratory situation of a protected room with power and heat at the facility of interest. A variety of nontraditional elemental ionization techniques were considered. It was determined that only two of these should be moved forward for testing with the candidate in-field mass spectrometer and with the adsorbed UF6 sample types.

  16. 17 CFR 210.6-06 - Special provisions applicable to the balance sheets of issuers of face-amount certificates.

    Science.gov (United States)

    2010-04-01

    ... to the balance sheets of issuers of face-amount certificates. 210.6-06 Section 210.6-06 Commodity and... balance sheets of issuers of face-amount certificates. Balance sheets filed by issuers of face-amount... forth separately, in the balance sheet or in a note thereto, for accounts receivable and notes...

  17. High figure of merit and thermoelectric properties of Bi-doped Mg2Si0.4Sn0.6 solid solutions

    International Nuclear Information System (INIS)

    Liu, Wei; Zhang, Qiang; Yin, Kang; Chi, Hang; Zhou, Xiaoyuan; Tang, Xinfeng; Uher, Ctirad

    2013-01-01

    The study of Mg 2 Si 1−x Sn x -based thermoelectric materials has received widespread attention due to a potentially high thermoelectric performance, abundant raw materials, relatively low cost of modules, and non-toxic character of compounds. In this research, Mg 2.16 (Si 0.4 Sn 0.6 ) 1−y Bi y solid solutions with the nominal Bi content of 0≤y≤0.03 are prepared using a two-step solid state reaction followed by spark plasma sintering consolidation. Within this range of Bi concentrations, no evidence of second phase segregation was found. Bi is confirmed to occupy the Si/Sn sites in the crystal lattice and behaves as an efficient n-type dopant in Mg 2 Si 0.4 Sn 0.6 . Similar to the effect of Sb, Bi doping greatly increases the electron density and the power factor, and reduces the lattice thermal conductivity of Mg 2.16 Si 0.4 Sn 0.6 solid solutions. Overall, the thermoelectric figure of merit of Bi-doped Mg 2.16 Si 0.4 Sn 0.6 solid solutions is improved by about 10% in comparison to values obtained with Sb-doped materials of comparable dopant content. This improvement comes chiefly from a marginally higher Seebeck coefficient of Bi-doped solid solutions. The highest ZT∼1.4 is achieved for the y=0.03 composition at 800 K. - Graphical abstract: (a)The relationship between electrical conductivity and power factor for Sb/Bi-doped Mg 2.16 (Si 0.4 Sn 0.6 ) 1−y (Sb/Bi) y (0 2.16 (Si 0.4 Sn 0.6 ) 1−y Bi y (0≤y≤0.03) solid solutions. (c)Temperature dependent dimensionless figure of merit ZT of Mg 2.16 (Si 0.4 Sn 0.6 ) 1−y Bi y (0≤y≤0.03) solid solutions. - Highlights: • Bi doped Mg 2.16 Si 0.4 Sn 0.6 showed 15% enhancement in the power factor as compared to Sb doped samples. • Bi doping reduced κ ph of Mg 2.16 Si 0.4 Sn 0.6 due to stronger point defect scattering. • The highest ZT=1.4 at 800 K was achieved for Mg 2.16 (Si 0.4 Sn 0.6 ) 0.97 Bi 0.03

  18. Epitaxial growth of matched metallic ErP0.6As0.4 layers on GaAs

    International Nuclear Information System (INIS)

    Guivarc'h, A.; Le Corre, A.; Gaulet, J.; Guenais, B.; Minier, M.; Ropars, G.; Badoz, P.A.; Duboz, J.Y.

    1990-01-01

    Successful growth of (001)ErP 0.6 As 0.4 single crystal film on (001) GaAs has been demonstrated. The epitaxial metallic layers reproducibly showed lattice mismatch below 5 10 -4 . This is, to the authors' knowledge, the first report of a stable, epitaxial and lattice-matched metal/compound semiconductor heterostructure. The ErP 0.6 As 0.4 /n-GaAs diodes yielded excellent I-V characteristics with an ideality factor of 1.1 and barrier height of 0.88 eV. For a 240 Angstrom- thick film, metallic behavior was observed with resistivities of 25 and 86 μΩcm at 1.5 K and room temperature, respectively. As the other Er compounds ErP, ErAs, ErSb and ErSi 2 , ErP 0.6 As 0.4 presents an abrupt drop in resistivity in the vicinity of the liquid helium temperature, due to a paramagnetic to antiferromagnetic phase transition

  19. An Examination of the Design, Development, and Implementation of an Internet Protocol Version 6 Network: The ADTRAN Inc. Case Study

    Science.gov (United States)

    Perigo, Levi

    2013-01-01

    In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol…

  20. Conceptual design study of fusion experimental reactor (FY86 FER)

    International Nuclear Information System (INIS)

    Saito, Ryusei; Kashihara, Shin-ichiro; Itoh, Shin-ichi

    1987-08-01

    This report describes the results of conceptual design study on plant systems for the Fusion Experimental Reactor (FY86 FER). Design studies for FER plant systems have been continued from FY85, especially for design modifications made in accordance with revisions of plasma scaling parameters and system improvements. This report describes 1) system construction, 2) site and reactor building plan, 3) repaire and maintenance system, 4) tritium circulation system, 5) heating, ventilation and air conditioning system, 6) tritium clean-up system, 7) cooling and baking system, 8) waste treatment and storage system, 9) control system, 10) electric power system, 11) site factory plan, all of which are a part of FY86 design work. The plant systems described in this report generally have been based on the FY86 FER (ACS Reactor) which is an one of the six candidates for FER. (author)

  1. Nevada Test Site-Directed Research and Development: FY 2006 Report

    International Nuclear Information System (INIS)

    Wil Lewis, editor

    2007-01-01

    The Nevada Test Site Directed Research and Development (SDRD) program completed its fifth successful year of research and development activities in FY 2006. Forty new projects were selected for funding this year, and ten FY 2005 projects were brought to conclusion. The total funds expended by the SDRD program were $6 million, for an average per-project cost of $120 thousand. Beginning in May, 2006 programmatic burden rates were applied to SDRD project costs. An external audit conducted in September 2006 verified that appropriate accounting practices were applied to the SDRD program. Highlights for the year included: the filing of 27 invention disclosures for intellectual property generated by FY 2006 projects; programmatic adoption of four FY 2005 SDRD-developed technologies; participation in the tri-Lab Laboratory Directed Research and Development (LDRD) and SDRD program review that was broadly attended by NTS, NNSA, LDRD, and U.S. Department of Homeland Security representatives; peer reviews of all FY 2006 projects; and the successful completion of 50 R and D projects, as presented in this report

  2. Nevada Test Site-Directed Research and Development: FY 2006 Report

    Energy Technology Data Exchange (ETDEWEB)

    Wil Lewis, editor

    2007-08-01

    The Nevada Test Site–Directed Research and Development (SDRD) program completed its fifth successful year of research and development activities in FY 2006. Forty new projects were selected for funding this year, and ten FY 2005 projects were brought to conclusion. The total funds expended by the SDRD program were $6 million, for an average per-project cost of $120 thousand. Beginning in May, 2006 programmatic burden rates were applied to SDRD project costs. An external audit conducted in September 2006 verified that appropriate accounting practices were applied to the SDRD program. Highlights for the year included: the filing of 27 invention disclosures for intellectual property generated by FY 2006 projects; programmatic adoption of four FY 2005 SDRD-developed technologies; participation in the tri-Lab Laboratory Directed Research and Development (LDRD) and SDRD program review that was broadly attended by NTS, NNSA, LDRD, and U.S. Department of Homeland Security representatives; peer reviews of all FY 2006 projects; and the successful completion of 50 R&D projects, as presented in this report.

  3. Intimate partner violence and its association with maternal depressive symptoms 6–8 months after childbirth in rural Bangladesh

    Directory of Open Access Journals (Sweden)

    Zarina N. Kabir

    2014-09-01

    Full Text Available Background: The prevalence of intimate partner violence (IPV, a gross violation of human rights, ranges widely across the world with higher prevalence reported in low- and middle-income countries. Evidence related mainly to physical health shows that IPV has both direct and indirect impacts on women's health. Little is known about the impact of IPV on the mental health of women, particularly after childbirth. Objective: To describe the prevalence of IPV experienced by women 6–8 months after childbirth in rural Bangladesh and the factors associated with physical IPV. The study also aims to investigate the association between IPV and maternal depressive symptoms after childbirth. Design: The study used cross-sectional data at 6–8 months postpartum. The sample included 660 mothers of newborn children. IPV was assessed by physical, emotional, and sexual violence. The Edinburgh Postnatal Depression Scale assessed maternal depressive symptoms. Results: Prevalence of physical IPV was 52%, sexual 65%, and emotional 84%. The husband's education (OR: 0.41, CI: 0.23–0.73, a poor relationship with the husband (OR: 2.64, CI: 1.07–6.54, and emotional violence by spouse (OR: 1.58, CI: 1.35–1.83 were significantly associated with physical IPV experienced by women. The perception of a fussy and difficult child (OR: 1.05, CI: 1.02–1.08, a poor relationship with the husband (OR: 4.95, CI: 2.55–9.62, and the experience of physical IPV (OR: 2.83, CI: 1.72–4.64 were found to be significant predictors of maternal depressive symptoms among women 6–8 months after childbirth. Neither forced sex nor emotional violence by an intimate partner was found to be significantly associated with maternal depressive symptoms 6–8 months postpartum. Conclusions: It is important to screen for both IPV and depressive symptoms during pregnancy and postpartum. Since IPV and spousal relationships are the most important predictors of maternal depressive symptoms in this

  4. Accounting for Intimate Partner Violence: A Biographical Analysis of Narrative Strategies Used by Men Experiencing IPV From Their Female Partners.

    Science.gov (United States)

    Corbally, Melissa

    2015-10-01

    Intimate partner violence (IPV) is a serious social issue which affects the medium- and long-term health outcomes of many individuals worldwide. The cost of IPV on the physical and psychological well-being of individuals, in addition to its wider economic costs in responding to abused persons, is significant. Presently, there is a lack of understanding about the nature of female-initiated IPV and how men account for their experiences of it. This study examined male victims' life stories of their IPV experiences from their intimate partners. Using the biographical narrative interpretive method, three cases were analyzed from a social constructionist perspective to examine what narrative strategies men used to account for their experiences of being abused by their female partners. Three dominant narrative strategies were used by respondents: the fatherhood narrative, the good husband narrative, and the abuse narrative. The abuse narrative had a unique narrative form, which reflected respondents' disassociation between their identities as men and also as abused persons. Dominant conflicting discourses of masculinity and intimate partner abuse disadvantaged men in identifying IPV and secondly in responding appropriately. This study found that men prefer to use dominant discursive identities as legitimate means from which to disclose IPV experiences. The findings from this study illustrate that broad questioning by professionals regarding fatherhood may be most helpful in promoting disclosures of IPV if this is suspected. © The Author(s) 2014.

  5. Projected Benefits of Federal Energy Efficiency and Renewable Energy Programs: FY 2005 Budget Request

    Energy Technology Data Exchange (ETDEWEB)

    National Renewable Energy Laboratory

    2004-05-01

    The Office of Energy Efficiency and Renewable Energy (EERE) of the U.S. Department of Energy (DOE) leads the Federal Government's efforts to provide reliable, affordable, and environmentally sound energy for America, through its 11 research, development, demonstration, and deployment (RDD&D) programs. EERE invests in high-risk, high-value research and development (R&D) that, conducted in partnership with the private sector and other government agencies, accelerates the development and facilitates the deployment of advanced clean energy technologies and practices. This document summarizes the results of the benefits analysis of EERE's programs, as described in the FY 2005 Budget Request. EERE has adopted a benefits framework developed by the National Research Council (NRC) to represent the various types of benefits resulting from the energy efficiency technology improvements and renewable energy technology development prompted by EERE programs. EERE's benefits analysis focuses on three main categories of energy-linked benefits-economic, environmental, and security. These metrics are not a complete representation of the benefits or market roles of efficiency and renewable technologies, but provide an indication of the range of benefits provided. EERE has taken steps to more fully represent the NRC framework, including two key improvements to the FY 2005 analysis-adding an electricity security metric and extending the analysis through the year 2050.

  6. The LiyNi0.2Mn0.2Co0.6O2 electrode materials: A structural and magnetic study

    International Nuclear Information System (INIS)

    Labrini, Mohamed; Saadoune, Ismael; Almaggoussi, Abdelmajid; Elhaskouri, Jamal; Amoros, Pedro

    2012-01-01

    Graphical abstract: EPR signal of the Li 0.6 Co 0.6 Ni 0.2 Mn 0.2 O 2 composition showing that Mn 4+ ions are the solely paramagnetic ions in the structure. Highlights: ► LiCo 0.6 Ni 0.2 Mn 0.2 O 2 was prepared by the combustion method with sucrose as a fuel. ► Chemical delithiaition was performed by using NO 2 BF 4 oxidizing agent. ► The rhombohedral symmetry was preserved upon lithium removal. ► Lithium extraction leads to Ni 2+ oxidation to Ni 4+ followed by Co 3+ oxidation. ► The EPR narrow signal of Li 0.6 Co 0.6 Ni 0.2 Mn 0.2 O 2 is due to the only active Mn 4+ ions. -- Abstract: Layered LiNi 0.2 Mn 0.2 Co 0.6 O 2 phase, belonging to a solid solution between LiNi 1/2 Mn 1/2 O 2 and LiCoO 2 most commercialized cathodes, was prepared via the combustion method at 900 °C for a short time (1 h). Structural and magnetic properties of this material during chemical extraction were investigated. The powders adopted the α-NaFeO 2 structure with almost none of the well-known Li/Ni cation disorder. The analysis of the magnetic properties in the paramagnetic domain agrees with the combination of Ni 2+ (S = 1), Co 3+ (S = 0) and Mn 4+ (S = 3/2) spin-only values. X-ray analysis of the chemically delithiated Li y Ni 0.2 Mn 0.2 Co 0.6 O 2 reveals no structural transition. The process of lithium extraction from and insertion into LiNi 0.2 Mn 0.2 Co 0.6 O 2 was discussed on the basis of ex situ EPR experiments and magnetic susceptibility. Oxidation of Ni 2+ (S = 1) to Ni 3+ (S = 1/2) and to Ni 4+ (S = 0) was observed upon lithium removal.

  7. Psychological distress after the Great East Japan Earthquake and Fukushima Daiichi Nuclear Power Plant accident: results of a mental health and lifestyle survey through the Fukushima Health Management Survey in FY2011 and FY2012.

    Science.gov (United States)

    Yabe, Hirooki; Suzuki, Yuriko; Mashiko, Hirobumi; Nakayama, Yoko; Hisata, Mitsuru; Niwa, Shin-Ichi; Yasumura, Seiji; Yamashita, Shunichi; Kamiya, Kenji; Abe, Masafumi

    2014-01-01

    On 11 March 2011, the Great East Japan Earthquake followed by a gigantic tsunami hit the Pacific coast of Northeast Japan (Tohoku) and damaged Tokyo Electric Power Company's Fukushima Daiichi Nuclear Power Plant, causing a radiation hazard in the entire Fukushima Prefecture. The radiation dose exposed either externally and internally in Fukushima residents have been evaluated to be low so far and it is hardly believed that they may have any direct radiation risk on physical condition. The purpose of this report is, therefore, to describe results of a mental health and lifestyle survey intended to facilitate adequate care for residents who are at a higher risk of developing mental health problems after the complicated accident. The target population of this survey is the residents of evacuation zones including Hirono Town, Naraha Town, Tomioka Town, Kawauchi Village, Okuma Town, Futaba Town, Namie Town, Katsurao Village, Minamisoma City, Tamura City, Yamakiya district of Kawamata Town, and Iitate Village. The targeted population was 210,189 in fiscal year 2011 (FY2011) and 211,615 in fiscal year 2012 (FY2012). Questionnaires have been mailed since January 2012, and subsequently, January 2013, 10 and 22 months after the disaster. Among of them, children 63.4%, adults 40.7% for FY2011, and children 41.0%, adults 29.7% for FY2012 responded to the questionnaires mailed. Sociodemographic data showed that many evacuee households were separated after the disaster and had to move several times. K6 was used in this survey to estimate general mental health. The proportion (14.6% in FY2011 and 11.9% inFY2012) of adults who scored above the K6 cut-off (≥13) for general mental health was higher than usual, indicating severe mental health problems among evacuees. The proportion (21.6% in FY2011 and 18.3% inFY2012) of adults who scored above the cut-off (≥44) of PTSD checklist (PCL), reflecting traumatic symptoms, was almost equal to that of the workers after the 9.11 World

  8. A fully liquid DTaP-IPV-HB-PRP-T hexavalent vaccine for primary and booster vaccination of healthy Turkish infants and toddlers

    Science.gov (United States)

    Ceyhan, Mehmet; Yıldırım, İnci; Tezer, Hasan; Devrim, İlker; Feroldi, Emmanuel

    2017-08-23

    Background/aim: Immunogenicity and safety of a primary series of a fully liquid, hexavalent DTaP-IPV-HB-PRP-T vaccine given at 2, 3, and 4 months of age compared to licensed comparators and a DTaP-IPV-HB-PRP-T booster at 15?18 months were evaluated. Materials and methods: This was a Phase III, randomized, open-label trial. Primary series (no hepatitis B [HB] at birth) of DTaP-IPV-HB-PRP-T (N = 155) (group 1) or licensed control vaccines (DTaP-IPV//PRP-T and standalone HB: N = 155) (group 2) and DTaP-IPV-HB-PRP-T booster were administered. Noninferiority was evaluated 1 month postprimary series for anti-HB seroprotection (SP). All other analyses were descriptive. Safety was assessed from parental reports. Results: Postprimary series noninferiority of anti-HB ≥ 10 mIU/mL was demonstrated for the DTaP-IPV-HB-PRP-T vaccine (94.0%) compared to the licensed control (96.1%). Postprimary series primary SP and seroconversion (SC) rates were high and similar for both groups. Antibody persistence (prebooster) was high for each antigen and similar between groups except for HB, which was lower for DTaP-IPV-HB-PRP-T than for standalone HB. For each antigen except HB, DTaP-IPV-HB-PRP-T booster responses were high and similar in each group. Safety was good for primary and booster series and similar between groups. Conclusion: The DTaP-IPV-HB-PRP-T vaccine is immunogenic and safe when administered in a challenging primary series schedule without HB vaccination at birth.

  9. Conductivity and Structure of Superionic Composite (AgI0.6(NaPO30.4

    Directory of Open Access Journals (Sweden)

    E. Kartini

    2005-01-01

    Full Text Available Superionic conductors are of considerable interest from both application and fundamental points of view. Superionic solid electrolytes can be used for batteries, fuel cells and sensors. We have used melt quenching to make a new superionic composite (AgI0.6(NaPO30.4 which exhibits an ionic conductivity of about 2 x 10-4 S/cm at ambient temperature. The conductivity of crystalline AgI and NaPO3 glass are lower of orders of magnitude. (AgI0.6(NaPO30.4 is a composite material containing both crystalline and glass phases. The paper presents the conductivity as a function of temperature measured by impedance spectroscopy and the crystal structure performed by a high resolution powder diffractometer, VEGA at the Neutron Science Laboratory (KENS, KEK, Japan.

  10. FY 1994 Annual Work Plan

    Energy Technology Data Exchange (ETDEWEB)

    1993-10-01

    This is the third Office of Inspector General (OIG)Annual Work Plan. Its purpose is to summarize work completed in Fiscal Year (FY) 1993, identify ongoing projects from previous fiscal years which the OIG intends to continue into FY 1994, and announce planned projects which the OIG intends to begin in FY 19994.

  11. IMPLEMENTASI IP V 6 MULTICAST DALAM JARINGAN WIRELESS

    Directory of Open Access Journals (Sweden)

    Dessyanto Boedi Prasetyo

    2015-04-01

    Full Text Available Teleconferencing is a media technology to create a long-distance communication of audio data and video can also be data. With teleconferencing you can perform a communication with another person that much with a relatively low cost. At this time the use of computers in a network more complex. Some time ago has developed a new network protocol, the IPv6 is a solution to overcome the deficiencies found on previous generation protocol is IPv4 Multicast is a communication mechanism of one-to-many, or point-to-multipoint. In IPv6 technology, multicast is a basic feature and has become the standard specification of every router. In the implementation is done using IPv6 multicast teleconferencing application on the LAN network topology. At the teleconference has been observed with the amount of traffic parameters that occurred during the last teleconference. Used in this study SDR and RAT teleconferencing applications. SDR (Session Directory Tool and RAT (Robust Audio Tool used for teleconferencing, which is part of the MBone tools. Protocol MLD (Multicast Listener Directory is also used in this study for multicast signaling can run well.

  12. Microstructure, mechanical property and in vitro biocorrosion behavior of single-phase biodegradable Mg–1.5Zn–0.6Zr alloy

    OpenAIRE

    Tao Li; Yong He; Hailong Zhang; Xitao Wang

    2014-01-01

    The microstructure, mechanical property, and in vitro biocorrosion behavior of as-cast single-phase biodegradable Mg–1.5Zn–0.6Zr alloy were investigated and compared with a commercial as-cast AZ91D alloy. The results show that the Mg–1.5Zn–0.6Zr alloy had a single-phase solid solution structure, with an average grain size of 34.7 ± 13.1 μm. The alloy exhibited ultimate tensile strength of 168 ± 2.0 MPa, yield strength of 83 ± 0.6 MPa, and elongation of 9.1 ± 0.6%. Immersion tests and electroc...

