WorldWideScience

Sample records for laser applied security

  1. NotaMark industrial laser marking system: a new security marking technology

    Science.gov (United States)

    Moreau, Vincent G.

    2004-06-01

    Up until now, the only variable alphanumeric data which could be added to banknotes was the number, applied by means of impact typographical numbering boxes. As an additional process or an alternative to this mechanical method, a non-contact laser marking process can be used offering high quality and greater levels of flexibility. For this purpose KBA-GIORI propose an exclusive laser marking solution called NotaMark. The laser marking process NotaMark is the ideal solution for applying variable data and personalizing banknotes (or any other security documents) with a very high resolution, for extremely large production volumes. A completely integrated solution has been developed comprised of laser light sources, marking head units, and covers and extraction systems. NotaMark allows the marking of variable data by removing locally and selectively, specific printed materials leaving the substrate itself untouched. A wide range of materials has already been tested extensively. NotaMark is a new security feature which is easy to identify and difficult to counterfeit, and which complies with the standard mechanical and chemical resistance tests in the security printing industry as well as with other major soiling tests. The laser marking process opens up a whole new range of design possibilities and can be used to create a primary security feature such as numbering, or to enhance the value of existing features.

  2. Laser Applications to Chemical, Security, and Environmental Analysis: introduction to the feature issue

    International Nuclear Information System (INIS)

    Dreizler, Andreas; Fried, Alan; Gord, James R.

    2007-01-01

    This Applied Optics feature issue on Laser Applications to Chemical, Security,and Environmental Analysis (LACSEA) highlights papers presented at theLACSEA 2006 Tenth Topical Meeting sponsored by the Optical Society ofAmerica

  3. Laser applications to chemical, security, and environmental analysis: introduction to the feature issue.

    Science.gov (United States)

    Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna

    2017-04-10

    This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.

  4. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  5. Defence and security applications of quantum cascade lasers

    Science.gov (United States)

    Grasso, Robert J.

    2016-09-01

    Quantum Cascade Lasers (QCL) have seen tremendous recent application in the realm of Defence and Security. And, in many instances replacing traditional solid state lasers as the source of choice for Countermeasures, Remote Sensing, In-situ Sensing, Through-Barrier Sensing, and many others. Following their development and demonstration in the early 1990's, QCL's reached some maturity and specific defence and security application prior to 2005; with much initial development fostered by DARPA initiatives in the US, dstl, MoD, and EOARD funding initiatives in the UK, and University level R&D such as those by Prof Manijeh Razeghi at Northwestern University [1], and Prof Ted Masselink at Humboldt University [2]. As QCL's provide direct mid-IR laser output for electrical input, they demonstrate high quantum efficiency compared with diode pumped solid state lasers with optical parametric oscillators (OPOs) to generate mid-Infrared output. One particular advantage of QCL's is their very broad operational bandwidth, extending from the terahertz to the near-infrared spectral regions. Defence and Security areas benefiting from QCL's include: Countermeasures, Remote Sensing, Through-the-Wall Sensing, and Explosive Detection. All information used to construct this paper obtained from open sources.

  6. Laser-induced breakdown spectroscopy in industrial and security applications

    International Nuclear Information System (INIS)

    Bol'shakov, Alexander A.; Yoo, Jong H.; Liu Chunyi; Plumer, John R.; Russo, Richard E.

    2010-01-01

    Laser-induced breakdown spectroscopy (LIBS) offers rapid, localized chemical analysis of solid or liquid materials with high spatial resolution in lateral and depth profiling, without the need for sample preparation. Principal component analysis and partial least squares algorithms were applied to identify a variety of complex organic and inorganic samples. This work illustrates how LIBS analyzers can answer a multitude of real-world needs for rapid analysis, such as determination of lead in paint and children's toys, analysis of electronic and solder materials, quality control of fiberglass panels, discrimination of coffee beans from different vendors, and identification of generic versus brand-name drugs. Lateral and depth profiling was performed on children's toys and paint layers. Traditional one-element calibration or multivariate chemometric procedures were applied for elemental quantification, from single laser shot determination of metal traces at ∼10 μg/g to determination of halogens at 90 μg/g using 50-shot spectral accumulation. The effectiveness of LIBS for security applications was demonstrated in the field by testing the 50-m standoff LIBS rasterizing detector.

  7. The possibilities of applying infrared lasers in otolaryngology

    Science.gov (United States)

    Kukwa, Andrzej; Tulibacki, Marek P.; Wojtowicz, Piotr; Oledzka, Iwona; Obarska, Agnieszka

    2003-10-01

    The authors present their many years of experience in the area of laryngological surgery with various types of solid lasers. In our clinical practice we use Nd-YAG, Ho-YAG and Er-YAG surgical lasers. There are many reasons for applying lasers, depending on medical conditions. One of the most frequent cases are the nasal polyps, where surgical treatment is aimed at curing the results. For this type the procedures there was applied Nd-YAG laser, which has shortened the period of treatment and extended the remission. We also use this laser for mucal tissue corrections of the nasal conchs through deep coagulation effect. The above mentioned laser is also useful for the preventative treatment of granulation stenosis by removal of granulation tissue from different sections of the upper way; from the nose to the trachea.Other laser procedures in the nasal area include coagulation of Kisselbach locus, bleeding in Rendu-Osler disease, separating adhesions of the nasal concha from the nasal septum, coagulation of septal bleeding polyps, angiomas of different location, small papillomae of throat and nose, and reduction of hypertrophy nasopharyngeal mucoosa in OSAS patients, and uvolo-palato-pharyngoplasty (UPPP). Neodymium laser is also used for the management of neoplastic diseases in palliative and radical (CA. basocellulare) treatment for the resection of the premalignant changes (papilloma, leukoplakia) and early neoplastic changes of throat and larynx. Keloplasty in the area of larynx and trachea is performed with the use of Ho-YAG laser, with shallow effect, regardless of the density of tissue, enabling coagulation of vascular vessels. It enables non-traumatic resections of bone structures, such as the wall of maxillary sinus, nasal spine, or conchoplasty; the mucal tissue and the frame. Recent clinical tests are examining the possibilities of Er-YAG laser application for crushing calculus in the salivary ducts. Using lasers in laryngology enables their extensive

  8. Gas lasers applied atomic collision physics, v.3

    CERN Document Server

    McDaniel, E W

    1982-01-01

    Applied Atomic Collision Physics, Volume 3: Gas Lasers describes the applications of atomic collision physics in the development of many types of gas lasers. Topics covered range from negative ion formation in gas lasers to high-pressure ion kinetics and relaxation of molecules exchanging vibrational energy. Ion-ion recombination in high-pressure plasmas is also discussed, along with electron-ion recombination in gas lasers and collision processes in chemical lasers.Comprised of 14 chapters, this volume begins with a historical summary of gas laser developments and an overview of the basic ope

  9. Security, Privacy, and Applied Cryptography Engineering

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized...... and applications, high-performance computing in cryptology and cryptography in ubiquitous devices....

  10. Advanced lasers laser physics and technology for applied and fundamental science

    CERN Document Server

    Sukhoivanov, Igor

    2015-01-01

    Presenting a blend of applied and fundamental research in highly interdisciplinary subjects of rapidly developing areas, this book contains contributions on the frontiers and hot topics of laser physics, laser technology and laser engineering, and covers a wide range of laser topics, from all-optical signal processing and chaotic optical communication to production of superwicking surfaces, correction of extremely high-power beams, and generation of ultrabroadband spectra. It presents both review-type contributions and well researched and documented case studies, and is intended for graduate students, young scientist, and emeritus scientist working/studying in laser physics, optoelectronics, optics, photonics, and adjacent areas. The book contains both experimental and theoretical studies, as well as combinations of these two, which is known to be a most useful and interesting form of reporting scientific results, allowing students to really learn from each contribution. The book contains over 130 illustratio...

  11. Security training with interactive laser-video-disk technology

    International Nuclear Information System (INIS)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest that detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life

  12. Water security for productive economies: Applying an assessment framework in southern Africa

    Science.gov (United States)

    Holmatov, Bunyod; Lautze, Jonathan; Manthrithilake, Herath; Makin, Ian

    2017-08-01

    Achieving water security has emerged as a major objective in Africa, yet an analytical or diagnostic framework for assessing water security in African countries is not known to exist. This paper applies one key dimension of the 2016 Asian Development Bank's (ADB) Asian Water Development Outlook (AWDO) to assess levels of water security for productive economies in countries of the Southern African Development Community (SADC). Economic aspects of water security cover four areas: economic activities in the broad sense, agriculture, electricity, and industry. Water security in each area is measured through application of a set of indicators; results of indicator application are then aggregated to determine economic water security at a country-level. Results show that economic water security in SADC is greatest in the Seychelles and South Africa, and lowest in Madagascar and Malawi. Opportunities for strengthening economic water security in the majority of SADC countries exist through improving agricultural water productivity, strengthening resilience, and expanding sustainable electricity generation. More profoundly, this paper suggests that there is clear potential and utility in applying approaches used elsewhere to assess economic water security in southern Africa.

  13. Present state of applying diode laser in Toyota Motor Corp.

    Science.gov (United States)

    Terada, Masaki; Nakamura, Hideo

    2003-03-01

    Since the mid-1980s, Toyota Motor Corporation has applied CO2 lasers and YAG lasers to machine (welding, piercing, cutting, surface modifying etc.) automobile parts. In recent years diode lasers, which are excellent in terms of cost performance, are now available on the market as a new type of oscillator and are expected to bring about a new age in laser technology. Two current problems with these lasers, however, are the lack of sufficient output and the difficulty in improving the focusing the beam, which is why it has not been easy to apply them to the machining of metal parts in the past. On the other hand, plastics can be joined with low energy because they have a lower melting point than metal and the rate of absorption of the laser is easy to control. Moreover, because the high degree of freedom in molding plastic parts results in many complex shapes that need to be welded, Toyota is looking into the use of diode lasers to weld plastic parts. This article will introduce the problems of plastics welding and the methods to solve them referring to actual examples.

  14. Applied network security monitoring collection, detection, and analysis

    CERN Document Server

    Sanders, Chris

    2013-01-01

    Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major di

  15. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  16. Compact, diode-pumped, solid-state lasers for next generation defence and security sensors

    Science.gov (United States)

    Silver, M.; Lee, S. T.; Borthwick, A.; McRae, I.; Jackson, D.; Alexander, W.

    2015-06-01

    Low-cost semiconductor laser diode pump sources have made a dramatic impact in sectors such as advanced manufacturing. They are now disrupting other sectors, such as defence and security (D&S), where Thales UK is a manufacturer of sensor systems for application on land, sea, air and man portable. In this talk, we will first give an overview of the market trends and challenges in the D&S sector. Then we will illustrate how low cost pump diodes are enabling new directions in D&S sensors, by describing two diode pumped, solid- state laser products currently under development at Thales UK. The first is a new generation of Laser Target Designators (LTD) that are used to identify targets for the secure guiding of munitions. Current systems are bulky, expensive and require large battery packs to operate. The advent of low cost diode technology, merged with our novel solid-state laser design, has created a designator that will be the smallest, lowest cost, STANAG compatible laser designator on the market. The LTD delivers greater that 50mJ per pulse up to 20Hz, and has compact dimensions of 125×70×55mm. Secondly, we describe an ultra-compact, eye-safe, solid-state laser rangefinder (LRF) with reduced size, weight and power consumption compared to existing products. The LRF measures 100×55×34mm, weighs 200g, and can range to greater than 10km with a single laser shot and at a reprate of 1Hz. This also leverages off advances in laser pump diodes, but also utilises low cost, high reliability, packaging technology commonly found in the telecoms sector. As is common in the D&S sector, the products are designed to work in extreme environments, such as wide temperature range (-40 to +71°C) and high levels of shock and vibration. These disruptive products enable next- generation laser sensors such as rangefinders, target designators and active illuminated imagers.

  17. Water security for productive economies : Applying an assessment framework in southern Africa

    NARCIS (Netherlands)

    Holmatov, Bunyod; Lautze, Jonathan; Manthrithilake, Herath; Makin, Ian

    2017-01-01

    Achieving water security has emerged as a major objective in Africa, yet an analytical or diagnostic framework for assessing water security in African countries is not known to exist. This paper applies one key dimension of the 2016 Asian Development Bank's (ADB) Asian Water Development Outlook

  18. 40 CFR 80.606 - What national security exemption applies to fuels covered under this subpart?

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 16 2010-07-01 2010-07-01 false What national security exemption... national security exemption applies to fuels covered under this subpart? (a) The standards of all the fuels..., including locomotive and marine, having an EPA national security exemption from the motor vehicle emission...

  19. NATO Advanced Study Institute on Laser Control & Monitoring in New Materials, Biomedicine, Environment, Security & Defense

    CERN Document Server

    Hall, Trevor J; Paredes, Sofia A; Extreme Photonics & Applications

    2010-01-01

    "Extreme Photonics & Applications" arises from the 2008 NATO Advanced Study Institute in Laser Control & Monitoring in New Materials, Biomedicine, Environment, Security and Defense. Leading experts in the manipulation of light offered by recent advances in laser physics and nanoscience were invited to give lectures in their fields of expertise and participate in discussions on current research, applications and new directions. The sum of their contributions to this book is a primer for the state of scientific knowledge and the issues within the subject of photonics taken to the extreme frontiers: molding light at the ultra-finest scales, which represents the beginning of the end to limitations in optical science for the benefit of 21st Century technological societies. Laser light is an exquisite tool for physical and chemical research. Physicists have recently developed pulsed lasers with such short durations that one laser shot takes the time of one molecular vibration or one electron rotation in an ...

  20. 2nd International Doctoral Symposium on Applied Computation and Security Systems

    CERN Document Server

    Cortesi, Agostino; Saeed, Khalid; Chaki, Nabendu

    2016-01-01

    The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

  1. Chaotic dynamics and chaos control in nonlinear laser systems

    International Nuclear Information System (INIS)

    Fang Jinqing; Yao Weiguang

    2001-01-01

    Chaotic dynamics and chaos control have become a great challenge in nonlinear laser systems and its advances are reviewed mainly based on the ring cavity laser systems. The principle and stability conditions for time-delay feedback control are analyzed and applied to chaos control in the laser systems. Other advanced methods of chaos control, such as weak spatial perturbation and occasional proportional feedback technique, are discussed. Prospects of chaos control for application (such as improvement of laser power and performance, synchronized chaos secure communication and information processing) are pointed out finally

  2. 20 CFR 404.469 - Nonpayment of benefits where individual has not furnished or applied for a Social Security number.

    Science.gov (United States)

    2010-04-01

    ... not furnished or applied for a Social Security number. 404.469 Section 404.469 Employees' Benefits... or applied for a Social Security number. No monthly benefits will be paid to an entitled individual... or her Social Security number, or, if the individual has not been assigned a number, he or she makes...

  3. Applied computation and security systems

    CERN Document Server

    Saeed, Khalid; Choudhury, Sankhayan; Chaki, Nabendu

    2015-01-01

    This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book...

  4. Applied Questions of Onboard Laser Radar Equipment Development

    Directory of Open Access Journals (Sweden)

    E. I. Starovoitov

    2015-01-01

    Full Text Available During development of the spacecraft laser radar systems (LRS it is a problem to make a choice of laser sources and photo-detectors both because of their using specifics in onboard equipment and because of the limited number of domestic and foreign manufacturers.Previous publications did not consider in detail the accuracy versus laser pulse repetition frequency, the impact of photo-detector sensitivity and dynamic range on the LRS characteristics, and the power signal-protected photo-detector against overload.The objective of this work is to analyze how the range, accuracy, and reliability of onboard LRS depend on different types of laser sources and photo-detectors, and on availability of electromechanical optical attenuator.The paper describes design solutions that are used to compensate for a decreased sensitivity of photo-detector and an impact of these changes on the LRS characteristics.It is shown that due to the high pulse repetition frequency a fiber laser is the preferred type of a laser source in onboard LRS, which can be used at ranges less than 500 m for two purposes: determining the orientation of the passive spacecraft with the accuracy of 0.3 and measuring the range rate during the rendezvous of spacecrafts with an accuracy of 0.003... 0.006 m/s.The work identifies the attenuation level of the optical attenuator versus measured range. In close proximity to a diffusely reflecting passive spacecraft and a corner reflector this attenuator protects photo-detector. It is found that the optical attenuator is advisable to apply when using the photo-detector based on an avalanche photodiode. There is no need in optical attenuator (if a geometric factor is available in the case of sounding corner reflector when a photo-detector based on pin-photodiode is used. Exclusion of electromechanical optical attenuator can increase the reliability function of LRS from Р (t = 0.9991 to Р (t = 0.9993.The results obtained in this work can be used

  5. Methodology for Applying Cyber Security Risk Evaluation from BN Model to PSA Model

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Kyung Hee University, Youngin (Korea, Republic of); Kang, Hyun Gook [KAIST, Dajeon (Korea, Republic of); Son, Han Seong [Joongbu University, Chubu (Korea, Republic of)

    2014-08-15

    There are several advantages to use digital equipment such as cost, convenience, and availability. It is inevitable to use the digital I and C equipment replaced analog. Nuclear facilities have already started applying the digital system to I and C system. However, the nuclear facilities also have to change I and C system even though it is difficult to use digital equipment due to high level of safety, irradiation embrittlement, and cyber security. A cyber security which is one of important concerns to use digital equipment can affect the whole integrity of nuclear facilities. For instance, cyber-attack occurred to nuclear facilities such as the SQL slammer worm, stuxnet, DUQU, and flame. The regulatory authorities have published many regulatory requirement documents such as U.S. NRC Regulatory Guide 5.71, 1.152, IAEA guide NSS-17, IEEE Standard, and KINS Regulatory Guide. One of the important problem of cyber security research for nuclear facilities is difficulty to obtain the data through the penetration experiments. Therefore, we make cyber security risk evaluation model with Bayesian network (BN) for nuclear reactor protection system (RPS), which is one of the safety-critical systems to trip the reactor when the accident is happened to the facilities. BN can be used for overcoming these problems. We propose a method to apply BN cyber security model to probabilistic safety assessment (PSA) model, which had been used for safety assessment of system, structure and components of facility. The proposed method will be able to provide the insight of safety as well as cyber risk to the facility.

  6. Methodology for Applying Cyber Security Risk Evaluation from BN Model to PSA Model

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyun Young; Kang, Hyun Gook; Son, Han Seong

    2014-01-01

    There are several advantages to use digital equipment such as cost, convenience, and availability. It is inevitable to use the digital I and C equipment replaced analog. Nuclear facilities have already started applying the digital system to I and C system. However, the nuclear facilities also have to change I and C system even though it is difficult to use digital equipment due to high level of safety, irradiation embrittlement, and cyber security. A cyber security which is one of important concerns to use digital equipment can affect the whole integrity of nuclear facilities. For instance, cyber-attack occurred to nuclear facilities such as the SQL slammer worm, stuxnet, DUQU, and flame. The regulatory authorities have published many regulatory requirement documents such as U.S. NRC Regulatory Guide 5.71, 1.152, IAEA guide NSS-17, IEEE Standard, and KINS Regulatory Guide. One of the important problem of cyber security research for nuclear facilities is difficulty to obtain the data through the penetration experiments. Therefore, we make cyber security risk evaluation model with Bayesian network (BN) for nuclear reactor protection system (RPS), which is one of the safety-critical systems to trip the reactor when the accident is happened to the facilities. BN can be used for overcoming these problems. We propose a method to apply BN cyber security model to probabilistic safety assessment (PSA) model, which had been used for safety assessment of system, structure and components of facility. The proposed method will be able to provide the insight of safety as well as cyber risk to the facility

  7. An adaptive chaos synchronization scheme applied to secure communication

    International Nuclear Information System (INIS)

    Feki, Moez

    2003-01-01

    This paper deals with the problem of synchronization of a class of continuous-time chaotic systems using the drive-response concept. An adaptive observer-based response system is designed to synchronize with a given chaotic drive system whose dynamical model is subjected to unknown parameters. Using the Lyapunov stability theory an adaptation law is derived to estimate the unknown parameters. We show that synchronization is achieved asymptotically. The approach is next applied to chaos-based secure communication. To demonstrate the efficiency of the proposed scheme numerical simulations are presented

  8. Laser-induced thermal coagulation enhances skin uptake of topically applied compounds

    DEFF Research Database (Denmark)

    Haak, C S; Hannibal, J; Paasch, U

    2017-01-01

    microchannels surrounded by CZ compared to channels with no CZ (CZ-20 and CZ-80>CZ-0).The thickness of CZ affected PEG distribution in skin. A thin CZ-20 favored significantly higher mean fluorescence intensities inside CZ areas compared to CZ-80 (PEG 350, 1,000, and 5,000; P ...BACKGROUND: Ablative fractional laser (AFL) generates microchannels in skin surrounded by a zone of thermally altered tissue, termed the coagulation zone (CZ). The thickness of CZ varies according to applied wavelength and laser settings. It is well-known that AFL channels facilitate uptake...... of topically applied compounds, but the importance of CZ is unknown. METHODS: Franz Cells were used to investigate skin uptake and permeation of fluorescent labeled polyethylene glycols (PEGs) with mean molecular weights (MW) of 350, 1,000, and 5,000 Da. Microchannels with CZ thicknesses ranging from 0 to 80...

  9. Utilization of IR laser pumped anti-Stokes emission of Er-Yb doped systems for identification of securities

    International Nuclear Information System (INIS)

    Kuzmin, A.N.; Ryabtsev, G.I.; Ketko, G.A.; Gorelenko, A.Yu.; Demidovich, A.A.; Strek, W.; Maruszewicz, K.; Deren, P.

    1996-01-01

    In this paper we present a utilization of anti-Stokes luminescence of Er-Yb systems for identification of securities. A simple method of detection of an up-conversion phenomenon in such system by means of IR laser operating in the region 960-1010 nm is proposed. (author)

  10. Applying Data Mining Techniques to Improve Information Security in the Cloud: A Single Cache System Approach

    OpenAIRE

    Amany AlShawi

    2016-01-01

    Presently, the popularity of cloud computing is gradually increasing day by day. The purpose of this research was to enhance the security of the cloud using techniques such as data mining with specific reference to the single cache system. From the findings of the research, it was observed that the security in the cloud could be enhanced with the single cache system. For future purposes, an Apriori algorithm can be applied to the single cache system. This can be applied by all cloud providers...

  11. Pulsed laser deposition of semiconductor-ITO composite films on electric-field-applied substrates

    International Nuclear Information System (INIS)

    Narazaki, Aiko; Sato, Tadatake; Kawaguchi, Yoshizo; Niino, Hiroyuki; Yabe, Akira; Sasaki, Takeshi; Koshizaki, Naoto

    2002-01-01

    The DC electric-field effect on the crystallinity of II-VI semiconductor in composite systems has been investigated for CdS-ITO films fabricated via alternative pulsed laser deposition (PLD) of CdS and indium tin oxide (ITO) on electric-field-applied substrates. The alternative laser ablation was performed under irradiation of ArF excimer laser in mixture gas of helium and oxygen. The application of electric-field facilitated the preferential crystal-growth of CdS in nanometer scale at low pressure, whereas all the films grown without the field were amorphous. There is a large difference in the crystallization between the films grown on field-applied and heated substrates; the latter showed the crystal-growth with random orientations. This difference indicates that the existence of electric-field has an influence on the transformation from amorphous to crystalline phase of CdS. The driving force for the field-induced crystallization is also discussed in the light of the Joule heat

  12. New enhanced sensitivity infrared laser spectroscopy techniques applied to reactive plasmas and trace gas detection

    NARCIS (Netherlands)

    Welzel, S.

    2009-01-01

    Infrared laser absorption spectroscopy (IRLAS) employing both tuneable diode and quantum cascade lasers (TDLs, QCLs) has been applied with both high sensitivity and high time resolution to plasma diagnostics and trace gas measurements. TDLAS combined with a conventional White type multiple pass cell

  13. 3rd International Doctoral Symposium on Applied Computation and Security Systems

    CERN Document Server

    Saeed, Khalid; Cortesi, Agostino; Chaki, Nabendu

    2017-01-01

    This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.

  14. Applying Quantum Cascade Laser Spectroscopy in Plasma Diagnostics

    Directory of Open Access Journals (Sweden)

    Jürgen Röpcke

    2016-07-01

    Full Text Available The considerably higher power and wider frequency coverage available from quantum cascade lasers (QCLs in comparison to lead salt diode lasers has led to substantial advances when QCLs are used in pure and applied infrared spectroscopy. Furthermore, they can be used in both pulsed and continuous wave (cw operation, opening up new possibilities in quantitative time resolved applications in plasmas both in the laboratory and in industry as shown in this article. However, in order to determine absolute concentrations accurately using pulsed QCLs, careful attention has to be paid to features like power saturation phenomena. Hence, we begin with a discussion of the non-linear effects which must be considered when using short or long pulse mode operation. More recently, cw QCLs have been introduced which have the advantage of higher power, better spectral resolution and lower fluctuations in light intensity compared to pulsed devices. They have proved particularly useful in sensing applications in plasmas when very low concentrations have to be monitored. Finally, the use of cw external cavity QCLs (EC-QCLs for multi species detection is described, using a diagnostics study of a methane/nitrogen plasma as an example. The wide frequency coverage of this type of QCL laser, which is significantly broader than from a distributed feedback QCL (DFB-QCL, is a substantial advantage for multi species detection. Therefore, cw EC-QCLs are state of the art devices and have enormous potential for future plasma diagnostic studies.

  15. Laser marking as a result of applying reverse engineering

    Science.gov (United States)

    Mihalache, Andrei; Nagîţ, Gheorghe; Rîpanu, Marius Ionuţ; Slǎtineanu, Laurenţiu; Dodun, Oana; Coteaţǎ, Margareta

    2018-05-01

    The elaboration of a modern manufacturing technology needs a certain quantum of information concerning the part to be obtained. When it is necessary to elaborate the technology for an existing object, such an information could be ensured by using the principles specific to the reverse engineering. Essentially, in the case of this method, the analysis of the surfaces and of other characteristics of the part must offer enough information for the elaboration of the part manufacturing technology. On the other hand, it is known that the laser marking is a processing method able to ensure the transfer of various inscriptions or drawings on a part. Sometimes, the laser marking could be based on the analysis of an existing object, whose image could be used to generate the same object or an improved object. There are many groups of factors able to affect the results of applying the laser marking process. A theoretical analysis was proposed to show that the heights of triangles obtained by means of a CNC marking equipment depend on the width of the line generated by the laser spot on the workpiece surface. An experimental research was thought and materialized to highlight the influence exerted by the line with and the angle of lines intersections on the accuracy of the marking process. By mathematical processing of the experimental results, empirical mathematical models were determined. The power type model and the graphical representation elaborated on the base of this model offered an image concerning the influences exerted by the considered input factors on the marking process accuracy.

  16. Calibration of the ISOLDE acceleration voltage using a high-precision voltage divider and applying collinear fast beam laser spectroscopy

    CERN Document Server

    Krieger, A.; Catherall, R.; Hochschulz, F.; Kramer, J.; Neugart, R.; Rosendahl, S.; Schipper, J.; Siesling, E.; Weinheimer, Ch.; Yordanov, D.T.; Nortershauser, W.

    2011-01-01

    A high-voltage divider with accuracy at the ppm level and collinear laser spectroscopy were used to calibrate the highvoltage installation at the radioactive ion beam facility ISOLDE at CERN. The accurate knowledge of this voltage is particularly important for collinear laser spectroscopy measurements. Beam velocity measurements using frequencycomb based collinear laser spectroscopy agree with the new calibration. Applying this, one obtains consistent results for isotope shifts of stable magnesium isotopes measured using collinear spectroscopy and laser spectroscopy on laser-cooled ions in a trap. The long-term stability and the transient behavior during recovery from a voltage dropout were investigated for the different power supplies currently applied at ISOLDE.

  17. Calibration of the ISOLDE acceleration voltage using a high-precision voltage divider and applying collinear fast beam laser spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Krieger, A., E-mail: kriegea@uni-mainz.d [Institut fuer Kernchemie, Johannes Gutenberg, Universitaet Mainz, Fritz-Strassmann-Weg 2, 55128 Mainz (Germany); Geppert, Ch. [Institut fuer Kernchemie, Johannes Gutenberg, Universitaet Mainz, Fritz-Strassmann-Weg 2, 55128 Mainz (Germany); GSI Helmholtzzentrum fuer Schwerionenforschung, 64291 Darmstadt (Germany); Catherall, R. [CERN, CH-1211 Geneve 23 (Switzerland); Hochschulz, F. [Institut fuer Kernphysik, Universitaet Muenster, 48149 Muenster (Germany); Kraemer, J.; Neugart, R. [Institut fuer Kernchemie, Johannes Gutenberg, Universitaet Mainz, Fritz-Strassmann-Weg 2, 55128 Mainz (Germany); Rosendahl, S. [Institut fuer Kernphysik, Universitaet Muenster, 48149 Muenster (Germany); Schipper, J.; Siesling, E. [CERN, CH-1211 Geneve 23 (Switzerland); Weinheimer, Ch. [Institut fuer Kernphysik, Universitaet Muenster, 48149 Muenster (Germany); Yordanov, D.T. [Max-Planck-Institut fuer Kernphysik, 69117 Heidelberg (Germany); Noertershaeuser, W. [Institut fuer Kernchemie, Johannes Gutenberg, Universitaet Mainz, Fritz-Strassmann-Weg 2, 55128 Mainz (Germany); GSI Helmholtzzentrum fuer Schwerionenforschung, 64291 Darmstadt (Germany)

    2011-03-11

    A high-voltage divider with accuracy at the ppm level and collinear laser spectroscopy were used to calibrate the high-voltage installation at the radioactive ion beam facility ISOLDE at CERN. The accurate knowledge of this voltage is particularly important for collinear laser spectroscopy measurements. Beam velocity measurements using frequency-comb based collinear laser spectroscopy agree with the new calibration. Applying this, one obtains consistent results for isotope shifts of stable magnesium isotopes measured using collinear spectroscopy and laser spectroscopy on laser-cooled ions in a trap. The long-term stability and the transient behavior during recovery from a voltage dropout were investigated for the different power supplies currently applied at ISOLDE.

  18. Effect of applied stress on the compressive residual stress introduced by laser peening

    International Nuclear Information System (INIS)

    Sumiya, Rie; Tazawa, Toshiyuki; Narazaki, Chihiro; Saito, Toshiyuki; Kishimoto, Kikuo

    2016-01-01

    Peening is the process which is able to be generated compressive residual stress and is known to be effective for preventing SCC initiation and improvement of fatigue strength. Laser peening is used for the nuclear power plant components in order to prevent SCC initiation. Although it is reported that the compressive residual stress decreases due to applied stresses under general operating condition, the change of residual stress might be large under excessive loading such as an earthquake. The objectives of this study are to evaluate the relaxation behavior of the compressive residual stress due to laser peening and to confirm the surface residual stress after loading. Therefore laser peened round bar test specimens of SUS316L which is used for the reactor internals of nuclear power plant were loaded at room temperature and elevated temperature and then surface residual stresses were measured by X-ray diffraction method. In the results of this test, it was confirmed that the compressive residual stress remained after applying uniform stress larger than 0.2% proof stress, and the effect of cyclic loading on the residual stress was small. The effect of applying compressive stress on the residual stress relaxation was confirmed to be less than that of applying tensile stress. Plastic deformation through a whole cross section causes the change in the residual stress distribution. As a result, the surface compressive residual stress is released. It was shown that the effect of specimen size on residual stress relaxation and the residual stress relaxation behavior in the stress concentration region can be explained by assumed stress relaxation mechanism. (author)

  19. Applying Data Mining Techniques to Improve Information Security in the Cloud: A Single Cache System Approach

    Directory of Open Access Journals (Sweden)

    Amany AlShawi

    2016-01-01

    Full Text Available Presently, the popularity of cloud computing is gradually increasing day by day. The purpose of this research was to enhance the security of the cloud using techniques such as data mining with specific reference to the single cache system. From the findings of the research, it was observed that the security in the cloud could be enhanced with the single cache system. For future purposes, an Apriori algorithm can be applied to the single cache system. This can be applied by all cloud providers, vendors, data distributors, and others. Further, data objects entered into the single cache system can be extended into 12 components. Database and SPSS modelers can be used to implement the same.

  20. Laser-induced incandescence applied to dusty plasmas

    NARCIS (Netherlands)

    van de Wetering, F.M.J.H.; Oosterbeek, W.; Beckers, J.; Nijdam, S.; Kovacevic, E.; Berndt, J.

    2016-01-01

    This paper reports on the laser heating of nanoparticles (diameters ≤1 μm) confined in a reactive plasma by short (150 ps) and intense (~63 mJ) UV (355 nm) laser pulses (laser-induced incandescence, LII). Important parameters such as the particle temperature and radius follow from analysis of the

  1. Laser generated hot electron transport in an externally applied magnetic field

    International Nuclear Information System (INIS)

    Burnett, N.H.; Enright, G.D.

    1986-01-01

    The authors have investigated the effect of an externally applied DC magnetic field on the generation and transport of hot electrons in CO/sub 2/ laser irradiation of cylindrical targets. The targets used in these studies were 6.3 mm diameter metal rods through which a pulsed current was driven from an external capacitor. Magnetic fields up to 150 kgauss were produced at the target surface. The CO/sub 2/ laser was focused with an f/5 lens resulting in a laser intensity of ≅3 x 10/sup 14/ W/cm/sup 2/ in a 100 μm diameter focal spot. The effect of the external magnetic field on the generation and inward transport of superhot (≥ 100 keV) electrons was studied. Principal diagnostics included a six channel hard x-ray spectrometer, a high energy x-ray pinhole camera, a LiF Laue x-ray spectrograph and a Ross-filtered (W-Ta) pair of x-ray detectors. The latter two diagnostics were designed to detect Au Kα /sub emission at 68.2 keV

  2. The Praxis of Social Enterprise and Human Security: An Applied Research Agenda

    Directory of Open Access Journals (Sweden)

    Malcolm David Brown

    2014-01-01

    Full Text Available The growth of social enterprise within development NGO work might lead one to suspect it has been irredeemably corrupted by neo-liberal capitalism. However, using the tools of capitalism is not the same as subscribing to the values of capitalism. This paper is situated at the intersection of five fields: human security, international development, social enterprise, social franchising, and left-wing anti-capitalist thought. It examines the relevance of social en­terprise to human security and to development, the relationship between social enterprise and the anti-capitalist values of the left, and it then focuses on social franchising—a subset of social enterprise that highlights the importance of cooperation—suggesting that it may be a useful methodology for NGOs carrying out educational work in parts of the developing world. It syn­thesises and extends ideas that I have presented elsewhere [1-3], it draws on ethnographic fieldwork on the Thai-Burma border, and it puts forward an agenda for further applied research that is rooted in a sociological analysis of civil society and contributes to the human security paradigm.

  3. 31 CFR 344.8 - What other provisions apply to subscriptions for Demand Deposit securities?

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What other provisions apply to subscriptions for Demand Deposit securities? 344.8 Section 344.8 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC...

  4. Laser-induced thermal coagulation enhances skin uptake of topically applied compounds.

    Science.gov (United States)

    Haak, C S; Hannibal, J; Paasch, U; Anderson, R R; Haedersdal, M

    2017-08-01

    Ablative fractional laser (AFL) generates microchannels in skin surrounded by a zone of thermally altered tissue, termed the coagulation zone (CZ). The thickness of CZ varies according to applied wavelength and laser settings. It is well-known that AFL channels facilitate uptake of topically applied compounds, but the importance of CZ is unknown. Franz Cells were used to investigate skin uptake and permeation of fluorescent labeled polyethylene glycols (PEGs) with mean molecular weights (MW) of 350, 1,000, and 5,000 Da. Microchannels with CZ thicknesses ranging from 0 to 80 μm were generated from micro-needles (0 μm, CZ-0), and AFL (10,600 nm) applied to -80°C deep frozen skin (20 μm, CZ-20) and skin equilibrated to room temperature (80 μm, CZ-80). Channels penetrated into similar mid-dermal skin depths of 600-700 μm, and number of channels per skin area was similar. At 4 hours incubation, skin uptake of PEGs into CZ and dermis was evaluated by fluorescence microscopy at specific skin depths of 150, 400, and 1,000 μm and the transcutaneous permeation was quantified by fluorescence of receptor fluids. Overall, the highest uptake of PEGs was reached through microchannels surrounded by CZ compared to channels with no CZ (CZ-20 and CZ-80>CZ-0).The thickness of CZ affected PEG distribution in skin. A thin CZ-20 favored significantly higher mean fluorescence intensities inside CZ areas compared to CZ-80 (PEG 350, 1,000, and 5,000; P channels was significantly higher than through CZ-80 and CZ-0 at all skin depths (PEG 350, 1,000 and 5,000, 150-1,000 μm; P distribution, with highest PEG uptake achieved from microchannels surrounded by a thin CZ. Lasers Surg. Med. 49:582-591, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  5. Ion collection from laser-induced plasma by applying radio-frequency voltage

    International Nuclear Information System (INIS)

    Shibata, Takemasa; Ogura, Koichi

    1995-01-01

    Ions were collected on the electrodes from a laser resonance photoionized plasma by applying 1.8MHz radio-frequency voltage to the electrode. It was demonstrated that the ions are collected in a shorter time at the same kinetic energy of the collected ions compared with ion collection by applying DC voltage to the electrode. A simple one-dimensional model was extended for prediction of ion collection times in the cases of applications of not only the DC voltage but also the radio-frequency voltage. The ion collection times estimated using the simple one-dimensional model agreed with experimental values in both cases of DC and radio-frequency voltages. (author)

  6. A transportation security system applying RFID and GPS

    Directory of Open Access Journals (Sweden)

    Ruijian Zhang

    2013-03-01

    Full Text Available Purpose: This paper is about developing a centralized, internet based security tool which utilizes RFID and GPS technology to identify drivers and track the load integrity. Design/methodology/approach: The system will accomplish the security testing in real-time using the internet and the U.S. Customs’ database (ACE. A central database and the interfaces and communication between the database and ACE will be established. After the vehicle is loaded, all openings of the tanker are sealed with disposable RFID tag seals. Findings/value: An RFID reader and GPS tracker wirelessly connected with the databases will serve as testing grounds for the implementation of security measures that can help prevent future terrorist attacks and help in ensuring that the goods and products are not compromised while in transit. The system will also reduce the labor work of security check to its minimum. 

  7. Understanding and applying cryptography and data security

    CERN Document Server

    Elbirt, Adam J

    2009-01-01

    Introduction A Brief History of Cryptography and Data Security Cryptography and Data Security in the Modern World Existing Texts Book Organization Symmetric-Key Cryptography Cryptosystem Overview The Modulo Operator Greatest Common Divisor The Ring ZmHomework ProblemsSymmetric-Key Cryptography: Substitution Ciphers Basic Cryptanalysis Shift Ciphers Affine Ciphers Homework ProblemsSymmetric-Key Cryptography: Stream Ciphers Random Numbers The One-Time Pad Key Stream GeneratorsReal-World ApplicationsHomework ProblemsSymmetric-Key Cryptography: Block Ciphers The Data Encryption StandardThe Advance

  8. Fiber-optic laser sensor for mine detection and verification

    International Nuclear Information System (INIS)

    Bohling, Christian; Scheel, Dirk; Hohmann, Konrad; Schade, Wolfgang; Reuter, Matthias; Holl, Gerhard

    2006-01-01

    What we believe to be a new optical approach for the identification of mines and explosives by analyzing the surface materials and not only bulk is developed. A conventional manually operated mine prodder is upgraded by laser-induced breakdown spectroscopy (LIBS). In situ and real-time information of materials that are in front of the prodder are obtained during the demining process in order to optimize the security aspects and the speed of demining. A Cr4+:Nd3+:YAG microchip laser is used as a seed laser for an ytterbium-fiber amplifier to generate high-power laser pulses at 1064 nm with pulse powers up to Ep=1 mJ, a repetition rate of frep.=2-20 kHz and a pulse duration of tp=620 ps. The recorded LIBS signals are analyzed by applying neural networks for the data analysis

  9. Mathematical Modeling Applied to Maritime Security

    OpenAIRE

    Center for Homeland Defense and Security

    2010-01-01

    Center for Homeland Defense and Security, OUT OF THE CLASSROOM Download the paper: Layered Defense: Modeling Terrorist Transfer Threat Networks and Optimizing Network Risk Reduction” Students in Ted Lewis’ Critical Infrastructure Protection course are taught how mathematic modeling can provide...

  10. Laser metrology applied to the nuclear maintenance

    International Nuclear Information System (INIS)

    Garrido Garcia, J.; Sarti Fernandez, F.

    2012-01-01

    The development of this paper focuses on providing an overview of the state of the art about laser metrology. This type of equipment combines the measurement philosophy of laser scanning with the great precision of the robotic equipment of auscultation. Getting micron.

  11. Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing

    Directory of Open Access Journals (Sweden)

    James (Jong Hyuk Park

    2016-09-01

    Full Text Available Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp has emerged rapidly as an exciting new paradigm. In this special issue, we mainly selected and discussed papers related with ore theories based on the graph theory to solve computational problems on cryptography and security, practical technologies; applications and services for Ubi-comp including secure encryption techniques, identity and authentication; credential cloning attacks and countermeasures; switching generator with resistance against the algebraic and side channel attacks; entropy-based network anomaly detection; applied cryptography using chaos function, information hiding and watermark, secret sharing, message authentication, detection and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc.

  12. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  13. Optical security features for plastic card documents

    Science.gov (United States)

    Hossick Schott, Joachim

    1998-04-01

    Print-on-demand is currently a major trend in the production of paper based documents. This fully digital production philosophy will likely have ramifications also for the secure identification document market. Here, plastic cards increasingly replace traditionally paper based security sensitive documents such as drivers licenses and passports. The information content of plastic cards can be made highly secure by using chip cards. However, printed and other optical security features will continue to play an important role, both for machine readable and visual inspection. Therefore, on-demand high resolution print technologies, laser engraving, luminescent pigments and laminated features such as holograms, kinegrams or phase gratings will have to be considered for the production of secure identification documents. Very important are also basic optical, surface and material durability properties of the laminates as well as the strength and nature of the adhesion between the layers. This presentation will address some of the specific problems encountered when optical security features such as high resolution printing and laser engraving are to be integrated in the on-demand production of secure plastic card identification documents.

  14. Applying field mapping refractive beam shapers to improve holographic techniques

    Science.gov (United States)

    Laskin, Alexander; Williams, Gavin; McWilliam, Richard; Laskin, Vadim

    2012-03-01

    Performance of various holographic techniques can be essentially improved by homogenizing the intensity profile of the laser beam with using beam shaping optics, for example, the achromatic field mapping refractive beam shapers like πShaper. The operational principle of these devices presumes transformation of laser beam intensity from Gaussian to flattop one with high flatness of output wavefront, saving of beam consistency, providing collimated output beam of low divergence, high transmittance, extended depth of field, negligible residual wave aberration, and achromatic design provides capability to work with several laser sources with different wavelengths simultaneously. Applying of these beam shapers brings serious benefits to the Spatial Light Modulator based techniques like Computer Generated Holography or Dot-Matrix mastering of security holograms since uniform illumination of an SLM allows simplifying mathematical calculations and increasing predictability and reliability of the imaging results. Another example is multicolour Denisyuk holography when the achromatic πShaper provides uniform illumination of a field at various wavelengths simultaneously. This paper will describe some design basics of the field mapping refractive beam shapers and optical layouts of their applying in holographic systems. Examples of real implementations and experimental results will be presented as well.

  15. The Use of Locally Applied Vibration to Minimize Pain during Fractional CO Laser Therapy in Living Liver-Donor Scar Management

    Directory of Open Access Journals (Sweden)

    Sinyoung Song

    2016-11-01

    Full Text Available BackgroundFractional CO2 laser is an effective treatment for scars, but most patients complain about sharp burning pain, even after the application of lidocaine ointment. This study analyzed the impact of a vibrating device to nonpharmacologically reduce the acute pain of laser treatment, in accordance with the gate control theory of pain management.MethodsThis is a prospective study performed from May 2013 through March 2014. Fifty-three patients (mean age, 26.7 years; range, 16–44 years who had donated livers for liver transplantation were treated with a fractional CO2 laser (10,600 nm; model eCO2, Lutronic Corp for their abdomen scars. Laser treatment was applied 4 months after surgery. A commercially available, locally applied vibrating device (model UM-30M, Unix Electronics Co. Ltd. was used, in an on-and-off pattern, together with the CO2 laser. A visual analogue scale (VAS; 0, no pain; 10, most severe pain of pain sensation was assessed and statistically analyzed using a paired t-test.ResultsThe average VAS score for pain with the vibrating device was 4.60 and the average VAS score without the vibrating device was 6.11. The average difference between scores was 1.51 (P=0.001.ConclusionsA locally applied vibrating device was demonstrated to be effective in reducing pain when treating with a fractional CO2 laser. Vibration treatment could be helpful when treating scars with fractional CO2 laser in pain-sensitive patients, particularly children.

  16. A study of optical design and optimization applied to lens module of laser beam shaping of advanced modern optical device

    Science.gov (United States)

    Tsai, Cheng-Mu; Fang, Yi-Chin; Chen, Zhen Hsiang

    2011-10-01

    This study used the aspheric lens to realize the laser flat-top optimization, and applied the genetic algorithm (GA) to find the optimal results. Using the characteristics of aspheric lens to obtain the optimized high quality Nd: YAG 355 waveband laser flat-top optical system, this study employed the Light tools LDS (least damped square) and the GA of artificial intelligence optimization method to determine the optimal aspheric coefficient and obtain the optimal solution. This study applied the aspheric lens with GA for the flattening of laser beams using two aspheric lenses in the aspheric surface optical system to complete 80% spot narrowing under standard deviation of 0.6142.

  17. Laser spectroscopy: Assessment of research needs for laser technologies applied to advanced spectroscopic methods

    International Nuclear Information System (INIS)

    Hurst, G.S.

    1990-05-01

    This report is organized as follows. Section 2 summarizes the current program of DOE's Office of Health and Environmental Research (OHER) and provides some remarks on low laser science and technology could beneficially impact most of the research programs. Section 3 provides a brief global perspective on laser technology and attempts to define important trends in the field. Similarly, Section 4 provides a global perspective on laser spectroscopy and addresses important trends. Thus, Section 5 focuses on the trends in laser technology and spectroscopy which could impact the OHER mission in significant ways and contains the basis for recommendations made in the executive summary. For those with limited familiarity with laser technology and laser spectroscopy, reference is made to Appendix 1 for a list of abbreviations and acronyms. Appendix 2 can serve a useful review or tutorial for those who are not deeply involved with laser spectroscopy. Even those familiar with laser spectroscopy and laser technology may find it useful to know precisely what the authors of this document mean by certain specialized terms and expressions. Finally, a note on the style of referencing may be appropriate. Whenever possible a book or review articles is referenced as the preferred citation. However, we frequently found it useful to reference a number of individual papers of recent origin or those which were not conveniently found in the review articles

  18. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  19. Pedestrian Detection by Laser Scanning and Depth Imagery

    Science.gov (United States)

    Barsi, A.; Lovas, T.; Molnar, B.; Somogyi, A.; Igazvolgyi, Z.

    2016-06-01

    Pedestrian flow is much less regulated and controlled compared to vehicle traffic. Estimating flow parameters would support many safety, security or commercial applications. Current paper discusses a method that enables acquiring information on pedestrian movements without disturbing and changing their motion. Profile laser scanner and depth camera have been applied to capture the geometry of the moving people as time series. Procedures have been developed to derive complex flow parameters, such as count, volume, walking direction and velocity from laser scanned point clouds. Since no images are captured from the faces of pedestrians, no privacy issues raised. The paper includes accuracy analysis of the estimated parameters based on video footage as reference. Due to the dense point clouds, detailed geometry analysis has been conducted to obtain the height and shoulder width of pedestrians and to detect whether luggage has been carried or not. The derived parameters support safety (e.g. detecting critical pedestrian density in mass events), security (e.g. detecting prohibited baggage in endangered areas) and commercial applications (e.g. counting pedestrians at all entrances/exits of a shopping mall).

  20. Optical inspection techniques for security instrumentation

    Science.gov (United States)

    van Renesse, Rudolf L.

    1996-03-01

    This paper reviews four optical inspection systems, in which development TNO Institute of Applied Physics was involved: (1) intaglio scanning and recognition, (2) banknote quality inspection, (3) visualization and reading of a finger pattern, and (4) 3DAS authentication. (1) Intaglio is reserved for high security printing. It renders a tactile relief that can be recognized by a laser scanning technique. This technique is applied by various national banks to detect counterfeit banknotes returning from circulation. A new system is proposed that will detect intaglio on arbitrary wrinkled banknotes. (2) A banknote fitness inspection system (BFIS) that inspects banknotes in specularly reflected light is described. As modern banknotes are provided increasingly with reflective security foils, a new system is proposed that inspects banknotes in specular and diffuse reflection, as well as in transmission. (3) An alternative visualization method for visualization of finger patterns is described, employing a reflective elastomer. A CD scanning system reads the finger patterns. (4) A nonwoven structure has two advantageous properties for card authentication: a random structure which renders each few square millimeters of the pattern uniqueness (identification) and a 3D structure which makes it virtually impossible to be counterfeited (authentication). Both properties are inspected by an extremely simple lenseless reader.

  1. Microsoft Security Bible A Collection of Practical Security Techniques

    CERN Document Server

    Mullen, Timothy "Thor"

    2011-01-01

    Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications

  2. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  3. Applying the National Industrial Security Program (NISP) in the laboratory environment

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1995-01-01

    With continuing changes in the world safeguards and security environment the effectiveness of many laboratory operations depends on correctly assessing the risk to its programs and developing protection technologies, research and concepts of operations being employed by the scientific community. This paper explores the opportunities afforded by the National Industrial Security Program (NISP) to uniformly and simply protect Laboratory security assets, sensitive and classified information and matter, during all aspects of a laboratory program. The developments in information systems, program security, physical security and access controls suggest an industrial security approach. This paper's overall objective is to indicate that the Laboratory environment is particularly well suited to take advantage being pursued by NISP and the performance objectives of the new DOE orders

  4. Laser metrology applied to the nuclear maintenance; Metrologia laser aplicada al mantenimiento nuclear

    Energy Technology Data Exchange (ETDEWEB)

    Garrido Garcia, J.; Sarti Fernandez, F.

    2012-07-01

    The development of this paper focuses on providing an overview of the state of the art about laser metrology. This type of equipment combines the measurement philosophy of laser scanning with the great precision of the robotic equipment of auscultation. Getting micron.

  5. Laser-produced X-ray sources

    International Nuclear Information System (INIS)

    Hudson, L.T.; Seely, J.F.

    2010-01-01

    A formidable array of advanced laser systems are emerging that produce extreme states of light and matter. By irradiating solid and gaseous targets with lasers of increasing energy densities, new physical regimes of radiation effects are being explored for the first time in controlled laboratory settings. One result that is being accomplished or pursued using a variety of techniques, is the realization of novel sources of X-rays with unprecedented characteristics and light-matter interactions, the mechanisms of which are in many cases still being elucidated. Examples include the megajoule class of laser-produced plasmas designed in pursuit of alternative-energy and security applications and the petawatt class of lasers used for fast ignition and X-ray radiographic applications such as medical imaging and real-time imaging of plasma hydrodynamics. As these technologies mature, increased emphasis will need to be placed on advanced instrumentation and diagnostic metrology to characterize the spectra, time structure, and absolute brightness of X-rays emitted by these unconventional sources. Such customized and absolutely calibrated measurement tools will serve as an enabling technology that can help in assessing the overall system performance and progress, as well as identification of the underlying interaction mechanisms of interest to basic and applied strong-field and high-energy-density science.

  6. Standoff Sensing Technology Based on Laser-Induced Breakdown Spectroscopy: Advanced Targeting, Surveillance and Reconnaissance in Security and Architectural Heritage Applications

    OpenAIRE

    Gaona Fernández, María Inmaculada

    2014-01-01

    Due to the ability to perform simultaneous, multi-element and real-time analysis without pretreatment and doing from a distance, laser induced breakdown spectroscopy (LIBS) in standoff mode is now considered a cutting-edge analytical technology. All these features have allowed its application in various fields such as security, environment, cultural heritage protection and space exploration, among the more outstanding. Nonetheless, the fact of working to long distances involves greater dif...

  7. Resources available for applying metrics in security and safety programming.

    Science.gov (United States)

    Luizzo, Anthony

    2016-01-01

    Incorporating metrics into security surveys has been championed as a better way of substantiating program-related effectiveness and expenditures. Although security surveys have been aroundfor well over 40 years, rarely, if ever, have metric-related strategies been part of the equation, the author says. In this article, he cites several published articles and research findings available to security professionals and their surveyors that may give them the expertise and confidence they need to make use of this valuable tool.

  8. Nuclear energy technology transfer: the security barriers

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1975-08-01

    The problems presented by security considerations to the transfer of nuclear energy technology are examined. In the case of fusion, the national security barrier associated with the laser and E-beam approaches is discussed; for fission, the international security requirements, due to the possibility of the theft or diversion of special nuclear materials or sabotage of nuclear facilities, are highlighted. The paper outlines the nuclear fuel cycle and terrorist threat, examples of security barriers, and the current approaches to transferring technology. (auth)

  9. Intense laser effects on nonlinear optical absorption and optical rectification in single quantum wells under applied electric and magnetic field

    International Nuclear Information System (INIS)

    Duque, C.A.; Kasapoglu, E.; Sakiroglu, S.; Sari, H.; Soekmen, I.

    2011-01-01

    In this work the effects of intense laser on the electron-related nonlinear optical absorption and nonlinear optical rectification in GaAs-Ga 1-x Al x As quantum wells are studied under, applied electric and magnetic field. The electric field is applied along the growth direction of the quantum well whereas the magnetic field has been considered to be in-plane. The calculations were performed within the density matrix formalism with the use of the effective mass and parabolic band approximations. The intense laser effects are included through the Floquet method, by modifying the confining potential associated to the heterostructure. Results are presented for the nonlinear optical absorption, the nonlinear optical rectification and the resonant peak of these two optical processes. Several configurations of the dimensions of the quantum well, the applied electric and magnetic fields, and the incident intense laser radiation have been considered. The outcome of the calculation suggests that the nonlinear optical absorption and optical rectification are non-monotonic functions of the dimensions of the heterostructure and of the external perturbations considered in this work.

  10. PEDESTRIAN DETECTION BY LASER SCANNING AND DEPTH IMAGERY

    Directory of Open Access Journals (Sweden)

    A. Barsi

    2016-06-01

    Full Text Available Pedestrian flow is much less regulated and controlled compared to vehicle traffic. Estimating flow parameters would support many safety, security or commercial applications. Current paper discusses a method that enables acquiring information on pedestrian movements without disturbing and changing their motion. Profile laser scanner and depth camera have been applied to capture the geometry of the moving people as time series. Procedures have been developed to derive complex flow parameters, such as count, volume, walking direction and velocity from laser scanned point clouds. Since no images are captured from the faces of pedestrians, no privacy issues raised. The paper includes accuracy analysis of the estimated parameters based on video footage as reference. Due to the dense point clouds, detailed geometry analysis has been conducted to obtain the height and shoulder width of pedestrians and to detect whether luggage has been carried or not. The derived parameters support safety (e.g. detecting critical pedestrian density in mass events, security (e.g. detecting prohibited baggage in endangered areas and commercial applications (e.g. counting pedestrians at all entrances/exits of a shopping mall.

  11. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  12. Comprehensive legal aid to the participants in criminal proceedings when applying security measures

    Directory of Open Access Journals (Sweden)

    Fadeev P.V.

    2014-12-01

    Full Text Available Legal assistance to the participants in criminal procedure is represented as a complex phenomenon, including the features of international legal assistance, qualified legal assistance, as well as the activities of public authorities in criminal proceedings and professional lawyers (attorneys, advocates, representatives to assist physical and legal persons to protect, safeguard and realize their rights and interests. Legal assistance in case of threat to life, health, rights of participants in criminal proceedings is considered. The activity of certain subjects of criminal proceedings aimed at explaining the rights of crime victims is analyzed. The grounds for applying security measures are determined. Proposals for improving part 3 of article 11 of the RF Criminal Procedure Code are made: “3. In case there is a threat of causing physical, property, moral damage or other harm prohibited by criminal law to rights and legitimate interests of the victim, witness or other participants in criminal proceedings as well as their close relatives, relatives or close persons, the court (judge, the prosecutor, the head of the investigative agency, the investigator, the preliminary investigation agency take security measures, provided by part 9 of article 166, part 2 of article 186, part 8 of article 193, paragraph 4 of part 2 of article 241 and part 5 of article 278 of this Code as well as other security measures provided by the RF legislation, in respect of those persons within twenty-four hours on the basis of these persons’ written (oral statement or on their own initiative within their competence”.