  13. Los Alamos Waste Management FY96 and FY97 Tactical Plan, March 1, 1996

    International Nuclear Information System (INIS)

    1996-01-01

    The Los Alamos National Laboratory (LANL) Waste Management Program (WMP) began a transition to become a open-quotes best of classclose quotes waste management program during fiscal year 1995 (FY95). A best of class waste management program means that LANL will provide cost-effective and compliant management of the minimum amount of waste. In FY94, the WMP could be characterized as a level of effort program requiring several new facilities and new LANL-developed technologies to carry out its waste management responsibilities. By the end of FY95, significant progress had been made in the transition to best of class. The FY96 WMP is realigned and reorganized. Its budget and scope of work are built upon discrete work packages. It is committed to achieving improved cost-effectiveness, providing significant tangible technical results, and to having its performance measured. During FY95, over $11,000,000 in facility and operational costs were avoided. The need for three new major facilities was reexamined and lower cost solutions, not requiring the development of new facilities, were agreed to. Technology development activities were terminated and replaced with the use of commercial facilities to achieve aggressive reductions in the Low-Level Mixed Waste legacy inventory. In addition, over $14,000,000 in improved cost-effectiveness has been included in the FY96 Baseline. An overall WMP vision, specific milestones, performance measures, and commitments are in place for FY96 to ensure that LANL continues the transition to a best of class waste management program. The following table identifies the overall vision and success indicators for FY96

  14. Supply and demand outlook for Japan's economic and energy up to FY2018

    International Nuclear Information System (INIS)

    Aoshima, Momoko; Yorita, Yasuo; Tsunoda, Miyuki

    2017-01-01

    Japan's economy has gradually expanded, with real GDP in the first quarter of 2017 becoming positive growth for five consecutive quarters for the first time since 2005 to 2006. Although the uncertain factors are increasing both in terms of politics and economy, the world economy is also growing moderately. As the main premises in the standard scenario, the following are supposed: (1) world economy grows moderately, with worldwide growth rate reaching 3.0% in FY2017 and 3.3% in FY2018, (2) exchange rate is about ¥115/$ in both FY2017 and FY2018 average, (3) as for nuclear power generation, cumulative restarted unit number reaches 10 basis until the end of FY2018, with average months of operation in FY2018 reaching 9 months, and with power generation amount reaching 65.6 billion kWh (7% of the power supply composition ratio), and (4) as for the supply and demand for power, the supply reserve ratio of 3% necessary for stable electric power supply can be secured nationwide. Thus, the supply and demand outlook for Japan's economic and energy up to FY2018 was made. The following various evaluation analyses were carried out: (1) macro economy, (2) production activities, (3) primary energy domestic supply, (4) final energy consumption, (5) electricity sales volume and power supply composition (electric power companies), (6) city gas sales volume (gas companies), fuel oil and LPG sales volume and crude oil throughput, and (7) in-depth analysis; demand trend of light oil, renewable energy power generation, and effects of restart of nuclear power plants. (A.O.)

  15. Synthesis and crystal structure of Bi6.4Pb0.6P2O15.2

    International Nuclear Information System (INIS)

    Arumugam, N.; Lynch, V.; Steinfink, H.

    2007-01-01

    Bi 6.4 Pb 0.6 P 2 O 15.2 is a polymorph of structures with the general stoichiometry Bi 6+x M 1-x P 2 O 15+y . However, unlike previously published structures that consist of layers formed by edge sharing OBi 4 tetrahedra bridged by PO 4 and TO 6 (T=transition metal) tetrahedra and octahedra the title compound's structure is more complex. It is monoclinic, C2, a=19.4698(4) A, b=11.3692(3) A, c=16.3809(5) A, β=101.167(1) o , Z=10. Single-crystal X-ray diffraction data were refined by least squares on F 2 converging to R 1 =0.0387, wR 2 =0.0836 for 7023 intensities. The crystal twins by mirror reflection across (001) as the twin plane and twin component 1 equals 0.74(1). Oxygen ions are in tetrahedral coordination to four metal ions and the O(BiPb) 4 units share corners to form layers that are part of the three-dimensional framework. Eight oxygen ions form a cube around the two crystallographically independent Pb ions. Pb-O bond lengths vary from 2.265(14) to 2.869(14) A. Pairs of such cubes share an edge to form a Pb 3 O 20 unit. The two oxygen ions from the unshared edges are part of irregular Bi polyhedra. Other oxygen ions of Bi polyhedra are part only of O(BiPb) 4 units, and some oxygen ions of the polyhedra are also part of PO 4 tetrahedra. One, two, three and or four PO 4 moieties are connected to the Bi polyhedra. Bi-O bond lengths ≤3.1 A vary from 2.090(12) to 3.07(3) A. The articulations of Pb cubes, Bi polyhedra and PO 4 tetrahedra link into the three-dimensional structure. - Graphical abstract: View of the structure of Bi 6.4 Pb 0.6 P 2 O 15.2 parallel to the b-axis

  16. NASA Lewis advanced IPV nickel-hydrogen technology

    Science.gov (United States)

    Smithrick, John J.; Britton, Doris L.

    1993-01-01

    Individual pressure vessel (IPV) nickel-hydrogen technology was advanced at NASA Lewis and under Lewis contracts. Some of the advancements are as follows: to use 26 percent potassium hydroxide electrolyte to improve cycle life and performance, to modify the state of the art cell design to eliminate identified failure modes and further improve cycle life, and to develop a lightweight nickel electrode to reduce battery mass, hence reduce launch and/or increase satellite payload. A breakthrough in the LEO cycle life of individual pressure vessel nickel-hydrogen battery cells was reported. The cycle life of boiler plate cells containing 26 percent KOH electrolyte was about 40,000 accelerated LEO cycles at 80 percent DOD compared to 3,500 cycles for cells containing 31 percent KOH. Results of the boiler plate cell tests have been validated at NWSC, Crane, Indiana. Forty-eight ampere-hour flight cells containing 26 and 31 percent KOH have undergone real time LEO cycle life testing at an 80 percent DOD, 10 C. The three cells containing 26 percent KOH failed on the average at cycle 19,500. The three cells containing 31 percent KOH failed on the average at cycle 6,400. Validation testing of NASA Lewis 125 Ah advanced design IPV nickel-hydrogen flight cells is also being conducted at NWSC, Crane, Indiana under a NASA Lewis contract. This consists of characterization, storage, and cycle life testing. There was no capacity degradation after 52 days of storage with the cells in the discharged state, on open circuit, 0 C, and a hydrogen pressure of 14.5 psia. The catalyzed wall wick cells have been cycled for over 22,694 cycles with no cell failures in the continuing test. All three of the non-catalyzed wall wick cells failed (cycles 9,588; 13,900; and 20,575). Cycle life test results of the Fibrex nickel electrode has demonstrated the feasibility of an improved nickel electrode giving a higher specific energy nickel-hydrogen cell. A nickel-hydrogen boiler plate cell using an 80

  17. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    Science.gov (United States)

    2010-08-01

    SUBJECT TERMS Internet Protocol, Computer Networking, Network Security, Computer Security, Technology Deployment 16. SECURITY CLASSIFICATION OF...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and...Science and Technology committee and the Internet Architecture Board. Dr. Sincoskie was Executive Director of the Computer Networking Research

  18. Effects of annealing, acid and alcoholic beverages on Fe1+yTe0.6Se0.4

    International Nuclear Information System (INIS)

    Sun, Y; Taen, T; Tsuchiya, Y; Tamegai, T; Shi, Z X

    2013-01-01

    We have systematically investigated and compared different methods to induce superconductivity in the iron chalcogenide Fe 1+y Te 0.6 Se 0.4 , including annealing in a vacuum, N 2 , O 2 and I 2 atmospheres and immersing samples into acid and alcoholic beverages. Vacuum and N 2 annealing are proved to be ineffective in inducing superconductivity in a Fe 1+y Te 0.6 Se 0.4 single crystal. Annealing in O 2 and I 2 and immersion in acid and alcoholic beverages can induce superconductivity by oxidizing the excess Fe in the sample. Superconductivity in O 2 annealed samples is of a bulk nature, while I 2 , acid and alcoholic beverages can only induce superconductivity near the surface. By comparing the different effects of O 2 , I 2 , acid and alcoholic beverages we propose a scenario to explain how the superconductivity is induced in the non-superconducting as-grown Fe 1+y Te 0.6 Se 0.4 . (paper)

  19. Microstructure, mechanical property and in vitro biocorrosion behavior of single-phase biodegradable Mg–1.5Zn–0.6Zr alloy

    Directory of Open Access Journals (Sweden)

    Tao Li

    2014-06-01

    Full Text Available The microstructure, mechanical property, and in vitro biocorrosion behavior of as-cast single-phase biodegradable Mg–1.5Zn–0.6Zr alloy were investigated and compared with a commercial as-cast AZ91D alloy. The results show that the Mg–1.5Zn–0.6Zr alloy had a single-phase solid solution structure, with an average grain size of 34.7 ± 13.1 μm. The alloy exhibited ultimate tensile strength of 168 ± 2.0 MPa, yield strength of 83 ± 0.6 MPa, and elongation of 9.1 ± 0.6%. Immersion tests and electrochemical measurements reveal that the alloy displayed lower biocorrosion rate and more uniform corrosion mode than AZ91D in Hank's solution. The elimination of intensive galvanic corrosion reactions and the formation of a much more compact and uniform corrosion film mainly account for the better biocorrosion properties of the Mg–1.5Zn–0.6Zr alloy than AZ91D.

  20. Identifying intimate partner violence (IPV) during the postpartum period in a Greek sample.

    Science.gov (United States)

    Vivilaki, Victoria G; Dafermos, Vassilis; Daglas, Maria; Antoniou, Evagelia; Tsopelas, Nicholas D; Theodorakis, Pavlos N; Brown, Judith B; Lionis, Christos

    2010-12-01

    Research has highlighted the wide impact of intimate partner violence (IPV) and the public health role of community health professionals in detection of victimized women. The purpose of this study was to identify postpartum emotional and physical abuse and to validate the Greek version of the Women Abuse Screening Tool (WAST) along with its sensitivity and specificity. Five hundred seventy-nine mothers within 12 weeks postpartum were recruited from the perinatal care registers of the Maternity Departments of two public hospitals in Athens, Greece. Participants were randomly selected by clinic or shift. The WAST and the Partner Violence Screen (PVS) surveys were administered in random order to the mothers from September 2007 to January 2008. The WAST was compared with the PVS as a criterion standard. Agreement between the screening instruments was examined. The psychometric measurements that were performed included: two independent sample t tests, reliability coefficients, explanatory factor analysis using a Varimax rotation, and Principal Components Method. Confirmatory analysis-also called structural equation modeling-of principal components was conducted by Linear Structural Relations. A receiver operating characteristic (ROC) analysis was carried out to evaluate the global functioning of the scale. Two hundred four (35.6%) of the mothers screened were identified as experiencing IPV. Scores on the WAST correlated well with those on the PVS; the internal consistency of the WAST Greek version-tested using Cronbach's alpha coefficient-was found to be 0.926 and that of Guttman's split-half coefficient was 0.924. Our findings confirm the multidimensionality of the WAST, demonstrating a two-factor structure. The area under ROC curve (AUC) was found to be 0.824, and the logistic estimate for the threshold score of 0/1 fitted the model sensitivity at 99.7% and model specificity at 64.4%. Our data confirm the validity of the Greek version of the WAST in identifying IPV

  1. Performance Evaluation of RIPng, EIGRPv6 and OSPFv3 for Real Time Applications

    Directory of Open Access Journals (Sweden)

    Sama Salam Samaan

    2018-01-01

    Full Text Available In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols. Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end delay. After examining the simulation results, a conclusion will be extracted to reveal the findings of which protocol performs the best upon implementation within a IPv6 WAN. OPNET modeler simulator is used to evaluate the accomplishment of these protocols. To get the results, three scenarios are designed, one for each protocol.

  2. FY 1990/FY 1991 Biennial Budget Descriptive Summaries for the Strategic Defense Initiative Organization

    Science.gov (United States)

    1989-01-01

    reduction in cryccooler size. o (U) Develop the first diamond ME_2 with monocrystalline , semiconductor quality thin-film diamcnd. o (U) Develop Atomic Layer...stiffness and dynamic response. A lightweight thermal radiator panel will also be fabricated and tested. Fabrication of tubes and sheets in gauges...FY 91 o Precision Gimbal Test IQ FY 91 C Cx:mlete Deveic..ent of Integrated Structures Model 2Q FY 91 c Light’weight Ccmpcsitas Radiator Panel Demo 2Q

  3. Fabrication of magnetic Fe@ZnO0.6S0.4 nanocomposite for visible-light-driven photocatalytic inactivation of Escherichia coli

    Science.gov (United States)

    Peng, Ziling; Wu, Dan; Wang, Wei; Tan, Fatang; Ng, Tsz Wai; Chen, Jianguo; Qiao, Xueliang; Wong, Po Keung

    2017-02-01

    Bacterial inactivation by magnetic photocatalysts has now received growing interests due to the easy separation for recycle and reuse of photocatalysts. In this study, magnetic Fe@ZnO0.6S0.4 photocatalyst was prepared by a facile two-step precipitation method. Multiple techniques such as X-ray diffraction (XRD), transmission electron microscope (TEM), scanning electron microscope (SEM), X-ray photoelectron spectroscopy (XPS), UV-vis diffused reflectance spectra (UV-vis DRS) and vibrating sample magnetometer (VSM) were employed to characterize the structure, morphology and physicochemical properties of the photocatalyst. The as-obtained Fe@ZnO0.6S0.4 possessing magnetic property was easily collected from the reaction system by a magnet. Under white light-emitting-diode (LED) lamp irradiation, Fe@ZnO0.6S0.4 nanocomposite could completely inactivate 7-log of Escherichia coli K-12 within 5 h. More importantly, almost no decrease of photocatalytic efficiency in bacterial inactivation was observed even after five consecutive cycles, demonstrating Fe@ZnO0.6S0.4 exhibited good stability for reuse. The low released rate of Fe2+/Fe3+ and Zn2+ from Fe@ZnO0.6S0.4 composite further indicated the photocatalyst showed low cytotoxicity to bacterium and high stability under LED lamp irradiation. Facile preparation, high photocatalytic efficiency, good stability and reusability, and magnetic recovery property endow Fe@ZnO0.6S0.4 nanocomposite to be a promising photocatalytic material for bacterial inactivation.

  4. Assessing the PACE of California residential solar deployment: Impacts of Property Assessed Clean Energy programs on residential solar photovoltaic deployment in California, 2010-2015

    Energy Technology Data Exchange (ETDEWEB)

    Deason, Jeff; Murphy, Sean

    2018-04-04

    A new study by Berkeley Lab found that residential Property Assessed Clean Energy (R-PACE) programs increased deployment of residential solar photovoltaic (PV) systems in California, raising it by about 7-12% in cities that adopt these programs. R-PACE is a financing mechanism that uses a voluntary property tax assessment, paid off over time, to facilitate energy improvements and, in some jurisdictions, water and resilience measures. While previous studies demonstrated that early, regional R-PACE programs increased solar PV deployment, this new analysis is the first to demonstrate these impacts from the large, statewide R-PACE programs dominating the California market today, which use private capital to fund the upfront costs of the improvements. Berkeley Lab estimated the impacts using econometric techniques on two samples: -Large cities only, allowing annual demographic and economic data as control variables -All California cities, without these annual data Analysis of both samples controls for several factors other than R-PACE that would be expected to drive solar PV deployment. We infer that on average, cities with R-PACE programs were associated with greater solar PV deployment in our study period (2010-2015). In the large cities sample, solar PV deployment in jurisdictions with R-PACE programs was higher by 1.1 watts per owner-occupied household per month, or 12%. Across all cities, solar PV deployment in jurisdictions with R-PACE programs was higher by 0.6 watts per owner-occupied household per month, or 7%. The large cities results are statistically significant at conventional levels; the all-cities results are not. The estimates imply that the majority of solar PV deployment financed by R-PACE programs would likely not have occurred in their absence. Results suggest that R-PACE programs have increased PV deployment in California even in relatively recent years, as R-PACE programs have grown in market share and as alternate approaches for financing solar PV

  5. Annual Performance Report - FY 2011

    Science.gov (United States)

    This report summarizes OIG activity, performance, results, and challenges, and provides a financial accounting of resources for fiscal year (FY) 2011 compared to our FY 2011 annual performance targets.

  6. Fabrication of magnetic Fe@ZnO{sub 0.6}S{sub 0.4} nanocomposite for visible-light-driven photocatalytic inactivation of Escherichia coli

    Energy Technology Data Exchange (ETDEWEB)

    Peng, Ziling [State Key Laboratory of Material Processing and Die & Mould Technology, Huazhong University of Science and Technology, Wuhan 430074, Hubei (China); Wu, Dan [School of Life Sciences, The Chinese University of Hong Kong, Shatin, NT, Hong Kong Special Administrative Region (China); Wang, Wei, E-mail: weiwang@hust.edu.cn [State Key Laboratory of Material Processing and Die & Mould Technology, Huazhong University of Science and Technology, Wuhan 430074, Hubei (China); Tan, Fatang [State Key Laboratory of Material Processing and Die & Mould Technology, Huazhong University of Science and Technology, Wuhan 430074, Hubei (China); Ng, Tsz Wai [School of Life Sciences, The Chinese University of Hong Kong, Shatin, NT, Hong Kong Special Administrative Region (China); Chen, Jianguo; Qiao, Xueliang [State Key Laboratory of Material Processing and Die & Mould Technology, Huazhong University of Science and Technology, Wuhan 430074, Hubei (China); Wong, Po Keung, E-mail: pkwong@cuhk.edu.hk [School of Life Sciences, The Chinese University of Hong Kong, Shatin, NT, Hong Kong Special Administrative Region (China)

    2017-02-28

    Highlights: • Fe@ZnO{sub 0.6}S{sub 0.4} was prepared by a facile two-step precipitation method. • Fe@ZnO{sub 0.6}S{sub 0.4} exhibited high photocatalytic activity under LED lamp irradiation. • Fe@ZnO{sub 0.6}S{sub 0.4} possessed good stability and reusability for bacterial inactivation. • Fe@ZnO{sub 0.6}S{sub 0.4} could be easily collected from the reaction solution by a magnet. • The release rate of metal ions from nanocomposite was kept at a very low level. - Abstract: Bacterial inactivation by magnetic photocatalysts has now received growing interests due to the easy separation for recycle and reuse of photocatalysts. In this study, magnetic Fe@ZnO{sub 0.6}S{sub 0.4} photocatalyst was prepared by a facile two-step precipitation method. Multiple techniques such as X-ray diffraction (XRD), transmission electron microscope (TEM), scanning electron microscope (SEM), X-ray photoelectron spectroscopy (XPS), UV–vis diffused reflectance spectra (UV-vis DRS) and vibrating sample magnetometer (VSM) were employed to characterize the structure, morphology and physicochemical properties of the photocatalyst. The as-obtained Fe@ZnO{sub 0.6}S{sub 0.4} possessing magnetic property was easily collected from the reaction system by a magnet. Under white light-emitting-diode (LED) lamp irradiation, Fe@ZnO{sub 0.6}S{sub 0.4} nanocomposite could completely inactivate 7-log of Escherichia coli K-12 within 5 h. More importantly, almost no decrease of photocatalytic efficiency in bacterial inactivation was observed even after five consecutive cycles, demonstrating Fe@ZnO{sub 0.6}S{sub 0.4} exhibited good stability for reuse. The low released rate of Fe{sup 2+}/Fe{sup 3+} and Zn{sup 2+} from Fe@ZnO{sub 0.6}S{sub 0.4} composite further indicated the photocatalyst showed low cytotoxicity to bacterium and high stability under LED lamp irradiation. Facile preparation, high photocatalytic efficiency, good stability and reusability, and magnetic recovery property endow Fe@ZnO{sub 0.6

  7. Fabrication of aligned porous LaNi0.6Fe0.4O3 perovskite by water based freeze casting

    Science.gov (United States)

    Soltani, Niloofar; Martínez-Bautista, Rubén; Bahrami, Amin; Huerta Arcos, Lázaro; Cassir, Michel; Chávez Carvayar, José

    2018-05-01

    A novel porous cathode of LaNi0.6Fe0.4O3 perovskite with aligned porosities was engineered for solid oxide fuel cells. LaNi0.6Fe0.4O3 was produced through metal nitrate and acid citric combustion method and calcined at different temperatures. The synthesized LNF at 600 °C shows specific surface area (SBET) of 24.4 m2 g-1 and an average pore size of 12.2 nm. The chemical composition and structure of LaNi0.6Fe0.4O3 synthesized at temperature 600-1400 °C, were analyzed by XRD, XPS and HRTEM. SEM observations of freeze cast nano-sized LNF showed the vertically aligned hexagonal walls. These walls contain a great value of fine pores which accelerate the gas transportation.

  8. Integration of FMIPv6 in HMIPv6 to Improve Hand-over Performance

    Science.gov (United States)

    Patil, Dipali P.; Patil, G. A.

    2010-11-01

    Mobile users move frequently between networks, as they stay connected to the Internet. Thus, as mobility increases across networks, handovers will significantly impact the quality of the connection and user application. Handover performance is very important when evaluating IP mobility protocols. Since handover request are driven by several needs such as cost reduction criteria, network resource optimization and service related requirements. Current works to support seamless mobility in IPv6 network are classified into HMIPv6 and FMIPv6. These two approaches have pros and cons respectively and are being standardized independently in IETF. If one can integrate properly these two approaches, it is expected that the one can get more effective protocols that can provide better handover performance. This paper integrates FHMIPv6 in HMIPv6 (F-HMIPv6) so as to provide effectively fast handover on the hierarchical Mobile IPv6. The simulation performed using Ns-2 extensions to show that a performance of proposed system is better in terms of packet loss and hand-over delay.

  9. Spent fuel sabotage aerosol test program :FY 2005-06 testing and aerosol data summary

    International Nuclear Information System (INIS)

    Gregson, Michael Warren; Brockmann, John E.; Nolte, O.; Loiseau, O.; Koch, W.; Molecke, Martin Alan; Autrusson, Bruno; Pretzsch, Gunter Guido; Billone, M. C.; Lucero, Daniel A.; Burtseva, T.; Brucher, W; Steyskal, Michele D.

    2006-01-01

    This multinational, multi-phase spent fuel sabotage test program is quantifying the aerosol particles produced when the products of a high energy density device (HEDD) interact with and explosively particulate test rodlets that contain pellets of either surrogate materials or actual spent fuel. This program has been underway for several years. This program provides source-term data that are relevant to some sabotage scenarios in relation to spent fuel transport and storage casks, and associated risk assessments. This document focuses on an updated description of the test program and test components for all work and plans made, or revised, primarily during FY 2005 and about the first two-thirds of FY 2006. It also serves as a program status report as of the end of May 2006. We provide details on the significant findings on aerosol results and observations from the recently completed Phase 2 surrogate material tests using cerium oxide ceramic pellets in test rodlets plus non-radioactive fission product dopants. Results include: respirable fractions produced; amounts, nuclide content, and produced particle size distributions and morphology; status on determination of the spent fuel ratio, SFR (the ratio of respirable particles from real spent fuel/respirables from surrogate spent fuel, measured under closely matched test conditions, in a contained test chamber); and, measurements of enhanced volatile fission product species sorption onto respirable particles. We discuss progress and results for the first three, recently performed Phase 3 tests using depleted uranium oxide, DUO 2 , test rodlets. We will also review the status of preparations and the final Phase 4 tests in this program, using short rodlets containing actual spent fuel from U.S. PWR reactors, with both high- and lower-burnup fuel. These data plus testing results and design are tailored to support and guide, follow-on computer modeling of aerosol dispersal hazards and radiological consequence assessments

  10. Studies on structural and magnetic properties of ternary cobalt magnesium zinc (CMZ) Co{sub 0.6-x}Mg{sub x}Zn{sub 0.4} Fe{sub 2}O{sub 4} (x = 0.0, 0.2, 0.4, 0.6) ferrite nanoparticles

    Energy Technology Data Exchange (ETDEWEB)

    Kaur, Manpreet, E-mail: manpreetchem@pau.edu; Jain, Palak; Singh, Mandeep

    2015-07-15

    In this paper we report the variation in structural and magnetic properties of ternary ferrite nanoparticles (NPs) having stoichiometery Co{sub 0.6-x}Mg{sub x}Zn{sub 0.4} Fe{sub 2}O{sub 4} (x = 0.0, 0.2, 0.4, 0.6) and pure spinel ferrites MFe{sub 2}O{sub 4} (M = Mg, Co). NPs with average particle diameter of 25–45 nm were synthesized employing self-propagating oxalyl dihydrazide - metal nitrate combustion method. The products were characterized using X-ray diffraction (XRD), Vibrating sample magnetometer (VSM), Transmission electron microscopy (TEM) and FT-IR spectroscopy. FT-IR spectral analysis revealed two bands centered at 560 and 440 cm{sup −1} for tetrahedral and octahedral metal–oxygen bond stretching. Zinc doping caused red shift in the frequency band of tetrahedral M−O stretching. XRD powder diffraction patterns confirmed the formation of spinel ferrite nanoparticles, expansion of the lattice on zinc doping and enhancement of spinel phase purity in the doped ferrites. Cobalt ferrite displayed lowering of the magnetic parameters on zinc doping which further decreased in ternary ferrites Co{sub 0.6-x}Mg{sub x}Zn{sub 0.4}Fe{sub 2}O{sub 4} on replacing cobalt ions with non-magnetic magnesium ions up to x = 0.4. At x = 0.6 reverse trend was observed and Ms was enhanced. Magnesium zinc ferrite Mg{sub 0.6}Zn{sub 0.4} Fe{sub 2}O{sub 4} with high value of Ms was obtained. Combustion process employed in the present studies serves as a low temperature facile route for the synthesis and structural analysis of ternary doped ferrite nanoparticles. - Highlights: • Ternary doped cobalt magnesium zinc ferrite nanoparticles are synthesized. • FT-IR displayed red shift in tetrahedral stretching band on Zinc doping. • Expansion of lattice and enhancement of spinel phase purity on zinc doping. • The variation in saturation magnetization (Ms) on doping is explained.

  11. Electrical transport properties study of Mo{sub 0.6}W{sub 0.4}Se{sub 2} single crystals

    Energy Technology Data Exchange (ETDEWEB)

    Chaki, Sunil; Deshpande, M. P.; Tailor, J. P.; Chaudhary, M. D.; Sakaria, Pallavi N. [Department of Physics, Sardar Patel University, Vallabh Vidyanagar, Gujarat-388120 (India)

    2012-06-05

    The mixed transition metal dichalcogenide single crystals Mo{sub 0.6}W{sub 0.4}Se{sub 2} were characterized employing EDAX (Energy Dispersive Analysis of X-ray), (XRD) X-ray diffraction, SEM (Scanning Electron Microscope) and UV-Vis-NIR spectroscopy techniques. The electrical transport properties of as-grown Mo{sub 0.6}W{sub 0.4}Se{sub 2} single crystals were studied by two probe d. c. resistivity, Hall Effect and thermoelectric power measurement set-up. The obtained results are discussed in details.

  12. LSTA Allotments (FY 2003-2016)

    Data.gov (United States)

    Institute of Museum and Library Services — Review Library Services and Technology Act (LSTA) allotments by state from FY 2003 to FY 2016. The Grants to States program is the largest source of federal funding...

  13. Oxygen nonstoichiometry and thermo-chemical stability of La0.6Sr0.4CoO3−δ

    International Nuclear Information System (INIS)

    Kuhn, M.; Hashimoto, S.; Sato, K.; Yashiro, K.; Mizusaki, J.

    2013-01-01

    The oxygen nonstoichiometry of La 0.6 Sr 0.4 CoO 3−δ has been the topic of various reports in the literature, but has been exclusively measured at high oxygen partial pressures, pO 2 , and/or elevated temperatures. For applications of La 0.6 Sr 0.4 CoO 3−δ , such as solid oxide fuel cell cathodes or oxygen permeation membranes, knowledge of the oxygen nonstoichiometry and thermo-chemical stability over a wide range of pO 2 is crucial, as localized low pO 2 could trigger failure of the material and device. By employing coulometric titration combined with thermogravimetry, the oxygen nonstoichiometry of La 0.6 Sr 0.4 CoO 3−δ was measured at high and intermediate pO 2 until the material decomposed (at log(pO 2 /bar)≈−4.5 at 1073 K). For a gradually reduced sample, an offset in oxygen content suggests that La 0.6 Sr 0.4 CoO 3−δ forms a “super-reduced” solid solution before decomposing. When the sample underwent alternate reduction–oxidation, a hysteresis-like pO 2 dependence of the oxygen content in the decomposition pO 2 range was attributed to the reversible formation of ABO 3 and A 2 BO 4 phases. Reduction enthalpy and entropy were determined for the single-phase region and confirmed interpolated values from the literature. - Graphical abstract: Oxygen nonstoichiometry (shown as 3−δ) of La 0.6 Sr 0.4 CoO 3−δ as a function of pO 2 at 773–1173 K. The experimental data were obtained by thermogravimetric analysis (TG) and coulometric titration (measured either by a simple reduction (CT1) or a “two-step-forward one-step-back” reduction–oxidation (CT2) procedure). D1 and D2 denote the decomposition pO 2 . The solid lines are the fit to the thermogravimetry and CT1 data. The dashed lines represent the non-equilibrium region where the sample shows a super-reduced state. Highlights: ► Oxygen nonstoichiometry of La 0.6 Sr 0.4 CoO 3−δ at intermediate temperatures and p(O2). ► Experimental confirmation of previously interpolated

  14. Russian Pulsating Mixer Pump Deployment in the Gunite and Associated Tanks at ORNL

    International Nuclear Information System (INIS)

    Hatchell, Brian K.; Lewis, Ben; Johnson, Marshall A.; Randolph, J. G.

    2001-01-01

    In FY 1998, Pulsating Mixer Pump (PMP) technology, consisting of a jet mixer powered by a reciprocating air supply, was selected for deployment in one of the Gunite and Associated Tanks at Oak Ridge National Laboratory (ORNL) to mobilize settled solids. The pulsating mixer pump technology was identified during FY 1996 and FY 1997 technical exchanges between the U.S. Department of Energy (DOE) Tanks Focus Area Retrieval and Closure program, the DOE Environmental Management International Programs, and delegates from Russia as a promising technology that could be implemented in the DOE complex. During FY 1997, the pulsating mixer pump technology, provided by the Russian Integrated Mining Chemical Company, was tested at Pacific Northwest National Laboratory (PNNL) to observe its ability to suspend settled solids. Based on the results of this demonstration, ORNL and DOE staff determined that a modified pulsating mixer pump would meet project needs for remote sludge mobilization of Gunite tank sludge and reduce the cost of operation and maintenance of more expensive mixing systems. The functions and requirements of the system were developed by combining the results and recommendations from the pulsating mixer pump demonstration at PNNL with the requirements identified by staff at ORNL involved with the remediation of the Gunite and Associated Tanks. The PMP is comprised of a pump chamber, check valve, a working gas supply pipe, a discharge manifold, and four jet nozzles. The pump uses two distinct cycles, fill and discharge, to perform its mixing action. During the fill cycle, vacuum is applied to the pump chamber by an eductor, which draws liquid into the pump. When the liquid level inside the chamber reaches a certain level, the chamber is pressurized with compressed air to discharge the liquid through the jet nozzles and back into the tank to mobilize sludge and settled solids.

  15. FY 10 Multifamily Initial Endorsements

    Data.gov (United States)

    Department of Housing and Urban Development — In FY 2010, HUD's Multifamily's 18 Hubs initially endorsed 1011 loans totaling $11.3 billion and providing 170,672 units/ beds. FY 10's $11.3 billion is the highest...

  16. Richland Operations (DOE-RL) Environmental Safety Health (ES and H) FY 2000 and FY 2001 Execution Commitment Summary

    Energy Technology Data Exchange (ETDEWEB)

    REEP, I.E.

    2000-12-01

    All sites in the U.S. Department of Energy (DOE) Complex prepare this report annually for the DOE Office of Environment, Safety and Health (EH). The purpose of this report is to provide a summary of the previous and current year's Environment, Safety and Health (ES&H) execution commitments and the Safety and Health (S&H) resources that support these activities. The fiscal year (FY) 2000 and 2001 information and data contained in the Richland Operations Environment, Safefy and Health Fiscal Year 2002 Budget-Risk Management Summary (RL 2000a) were the basis for preparing this report. Fiscal year 2001 activities are based on the President's Amended Congressional Budget Request of $689.6 million for funding Ofice of Environmental Management (EM) $44.0 million for Fast Flux Test Facility standby less $7.0 million in anticipated DOE, Headquarters holdbacks for Office of Nuclear Energy, Science and Technology (NE); and $55.3 million for Safeguards and Security (SAS). Any funding changes as a result of the Congressional appropriation process will be reflected in the Fiscal Year 2003 ES&H Budget-Risk Management Summary to be issued in May 2001. This report provides the end-of-year status of FY 2000 ES&H execution commitments, including actual S&H expenditures, and describes planned FY 2001 ES&H execution commitments and the S&H resources needed to support those activities. This requirement is included in the ES&H guidance contained in the FY 2002 Field Budget Call (DOE 2000).

  17. Router Dual IPv4/IPv6: una transición hacia las Redes IPv6

    OpenAIRE

    Marco Hernández; César Acevedo; César Berdeja; Keith Peña

    2006-01-01

    Desde su inicio, Internet ha crecido rápidamente transformándose desde una red de investigación a una red comercial con un alcance mundial. Internet se ha convertido en un medio apropiado y económico para la colaboración de usuarios, aprendizaje, comercio electrónico y entretenimiento. Un consenso común indica que Internet se podría transformar en el medio común para la convergencia de la comunicación de voz, video y datos. Al mismo tiempo, está evolucionando desde un servicio sin garantías h...

  18. Oak Ridge National Laboratory DOE Site Sustainability Plan (SSP) with FY 2013 Performance Data

    Energy Technology Data Exchange (ETDEWEB)

    Nichols, Teresa A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Lapsa, Melissa Voss [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2013-12-01

    Oak Ridge National Laboratory (ORNL) is both the largest science and energy laboratory of the US Department of Energy (DOE) and one of the oldest national laboratories still operating at its original site. These characteristics provide the Sustainable Campus Initiative (SCI) both a unique opportunity and a unique challenge to integrate sustainability into facilities and activities. As outlined in this report, SCI is leveraging the outcomes of ORNL’s DOE-sponsored research and development programs to maximize the efficient use of energy and natural resources across ORNL. Wherever possible, ORNL is integrating technical innovations into new and existing facilities, systems, and processes with a widespread approach to achieving Executive Order 13514. ORNL continues to pursue and deploy innovative solutions and initiatives to advance regional, national, and worldwide sustainability and continues to transform its culture and engage employees in supporting sustainability at work, at home, and in the community. Table 1 summarizes ORNL's FY 2013 performance and planned actions to attain future goals. ORNL has achieved numerous successes during FY 2013, which are described in detail throughout this document.

  19. Plutonium stabilization and disposition focus area, FY 1999 and FY 2000 multi-year program plan

    International Nuclear Information System (INIS)

    1998-03-01

    Consistent with the Environmental Management's (EM's) plan titled, ''Accelerating Cleanup: Paths to Closure'', and ongoing efforts within the Executive Branch and Congress, this Multi-Year Program Plan (MYPP) for the Plutonium Focus Area was written to ensure that technical gap projects are effectively managed and measured. The Plutonium Focus Area (PFA) defines and manages technology development programs that contribute to the effective stabilization of nuclear materials and their subsequent safe storage and final disposition. The scope of PFA activities includes the complete spectrum of plutonium materials, special isotopes, and other fissile materials. The PFA enables solutions to site-specific and complex-wide technology issues associated with plutonium remediation, stabilization, and preparation for disposition. The report describes the current technical activities, namely: Plutonium stabilization (9 studies); Highly enriched uranium stabilization (2 studies); Russian collaboration program (2 studies); Packaging and storage technologies (6 studies); and PFA management work package/product line (3 studies). Budget information for FY 1999 and FY 2000 is provided

  20. Plutonium stabilization and disposition focus area, FY 1999 and FY 2000 multi-year program plan

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    Consistent with the Environmental Management`s (EM`s) plan titled, ``Accelerating Cleanup: Paths to Closure``, and ongoing efforts within the Executive Branch and Congress, this Multi-Year Program Plan (MYPP) for the Plutonium Focus Area was written to ensure that technical gap projects are effectively managed and measured. The Plutonium Focus Area (PFA) defines and manages technology development programs that contribute to the effective stabilization of nuclear materials and their subsequent safe storage and final disposition. The scope of PFA activities includes the complete spectrum of plutonium materials, special isotopes, and other fissile materials. The PFA enables solutions to site-specific and complex-wide technology issues associated with plutonium remediation, stabilization, and preparation for disposition. The report describes the current technical activities, namely: Plutonium stabilization (9 studies); Highly enriched uranium stabilization (2 studies); Russian collaboration program (2 studies); Packaging and storage technologies (6 studies); and PFA management work package/product line (3 studies). Budget information for FY 1999 and FY 2000 is provided.

  1. A plan for administrative computing at ANL FY1991 through FY1993

    Energy Technology Data Exchange (ETDEWEB)

    Caruthers, L.E. (ed.); O' Brien, D.E.; Bretscher, M.E.; Hischier, R.C.; Moore, N.J.; Slade, R.G.

    1990-10-01

    In July of 1988, Argonne National Laboratory management approved the restructuring of Computing Services into the Computing and Telecommunications Division, part of the Physical Research area of the Laboratory. One major area of the Computing and Telecommunications Division is Management Information Systems (MIS). A significant aspect of Management Information Systems' work is the development of proposals for new and enhanced administrative computing systems based on an analysis of informational needs. This document represent the outcome of the planning process for FY1991 through FY1993. The introduction of the FY1991 through FY1993 Long-Range Plan assesses the state of administrative computing at ANL and the implications of FY1991 funding recommendations. It includes a history of MIS planning for administrative data processing. This document discusses the strategy and goals which are an important part of administrative data processing plans for the Laboratory. It also describes the management guidelines established by the Administrative Data Processing Oversight Committee for the proposal and implementation of administrative computing systems. Summaries of the proposals for new or enhanced administrative computing systems presented by individual divisions or departments with assistance of Management Information Systems, to the Administrative Data Processing Oversight Committee are given. The detailed tables in this paper give information on how much the resources to develop and implement a given systems will cost its users. The tables include development costs, computing/operations costs, software and hardware costs, and efforts costs. They include both systems funded by Laboratory General Expense and systems funded by the users themselves.

  2. SAVAH: Source Address Validation with Host Identity Protocol

    Science.gov (United States)

    Kuptsov, Dmitriy; Gurtov, Andrei

    Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemented SAVAH in Wi-Fi access points and evaluated its overhead for clients and the first-hop router.

  3. Energy expenditure, nutritional status, body composition and physical fitness of Royal Marines during a 6-month operational deployment in Afghanistan.

    Science.gov (United States)

    Fallowfield, Joanne L; Delves, Simon K; Hill, Neil E; Cobley, Rosalyn; Brown, Pieter; Lanham-New, Susan A; Frost, Gary; Brett, Stephen J; Murphy, Kevin G; Montain, Scott J; Nicholson, Christopher; Stacey, Michael; Ardley, Christian; Shaw, Anneliese; Bentley, Conor; Wilson, Duncan R; Allsopp, Adrian J

    2014-09-14

    Understanding the nutritional demands on serving military personnel is critical to inform training schedules and dietary provision. Troops deployed to Afghanistan face austere living and working environments. Observations from the military and those reported in the British and US media indicated possible physical degradation of personnel deployed to Afghanistan. Therefore, the present study aimed to investigate the changes in body composition and nutritional status of military personnel deployed to Afghanistan and how these were related to physical fitness. In a cohort of British Royal Marines (n 249) deployed to Afghanistan for 6 months, body size and body composition were estimated from body mass, height, girth and skinfold measurements. Energy intake (EI) was estimated from food diaries and energy expenditure measured using the doubly labelled water method in a representative subgroup. Strength and aerobic fitness were assessed. The mean body mass of volunteers decreased over the first half of the deployment ( - 4·6 (sd 3·7) %), predominately reflecting fat loss. Body mass partially recovered (mean +2·2 (sd 2·9) %) between the mid- and post-deployment periods (Penergy expenditure (mean 15 167 (sd 1883) kJ) measured in a subgroup of volunteers. However, despite the body mass loss, aerobic fitness and strength were well maintained. Nutritional provision for British military personnel in Afghanistan appeared sufficient to maintain physical capability and micronutrient status, but providing appropriate nutrition in harsh operational environments must remain a priority.

  4. Practical Evaluation of Stateful NAT64/DNS64 Translation

    Directory of Open Access Journals (Sweden)

    SKOBERNE, N.

    2011-08-01

    Full Text Available It is often suggested that the approach to IPv6 transition is dual-stack deployment; however, it is not feasible in certain environments. As Network Address Translation -- Protocol Translation (NAT-PT has been deprecated, stateful NAT64 and DNS64 RFCs have been published, supporting only IPv6-to-IPv4 translation scenario. Now the question of usability in the real world arises. In this paper, we systematically test a number of widely used application-layer network protocols to find out how well they traverse Ecdysis, the first open source stateful NAT64 and DNS64 implementation. We practically evaluated 18 popular protocols, among them HTTP, RDP, MSNP, and IMAP, and discuss the shortcomings of such translations that might not be apparent at first sight.

  5. Tracking the deployment of the integrated metropolitan ITS infrastructure in Orlando : FY99 results

    Science.gov (United States)

    2000-01-01

    In January 1996, Secretary Pea set a goal of deploying the integrated metropolitan Intelligent Transportation System (ITS) infrastructure in 75 of the nations largest metropolitan areas by 2006. In 1997, the U.S. Department of Transportation ini...

  6. EST Table: FY739999 [KAIKOcDNA[Archive

    Lifescience Database Archive (English)

    Full Text Available FY739999 E_FL_famL_10I12_F_0 11/11/04 100 %/104 aa ref|NP_001091753.1| ribosomal pr...6#protein_id:CAA90 434.1 11/11/04 68 %/104 aa AGAP003538-PA Protein|2R:39333999:39334678:1|gene:AGAP003538 1

  7. Comparison of IPV to tOPV week 39 boost of primary OPV vaccination in Indian infants: an open labelled randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Suman Kanungo

    2017-01-01

    Conclusions: This study indicates that an IPV boost at week 39 is equivalent to tOPV in intestinal immunity, and provides higher seroconversion compared to tOPV. The major limitation of the study was the additional OPV doses receive by infants during pulse polio immunization resulted in additional mucosal boosting, diminishing the impact of IPV or tOPV boost at week 39. However, IPV for OPV boost should prove to be a step forward in the global polio eradication initiative to reduce the problem of circulating vaccine-derived poliovirus (cVDPV.