  13. Moving beyond probabilities – Strength of knowledge characterisations applied to security

    International Nuclear Information System (INIS)

    Askeland, Tore; Flage, Roger; Aven, Terje

    2017-01-01

    Many security experts avoid the concept of probability when assessing risk and vulnerabilities. Their main argument is that meaningful probabilities cannot be determined and they are consequently not useful for decision-making and security management. However, to give priority to some measures and not others, the likelihood dimension needs to be addressed in some way; the question is how. One approach receiving attention recently is to add strength of knowledge judgements to the probabilities and probability intervals generated. The judgements provide a qualitative labelling of how strong the knowledge supporting the probability assignments is. Criteria for such labelling have been developed, but not for a security setting. The purpose of this paper is to develop such criteria specific to security applications and, using some examples, to demonstrate their suitability. - Highlights: • The concept of probability is often avoided in security risk assessments. • We argue that the likelihood/probability dimension needs to be somehow addressed. • Probabilities should be supplemented by qualitative strength-of-knowledge scores. • Such criteria specific to security applications are developed. • Two examples are used to demonstrate the suitability of the suggested criteria.

  14. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  15. Laser-diode pumped Nd:YAG lasers; Laser diode reiki Nd:YAG lasear

    Energy Technology Data Exchange (ETDEWEB)

    Yuasa, H.; Akiyama, Y.; Nakayama, M. [Toshiba Corp., Tokyo (Japan)

    2000-04-01

    Laser-diode pumped Nd:YAG lasers are expected to be applied to laser processing fields such as welding, cutting, drilling, and marking due to their potential for high efficiency and compactness. We are designing and developing laser-diode pumped Nd:YAG lasers using numerical analysis simulation techniques such as ray tracing and thermal analysis. We have succeeded in achieving a laser power of more than 3 kW with 20% efficiency, which is the best ever obtained. In addition, we have developed a laser-diode pumped green laser by second harmonic generation, for precision machining on silicon wafers. (author)

  16. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2000-01-01

    An information security architecture is made up of several components. Each component in the architecture focuses on establishing acceptable levels of control. These controls are then applied to the operating environment of an organization. Functionally, information security architecture combines technical, practical, and cost-effective solutions to provide an adequate and appropriate level of security.Information Security Architecture: An Integrated Approach to Security in the Organization details the five key components of an information security architecture. It provides C-level executives

  17. OPTICAL correlation identification technology applied in underwater laser imaging target identification

    Science.gov (United States)

    Yao, Guang-tao; Zhang, Xiao-hui; Ge, Wei-long

    2012-01-01

    The underwater laser imaging detection is an effective method of detecting short distance target underwater as an important complement of sonar detection. With the development of underwater laser imaging technology and underwater vehicle technology, the underwater automatic target identification has gotten more and more attention, and is a research difficulty in the area of underwater optical imaging information processing. Today, underwater automatic target identification based on optical imaging is usually realized with the method of digital circuit software programming. The algorithm realization and control of this method is very flexible. However, the optical imaging information is 2D image even 3D image, the amount of imaging processing information is abundant, so the electronic hardware with pure digital algorithm will need long identification time and is hard to meet the demands of real-time identification. If adopt computer parallel processing, the identification speed can be improved, but it will increase complexity, size and power consumption. This paper attempts to apply optical correlation identification technology to realize underwater automatic target identification. The optics correlation identification technology utilizes the Fourier transform characteristic of Fourier lens which can accomplish Fourier transform of image information in the level of nanosecond, and optical space interconnection calculation has the features of parallel, high speed, large capacity and high resolution, combines the flexibility of calculation and control of digital circuit method to realize optoelectronic hybrid identification mode. We reduce theoretical formulation of correlation identification and analyze the principle of optical correlation identification, and write MATLAB simulation program. We adopt single frame image obtained in underwater range gating laser imaging to identify, and through identifying and locating the different positions of target, we can improve

  18. Ion Beam Analysis applied to laser-generated plasmas

    Czech Academy of Sciences Publication Activity Database

    Cutroneo, Mariapompea; Macková, Anna; Havránek, Vladimír; Malinský, Petr; Torrisi, L.; Kormunda, M.; Barchuk, M.; Ullschmied, Jiří; Dudžák, Roman

    2016-01-01

    Roč. 11, APR (2016), C04011 ISSN 1748-0221. [Conference on Plasma Physics by Laser and Applications (PPLA). Frascati, 05.10.2015-07.10.2015] R&D Projects: GA MŠk(CZ) LM2011019; GA ČR GA15-01602S; GA MŠk LM2015073 Institutional support: RVO:61389021 ; RVO:61389005 Keywords : accelerator applications * lasers * plasma diagnostics Subject RIV: BG - Nuclear, Atomic and Molecular Physics, Colliders; BL - Plasma and Gas Discharge Physics (UFP-V) Impact factor: 1.220, year: 2016

  19. Applied Physics Research at the Idaho Accelerator Center

    International Nuclear Information System (INIS)

    Date, D. S.; Hunt, A. W.; Chouffani, K.; Wells, D. P.

    2011-01-01

    The Idaho Accelerator Center, founded in 1996 and based at Idaho State University, supports research, education, and high technology economic development in the United States. The research center currently has eight electron linear accelerators ranging in energy from 6 to 44 MeV with the latter linear accelerator capable of picosecond pulses, a 2 MeV positive-ion Van de Graaff, a 4 MV Nec tandem Pelletron, and a pulsed-power 8 k A, 10 MeV electron induction accelerator. Current research emphases include, accelerator physics research, accelerator based medical isotope production, active interrogation techniques for homeland security and nuclear nonproliferation applications, non destructive testing and materials science studies in support of industry as well as the development of advanced nuclear fuels, pure and applied radio-biology, and medical physics. This talk will highlight three of these areas including the production of the isotopes 99 Tc and 67 Cu for medical diagnostics and therapy, as well as two new technologies currently under development for nuclear safeguards and homeland security - namely laser Compton scattering and the polarized photofission of actinides

  20. Semiconductor lasers stability, instability and chaos

    CERN Document Server

    Ohtsubo, Junji

    2017-01-01

    This book describes the fascinating recent advances made concerning the chaos, stability and instability of semiconductor lasers, and discusses their applications and future prospects in detail. It emphasizes the dynamics in semiconductor lasers by optical and electronic feedback, optical injection, and injection current modulation. Applications of semiconductor laser chaos, control and noise, and semiconductor lasers are also demonstrated. Semiconductor lasers with new structures, such as vertical-cavity surface-emitting lasers and broad-area semiconductor lasers, are intriguing and promising devices. Current topics include fast physical number generation using chaotic semiconductor lasers for secure communication, development of chaos, quantum-dot semiconductor lasers and quantum-cascade semiconductor lasers, and vertical-cavity surface-emitting lasers. This fourth edition has been significantly expanded to reflect the latest developments. The fundamental theory of laser chaos and the chaotic dynamics in se...

  1. Wavefront compensation applied to AVLIS laser systems

    International Nuclear Information System (INIS)

    Gonsiorowski, T.; Wirth, A.

    1995-01-01

    The efficiency of an AVLIS system depends upon the power density and uniformity of the laser system. Because of wavefront aberrations the realized beam quality is not ideal. Wavefront compensation provides a means to improve beam quality and system efficiency. (author)

  2. Laser simulation applying Fox-Li iteration: investigation of reason for non-convergence

    Science.gov (United States)

    Paxton, Alan H.; Yang, Chi

    2017-02-01

    Fox-Li iteration is often used to numerically simulate lasers. If a solution is found, the complex field amplitude is a good indication of the laser mode. The case of a semiconductor laser, for which the medium possesses a self-focusing nonlinearity, was investigated. For a case of interest, the iterations did not yield a converged solution. Another approach was needed to explore the properties of the laser mode. The laser was treated (unphysically) as a regenerative amplifier. As the input to the amplifier, we required a smooth complex field distribution that matched the laser resonator. To obtain such a field, we found what would be the solution for the laser field if the strength of the self focusing nonlinearity were α = 0. This was used as the input to the laser, treated as an amplifier. Because the beam deteriorated as it propagated multiple passes in the resonator and through the gain medium (for α = 2.7), we concluded that a mode with good beam quality could not exist in the laser.

  3. The role of optics in secure credentials

    Science.gov (United States)

    Lichtenstein, Terri L.

    2006-02-01

    The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.

  4. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  5. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  6. Macular lesion caused by neodymium laser

    International Nuclear Information System (INIS)

    Prammer, G.; Wiesflecker, J.; Grabner, G.

    1980-01-01

    A 21-year-old patient was struck by the pulse of a rangefinder laser (infrared laser). The massive pathologic changes on his macula are explained by the focusing effect of the refractive media. Secure location of the beam, the avoidance of reflective surfaces and absorbing screens are recommended as protective measures. (orig.) [de

  7. Semiconductor Lasers Stability, Instability and Chaos

    CERN Document Server

    Ohtsubo, Junji

    2008-01-01

    This monograph describes fascinating recent progress in the field of chaos, stability and instability of semiconductor lasers. Applications and future prospects are discussed in detail. The book emphasizes the various dynamics induced in semiconductor lasers by optical and electronic feedback, optical injection, and injection current modulation. Recent results of both theoretical and experimental investigations are presented. Demonstrating applications of semiconductor laser chaos, control and noise, Semiconductor Lasers describes suppression and chaotic secure communications. For those who are interested in optics but not familiar with nonlinear systems, a brief introduction to chaos analysis is presented.

  8. Raman Spectroscopy for Homeland Security Applications

    Directory of Open Access Journals (Sweden)

    Gregory Mogilevsky

    2012-01-01

    Full Text Available Raman spectroscopy is an analytical technique with vast applications in the homeland security and defense arenas. The Raman effect is defined by the inelastic interaction of the incident laser with the analyte molecule’s vibrational modes, which can be exploited to detect and identify chemicals in various environments and for the detection of hazards in the field, at checkpoints, or in a forensic laboratory with no contact with the substance. A major source of error that overwhelms the Raman signal is fluorescence caused by the background and the sample matrix. Novel methods are being developed to enhance the Raman signal’s sensitivity and to reduce the effects of fluorescence by altering how the hazard material interacts with its environment and the incident laser. Basic Raman techniques applicable to homeland security applications include conventional (off-resonance Raman spectroscopy, surface-enhanced Raman spectroscopy (SERS, resonance Raman spectroscopy, and spatially or temporally offset Raman spectroscopy (SORS and TORS. Additional emerging Raman techniques, including remote Raman detection, Raman imaging, and Heterodyne imaging, are being developed to further enhance the Raman signal, mitigate fluorescence effects, and monitor hazards at a distance for use in homeland security and defense applications.

  9. Applied Energy Program

    Science.gov (United States)

    Science Programs Applied Energy Programs Civilian Nuclear Energy Programs Laboratory Directed Research » Applied Energy Program Applied Energy Program Los Alamos is using its world-class scientific capabilities to enhance national energy security by developing energy sources with limited environmental impact

  10. Laser-Plasma Modeling Using PERSEUS Extended-MHD Simulation Code for HED Plasmas

    Science.gov (United States)

    Hamlin, Nathaniel; Seyler, Charles

    2017-10-01

    We discuss the use of the PERSEUS extended-MHD simulation code for high-energy-density (HED) plasmas in modeling the influence of Hall and electron inertial physics on laser-plasma interactions. By formulating the extended-MHD equations as a relaxation system in which the current is semi-implicitly time-advanced using the Generalized Ohm's Law, PERSEUS enables modeling of extended-MHD phenomena (Hall and electron inertial physics) without the need to resolve the smallest electron time scales, which would otherwise be computationally prohibitive in HED plasma simulations. We first consider a laser-produced plasma plume pinched by an applied magnetic field parallel to the laser axis in axisymmetric cylindrical geometry, forming a conical shock structure and a jet above the flow convergence. The Hall term produces low-density outer plasma, a helical field structure, flow rotation, and field-aligned current, rendering the shock structure dispersive. We then model a laser-foil interaction by explicitly driving the oscillating laser fields, and examine the essential physics governing the interaction. This work is supported by the National Nuclear Security Administration stewardship sciences academic program under Department of Energy cooperative agreements DE-FOA-0001153 and DE-NA0001836.

  11. Quantum cryptography to satellites for global secure key distribution

    Science.gov (United States)

    Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.

    2017-11-01

    We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.

  12. Multibeam Fibre Laser Cutting

    DEFF Research Database (Denmark)

    Olsen, Flemming Ove

    The appearance of the high power high brilliance fibre laser has opened for new possibilities in laser materials processing. In laser cutting this laser has demonstrated high cutting performance compared to the dominating cutting laser, the CO2-laser. However, quality problems in fibre......-laser cutting have until now limited its application in metal cutting. In this paper the first results of proof-of-principle studies applying a new approach (patent pending) for laser cutting with high brightness short wavelength lasers will be presented. In the approach, multi beam patterns are applied...... to control the melt flow out of the cut kerf resulting in improved cut quality in metal cutting. The beam patterns in this study are created by splitting up beams from 2 single mode fibre lasers and combining these beams into a pattern in the cut kerf. The results are obtained with a total of 550 W of single...

  13. Multibeam fiber laser cutting

    DEFF Research Database (Denmark)

    Olsen, Flemming Ove; Hansen, Klaus Schütt; Nielsen, Jakob Skov

    2009-01-01

    The appearance of the high power high brilliance fiber laser has opened for new possibilities in laser materials processing. In laser cutting this laser has demonstrated high cutting performance compared to the dominating Cutting laser, the CO2 laser. However, quality problems in fiber......-laser cutting have until now limited its application to metal cutting. In this paper the first results of proof-of-principle Studies applying a new approach (patent pending) for laser cutting with high brightness and short wavelength lasers will be presented. In the approach, multibeam patterns are applied...... to control the melt flow out of the cut kerf resulting in improved cut quality in metal cutting. The beam patterns in this study are created by splitting up beams from two single mode fiber lasers and combining these beams into a pattern in the cut kerf. The results are obtained with a total of 550 W...

  14. Three-Dimensional Simulations of Flat-Foil Laser-Imprint Experiments at the National Ignition Facility

    Science.gov (United States)

    Shvydky, A.; Radha, P. B.; Rosenberg, M. J.; Anderson, K. S.; Goncharov, V. N.; Marozas, J. A.; Marshall, F. J.; McKenty, P. W.; Regan, S. P.; Sangster, T. C.; Hohenberger, M.; di Nicola, J. M.; Koning, J. M.; Marinak, M. M.; Masse, L.; Karasik, M.

    2017-10-01

    Control of shell nonuniformities imprinted by the laser and amplified by hydrodynamic instabilities in the imploding target is critical for the success of direct-drive ignition at the National Ignition Facility (NIF). To measure a level of imprint and its reduction by the NIF smoothing by spectral dispersion (SSD), we performed experiments that employed flat CH foils driven with a single NIF beam with either no SSD or the NIF indirect-drive SSD applied to the laser pulse. Face-on x-ray radiography was used to measure optical depth variations, from which the amplitudes of the foil areal-density modulations were obtained. Results of 3-D, radiation-hydrodynamic code HYDRA simulations of the growth of the imprint-seeded perturbations are presented and compared with the experimental data. This work was supported by the U.S. Department of Energy National Nuclear Security Administration under Award Number DE-NA0001944 and under the auspices of the Lawrence Livermore National Security, LLC, (LLNS) under Contract Number DE-AC52-07NA27344.

  15. Future consumer mobile phone security: A case study using the data-centric security model

    NARCIS (Netherlands)

    van Cleeff, A.

    Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

  16. 3D laser scanning techniques applying to tunnel documentation and geological mapping at Aespoe hard rock laboratory, Sweden

    International Nuclear Information System (INIS)

    Feng, Q.; Wang, G.; Roeshoff, K.

    2008-01-01

    3D terrestrial laser scanning is nowadays one of the most attractive methods to applying for 3D mapping and documentation of rock faces and tunnels, and shows the most potential to improve the data quality and provide some good solutions in rock engineering projects. In this paper, the state-of-the-art methods are described for different possibility to tunnel documentation and geological mapping based on 3D laser scanning data. Some results are presented from the case study performed at the Hard Rock Laboratory, Aespoe run by SKB, Swedish Nuclear Fuel and Waste Management Co. Comparing to traditional methods, 3D laser scanning techniques can not only provide us with a rapid and 3D digital way for tunnel documentation, but also create a potential chance to achieve high quality data, which might be beneficial to different rock engineering project procedures, including field data acquisition, data processing, data retrieving and management, and also modeling and design. (authors)

  17. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  18. Intense laser effects on donor impurity in a cylindrical single and vertically coupled quantum dots under combined effects of hydrostatic pressure and applied electric field

    International Nuclear Information System (INIS)

    Duque, C.A.; Kasapoglu, E.; Sakiroglu, S.; Sari, H.; Soekmen, I.

    2010-01-01

    Using the effective mass and parabolic band approximations and a variational procedure we have calculated the combined effects of intense laser radiation, hydrostatic pressure, and applied electric field on shallow-donor impurity confined in cylindrical-shaped single and double GaAs-Ga 1-x Al x As QD. Several impurity positions and inputs of the heterostructure dimensions, hydrostatic pressure, and applied electric field have been considered. The laser effects have been introduced by a perturbative scheme in which the Coulomb and the barrier potentials are modified to obtain dressed potentials. Our findings suggest that (1) for on-center impurities in single QD the binding energy is a decreasing function of the dressing parameter and for small dot dimensions of the structures (lengths and radius) the binding energy is more sensitive to the dressing parameter, (2) the binding energy is an increasing/decreasing function of the hydrostatic pressure/applied electric field, (3) the effects of the intense laser field and applied electric field on the binding energy are dominant over the hydrostatic pressure effects, (4) in vertically coupled QD the binding energy for donor impurity located in the barrier region is smaller than for impurities in the well regions and can be strongly modified by the laser radiation, and finally (5) in asymmetrical double QD heterostructures the binding energy as a function of the impurity positions follows a similar behavior to the observed for the amplitude of probability of the noncorrelated electron wave function.

  19. Semiconductor Lasers Stability, Instability and Chaos

    CERN Document Server

    Ohtsubo, Junji

    2013-01-01

    This third edition of “Semiconductor Lasers, Stability, Instability and Chaos” was significantly extended.  In the previous edition, the dynamics and characteristics of chaos in semiconductor lasers after the introduction of the fundamental theory of laser chaos and chaotic dynamics induced by self-optical feedback and optical injection was discussed. Semiconductor lasers with new device structures, such as vertical-cavity surface-emitting lasers and broad-area semiconductor lasers, are interesting devices from the viewpoint of chaotic dynamics since they essentially involve chaotic dynamics even in their free-running oscillations. These topics are also treated with respect to the new developments in the current edition. Also the control of such instabilities and chaos control are critical issues for applications. Another interesting and important issue of semiconductor laser chaos in this third edition is chaos synchronization between two lasers and the application to optical secure communication. One o...

  20. Applied optics. Gain modulation by graphene plasmons in aperiodic lattice lasers.

    Science.gov (United States)

    Chakraborty, S; Marshall, O P; Folland, T G; Kim, Y-J; Grigorenko, A N; Novoselov, K S

    2016-01-15

    Two-dimensional graphene plasmon-based technologies will enable the development of fast, compact, and inexpensive active photonic elements because, unlike plasmons in other materials, graphene plasmons can be tuned via the doping level. Such tuning is harnessed within terahertz quantum cascade lasers to reversibly alter their emission. This is achieved in two key steps: first, by exciting graphene plasmons within an aperiodic lattice laser and, second, by engineering photon lifetimes, linking graphene's Fermi energy with the round-trip gain. Modal gain and hence laser spectra are highly sensitive to the doping of an integrated, electrically controllable, graphene layer. Demonstration of the integrated graphene plasmon laser principle lays the foundation for a new generation of active, programmable plasmonic metamaterials with major implications across photonics, material sciences, and nanotechnology. Copyright © 2016, American Association for the Advancement of Science.

  1. Laser marking method and device

    International Nuclear Information System (INIS)

    Okazaki, Yuki; Aoki, Nobutada; Mukai, Narihiko; Sano, Yuji; Yamamoto, Seiji.

    1997-01-01

    An object is disposed in laser beam permeating liquid or gaseous medium. Laser beams such as CW laser or pulse laser oscillated from a laser device are emitted to the object to apply laser markings with less degradation of identification and excellent corrosion resistance on the surface of the object simply and easily. Upon applying the laser markings, a liquid or gas as a laser beam permeating medium is blown onto the surface of the object, or the liquid or gas in the vicinity of the object is sucked, the laser beam-irradiated portion on the surface can be cooled positively. Accordingly, the laser marking can be formed on the surface of the object with less heat affection to the object. In addition, if the content of a nitrogen gas in the laser beam permeating liquid medium is reduced by degassing to lower than a predetermined value, or the laser beam permeating gaseous medium is formed by an inert gas, a laser marking having high corrosion resistance and reliability can be formed on the surface of the objective member. (N.H.)

  2. Ultrashort pulse laser technology laser sources and applications

    CERN Document Server

    Schrempel, Frank; Dausinger, Friedrich

    2016-01-01

    Ultrashort laser pulses with durations in the femtosecond range up to a few picoseconds provide a unique method for precise materials processing or medical applications. Paired with the recent developments in ultrashort pulse lasers, this technology is finding its way into various application fields. The book gives a comprehensive overview of the principles and applications of ultrashort pulse lasers, especially applied to medicine and production technology. Recent advances in laser technology are discussed in detail. This covers the development of reliable and cheap low power laser sources as well as high average power ultrashort pulse lasers for large scale manufacturing. The fundamentals of laser-matter-interaction as well as processing strategies and the required system technology are discussed for these laser sources with respect to precise materials processing. Finally, different applications within medicine, measurement technology or materials processing are highlighted.

  3. Comparative study of pulsed laser cleaning applied to weathered marble surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Ortiz, P., E-mail: mportcal@upo.es [Department of Physical, Chemical and Natural Systems, Universidad Pablo de Olavide, 41013 Seville (Spain); Antúnez, V.; Ortiz, R.; Martín, J.M. [Department of Physical, Chemical and Natural Systems, Universidad Pablo de Olavide, 41013 Seville (Spain); Gómez, M.A. [Instituto Andaluz de Patrimonio Histórico, Camino de los Descubrimientos s/n, 41092 Seville (Spain); Hortal, A.R.; Martínez-Haya, B. [Department of Physical, Chemical and Natural Systems, Universidad Pablo de Olavide, 41013 Seville (Spain)

    2013-10-15

    The removal of unwanted matter from surface stones is a demanding task in the conservation of cultural heritage. This paper investigates the effectiveness of near-infrared (IR) and ultraviolet (UV) laser pulses for the cleaning of surface deposits, iron oxide stains and different types of graffiti (black, red and green sprays and markers, and black cutting-edge ink) on dolomitic white marble. The performance of the laser techniques is compared to common cleaning methods on the same samples, namely pressurized water and chemical treatments. The degree of cleaning achieved with each technique is assessed by means of colorimetric measurements and X-ray microfluorescence. Eventual morphological changes induced on the marble substrate are monitored with optical and electronic microscopy. It is found that UV pulsed laser ablation at 266 nm manages to clean all the stains except the cutting-edge ink, although some degree of surface erosion is produced. The IR laser pulses at 1064 nm can remove surface deposits and black spray acceptably, but a yellowing is observed on the stone surface after treatment. An economic evaluation shows that pulsed laser cleaning techniques are advantageous for the rapid cleaning of small or inaccessible surface areas, although their extensive application becomes expensive due to the long operating times required.

  4. Comparative study of pulsed laser cleaning applied to weathered marble surfaces

    International Nuclear Information System (INIS)

    Ortiz, P.; Antúnez, V.; Ortiz, R.; Martín, J.M.; Gómez, M.A.; Hortal, A.R.; Martínez-Haya, B.

    2013-01-01

    The removal of unwanted matter from surface stones is a demanding task in the conservation of cultural heritage. This paper investigates the effectiveness of near-infrared (IR) and ultraviolet (UV) laser pulses for the cleaning of surface deposits, iron oxide stains and different types of graffiti (black, red and green sprays and markers, and black cutting-edge ink) on dolomitic white marble. The performance of the laser techniques is compared to common cleaning methods on the same samples, namely pressurized water and chemical treatments. The degree of cleaning achieved with each technique is assessed by means of colorimetric measurements and X-ray microfluorescence. Eventual morphological changes induced on the marble substrate are monitored with optical and electronic microscopy. It is found that UV pulsed laser ablation at 266 nm manages to clean all the stains except the cutting-edge ink, although some degree of surface erosion is produced. The IR laser pulses at 1064 nm can remove surface deposits and black spray acceptably, but a yellowing is observed on the stone surface after treatment. An economic evaluation shows that pulsed laser cleaning techniques are advantageous for the rapid cleaning of small or inaccessible surface areas, although their extensive application becomes expensive due to the long operating times required.

  5. Comparative study of pulsed laser cleaning applied to weathered marble surfaces

    Science.gov (United States)

    Ortiz, P.; Antúnez, V.; Ortiz, R.; Martín, J. M.; Gómez, M. A.; Hortal, A. R.; Martínez-Haya, B.

    2013-10-01

    The removal of unwanted matter from surface stones is a demanding task in the conservation of cultural heritage. This paper investigates the effectiveness of near-infrared (IR) and ultraviolet (UV) laser pulses for the cleaning of surface deposits, iron oxide stains and different types of graffiti (black, red and green sprays and markers, and black cutting-edge ink) on dolomitic white marble. The performance of the laser techniques is compared to common cleaning methods on the same samples, namely pressurized water and chemical treatments. The degree of cleaning achieved with each technique is assessed by means of colorimetric measurements and X-ray microfluorescence. Eventual morphological changes induced on the marble substrate are monitored with optical and electronic microscopy. It is found that UV pulsed laser ablation at 266 nm manages to clean all the stains except the cutting-edge ink, although some degree of surface erosion is produced. The IR laser pulses at 1064 nm can remove surface deposits and black spray acceptably, but a yellowing is observed on the stone surface after treatment. An economic evaluation shows that pulsed laser cleaning techniques are advantageous for the rapid cleaning of small or inaccessible surface areas, although their extensive application becomes expensive due to the long operating times required.

  6. Finding Security Patterns to Countermeasure Software Vulnerabilities

    OpenAIRE

    Borstad, Ole Gunnar

    2008-01-01

    Software security is an increasingly important part of software development as the risk from attackers is constantly evolving through increased exposure, threats and economic impact of security breaches. Emerging security literature describes expert knowledge such as secure development best practices. This knowledge is often not applied by software developers because they lack security awareness, security training and secure development methods and tools. Existing methods and tools require to...

  7. Laser in urology. Laser i urologien

    Energy Technology Data Exchange (ETDEWEB)

    Breisland, H.O. (Aker Sykehus, Oslo (Norway))

    1991-09-01

    The neodymium YAG laser is particularly suited for endoscopic urologic surgery because the YAG laser light can be conducted in flexible fibers. Superficial bladder tumours can be treated under local anaesthesia in the outpatient department. The frequency of local recurrences is low, significantly lower than after electrosection or electrocoagulation. Selected cases of T2-muscle invasive bladder tumours can be cured with laser coagulation applied subsequently to transurethral resection. Combined treatment with electrosection and laser coagulation of localized prostatic cancer is a promising method which compares favourably with results obtained by other treatment modalities. Tumours in the upper urinary tract can be laser-treated through ureteroscopes or nephroscopes, but the treatment should be limited to low stage, low grade tumours. Laser is the treatment of choice for intraurethral condylomatas. Laser treatment of penil carcinoma gives excellent cosmetic and functional results and few local recurrences. Laser lithotripsy is a new technique for treatment of ureteric stones and photodynamic laser therapy is a promising tecnique for treatment of carcinoma in situ in the bladder empithelium. However, neither of these techniques are available for clinical use in Norway as yet. 17 refs., 3 figs., 1 tabs.

  8. Applied optics

    International Nuclear Information System (INIS)

    Orszag, A.; Antonetti, A.

    1988-01-01

    The 1988 progress report, of the Applied Optics laboratory, of the (Polytechnic School, France), is presented. The optical fiber activities are focused on the development of an optical gyrometer, containing a resonance cavity. The following domains are included, in the research program: the infrared laser physics, the laser sources, the semiconductor physics, the multiple-photon ionization and the nonlinear optics. Investigations on the biomedical, the biological and biophysical domains are carried out. The published papers and the congress communications are listed [fr

  9. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  10. Design-Efficiency in Security

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    In this document, we present our applied results on balancing security and performance using a running example, which is based on sensor networks. These results are forming a basis for a new approach to balance security and performance, and therefore provide design-­efficiency of key updates. We...

  11. The laser Megajoule facility personnel security and safety interlocks

    International Nuclear Information System (INIS)

    Chapuis, J.C.; Arnoul, J.P.; Hurst, A.; Manson, M.