  8. Active Sites Environmental Monitoring Program. FY 1993: Annual report

    International Nuclear Information System (INIS)

    Morrissey, C.M.; Ashwood, T.L.; Hicks, D.S.; Marsh, J.D.

    1994-08-01

    This report continues a series of annual and semiannual reports that present the results of the Active Sites Environmental Monitoring Program (ASEMP) monitoring activities. The report details monitoring data for fiscal year (FY) 1993 and is divided into three major areas: SWSA 6 [including tumulus pads, Interim Waste Management Facility (IWMF), and other sites], the low-level Liquid-Waste Solidification Project (LWSP), and TRU-waste storage facilities in SWSA 5 N. The detailed monitoring methodology is described in the second revision of the ASEMP program plan. This report also presents a summary of the methodology used to gather data for each major area along with the results obtained during FY 1993

  9. Alcohol Use, Hostile Sexism, and Religious Self-Regulation: Investigating Risk and Protective Factors of IPV Perpetration.

    Science.gov (United States)

    Lynch, Kellie R; Renzetti, Claire M

    2017-05-01

    Research suggests that the relationship between alcohol use and intimate partner violence (IPV) is moderated by a range of other factors. Therefore, we investigated the relationship between alcohol use, hostile sexism, and religious self-regulation with perpetration. Using a national sample of 255 men, we found that hostile sexism was associated with physical violence toward a partner and alcohol use was positively associated with psychological abuse toward a partner. With regard to religious self-regulation, we found that introjected religious self-regulation was positively associated with hostile sexism and positively associated with perpetrating physical IPV. Identified religious self-regulation was negatively associated with physical violence perpetration. We also found significant interactions among our independent measures on physical IPV perpetration. These analyses suggest that increased alcohol consumption elevates the risk for physical violence perpetration among men who are high in introjected religious self-regulation and low in hostile sexism, while reducing the risk for perpetration in men who are high in identified religious self-regulation and low in hostile sexism. Implications and limitations of the findings are discussed.

  10. Health and Health Care From the Perspective of Intimate Partner Violence Adult Female Victims in Shelters: Impact of IPV, Unmet Needs, Barriers, Experiences, and Preferences.

    Science.gov (United States)

    Wadsworth, Pamela; Kothari, Catherine; Lubwama, Grace; Brown, Cathy L; Frank Benton, Jennifer

    Intimate partner violence (IPV) predicts poor health for victims and their children, but little is known about the perspective of victims. This study reports the perspectives of adult female IPV victims about the impact of IPV on their health and barriers of health care access for themselves and their children. The majority rated their health as good to excellent (69%). However, 83.5% indicated that IPV negatively affected their health; 53.5% had unmet health care needs. Mental health care was the most common unmet need for women; children's unmet needs were immunizations and preventive care. Transportation difficulties posed the biggest barrier to health care access.

  11. EST Table: FY737313 [KAIKOcDNA[Archive

    Lifescience Database Archive (English)

    Full Text Available FY737313 E_FL_famL_02E02_F_0 11/11/04 53 %/201 aa ref|XP_001656360.1| Mitochondrial...6-PA 11/11/04 47 %/194 aa gi|91082959|ref|XP_973661.1| PREDICTED: similar to Mitochondrial 39S ribosomal protein L3 [Tribolium castaneum] FS926458 famL ...

  12. Large-scale laboratory testing of bedload-monitoring technologies: overview of the StreamLab06 Experiments

    Science.gov (United States)

    Marr, Jeffrey D.G.; Gray, John R.; Davis, Broderick E.; Ellis, Chris; Johnson, Sara; Gray, John R.; Laronne, Jonathan B.; Marr, Jeffrey D.G.

    2010-01-01

    A 3-month-long, large-scale flume experiment involving research and testing of selected conventional and surrogate bedload-monitoring technologies was conducted in the Main Channel at the St. Anthony Falls Laboratory under the auspices of the National Center for Earth-surface Dynamics. These experiments, dubbed StreamLab06, involved 25 researchers and volunteers from academia, government, and the private sector. The research channel was equipped with a sediment-recirculation system and a sediment-flux monitoring system that allowed continuous measurement of sediment flux in the flume and provided a data set by which samplers were evaluated. Selected bedload-measurement technologies were tested under a range of flow and sediment-transport conditions. The experiment was conducted in two phases. The bed material in phase I was well-sorted siliceous sand (0.6-1.8 mm median diameter). A gravel mixture (1-32 mm median diameter) composed the bed material in phase II. Four conventional bedload samplers – a standard Helley-Smith, Elwha, BLH-84, and Toutle River II (TR-2) sampler – were manually deployed as part of both experiment phases. Bedload traps were deployed in study Phase II. Two surrogate bedload samplers – stationarymounted down-looking 600 kHz and 1200 kHz acoustic Doppler current profilers – were deployed in experiment phase II. This paper presents an overview of the experiment including the specific data-collection technologies used and the ambient hydraulic, sediment-transport and environmental conditions measured as part of the experiment. All data collected as part of the StreamLab06 experiments are, or will be available to the research community.

  13. FY 2005 Supplement to the President`s Budget

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Supplement to the President`s FY 2005 Budget reports on the FY 2004 research and development R and D activities and FY 2005 plans of the multiagency Networking...

  14. Promotion of Latina Health: Intersectionality of IPV and Risk for HIV/AIDS.

    Science.gov (United States)

    Rountree, Michele A; Granillo, Teresa; Bagwell-Gray, Meredith

    2016-04-01

    Latina women in the United States are vulnerable to two intersecting public health concerns: intimate partner violence (IPV) and subsequent risk for HIV/AIDS infection. Examination of the cultural and contextual life factors of this understudied population is crucial to developing culturally relevant HIV interventions. Focus groups with Latinas (15 monolingual; 10 bilingual) who have experienced IPV were conducted. Monolingual and bilingual Latinas endorsed that they were concerned about HIV infection, naming partner infidelity and experiences of forced and coerced sex as primary reasons for their concern. However, monolingual participants had lower levels of HIV knowledge, spending much time discussing myths of HIV infection, whereas bilingual participants spent more time discussing specific prevention techniques, including challenges related to the violence in their relationships. These findings suggest that HIV/AIDS prevention programs for Latinas need to pay close attention to the different historical, contextual, and cultural experiences of this at-risk group of women. © The Author(s) 2015.

  15. 75 FR 15686 - NOAA'S Office of Ocean Exploration and Research (OER) Strategic Plan FY 2011-FY 2015

    Science.gov (United States)

    2010-03-30

    ...-01] NOAA'S Office of Ocean Exploration and Research (OER) Strategic Plan FY 2011-FY 2015 AGENCY... and Atmospheric Administration (NOAA), Commerce. ACTION: Notice of availability and request for public comment. [[Page 15687

  16. FY97 nuclear-related budgets total 493 billion yen (4.4 billion dollars)

    International Nuclear Information System (INIS)

    Anon.

    1996-01-01

    On September 13, the Atomic Energy Commission of Japan announced the estimated nuclear-related budget requests for FY1997 (April, 1997 - Mach, 1998), giving the breakdowns for eight ministries and agencies. The total amount requested by the government bodies was 493.3 billion yen, 0.8% increase as compared with FY96. this figure includes the budget requests of the Science and Technology Agency (STA), the Ministry of International Trade and Industry (MITI), the Ministry of Foreign Affairs, the Ministry of Transport, the Ministry of Agriculture, Forestry and Fisheries, the Okinawa Development Agency, and the Ministry of Home Affairs, but excludes the budget request made by the Ministry of Education. The budget requests of STA and MITI are 360 billion yen and 126 billion yen, respectively. On August 29, STA released its estimated FY97 budget request. The nuclear-related 360.4 billion yen is 0.9% more than that in year before. Of this sum, 199.9 billion yen is in the general account, and 160.6 billion yen is in the special account for power source development. The details of the nuclear-related amounts are explained. On August 26, MITI released its estimated budget request for FY97, and of the nuclear-related 125.7 billion yen (0.1% increase from FY96), 200 million yen is in the general account, and 98.9 billion yen and 26.6 billion yen are in the special accounts for power resource development and power source diversification, respectively. (K.I.)

  17. Composite Fe - BaCe0.2Zr0.6Y0.2O2.9 Anodes for Proton Conductor Fuel Cells

    DEFF Research Database (Denmark)

    Lapina, Alberto; Chatzichristodoulou, Christodoulos; Holtappels, Peter

    2014-01-01

    Symmetrical cells with Fe - BaCe0.2Zr0.6Y0.2O2.9 composite electrodes are produced by screen printing and infiltration, using BaCe0.2Zr0.6Y0.2O2.9 as electrolyte. The electrochemical performance of the composite electrode is studied by impedance spectroscopy at 250–500◦C in dry and wet hydrogen/n...

  18. FY 1996 Congressional budget request: Budget highlights

    Energy Technology Data Exchange (ETDEWEB)

    1995-02-01

    The FY 1996 budget presentation is organized by the Department`s major business lines. An accompanying chart displays the request for new budget authority. The report compares the budget request for FY 1996 with the appropriated FY 1995 funding levels displayed on a comparable basis. The FY 1996 budget represents the first year of a five year plan in which the Department will reduce its spending by $15.8 billion in budget authority and by $14.1 billion in outlays. FY 1996 is a transition year as the Department embarks on its multiyear effort to do more with less. The Budget Highlights are presented by business line; however, the fifth business line, Economic Productivity, which is described in the Policy Overview section, cuts across multiple organizational missions, funding levels and activities and is therefore included in the discussion of the other four business lines.

  19. IPV v2.0 : upgrading the established inactivated polio vaccine production process

    NARCIS (Netherlands)

    Thomassen, Y.E.

    2014-01-01

    The first vaccine against poliovirus (PV), the causative agent of poliomyelitis, was developed in the 1950s by Jonas Salk. The vaccine (IPV) consists of an injected dose of purified and inactivated wild-type PVs (all three serotypes). Soon after this discovery, at the Rijks Instituut voor de

  20. Phase II and III Clinical Studies of Diphtheria-Tetanus-Acellular Pertussis Vaccine Containing Inactivated Polio Vaccine Derived from Sabin Strains (DTaP-sIPV).

    Science.gov (United States)

    Okada, Kenji; Miyazaki, Chiaki; Kino, Yoichiro; Ozaki, Takao; Hirose, Mizuo; Ueda, Kohji

    2013-07-15

    Phase II and III clinical studies were conducted to evaluate immunogenicity and safety of a novel DTaP-IPV vaccine consisting of Sabin inactivated poliovirus vaccine (sIPV) and diphtheria-tetanus-acellular pertussis vaccine (DTaP). A Phase II study was conducted in 104 healthy infants using Formulation H of the DTaP-sIPV vaccine containing high-dose sIPV (3, 100, and 100 D-antigen units for types 1, 2, and 3, respectively), and Formulations M and L, containing half and one-fourth of the sIPV in Formulation H, respectively. Each formulation was administered 3 times for primary immunization and once for booster immunization. A Phase III study was conducted in 342 healthy infants who received either Formulation M + oral polio vaccine (OPV) placebo or DTaP + OPV. The OPV or OPV placebo was orally administered twice between primary and booster immunizations. Formulation M was selected as the optimum dose. In the Phase III study, the seropositive rate was 100% for all Sabin strains after primary immunization, and the neutralizing antibody titer after booster immunization was higher than in the control group (DTaP + OPV). All adverse reactions were clinically acceptable. DTaP-sIPV was shown to be a safe and immunogenic vaccine. JapicCTI-121902 for Phase II study, JapicCTI-101075 for Phase III study (http://www.clinicaltrials.jp/user/cte_main.jsp).

  1. Growth, and magnetic study of Sm0.4Er0.6FeO3 single crystal grown by optical floating zone technique

    Science.gov (United States)

    Wu, Anhua; Zhao, Xiangyang; Man, Peiwen; Su, Liangbi; Kalashnikova, A. M.; Pisarev, R. V.

    2018-03-01

    Sm0.4Er0.6FeO3 single crystals were successfully grown by optical floating zone method; high quality samples with various orientations were manufactured. Based on these samples, Magnetic property of Sm0.4Er0.6FeO3 single crystals were investigated systemically by means of the temperature dependence of magnetization. It indicated that compositional variations not only alter the spin reorientation temperature, but also the compensation temperature of the orthoferrites. Unlike single rare earth orthoferrites, the reversal transition temperature point of Sm0.4Er0.6FeO3 increases as magnetic field increases, which is positive for designing novel spin switching or magnetic sensor device.

  2. Hanford Diversification and the Tri-Cities Economy FY 1999

    International Nuclear Information System (INIS)

    SCOTT, M.J.

    2000-01-01

    The missions of the U.S. Department of Energy's Richland Operations Office (DOE/RL) are to safely manage the Hanford Site, to manage and clean up its legacy wastes, and to develop and deploy new science and technology in the environmental and energy fields. Collectively, DOE/RL and its contractors are the most important single entity in the Tri-Cities local economy (Pasco, Kennewick, and Richland, Washington, and the surrounding area). Although the relevant economic region affected by DOE/RL and its contractors actually embraces a geographic area reaching from Yakima in the west to Walla Walla in the east and from Moses Lake in the north to Pendleton, Oregon, in the south, over 90% of economic impacts likely occur in Benton and Franklin Counties. These two counties are defined as the ''local'' Tri-Cities economy for purposes of this study. In the federal fiscal year (FY) 1999 (October 1, 1998 through September 30, 1999), the total impact of DOE'S local $1.59 billion budget was felt through payrolls of $542 million and local purchases of goods and services of $226 million. The total local spending of $768 million was up slightly from the FY 1998 total of $765 million. Taking into account the multiplier effects of this spending, the DOE/RL budget sustained an estimated 32% of all local employment (28,250 out of 88,100 jobs) and about 35% of local earned income (almost $1.08 billion out of $3.08 billion). The decrease in these percentages from last year's report reflects an update of the model's economic structure based on the 1997 economic census year, a correction of a programming error in the model found during the update, and a broader definition of earnings that includes proprietor income, not just wages (see the Appendix for revisions to the previous forecasts). DOE budget increases in FY 2000 are expected to result in no change to the number of local DOE contractor jobs and about a $29 million increase in direct local spending

  3. FY 1997 cost savings report

    International Nuclear Information System (INIS)

    Sellards, J.B.

    1998-01-01

    With the end of the cold war, funding for the Environmental Management program increased rapidly as nuclear weapons production facilities were shut down, cleanup responsibilities increased, and facilities were transferred to the cleanup program. As funding for the Environmental Management (EM) program began to level off in response to Administration and Congressional efforts to balance the Federal budget, the program redoubled its efforts to increase efficiency and get more productivity out of every dollar. Cost savings and enhanced performance are an integral pair of Hanford Site operations. FY1997 was the third year of a cost savings program that was initially defined in FY 1995. The definitions and process remained virtually the same as those used in FY 1996

  4. Enhancing assessment of interpersonal violence (IPV) pregnancy-related homicide risk within nursing curricula.

    Science.gov (United States)

    Clements, Paul Thomas; Holt, Karyn E; Hasson, Catherine M; Fay-Hillier, Theresa

    2011-12-01

    Pregnancy and motherhood traditionally represent evolution of the next generation; yet, contemporary research and analyses confirm that this time can also be manifested in fear by the expectant mother within an environment of battering, cruelty, physical and emotional abuse, and sexual assault. Often to the surprise of many healthcare providers, the Centers for Disease Control and Prevention have consistently reported that Interpersonal Violence (IPV) related homicide is a leading cause of traumatic death among new and expectant mothers. In spite of these staggering statistical and anecdotal findings, universal screening for violence during pregnancy continues to be minimal. Forensic nurses might be prompted to respond to the consequences of violence and its resultant negative effects on expectant mothers by strategically incorporating systematic and consistent assessment into foundational nursing curricula regarding IPV as a leading risk factor for injury or death. © 2011 International Association of Forensic Nurses.

  5. Certain physicochemical characteristics of Bi1.4Y0.6O3 prepared by the method of direct high-frequency fusion in cold crucible

    International Nuclear Information System (INIS)

    Poluyan, A.F.; Lashneva, V.V.; Vecher, A.A.; Voropaev, A.G.; Savitskij, A.A.; Tatarintsev, V.M.

    1988-01-01

    Electric properties and the nature of conductivity of Bi 1.4 V 0.6 O 3 solid solution prepared by the method of direct high-frequency melting in the cold crucible are studied. A sample of Bi 1.4 Y 0.6 O 3 composition synthesized by this technique has a higher electric conductivity value as compared with analogous polycrystal sample has a cubic face-centered structure of the τ-Bi 2 O 3 type. On the basis of experimental e.m.f. values temperature dependences of pressures of oxygen dissociation for Bi 2 O 3 and Bi 1.4 Y 0.6 O 3 are calculated. Bi 1.4 Y 0.6 O 3 solid solution has lower values of Po 2 dissociation pressure as compared with bismuth oxide. This expands the limits of its application

  6. EST Table: FY001942 [KAIKOcDNA[Archive

    Lifescience Database Archive (English)

    Full Text Available FY001942 bmov6h18 11/11/04 100 %/147 aa ref|NP_001098702.1| nanos-like protein [Bom...byx mori] gb|ABS17681.1| nanos-like protein [Bombyx mori] 11/11/04 n.h 11/11/04 n.h 11/11/04 n.h 11/11/04 n.h 11/11/04 n.h NM_001105232 bmov ...

  7. Photovoltaic Subcontract Program, FY 1990

    Energy Technology Data Exchange (ETDEWEB)

    Summers, K.A. (ed.)

    1991-03-01

    This report summarizes the progress of the subcontracted photovoltaic (PV) research and development (R D) performed under the Photovoltaics Program at the Solar Energy Research Institute (SERI). The SERI subcontracted PV research and development represents most of the subcontracted R D that is funded by the US Department of Energy (DOE) National Photovoltaics Program. This report covers fiscal year (FY) 1990: October 1, 1989 through September 30, 1990. During FY 1990, the SERI PV program started to implement a new DOE subcontract initiative, entitled the Photovoltaic Manufacturing Technology (PVMaT) Project.'' Excluding (PVMaT) because it was in a start-up phase, in FY 1990 there were 54 subcontracts with a total annualized funding of approximately $11.9 million. Approximately two-thirds of those subcontracts were with universities, at a total funding of over $3.3 million. Cost sharing by industry added another $4.3 million to that $11.9 million of SERI PV subcontracted R D. The six technical sections of this report cover the previously ongoing areas of the subcontracted program: the Amorphous Silicon Research Project, Polycrystalline Thin Films, Crystalline Silicon Materials Research, High-Efficiency Concepts, the New Ideas Program, and the University Participation Program. Technical summaries of each of the subcontracted programs discuss approaches, major accomplishments in FY 1990, and future research directions. Another section introduces the PVMaT project and reports the progress since its inception in FY 1990. Highlights of technology transfer activities are also reported.

  8. Electronics Engineering Research. Final report, FY 1979

    International Nuclear Information System (INIS)

    Weissenberger, S.

    1980-01-01

    Accomplishments in Electronics Engineering Research (EER) during FY79 spanned a broad range of technologies, from high-speed microelectronics to digital image enhancement; from underground probing with electromagnetic waves to detecting neutrons with a small solid-state device; and from computer systems to aid engineers, to software tools to aid programmers. This report describes the overall EER program and its objectives, summarizes progress made in FY79, and outlines plans for FY80

  9. Concomitant administration of a fully liquid, ready-to-use DTaP-IPV-HB-PRP-T hexavalent vaccine with a meningococcal serogroup C conjugate vaccine in infants.

    Science.gov (United States)

    Vesikari, Timo; Borrow, Ray; Da Costa, Xavier; Richard, Patrick; Eymin, Cécile; Boisnard, Florence; Lockhart, Stephen

    2017-01-11

    DTaP-IPV-HB-PRP-T or hexavalent vaccines are indicated for primary and booster vaccination of infants and toddlers against diphtheria, tetanus, pertussis, hepatitis B, poliomyelitis and invasive diseases caused by Haemophilus influenzae type b (Hib). The present study evaluates the safety and immunogenicity of a ready-to-use hexavalent vaccine when co-administered with a meningococcal serogroup C conjugate (MenC) vaccine in infants. This was a phase III, open-label, randomised, multicentre study conducted in Finland. Healthy infants, aged 46-74days (n=350), were randomised in a ratio of 1:1 to receive DTaP-IPV-HB-PRP-T vaccine at two, three and four months, either with a MenC vaccine co-administered at two and four months (Group 1; n=175) or without MenC vaccine (Group 2; n=175). All infants also received routine rotavirus and 13-valent pneumococcal conjugate vaccines. The proportion of participants with an anti-HBs concentration ⩾10mIU/mL assessed one month after the third dose of DTaP-IPV-HB-PRP-T vaccine was 97.5% [95%CI: 93.1-99.3] in the coadministration group and 96.1% [95%CI: 91.8-98.6] in the group without MenC vaccine. The proportion of participants with an anti-MenC SBA titre ⩾8 assessed one month after the second dose of MenC vaccine was 100% in the coadministration group. Both primary objectives were achieved. Secondary immunogenicity and safety analyses showed that co-administration of DTaP-IPV-HB-PRP-T and MenC vaccines did not impact the immune response to the antigens of each of the two vaccines. All vaccines were well tolerated and the safety profile of DTaP-IPV-HB-PRP-T vaccine was similar in both groups. ClinicalTrials.gov identifier: NCT01839175; EudraCT number: 2012-005547-24. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  10. Tanks Focus Area (TFA) FY1999 Midyear Review Report

    International Nuclear Information System (INIS)

    Schlahta, Stephan N.

    1999-01-01

    The purpose of the Tanks Focus Area (TFA) Midyear Review was to improve the quality and responsiveness of TFA technical solutions to identified user needs. This review goal was achieved through executing a multi-phased review approach. The first phase of the midyear review focused on the subset of FY99 work identified by Department of energy users as having continuing benefit in FY00-01. The TFA FY00-02 Technical Responses identified FY99 work that had continued applicability based on the most current set of site user needs. Each TFA FY00-02 Technical Response which included FY work scope was reviewed by the TFA Technical Advisory Group (TAG), in a meeting held in February 1999. Made up of technical experts from across the country, the TAG provides high-quality, short-turnaround, independent technical reviews for the TFA

  11. Active sites environmental monitoring program FY 1997 annual report

    International Nuclear Information System (INIS)

    Morrissey, C.M.; Marshall, D.S.; Cunningham, G.R.

    1998-03-01

    This report summarizes the activities conducted by the Active Sites Environmental Monitoring Program (ASEMP) from October 1996 through September 1997. The purpose of the program is to provide early detection and performance monitoring at active low-level waste (LLW) disposal sites in Solid Waste Storage Area (SWSA) 6 and transuranic (TRU) waste storage sites in SWSA 5 North. This report continues a series of annual and semiannual reports that present the results of ASEMP monitoring activities. This report details monitoring results for fiscal year (FY) 1997 from SWSA 6, including the Interim Waste Management Facility (IWMF) and the Hillcut Disposal Test Facility (HDTF), and (2) TRU-waste storage areas in SWSA 5 N. This report presents a summary of the methodology used to gather data for each major area along with the FY 1997 results. Figures referenced in the text are found in Appendix A and data tables are presented in Appendix B

  12. Effects of Combat Deployment on Anthropometrics and Physiological Status of U.S. Army Special Operations Forces Soldiers.

    Science.gov (United States)

    Farina, Emily K; Taylor, Jonathan C; Means, Gary E; Williams, Kelly W; Murphy, Nancy E; Margolis, Lee M; Pasiakos, Stefan M; Lieberman, Harris R; McClung, James P

    2017-03-01

    mass increased body mass (75.6 ± 2.6 vs. 76.6 ± 2.8 kg, p = 0.03), as did those in the second quartile (81.6 ± 2.0 vs. 83.7 ± 3.5 kg, p = 0.02). Those in the third quartile also tended to increase body mass (89.2 ± 2.6 vs. 90.9 ± 3.3 kg, p = 0.05), while those in the upper quartile tended to decrease body mass (98.5 ± 3.6 vs. 96.7 kg, p = 0.06). Change in SHBG was inversely correlated with change in body mass (r = -0.33, p = 0.02). There were no changes in fat mass, body fat percentage, waist circumference, neck circumference, total testosterone, calculated bioavailable or free testosterone, high-sensitivity C-reactive protein, tumor necrosis factor-α, interleukin-1β, or interleukin-6. Inflammatory markers were skewed toward lower values. Overall, physiological status of elite SOF soldiers characterized by multiple prior deployments was minimally impacted by combat deployment, in the absence of major unit casualties. The majority experienced some adaptive changes, including increased lean mass, grip strength, time spent engaged in exercise, and decreased levels of the stress hormone cortisol. Mechanisms contributing to inverse correlations between change in SHBG and change in body mass may be further clarified. Future investigations may also more fully characterize the degradation and optimization of health and physiological status of SOF training and deployment cycles with in-theater data collection and repeated measures. Reprint & Copyright © 2017 Association of Military Surgeons of the U.S.

  13. Solute nanostructures and their strengthening effects in Al–7Si–0.6Mg alloy F357

    CSIR Research Space (South Africa)

    Sha, G

    2012-01-01

    Full Text Available The solute nanostructures formed in the primary a-Al grains of a semi-solid metal cast Al–7Si–0.6Mg alloy (F357) during ageing at 180°C, and the age-hardening response of the alloy, have been systematically investigated by transmission electron...

  14. Projected Benefits of Federal Energy Efficiency and Renewable Energy Programs. FY 2005 - FY 2050

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2004-05-01

    This report describes a benefits analysis undertaken by EERE to better understand the extent to which the technologies and market improvements funded by its FY 2005 budget request will make energy more affordable, cleaner, and more reliable. It summarizes the results of the analysis, which focused on economic, environmental, and security benefits related to energy. The report identifies specific measures or indicators of estimated benefits for FY 2005.

  15. Results of single borehole hydraulic tests in the Mizunami Underground Research Laboratory project. FY 2012 - FY 2015

    International Nuclear Information System (INIS)

    Onoe, Hironori; Takeuchi, Ryuji

    2016-11-01

    This report summarize the results of the single borehole hydraulic tests of 151 sections carried out at the -300 m Stage and the -500 m Stage of the Mizunami Underground Research Laboratory from FY 2012 to FY 2015. The details of each test (test interval depth, geology, etc.) as well as the interpreted hydraulic parameters and analytical methods used are presented in this report. Furthermore, the previous results of the single borehole hydraulic tests carried out in the Regional Hydrogeological Study Project and the Mizunami Underground Research Laboratory Project before FY 2012 are also summarized in this report. (author)

  16. NREL Energy Storage Projects: FY2013 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Pesaran, A.; Ban, C.; Brooker, A.; Gonder, J.; Ireland, J.; Keyser, M.; Kim, G. H.; Long, D.; Neubauer, J.; Santhanagopalan, S.; Smith, K.; Tenent, R.; Wood, E.; Han, T.; Hartridge, S.; Shaffer, C. E.

    2014-07-01

    In FY13, DOE funded NREL to make technical contributions to various R&D activities. This report summarizes NREL's R&D projects in FY13 in support of the USABC; Battery Testing, Analysis, and Design; ABR; and BATT program elements. The FY13 projects under NREL's Energy Storage R&D program are discussed in depth in this report.

  17. Scoping study to expedite development of a field deployable and portable instrument for UF6 enrichment assay

    OpenAIRE

    Chan, CYG; Valentine, JD; Russo, RE

    2017-01-01

    The primary objective of the present study is to identity the most promising, viable technologies that are likely to culminate in an expedited development of the next-generation, field-deployable instrument for providing rapid, accurate, and precise enrichment assay of uranium hexafluoride (UF6). UF6 is typically involved, and is arguably the most important uranium compound, in uranium enrichment processes. As the first line of defense against proliferation, accurate analytical techniques t...

  18. Prevalence of Pain Diagnoses and Burden of Pain Among Active Duty Soldiers, FY2012.

    Science.gov (United States)

    Reif, Sharon; Adams, Rachel Sayko; Ritter, Grant A; Williams, Thomas V; Larson, Mary Jo

    2018-03-14

    Soldiers are at risk for acute and chronic pain due to the mental and physical challenges of military duties and ongoing training for force readiness. With the burden of pain on any individual attributable across pain sources, a broad perspective that goes beyond prior characterizations of pain is important. We aim to further the understanding of pain's effects among non-deployed active duty soldiers and the Military Health System (MHS), by describing prevalence of 10 painful conditions, reported pain levels, duration of pain and impact of pain on military duty limitations. Data are from the MHS Data Repository including outpatient MHS direct care encounters, claims for outpatient purchased care from civilian providers, and vital records, for all soldiers continuously enrolled in TRICARE and not deployed in FY 2012. Ten pain-related diagnostic categories were conceptually derived for this analysis and identified using ICD-9-CM diagnostic codes. We report the FY 2012 prevalence at the soldier-level (N = 297,120) for each pain category as a primary diagnosis, as well as in any diagnostic position, and at the soldier-level for reported pain level, duration, and military duty limitations. Institutional Review Board approval was obtained prior to analyses. Overall, 63% of soldiers had at least one pain diagnosis and 59% had a primary pain diagnosis during FY 2012. Back and neck pain (22%), non-traumatic joint disorders (28%), and other musculoskeletal pain (30%) were the most frequent categories for primary diagnosis. Nearly two-thirds of soldiers had a primary pain diagnosis in more than one category, and 23% in four or more categories. Moderate or severe pain levels were reported at least once during the year by 55% of soldiers who had a primary pain diagnosis. In the subsample of soldiers with primary pain in the first quarter, duration and chronicity of pain diagnoses varied by pain category: the back and neck pain category was the most common for both persistent

  19. [Inactivated poliovirus vaccines: an inevitable choice for eliminating poliomyelitis].

    Science.gov (United States)

    Vidor, J D; Jean-Denis, Shu

    2016-12-06

    The inactivated poliovirus vaccine (IPV) is a very old tool in the fight against poliomyelitis. Though supplanted by oral poliovirus vaccine (OPV) in the 1960s and 1970s, the IPV has now become an inevitable choice because of the increasingly recognized risks associated with continuous use of OPVs. Following the pioneering work of Jonas Salk, who established key principles for the IPV, considerable experience has accumulated over the years. This work has led to modern Salk IPV-containing vaccines, based on the use of inactivated wildtype polioviruses, which have been deployed for routine use in many countries. Very good protection against paralysis is achieved with IPV through the presence of circulating antibodies able to neutralize virus infectivity toward motor neurons. In addition, with IPV, a variable degree of protection against mucosal infection (and therefore transmission) through mucosal antibodies and immune cells is achieved, depending on previous exposure of subjects to wildtype or vaccine polioviruses. The use of an IPV-followed-by-OPV sequential immunization schedule has the potential advantage of eliminating the vaccine-associated paralytic poliomyelitis (VAPP) risk, while limiting the risks of vaccine-derived poliovirus (VDPVs). Sabin strain-derived IPVs are new tools, only recently beginning to be deployed, and data are being generated to document their performance. IPVs will play an irreplaceable role in global eradication of polio.

  20. Physical trajectory profile data from glider blue deployed by University of Massachusetts; University of Massachusetts - Dartmouth in the Mid-Atlantic Bight from 2016-05-18 to 2016-06-06 (NCEI Accession 0153544)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — U.S. IOOS Mid-Atlantic Regional Association Coastal Ocean Observing System (MARACOOS) glider deployment. This is the first of a series of yearly seasonal deployments...

  1. Search Results | Page 82 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-01-01

    Results 811 - 820 of 8491 ... IPv6 deployment. Published date. January 1, 2010. Studies. -. Welcome address by Prof. Z.D. Kadzamira, Chairman, UA, at the UbuntuNet Connect 2010. Published date. January 1, 2010. Studies. -. CHAIN project and prospects for Sub Saharan Africa. Published date. January 1, 2010. Pages.

  2. Summary of NREL's FY13-FY15 Photovoltaic Subprogram

    Energy Technology Data Exchange (ETDEWEB)

    2017-03-31

    In this report, you will find summaries of the completed FY13-FY15 Photovoltaic projects that were funded within NREL. The summaries describe the initial motivation for the project; significant achievements, including publications, intellectual property, and collaborations; and remaining challenges. Among the NREL projects, you will find research of almost every major PV technology - from the next generation of silicon PV to relatively new organic PVs - as well as projects advancing PV module durability and characterization. Each of these projects was designed to support SunShot's goals, putting the United States one step closer to widespread use of low-cost, clean electricity.

  3. EST Table: FY036659 [KAIKOcDNA[Archive

    Lifescience Database Archive (English)

    Full Text Available FY036659 rbmte13c09 11/12/09 GO hit GO:0047800(cysteamine dioxygenase activity)|GO:...f|XP_974899.1| PREDICTED: similar to 2-aminoethanethiol (cysteamine) dioxygenase [Tribolium castaneum] FY036659 bmte ...

  4. Systematization of the Introduction of IPV and Switch from tOPV to bOPV in the Americas.

    Science.gov (United States)

    Pedreira, Cristina; Thrush, Elizabeth; Jauregui, Barbara

    2017-07-01

    The synchronized introduction of the inactivated polio vaccine (IPV) and the switch from trivalent oral polio vaccine (tOPV) to bivalent oral polio vaccine (bOPV) has constituted an effort without precedents, and with astonishing results. Within the established time frame, all countries in our region managed to carry out the decision, planning, and introduction of this vaccine and subsequent switch to their national immunization schedules.The purpose of this article is to systematize the process of IPV introduction and switch in Latin America and the Caribbean, which constitutes an important piece in the documentation of the polio legacy in the Americas. Regional level as well as country perspectives and viewpoints are described. Analyzing and summarizing the lessons learned from the introduction of IPV and the switch from tOPV to bOPV can be useful for the introduction of new vaccines in the Pan American Health Organization (PAHO) region and in other regions of the world, and to help our own region successfully carry out another synchronized vaccine introduction in the future, if necessary. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.

  5. Comprehensive Routing Security Development and Deployment for the Internet

    Science.gov (United States)

    2015-02-01

    Legacy addresses are IPv4 addresses . As the market for IPv4 addresses becomes stronger, it is anticipated that those who hold legacy space will...express and transmit the information needed to stop route leaks. 4.8.7 Uncertain Address Records. Larger ISPs, especially those who have a long history ...information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS . 1. REPORT DATE (DD

  6. Reticular V2O5·0.6H2O Xerogel as Cathode for Rechargeable Potassium Ion Batteries.

    Science.gov (United States)

    Tian, Bingbing; Tang, Wei; Su, Chenliang; Li, Ying

    2018-01-10

    Potassium ion batteries (KIBs), because of their low price, may exhibit advantages over lithium ion batteries as potential candidates for large-scale energy storage systems. However, owing to the large ionic radii of K-ions, it is challenging to find a suitable intercalation host for KIBs and thus the rechargeable KIB electrode materials are still largely unexplored. In this work, a reticular V 2 O 5 ·0.6H 2 O xerogel was synthesized via a hydrothermal process as a cathode material for rechargeable KIBs. Compared with the orthorhombic crystalline V 2 O 5 , the hydrated vanadium pentoxide (V 2 O 5 ·0.6H 2 O) exhibits the ability of accommodating larger alkali metal ions of K + because of the enlarged layer space by hosting structural H 2 O molecules in the interlayer. By intercalation of H 2 O into the V 2 O 5 layers, its potassium electrochemical activity is significantly improved. It exhibits an initial discharge capacity of ∼224.4 mA h g -1 and a discharge capacity of ∼103.5 mA h g -1 even after 500 discharge/charge cycles at a current density of 50 mA g -1 , which is much higher than that of the V 2 O 5 electrode without structural water. Meanwhile, X-ray diffraction and X-ray photoelectron spectroscopy combined with energy dispersive spectroscopy techniques are carried out to investigate the potassiation/depotassiation process of the V 2 O 5 ·0.6H 2 O electrodes, which confirmed the potassium intercalation storage mechanisms of this hydrated material. The results demonstrate that the interlayer-spacing-enlarged V 2 O 5 ·0.6H 2 O is a promising cathode candidate for KIBs.

  7. Direct electrons at the CERN ISR. II. A study of the transverse momentum dependence above 0.6 GeV/c

    International Nuclear Information System (INIS)

    Buesser, F.W.; Camilleri, L.; Di Lella, L.

    1975-01-01

    The previously reported observation of direct electrons produced in proton-proton collisions at the CERN ISR was extended to transverse moments, p*/sub T/, as low as 0.6 GeV/c. The ratio of electron to pion cross sections seems to rise as p*/sub T/ is decreased. It increases by at most a factor of 2 between p*/sub T/ of 2 and 0.6 GeV/c. Results on the s-dependence of this ratio and on correlated charged particles are presented for p*/sub T/ greater than or equal to 1 GeV/c in another work

  8. Sustainable NREL - Site Sustainability Plan FY 2015

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2015-01-01

    NREL's Site Sustainability Plan FY 2015 reports on sustainability plans for the lab for the year 2015 based on Executive Order Goals and provides the status on planned actions cited in the FY 2014 report.

  9. FAKTOR-FAKTOR YANG BERHUBUNGAN DENGAN PEMBERIAN MP-ASI PADA BAYI USIA 0-6 BULAN DI BPM NURTILA PALEMBANG

    Directory of Open Access Journals (Sweden)

    Rahmalia Afriyani

    2016-09-01

    Full Text Available WHO dan UNICEFmerekomendasikan standar emas pemberian makan pada bayi  yaitu  menyusui bayi secara eksklusif sejak lahir sampai dengan umur 6 bulan didahului dengan Inisiasi Menyusu Dini (IMD segera setelah lahir, mulai umur 6 bulan berikan Makanan Pendamping ASI (MP-ASI. Tujuan penelitian ini adalah diketahuinya faktor-faktor yang berhubungan dengan pemberian MP-ASI pada bayi usia 0-6 bulan di BPM Nurtila Palembang tahun 2016.Desain penelitian kuantitatif bersifat survei analitik dengan pendekatan cross sectional. Populasi dalam penelitian ini adalah semua ibu yang memiliki bayi usia >6 bulan yang datang ke BPM Nurtila Palembang pada tanggal 17 Mei-11 Juni 2016, pengambilan sampel dilakukan secara accidental sampling dengan jumlah sampel sebanyak 30 orang dan alat ukur yang digunakan adalah kuesioner. Analisis data meliputi univariat dan bivariat dengan menggunakan uji chi-square. Hasil uji statistik didapatkan bahwa terdapat hubungan antara pendidikan ibu (p-value=0,034 dan OR=8,000, pendapatan keluarga (p-value=0,018 dan OR=13,750, dukungan keluarga (p-value=0,003; OR=3,500 dan tradisi (p-value=0,004 dan OR=16,000 dengan pemberian MP-ASI pada bayi usia 0-6 bulan di BPM Nurtila Palembang tahun 2016.

  10. Environmental management compliance reengineering project, FY 1997 report

    International Nuclear Information System (INIS)

    VanVliet, J.A.; Davis, J.N.

    1997-09-01

    Through an integrated reengineering effort, the Idaho National Engineering and Environmental Laboratory (INEEL) is successfully implementing process improvements that will permit safe and compliant operations to continue during the next 5 years, even though $80 million was removed from the Environmental Management (EM) program budget. A 2-year analysis, design, and implementation project will reengineer compliance-related activities and reduce operating costs by approximately $17 million per year from Fiscal Year (FY) 1998 through 2002, while continuing to meet the INEEL''s environment, safety, and health requirements and milestone commitments. Compliance reengineer''s focus is improving processes, not avoiding full compliance with environmental, safety, and health laws. In FY 1997, compliance reengineering used a three-phase approach to analyze, design, and implement the changes that would decrease operating costs. Implementation for seven specific improvement projects was completed in FY 1997, while five projects will complete implementation in FY 1998. During FY 1998, the three-phase process will be repeated to continue reengineering the INEEL

  11. Environmental management compliance reengineering project, FY 1997 report

    Energy Technology Data Exchange (ETDEWEB)

    VanVliet, J.A.; Davis, J.N.

    1997-09-01

    Through an integrated reengineering effort, the Idaho National Engineering and Environmental Laboratory (INEEL) is successfully implementing process improvements that will permit safe and compliant operations to continue during the next 5 years, even though $80 million was removed from the Environmental Management (EM) program budget. A 2-year analysis, design, and implementation project will reengineer compliance-related activities and reduce operating costs by approximately $17 million per year from Fiscal Year (FY) 1998 through 2002, while continuing to meet the INEEL`s environment, safety, and health requirements and milestone commitments. Compliance reengineer`s focus is improving processes, not avoiding full compliance with environmental, safety, and health laws. In FY 1997, compliance reengineering used a three-phase approach to analyze, design, and implement the changes that would decrease operating costs. Implementation for seven specific improvement projects was completed in FY 1997, while five projects will complete implementation in FY 1998. During FY 1998, the three-phase process will be repeated to continue reengineering the INEEL.

  12. Projected Benefits of Federal Energy Efficiency and Renewable Energy Programs: FY 2006 Budget Request

    Energy Technology Data Exchange (ETDEWEB)

    Norland, D.; Jenkin, T.

    2005-05-01

    The Office of Energy Efficiency and Renewable Energy (EERE) of the U.S. Department of Energy (DOE) leads the Federal Government's efforts to provide reliable, affordable, and environmentally sound energy for America, through its 11 research, development, demonstration, and deployment (RDD&D) programs. EERE invests in high-risk, high-value research and development (R&D) that, conducted in partnership with the private sector and other government agencies, accelerates the development and facilitates the deployment of advanced clean energy technologies and practices. EERE designs its RDD&D activities to improve the Nation's readiness for addressing current and future energy needs. This document summarizes the results of the benefits analysis of EERE's programs, as described in the FY 2006 Budget Request. EERE has adopted a benefits framework developed by the National Research Council (NRC) to represent the various types of benefits resulting from the energy efficiency technology improvements and renewable energy technology development supported by EERE programs. Specifically, EERE's benefits analysis focuses on three main categories of energy-linked benefits--economic, environmental, and security.

  13. Possible production of glueballs in anti p-4He reactions at 0.6 GeV/c incident momentum

    International Nuclear Information System (INIS)

    Breivik, F.O.; Haatuft, A.; Halsteinslid, A.

    1990-08-01

    A fairly sharp peak at 1150 MeV/c 2 in the π - π + π - π + - system in the final state of anti p He-reactions at 0.6 GeV/c incident momentum is seen. The four-pion system may have spin = 0 or 2, which are possible spins of a glueball. 6 refs., 15 figs

  14. Enhanced surveillance program FY97 accomplishments. Progress report

    Energy Technology Data Exchange (ETDEWEB)

    Mauzy, A. [ed.; Laake, B. [comp.