    2012-01-01

    The LMJ (Laser Megajoule) is designed to deliver about 1.4 MJ of 0.35 μm light to targets for high energy density physics experiments. Such an installation entails specific hazards related to the presence of intense laser beams, and high voltage power laser amplifiers. Furthermore, the thermonuclear fusion reactions induced by the experiment also produce different radiations and neutrons burst, and also activate various materials in the chamber environment. All these hazards could be lethal. The SSP (Personnel Safety System) was designed to prevent accidents and protect personnel working in the LMJ. To satisfy at the lowest cost the requirements of safety regulations and those of the operation management, the choice was made to implement a functional architecture built around two independent technological barriers when required by the risk level. Each technical barrier is composed of two subsets, one dedicated to hazard sources management, and the other one dedicated to worker presence management. The two completely independent barriers, even at the sensor or actuator level, are designed with different technologies adapted to the required Safety Integrity Level. The combination of these 2 barriers is equivalent to a unique barrier with a rate of dangerous failure of about 10 -6 per year

  12. The effects of intense laser field and applied electric and magnetic fields on optical properties of an asymmetric quantum well

    Energy Technology Data Exchange (ETDEWEB)

    Restrepo, R.L., E-mail: pfrire@eia.edu.co [Department of Physics, Cumhuriyet University, 58140 Sivas (Turkey); Escuela de Ingeniería de Antioquia-EIA, Envigado (Colombia); Grupo de Materia Condensada-UdeA, Instituto de Física, Facultad de Ciencias Exactas y Naturales, Universidad de Antioquia-UdeA, Calle 70 No. 52-21, Medellín (Colombia); Ungan, F.; Kasapoglu, E. [Department of Physics, Cumhuriyet University, 58140 Sivas (Turkey); Mora-Ramos, M.E. [Facultad de Ciencias, Universidad Autonóma del Estado de Morelos, Ave. Universidad 1001, CP 62209, Cuernavaca, Morelos (Mexico); Morales, A.L.; Duque, C.A. [Grupo de Materia Condensada-UdeA, Instituto de Física, Facultad de Ciencias Exactas y Naturales, Universidad de Antioquia-UdeA, Calle 70 No. 52-21, Medellín (Colombia)

    2015-01-15

    This paper presents the results of the theoretical study of the effects of non-resonant intense laser field and electric and magnetic fields on the optical properties (the linear and third-order nonlinear refractive index and absorption coefficients) in an asymmetric quantum well. The electric field and intense laser field are applied along the growth direction of the asymmetric quantum well and the magnetic field is oriented perpendicularly. To calculate the energy and the wave functions of the electron in the asymmetric quantum well, the effective mass approximation and the method of envelope wave function are used. The asymmetric quantum well is constructed by using different aluminium concentrations in both right and left barriers. The confinement in the quantum well is changed drastically by either the effect of electric and magnetic fields or by the application of intense laser field. The optical properties are calculated using the compact density matrix approach. The results show that the effect of the intense laser field competes with the effects of the electric and magnetic fields. Consequently, peak position shifts to lower photon energies due to the effect of the intense laser field and it shifts to higher photon energies by the effects of electric and magnetic fields. In general, it is found that the concentration of aluminum, electric and magnetic fields and intense laser field are external agents that modify the optical responses in the asymmetric quantum well.

  13. Fractional laser-assisted drug uptake

    DEFF Research Database (Denmark)

    Banzhaf, Christina A; Thaysen-Petersen, Daniel; Bay, Christiane

    2017-01-01

    BACKGROUND AND OBJECTIVE: Ablative fractional laser (AFXL) is acknowledged to increase uptake of topically applied agents in skin. AFXL channels gradually close over time, which may impair this capability. The time frame for applying a drug after AFXL exposure remains to be established. The aim...... in laser-exposed and non-laser-exposed skin at 24-48 hours. CONCLUSIONS: The time frame to maintain enhanced drug delivery sustained for several hours after AFXL exposure, corresponding to channel morphology and loss of skin integrity. Lasers Surg. Med. 49:348-354, 2017. © 2016 Wiley Periodicals, Inc....

  14. A Design Methodology for Computer Security Testing

    OpenAIRE

    Ramilli, Marco

    2013-01-01

    The field of "computer security" is often considered something in between Art and Science. This is partly due to the lack of widely agreed and standardized methodologies to evaluate the degree of the security of a system. This dissertation intends to contribute to this area by investigating the most common security testing strategies applied nowadays and by proposing an enhanced methodology that may be effectively applied to different threat scenarios with the same degree of effectiveness. ...

  15. Electron-related nonlinearities in GaAs-Ga{sub 1-x}Al{sub x}As double quantum wells under the effects of intense laser field and applied electric field

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Ramos, M.E. [Facultad de Ciencias, Universidad Autonoma del Estado de Morelos, Ave. Universidad 1001, CP 62209, Cuernavaca, Morelos, Mexico (Mexico); Instituto de Fisica, Universidad de Antioquia, AA 1226 Medellin (Colombia); Duque, C.A., E-mail: cduque_echeverri@yahoo.es [Instituto de Fisica, Universidad de Antioquia, AA 1226 Medellin (Colombia); Kasapoglu, E.; Sari, H. [Cumhuriyet University, Physics Department, 58140 Sivas (Turkey); Soekmen, I. [Dokuz Eyluel University, Physics Department, 35160 Buca, Izmir (Turkey)

    2013-03-15

    The combined effects of intense laser radiation and applied electric fields on the intersubband-related linear and nonlinear optical properties in GaAs-based quantum wells are discussed. It is shown that for asymmetric double quantum well, the increasing laser field intensity causes progressive redshifts in the peak positions of the second and third harmonic coefficients. However, the resonant peaks of the nonlinear optical rectification can suffer a blueshift or a redshift, depending on the laser strengths. The same feature appears in the case of the resonant peaks corresponding to the total coefficients of optical absorption and relative change in the refractive index. - Highlights: Black-Right-Pointing-Pointer Nonlinear optical properties in double quantum wells. Black-Right-Pointing-Pointer Increasing laser field intensity causes redshifts in the peak positions. Black-Right-Pointing-Pointer Resonant peak of second order nonlinearities can be blue-shifted. Black-Right-Pointing-Pointer Relative change in refractive index depends of the applied electric field. Black-Right-Pointing-Pointer The energy position depends of the laser field parameter.

  16. Securing the Global Airspace System Via Identity-Based Security

    Science.gov (United States)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  17. Laser cleaning on Roman coins

    Science.gov (United States)

    Drakaki, E.; Karydas, A. G.; Klinkenberg, B.; Kokkoris, M.; Serafetinides, A. A.; Stavrou, E.; Vlastou, R.; Zarkadas, C.

    Ancient metal objects react with moisture and environmental chemicals to form various corrosion products. Because of the unique character and high value of such objects, any cleaning procedure should guarantee minimum destructiveness. The most common treatment used is mechanical stripping, in which it is difficult to avoid surface damage when employed. Lasers are currently being tested for a wide range of conservation applications. Since they are highly controllable and can be selectively applied, lasers can be used to achieve more effective and safer cleaning of archaeological artifacts and protect their surface details. The basic criterion that motivated us to use lasers to clean Roman coins was the requirement of pulsed emission, in order to minimize heat-induced damages. In fact, the laser interaction with the coins has to be short enough, to produce a fast removal of the encrustation, avoiding heat conduction into the substrate. The cleaning effects of three lasers operating at different wavelengths, namely a TEA CO2 laser emitting at 10.6 μm, an Er:YAG laser at 2.94 μm, and a 2ω-Nd:YAG laser at 532 nm have been compared on corroded Romans coins and various atomic and nuclear techniques have also been applied to evaluate the efficiency of the applied procedure.

  18. Optimization of airport security lanes

    Science.gov (United States)

    Chen, Lin

    2018-05-01

    Current airport security management system is widely implemented all around the world to ensure the safety of passengers, but it might not be an optimum one. This paper aims to seek a better security system, which can maximize security while minimize inconvenience to passengers. Firstly, we apply Petri net model to analyze the steps where the main bottlenecks lie. Based on average tokens and time transition, the most time-consuming steps of security process can be found, including inspection of passengers' identification and documents, preparing belongings to be scanned and the process for retrieving belongings back. Then, we develop a queuing model to figure out factors affecting those time-consuming steps. As for future improvement, the effective measures which can be taken include transferring current system as single-queuing and multi-served, intelligently predicting the number of security checkpoints supposed to be opened, building up green biological convenient lanes. Furthermore, to test the theoretical results, we apply some data to stimulate the model. And the stimulation results are consistent with what we have got through modeling. Finally, we apply our queuing model to a multi-cultural background. The result suggests that by quantifying and modifying the variance in wait time, the model can be applied to individuals with various habits customs and habits. Generally speaking, our paper considers multiple affecting factors, employs several models and does plenty of calculations, which is practical and reliable for handling in reality. In addition, with more precise data available, we can further test and improve our models.

  19. Bringing Pulsed Laser Welding into Production

    DEFF Research Database (Denmark)

    Olsen, Flemmming Ove

    1996-01-01

    In this paper, some research and develop-ment activities within pulsed laser welding technology at the Tech-nical University of Denmark will be described. The laser group at the Insti-tute for Manufacturing Technology has nearly 20 years of experience in laser materials process-ing. Inter......-nationally the group is mostly known for its contri-butions to the development of the laser cutting process, but further it has been active within laser welding, both in assisting industry in bringing laser welding into production in several cases and in performing fundamental R & D. In this paper some research...... activities concerning the weldability of high alloyed austenitic stainless steels for mass production industry applying industrial lasers for fine welding will be described. Studies on hot cracking sensitivity of high alloyed austenitic stainless steel applying both ND-YAG-lasers and CO2-lasers has been...

  20. Applying Real Options Thinking to Information Security in Networked Organizations

    NARCIS (Netherlands)

    Daneva, Maia

    2006-01-01

    An information security strategy of an organization participating in a networked business sets out the plans for designing a variety of actions that ensure confidentiality, availability, and integrity of company’s key information assets. The actions are concerned with authentication and

  1. CO2 laser pulse shortening by laser ablation of a metal target

    International Nuclear Information System (INIS)

    Donnelly, T.; Mazoyer, M.; Lynch, A.; O'Sullivan, G.; O'Reilly, F.; Dunne, P.; Cummins, T.

    2012-01-01

    A repeatable and flexible technique for pulse shortening of laser pulses has been applied to transversely excited atmospheric (TEA) CO 2 laser pulses. The technique involves focusing the laser output onto a highly reflective metal target so that plasma is formed, which then operates as a shutter due to strong laser absorption and scattering. Precise control of the focused laser intensity allows for timing of the shutter so that different temporal portions of the pulse can be reflected from the target surface before plasma formation occurs. This type of shutter enables one to reduce the pulse duration down to ∼2 ns and to remove the low power, long duration tails that are present in TEA CO 2 pulses. The transmitted energy is reduced as the pulse duration is decreased but the reflected power is ∼10 MW for all pulse durations. A simple laser heating model verifies that the pulse shortening depends directly on the plasma formation time, which in turn is dependent on the applied laser intensity. It is envisaged that this plasma shutter will be used as a tool for pulse shaping in the search for laser pulse conditions to optimize conversion efficiency from laser energy to useable extreme ultraviolet (EUV) radiation for EUV source development.

  2. When Should We Care About Sustainability? Applying Human Security as the Decisive Criterion

    Directory of Open Access Journals (Sweden)

    Alexander K. Lautensach

    2012-05-01

    Full Text Available It seems intuitively clear that not all human endeavours warrant equal concern over the extent of their sustainability. This raises the question about what criteria might best serve for their prioritisation. We refute, on empirical and theoretical grounds, the counterclaim that sustainability should be of no concern regardless of the circumstances. Human security can serve as a source of criteria that are both widely shared and can be assessed in a reasonably objective manner. Using established classifications, we explore how four forms of sustainability (environmental, economic, social, and cultural relate to the four pillars of human security (environmental, economic, sociopolitical, and health-related. Our findings, based on probable correlations, suggest that the criteria of human security allow for a reliable discrimination between relatively trivial incidences of unsustainable behavior and those that warrant widely shared serious concern. They also confirm that certain sources of human insecurity, such as poverty or violent conflict, tend to perpetuate unsustainable behavior, a useful consideration for the design of development initiatives. Considering that human security enjoys wide and increasing political support among the international community, it is to be hoped that by publicizing the close correlation between human security and sustainability greater attention will be paid to the latter and to its careful definition.

  3. Industry example of how Safety and Security are applied within the Organizations: The Transnubel example

    International Nuclear Information System (INIS)

    Bairiot, X.

    2016-01-01

    During more than 40 years of transport of radioactive materials, Transnubel noticed the evolution regarding Safety and Security requirements. These requirements have to be met within the frame of commercial activities, with constraints as planning, cost control, availabilities, .... In addition, other requirements issued by customers, eventually linked with Safety and Security, have also to be taken in account. Since many years, the company is therefore organized for all daily activities on basis of a Quality System: this Quality System, based on the ISO 9000, aims to give an answer to the ISO 9000 requirements, but also to the safety requirements, which are integrated at different levels in the Quality System. The trend of the last years concerning Security has an impact on the organization and documentation in the company. Due to the legal requirements, the implementation has not been possible within the same ISO 9000 structure. As a result, a Security system as been created on a similar basis as the ISO 9000: security manual, security procedures and security working instructions. Two systems therefore are existing within our company: a Quality System including Safety, and a Security System. In the frame of our international transports, we need to rely on the flexibility of our Quality System and Security System to allow us to take in account national regulations: the regulations dealing with Security and Safety (and their interpretations) are national competences, and differ once borders are crossed. The presentation will give an overview of the implementation of the Safety and Security aspects in the company: the structure and the implementation. And will try to answer the question: is the increase of the structure / documents always a benefit to the execution of the transports? (author)

  4. The novel approach to enhance seed security: dual anti-counterfeiting methods applied on tobacco pelleted seeds.

    Science.gov (United States)

    Guan, Yajing; Wang, Jianchen; Tian, Yixin; Hu, Weimin; Zhu, Liwei; Zhu, Shuijin; Hu, Jin

    2013-01-01

    Seed security is of prime importance for agriculture. To protect true seeds from being faked, more secure dual anti-counterfeiting technologies for tobacco (Nicotiana tabacum L.) pelleted seed were developed in this paper. Fluorescein (FR), rhodamine B (RB), and magnetic powder (MP) were used as anti-counterfeiting labels. According to their different properties and the special seed pelleting process, four dual-labeling treatments were conducted for two tobacco varieties, MS Yunyan85 (MSYY85) and Honghua Dajinyuan (HHDJY). Then the seed germination and seedling growth status were investigated, and the fluorescence in cracked pellets and developing seedlings was observed under different excitation lights. The results showed that FR, RB, and MP had no negative effects on the germination, seedling growth, and MDA content of the pelleted seeds, and even some treatments significantly enhanced seedling dry weight, vigor index, and shoot height in MS YY85, and increased SOD activity and chlorophyll content in HHDJY as compared to the control. In addition, the cotyledon tip of seedlings treated with FR and MP together represented bright green fluorescence under illumination of blue light (478 nm). And the seedling cotyledon vein treated with RB and MP together showed red fluorescence under green light (546 nm). All seeds pelleted with magnetic powder of proper concentration could be attracted by a magnet. Thus, it indicated that those new dual-labeling methods that fluorescent compound and magnetic powder simultaneously applied in the same seed pellets definitely improved anti-counterfeiting technology and enhanced the seed security. This technology will ensure that high quality seed will be used in the crop production.

  5. The novel approach to enhance seed security: dual anti-counterfeiting methods applied on tobacco pelleted seeds.

    Directory of Open Access Journals (Sweden)

    Yajing Guan

    Full Text Available Seed security is of prime importance for agriculture. To protect true seeds from being faked, more secure dual anti-counterfeiting technologies for tobacco (Nicotiana tabacum L. pelleted seed were developed in this paper. Fluorescein (FR, rhodamine B (RB, and magnetic powder (MP were used as anti-counterfeiting labels. According to their different properties and the special seed pelleting process, four dual-labeling treatments were conducted for two tobacco varieties, MS Yunyan85 (MSYY85 and Honghua Dajinyuan (HHDJY. Then the seed germination and seedling growth status were investigated, and the fluorescence in cracked pellets and developing seedlings was observed under different excitation lights. The results showed that FR, RB, and MP had no negative effects on the germination, seedling growth, and MDA content of the pelleted seeds, and even some treatments significantly enhanced seedling dry weight, vigor index, and shoot height in MS YY85, and increased SOD activity and chlorophyll content in HHDJY as compared to the control. In addition, the cotyledon tip of seedlings treated with FR and MP together represented bright green fluorescence under illumination of blue light (478 nm. And the seedling cotyledon vein treated with RB and MP together showed red fluorescence under green light (546 nm. All seeds pelleted with magnetic powder of proper concentration could be attracted by a magnet. Thus, it indicated that those new dual-labeling methods that fluorescent compound and magnetic powder simultaneously applied in the same seed pellets definitely improved anti-counterfeiting technology and enhanced the seed security. This technology will ensure that high quality seed will be used in the crop production.

  6. Laser direct marking applied to rasterizing miniature Data Matrix Code on aluminum alloy

    Science.gov (United States)

    Li, Xia-Shuang; He, Wei-Ping; Lei, Lei; Wang, Jian; Guo, Gai-Fang; Zhang, Teng-Yun; Yue, Ting

    2016-03-01

    Precise miniaturization of 2D Data Matrix (DM) Codes on Aluminum alloy formed by raster mode laser direct part marking is demonstrated. The characteristic edge over-burn effects, which render vector mode laser direct part marking inadequate for producing precise and readable miniature codes, are minimized with raster mode laser marking. To obtain the control mechanism for the contrast and print growth of miniature DM code by raster laser marking process, the temperature field model of long pulse laser interaction with material is established. From the experimental results, laser average power and Q frequency have an important effect on the contrast and print growth of miniature DM code, and the threshold of laser average power and Q frequency for an identifiable miniature DM code are respectively 3.6 W and 110 kHz, which matches the model well within normal operating conditions. In addition, the empirical model of correlation occurring between laser marking parameters and module size is also obtained, and the optimal processing parameter values for an identifiable miniature DM code of different but certain data size are given. It is also found that an increase of the repeat scanning number effectively improves the surface finish of bore, the appearance consistency of modules, which has benefit to reading. The reading quality of miniature DM code is greatly improved using ultrasonic cleaning in water by avoiding the interference of color speckles surrounding modules.

  7. *New* CRITICAL Windows Security patch

    CERN Multimedia

    2003-01-01

    On 10 September 2003, Microsoft issued a new CRITICAL security patch, MS03-039. It must be URGENTLY applied on ALL WINDOWS systems, which are not centrally managed for security patches. This includes Experiment computers, Home computers and Windows Portable and Desktop systems not running NICE. Details of the security hole and patch for MS03-039 (which also includes MS03-026) are at: http://cern.ch/it-div/news/hotfix-MS03-039.asp http://www.microsoft.com/technet/security/bulletin/MS03-039.asp

  8. *New*: CRITICAL Windows Security patch

    CERN Multimedia

    2003-01-01

    On 10 September 2003, Microsoft issued a new CRITICAL security patch, MS03-039. It must be URGENTLY applied on ALL WINDOWS systems, which are not centrally managed for security patches. This includes Experiment computers, Home computers and Windows Portable and Desktop systems not running NICE. Details of the security hole and patch for MS03-039 (which also includes MS03-026) are at: http://cern.ch/it-div/news/hotfix-MS03-039.asp http://www.microsoft.com/technet/security/bulletin/MS03-039.asp

  9. Security controls in a Cullinet database environment

    International Nuclear Information System (INIS)

    Thompson, R.E.

    1988-01-01

    Security controls using Cullinet's Integrated Data Management System (IDMS) are examined. IDMS software integrity problems, with emphasis on security package interfaces, are disclosed. Solutions applied at Sandia Laboratories Engineering Information Management computing facilty are presented. An overall IDMS computer security philosophy is reviewed

  10. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  11. Signal enhancement in collinear double-pulse laser-induced breakdown spectroscopy applied to different soils

    Energy Technology Data Exchange (ETDEWEB)

    Nicolodelli, Gustavo, E-mail: gunicolodelli@hotmail.com [Embrapa Instrumentation, Rua XV de Novembro, 1452, CEP 13560-970 São Carlos, SP (Brazil); Senesi, Giorgio Saverio, E-mail: giorgio.senesi@imip.cnr.it [Institute of Inorganic Methodologies and Plasmas, CNR, Bari, 70126 Bari (Italy); Romano, Renan Arnon, E-mail: renan.romano@gmail.com [Embrapa Instrumentation, Rua XV de Novembro, 1452, CEP 13560-970 São Carlos, SP (Brazil); Physics Institute of São Carlos, University of São Paulo, IFSC-USP, Av. Trabalhador são-carlense, 400 Pq. Arnold Schimid, 13566-590 São Carlos, SP (Brazil); Oliveira Perazzoli, Ivan Luiz de, E-mail: ivanperazzoli@hotmail.com [Embrapa Instrumentation, Rua XV de Novembro, 1452, CEP 13560-970 São Carlos, SP (Brazil); Milori, Débora Marcondes Bastos Pereira, E-mail: debora.milori@embrapa.br [Embrapa Instrumentation, Rua XV de Novembro, 1452, CEP 13560-970 São Carlos, SP (Brazil)

    2015-09-01

    Laser-induced breakdown spectroscopy (LIBS) is a well-known consolidated analytical technique employed successfully for the qualitative and quantitative analysis of solid, liquid, gaseous and aerosol samples of very different nature and origin. Several techniques, such as dual-pulse excitation setup, have been used in order to improve LIBS's sensitivity. The purpose of this paper was to optimize the key parameters as excitation wavelength, delay time and interpulse, that influence the double pulse (DP) LIBS technique in the collinear beam geometry when applied to the analysis at atmospheric air pressure of soil samples of different origin and texture from extreme regions of Brazil. Additionally, a comparative study between conventional single pulse (SP) LIBS and DP LIBS was performed. An optimization of DP LIBS system, choosing the correct delay time between the two pulses, was performed allowing its use for different soil types and the use of different emission lines. In general, the collinear DP LIBS system improved the analytical performances of the technique by enhancing the intensity of emission lines of some elements up to about 5 times, when compared with conventional SP-LIBS, and reduced the continuum emission. Further, the IR laser provided the best performance in re-heating the plasma. - Highlights: • The correct choice of the delay time between the two pulses is crucial for the DP system. • An optimization of DP LIBS system was performed allowing its use for different soil and the use of different emission lines. • The DP LIBS system improved the analytical performances of the technique up to about 5 times, when compared with SP LIBS. • The IR laser provided the best performance in re-heating the plasma.

  12. New Treatment Applying Low Level Laser Therapy for Acute Dehiscence Saphenectomy in Post Myocardial Revascularization.

    Science.gov (United States)

    Pinto, Nathali Cordeiro; Shoji, Nara; Junior, Mauro Favoretto; Muramatso, Mikiya; Chavantes, Maria Cristina; Stolf, Noedir A. G.

    2008-04-01

    Introduction: In Brazil, the main cause of death is the coronary heart disease and the surgical treatment applied in such cases is the Myocardial Revascularization (MR). Patients undergoing to MR through saphenous vein bypass development dehiscence in 10% of the cases. Dehiscence of surgical incision through Biomodulation treatment with Low Level Laser Therapy (LLLT) in patients who underwent to MR seems to be an unprecedented new therapy and a less invasive technique, which can benefit patients and Institutions, reducing costs. Methodology: It was analyzed 7 diabetic patients, mean age 51, 8 years old that post MR surgery presented dehiscence of the saphenectomy incision on lower limb with erithema, edema and pain. The wounds area varies from 2,2 until 34,8 cm and deep from 0,1 until 1,1 cm. It was used only Diode Laser C.W. (655 nm wavelength), Power = 25 mW, Time = 30 s, Fluence = 4 J/cm2 applied punctually around surgical wound's sore, by 2 cm distance. Results: It was observed granulated tissue all around the incision, as well as decreased inflammatory process, reduction fibrin and wound's size, besides analgesic effect since the first application. It was required in superficial wounds only 3 applications, while in the extensive wounds 8-10 applications were necessary. The LLLT has shown a remarkable role as a wound healing facilitated agent, reflecting the reduction of inflammatory process and improving analgesia. Conclusion: LLLT assisted dehiscence post saphenectomy showed a substantial improvement to the patient's quality of life, with a cost-effectiveness treatment that can benefit both patients and Institutions as an effective and less invasive therapy.

  13. Image-guided automatic triggering of a fractional CO2 laser in aesthetic procedures.

    Science.gov (United States)

    Wilczyński, Sławomir; Koprowski, Robert; Wiernek, Barbara K; Błońska-Fajfrowska, Barbara

    2016-09-01

    Laser procedures in dermatology and aesthetic medicine are associated with the need for manual laser triggering. This leads to pulse overlapping and side effects. Automatic laser triggering based on image analysis can provide a secure fit to each successive doses of radiation. A fractional CO2 laser was used in the study. 500 images of the human skin of healthy subjects were acquired. Automatic triggering was initiated by an application together with a camera which tracks and analyses the skin in visible light. The tracking algorithm uses the methods of image analysis to overlap images. After locating the characteristic points in analysed adjacent areas, the correspondence of graphs is found. The point coordinates derived from the images are the vertices of graphs with respect to which isomorphism is sought. When the correspondence of graphs is found, it is possible to overlap the neighbouring parts of the image. The proposed method of laser triggering owing to the automatic image fitting method allows for 100% repeatability. To meet this requirement, there must be at least 13 graph vertices obtained from the image. For this number of vertices, the time of analysis of a single image is less than 0.5s. The proposed method, applied in practice, may help reduce the number of side effects during dermatological laser procedures resulting from laser pulse overlapping. In addition, it reduces treatment time and enables to propose new techniques of treatment through controlled, precise laser pulse overlapping. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Temperature Development on the External Root Surface During Laser-Assisted Endodontic Treatment Applying a Microchopped Mode of a 980 nm Diode Laser.

    Science.gov (United States)

    Beer, Franziska; Farmakis, Eleftherios Terry R; Kopic, Josip; Kurzmann, Christoph; Moritz, Andreas

    2017-04-01

    The aim of this article was to investigate the temperature increase of the external root surface during laser-assisted endodontic treatment using a diode laser (980 nm) in a microchopped mode. Ten freshly extracted, human maxillary incisors with mature apices were collected, prepared to size F4 at working length (ProTaper; Dentsply Maillefer, Ballaigues, Switzerland), mounted to a holder, and irradiated (using spiral movements in coronal direction) with a diode laser (GENTLEray 980 Classic Plus; KaVo, Biberach, Germany) with a 200 μm fiber in four different treatment groups: Group 1 (control group) was irradiated in six cycles of 5-sec irradiation/20-sec pause with 2.5 W in the pulse mode. Groups 2 to 4 were irradiated at six cycles of 5-sec irradiation/20-sec pause in the microchopped mode (Group 2-1.6 W; Group 3-2.0 W; Group 4-2.5 W). The applied mode was 25 ms on/25 ms off. Within the on period, the laser delivered an intermittent sequence of energy complexes and the maximum output was equal to the nominated output of the device (12 W). Canals were kept moist by sterile saline irrigation in between irradiations, and temperature changes were continuously measured using a thermal imaging camera. Recordings were analyzed by a mixed model (analysis of variance [ANOVA] for repeated measurements). The highest mean of temperature rise, 1.94°C ± 1.07°C, was measured in Group 4, followed by Group 3 (1.74°C ± 1.22°C) and Group 2 (1.58°C ± 1.18°C). The lowest increase occurred in Group 1 (1.06°C ± 1.20°C). There was a significant difference (p = 0.041) between the groups. Significant differences were found between Groups 1 and 4 (p = 0.007) and 1 and 2 (p = 0.035). In addition, a marginally significant difference between Groups 1 and 2 (p = 0.052) was noted. There was no significant difference between Groups 2, 3, and 4. Despite the low mean values reported, the highest temperature increase (+5.7°C) was

  15. Applying dual-laser spot positions measurement technology on a two-dimensional tracking measurement system

    International Nuclear Information System (INIS)

    Lee, Hau-Wei; Chen, Chieh-Li

    2009-01-01

    This paper presents a two-dimensional tracking measurement system with a tracking module, which consists of two stepping motors, two laser diodes and a four separated active areas segmented position sensitive detector (PSD). The PSD was placed on a two-dimensional moving stage and used as a tracking target. The two laser diodes in the tracking module were directly rotated to keep the laser spots on the origin of the PSD. The two-dimensional position of the target PSD on the moving stage is determined from the distance between the two motors and the tracking angles of the two laser diodes, which are rotated by the two stepping motors, respectively. In order to separate the four positional values of the two laser spots on one PSD, the laser diodes were modulated by two distinct frequencies. Multiple-laser spot position measurement technology was used to separate the four positional values of the two laser spots on the PSD. The experimental results show that the steady-state voltage shift rate is about 0.2% and dynamic cross-talk rate is smaller than 2% when the two laser spots are projected on one PSD at the same time. The measurement errors of the x and y axial positions of the two-dimensional tracking system were less than 1% in the measuring range of 20 mm. The results demonstrate that multiple-laser spot position measurement technology can be employed in a two-dimensional tracking measurement system

  16. 48 CFR 606.302-6 - National security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  17. *NEW* CRITICAL Windows Security patches

    CERN Multimedia

    2003-01-01

    On 3 October and 10 September 2003, Microsoft issued new CRITICAL security patches MS03-040 and MS03-039. They must be URGENTLY applied on ALL WINDOWS systems, which are not centrally managed for security patches. This includes Experiment computers, Home computers and Windows Portable and Desktop systems not running NICE. Details of the security holes and patches are at: MS03-039: http://cern.ch/it-div/news/hotfix-MS03-039.asp http://www.microsoft.com/technet/security/bulletin/MS03-039.asp MS03-040: http://cern.ch/it-div/news/hotfix-MS03-040.asp http://www.microsoft.com/technet/security/bulletin/MS03-040.asp

  18. Analysis of High Energy Laser Weapon Employment from a Navy Ship

    Science.gov (United States)

    2012-09-01

    Free Electron Laser, Fiber Laser, Littoral Combat Ship 15. NUMBER OF PAGES 87 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...tunability, Free Electron Lasers (FEL) could offer defense against high maneuverability, sea- skimming supersonic missiles. This paper studies three...most direct approach would be lasing the beam on the IED, if it is exposed, causing it to explode (Approach A). The next approach is to penetrate

  19. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum

  20. Laser--Doppler anemometry technique applied to two-phase dispersed flows in a rectangular channel

    International Nuclear Information System (INIS)

    Lee, S.L.; Srinivasan, J.