    1997-10-01

    This annual report is one volume of the Enhanced Surveillance Program (ESP) FY97 Accomplishments. The complete accomplishments report consists of 11 volumes. Volume 1 includes an ESP overview and a summary of selected unclassified FY97 program highlights. Volume 1 specifically targets a general audience, reflecting about half of the tasks conducted in FY97 and emphasizing key program accomplishments and contributions. The remaining volumes of the accomplishments report are classified, organized by program focus area, and present in technical detail the progress achieved in each of the 104 FY97 program tasks. Focus areas are as follows: pits; high explosives; organics; dynamics; diagnostics; systems; secondaries; nonnuclear materials; nonnuclear components; and Surveillance Test Program upgrades.

  15. Stratus Ocean Reference Station (20 deg S, 85 deg W) Mooring Recovery and Deployment Cruise, R/V Ronald H. Brown Cruise 06-07, October 9-October 27, 2006

    National Research Council Canada - National Science Library

    Bigorre, Sebastien; Weller, Robert; Lord, Jeff; Whelan, Sean; Galbraith, Nancy; Wolfe, Dan; Bariteau, Ludovic; Ghate, Virendra; Zajaczkovski, Uriel; Vera, Alvaro

    2007-01-01

    .... During the October 2006 cruise of NOAA's R/V Ronald H. Brown to the ORS Stratus site, the primary activities where recovery of the Stratus 6 WHOI surface mooring that had been deployed in October...

  16. Federal Research and Development Funding: FY2014

    Science.gov (United States)

    2014-02-19

    1.12 billion for FY2014. The FY2014 request proposed $155 million to replace the agency’s Southeast Poultry Disease Research Laboratory in Athens...formula funding, and special grants. 94 U.S. Department of Agriculture, “Statement by Thomas J

  17. Oxygen transport in La0.6Sr0.4Co1-yFeyO3-d

    NARCIS (Netherlands)

    Bouwmeester, Henricus J.M.; den Otter, M.W.; Boukamp, Bernard A.

    2004-01-01

    The surface exchange coefficient and chemical diffusion coefficient of oxygen for the perovskites La0.6Sr0.4Co1–yFeyO3–delta (y=0.2, 0.5 and 0.8) were measured using the conductivity relaxation technique. Measurements were performed between 600 and 800 °C in an oxygen partial pressure range between

  18. Accelerator/Experiment operations - FY 2006

    Energy Technology Data Exchange (ETDEWEB)

    Brice, S.; Conrad, J.; Denisov, D.; Ginther, G.; Holmes, S.; James, C.; Lee, W.; Louis, W.; Moore, C.; Plunkett, R.; Raja, R.; /Fermilab

    2006-10-01

    This Technical Memorandum (TM) summarizes the Fermilab accelerator and experiment operations for FY 2006. It is one of a series of annual publications intended to gather information in one place. In this case, the information concerns the FY 2006 Run II at the Tevatron Collider, the MiniBooNE experiments running in the Booster Neutrino Beam in neutrino and antineutrino modes, MINOS using the Main Injector Neutrino Beam (NuMI), and SY 120 activities.

  19. The stepwise discriminant algorithm for snow cover mapping based on FY-3/MERSI data

    Science.gov (United States)

    Han, Tao; Wang, Dawei; Jiang, Youyan; Wang, Xiaowei

    2013-10-01

    Medium Resolution Spectral Imager (MERSI) on board China's new generation polar orbit meteorological satellite FY- 3A provides a new data source for snow monitoring in large area. As a case study, the typical snow cover of Qilian Mountains in northwest China was selected in this paper to develop the algorithm to map snow cover using FY- 3A/MERSI. By analyzing the spectral response characteristics of snow and other surface elements, as well as each channel image quality on FY-3A/MERSI, the widely used Normalized Difference Snow Index (NDSI) was defined to be computed from channel 2 and channel 7 for this satellite data. Basing on NDSI, a tree-structure prototype version of snow identification model was proposed, including five newly-built multi-spectral indexes to remove those pixels such as forest, cloud shadow, water, lake ice, sand (salty land), or cloud that are usually confused with snow step by step, especially, a snow/cloud discrimination index was proposed to eliminate cloud, apart from use of cloud mask product in advance. Furthermore, land cover land use (LULC) image has been adopted as auxiliary dataset to adjust the corresponding LULC NDSI threshold constraints for snow final determination and optimization. This model is composed as the core of FY-3A/MERSI snow cover mapping flowchart, to produce daily snow map at 250m spatial resolution, and statistics can be generated on the extent and persistence of snow cover in each pixel for time series maps. Preliminary validation activities of our snow identification model have been undertaken. Comparisons of the 104 FY- 3A/MERSI snow cover maps in 2010-2011 snow season with snow depth records from 16 meteorological stations in Qilian Mountains region, the sunny snow cover had an absolute accuracy of 92.8%. Results of the comparison with the snow cover identified from 6 Terra/MODIS scenes showed that they had consistent pixels about 85%. When the two satellite resultant snow cover maps compared with the 6

  20. Women and men in education services: comparison of gender representation in Italian pre-school (0-6 services.

    Directory of Open Access Journals (Sweden)

    Rosy Nardone

    2014-12-01

    Full Text Available This contribution presents a part of the results of the research project entitled “Stereotipi di genere, relazioni educative e infanzie” (“Gender stereotypes, educational relationships and childhood" conducted between 2010 and 2012 by a group of researchers from the CSGE (Gender and Education Study Centre of the University of Bologna, funded by the Emilia-Romagna Region. The research aimed to measure the ideas and representations of gender and the gender relations among adults who are educationally significant for preschool children (0-6 years, and to develop widespread reflection on the issue of the stereotyped images of female and male identity that still exist and are transmitted from a very early age. This article particularly focuses on the analysis developed on gender representations in educational services 0-6 years by the professionals working in the centres involved, relating quantitative data with the considerations that emerged from the focus groups, about the female and male in education.

  1. Influence of synthesis route on morphology and electrical properties of LaNi{sub 0.6}Fe{sub 0.4}O{sub 3}

    Energy Technology Data Exchange (ETDEWEB)

    Bevilacqua, M.; Montini, T.; Tavagnacco, C.; Vicario, G.; Fornasiero, P.; Graziani, M. [Chemistry Department and Centre of Excellence for Nanostructured Materials, University of Trieste and INSTM (Italy)

    2006-11-15

    Recently LaNi{sub 1-x}Fe{sub x}O{sub 3} materials have been suggested as good candidates for cathodes for Intermediate Temperature Solid Oxide Fuel Cells. The electrical conductivity and the morphology of LaNi{sub 0.6}Fe{sub 0.4}O{sub 3} samples have been studied as a function of preparation route and calcination temperature. The conductivity, mainly electronic, strongly depends on the densification of the material, which is influenced by the preparation procedure. DFT calculations indicate that the conduction bands of LaNi{sub 0.6}Fe{sub 0.4}O{sub 3} are mainly made up of Fe and Ni 3d states and that there is a small bandwidth (2.3 eV) around the Fermi level. Moreover, a small polaron mechanism for the electronic conduction in this material is suggested by the simulations. Three different preparation methods have been investigated: the glycine-nitrate process, the gel-citrate complexation route and the coprecipitation route. The glycine-nitrate synthesis produces non-homogenous LaNi{sub 0.6}Fe{sub 0.4}O{sub 3} materials. Good specific conductivity is obtained only after high temperature treatments that homogenise and sinter the material. The gel-citrate complexation route leads to homogenous LaNi{sub 0.6}Fe{sub 0.4}O{sub 3} samples, which however are resistant to sinterization/densification. Finally, homogenous LaNi{sub 0.6}Fe{sub 0.4}O{sub 3} is obtained with coprecipitation synthesis. This synthesis is particularly promising since the morphology of the obtained precipitate favours the sinterization at low temperatures. These temperatures are low enough to prevent the undesirable reaction with ZrO{sub 2}-based electrolyte. (author)

  2. FAKTOR-FAKTOR YANG BERHUBUNGAN DENGAN PEMBERIAN MP-ASI PADA BAYI USIA 0-6 BULAN DI BPM NURTILA PALEMBANG

    OpenAIRE

    Rahmalia Afriyani; Shintya Halisa; Hetty Rolina

    2016-01-01

    WHO dan UNICEFmerekomendasikan standar emas pemberian makan pada bayi  yaitu  menyusui bayi secara eksklusif sejak lahir sampai dengan umur 6 bulan didahului dengan Inisiasi Menyusu Dini (IMD) segera setelah lahir, mulai umur 6 bulan berikan Makanan Pendamping ASI (MP-ASI). Tujuan penelitian ini adalah diketahuinya faktor-faktor yang berhubungan dengan pemberian MP-ASI pada bayi usia 0-6 bulan di BPM Nurtila Palembang tahun 2016.Desain penelitian kuantitatif bersifat survei analitik dengan pe...

  3. SOLID WASTE INTEGRATED FORECAST TECHNICAL (SWIFT) REPORT FY2003 THRU FY2046 VERSION 2003.1 VOLUME 2 [SEC 1 & 2

    Energy Technology Data Exchange (ETDEWEB)

    BARCOT, R.A.

    2003-12-01

    This report includes data requested on September 10, 2002 and includes radioactive solid waste forecasting updates through December 31, 2002. The FY2003.0 request is the primary forecast for fiscal year FY 2003.

  4. What pre-deployment and early post-deployment factors predict health function after combat deployment?: a prospective longitudinal study of Operation Enduring Freedom (OEF)/Operation Iraqi Freedom (OIF) soldiers.

    Science.gov (United States)

    McAndrew, Lisa M; D'Andrea, Elizabeth; Lu, Shou-En; Abbi, Bhavna; Yan, Grace W; Engel, Charles; Quigley, Karen S

    2013-04-30

    Physical and mental function are strong indicators of disability and mortality. OEF/OIF Veterans returning from deployment have been found to have poorer function than soldiers who have not deployed; however the reasons for this are unknown. A prospective cohort of 790 soldiers was assessed both pre- and immediately after deployment to determine predictors of physical and mental function after war. On average, OEF/OIF Veterans showed significant declines in both physical (t=6.65, pfunction (t=7.11, pdeployment function, poorer physical function after deployment was associated with older age, more physical symptoms, blunted systolic blood pressure reactivity and being injured. After controlling for pre-deployment function, poorer mental function after deployment was associated with younger age, lower social desirability, lower social support, greater physical symptoms and greater PTSD symptoms. Combat deployment was associated with an immediate decline in both mental and physical function. The relationship of combat deployment to function is complex and influenced by demographic, psychosocial, physiological and experiential factors. Social support and physical symptoms emerged as potentially modifiable factors.

  5. General Counsel`s office FY 1995 site support program plan WBS 6.10.5

    Energy Technology Data Exchange (ETDEWEB)

    Moreno, S.R.

    1994-09-01

    The General Counsel`s office provides legal counsel to all levels of WHC management; administers the intellectual property program; coordinates all WHC investigative activity and supports WHC activities to ensure compliance with all applicable federal, state, and local laws, DOE directives, contractual provisions, and other requirements. In so doing, the Office of General Counsel supports the Hanford site mission of transforming the Hanford site into an environmentally attractive and economically sustainable community. This document briefs the FY95 site support plan.

  6. Comparison between La0.6Sr0.4CoO3-d and LaNi0.6Co0.4O3-d infiltrated oxygen electrodes for long-term durable solid oxide fuel cells

    DEFF Research Database (Denmark)

    Ovtar, Simona; Hauch, Anne; Veltzé, Sune

    2018-01-01

    The degradation of infiltrated oxygen electrodes during long-term operation of solid oxide fuel cells (SOFCs) was studied. The infiltrated oxygen electrodes were prepared by infiltration of the electro-catalysts La0.6Sr0.4CoO3-d (LSC) and LaNi0.6Co0.4O3-d (LCN) into a porous yttria stabilized...... conducted and the change of resistance was followed by electrochemical impedance spectroscopy under current load. The cell performance degradation profiles of the LSC and LCN infiltrated cells showed significant differences. The performance of the LSC infiltrated cell stabilized after 700 h of operation...

  7. Aggression by Children Exposed to IPV: Exploring the Role of Child Depressive Symptoms, Trauma-Related Symptoms, & Warmth in Family Relationships.

    Science.gov (United States)

    Piotrowski, Caroline C; Cameranesi, Margherita

    2018-06-01

    Multi-informant reports of aggression by siblings in families with and without a history of IPV were compared. Associations between aggressive behavior and child depressive and trauma-related symptoms, as well as maternal and sibling warmth were also explored. Mothers, observers and the siblings themselves reported on aggressive behaviour. Mothers reported on child trauma-related symptoms while children provided self-report on depressive symptoms and mother-child and sibling warmth. The frequency of observed aggression did not differ across groups on average, although more sibling dyads exposed to IPV engaged in aggression than those not exposed. Child reports of sibling aggression did not differ across groups but mothers reported significantly less aggressive behavior by children exposed to IPV than those not exposed. Regression results indicated that depressive and trauma-related symptoms were significant risk factors for aggression, while the role of mother-child and sibling warmth was more complex. Results were discussed within a developmental psychopathology framework.

  8. Annual Progress Report FY-82. Volume I.

    Science.gov (United States)

    1982-01-01

    Comparison of Binaural Versus 316 Monaural Amplification. (FY-81PI) 2535 Development of Method for Generating 318 Individualized Aural Rehabilitation...Oncology Group. 428 (FY-74 I ) 4116 The Evaluation of Petal Systolic Time Intervals 429 and Beat interval Variation in Fetal heart Rate as Early

  9. Hanford Diversification and the Tri-Cities Economy FY 1999

    Energy Technology Data Exchange (ETDEWEB)

    SCOTT, M.J.

    2000-06-05

    The missions of the U.S. Department of Energy's Richland Operations Office (DOE/RL) are to safely manage the Hanford Site, to manage and clean up its legacy wastes, and to develop and deploy new science and technology in the environmental and energy fields. Collectively, DOE/RL and its contractors are the most important single entity in the Tri-Cities local economy (Pasco, Kennewick, and Richland, Washington, and the surrounding area). Although the relevant economic region affected by DOE/RL and its contractors actually embraces a geographic area reaching from Yakima in the west to Walla Walla in the east and from Moses Lake in the north to Pendleton, Oregon, in the south, over 90% of economic impacts likely occur in Benton and Franklin Counties. These two counties are defined as the ''local'' Tri-Cities economy for purposes of this study. In the federal fiscal year (FY) 1999 (October 1, 1998 through September 30, 1999), the total impact of DOE'S local $1.59 billion budget was felt through payrolls of $542 million and local purchases of goods and services of $226 million. The total local spending of $768 million was up slightly from the FY 1998 total of $765 million. Taking into account the multiplier effects of this spending, the DOE/RL budget sustained an estimated 32% of all local employment (28,250 out of 88,100 jobs) and about 35% of local earned income (almost $1.08 billion out of $3.08 billion). The decrease in these percentages from last year's report reflects an update of the model's economic structure based on the 1997 economic census year, a correction of a programming error in the model found during the update, and a broader definition of earnings that includes proprietor income, not just wages (see the Appendix for revisions to the previous forecasts). DOE budget increases in FY 2000 are expected to result in no change to the number of local DOE contractor jobs and about a $29 million increase in direct local

  10. Summary of BISON Development and Validation Activities - NEAMS FY16 Report

    Energy Technology Data Exchange (ETDEWEB)

    Williamson, R. L. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Pastore, G. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Gamble, K. A. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Spencer, B. W. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Casagranda, A. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Folsom, C. P. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Liu, W. [ANATECH Corp., San Diego, CA (United States); Veearaghavan, S. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Novascone, S. R. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Gardner, R. J. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Hales, J. D. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-09-01

    This summary report contains an overview of work performed under the work package en- titled “FY2016 NEAMS INL-Engineering Scale Fuel Performance (BISON)” A first chapter identifies the specific FY-16 milestones, providing a basic description of the associated work and references to related detailed documentation. Where applicable, a representative technical result is provided. A second chapter summarizes major additional accomplishments, which in- clude: 1) publication of a journal article on solution verification and validation of BISON for LWR fuel, 2) publication of a journal article on 3D Missing Pellet Surface (MPS) analysis of BWR fuel, 3) use of BISON to design a unique 3D MPS validation experiment for future in- stallation in the Halden research reactor, 4) participation in an OECD benchmark on Pellet Clad Mechanical Interaction (PCMI), 5) participation in an OECD benchmark on Reactivity Insertion Accident (RIA) analysis, 6) participation in an OECD activity on uncertainity quantification and sensitivity analysis in nuclear fuel modeling and 7) major improvements to BISON’s fission gas behavior models. A final chapter outlines FY-17 future work.

  11. Summary of BISON Development and Validation Activities - NEAMS FY16 Report

    International Nuclear Information System (INIS)

    Williamson, R. L.; Pastore, G.; Gamble, K. A.; Spencer, B. W.; Casagranda, A.; Folsom, C. P.; Liu, W.; Veearaghavan, S.; Novascone, S. R.; Gardner, R. J.; Hales, J. D.

    2016-01-01

    This summary report contains an overview of work performed under the work package en- titled “FY2016 NEAMS INL-Engineering Scale Fuel Performance (BISON)” A first chapter identifies the specific FY-16 milestones, providing a basic description of the associated work and references to related detailed documentation. Where applicable, a representative technical result is provided. A second chapter summarizes major additional accomplishments, which in- clude: 1) publication of a journal article on solution verification and validation of BISON for LWR fuel, 2) publication of a journal article on 3D Missing Pellet Surface (MPS) analysis of BWR fuel, 3) use of BISON to design a unique 3D MPS validation experiment for future in- stallation in the Halden research reactor, 4) participation in an OECD benchmark on Pellet Clad Mechanical Interaction (PCMI), 5) participation in an OECD benchmark on Reactivity Insertion Accident (RIA) analysis, 6) participation in an OECD activity on uncertainity quantification and sensitivity analysis in nuclear fuel modeling and 7) major improvements to BISON’s fission gas behavior models. A final chapter outlines FY-17 future work.

  12. FY1983 HTGR summary level program plan

    International Nuclear Information System (INIS)

    1983-01-01

    The major focus and priority of the FY1983 HTGR Program is the development of the HTGR-SC/C Lead Project through one of the candidate lead utilities. Accordingly, high priority will be given to work described in WBS 04 for site and user specific studies toward the development of the Lead Project. Asessment of advanced HTGR systems will continue during FY1983 in accordance with the High Temperature Process Heat (HTPH) Concept Evaluation Plan. Within the context of that plan, the assessment of the monolithic HTPH concepts has been essentially completed in FY1982 and FY1983 activities and will be limited to documentation only. the major advanced HTGR systems efforts in FY1983 will be focused on the further definition of the Modular Reactor Systems concepts in both the reforming (MRS-R) and Steam Cycle/Cogeneration 9MRS-SC/C) configurations in WBS 41. The effort will concentrate upon key technical issues and trade studies oriented to reduction in expected cost and schedule duration. With regard to the latter, the most significant will be trade study addressing the degree of modularization of reactor plant structures. particular attention will be given to the confinement building which currently defines the critical path for construction

  13. Validation test of advanced technology for IPV nickel-hydrogen flight cells: Update

    Science.gov (United States)

    Smithrick, John J.; Hall, Stephen W.

    1992-01-01

    Individual pressure vessel (IPV) nickel-hydrogen technology was advanced at NASA Lewis and under Lewis contracts with the intention of improving cycle life and performance. One advancement was to use 26 percent potassium hydroxide (KOH) electrolyte to improve cycle life. Another advancement was to modify the state-of-the-art cell design to eliminate identified failure modes. The modified design is referred to as the advanced design. A breakthrough in the low-earth-orbit (LEO) cycle life of IPV nickel-hydrogen cells has been previously reported. The cycle life of boiler plate cells containing 26 percent KOH electrolyte was about 40,000 LEO cycles compared to 3,500 cycles for cells containing 31 percent KOH. The boiler plate test results are in the process of being validated using flight hardware and real time LEO testing at the Naval Weapons Support Center (NWSC), Crane, Indiana under a NASA Lewis Contract. An advanced 125 Ah IPV nickel-hydrogen cell was designed. The primary function of the advanced cell is to store and deliver energy for long-term, LEO spacecraft missions. The new features of this design are: (1) use of 26 percent rather than 31 percent KOH electrolyte; (2) use of a patented catalyzed wall wick; (3) use of serrated-edge separators to facilitate gaseous oxygen and hydrogen flow within the cell, while still maintaining physical contact with the wall wick for electrolyte management; and (4) use of a floating rather than a fixed stack (state-of-the-art) to accommodate nickel electrode expansion due to charge/discharge cycling. The significant improvements resulting from these innovations are: extended cycle life; enhanced thermal, electrolyte, and oxygen management; and accommodation of nickel electrode expansion. The advanced cell design is in the process of being validated using real time LEO cycle life testing of NWSC, Crane, Indiana. An update of validation test results confirming this technology is presented.

  14. Federal Research and Development Funding: FY2010

    Science.gov (United States)

    2010-01-12

    Foundation, “Transformative Research: The Artistry and Alchemy of the 21st Century,” remarks, Texas Academy of Medicine, Engineering and Science Fourth Annual...Administration’s budget and both House and Senate bills. Financing for the Technology Innovation Program (TIP) is budgeted at $69.9 million, an increase...would have increased 13.3% to $534.6 million. The Manufacturing Extension Program received $124.7 million, 13.4% more than FY2009, while financing for

  15. Integral Fast Reactor Program. Annual progress report, FY 1992

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Y.I.; Walters, L.C.; Laidler, J.J.; Pedersen, D.R.; Wade, D.C.; Lineberry, M.J.

    1993-06-01

    This report summarizes highlights of the technical progress made in the Integral Fast Reactor (IFR) Program in FY 1992. Technical accomplishments are presented in the following areas of the IFR technology development activities: (1) metal fuel performance, (2) pyroprocess development, (3) safety experiments and analyses, (4) core design development, (5) fuel cycle demonstration, and (6) LMR technology R&D.

  16. Waste Generation Forecast for DOE-ORO's Environmental Restoration OR-1 Project: FY 1994--FY 2001

    International Nuclear Information System (INIS)

    1993-12-01

    This Waste Generation Forecast for DOE-ORO's Environmental Restoration OR-1 Project. FY 1994--FY 2001 is the third in a series of documents that report current estimates of the waste volumes expected to be generated as a result of Environmental Restoration activities at Department of Energy, Oak Ridge Operations Office (DOE-ORO), sites. Considered in the scope of this document are volumes of waste expected to be generated as a result of remedial action and decontamination and decommissioning activities taking place at these sites. Sites contributing to the total estimates make up the DOE-ORO Environmental Restoration OR-1 Project: the Oak Ridge K-25 Site, the Oak Ridge National Laboratory, the Y-12 Plant, the Paducah Gaseous Diffusion Plant, the Portsmouth Gaseous Diffusion Plant, and the off-site contaminated areas adjacent to the Oak Ridge facilities (collectively referred to as the Oak Ridge Reservation Off-Site area). Estimates are available for the entire fife of all waste generating activities. This document summarizes waste estimates forecasted for the 8-year period of FY 1994-FY 2001. Updates with varying degrees of change are expected throughout the refinement of restoration strategies currently in progress at each of the sites. Waste forecast data are relatively fluid, and this document represents remediation plans only as reported through September 1993

  17. Summary of FY 17 Assessments Sandia National Laboratories: Evaluation of FY16 SNL FCT M2 Milestone Deliverables

    Energy Technology Data Exchange (ETDEWEB)

    Appel, Gordon John

    2017-03-01

    This report is the milestone deliverable M4FT-17SN111102091 “Summary of Assessments Performed FY17 by SNL QA POC” for work package FT-17SN11110209 titled “Quality Assurance – SNL”. This report summarizes the FY17 assessment performed on Fuel Cycle Technologies / Spent Fuel and Waste Disposition efforts.

  18. Perovskite oxides La0.4Sr0.6CoxMn1-xO3 (x = 0, 0.2, 0.4 as an effective electrocatalyst for lithium—air batteries

    Directory of Open Access Journals (Sweden)

    Yajun Zhao

    2018-01-01

    Full Text Available Co-doped perovskite oxide La0.4Sr0.6CoxMn1-xO3 (x = 0, 0.2, 0.4 composites are prepared by sol–gel method utilizing citric acid as chelating agent. These composites show good catalytic activities when tested as catalysts rechargeable lithium—air batteries. In particular, the La0.4Sr0.6Co0.4Mn0.6O3 shows a lower potential gap. When these samples are tested as catalysts for Li—air batteries at a current density of 100 mA g−1, the discharge capacities with different La0.4Sr0.6CoxMn1-xO3 (x = 0, 0.2, 0.4 catalysts are 5819, 6420, and 7227 mA h g−1, respectively. In addition, under a capacity limitation of 1000 mA h g−1, the cell using La0.4Sr0.6Co0.4Mn0.6O3 as catalyst shows good cycling stability up to 46 cycles. The good electrochemical performance suggests that suitable doping of Co in Mn site of La0.4Sr0.6MnO3 could be a promising route to improve the catalytic activity.

  19. Strain driven anisotropic magnetoresistance in antiferromagnetic La$_{0.4}$Sr$_{0.6}$MnO$_{3}$

    OpenAIRE

    Wong, A. T.; Beekman, C.; Guo, H.; Siemons, W.; Gai, Z.; Arenholz, E.; Takamura, Y.; Ward, T. Z.

    2014-01-01

    We investigate the effects of strain on antiferromagnetic (AFM) single crystal thin films of La 1-x Sr x MnO 3 (x = 0.6). Nominally unstrained samples have strong magnetoresistance with anisotropic magnetoresistances (AMR) of up to 8%. Compressive strain suppresses magnetoresistance but generates AMR values of up to 63%. Tensile strain presents the only case of a metal-insulator transition and demonstrates a previously unreported AMR behavior. In all three cases, we find evidence of magnetic...

  20. Microstructure and Mechanical Properties of Mg-11Li-6Zn-0.6Zr-0.4Ag-0.2Ca-x Y Alloys.

    Science.gov (United States)

    Kim, Yong-Ho; Yoo, Hyo-Sang; Son, Hyeon-Taek

    2018-09-01

    Magnesium and its alloys are potential candidates for many automotive and aerospace applications due to their low density and high specific strength. However, the use of magnesium as wrought products is limited because of its poor workability at ambient temperatures. Mg-Li alloys containing 5-11 wt.% Li exhibit a two-phase structure consisting of a α (hcp) Mg-rich phase and a β (bcc) Li-rich phase. Mg-Li alloys with Li content greater than 11 wt.% exhibit a single-phase structure consisting of only the β phase. In the present study, we studied the effects of Y addition on the microstructure and mechanical properties of Mg-11Li-6Zn-0.6Zr-0.4Ag-0.2Ca based alloys. The melt was maintained at 720 °C for 20 min and poured into a mold. Then, the as-cast Mg alloys were homogenized at 350 °C for 4 h and were hot-extruded onto a 4-mm-thick plate with a reduction ratio of 14:1. The as-cast Mg-11Li-6Zn-0.6Zr-0.4Ag-0.2Ca-xY (x 0, 1, 3, and 5 wt.%) alloys were composed of α-Mg, β-Li, γ-Mg2Zn3Li, I-Mg3YZn6, W-Mg3Y2Zn3, and X-Mg12YZn phases. By increasing the Y content from 0 to 5 wt.%, the composition of the W-Mg3Y2Zn3 phase increased. With increasing Y content, from 0 to 1, 3, and 5 wt.%, the average grain size and ultimate tensile of the as-extruded Mg alloys decreased slightly, from 8.4, to 3.62, 3.56, and 3.44 μm and from 228.92 to 215.57, 187.47, and 161.04 MPa, respectively, at room temperature.

  1. Studies on Cd1Se0.6Te0.4 Thin Films by Spectroscopic and Diffractometer Characterization

    Directory of Open Access Journals (Sweden)

    Cliff Orori Mosiori

    2017-09-01

    Full Text Available Cadmium selenide tellurium is a compound containing cadmium, tellurium and selenium elements forming a combined solid. Hall measurements suggest that it is an n-type semiconductor. Related optical studies indicate that is transparent to infra-red radiation. Structural studies clearly show that it has a wurtzite, sphalerite crystalline forms. Cadmium is a toxic heavy metal, and selenium is only toxic in large amounts or doses. By this toxicity, cadmium selenide is a known to be carcinogen to humans; however, this does not stop investigating it for optoelectronic applications. Current research has narrowed down to investigating cadmium selenide when in the form of nanoparticles. Cadmium selenide finds applications has found applications in opto-electronic devices like laser diodes, biomedical imaging, nano-sensing, high-efficiency solar cells and thin-film transistors. By chemical bath deposition, Cd1Se0.6Te0.4 thin films were grown onto glass. Tellurium was gradually introduced as an impurity and its crystalline structure and optical properties were investigated by XRD and UV-VIS spectroscopy. The main Cd1Se0.6Te0.4/glass characteristics were correlated with the conditions of growing and post-growth treatment and it was found out that films were homogeneous films with controllable thickness onto the glass substrate and suitable for n-type “sandwich” heterostructures applications. Comparison of the intensities of equivalent reflexions provided a test for the internal consistency of the measurements. Equivalent reflexions in two specimens differed on average by 1.4 % and 0.6% from the mean measured intensity, attesting to the high internal consistency of measurements from extended-face crystals. By comparison from data obtained from all samples showed their average deviation from the mean to be 0.9 %.

  2. FY 2004 Supplement to the President`s Budget

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — ...This Supplement to the Presidents Budget for Fiscal Year (FY) 2004 summarizes the NITRD agencies coordinated research activities and FY 2004 plans, as required by...

  3. ac Conductivity of mixed spinel NiAl0.7Cr0.7Fe0.6O4

    Indian Academy of Sciences (India)

    Abstract. ac Conductivity measurements are carried out across the metal to insulator transition in NiAl0.7Cr0.7Fe0.6O4. The low frequency data is analyzed using Summerfield scaling theory for hopping conductivity. The exponent of the scaling behavior has significantly different values in the conducting and insulating ...

  4. Laboratory Directed Research and Development FY 2000 Annual Progress Report

    Energy Technology Data Exchange (ETDEWEB)

    Los Alamos National Laboratory

    2001-05-01

    This is the FY00 Annual Progress report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes progress on each project conducted during FY00, characterizes the projects according to their relevance to major funding sources, and provides an index to principal investigators. Project summaries are grouped by LDRD component: Directed Research and Exploratory Research. Within each component, they are further grouped into the ten technical categories: (1) atomic, molecular, optical, and plasma physics, fluids, and beams, (2) bioscience, (3) chemistry, (4) computer science and software engineering, (5) engineering science, (6) geoscience, space science, and astrophysics, (7) instrumentation and diagnostics, (8) materials science, (9) mathematics, simulation, and modeling, and (10) nuclear and particle physics.

  5. Probing next Generation Portuguese Academic Network

    Science.gov (United States)

    Friacas, Carlos; Massano, Emanuel; Domingues, Monica; Veiga, Pedro

    2008-01-01

    Purpose: The purpose of this article is to provide several viewpoints about monitoring aspects related to recent deployments of a new technology (IPv6). Design/methodology/approach: Several views and domains were used, with a common point: the Portuguese research and education network (RCTS). Findings: A significant amount of work is yet to be…

  6. OSU Reactor Sharing Program FY 1995 annual report

    International Nuclear Information System (INIS)

    Higginbotham, J.F.

    1996-10-01

    This is the annual report of the activities supported under the Oregon State University Reactor Sharing Program, award number DE-FG06-NE38137. The beginning date for the award was September, 30, 1995 and the end date was September 29, 1996. Work conducted under this award is internally administered at the Radiation Center through a project tasking system. This allows for excellent quality control for the work which is performed from the point of initial contact, through the reactor application, project report generation and financial accounting. For the current fiscal year, FY95, the total cost of the reactor sharing program, including Radiation Center contributions, was $66,323.20 of which $40,000.00 was supplied by the DOE Reactor Sharing Program. The details of individual project costs is given in Table 1. The work performed for the individual projects are described in the brief work descriptions given in Table 2

  7. PDX experimental results in FY82

    International Nuclear Information System (INIS)

    Kaye, S.M.; Bell, M.; Bol, K.

    1983-08-01

    This report presents a detailed summary of the major experimental results of PDX in FY82 and represents the efforts of the entire PDX group. Topics covered include β-scaling and fishbone studies, fluctuations, disruptions, impurities and impurity transport, power handling, limiter conditioning, edge studies, plasma fueling, counter-injection, and diagnostic development. A less detailed version will appear as the FY82 PDX contribution to the PPPL Annual Report

  8. Scoping study to expedite development of a field deployable and portable instrument for UF6 enrichment assay

    Energy Technology Data Exchange (ETDEWEB)

    Chan, George; Valentine, John D.; Russo, Richard E.

    2017-09-14

    The primary objective of the present study is to identity the most promising, viable technologies that are likely to culminate in an expedited development of the next-generation, field-deployable instrument for providing rapid, accurate, and precise enrichment assay of uranium hexafluoride (UF6). UF6 is typically involved, and is arguably the most important uranium compound, in uranium enrichment processes. As the first line of defense against proliferation, accurate analytical techniques to determine the uranium isotopic distribution in UF6 are critical for materials verification, accounting, and safeguards at enrichment plants. As nuclear fuel cycle technology becomes more prevalent around the world, international nuclear safeguards and interest in UF6 enrichment assay has been growing. At present, laboratory-based mass spectrometry (MS), which offers the highest attainable analytical accuracy and precision, is the technique of choice for the analysis of stable and long-lived isotopes. Currently, the International Atomic Energy Agency (IAEA) monitors the production of enriched UF6 at declared facilities by collecting a small amount (between 1 to 10 g) of gaseous UF6 into a sample bottle, which is then shipped under chain of custody to a central laboratory (IAEA’s Nuclear Materials Analysis Laboratory) for high-precision isotopic assay by MS. The logistics are cumbersome and new shipping regulations are making it more difficult to transport UF6. Furthermore, the analysis is costly, and results are not available for some time after sample collection. Hence, the IAEA is challenged to develop effective safeguards approaches at enrichment plants. In-field isotopic analysis of UF6 has the potential to substantially reduce the time, logistics and expense of sample handling. However, current laboratory-based MS techniques require too much infrastructure and operator expertise for field deployment and operation. As outlined in the IAEA Department of Safeguards Long

  9. Integral Fast Reactor Program annual progress report, FY 1991

    International Nuclear Information System (INIS)

    1992-06-01

    This report summarizes highlights of the technical progress made in the Integral Fast Reactor (IFR) Program in FY 1991. Technical accomplishments are presented in the following areas of the IFR technology development activities: (1) metal fuel performance, (2) pyroprocess development, (3) safety experiments and analyses, (4) core design development, (5) fuel cycle demonstration, and (6) LMR technology R ampersand D

  10. FY10 Defense Environmental Programs Annual Report to Congress

    Science.gov (United States)

    2011-07-01

    7,412- 2019  AIR FORCE ALPENA COUNTY REGIONAL AIRPORT / MI557282890300 17 2 $6,363 $0 $862 $1,9462012 2018  FORMERLY USED DEFENSE SITES ASH FIELD...Through FY10 ($000) IRP MMRPMMRPIRP Michigan ALPENA AAF / MI59799F231100 $001 $23 ALPENA NGTR / MI59799F228900 $610 $0 ANN ARBOR NGTR / MI59799F228800

  11. Integral Fast Reactor Program. Annual progress report, FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Y.I.; Walters, L.C.; Laidler, J.J.; Pedersen, D.R.; Wade, D.C.; Lineberry, M.J.

    1994-10-01

    This report summarizes highlights of the technical progress made in the Integral Fast Reactor (IFR) Program in FY 1993. Technical accomplishments are presented in the following areas of the IFR technology development activities: (1) metal fuel performance, (2) pyroprocess development, (3) safety experiments and analyses, (4) core design development, (5) fuel cycle demonstration, and (6) LMR technology R and D.

  12. Integral Fast Reactor Program. Annual progress report, FY 1993

    International Nuclear Information System (INIS)

    Chang, Y.I.; Walters, L.C.; Laidler, J.J.; Pedersen, D.R.; Wade, D.C.; Lineberry, M.J.

    1994-10-01

    This report summarizes highlights of the technical progress made in the Integral Fast Reactor (IFR) Program in FY 1993. Technical accomplishments are presented in the following areas of the IFR technology development activities: (1) metal fuel performance, (2) pyroprocess development, (3) safety experiments and analyses, (4) core design development, (5) fuel cycle demonstration, and (6) LMR technology R and D

  13. Review of Department of Energy HEPA filter test activities, FY 1990--FY 1992

    International Nuclear Information System (INIS)

    McIntyre, J.A.

    1992-01-01

    Filter Test Facilities (FTFs) and the FTF Technical Support Group (TSG) continue to provide services to the Department of Energy (DOE). Additional tasks relating to the HEPA filter cycle have been added to the TSG. The tasks include the quality assessment review for the in-place testing of HEPA filters at DOE sites and the formation of an in-place testing standards writing group. Summary of ongoing FTFs and TSG activities for FY 1990-FY 1992 including the technical input for implementation of the High Flow Alternative Test System (HFATS), update of the DOE Standards, the status of the quality assessment review and in-place testing standards writing group are discussed

  14. National Ignition Facility (NIF) FY2015 Facility Use Plan

    Energy Technology Data Exchange (ETDEWEB)

    Folta, P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wisoff, Jeff [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-12-18

    Major features of the FY2015 NIF Use Plan include: • Performing a record number of layered DT experiments with 28 planned compared with 15 in FY2014. Executing the first plutonium experiments on the NIF in support of the Science Campaigns. • Over 300 targets shots, a 57% increase compared to FY14. This is a stretch goal defined in the 120-Day Study document, and relies upon the success of many shot-rate improvement actions, as well as on the distribution of shot type selected by the users. While the Plan is consistent with this goal, the increased proportion of layered DT experiments described above reduces the margin against this goal. • Commissioning of initial ARC capability, which will support both SSP-HED and SSPICF programs. • Increase in days allocated to Discovery Science to a level that supports an ongoing program for academic use of NIF and an annual solicitation for new proposals. • Six Facility Maintenance and Reconfiguration (FM&R) periods totaling 30 days dedicated to major facility maintenance and modifications. • Utilization of the NIF Facility Advisory Schedule Committee (FASC) to provide stakeholder review and feedback on the NIF schedule. The Use Plan assumes a total FY2015 LLNL NIF Operations funding in MTE 10.7 of $229.465M and in MTE 10.3 of 47.0M. This Use Plan will be revised in the event of significant changes to the FY2015 funding or if NNSA provides FY2016 budget guidance significantly reduced compared to FY2015.

  15. Accelerator/Experiment Operations - FY 2015

    Energy Technology Data Exchange (ETDEWEB)

    Czarapata, P. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); et al.

    2015-10-01

    This Technical Memorandum summarizes the Fermilab accelerator and experiment operations for FY 2015. It is one of a series of annual publications intended to gather information in one place. In this case, the information concerns the FY 2015 NOvA, MINOS+ and MINERvA experiments using the Main Injector Neutrino Beam (NuMI), the activities in the SciBooNE Hall using the Booster Neutrino Beam (BNB), and the SeaQuest experiment and Meson Test Beam (MTest) activities in the 120 GeV external Switchyard beam (SY120).

  16. FY16-20 Strategic Plan.

    Energy Technology Data Exchange (ETDEWEB)

    Harwell, Amber Suzanne [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2015-07-01

    Welcome to our FY16–FY20 Strategic Plan, which both refects our continued dedication to the work we do and reinforces the importance of the integrated Laboratories’ strategic framework to our future. This document is the result of the leadership team’s journey over the past few years in response to the needs of our nation. In an external environment that continues to change, sometimes in unexpected ways, it is critical that our mission areas and our foundation become increasingly synergistic, forming a whole whose parts are interdependent.

  17. Solid Waste Integrated Forecast Technical (SWIFT) Report FY 2001 to FY 2046 Volume 1

    International Nuclear Information System (INIS)

    BARCOT, R.A.

    2001-01-01

    In an effort to maintain an up-to-date Solid Waste Forecast, Fluor Hanford, Inc. requested a midyear update to the FY2001 Solid Waste Forecast collected in June 2000. Below is a list of generators reporting significant changes from the baseline FY2001 forecast, as well as approved generators previously not reporting wastes. The updated data was collected in February 2001. The cumulative effect of the changes in the near term was minor. Included in this update are waste generation maps for onsite facilities. The maps are updated annually and use the baseline forecast as a data reference

  18. Electronic structure of (La,Sr)2CuO4 and Ba0.6K0.4BiO3

    International Nuclear Information System (INIS)

    Howell, R.H.; Sterne, P.A.; Fluss, M.J.; Kaiser, J.H.; Kitazawa, K.; Kojima, H.; Mosley, W.D.; Dykes, J.W.; Shelton, R.N.

    1995-01-01

    We have measured and calculated the electron-positron momentum distribution of La 2-x Sr x CuO 4 samples for Sr concentrations of 0, 0.1,0.13, and 0.2 and Ba 0.6 K 0.4 BiO 3 . The momentum distribution of all samples contained features derived from the overlap of the positron distribution with the valence electrons. In addition, discontinuities typical of a Fermi surface are seen in the superconducting samples. The form and position of these features are in general agreement with band theory for both La 2-x Sr x CuO 4 and Ba 0.6 K 0.4 BiO 3 . However the evolution of the Fermi surface with doping in La 2-x Sr x CuO 4 differed significantly from expectations based on single electron band theories. (orig.)

  19. Hall effect in La0.6Sr0.4MnO3 thin films

    International Nuclear Information System (INIS)

    Granada, M.; Maiorov, B.; Sirena, M.; Steren, L.B.; Guimpel, J.

    2004-01-01

    We studied the temperature and thickness dependence of the transport properties of La 0.6 Sr 0.4 MnO 3 films. Hall voltage and magnetoresistance measurements on 10 and 150 nm thick films were performed with this purpose. From the ordinary Hall component, we calculated the density of carriers, which has hole-character and is systematically lower than that expected from the chemical composition of the manganite in both samples. Localization effects observed at low temperature in the resistivity of the thinner film, associated with the substrate-induced disorder, are correlated with a decrease of the density of carriers

  20. A Portable, Field-Deployable Analyzer for Isotopic Water Measurements

    Science.gov (United States)

    Berman, E. S.; Gupta, M.; Huang, Y. W.; Lacelle, D.; McKay, C. P.; Fortson, S.