    1979-01-01

    A new optical technique using Laser--Doppler anemometry has been applied to the local measurement of turbulent upward flow of a dilute water droplet--air two-phase dispersion in a vertical rectangular channel. Individually examined were over 20,000 droplet signals coming from each of a total of ten transversely placed measuring points, the closest of which to the channel wall was 250 μ away from the wall. Two flows of different patterns due to different imposed flow conditions were investigated, one with and the other without a liquid film formed on the channel wall. Reported are the size and number density distribution and the axial and lateral velocity distributions for the droplets as well as the axial and lateral velocity distributions for the air

  1. A new microscope optics for laser dark-field illumination applied to high precision two dimensional measurement of specimen displacement.

    Science.gov (United States)

    Noda, Naoki; Kamimura, Shinji

    2008-02-01

    With conventional light microscopy, precision in the measurement of the displacement of a specimen depends on the signal-to-noise ratio when we measure the light intensity of magnified images. This implies that, for the improvement of precision, getting brighter images and reducing background light noise are both inevitably required. For this purpose, we developed a new optics for laser dark-field illumination. For the microscopy, we used a laser beam and a pair of axicons (conical lenses) to get an optimal condition for dark-field observations. The optics was applied to measuring two dimensional microbead displacements with subnanometer precision. The bandwidth of our detection system overall was 10 kHz. Over most of this bandwidth, the observed noise level was as small as 0.1 nm/radicalHz.

  2. Security of Nuclear Information. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance on implementing the principle of confidentiality and on the broader aspects of information security (i.e. integrity and availability). It assists States in bridging the gap between existing government and industry standards on information security, the particular concepts and considerations that apply to nuclear security and the special provisions and conditions that exist when dealing with nuclear material and other radioactive material. Specifically it seeks to assist states in the identification, classification, and assignment of appropriate security controls to information that could adversely impact nuclear security if compromised

  3. Technologies for security, military police, and professional policing organizations: the Department of Energy perspective

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    There are many emerging technologies that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: scannerless laser radar; next generation security systems; response force video information helmet system; access delay technologies; rapidly deployable intrusion detection systems; cost risk benefit analysis.

  4. Raman fiber lasers

    CERN Document Server

    2017-01-01

    This book serves as a comprehensive, up-to-date reference about this cutting-edge laser technology and its many new and interesting developments. Various aspects and trends of Raman fiber lasers are described in detail by experts in their fields. Raman fiber lasers have progressed quickly in the past decade, and have emerged as a versatile laser technology for generating high power light sources covering a spectral range from visible to mid-infrared. The technology is already being applied in the fields of telecommunication, astronomy, cold atom physics, laser spectroscopy, environmental sensing, and laser medicine. This book covers various topics relating to Raman fiber laser research, including power scaling, cladding and diode pumping, cascade Raman shifting, single frequency operation and power amplification, mid-infrared laser generation, specialty optical fibers, and random distributed feedback Raman fiber lasers. The book will appeal to scientists, students, and technicians seeking to understand the re...

  5. Laser-light sailing and non-stationary power stations applied to robotic star probes

    International Nuclear Information System (INIS)

    Matloff, Gregory L.

    2000-01-01

    The light sail has emerged as a leading contender to propel extrasolar expeditions. Because solar-sail performance is limited by the inverse-square law, one-way expeditions to other stars requiring voyage durations of a few centuries or less may be propelled by radiation pressure from a laser beam originating from a location closer to the Sun than the space probe. Maintaining a stationary laser power station in position between Sun and spacecraft for years or decades presents many technical challenges. This paper presents a variation on the laser power station that may be simpler to implement, in which the Sun-pumped laser power station follows the spacecraft on a parabolic or slightly hyperbolic trajectory

  6. Wavelength sweepable laser source

    DEFF Research Database (Denmark)

    2014-01-01

    Wavelength sweepable laser source is disclosed, wherein the laser source is a semiconductor laser source adapted for generating laser light at a lasing wavelength. The laser source comprises a substrate, a first reflector, and a second reflector. The first and second reflector together defines...... and having a rest position, the second reflector and suspension together defining a microelectromechanical MEMS oscillator. The MEMS oscillator has a resonance frequency and is adapted for oscillating the second reflector on either side of the rest position.; The laser source further comprises electrical...... connections adapted for applying an electric field to the MEMS oscillator. Furthermore, a laser source system and a method of use of the laser source are disclosed....

  7. Synchronization of random bit generators based on coupled chaotic lasers and application to cryptography.

    Science.gov (United States)

    Kanter, Ido; Butkovski, Maria; Peleg, Yitzhak; Zigzag, Meital; Aviad, Yaara; Reidler, Igor; Rosenbluh, Michael; Kinzel, Wolfgang

    2010-08-16

    Random bit generators (RBGs) constitute an important tool in cryptography, stochastic simulations and secure communications. The later in particular has some difficult requirements: high generation rate of unpredictable bit strings and secure key-exchange protocols over public channels. Deterministic algorithms generate pseudo-random number sequences at high rates, however, their unpredictability is limited by the very nature of their deterministic origin. Recently, physical RBGs based on chaotic semiconductor lasers were shown to exceed Gbit/s rates. Whether secure synchronization of two high rate physical RBGs is possible remains an open question. Here we propose a method, whereby two fast RBGs based on mutually coupled chaotic lasers, are synchronized. Using information theoretic analysis we demonstrate security against a powerful computational eavesdropper, capable of noiseless amplification, where all parameters are publicly known. The method is also extended to secure synchronization of a small network of three RBGs.

  8. Application of the Concept of Intrusion Tolerant System for Evaluating Cyber Security Enhancements

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chanyoung; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    One of the major problems is that nuclear industry is in very early stage in dealing with cyber security issues. It is because that cyber security has received less attention compared to other safety problems. In addition, late adoption of digital I and C systems has resulted in lower level of cyber security advancements in nuclear industry than ones in other industries. For the cyber security of NPP I and C systems, many regulatory documents, guides and standards were already published. These documents include cyber security plans, methods for cyber security assessments and comprehensive set of security controls. However, methods which can help assess how much security is improved if a specific security control is applied are not included in these documents. Hence, NPP I and C system designers may encounter difficulties when trying to apply security controls with limited structure and cost. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. The extent of cyber security improvement caused by security enhancement was defined as reduction ratio of the failure probability to secure the system from cyber-attack as Eq.1. The concept of 'intrusion tolerant system' was applied to not only prevent cyber-attacks but also limit the extent of damage in this study. For applying the concept of intrusion tolerant system to NPP, the event tree was constructed with some assumptions. Cyber security improvement caused by cyber security enhancement can be estimated as Eq.3. By comparing current system to the enhanced system, it is

  9. Application of the Concept of Intrusion Tolerant System for Evaluating Cyber Security Enhancements

    International Nuclear Information System (INIS)

    Lee, Chanyoung; Seong, Poong Hyun

    2016-01-01

    One of the major problems is that nuclear industry is in very early stage in dealing with cyber security issues. It is because that cyber security has received less attention compared to other safety problems. In addition, late adoption of digital I and C systems has resulted in lower level of cyber security advancements in nuclear industry than ones in other industries. For the cyber security of NPP I and C systems, many regulatory documents, guides and standards were already published. These documents include cyber security plans, methods for cyber security assessments and comprehensive set of security controls. However, methods which can help assess how much security is improved if a specific security control is applied are not included in these documents. Hence, NPP I and C system designers may encounter difficulties when trying to apply security controls with limited structure and cost. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. The extent of cyber security improvement caused by security enhancement was defined as reduction ratio of the failure probability to secure the system from cyber-attack as Eq.1. The concept of 'intrusion tolerant system' was applied to not only prevent cyber-attacks but also limit the extent of damage in this study. For applying the concept of intrusion tolerant system to NPP, the event tree was constructed with some assumptions. Cyber security improvement caused by cyber security enhancement can be estimated as Eq.3. By comparing current system to the enhanced system, it is possible to

  10. Development of a security-by-design handbook

    International Nuclear Information System (INIS)

    Olson, David L.; Snell, Mark Kamerer; Iida, Toru; Ochiai, Kazuya; Tanuma, Koji

    2010-01-01

    There is an increasing awareness that efficient and effective nuclear facility design is best achieved when requirements from the 3S disciplines Safety, Safeguards, and Security - are balanced and intrinsic to the facility design. This can be achieved when policy, processes, methods, and technologies are understood and applied in these areas during all phases of the design process. For the purposes of this paper, Security-by-design will be defined as the system level incorporation of the physical protection system (PPS) into a new or retrofitted nuclear power plant (NPP) or nuclear facility (NF) resulting in intrinsic security. Security-by-design can also be viewed as a framework to achieve robust and durable security systems. This paper reports on work performed to date to create a Security-by-Design Handbook, under a bilateral agreement between the United States and Japan, specifically, a review of physical protection principles and best practices, and a decommissioning to better understand where these principles and practices can be applied. This paper describes physical protection principles and best practices to achieve security-by- design that were gathered from International, Japanese, and U.S. sources. Principles are included for achieving security early in the design process where security requirements are typically less costly and easier to incorporate. The paper then describes a generic design process that covers the entire facility lifecycle from scoping and planning of the project to decommissioning and decontamination. Early design process phases, such as conceptual design, offer opportunities to add security features intrinsic to the facility design itself. Later phases, including design engineering and construction, are important for properly integrating security features into a coherent design and for planning for and assuring the proper performance of the security system during the operation and decommissioning of the facility. The paper also

  11. Deliberation in Multi-Stakeholder Participation: A Heuristic Framework Applied to the Committee on World Food Security

    Directory of Open Access Journals (Sweden)

    Matheus Alves Zanella

    2018-02-01

    Full Text Available Multi-stakeholder participation (MSP has become a central feature in several institutions and processes of global governance. Those who promote them trust that these arrangements can advance the deliberative quality of international institutions, and thereby improve the democratic quality, legitimacy and effectiveness of both the institutional landscape, as well as decisions made within it. This paper employs a heuristic framework to analyze the deliberative quality of MSP. Specifically, it applies Dryzek’s deliberative systems framework to the case of the Committee on World Food Security (CFS. The assessment shows that the CFS improves the deliberative quality of food security governance by including and facilitating the transmission of discourses from the public to the empowered spaces. However, the deliberative quality of CFS could be higher with stronger accountability mechanisms in place, more meta-deliberation and adoption of CFS outcomes at national and local levels. Reflecting on the limitations of using this heuristic framework to assess MSP, we conclude that the analysis would benefit from more explicit consideration of different forms of power that are part of the social relations between actors involved in such settings. By proposing this analytical approach, we expect to advance a heuristic framework for assessing deliberation in an international context of the growing importance of MSP in sustainability and global governance.

  12. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  13. 32 CFR 154.42 - Evaluation of personnel security information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  14. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  15. Applying Formal Methods to an Information Security Device: An Experience Report

    National Research Council Canada - National Science Library

    Kirby, Jr, James; Archer, Myla; Heitmeyer, Constance

    1999-01-01

    .... This paper describes a case study in which the SCR method was used to specify and analyze a different class of system, a cryptographic system called CD, which must satisfy a large set of security properties...

  16. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  17. 24 CFR 1007.30 - Security for loan.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Security for loan. 1007.30 Section... SECTION 184A LOAN GUARANTEES FOR NATIVE HAWAIIAN HOUSING § 1007.30 Security for loan. (a) In general. A... Lands is used as collateral or security for the loan, the following additional provisions apply: (1...

  18. Cooperative Security: New Horizons for International Order

    National Research Council Canada - National Science Library

    Cohen, Richard; Mihalka, Michael

    2001-01-01

    .... Both are controversial. Richard Cohen presents a compelling and highly original model of Cooperative Security -- a term that once was applied almost exclusively to the Organization for Security and Co-operation in Europe (OSCE...

  19. Alignment of Organizational Security Policies -- Theory and Practice

    NARCIS (Netherlands)

    Dimkov, T.

    2012-01-01

    To address information security threats, an organization defines security policies that state how to deal with sensitive information. These policies are high-level policies that apply for the whole organization and span the three security domains: physical, digital and social. One example of a

  20. Laser Heterodyning

    CERN Document Server

    Protopopov, Vladimir V

    2009-01-01

    Laser heterodyning is now a widespread optical technique, based on interference of two waves with slightly different frequencies within the sensitive area of a photo-detector. Its unique feature – preserving phase information about optical wave in the electrical signal of the photo-detector – finds numerous applications in various domains of applied optics and optoelectronics: in spectroscopy, polarimetry, radiometry, laser radars and Lidars, microscopy and other areas. The reader may be surprised by a variety of disciplines that this book covers and satisfied by detailed explanation of the phenomena. Very well illustrated, this book will be helpful for researches, postgraduates and students, working in applied optics.

  1. Physics of laser fusion. Volume III. High-power pulsed lasers

    International Nuclear Information System (INIS)

    Holzrichter, J.F.; Eimerl, D.; George, E.V.; Trenholme, J.B.; Simmons, W.W.; Hunt, J.T.

    1982-09-01

    High-power pulsed lasers can deliver sufficient energy on inertial-confinement fusion (ICF) time scales (0.1 to 10 ns) to heat and compress deuterium-tritium fuel to fusion-reaction conditions. Several laser systems have been examined, including Nd:glass, CO 2 , KrF, and I 2 , for their ICF applicability. A great deal of developmental effort has been applied to the Nd:glass laser and the CO 2 gas laser systems; these systems now deliver > 10 4 J and 20 x 10 12 W to ICF targets. We are constructing the Nova Nd:glass laser at LLNL to provide > 100 kJ and > 100 x 10 12 W of 1-μm radiation for fusion experimentation in the mid-1980s. For ICF target gain > 100 times the laser input, we expect that the laser driver must deliver approx. 3 to 5 MJ of energy on a time scale of 10 to 20 ns. In this paper we review the technological status of fusion-laser systems and outline approaches to constructing high-power pulsed laser drivers

  2. IoT security with one-time pad secure algorithm based on the double memory technique

    Science.gov (United States)

    Wiśniewski, Remigiusz; Grobelny, Michał; Grobelna, Iwona; Bazydło, Grzegorz

    2017-11-01

    Secure encryption of data in Internet of Things is especially important as many information is exchanged every day and the number of attack vectors on IoT elements still increases. In the paper a novel symmetric encryption method is proposed. The idea bases on the one-time pad technique. The proposed solution applies double memory concept to secure transmitted data. The presented algorithm is considered as a part of communication protocol and it has been initially validated against known security issues.

  3. Laser speckle velocimetry applied to Rayleigh-Benard convection

    International Nuclear Information System (INIS)

    Arroyo, M.P.; Yonte, T.; Quintanilla, M.; Saviron, J.M.

    1986-01-01

    An application of speckle velocimetry technique to Rayleigh-Benard convection is presented. A 5-mW He-Ne laser allows precise determination of the two-dimensional velocity flow field, up to several mm/sec. The digital techniques used to analyze automatically the multiexposed photographs and to generate velocity and vorticity fields are described. The obtained results are in good agreement with previously reported data. The ability of the technique to cover other experimental conditions is discussed. 14 references

  4. Laser radar: historical prospective-from the East to the West

    Science.gov (United States)

    Molebny, Vasyl; McManamon, Paul; Steinvall, Ove; Kobayashi, Takao; Chen, Weibiao

    2017-03-01

    This article discusses the history of laser radar development in America, Europe, and Asia. Direct detection laser radar is discussed for range finding, designation, and topographic mapping of Earth and of extraterrestrial objects. Coherent laser radar is discussed for environmental applications, such as wind sensing and for synthetic aperture laser radar development. Gated imaging is discussed through scattering layers for military, medical, and security applications. Laser microradars have found applications in intravascular studies and in ophthalmology for vision correction. Ghost laser radar has emerged as a new technology in theoretical and simulation applications. Laser radar is now emerging as an important technology for applications such as self-driving cars and unmanned aerial vehicles. It is also used by police to measure speed, and in gaming, such as the Microsoft Kinect.

  5. Investigating how everyday people experience security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    In this paper I propose a method for analyzing everyday people's experiences with IT-security. I furthermore report how I applied the method. The proposal is motivated by work of other researchers and their efforts to get beyond secure behavior, and to get an insight in secure or insecure...... experiences that everyday users of technology encounter. The background for introducing this method is a project under the heading of IT Security for Citizens, which bridges between research competencies in HCI and security. In this project we develop methods and concepts to analyze digital signature systems...... and security sensible systems in a broad sense, from the point of view of contemporary CHI. The project includes literature studies of usable security, as well as empirical investigations and design work. This paper reports on my method to target user experiences of and with security technology....

  6. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  7. Evaluation report on research and development of an ultra high performance laser applied composite production system. Achievement report; Chokoseino laser oyo fukugo seisan system no kenkyu kaihatsu ni kansuru hyoka hokokusho. Seika hokokuhen

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1985-08-01

    Research, development, and evaluation were made on a composite production system applicable to manufacture products of a large number of types in small quantities. In the research and development of a total system, verification works were carried out by studying basic designs, operation of the composite production system, and experiment plant operation. Research and development on cutting and processing technologies included studies on composite cutting mechanisms, general purpose fitting technologies, control systems, and drive systems. In the research and development of laser applied technologies, studies were performed on large output laser oscillators, the control thereof, and laser processing technologies. In the research and development of automatic diagnosis technologies, studies were executed on failure diagnosis, accuracy compensation, automatic inspection, and accuracy diagnostic technologies. In the research and development of design and control technologies, studies were carried out on automatic designing, process designing, and process controlling technologies. In the study of operation of the Tsukuba experiment plant, discussions were given on configuration of the experiment plant, laser processing mechanism, composite assembly mechanism, production inspection mechanism, and system operation. Furthermore, design studies were also carried out on practically usable systems. (NEDO)

  8. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  9. Integrated Broadband Quantum Cascade Laser

    Science.gov (United States)

    Mansour, Kamjou (Inventor); Soibel, Alexander (Inventor)

    2016-01-01

    A broadband, integrated quantum cascade laser is disclosed, comprising ridge waveguide quantum cascade lasers formed by applying standard semiconductor process techniques to a monolithic structure of alternating layers of claddings and active region layers. The resulting ridge waveguide quantum cascade lasers may be individually controlled by independent voltage potentials, resulting in control of the overall spectrum of the integrated quantum cascade laser source. Other embodiments are described and claimed.

  10. Iodine-stabilized single-frequency green InGaN diode laser.

    Science.gov (United States)

    Chen, Yi-Hsi; Lin, Wei-Chen; Shy, Jow-Tsong; Chui, Hsiang-Chen

    2018-01-01

    A 520-nm InGaN diode laser can emit a milliwatt-level, single-frequency laser beam when the applied current slightly exceeds the lasing threshold. The laser frequency was less sensitive to diode temperature and could be finely tuned by adjusting the applied current. Laser frequency was stabilized onto a hyperfine component in an iodine transition through the saturated absorption spectroscopy. The uncertainty of frequency stabilization was approximately 8×10 -9 at a 10-s integration time. This compact laser system can replace the conventional green diode-pumped solid-state laser and applied as a frequency reference. A single longitudinal mode operational region with diode temperature, current, and output power was investigated.

  11. Laser-aided plasma diagnostics

    NARCIS (Netherlands)

    Donne, A. J. H.; Barth, C. J.

    2008-01-01

    This paper will focus on two types of laser-aided diagnostics: Thomson scattering and laser-induced fluorescence. Thomson scattering is a very powerful diagnostic, which is applied at nearly every magnetic confinement device. Depending on the experimental conditions different plasma parameters can

  12. Security Research on Engineering Database System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, ...

  13. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    Energy Technology Data Exchange (ETDEWEB)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  14. 78 FR 28576 - Notice of Petitions by Firms for Determination of Eligibility To Apply for Trade Adjustment...

    Science.gov (United States)

    2013-05-15

    ... Kimball, NE 69145. electrical components and parts for alarms and security systems. AGY Aiken, LLC 2556... material is fiberglass. Multiline Technology, Inc 75 Roebling Court, 5/7/2013 Firm manufacturers printed... The firm provides laser Tulsa, OK 74145. cutting, laser marking & metal fabrication of boards, panels...

  15. Technologies for security, military police and professional policing organizations, the Department of Energy perspective

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems; (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis

  16. The EU as an international security provider

    DEFF Research Database (Denmark)

    Rodt, Annemarie Peen; Wolff, Stefan; Whitman, Richard

    2015-01-01

    This contribution develops a framework of analysis that covers the actors involved in the policy making process of international security provision, the dynamics of this process itself, its outcomes (concrete strategies and policies) and their impact. Our efforts to establish such a framework...... of analysis, which could serve as the foundation for a mid-range theory of the EU as an international security provider, will examine the relevance of, and apply, existing theories of international relations/international security and foreign policy analysis to the specific case of the EU. The framework...... that will emerge from this analysis will then be tested and applied empirically in the following contributions that focus on how particular policies are formulated and implemented, and that analyse, in single and comparative case studies, the impact and effectiveness of the EU as an international security provider....

  17. Novel approach to information security management of confidential ...

    African Journals Online (AJOL)

    Novel approach to information security management of confidential and propriety information ... Journal of Fundamental and Applied Sciences ... valuable information by using steganography it can have a major impact security management.

  18. Laser spectroscopy applied to environmental, ecological, food safety, and biomedical research.

    Science.gov (United States)

    Svanberg, Sune; Zhao, Guangyu; Zhang, Hao; Huang, Jing; Lian, Ming; Li, Tianqi; Zhu, Shiming; Li, Yiyun; Duan, Zheng; Lin, Huiying; Svanberg, Katarina

    2016-03-21

    Laser spectroscopy provides many possibilities for multi-disciplinary applications in environmental monitoring, in the ecological field, for food safety investigations, and in biomedicine. The paper gives several examples of the power of multi-disciplinary applications of laser spectroscopy as pursued in our research group. The studies utilize mostly similar and widely applicable spectroscopic approaches. Air pollution and vegetation monitoring by lidar techniques, as well as agricultural pest insect monitoring and classification by elastic scattering and fluorescence spectroscopy are described. Biomedical aspects include food safety applications and medical diagnostics of sinusitis and otitis, with strong connection to the abatement of antibiotics resistance development.

  19. Progress report 1986. Laser-matter interaction Greco

    International Nuclear Information System (INIS)

    1987-01-01

    Basic researches are based on laser-matter interaction, generation and study of dense and hot plasmas. The main aim is inertial fusion by laser; many researches are also engaged in other ways, basic ones such as X-ray laser and laser acceleration of particles, or applied ones such as X-ray sources or laser processing of materials [fr

  20. Laser Imaging Video Camera Sees Through Fire, Fog, Smoke

    Science.gov (United States)

    2015-01-01

    Under a series of SBIR contracts with Langley Research Center, inventor Richard Billmers refined a prototype for a laser imaging camera capable of seeing through fire, fog, smoke, and other obscurants. Now, Canton, Ohio-based Laser Imaging through Obscurants (LITO) Technologies Inc. is demonstrating the technology as a perimeter security system at Glenn Research Center and planning its future use in aviation, shipping, emergency response, and other fields.

  1. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  2. The security energy encryption in wireless power transfer

    Science.gov (United States)

    Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.

    2017-09-01

    This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.

  3. Applying laser speckle images to skin science: skin lesion differentiation by polarization

    Science.gov (United States)

    Lee, Tim K.; Tchvialeva, Lioudmila; Dhadwal, Gurbir; Sotoodian, Bahman; Kalai, Sunil; Zeng, Haishan; Lui, Harvey; McLean, David I.

    2012-01-01

    Skin cancer is a worldwide health problem. It is the most common cancer in the countries with a large white population; furthermore, the incidence of malignant melanoma, the most dangerous form of skin cancer, has been increasing steadily over the last three decades. There is an urgent need to develop in-vivo, noninvasive diagnostic tools for the disease. This paper attempts to response to the challenge by introducing a simple and fast method based on polarization and laser speckle. The degree of maintaining polarization estimates the fraction of linearly maintaining polarization in the backscattered speckle field. Clinical experiments of 214 skin lesions including malignant melanomas, squamous cell carcinomas, basal cell carcinomas, nevi, and seborrheic keratoses demonstrated that such a parameter can potentially diagnose different skin lesion types. ROC analyses showed that malignant melanoma and seborrheic keratosis could be differentiated by both the blue and red lasers with the area under the curve (AUC) = 0.8 and 0.7, respectively. Also malignant melanoma and squamous cell carcinoma could be separated by the blue laser (AUC = 0.9), while nevus and seborrheic keratosis could be identified using the red laser (AUC = 0.7). These experiments demonstrated that polarization could be a potential in-vivo diagnostic indicator for skin diseases.

  4. 12 CFR 703.11 - Valuing securities.

    Science.gov (United States)

    2010-01-01

    ... credit union must obtain either price quotations on the security from at least two broker-dealers or a price quotation on the security from an industry-recognized information provider. This requirement to obtain price quotations does not apply to new issues purchased at par or at original issue discount. (b...

  5. Tunable on chip optofluidic laser

    DEFF Research Database (Denmark)

    Bakal, Avraham; Vannahme, Christoph; Kristensen, Anders

    2016-01-01

    On chip tunable laser is demonstrated by realizing a microfluidic droplet array. The periodicity is controlled by the pressure applied to two separate inlets, allowing to tune the lasing frequency over a broad spectral range.......On chip tunable laser is demonstrated by realizing a microfluidic droplet array. The periodicity is controlled by the pressure applied to two separate inlets, allowing to tune the lasing frequency over a broad spectral range....

  6. Developments of integrated laser crystals by a direct bonding method

    International Nuclear Information System (INIS)

    Sugiyama, Akira; Fukuyama, Hiroyasu; Katsumata, Masaki; Tanaka, Mitsuhiro; Okada, Yukikatu

    2003-01-01

    Laser crystal integration using a neodymium-doped yttrium vanadate (or orthovanadate) laser crystal, and non-doped yttrium vanadate crystals that function as cold fingers has been demonstrated. A newly developed dry etching process was adopted in the preparation for contact of mechanically polished surfaces. In the heat treatment process, temperature optimization was essential to get rid of precipitation of vanadic acid caused by the thermo-chemical reaction in a vacuum furnace. The bonded crystal was studied via optical characteristics, magnified inspections, laser output performances pumped by a CW laser diode. From these experiments, it was clear that the integrated Nd:YVO 4 laser crystal, securing the well-improved thermal conductivity, can increase laser output power nearly twice that of the conventional single crystal which was cracked in high power laser pumping of 10 W due to its intrinsic poor thermal conductivity. (author)

  7. Laser Beam Machining (LBM), State of the Art and New Opportunities

    NARCIS (Netherlands)

    Meijer, J.

    2004-01-01

    An overview is given of the state of the art of laser beam machining in general with special emphasis on applications of short and ultrashort lasers. In laser welding the trend is to apply optical sensors for process control. Laser surface treatment is mostly used to apply corrosion and wear

  8. Jet laser ion source

    International Nuclear Information System (INIS)

    Dem'yanov, A.V.; Sidorov, S.V.

    1994-01-01

    External laser injector of multicharged ions (MCI) is developed in which wide-aperture aberration-free wire gauze spherical shape electrodes are applied for effective MCI extraction from laser plasma and beam focusing. Axial plasma compression by solenoid magnetic field is used to reduce ion losses due to transverse movement of the scattering laser plasma. Transverse magnetic field created by another solenoid facilitates the effective laser plasma braking and consequently, leads to the narrowing of energy spectrum of plasma ions and its shift towards lower energies. 2 refs.; 3 figs

  9. Assessing and managing security risk in IT systems a structured methodology

    CERN Document Server

    McCumber, John

    2004-01-01

    SECURITY CONCEPTSUsing ModelsIntroduction: Understanding, Selecting, and Applying Models Understanding AssetsLayered Security Using Models in Security Security Models for Information Systems Shortcomings of Models in SecuritySecurity in Context Reference Defining Information SecurityConfidentiality, Integrity, and Availability Information AttributesIntrinsic versus Imputed Value Information as an Asset The Elements of Security Security Is Security Only in Context Information as an Asset Introduction Determining Value Managing Information Resources ReferencesUnderstanding Threat and Its Relatio

  10. Principles of laser-plasma accelerators

    International Nuclear Information System (INIS)

    Malka, V.; Mora, P.

    2009-01-01

    The continuing development of powerful laser systems has permitted to extend the interaction of laser beams with matter far into the relativistic domain in which extremely high electric and magnetic fields are generated. Thanks to these tremendous fields, that only plasma can support and sustain, new and compact approaches for producing energetic particle beams have been recently achieved (for example the bubble regime and the colliding laser pulses scheme). The incredible progress of these laser-plasma accelerators has allowed physicists to produce high quality beams of energetic radiation and particles. These beams have interesting properties such as shortness, brightness and spatial quality, and could lend themselves to applications in many fields, including medicine (radiotherapy, proton therapy, imaging), radiation biology (short-time-scale), chemistry (radiolysis), physics and material science (radiography, electron and photon diffraction), security (material inspection), and of course accelerator science. Stimulated by the advent of compact and powerful lasers, with moderate costs and high repetition rate, this research field has witnessed considerable growth in the past few years, and the promises of laser-plasma accelerators are in tremendous progress. The recent years in particular have seen spectacular progress in the acceleration of electrons and of ions, both in terms of energy and in terms of quality of the beams. (authors)

  11. Double Tunneling Injection Quantum Dot Lasers for High Speed Operation

    Science.gov (United States)

    2017-10-23

    Double Tunneling-Injection Quantum Dot Lasers for High -Speed Operation The views, opinions and/or findings contained in this report are those of...SECURITY CLASSIFICATION OF: 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES 12. DISTRIBUTION AVAILIBILITY STATEMENT 6...State University Title: Double Tunneling-Injection Quantum Dot Lasers for High -Speed Operation Report Term: 0-Other Email: asryan@vt.edu Distribution

  12. The 1989 progress report: applied optics

    International Nuclear Information System (INIS)

    Antonetti, A.

    1989-01-01

    The 1989 progress report of the laboratory of Applied Optics of the Polytechnic School (France) is presented. The research programs are carried out in the following fields: Ultrafast Physics, including the development of femtoseconds laser sources and their utilization in Physics, Biology and Physical Chemistry; physics of infrared lasers and their applications in space and industries; Guided Optics, including investigations and construction of fiber optics couplers; biomedical studies on muscle mechanics and laser applications. The published papers, the conferences and the Laboratory staff are listed [fr

  13. Laser assisted drug delivery: a review of an evolving technology.

    Science.gov (United States)

    Sklar, Lindsay R; Burnett, Christopher T; Waibel, Jill S; Moy, Ronald L; Ozog, David M

    2014-04-01

    Topically applied drugs have a relatively low cutaneous bioavailability. This article reviews the existing applications of laser assisted drug delivery, a means by which the permeation of topically applied agents can be enhanced into the skin. The existing literature suggests that lasers are a safe and effective means of enhancing the delivery of topically applied agents through the skin. The types of lasers most commonly studied in regards to drug delivery are the carbon dioxide (CO2 ) and erbium:yttrium-aluminum-garnet (Er:YAG) lasers. Both conventional ablative and fractional ablative modalities have been utilized and are summarized herein. The majority of the existing studies on laser assisted drug delivery have been performed on animal models and additional human studies are needed. Laser assisted drug delivery is an evolving technology with potentially broad clinical applications. Multiple studies demonstrate that laser pretreatment of the skin can increase the permeability and depth of penetration of topically applied drug molecules for both local cutaneous and systemic applications. © 2014 Wiley Periodicals, Inc.

  14. Laser working device

    International Nuclear Information System (INIS)

    Shibanuma, Kiyoshi; Kakudate, Satoshi; Oka, Kiyoshi; Terakado, Takuya; Kondo, Mitsunori; Munakata, Tadashi; Makino, Yoshinobu; Honda, Keizo.

    1995-01-01

    A transmission pipe transmits laser beams along an axis thereof, and is inserted at the top end to a pipeline to be fabricated. A flat mirror is secured to the top end of the transmission pipe, and laser beams are reflected by the mirror, passed through a fabrication nozzle and focused to a fabrication point in the pipeline to be fabricated. A lens-type light focusing system is guided to the fabrication point by a plurality of rollers rotatable in the axial direction disposed in circumferential direction each at an equal pitch at the outer circumference of the transmission pipe. A centering mechanism is disposed for keeping the transmission pipe coaxially with the pipeline to be fabricated. Further, there are also disposed a mirror-type light focusing optical system for focusing light by a paraboloidal mirror and a spherical vehicle rotatable in all directions. A laser fabrication device can be reduced in the size, and it can be used in a high temperature and highly radioactive circumstance. (N.H.)

  15. Management of vascular lesions using advanced laser technology

    Directory of Open Access Journals (Sweden)

    Christofer Tzermias

    2017-04-01

    Full Text Available One of the most widely used cutaneous applications of Light Amplification by Stimulated Emission of Radiation (laser concerns the treatment of vascular lesions. During the past two decades, very significant advances in the application of laser technology in dermatology have occurred, with selective photothermolysis being the most important. This review focuses on the application of modern laser devices (Pulsed Dye Laser, or PDL; potassium titanyl phosphate laser, or KTP; diode laser; and neodymium-doped yttrium-aluminium-garnet laser, or Nd:YAG, as well as the combination of laser and photodynamic therapy (PDT for the treatment of vascular lesions. In particular, both congenital (haemangiomas and port-wine stains and acquired vascular lesions (facial and leg telangiectasias, rosacea, Poikiloderma of Civatte, spider angioma, pyogenic granuloma, and venous lakes are discussed. The review of many recent research studies demonstrates that modern applications of lasers in dermatology constitute the finest method for the treatment of vascular lesions, combining the advantages of invasive therapy with the security offered by non-invasive therapy, while in certain cases they are the single and only choice for the treatment of these lesions.

  16. Applied biomechanics to evaluate the properties of laser beam treated orthopedic implants

    International Nuclear Information System (INIS)

    Pieretti, Eurico Felix

    2016-01-01

    Laser beam marking is used to ensure biomaterials’ identification and traceability. The texturing imparts greater adhesion to the surfaces of implantable medical devices. The aim of this work was to evaluate the surface behaviour of the austenitic stainless steel ABNT NBR ISO 5832-1 marked and textured by optical fiber laser beam using selected parameters, changing the pulse frequency; in face of its biomechanical behaviour, through tests of tensile strength, fatigue and wear; verify the localized corrosion susceptibility by electrochemical tests in a solution that simulates the body fluids; and analyze microstructural changes. The treatments performed altered the biomaterials roughness and their micro hardness as a function of the increase of the pulse frequency. The microstructure and chemical composition of the surfaces underwent changes that directly affected the passive layer of the stainless steels, triggering the corrosion process. This effect was evidenced by SVET, XPS and characterization of electronic properties of the passive film by the Mott-Schottky technique. These two types of laser treatments increased the surfaces' magnetic susceptibility. The parameters used for the marking and texturing did not induce a decrease in the cellular viability of the samples, as no cytotoxicity was showed even after prolonged incubation. This biomaterial was adequate on the biomechanical tests, since the laser treatments, under the conditions used, did not induce the formation of surface tensions of magnitude capable of leading the fatigue fracture, indicating infinite fatigue life; the region of fracture by tension could not be related to the laser marking. The wear volume decreased as a function of the increase in micro hardness produced by the increase of the pulse frequency in the texturing. The visual character of the markings and texturing was assured after the majority of the tests performed. (author)

  17. Laser induced photoacoustic spectroscopy applied to a study on coagulation processes of Tc(IV) colloid

    International Nuclear Information System (INIS)

    Sekine, T.; Kino, S.; Kino, Y.; Kudo, H.

    2001-01-01

    Quantitative determination of size and concentration of colloid particles in aqueous solutions was performed by laser induced photoacoustic spectroscopy (LPAS), and this technique was applied to a study on coagulation processes of Tc(IV) colloids. The intensity of photoacoustic signals from colloid particles (polystyrene, gold sols) was successfully calculated as a product of the number of particles and the absorption cross section per particle based on the Mie's light scattering theory. With this technique, the coagulation of Tc(IV) colloids prepared by the reduction of TcO 4 with Sn(II) was observed. The observed growth rate of colloid particles was successfully analyzed by a newly developed collision model, in which both the distribution of the kinetic energy of particles and the potential barrier between the two particles played significant roles. (author)

  18. SBS pulse compression applied to a commercial Q-switch Nd-YAG laser

    International Nuclear Information System (INIS)

    Aliaga-Rossel, R.; Bayley, J.; Mamin, A.; Nizienko, Y.

    1997-01-01

    In optical diagnosis of dense Z-pinches, sub-nanosecond laser pulses are required in order to freeze the movement of the plasma during the probing. Commercial lasers can provide such type of pulses but they are either very expensive, or they have a very low energy per pulse. A technique that uses Stimulated Brillouin Scattering (SBS) to compress a 8 ns pulse of a commercial Q-switched Nd-YAG laser is reported here. To carry out this passive compression technique, a frequency doubled laser pulse of 10 ns was focused into a single SBS gas cell, 2 m long, filled with a mixture of argon and sulphurhexafluoride (SF 6 ) at a total pressure of 40 bar. A shorter and high intensity pulse was reflected from the cell (created by SBS) and it travelled back along its original path until it was separated from its original direction by using a dichroic polariser. The pumping volume of the SBS cell, the convergence of the incident beam and the pressure of the gas cell, were optimised to maximise both temporal compression and the output energy. Pulses of 10 ns were compressed to less than 400 ps with a conversion efficiency of 80%. This SBS pulse compression system has been used to make most of the optical measurements of a dense fibre pinch plasma produced in the MAGPIE generator

  19. Diode lasers: From laboratory to industry

    Science.gov (United States)

    Nasim, Hira; Jamil, Yasir

    2014-03-01

    The invention of first laser in 1960 triggered the discovery of several new families of lasers. A rich interplay of different lasing materials resulted in a far better understanding of the phenomena particularly linked with atomic and molecular spectroscopy. Diode lasers have gone through tremendous developments on the forefront of applied physics that have shown novel ways to the researchers. Some interesting attributes of the diode lasers like cost effectiveness, miniature size, high reliability and relative simplicity of use make them good candidates for utilization in various practical applications. Diode lasers are being used by a variety of professionals and in several spectroscopic techniques covering many areas of pure and applied sciences. Diode lasers have revolutionized many fields like optical communication industry, medical science, trace gas monitoring, studies related to biology, analytical chemistry including elemental analysis, war fare studies etc. In this paper the diode laser based technologies and measurement techniques ranging from laboratory research to automated field and industry have been reviewed. The application specific developments of diode lasers and various methods of their utilization particularly during the last decade are discussed comprehensively. A detailed snapshot of the current state of the art diode laser applications is given along with a detailed discussion on the upcoming challenges.

  20. Australian International Food Security Research Centre | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Australian International Food Security Research Centre. Australian International Food Security Research Centre. http://aciar.gov.au/AIFSC. Cultivate Africa's Future. The Cultivate Africa's Future research partnership is designed to support applied research to combat hunger in sub-Saharan Africa by harnessing the potential ...

  1. Thermal detection thresholds of Aδ- and C-fibre afferents activated by brief CO2 laser pulses applied onto the human hairy skin.

    Directory of Open Access Journals (Sweden)

    Maxim Churyukanov

    Full Text Available Brief high-power laser pulses applied onto the hairy skin of the distal end of a limb generate a double sensation related to the activation of Aδ- and C-fibres, referred to as first and second pain. However, neurophysiological and behavioural responses related to the activation of C-fibres can be studied reliably only if the concomitant activation of Aδ-fibres is avoided. Here, using a novel CO(2 laser stimulator able to deliver constant-temperature heat pulses through a feedback regulation of laser power by an online measurement of skin temperature at target site, combined with an adaptive staircase algorithm using reaction-time to distinguish between responses triggered by Aδ- and C-fibre input, we show that it is possible to estimate robustly and independently the thermal detection thresholds of Aδ-fibres (46.9±1.7°C and C-fibres (39.8±1.7°C. Furthermore, we show that both thresholds are dependent on the skin temperature preceding and/or surrounding the test stimulus, indicating that the Aδ- and C-fibre afferents triggering the behavioural responses to brief laser pulses behave, at least partially, as detectors of a change in skin temperature rather than as pure level detectors. Most importantly, our results show that the difference in threshold between Aδ- and C-fibre afferents activated by brief laser pulses can be exploited to activate C-fibres selectively and reliably, provided that the rise in skin temperature generated by the laser stimulator is well-controlled. Our approach could constitute a tool to explore, in humans, the physiological and pathophysiological mechanisms involved in processing C- and Aδ-fibre input, respectively.

  2. Microcomponents manufacturing for precise devices by copper vapor laser

    Science.gov (United States)

    Gorny, Sergey; Nikonchuk, Michail O.; Polyakov, Igor V.

    2001-06-01

    This paper presents investigation results of drilling of metal microcomponents by copper vapor laser. The laser consists of master oscillator - spatial filter - amplifier system, electronics switching with digital control of laser pulse repetition rate and quantity of pulses, x-y stage with computer control system. Mass of metal, removed by one laser pulse, is measured and defined by means of diameter and depth of holes. Interaction of next pulses on drilled material is discussed. The difference between light absorption and metal evaporation processes is considered for drilling and cutting. Efficiency of drilling is estimated by ratio of evaporation heat and used laser energy. Maximum efficiency of steel cutting is calculated with experimental data of drilling. Applications of copper vapor laser for manufacturing is illustrated by such microcomponents as pin guide plate for printers, stents for cardio surgery, encoded disks for security systems and multiple slit masks for spectrophotometers.

  3. Optimum design of a multi-stage dye-laser amplifier pumped with Cu-vapor lasers

    International Nuclear Information System (INIS)

    Maeda, Mitsuo; Uchiumi, Michihiro

    1990-01-01

    A numerical simulation code, based on the one-dimensional photon transport equation, was developed and analyzed to evaluate the performances of Rhodamine 6G dye laser amplifiers pumped with Cu-vapor lasers. The upper singlet-state absorption played an important role to determine the efficiency. The simulation code was applied to optimize a multi-stage amplifier system with a pulsed or a CW dye-laser oscillator. The analytical results gave a useful guideline to design a high-power pulsed dye-laser system for atomic uranium enrichment. (author)

  4. Laser in urology

    International Nuclear Information System (INIS)

    Breisland, H.O.

    1991-01-01

    The neodymium YAG laser is particularly suited for endoscopic urologic surgery because the YAG laser light can be conducted in flexible fibers. Superficial bladder tumours can be treated under local anaesthesia in the outpatient department. The frequency of local recurrences is low, significantly lower than after electrosection or electrocoagulation. Selected cases of T2-muscle invasive bladder tumours can be cured with laser coagulation applied subsequently to transurethral resection. Combined treatment with electrosection and laser coagulation of localized prostatic cancer is a promising method which compares favourably with results obtained by other treatment modalities. Tumours in the upper urinary tract can be laser-treated through ureteroscopes or nephroscopes, but the treatment should be limited to low stage, low grade tumours. Laser is the treatment of choice for intraurethral condylomatas. Laser treatment of penil carcinoma gives excellent cosmetic and functional results and few local recurrences. Laser lithotripsy is a new technique for treatment of ureteric stones and photodynamic laser therapy is a promising tecnique for treatment of carcinoma in situ in the bladder empithelium. However, neither of these techniques are available for clinical use in Norway as yet. 17 refs., 3 figs., 1 tabs

  5. Virtual dosimetry applied to the physical security of a nuclear installation

    Energy Technology Data Exchange (ETDEWEB)

    Santo, Andre Cotelli do E.; Mol, Antonio C.A.; Machado, Daniel M.; Chelles, Daniel R.; Goncalves, Deise G.S., E-mail: cotelli.andre@gmail.com, E-mail: mol@ien.gov.br, E-mail: machado.mol@gmail.com, E-mail: daniel.chelles@gmail.com, E-mail: deise.galvao@gmail.com [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil)

    2013-07-01

    An important activity to be held in radiation protection is the location of radioactive sources. The present work was devoted to the development of a virtual dosimetry tool for locating and detecting such sources. To this end, was created a three-dimensional virtual model of the Instituto de Engenharia Nuclear - IEN, endowed with virtual characters (avatars), capable of move and interact with the environment, radiation detectors (fixed and mobile) and radioactive sources. Aiming to assist in planning physical security of nuclear installations, the tool developed allows the detection simulation of individuals carrying radioactive sources through detectors installed at strategic points of the site. In addition, it is possible to detect and locate sources by handling portable detectors, operated by characters within the virtual environment. The results obtained show the behavior of the radiation detectors on continuous profile of radioactive sources, allowing calculate the dose rate at any position of the virtual environment. Thus, this work can assist in the training of security officers, as well as in evaluating the radiological safety of the nuclear site. (author)

  6. Virtual dosimetry applied to the physical security of a nuclear installation

    International Nuclear Information System (INIS)

    Santo, Andre Cotelli do E.; Mol, Antonio C.A.; Machado, Daniel M.; Chelles, Daniel R.; Goncalves, Deise G.S.

    2013-01-01

    An important activity to be held in radiation protection is the location of radioactive sources. The present work was devoted to the development of a virtual dosimetry tool for locating and detecting such sources. To this end, was created a three-dimensional virtual model of the Instituto de Engenharia Nuclear - IEN, endowed with virtual characters (avatars), capable of move and interact with the environment, radiation detectors (fixed and mobile) and radioactive sources. Aiming to assist in planning physical security of nuclear installations, the tool developed allows the detection simulation of individuals carrying radioactive sources through detectors installed at strategic points of the site. In addition, it is possible to detect and locate sources by handling portable detectors, operated by characters within the virtual environment. The results obtained show the behavior of the radiation detectors on continuous profile of radioactive sources, allowing calculate the dose rate at any position of the virtual environment. Thus, this work can assist in the training of security officers, as well as in evaluating the radiological safety of the nuclear site. (author)

  7. The password practices applied by South African online consumers: Perception versus reality

    Directory of Open Access Journals (Sweden)

    Rika Butler

    2015-07-01

    Full Text Available Background: The ability to identify and authenticate users is regarded as the foundation of computer security. Although new authentication technologies are evolving, passwords are the most common method used to control access in most computer systems. Research suggests that a large portion of computer security password breaches are the result of poor user security behaviour. The password creation and management practices that online consumers apply have a direct effect on the level of computer security and are often targeted in attacks. Objectives: The objective of this study was to investigate South African online consumers’ computer password security practices and to determine whether consumers’ perceptions regarding their password security ability is reflected in the password creation and management practices that they apply. Method: A Web-based survey was designed to (1 determine online consumers’ perceptions of their skills and competence in respect of computer password security and (2 determine the practices that South African online consumers apply when creating and managing passwords. The measures applied were then compared to (1 the users’ perceptions about their computer password security abilities and (2 the results of international studies to determine agreement and inconsistencies. Results: South African online consumers regard themselves as proficient password users. However, various instances of unsafe passwords practices were identified. The results of this South African study correspond with the results of various international studies confirming that challenges to ensure safe online transacting are in line with international challenges. Conclusion: There is a disparity between South African online consumers’ perceived ability regarding computer password security and the password creation and management practices that they apply.

  8. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  9. Novel High Power Type-I Quantum Well Cascade Diode Lasers

    Science.gov (United States)

    2017-08-30

    Novel High Power Type-I Quantum Well Cascade Diode Lasers The views, opinions and/or findings contained in this report are those of the author(s...SECURITY CLASSIFICATION OF: 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES 12. DISTRIBUTION AVAILIBILITY STATEMENT 6... High Power Type-I Quantum Well Cascade Diode Lasers Report Term: 0-Other Email: leon.shterengas@stonybrook.edu Distribution Statement: 1-Approved

  10. Applied Physics Division 1998 Progress Report

    International Nuclear Information System (INIS)

    Cecchini, M.; Crescentini, L; Ghezzi, L.; Kent, C.; Bottomei, M.

    2001-01-01

    This report outlines the 1998 research activities carried out by the Applied Physics Division of the Innovation Department of ENEA (Italian Agency for New Technologies, Energy and Environment). The fields addressed and discussed include: optical and electro-optical technologies (chaps. 1 and 2); accelerator technologies (chap. 3); diagnostic systems for science and engineering (chaps. 4 and 5); theory, modelling and computational methods (chaps. 6 and 7). The aim of the Applied Physics Division is to develop technologies and systems that can be directly applied by internal (ENEA) and external users in research (high-resolution spectroscopy, laser-generated soft-x-ray sources), production processes (laser material photoproduction, structural analysis), social, cultural and environmental sciences (laser remote sensing, modelling of ecosystems and population dynamics) and medicine (particle accelerator for radiotherapy). Most of the work in 1998 was performed by the division's laboratories at the Frascati, Casaccia and Bologna Research Centres of ENEA; some was done elsewhere in collaboration with other ENEA units, external laboratories and industries. A good share of the activities was carried out for international projects; in particular, the IV European Union Framework Program

  11. Applied Physics Division 1998 Progress Report

    Energy Technology Data Exchange (ETDEWEB)

    Cecchini, M.; Crescentini, L; Ghezzi, L.; Kent, C.; Bottomei, M. [ENEA, Centro Ricerche Frascati, Frascati, RM (Italy). Applied physics Division

    1999-07-01

    This report outlines the 1998 research activities carried out by the Applied Physics Division of the Innovation Department of ENEA (Italian Agency for New Technologies, Energy and Environment). The fields addressed and discussed include: optical and electro-optical technologies (chaps. 1 and 2); accelerator technologies (chap. 3); diagnostic systems for science and engineering (chaps. 4 and 5); theory, modelling and computational methods (chaps. 6 and 7). The aim of the Applied Physics Division is to develop technologies and systems that can be directly applied by internal (ENEA) and external users in research (high-resolution spectroscopy, laser-generated soft-x-ray sources), production processes (laser material photoproduction, structural analysis), social, cultural and environmental sciences (laser remote sensing, modelling of ecosystems and population dynamics) and medicine (particle accelerator for radiotherapy). Most of the work in 1998 was performed by the division's laboratories at the Frascati, Casaccia and Bologna Research Centres of ENEA; some was done elsewhere in collaboration with other ENEA units, external laboratories and industries. A good share of the activities was carried out for international projects; in particular, the IV European Union Framework Program.

  12. How Secure Is Your Radiology Department? Mapping Digital Radiology Adoption and Security Worldwide.

    Science.gov (United States)

    Stites, Mark; Pianykh, Oleg S

    2016-04-01

    Despite the long history of digital radiology, one of its most critical aspects--information security--still remains extremely underdeveloped and poorly standardized. To study the current state of radiology security, we explored the worldwide security of medical image archives. Using the DICOM data-transmitting standard, we implemented a highly parallel application to scan the entire World Wide Web of networked computers and devices, locating open and unprotected radiology servers. We used only legal and radiology-compliant tools. Our security-probing application initiated a standard DICOM handshake to remote computer or device addresses, and then assessed their security posture on the basis of handshake replies. The scan discovered a total of 2774 unprotected radiology or DICOM servers worldwide. Of those, 719 were fully open to patient data communications. Geolocation was used to analyze and rank our findings according to country utilization. As a result, we built maps and world ranking of clinical security, suggesting that even the most radiology-advanced countries have hospitals with serious security gaps. Despite more than two decades of active development and implementation, our radiology data still remains insecure. The results provided should be applied to raise awareness and begin an earnest dialogue toward elimination of the problem. The application we designed and the novel scanning approach we developed can be used to identify security breaches and to eliminate them before they are compromised.

  13. Comparative Evaluation of Effects of Laser Modalities on Shear Bond Strengths of Veneering Porcelains to Laser Sintered Substructures: An In Vitro Study.

    Science.gov (United States)

    Gorler, Oguzhan; Saygin, Aysegul Goze

    2017-06-01

    Laser modalities and direct metal laser sintering (DMLS) have a potential to enhance micromechanical bonding between dental super- and infrastructures. However, the effect of different manufacturing methods on the metal-ceramic bond strength needs further evaluation. We investigated the effect of surface treatment with Er:YAG, Nd:YAG, and Ho:YAG lasers on the shear bond strength (SBS) of high-fusion dental porcelains (Vita and G-Ceram) to infrastructures prepared with DMLS in vitro settings. Study specimens (n = 128) were randomly divided into study subsets (n = 8), considering treatment types applied on the surface of infrastructures, including sandblasting and selected laser modalities; infrastructure types as direct laser sintered (DLS) and Ni-Cr based; and superstructure porcelains as Vita and G-Ceram. The SBS test was performed to assess the effectiveness of surface modifications that were also examined with a stereo microscope. Considering laser procedure types, the highest SBS values were obtained by Er:YAG laser, followed by, with a decreasing efficiency, Ho:YAG laser and sandblasting procedures, and Nd:YAG laser procedure (p laser decreases the bonding of Vita and G-Ceram in all the infrastructures compared with sandblasting. Considering porcelains, the highest SBS values were obtained by Vita (p laser procedures caused surface irregularities as revealed by the stereo microscopic examination. In current experimental settings, Er:YAG laser applied to DLS infrastructure veneered with Vita porcelain increases bonding strength more distinctly, and Nd:YAG laser applied to Ni-Cr-based infrastructure veneered with G-Ceram porcelain alters bonding strength unfavorably.

  14. Navigated Pattern Laser System versus Single-Spot Laser System for Postoperative 360-Degree Laser Retinopexy.

    Science.gov (United States)

    Kulikov, Alexei N; Maltsev, Dmitrii S; Boiko, Ernest V

    2016-01-01

    Purpose . To compare three 360°-laser retinopexy (LRP) approaches (using navigated pattern laser system, single-spot slit-lamp (SL) laser delivery, and single-spot indirect ophthalmoscope (IO) laser delivery) in regard to procedure duration, procedural pain score, technical difficulties, and the ability to achieve surgical goals. Material and Methods . Eighty-six rhegmatogenous retinal detachment patients (86 eyes) were included in this prospective randomized study. The mean procedural time, procedural pain score (using 4-point Verbal Rating Scale), number of laser burns, and achievement of the surgical goals were compared between three groups (pattern LRP (Navilas® laser system), 36 patients; SL-LRP, 28 patients; and IO-LRP, 22 patients). Results . In the pattern LRP group, the amount of time needed for LRP and pain level were statistically significantly lower, whereas the number of applied laser burns was higher compared to those in the SL-LRP group and in the IO-LRP group. In the pattern LRP, SL-LRP, and IO-LRP groups, surgical goals were fully achieved in 28 (77.8%), 17 (60.7%), and 13 patients (59.1%), respectively ( p > 0.05). Conclusion . The navigated pattern approach allows improving the treatment time and pain in postoperative 360° LRP. Moreover, 360° pattern LRP is at least as effective in achieving the surgical goal as the conventional (slit-lamp or indirect ophthalmoscope) approaches with a single-spot laser.

  15. CO laser interferometer for REB-plasma experiments

    International Nuclear Information System (INIS)

    Burmasov, V.S.; Kruglyakov, E.P.