    2015-12-01

    Water stable isotopes have for many years been used to study the hydrological cycle, catchment hydrology, and polar climate among other applications. Typically, discrete water samples are collected and transported to a laboratory for isotope analysis. Due to the expense and labor associated with such sampling, isotope studies have generally been limited in scope and time-resolution. Field sampling of water isotopes has been shown in recent years to provide dense data sets with the increased time resolution illuminating substantially greater short term variability than is generally observed during discrete sampling. A truly portable instrument also opens the possibility to utilize the instrument as a tool for identifying which water samples would be particularly interesting for further laboratory investigation. To make possible such field measurements of liquid water isotopes, Los Gatos Research has developed a miniaturized, field-deployable liquid water isotope analyzer. The prototype miniature liquid water isotope analyzer (mini-LWIA) uses LGR's patented Off-Axis ICOS (Integrated Cavity Output Spectroscopy) technology in a rugged, Pelican case housing for easy transport and field operations. The analyzer simultaneously measures both δ2H and δ18O from liquid water, with both manual and automatic water introduction options. The laboratory precision for δ2H is 0.6 ‰, and for δ18O is 0.3 ‰. The mini-LWIA was deployed in the high Arctic during the summer of 2015 at Inuvik in the Canadian Northwest Territories. Samples were collected from Sachs Harbor, on the southwest coast of Banks Island, including buried basal ice from the Lurentide Ice Sheet, some ice wedges, and other types of ground ice. Methodology and water analysis results from this extreme field deployment will be presented.

  1. Sandia National Laboratories Institutional Plan: FY 1999-2004

    Energy Technology Data Exchange (ETDEWEB)

    Garber, D.P.

    1999-01-06

    This Institutional Plan is the most comprehensive yearly "snapshot" available of Sandia National Laboratories' major programs, facilities, human resources, and budget. The document also includes overviews of our missions, organization, capabilities, planning functions, milestones, and accomplishments. The document's purpose is to provide the above information to the US Department of Energy, key congressional committees, Sandia management, and other present and potential customers. Chapter 2 presents information about Sandia's mission and summarizes our recent revision of Sandia's Strategic Plan. Chapter 3 presents an overview of Sandia's strategic objectives, chapter 4 lists laboratory goals and milestones for FY 1999, and chapter 5 presents our accomplishments during FY 1998. Chapters 3 through 5 are organized around our eight strategic objectives. The four primary objectives cover nuclear weapons responsibilities, nonproliferation and materials control, energy and critical infrastructures, and emerging national security threats. The major programmatic initiatives are presented in chapter 7. However, the programmatic descriptions in chapter 6 and the Associated funding tables in chapter 9 continue to be presented by DOE Budget and Reporting Code, as in previous Sandia institutional plans. As an aid to the reader, the four primary strategic objectives in chapter 3 are cross-referenced to the program information in chapter 6.

  2. 76 FR 9399 - Department of State FY10 Service Contract Inventory

    Science.gov (United States)

    2011-02-17

    ... DEPARTMENT OF STATE [Public Notice 7321] Department of State FY10 Service Contract Inventory... Contract Inventory. SUMMARY: The Department of State has publically released its Service Contract Inventory for FY10. Section 743 of Division C of the FY 2010 Consolidated Appropriations Act, Public Law 111-117...

  3. The risk for marital infidelity across a year-long deployment.

    Science.gov (United States)

    Balderrama-Durbin, Christina; Stanton, Kimberley; Snyder, Douglas K; Cigrang, Jeffrey A; Talcott, G Wayne; Smith Slep, Amy M; Heyman, Richard E; Cassidy, Daniel G

    2017-08-01

    Military deployment can create significant relationship strain. Although most couples navigate the challenges of deployment successfully, this period may render some couples more vulnerable to adverse relationship outcomes such as infidelity due to a convergence of factors including geographic separation and reduced emotional and physical intimacy. Despite anecdotal reports of increased rates of infidelity during deployment, empirical findings are lacking. This study used a prospective design to examine the prevalence and risk factors of infidelity across the deployment cycle including a year-long deployment to Iraq. A total of 63 married male Airmen were assessed both pre- and 6-9 months postdeployment. The rate of sexual infidelity prior to deployment (21%) was commensurate with the lifetime rate of sexual involvement outside the marriage in representative community samples of men. Across the deployment period, the prevalence of sexual infidelity was strikingly high (22.6%) compared with annual community estimates (1.5-4%; Allen et al., 2005). Findings demonstrated that service members with a prior history of separation, steps toward divorce, and relationship distress prior to deployment had elevated risk for infidelity over the deployment cycle. Moreover, roughly 75% of Airmen who experienced infidelity over the deployment cycle divorced by 6-9 months postdeployment whereas only 5% of service members without infidelity divorced during this same time period. Considering well-documented adverse impacts of infidelity and divorce, the current findings may assist in identifying military couples at risk for infidelity and informing targeted prevention or early intervention strategies for these couples prior to or immediately following deployment. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  4. Tank waste processing analysis: Database development, tank-by-tank processing requirements, and examples of pretreatment sequences and schedules as applied to Hanford Double-Shell Tank Supernatant Waste - FY 1993

    International Nuclear Information System (INIS)

    Colton, N.G.; Orth, R.J.; Aitken, E.A.

    1994-09-01

    This report gives the results of work conducted in FY 1993 by the Tank Waste Processing Analysis Task for the Underground Storage Tank Integrated Demonstration. The main purpose of this task, led by Pacific Northwest Laboratory, is to demonstrate a methodology to identify processing sequences, i.e., the order in which a tank should be processed. In turn, these sequences may be used to assist in the development of time-phased deployment schedules. Time-phased deployment is implementation of pretreatment technologies over a period of time as technologies are required and/or developed. The work discussed here illustrates how tank-by-tank databases and processing requirements have been used to generate processing sequences and time-phased deployment schedules. The processing sequences take into account requirements such as the amount and types of data available for the tanks, tank waste form and composition, required decontamination factors, and types of compact processing units (CPUS) required and technology availability. These sequences were developed from processing requirements for the tanks, which were determined from spreadsheet analyses. The spreadsheet analysis program was generated by this task in FY 1993. Efforts conducted for this task have focused on the processing requirements for Hanford double-shell tank (DST) supernatant wastes (pumpable liquid) because this waste type is easier to retrieve than the other types (saltcake and sludge), and more tank space would become available for future processing needs. The processing requirements were based on Class A criteria set by the U.S. Nuclear Regulatory Commission and Clean Option goals provided by Pacific Northwest Laboratory

  5. Porous La0.6Sr0.4CoO3-δ thin film cathodes for large area micro solid oxide fuel cell power generators

    DEFF Research Database (Denmark)

    Garbayo, A.; Esposito, Vincenzo; Sanna, Simone

    2014-01-01

    Porous La0.6Sr0.4CoO3-δ thin films were fabricated by pulsed laser deposition for being used as a cathode for micro solid oxide fuel cell applications as MEMS power generators. Symmetrical La0.6Sr0.4CoO3-δ/ yttria-stabilized zirconia/La0.6Sr0.4CoO3-δ free-standing membranes were fabricated using ...

  6. Defense: FY2017 Budget Request, Authorization, and Appropriations

    Science.gov (United States)

    2016-04-12

    adjusted the limits on defense and non-defense spending —each time adjusting only the limits for the two succeeding years. 13 Nevertheless, each of... employee hour worked . The Bureau of Labor Statistics reports the ECI which is computed from compensation cost data collected from a sample of jobs...with $9.6 billion in mandatory spending , brought the Administration’s total FY2017 National Defense budget request to $619.5 billion. In shaping the

  7. Geospace Plasma Dynamics Laboratory Annual Task Report (FY11)

    Science.gov (United States)

    2012-03-01

    Site Contractors: Nagendra Singh, Ph.D., Physicist , 0.5 MY Neil Grossbard, M.S., Mathematician , 0.7 MY Visitors: Publications: Articles in...PhD Project Manager Division Chief, RVB This report is published in the interest of scientific and technical...Annual Task Report (FY11) 5c. PROGRAM ELEMENT NUMBER 61102F 6. AUTHOR(S) 5d. PROJECT NUMBER 2311 Daniel Ober 5e. TASK NUMBER

  8. FY 1998 annual summary report on 6-axis, high-precision non-rotating machining systems (first year); 1998 nendo 6 jiku koseido heru kako system no kaihatsu seika hokokusho. Daiichinendo

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    This R and D program is aimed at development of high-precision systems, based on non-rotating machining, in order to improve precision of machining of curved surfaces, e.g., mold, and members of complex shapes, e.g., those for aircraft. For non-rotating machining of curved surfaces, it is necessary to continuously control attitude and sending speed of the tool, and hence to simultaneously control 6 axes of a high-speed, high-precision tool machine. New techniques, e.g., high-precision non-rotating machining, 6-axis CAM/CAE systems and high-speed, high-precision NC systems, are being developed, in order to realize the above objectives. The total systems combining these techniques are also being developed. The 6-axis, high-precision, non-rotating tool machine will be made on a trial basis, to demonstrate its practicality. The major FY 1998 results are development of a non-rotating machining tool for deep grooves (under the theme of machining techniques), development of software for cutter path generation for 6-axis non-rotating machining to confirm its validity by the tests with a commercial machine (CAD/CAM), and modification of NC for early-stage cutting tests (NC). (NEDO)

  9. FY2012 CoC Competition Grants (New and Renewal)

    Data.gov (United States)

    Department of Housing and Urban Development — This report displays the FY2012 renewal and new homeless assistance projects awarded by HUD for the FY2012 Continuum of Care (CoC) Program competition. Approximately...

  10. Planning integration FY 1996 program plan. Revision 1

    International Nuclear Information System (INIS)

    1995-09-01

    This Multi-Year Program Plan (MAP) Planning Integration Program, Work Breakdown Structure (WBS) Element 1.8.2, is the primary management tool to document the technical, schedule, and cost baseline for work directed by the US Department of Energy (DOE), Richland Operations Office (RL). As an approved document, it establishes an agreement between RL and the performing contractors for the work to be performed. It was prepared by Westinghouse Hanford Company (WHC) and Pacific Northwest Laboratory (PNL). The MYPPs for the Hanford Site programs are to provide a picture from fiscal year (FY) 1996 through FY 2002. At RL Planning and Integration Division (PID) direction, only the FY 1996 Planning Integration Program work scope has been planned and presented in this MAP. Only those known significant activities which occur after FY 1996 are portrayed in this MAP. This is due to the uncertainty of who will be accomplishing what work scope when, following the award of the Management and Integration (M ampersand I) contract

  11. Mixed Waste Management Facility, revised FY94 Plan

    International Nuclear Information System (INIS)

    Streit, R.

    1994-01-01

    This revision of the FY94 Plan incorporates changes to work during FY94 in response to the DOE request in the DOE KD-1 decision letter of June 28,1994. This letter provided guidance of both scope and budget profile in response to the Conceptual Design Report (CDR) issued by the MWMF Project in April, 1994. This work plan only addresses work for the remainder of FY94. A revised plan for the complete project is in development and will be issued separately. Since February, 1994, the MWMF Project has been operating on DOE guidance directing that work on the CDR be completed, that only other essential work be continued to maintain the project, and that costs be maintained at approximately the January, 1994 spending levels until a KD-1 decision was made. This has formed the basis for monthly reports through June, 1994. The baseline contained in this report will become the basis for reports during the remainder of FY94

  12. Hangman Restoration Project Year-End Report FY2008.

    Energy Technology Data Exchange (ETDEWEB)

    Coeur d' Alene Tribe Department of Natural Resources.

    2008-11-12

    This report covers the main goals of FY2008 from which the Work Elements were derived. The goals and products are listed by heading and the associated work elements are referenced in the text. A list of the FY2008 Work Elements is included as Appendix A. FY2008 witnessed the completion of the hntkwipn Management Plan and the first substantive efforts to restore the important habitats encompassed by the mitigation properties in the Upper Hangman Watershed. Native grasses were planted and germination was evaluated. Also, drain tiles that greatly altered the hydrologic function of the Sheep and Hangman Creek Flood Plains were removed and/or disrupted. Preparation for future restoration efforts were also made in FY2008. Designs were produced for the realignment of Sheep Creek and the decommissioning of seven drainage ditches within hntkwipn. A prioritization plan was drafted that greatly expands the area of focus for restoring native fish population in Hangman Creek.

  13. Differential Child Maltreatment Risk Across Deployment Periods of US Army Soldiers.

    Science.gov (United States)

    Taylor, Christine M; Ross, Michelle E; Wood, Joanne N; Griffis, Heather M; Harb, Gerlinde C; Mi, Lanyu; Song, Lihai; Strane, Douglas; Lynch, Kevin G; Rubin, David M

    2016-01-01

    We described the risk for maltreatment among toddlers of US Army soldiers over different deployment cycles to develop a systematic response within the US Army to provide families appropriate supports. We conducted a person-time analysis of substantiated maltreatment reports and medical diagnoses among children of 112,325 deployed US Army soldiers between 2001 and 2007. Risk of maltreatment was elevated after deployment for children of soldiers deployed once but not for children of soldiers deployed twice. During the 6 months after deployment, children of soldiers deployed once had 4.43 substantiated maltreatment reports and 4.96 medical diagnoses per 10,000 child-months. The highest maltreatment rate among children of soldiers deployed twice occurred during the second deployment for substantiated maltreatment (4.83 episodes per 10,000 child-months) and before the first deployment for medical diagnoses of maltreatment (3.78 episodes per 10,000 child-months). We confirmed an elevated risk for child maltreatment during deployment but also found a previously unidentified high-risk period during the 6 months following deployment, indicating elevated stress within families of deployed and returning soldiers. These findings can inform efforts by the military to initiate and standardize support and preparation to families during periods of elevated risk.

  14. The America COMPETES Act and the FY2009 Budget

    National Research Council Canada - National Science Library

    Stine, Deborah D

    2008-01-01

    .... An issue for Congress is whether FY2009 appropriations will. The Presidents s Office of Science and Technology Policy reports that the FY2009 budget request includes funding for America COMPETES Act initiatives at 88...

  15. FY 1992 task plans for the Hanford Environmental Dose Reconstruction Project

    International Nuclear Information System (INIS)

    1991-10-01

    Phase 1 of the HEDR Project was designed to develop and demonstrate a method for estimating radiation doses people may have received from Hanford Site operations since 1944. The method researchers developed relied on a variety of measured and reconstructed data as input to a modular computer model that generates dose estimates and their uncertainties. As part of Phase 1, researchers used the reconstructed data and computer model to calculate preliminary dose estimates for populations from limited radionuclides, in a limited geographical area and time period. Phase 1 ended in FY 1990. In February 1991, the TSP decided to shift the project planning approach away from phases--which were centered around completion of major portions of technical activities--to individual fiscal years (FYs), which span October of one year through September of the next. Therefore, activities that were previously designated to occur in phases are now designated in an integrated schedule to occur in one or more of the next fiscal years into FY 1995. Task plans are updated every 6 months. In FY 1992, scientists will continue to improve Phase 1 data and models to calculate more accurate and precise dose estimates. The plan for FY 1992 has been prepared based on activities and budgets approved by the Technical Steering Panel (TSP) at its meeting on August 19--20, 1991. The activities can be divided into four categories: (1) model and data evaluation activities, (2) additional dose estimates, (3) model and data development activities, and (4) technical and communication support. 3 figs., 2 tabs

  16. Strain driven anisotropic magnetoresistance in antiferromagnetic La0.4Sr0.6MnO3 thin films

    Science.gov (United States)

    Ward, T. Zac; Wong, A. T.; Takamura, Yayoi; Herklotz, Andreas

    2015-03-01

    Antiferromagnets (AFM) are a promising alternative to ferromagnets (FM) in spintronic applications. The reason stems from the fact that at high data storage densities stray fields could destroy FM set states while AFMs would be relatively insensitive to this data corruption. This work presents the first ever example of antiferromagnetic La0.4Sr0.6MnO3 thin films stabilized in different strain states. Strain is found to drive different types of AFM ordering, and these variations in ordering type are shown to have a profound impact on both the magnitude and character of the materials' resistive response to magnetic field direction, or anisotropic magnetoresistance (AMR) behavior (one standard of spintronic suitability). The compressively strained film shows the highest recorded AMR response in an ohmic AFM device of 63%, while the tensile strained film shows a typical AFM AMR of 0.6%. These findings demonstrate the necessity of understanding electron ordering in AFM spintronic applications and provide a new benchmark for AMR response. This work was supported by the U. S. Department of Energy, Office of Science, Basic Energy Sciences, Materials Science and Engineering Division.

  17. Repository Technology Program activities, FY 1988

    International Nuclear Information System (INIS)

    Yow, J.L. Jr.; Wijesinghe, A.M.; Thorpe, R.K.; Knapp, R.B.

    1989-07-01

    Our technical activities in FY 1988 included instrument selection and evaluation, calculational work, and simulator development. Near the end of the fiscal year, we began preparing several topical reports to document our results. This fiscal year, we continued developing three-dimensional numerical simulators to model coupled hydrologic-and mechanical-rock mass responses and, thus, to provide representative numerical tools for understanding and calculating these in situ processes. We also began scoping calculations in the second half of FY 1988 to evaluate ERE design criteria, but this work was redirected late in the year when the DOE/AECL Subsidiary Agreement was set aside. Our work in developing and evaluating experimental techniques focused on total pressure measurements, moisture content measurement, and tracer detection instrumentation for sealing experiments and for rock-mass-response field tests. At the end of the fiscal year, we completed a review of measurement technology for instrumenting migration/sorption tests to help define the technological requirements in these areas. By the end of FY 1988, we had completed a review of the existing codes for simulating reactive transport; we are using the results of this review to help formulate plans for future activities in this area. The following sections describe the major RTP tasks and activities at LLNL in more detail, and they include our FY 1988 accomplishments in these areas. 8 refs., 22 figs

  18. FY11 Facility Assessment Study for Aeronautics Test Program

    Science.gov (United States)

    Loboda, John A.; Sydnor, George H.

    2013-01-01

    This paper presents the approach and results for the Aeronautics Test Program (ATP) FY11 Facility Assessment Project. ATP commissioned assessments in FY07 and FY11 to aid in the understanding of the current condition and reliability of its facilities and their ability to meet current and future (five year horizon) test requirements. The principle output of the assessment was a database of facility unique, prioritized investments projects with budgetary cost estimates. This database was also used to identify trends for the condition of facility systems.

  19. Idaho National Laboratory’s FY09 & FY10 Greenhouse Gas Report

    Energy Technology Data Exchange (ETDEWEB)

    Jennifer D. Morton

    2011-06-01

    A greenhouse gas (GHG) inventory is a systematic approach to account for the production and release of certain gases generated by an institution from various emission sources. The gases of interest are those that climate science has identified as related to anthropogenic global climate change. This document presents an inventory of GHGs generated during fiscal year (FY) 2009 and 2010 by Idaho National Laboratory (INL), a Department of Energy (DOE)-sponsored entity, located in southeastern Idaho. In recent years, concern has grown about the environmental impact of GHGs. This, together with a desire to decrease harmful environmental impacts, would be enough to encourage the calculation of an inventory of the total GHGs generated at INL. Additionally, INL has a desire to see how its emissions compare with similar institutions, including other DOE national laboratories. Executive Order 13514 requires that federal agencies and institutions document reductions in GHG emissions. INL's GHG inventory was calculated according to methodologies identified in federal GHG guidance documents using operational control boundaries. It measures emissions generated in three scopes: (1) INL emissions produced directly by stationary or mobile combustion and by fugitive emissions, (2) the share of emissions generated by entities from which INL purchased electrical power, and (3) indirect or shared emissions generated by outsourced activities that benefit INL (occur outside INL's organizational boundaries, but are a consequence of INL's activities). This inventory found that INL generated 103,590 and 102,413 MT of CO2-equivalent emissions during FY09 and FY10, respectively. The following conclusions were made from looking at the results of the individual contributors to INL's FY09 and FY10 GHG inventories: (1) Electricity (including the associated transmission and distribution losses) is the largest contributor to INL's GHG inventory, with over 50% of the CO2e

  20. FY 1993 task plans for the Hanford Environmental Dose Reconstruction Project

    International Nuclear Information System (INIS)

    Shipler, D.B.

    1991-10-01

    The purpose of the Hanford Environmental Dose Reconstruction (HEDR) Project is to estimate radiation doses from Hanford Site operations since 1944 to individuals and populations. The primary objective of work to be performed in FY 1993 is to complete the source term estimates and dose estimates for key radionuclides for the air and river pathways. At the end of FY 1993, the capability will be in place to estimate doses for individuals in the extended (32-county) study area, 1944--1991. Native American research will continue to provide input for tribal dose estimates. In FY 1993, the Technical Steering Panel (TSP) will decide whether demographic and river pathways data collection should be extended beyond FY 1993 levels. The FY 1993 work scopes and milestones in this document are based on the work plan discussed at the TSP Budget/Fiscal Subcommittee meeting on August 19--20, 1991. Table 1 shows the FY 1993 milestones; Table 2 shows estimated costs. The subsequent work scope descriptions are based on the milestones. This document and the FY 1992 task plans will form the basis for a contract with Battelle and the Centers for Disease Control (CDC). The 2-year dose reconstruction contract is expected to begin in February 1992. This contract will replace the current arrangement, whereby the US Department of Energy directly funds the Pacific Northwest Laboratory to conduct dose reconstruction work. In late FY 1992, the FY 1993 task plans will be more fully developed with detailed technical approaches, data quality objectives, and budgeted labor hours. The task plans will be updated again in July 1993 to reflect any scope, milestone, or cost changes directed during the year by the TSP. 2 tabs