    1996-01-01

    The Michelson carbon oxide laser interferometer for measuring plasma density in studies on REB-plasma interaction is described. A detail description of the interferometer and CO laser is presented. For a selection of a single wavelength laser operation the CaF 2 prism is applied. A Ge:Au photoconductor at 77 deg K is applied as the detector. The CO laser radiation at λ 5.34 μm coincides with the detector maximum sensitivity (of the order of 1000 V/W). This increases the interferometer sensitivity about ten times with respect to the He-Ne laser (λ = 3.39 μm) used as the source of light. The typical interferogram and time evolution of plasma density obtained at GOL-M device are presented. (author). 3 figs., 5 refs

  16. CO laser interferometer for REB-plasma experiments

    Energy Technology Data Exchange (ETDEWEB)

    Burmasov, V S; Kruglyakov, E P [Budker Inst. of Nuclear Physics, Novosibirsk (Russian Federation)

    1997-12-31

    The Michelson carbon oxide laser interferometer for measuring plasma density in studies on REB-plasma interaction is described. A detail description of the interferometer and CO laser is presented. For a selection of a single wavelength laser operation the CaF{sub 2} prism is applied. A Ge:Au photoconductor at 77 deg K is applied as the detector. The CO laser radiation at {lambda} 5.34 {mu}m coincides with the detector maximum sensitivity (of the order of 1000 V/W). This increases the interferometer sensitivity about ten times with respect to the He-Ne laser ({lambda} = 3.39 {mu}m) used as the source of light. The typical interferogram and time evolution of plasma density obtained at GOL-M device are presented. (author). 3 figs., 5 refs.

  17. High speed visible light communication using blue GaN laser diodes

    Science.gov (United States)

    Watson, S.; Viola, S.; Giuliano, G.; Najda, S. P.; Perlin, P.; Suski, T.; Marona, L.; Leszczyński, M.; Wisniewski, P.; Czernecki, R.; Targowski, G.; Watson, M. A.; White, H.; Rowe, D.; Laycock, L.; Kelly, A. E.

    2016-10-01

    GaN-based laser diodes have been developed over the last 20 years making them desirable for many security and defence applications, in particular, free space laser communications. Unlike their LED counterparts, laser diodes are not limited by their carrier lifetime which makes them attractive for high speed communication, whether in free space, through fiber or underwater. Gigabit data transmission can be achieved in free space by modulating the visible light from the laser with a pseudo-random bit sequence (PRBS), with recent results approaching 5 Gbit/s error free data transmission. By exploiting the low-loss in the blue part of the spectrum through water, data transmission experiments have also been conducted to show rates of 2.5 Gbit/s underwater. Different water types have been tested to monitor the effect of scattering and to see how this affects the overall transmission rate and distance. This is of great interest for communication with unmanned underwater vehicles (UUV) as the current method using acoustics is much slower and vulnerable to interception. These types of laser diodes can typically reach 50-100 mW of power which increases the length at which the data can be transmitted. This distance could be further improved by making use of high power laser arrays. Highly uniform GaN substrates with low defectivity allow individually addressable laser bars to be fabricated. This could ultimately increase optical power levels to 4 W for a 20-emitter array. Overall, the development of GaN laser diodes will play an important part in free space optical communications and will be vital in the advancement of security and defence applications.

  18. Quantum Secure Group Communication.

    Science.gov (United States)

    Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M

    2018-03-01

    We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.

  19. Para-hydrogen raman laser and its application to laser induced chemistry

    International Nuclear Information System (INIS)

    Tashiro, Hideo

    1988-01-01

    The report outlines the mechanism of the para-hydrogen Raman laser as a infrared light source, and its application to laser induced chemistry. The Stoke's wave number after a Raman shift is equal to the difference between the wave number of the CO 2 laser used for excitation and the rotation Raman wave number of the hydrogen molecule. A Raman laser can serve as an infrared source. CO 2 laser oscillation beam in the range of 9∼11 micrometers is selected and the frequency of infrared beam is varied by changing the wave number of the CO 2 laser beam. A problem with the Raman laser is that the Raman scatterring gain is small due to a large wavelength. In developing equipment, a special mechanism is required to solve this problem. A Raman laser comprises a CO 2 laser for excitation and multi-pulse Raman cells. The combination of a TEA oscillator and amplifiers gives CO 2 pulses with a peak power of about several tens of MW. Many heavy metal compounds including fluorides, carbonyl compounds and other organic compounds, absorb light with wavelengths in the same range as those of the Raman laser. Such compounds can be dissociated directly by applying Raman laser beams. The laser will be helpful for separation of isotopes, etc. (Nogami, K.)

  20. An ultra short pulse reconstruction software applied to the GEMINI high power laser system

    Energy Technology Data Exchange (ETDEWEB)

    Galletti, Mario, E-mail: mario.gall22@gmail.com [INFN – LNF, Via Enrico Fermi 40, 00044 Frascati (Italy); Galimberti, Marco [Central Laser Facility, Rutherford Appleton Laboratory, Didcot (United Kingdom); Hooker, Chris [Central Laser Facility, Rutherford Appleton Laboratory, Didcot (United Kingdom); University of Oxford, Oxford (United Kingdom); Chekhlov, Oleg; Tang, Yunxin [Central Laser Facility, Rutherford Appleton Laboratory, Didcot (United Kingdom); Bisesto, Fabrizio Giuseppe [INFN – LNF, Via Enrico Fermi 40, 00044 Frascati (Italy); Curcio, Alessandro [INFN – LNF, Via Enrico Fermi 40, 00044 Frascati (Italy); Sapienza – University of Rome, P.le Aldo Moro, 2, 00185 Rome (Italy); Anania, Maria Pia [INFN – LNF, Via Enrico Fermi 40, 00044 Frascati (Italy); Giulietti, Danilo [Physics Department of the University and INFN, Pisa (Italy)

    2016-09-01

    The GRENOUILLE traces of Gemini pulses (15 J, 30 fs, PW, shot per 20 s) were acquired in the Gemini Target Area PetaWatt at the Central Laser Facility (CLF), Rutherford Appleton Laboratory (RAL). A comparison between the characterizations of the laser pulse parameters made using two different types of algorithms: Video Frog and GRenouille/FrOG (GROG), was made. The temporal and spectral parameters came out to be in great agreement for the two kinds of algorithms. In this experimental campaign it has been showed how GROG, the developed algorithm, works as well as VideoFrog algorithm with the PetaWatt pulse class. - Highlights: • Integration of the diagnostic tool on high power laser. • Validation of the GROG algorithm in comparison to a well-known commercial available software. • Complete characterization of the GEMINI ultra-short high power laser pulse.

  1. Is it possible to prevent morbidity on post cardiovascular surgery applying low level laser therapy?

    Science.gov (United States)

    Pinto, Nathali C.; Baptista, Ivany Machado d. C.; Pereira, Mara Helena C.; Serrão, Nelson F.; Pomerantzeff, Pablo M. A.; Chavantes, Maria Cristina

    2014-03-01

    Background and Objective: Complications following cardiovascular surgery incision are common in mediastinitis and wound dehiscence form, a 47% mortality rate remaining. Low Level Laser Therapy (LLLT) has been employed mainly to its effectiveness analgesic and anti-inflammatory actions, aiding the tissue repair process. The aim of this study was to evaluate infrared LLLT onto surgical incision in patients submitted to cardiovascular surgery. Materials and Methods: 40 patients were divided in two groups: Placebo Group (G1) - conventional therapy + "Laser pointer" and Laser Group (G2) - conventional therapy + Infrared Laser irradiation on surgical incision. Diode Laser was employed, C.W. mode, around the surgical wound bed, on immediate Post Operative (PO), 1st PO and 3rd PO with the following parameters: wavelength (λ): 830nm, P=35mW, E=0,75J. Results: G2 didn't present any complication and 5% of patients in G1 developed incision dehiscence and infection. On 7thPO, still a large amount of G1 patients showed pain and unquestionable inflammatory signs surrounding the surgical wound, when compared to G2. Besides, hospital stay in Laser Group was 2 times shorter than in Placebo Group (p-value=0.001). Conclusion: Infrared Laser denoted to be safe and exceptionally valuable tools in preventing morbidities on post cardiovascular surgeries.

  2. Laser Scanning in Forests

    Directory of Open Access Journals (Sweden)

    Håkan Olsson

    2012-09-01

    Full Text Available The introduction of Airborne Laser Scanning (ALS to forests has been revolutionary during the last decade. This development was facilitated by combining earlier ranging lidar discoveries [1–5], with experience obtained from full-waveform ranging radar [6,7] to new airborne laser scanning systems which had components such as a GNSS receiver (Global Navigation Satellite System, IMU (Inertial Measurement Unit and a scanning mechanism. Since the first commercial ALS in 1994, new ALS-based forest inventory approaches have been reported feasible for operational activities [8–12]. ALS is currently operationally applied for stand level forest inventories, for example, in Nordic countries. In Finland alone, the adoption of ALS for forest data collection has led to an annual savings of around 20 M€/year, and the work is mainly done by companies instead of governmental organizations. In spite of the long implementation times and there being a limited tradition of making changes in the forest sector, laser scanning was commercially and operationally applied after about only one decade of research. When analyzing high-ranked journal papers from ISI Web of Science, the topic of laser scanning of forests has been the driving force for the whole laser scanning research society over the last decade. Thus, the topic “laser scanning in forests” has provided a significant industrial, societal and scientific impact. [...

  3. Laser application of heat pipe technology in energy related programs

    International Nuclear Information System (INIS)

    Carbone, R.J.

    1975-01-01

    The design and operating parameters for a heat pipe laser utilizing metal vapors are proposed. The laser would be applied to laser induced fusion, laser induced chemistry, laser isotope separation, and power transport using optical beams. (U.S.)

  4. Applying a Space-Based Security Recovery Scheme for Critical Homeland Security Cyberinfrastructure Utilizing the NASA Tracking and Data Relay (TDRS) Based Space Network

    Science.gov (United States)

    Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy

    2015-01-01

    Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.

  5. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    Science.gov (United States)

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  6. Effects of laser fluence on silicon modification by four-beam laser interference

    International Nuclear Information System (INIS)

    Zhao, Le; Li, Dayou; Wang, Zuobin; Yue, Yong; Zhang, Jinjin; Yu, Miao; Li, Siwei

    2015-01-01

    This paper discusses the effects of laser fluence on silicon modification by four-beam laser interference. In this work, four-beam laser interference was used to pattern single crystal silicon wafers for the fabrication of surface structures, and the number of laser pulses was applied to the process in air. By controlling the parameters of laser irradiation, different shapes of silicon structures were fabricated. The results were obtained with the single laser fluence of 354 mJ/cm 2 , 495 mJ/cm 2 , and 637 mJ/cm 2 , the pulse repetition rate of 10 Hz, the laser exposure pulses of 30, 100, and 300, the laser wavelength of 1064 nm, and the pulse duration of 7–9 ns. The effects of the heat transfer and the radiation of laser interference plasma on silicon wafer surfaces were investigated. The equations of heat flow and radiation effects of laser plasma of interfering patterns in a four-beam laser interference distribution were proposed to describe their impacts on silicon wafer surfaces. The experimental results have shown that the laser fluence has to be properly selected for the fabrication of well-defined surface structures in a four-beam laser interference process. Laser interference patterns can directly fabricate different shape structures for their corresponding applications

  7. Experimental and rendering-based investigation of laser radar cross sections of small unmanned aerial vehicles

    Science.gov (United States)

    Laurenzis, Martin; Bacher, Emmanuel; Christnacher, Frank

    2017-12-01

    Laser imaging systems are prominent candidates for detection and tracking of small unmanned aerial vehicles (UAVs) in current and future security scenarios. Laser reflection characteristics for laser imaging (e.g., laser gated viewing) of small UAVs are investigated to determine their laser radar cross section (LRCS) by analyzing the intensity distribution of laser reflection in high resolution images. For the first time, LRCSs are determined in a combined experimental and computational approaches by high resolution laser gated viewing and three-dimensional rendering. An optimized simple surface model is calculated taking into account diffuse and specular reflectance properties based on the Oren-Nayar and the Cook-Torrance reflectance models, respectively.

  8. Investigation of uv N/sub 2/ laser

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Y; Li, Y; Yeh, Y; Lu, C; Wang, B; Hsiang, Z

    1979-02-01

    By applying the theory of nitrogen molecular laser and the electric circuit theory of a Blumlein structure horizontal discharge pulsed laser, a compact N/sub 2/ laser has been developed with improved spark gap switch, transmission line and laser cavity. This laser is particularly suited to serve as a pumping light source for a dye laser. Experimental studies were performed to determine the laser output characteristics as affected by the following parameters: the electric inductance of laser cavity, the shape of the electrode, the electric inductance of spark gap, the transmission line, and the initial point of discharge.

  9. Target isolation system, high power laser and laser peening method and system using same

    Science.gov (United States)

    Dane, C. Brent; Hackel, Lloyd A.; Harris, Fritz

    2007-11-06

    A system for applying a laser beam to work pieces, includes a laser system producing a high power output beam. Target delivery optics are arranged to deliver the output beam to a target work piece. A relay telescope having a telescope focal point is placed in the beam path between the laser system and the target delivery optics. The relay telescope relays an image between an image location near the output of the laser system and an image location near the target delivery optics. A baffle is placed at the telescope focal point between the target delivery optics and the laser system to block reflections from the target in the target delivery optics from returning to the laser system and causing damage.

  10. Secure IP mobility management for VANET

    CERN Document Server

    Taha, Sanaa

    2013-01-01

    This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in

  11. Laser-driven proton beams applied to radiobiological experiments

    International Nuclear Information System (INIS)

    Yogo, Akifumi

    2012-01-01

    The proton accelerators based on the high intensity laser system generate shorter and higher pulse beams compared to the conventional particle accelerators used for the cancer therapy. To demonstrate the radiobiological effects of the new proton beams, the program to develop a biological irradiation instrument for the DNA double-strand break was started in the fiscal year 2008. A prototype instrument was made by making use of the J-KAREN (JAEA Kansai Advanced Relativistic Engineering) laser beam. Polyimide thin film targets were used to irradiate A-549 cells. The DNA double-strand break was tested by the fluorescence spectrometry. In the second year the quantitative yield of the DNA double-strand break and its proton dose dependence were measured. The results indicated that they were comparative to the cases of the conventional particle accelerators. In the fiscal year of 2010 the design of the magnetic field for the energy selection has been changed. The new irradiation instrument, the main part of which is only about 40 cm in length as illustrated in the figure, has been constructed and tested. The experiment has been carried out using the human cancer cells (HSG) and the relative biological effectiveness (RBE) has been quantitatively evaluated by the colony assay for varied distribution of the proton beam energy. The survival fractions plotted against the dose were in good agreement with the case of 3 He beam. RBE was found not to be changed up to 1x10 7 Gy/s. Stability of the energy peak, half width and the proton density has been confirmed for this very compact instrument. (S. Funahashi)

  12. Space base laser torque applied on LEO satellites of various geometries at satellite’s closest approach

    Directory of Open Access Journals (Sweden)

    N.S. Khalifa

    2013-12-01

    Full Text Available In light of using laser power in space applications, the motivation of this paper is to use a space based solar pumped laser to produce a torque on LEO satellites of various shapes. It is assumed that there is a space station that fires laser beam toward the satellite so the beam spreading due to diffraction is considered to be the dominant effect on the laser beam propagation. The laser torque is calculated at the point of closest approach between the space station and some sun synchronous low Earth orbit cubesats. The numerical application shows that space based laser torque has a significant contribution on the LEO cubesats. It has a maximum value in the order of 10−8 Nm which is comparable with the residual magnetic moment. However, it has a minimum value in the order 10−11 Nm which is comparable with the aerodynamic and gravity gradient torque. Consequently, space based laser torque can be used as an active attitude control system.

  13. Computer Security: professionalism in security, too

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    At CERN, we apply a great deal of dedication and professionalism to all the work we do. This is necessary because of the complexity and sophistication of the devices we deal with. However, when it comes to computer security, we can all agree that there is room for improvement.   In some cases, we’ve observed devices that are connected to our Intranet networks without the adequate level of protection. Also, in order to allow it to be disseminated easily with peers, information is often disclosed on public webpages, sometimes without appropriate consideration of important security-related aspects. Program code is lost due to a lack of proper version control or the use of central storage systems. Systems are brought down by “finger trouble”, confusing the right and wrong IP addresses. Software or system development is done directly on production devices, impinging on their proper operation up to the point where the system grinds to a halt. Applications full of useful fe...

  14. A low-cost, tunable laser lock without laser frequency modulation

    Science.gov (United States)

    Shea, Margaret E.; Baker, Paul M.; Gauthier, Daniel J.

    2015-05-01

    Many experiments in optical physics require laser frequency stabilization. This can be achieved by locking to an atomic reference using saturated absorption spectroscopy. Often, the laser frequency is modulated and phase sensitive detection used. This method, while well-proven and robust, relies on expensive components, can introduce an undesirable frequency modulation into the laser, and is not easily frequency tuned. Here, we report a simple locking scheme similar to those implemented previously. We modulate the atomic resonances in a saturated absorption setup with an AC magnetic field created by a single solenoid. The same coil applies a DC field that allows tuning of the lock point. We use an auto-balanced detector to make our scheme more robust against laser power fluctuations and stray magnetic fields. The coil, its driver, and the detector are home-built with simple, cheap components. Our technique is low-cost, simple to setup, tunable, introduces no laser frequency modulation, and only requires one laser. We gratefully acknowledge the financial support of the NSF through Grant # PHY-1206040.

  15. Web Services Security - Implementation and Evaluation Issues

    Science.gov (United States)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  16. Combining overt and covert anti-counterfeiting technologies for securities

    Science.gov (United States)

    Uematsu, Tsuyoshi

    2006-02-01

    The National Printing Bureau of Japan has been developing new anti-counterfeiting technologies as a banknote printer. Some of our technologies have already been effectively introduced into Japan's new banknote series. Anti-counterfeiting technologies can be applied not only to banknotes but also to other security documents depending on desired features. In this presentation, I will introduce three of our newly developed overt and covert security techniques, which are intended for document security and brand protection, as well as banknotes. "Metallic View" is mainly for offset printing. "Copy Check" (micro-structural lines involving luminescence) is for plate making technology. "ImageSwitch" is for a new security solution which has unlimited printing applications. All three techniques create "latent images" (some of which may be better known as "carrier screen images") that are useful in preventing counterfeiting. While each of the techniques is effective by itself, all are more effective when applied together. Combining these techniques could make all security documents harder to copy using IT scanners, and provide cost-effective anti-counterfeiting solutions for all security users.

  17. Farmland Tenure Security in China: Influencing Factors of Actual and Perceived Farmland Tenure Security

    Science.gov (United States)

    Ren, Guangcheng; Zhu, Xueqin; Heerink, Nico; van Ierland, Ekko; Feng, Shuyi

    2017-04-01

    Tenure security plays an important role in farm households' investment, land renting and other decisions. Recent literature distinguishes between actual farmland tenure security (i.e. farm households' actual control of farmland) and perceived farmland tenure security (i.e. farm households' subjective understanding of their farmland tenure situation and expectation regarding government enforcement and equality of the law). However little is known on what factors influence the actual and perceived farmland tenure security in rural China. Theoretically, actual farmland tenure security is related to village self-governance as a major informal governance rule in rural China. Both economic efficiency and equity considerations are likely to play a role in the distribution of land and its tenure security. Household perceptions of farmland tenure security depend not only on the actual farmland tenure security in a village, but may also be affected by households' investment in and ability of changing social rules. Our study examines what factors contribute to differences in actual and perceived farmland tenure security between different villages and farm households in different regions of China. Applying probit models to the data collected from 1,485 households in 124 villages in Jiangsu, Jiangxi, Liaoning and Chongqing, we find that development of farmland rental market and degree of self-governance of a village have positive impacts, and development of labour market has a negative effect on actual farmland tenure security. Household perceptions of tenure security depend not only on actual farmland tenure security and on households' investment in and ability of changing social rules, but also on risk preferences of households. This finding has interesting policy implications for future land reforms in rural China.

  18. A Container-based Trusted Multi-level Security Mechanism

    Directory of Open Access Journals (Sweden)

    Li Xiao-Yong

    2017-01-01

    Full Text Available Multi-level security mechanism has been widely applied in the military, government, defense and other domains in which information is required to be divided by security-level. Through this type of security mechanism, users at different security levels are provided with information at corresponding security levels. Traditional multi-level security mechanism which depends on the safety of operating system finally proved to be not practical. We propose a container-based trusted multi-level security mechanism in this paper to improve the applicability of the multi-level mechanism. It guarantees multi-level security of the system through a set of multi-level security policy rules and trusted techniques. The technical feasibility and application scenarios are also discussed. The ease of realization, strong practical significance and low cost of our method will largely expand the application of multi-level security mechanism in real life.

  19. 14 CFR 1203.501 - Applying derivative classification markings.

    Science.gov (United States)

    2010-01-01

    ... INFORMATION SECURITY PROGRAM Derivative Classification § 1203.501 Applying derivative classification markings. Persons who apply derivative classification markings shall: (a) Observe and respect original... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Applying derivative classification markings...

  20. Laser-plasma interaction with an adaptive optics wavefront-corrected laser beam

    International Nuclear Information System (INIS)

    Lewis, K.

    2008-12-01

    The propagation of an intense laser beam trough a preformed plasma is of particular interest in order to achieve laser inertial confinement fusion. Experiments carried out with a near-diffraction limited laser beam, producing a single hot spot interacting with the plasma, delivered new results, presented in this Ph.D. dissertation. In particular the first experimental observation of the filament instability confirms the numerous theoretical and numerical studies on the subject. Beam spreading and filament-ion thresholds are studied thanks to near-field and far-field images, with respect to laser intensity, time and space, and plasma transverse velocity. Same diagnostics have been applied to the stimulated Brillouin scattered light, enabling the first observation of the transverse Brillouin activity in the plasma. (author)

  1. Tunable on chip optofluidic laser

    DEFF Research Database (Denmark)

    Bakal, Avraham; Vannahme, Christoph; Kristensen, Anders

    2015-01-01

    A chip scale tunable laser in the visible spectral band is realized by generating a periodic droplet array inside a microfluidic channel. Combined with a gain medium within the droplets, the periodic structure provides the optical feedback of the laser. By controlling the pressure applied to two...

  2. Optical and digital techniques for information security

    CERN Document Server

    2005-01-01

    Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies for Security Applications. This book encompases the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This Information Security book will draw on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report innovative technologies that can be applied to information security issues. The Advanced Sciences and Technologies for Security Applications series focuses on research monographs in the areas of: -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection...

  3. Security systems engineering overview

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  4. Laser interrogation of latent vehicle registration number

    Energy Technology Data Exchange (ETDEWEB)

    Russo, R.E. [Lawrence Berkeley Lab., CA (United States). Energy and Environment Div.]|[Lawrence Livermore National Lab., CA (United States). Forensic Science Center; Pelkey, G.E. [City of Livermore Police Dept., CA (United States); Grant, P.; Whipple, R.E.; Andresen, B.D. [Lawrence Livermore National Lab., CA (United States). Forensic Science Center

    1994-09-01

    A recent investigation involved automobile registration numbers as important evidentiary specimens. In California, as in most states, small, thin metallic decals are issued to owners of vehicles each year as the registration is renewed. The decals are applied directly to the license plate of the vehicle and typically on top of the previous year`s expired decal. To afford some degree of security, the individual registration decals have been designed to tear easily; they cannot be separated from each other, but can be carefully removed intact from the metal license plate by using a razor blade. In September 1993, the City of Livermore Police Department obtained a blue 1993 California decal that had been placed over an orange 1992 decal. The two decals were being investigated as possible evidence in a case involving vehicle registration fraud. To confirm the suspicion and implicate a suspect, the department needed to known the registration number on the bottom (completely covered) 1992 decal. The authors attempted to use intense and directed light to interrogate the colored stickers. Optical illumination using a filtered white-light source partially identified the latent number. However, the most successful technique used a tunable dye laser pumped by a pulsed Nd:YAG laser. By selectively tuning the wavelength and intensity of the dye laser, backlit illumination of the decals permitted visualization of the underlying registration number through the surface of the top sticker. With optimally-tuned wavelength and intensity, 100% accuracy was obtained in identifying the sequence of latent characters. The advantage of optical techniques is their completely nondestructive nature, thus preserving the evidence for further interrogation or courtroom presentation.

  5. A Framework for Secure Data Delivery in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Leonidas PERLEPES

    2012-03-01

    Full Text Available Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could easily capture a node and tamper the applications running on it, in order to perform different types of attacks. In this paper, we propose a 3-layer Security Framework composed by physical security schemes, cryptography of communication channels and live forensics protection techniques that allows for secure WSN deployments. Each of the abovementioned techniques maximizes the security levels leading to a tamper proof sensor node. By applying the proposed security framework, secure communication between nodes is guaranteed, identified captured nodes are silenced and their destructive effect on the rest of the network infrastructure is minimized due to the early measures applied. Our main concern is to propose a framework that balances its attributes between robustness, as long as security is concerned and cost effective implementation as far as resources (energy consumption are concerned.

  6. Atmospheric propagation of high power laser radiation at different weather conditions

    OpenAIRE

    Pargmann, Carsten; Hall, Thomas; Duschek, Frank; Handke, Jürgen

    2016-01-01

    Applications based on the propagation of high power laser radiation through the atmosphere are limited in range and effect, due to weather dependent beam wandering, beam deterioration, and scattering processes. Security and defense related application examples are countermeasures against hostile projectiles and the powering of satellites and aircrafts. For an examination of the correlations between weather condition and laser beam characteristics DLR operates at Lampoldshausen a 130 m long fr...

  7. Business Information Exchange System with Security, Privacy, and Anonymity

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-01-01

    Full Text Available Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

  8. Diamond films on stainless steel substrates with an interlayer applied by laser cladding

    Energy Technology Data Exchange (ETDEWEB)

    Contin, Andre; Alves, Kenya Aparecida; Damm, Djoille Denner; Trava-Airoldi, Vladimir Jesus; Corat, Evaldo Jose, E-mail: andrecontin@yahoo.com.br [Instituto Nacional de Pesquisas Espaciais (LAS/INPE), Sao Jose dos Campos, SP (Brazil). Laboratorio Associado de Sensores e Materiais; Campos, Raonei Alves [Universidade Federal do Sul e Sudeste do Para (UNIFESSPA), Maraba, PA (Brazil); Vasconcelos, Getulio de [Instituto de Estudos Avancados (DedALO/IEAv), Sao Jose dos Campos, SP (Brazil). Laboratorio de Desenvolvimento de Aplicacoes de Lasers e Optica

    2017-03-15

    The objective of this work is the Hot Filament Chemical Vapor Deposition (HFCVD) of diamond films on stainless steel substrates using a new technique for intermediate barrier forming, made by laser cladding process. In this technique, a powder layer is irradiated by a laser beam to melt the powder layer and the substrate surface layer to create the interlayer. The control of the laser beam parameters allows creating homogeneous coating layers, in rather large area in few seconds. In this work, the silicon carbide powder (SiC) was used to create an intermediate layer. Before the diamond growth, the samples were subjected to the seeding process with diamond powder. The diamond deposition was performed using Hot-Filament CVD reactor and the characterizations were Scanning Electron Microscopy, X-ray diffraction, Raman Scattering Spectroscopy and Scratch Test. (author)

  9. The influence of laser-particle interaction in laser induced breakdown spectroscopy and laser ablation inductively coupled plasma spectrometry

    International Nuclear Information System (INIS)

    Lindner, Helmut; Loper, Kristofer H.; Hahn, David W.; Niemax, Kay

    2011-01-01

    Particles produced by previous laser shots may have significant influence on the analytical signal in laser-induced breakdown spectroscopy (LIBS) and laser ablation inductively coupled plasma (LA-ICP) spectrometry if they remain close to the position of laser sampling. The effects of these particles on the laser-induced breakdown event are demonstrated in several ways. LIBS-experiments were conducted in an ablation cell at atmospheric conditions in argon or air applying a dual-pulse arrangement with orthogonal pre-pulse, i.e., plasma breakdown in a gas generated by a focussed laser beam parallel and close to the sample surface followed by a delayed crossing laser pulse in orthogonal direction which actually ablates material from the sample and produces the LIBS plasma. The optical emission of the LIBS plasma as well as the absorption of the pre-pulse laser was measured. In the presence of particles in the focus of the pre-pulse laser, the plasma breakdown is affected and more energy of the pre-pulse laser is absorbed than without particles. As a result, the analyte line emission from the LIBS plasma of the second laser is enhanced. It is assumed that the enhancement is not only due to an increase of mass ablated by the second laser but also to better atomization and excitation conditions favored by a reduced gas density in the pre-pulse plasma. Higher laser pulse frequencies increase the probability of particle-laser interaction and, therefore, reduce the shot-to-shot line intensity variation as compared to lower particle loadings in the cell. Additional experiments using an aerosol chamber were performed to further quantify the laser absorption by the plasma in dependence on time both with and without the presence of particles. The overall implication of laser-particle interactions for LIBS and LA-ICP-MS/OES are discussed.

  10. The influence of laser-particle interaction in laser induced breakdown spectroscopy and laser ablation inductively coupled plasma spectrometry

    Science.gov (United States)

    Lindner, Helmut; Loper, Kristofer H.; Hahn, David W.; Niemax, Kay

    2011-02-01

    Particles produced by previous laser shots may have significant influence on the analytical signal in laser-induced breakdown spectroscopy (LIBS) and laser ablation inductively coupled plasma (LA-ICP) spectrometry if they remain close to the position of laser sampling. The effects of these particles on the laser-induced breakdown event are demonstrated in several ways. LIBS-experiments were conducted in an ablation cell at atmospheric conditions in argon or air applying a dual-pulse arrangement with orthogonal pre-pulse, i.e., plasma breakdown in a gas generated by a focussed laser beam parallel and close to the sample surface followed by a delayed crossing laser pulse in orthogonal direction which actually ablates material from the sample and produces the LIBS plasma. The optical emission of the LIBS plasma as well as the absorption of the pre-pulse laser was measured. In the presence of particles in the focus of the pre-pulse laser, the plasma breakdown is affected and more energy of the pre-pulse laser is absorbed than without particles. As a result, the analyte line emission from the LIBS plasma of the second laser is enhanced. It is assumed that the enhancement is not only due to an increase of mass ablated by the second laser but also to better atomization and excitation conditions favored by a reduced gas density in the pre-pulse plasma. Higher laser pulse frequencies increase the probability of particle-laser interaction and, therefore, reduce the shot-to-shot line intensity variation as compared to lower particle loadings in the cell. Additional experiments using an aerosol chamber were performed to further quantify the laser absorption by the plasma in dependence on time both with and without the presence of particles. The overall implication of laser-particle interactions for LIBS and LA-ICP-MS/OES are discussed.

  11. Study on the Cross Plane Thermal Transport of Polycrystalline Molybdenum Nanofilms by Applying Picosecond Laser Transient Thermoreflectance Method

    Directory of Open Access Journals (Sweden)

    Tingting Miao

    2014-01-01

    Full Text Available Thin metal films are widely used as interconnecting wires and coatings in electronic devices and optical components. Reliable thermophysical properties of the films are required from the viewpoint of thermal management. The cross plane thermal transport of four polycrystalline molybdenum nanofilms with different thickness deposited on glass substrates has been studied by applying the picosecond laser transient thermoreflectance technique. The measurement is performed by applying both front pump-front probe and rear pump-front probe configurations with high quality signal. The determined cross plane thermal diffusivity of the Mo films greatly decreases compared to the corresponding bulk value and tends to increase as films become thicker, exhibiting significant size effect. The main mechanism responsible for the thermal diffusivity decrease of the present polycrystalline Mo nanofilms is the grain boundary scattering on the free electrons. Comparing the cross plane thermal diffusivity and inplane electrical conductivity indicates the anisotropy of the transport properties of the Mo films.

  12. 78 FR 24161 - Bureau of Industry and Security

    Science.gov (United States)

    2013-04-24

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Technical Advisory Committee will meet on May 9, 2013... of Industry and Security senior management. 4. Discussion on General Technology Note as it applies to...

  13. 38 CFR 3.216 - Mandatory disclosure of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... social security numbers. 3.216 Section 3.216 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Requirements § 3.216 Mandatory disclosure of social security numbers. Any person who applies for or receives..., furnish the Department of Veterans Affairs upon request with his or her social security number and the...

  14. Statistical methods applied to gamma-ray spectroscopy algorithms in nuclear security missions.

    Science.gov (United States)

    Fagan, Deborah K; Robinson, Sean M; Runkle, Robert C

    2012-10-01

    Gamma-ray spectroscopy is a critical research and development priority to a range of nuclear security missions, specifically the interdiction of special nuclear material involving the detection and identification of gamma-ray sources. We categorize existing methods by the statistical methods on which they rely and identify methods that have yet to be considered. Current methods estimate the effect of counting uncertainty but in many cases do not address larger sources of decision uncertainty, which may be significantly more complex. Thus, significantly improving algorithm performance may require greater coupling between the problem physics that drives data acquisition and statistical methods that analyze such data. Untapped statistical methods, such as Bayes Modeling Averaging and hierarchical and empirical Bayes methods, could reduce decision uncertainty by rigorously and comprehensively incorporating all sources of uncertainty. Application of such methods should further meet the needs of nuclear security missions by improving upon the existing numerical infrastructure for which these analyses have not been conducted. Copyright © 2012 Elsevier Ltd. All rights reserved.

  15. Proceedings of the IEEE laser and electro-optics society annual meeting

    International Nuclear Information System (INIS)

    Hudson, M.J.B.; Raney, H.; Raney, D.; Spalaris, C.N.

    1990-01-01

    This book is covered under the following headings: Electro-optic systems; Emerging laser technology; Optical sensors and measurements; Optoelectronics; Semiconductor diode lasers; Solid state lasers; UV and short wavelength; Applied optical diagnostics of semiconductor materials and devices symposium and optical sensors and measurements; and Applied optical diagnostics of semiconductor materials and devices symposium

  16. Parameters in fractional laser assisted delivery of topical anesthetics: Role of laser type and laser settings.

    Science.gov (United States)

    Meesters, Arne A; Nieboer, Marilin J; Kezic, Sanja; de Rie, Menno A; Wolkerstorfer, Albert

    2018-05-07

    Efficacy of topical anesthetics can be enhanced by pretreatment of the skin with ablative fractional lasers. However, little is known about the role of parameters such as laser modality and laser density settings in this technique. Aims of this study were to compare the efficacy of pretreatment with two different ablative fractional laser modalities, a CO 2 laser and an Er:YAG laser, and to assess the role of laser density in ablative fractional laser assisted topical anesthesia. In each of 15 healthy subjects, four 10 × 10 mm test regions on the back were randomized to pretreatment (70-75 μm ablation depth) with CO 2 laser at 5% density, CO 2 laser at 15% density, Er:YAG laser at 5% density or Er:YAG laser at 15% density. Articaine hydrochloride 40 mg/ml + epinephrine 10 μg/ml solution was applied under occlusion to all four test regions. After 15 minutes, a pass with the CO 2 laser (1,500 μm ablation depth) was administered as pain stimulus to each test region. A reference pain stimulus was given on unanesthetized skin. The main outcome parameter, pain, was scored on a 0-10 visual analogue scale (VAS) after each pain stimulus. Median VAS scores were 1.50 [CO 2 5%], 0.50 [CO 2 15%], 1.50 [Er:YAG 5%], 0.43 [Er:YAG 15%], and 4.50 [unanesthetized reference]. VAS scores for all pretreated test regions were significantly lower compared to the untreated reference region (P laser pretreated regions. However, VAS scores were significantly lower at 15% density compared to 5% density for both for the CO 2 laser (P laser (P laser was considered slightly more painful than pretreatment with Er:YAG laser by the subjects. Fractional laser assisted topical anesthesia is effective even with very low energy settings and an occlusion time of only 15 minutes. Both the CO 2 laser and the Er:YAG laser can be used to assist topical anesthesia although the CO 2 laser pretreatment is experienced as more painful. In our study settings, using articaine

  17. Laser beam characterization with digital holograms

    CSIR Research Space (South Africa)

    Forbes, A

    2013-04-01

    Full Text Available We show how laser beam characterization may be done in real-time with digital holograms. We illustrate the power of the techniques by applying them to a variety of laser sources, from fibers to solid-state....

  18. Laser cladding of turbine blades

    International Nuclear Information System (INIS)

    Shepeleva, L.; Medres, B.; Kaplan, W.D.; Bamberger, M.

    2000-01-01

    A comparative study of two different techniques for the application of wear-resistant coatings for contact surfaces of shroud shelves of gas turbine engine blades (GTE) has been conducted. Wear-resistant coatings were applied on In713 by laser cladding with direct injection of the cladding powder into the melt pool. Laser cladding was conducted with a TRUMPF-2500, CW-CO 2 laser. The laser cladding was compared with commercially available plasma cladding with wire. Both plasma and laser cladded zones were characterized by optical and scanning electron microscopy. It was found that the laser cladded zone has a higher microhardness value (650-820 HV) compared with that of the plasma treated material (420-440 HV). This is a result of the significant reduction in grain size in the case of laser cladding. Unlike the plasma cladded zones, the laser treated material is free of micropores and microcracks. (orig.)

  19. Indicators for energy security

    International Nuclear Information System (INIS)

    Kruyt, Bert; Van Vuuren, D.P.; De Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability, accessibility, affordability and acceptability of energy and classified indicators for energy security according to this taxonomy. There is no one ideal indicator, as the notion of energy security is highly context dependent. Rather, applying multiple indicators leads to a broader understanding. Incorporating these indicators in model-based scenario analysis showed accelerated depletion of currently known fossil resources due to increasing global demand. Coupled with increasing spatial discrepancy between consumption and production, international trade in energy carriers is projected to have increased by 142% in 2050 compared to 2008. Oil production is projected to become increasingly concentrated in a few countries up to 2030, after which production from other regions diversifies the market. Under stringent climate policies, this diversification may not occur due to reduced demand for oil. Possible benefits of climate policy include increased fuel diversity and slower depletion of fossil resources. (author)

  20. Optical identification of sea-mines - Gated viewing three-dimensional laser radar

    DEFF Research Database (Denmark)

    Busck, Jens

    2005-01-01

    A gated viewing high accuracy mono-static laser radar has been developed for the purpose of improving the optical underwater sea-mine identification handled by the Navy. In the final stage of the sea-mine detection, classification and identification process the Navy applies a remote operated...... vehicle for optical identification of the bottom seamine. The experimental results of the thesis indicate that replacing the conventional optical video and spotlight system applied by the Navy with the gated viewing two- and three-dimensional laser radar can improve the underwater optical sea...... of the short laser pulses (0.5 ns), the high laser pulse repetition rate (32.4 kHz), the fast gating camera (0.2 ns), the short camera delay steps (0.1 ns), the applied optical single mode fiber, and the applied algorithm for three-dimensional imaging. The gated viewing laser radar system configuration...

  1. Optimising hard X-ray generation from laser-produced plasmas

    International Nuclear Information System (INIS)

    Lindheimer, C.

    1995-04-01

    The aim of this work is to increase the X-ray yield for a laser produced plasma by optimising the focusing conditions and temporal shape of the laser pulses. The focusing conditions are improved by introducing a control system that secures the laser target surface to exact focus within a range of a few micrometers, allowing continuously high laser intensity for plasma generation. The temporal shape of the laser pulses is changed by introducing a saturable absorber in the laser beam. The laser produces a substantial pre-pulse that heats and expands the target material prior to main pulse arrival. The saturable absorber can increase the main pulse/pre-pulse ratio of the laser pulse up to four orders of magnitude and consequently reduce expansion of the target material before the main pulse. The belief is that an increase in target density at the time of main pulse arrival will change the energy distribution of the X-rays, towards a more efficient X-ray production in the hard X-ray region. This report and the work connected to it, includes the preliminary measurements and results for these improvements. 17 refs

  2. Evaluation in vitro of pulpal chamber temperature of deciduous teeth during Er:YAG laser application; Avaliacao in vitro da temperatura na camara pulpar de dentes deciduos durante aplicacao do laser de Er:YAG

    Energy Technology Data Exchange (ETDEWEB)

    Sznajder, Alexandre Joseph

    2001-07-01

    The Er:YAG laser technology has been thoroughly studied, since its invention, and has been increasingly recommended in Dentistry. However, its use in deciduous teeth has not been deserving the equivalent attention to its counterpart in permanent teeth, despite of the deciduous teething occur in a phase of life in which it has a far more importance than its substitutes. For that reason, this study aims to identify the suitable parameters to the clinic procedures in deciduous teeth, using the already established protocols in permanent teeth. The study was lead in a way to resemble the most the conditions of the clinical use of the laser. Five groups were analyzed using different energy densities and repetition rates. Each group was composed of 10 first superior right deciduous molars randomly selected. The energy densities and repetition rates used for each group were: 60 mJ 15 Hz, 250 mJ 2 Hz, 250 mJ 15 Hz, 400 mJ 6 Hz and 500 mJ 2 Hz. The results obtained allowed us to conclude that the use of the Er:YAG laser in Odontopediatrics is effective, safe and secure and the main reason for its recommendation is the low transfer of heat to the adjacent tissues of the applied surfaces. (author)

  3. Behavior Change Support Systems for Privacy and Security

    NARCIS (Netherlands)

    Kegel, Roeland Hendrik,Pieter; Wieringa, Roelf J.; Kulyk, Olga Anatoliyivna; Kelders, S.; van Gemert-Pijnen, L.; Oinas-Kukkonen, H

    2015-01-01

    This article proposes to use Behavior Change Support Systems (BCSSs) to improve the security of IT applications and the privacy of its users. We discuss challenges specific to BCSSs applied to information security, list research questions to be answered in order to meet these challenges, and propose

  4. Gas-ion laser with gas pressure maintenance means

    International Nuclear Information System (INIS)

    Thatcher, J.B.

    1975-01-01

    A gas-ion laser is described including means to maintain the ionizable gas in the laser cavity at a rather constant pressure over an extended period of time to significantly increase the useful life of the gas-ion laser. The gas laser includes a gas makeup system having a high pressure source or storage container and a regulating valve. The valve has a permeable solid state orifice member through which the gas flows from the high pressure source to the laser cavity to replenish the gas in the laser cavity and maintain the gas pressure in the cavity rather constant. The permeable orifice member is selected from a solid state material having a permeability that is variable in relation to the magnitude of the energy applied to the orifice member. The gas-ion laser has a valve operating means such as a heater for varying the applied energy such as thermal energy to the member to regulate the gas flow. Additionally, the gas-ion laser has a valve control means that is responsive to the gas pressure in the laser cavity for controlling the valve control means to maintain the pressure at a desired level. (U.S.)

  5. A 1J LD pumped Nd:YAG pulsed laser system

    Science.gov (United States)

    Yi, Xue-bin; Wang, Bin; Yang, Feng; Li, Jing; Liu, Ya-Ping; Li, Hui-Jun; Wang, Yu; Chen, Ren

    2017-11-01

    A 1J LD pumped Nd;YAG pulsed laser was designed. The laser uses an oscillation and two-staged amplification structure, and applies diode bar integrated array as side-pump. The TEC temperature control device combing liquid cooling system is organized to control the temperature of the laser system. This study also analyzed the theoretical threshold of working material, the effect of thermal lens and the basic principle of laser amplification. The results showed that the laser system can achieve 1J, 25Hz pulse laser output, and the laser pulse can be output at two width: 6-7ns and 10ns, respectively, and the original beam angle is 1.2mrad. The laser system is characterized by small size, light weight, as well as good stability, which make it being applied in varied fields such as photovoltaic radar platform and etc

  6. Systematic elicitation of cyber-security controls for NPP I and C system

    Energy Technology Data Exchange (ETDEWEB)

    Lee, M. S.; Kim, T. H. [Formal Works Inc., Seoul (Korea, Republic of); Park, S. P. [AhnLab Inc., Seongnam (Korea, Republic of); Kim, Y. M. [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2015-05-15

    Cyber-security implementation starts with a development of a cyber security plan considering characteristics of I and C system. In this paper, we describe a method that develops a cyber security plan for NPP I and C system. Especially, we propose a method for systematic elicitation of technical security controls that should be applied to I and C system. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system. The rest of the paper is organized as follows: Section 2 introduces activities to develop a cyber-security plan and presents the result of each activity of the security plan. Section 3 concludes the paper. We proposed a method for systematic elicitation of security controls and described the method through examples. Development companies that want to implement cyber-security in I and C system can develop a cyber-security plan and apply the cyber-security program to their system according to our method. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system.

  7. Systematic elicitation of cyber-security controls for NPP I and C system

    International Nuclear Information System (INIS)

    Lee, M. S.; Kim, T. H.; Park, S. P.; Kim, Y. M.

    2015-01-01

    Cyber-security implementation starts with a development of a cyber security plan considering characteristics of I and C system. In this paper, we describe a method that develops a cyber security plan for NPP I and C system. Especially, we propose a method for systematic elicitation of technical security controls that should be applied to I and C system. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system. The rest of the paper is organized as follows: Section 2 introduces activities to develop a cyber-security plan and presents the result of each activity of the security plan. Section 3 concludes the paper. We proposed a method for systematic elicitation of security controls and described the method through examples. Development companies that want to implement cyber-security in I and C system can develop a cyber-security plan and apply the cyber-security program to their system according to our method. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system

  8. Management of information security risks in a federal public institution: a case study

    Directory of Open Access Journals (Sweden)

    Jackson Gomes Soares Souza

    2016-11-01

    Full Text Available Public institutions bound to the Brazilian federal public sector must apply security measures, policies, procedures and guidelines as information assets protection measures. This case study sought to determine whether the management of information security risks is applied in a federal public institution according to Information Technology (I.T. managers perceptions and the results expose the importance of the roles played by people, responsibilities, policies, standards, procedures and their implementation aiming greater control of information security risks and opportunities related to information technology security.

  9. Non-contact sheet forming using lasers applied to a high strength aluminum alloy

    Directory of Open Access Journals (Sweden)

    Rafael Humberto Mota Siqueira

    2016-07-01

    Full Text Available Laser beam forming (LBF is a contactless mechanical process accomplished by the introduction of thermal stresses on the surface of a material using a laser in order to induce plastic deformation. In this work, LBF was performed on 1.6 mm thick sheets of a high strength aluminum alloy, AA6013-T4 class by using a defocused continuous Yb-fiber laser beam of 0.6 mm in diameter on the sheet top surface. The laser power and process speed were varied from 200 W to 2000 W and from 3 to 30 mm/s, respectively. For these experimental conditions, the bending angle of the sheet ranged from 0.1° to 2.5° per run. In the highest bending angle condition, 1000 W and 30 mm/s, the depth of remelted pool was 0.6 mm and the microstructure near the plate bottom surface remained unaltered. For the whole set of experimental conditions, the hardness remained constant at approximately 100 HV, which is similar to the base material. In order to verify the applicability of the method, some previously T-welded sheets were straightened. The method was efficient in correcting the distortion of the sheets with a bending angle up to 5°.

  10. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  11. Cyber security of critical infrastructures

    Directory of Open Access Journals (Sweden)

    Leandros A. Maglaras

    2018-03-01

    Full Text Available Modern Supervisory Control and Data Acquisition (SCADA systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to be conventional in addition to new threats. Many security methods can be applied to such systems, having in mind that both high efficiency, real time intrusion identification and low overhead are required. Keywords: SCADA systems, Security

  12. Comparison of diode laser and Er:YAG lasers in the treatment of ankyloglossia.

    Science.gov (United States)

    Aras, Mutan Hamdi; Göregen, Mustafa; Güngörmüş, Metin; Akgül, Hayati Murat

    2010-04-01

    The purpose of this study was to compare the tolerance of lingual frenectomy with regard to a local anesthesia requirement and comparison of postsurgical discomfort experienced by patients operated on with both diode and erbium:yttrium-aluminium-garnet (Er:YAG) lasers. Ankyloglossia, commonly known as tongue-tie, is a congenital oral anomaly characterized by a short lingual frenulum. A short lingual frenulum may contribute to feeding, speech, and mechanical tongue problems. Sixteen referred patients with tongue mobility complaints were included in this study. A GaAlAs laser device with a continuous wavelength of 808 nm was used in the diode group. Frenulums were incised by applying 2 W of laser power. The Er:YAG laser device with a continuous wavelength of 2940 nm was used in the Er:YAG group. Frenulums were incised by applying 1 W of laser power. The acceptability of the lingual frenectomy without local anesthesia and the degree of the postsurgical discomfort were evaluated. Although the majority of patients (six) could be operated on without local anesthesia in the Er:YAG group, all patients could not be operated on without local anesthetic agent in the diode group. There were no differences between the two groups with regard to pain, chewing, and speaking on the first or seventh day after surgery, whereas patients had more pain in the Er:YAG group than in the diode group the first 3 h after surgery. The results indicate that only the Er:YAG laser can be used for lingual frenectomy without local anesthesia, and there was no difference between the two groups regarding the degree of the postsurgical discomfort except in the first 3 h. In conclusion, these results indicate that the Er:YAG laser is more advantageous than the diode laser in minor soft-tissue surgery because it can be performed without local anesthesia and with only topical anesthesia.

  13. A Survey on the Security of Blockchain Systems

    OpenAIRE

    Li, Xiaoqi; Jiang, Peng; Chen, Ting; Luo, Xiapu; Wen, Qiaoyan

    2018-01-01

    Since its inception, the blockchain technology has shown promising application prospects. From the initial cryptocurrency to the current smart contract, blockchain has been applied to many fields. Although there are some studies on the security and privacy issues of blockchain, there lacks a systematic examination on the security of blockchain systems. In this paper, we conduct a systematic study on the security threats to blockchain and survey the corresponding real attacks by examining popu...

  14. Multi sensor national cyber security data fusion

    CSIR Research Space (South Africa)

    Swart, I

    2015-03-01

    Full Text Available in a real world system. The data examined will then be applied to a case study that will show the results of applying available open source security information against the model to relate to the current South African cyber landscape....

  15. Assessing the Effectiveness of Alternative Community-Led Security ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    While many believe the state has a monopoly on the legitimate use of force, realities on the ground challenge this assertion, particularly in conflict and ... It will document alternative sources of governance, security, and justice that urban communities apply when state security forces are weak, unresponsive, or abusive.

  16. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    Science.gov (United States)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  17. Study on the concentration of energy security

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2002-01-01

    'Energy Security' concept has played the central role in Japan's energy policy. However, the definition of the concept is not clear. If energy security will remain a principal policy target, its concept should be clearly defined as a precondition. This dissertation analyzes historical changes in energy security concept and considers their relationship with the development of national security concept in international relations studies. Following an introduction in the first chapter, the second chapter reveals that energy security concept has changed in accord with energy situation and policymakers' concern of the times. As a result, several different definitions of the concept now coexist. The third chapter deals with the relationship between energy security concept and national security concepts in international relations. Three major definitions of energy security concepts correspond to definitions of security concepts by three schools in security theory - realism, liberalism, and globalism. In the fourth chapter, energy security is conceptualized and its policy measures are systematized by addressing the issues appeared in its historical changes and referring to security theory in international relations studies. The fifth chapter discusses the contribution by nuclear energy to Japan's energy security, applying a theoretical framework presented in previous chapters. Characteristics of nuclear energy which enhance energy security are identified, and policy measures for improving those characteristics are proposed. (author)

  18. Security Controls for NPP I and C Systems

    International Nuclear Information System (INIS)

    Kim, Y. M.; Jeong, C. H.; Kim, T. H.

    2014-01-01

    In Korea, regulatory body have required cyber security plan for nuclear I and C system. Also, all I and C systems and equipment must be classified according to cyber security level and technical, operational and managerial security controls must be provided based on each level. It is necessary to determine the best set of security controls for NPP I and C system. In our research, selection, implementation and verification process of security controls which can be used for I and C systems has developed. For establishing the cyber security of the nuclear I and C system, special cyber security system which consider the difference between general IT system and nuclear I and C system is needed. This research, we developed security improvement methodology for NPP I and C system through establishing security control, applying and verifying activity. Also, the cyber security activities which are needed during development are defined. It is expected that the methodology which has been developed by this research can be used for establish, implement, evaluate the security controls for protecting nuclear I and C system from cyber-attacks

  19. Security Controls for NPP I and C Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Y. M.; Jeong, C. H. [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, T. H. [Formal Works Inc., Seoul (Korea, Republic of)

    2014-05-15

    In Korea, regulatory body have required cyber security plan for nuclear I and C system. Also, all I and C systems and equipment must be classified according to cyber security level and technical, operational and managerial security controls must be provided based on each level. It is necessary to determine the best set of security controls for NPP I and C system. In our research, selection, implementation and verification process of security controls which can be used for I and C systems has developed. For establishing the cyber security of the nuclear I and C system, special cyber security system which consider the difference between general IT system and nuclear I and C system is needed. This research, we developed security improvement methodology for NPP I and C system through establishing security control, applying and verifying activity. Also, the cyber security activities which are needed during development are defined. It is expected that the methodology which has been developed by this research can be used for establish, implement, evaluate the security controls for protecting nuclear I and C system from cyber-attacks.

  20. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Science.gov (United States)

    2010-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11... national security or foreign policy interests of the United States. BIS may impose foreign policy export... of being or becoming involved in activities that are contrary to the national security or foreign...

  1. Laser-Based Maintenance and Repair Technologies for Reactor Components

    International Nuclear Information System (INIS)

    Masaki Yoda; Naruhiko Mukai; Makoto Ochiai; Masataka Tamura; Satoshi Okada; Katsuhiko Sato; Motohiko Kimura; Yuji Sano; Noboru Saito; Seishi Shima; Tetsuo Yamamoto

    2004-01-01

    Toshiba has developed various laser-based maintenance and repair technologies and applied them to existing nuclear power plants. Laser-based technology is considered to be the best tool for remote processing in nuclear power plants, and particularly so for the maintenance and repair of reactor core components. Accessibility could be drastically improved by a simple handling system owing to the absence of reactive force against laser irradiation and the flexible optical fiber. For the preventive maintenance, laser peening (LP) technology was developed and applied to reactor components in operating BWR plants. LP is a novel process to improve residual stress from tensile to compressive on material surface layer by irradiating focused high-power laser pulses in water. We have developed a fiber-delivered LP system as a preventive maintenance measure against stress corrosion cracking (SCC). Laser ultrasonic testing (LUT) has a great potential to be applied to the remote inspection of reactor components. Laser-induced surface acoustic wave (SAW) inspection system was developed using a compact probe with a multi-mode optical fiber and an interferometer. The developed system successfully detected a micro slit of 0.5 mm depth on weld metal and heat-affected zone (HAZ). An artificial SCC was also detected by the system. We are developing a new LP system combined with LUT to treat the inner surface of bottom-mounted instruments (BMI) of PWR plants. Underwater laser seal welding (LSW) technology was also developed to apply surface crack. LSW is expected to isolate the crack tip from corrosive water environment and to stop the propagation of the crack. Rapid heating and cooling of the process minimize the heat effect, which extends the applicability to neutron-irradiated material. This paper describes recent advances in the development and application of such laser-based technologies. (authors)

  2. Laser cutting: industrial relevance, process optimization, and laser safety

    Science.gov (United States)

    Haferkamp, Heinz; Goede, Martin; von Busse, Alexander; Thuerk, Oliver

    1998-09-01

    Compared to other technological relevant laser machining processes, up to now laser cutting is the application most frequently used. With respect to the large amount of possible fields of application and the variety of different materials that can be machined, this technology has reached a stable position within the world market of material processing. Reachable machining quality for laser beam cutting is influenced by various laser and process parameters. Process integrated quality techniques have to be applied to ensure high-quality products and a cost effective use of the laser manufacturing plant. Therefore, rugged and versatile online process monitoring techniques at an affordable price would be desirable. Methods for the characterization of single plant components (e.g. laser source and optical path) have to be substituted by an omnivalent control system, capable of process data acquisition and analysis as well as the automatic adaptation of machining and laser parameters to changes in process and ambient conditions. At the Laser Zentrum Hannover eV, locally highly resolved thermographic measurements of the temperature distribution within the processing zone using cost effective measuring devices are performed. Characteristic values for cutting quality and plunge control as well as for the optimization of the surface roughness at the cutting edges can be deducted from the spatial distribution of the temperature field and the measured temperature gradients. Main influencing parameters on the temperature characteristic within the cutting zone are the laser beam intensity and pulse duration in pulse operation mode. For continuous operation mode, the temperature distribution is mainly determined by the laser output power related to the cutting velocity. With higher cutting velocities temperatures at the cutting front increase, reaching their maximum at the optimum cutting velocity. Here absorption of the incident laser radiation is drastically increased due to

  3. Technology of discharge and laser resonators for high power CO2 lasers. Koshutsuryoku CO2 laser ni tsukawareru hoden reiki laser kyoshinki gijutsu

    Energy Technology Data Exchange (ETDEWEB)

    Takenaka, Y.; Kuzumoto, M. (Mitsubishi Electric Corp., Tokyo (Japan))

    1994-03-20

    This paper describes discharge excitation technology and resonator technology as basic technologies for high power CO2 lasers. As a result of progress in high-frequency power element techniques, the discharge excitation technology now generally uses laser excitation using AC discharge of capacity coupling type. Its representative example is silent discharge (SD) excitation. This is a system to excite laser by applying high voltages with as high frequency as 100 kHz to 1 MHz across a pair of electrodes covered with a dielectric material. The system maintains stability in discharge even if power supply voltage amplitude is modulated, and easily provides pulse outputs. Discharge excitation for diffusion cooled type CO2 laser generates a discharge in a gap with a gap length of about 2 mm, and can perform gas cooling by means of thermal conduction of gas, whereas a compact resonator can be fabricated. A resonator for the diffusion cooled type CO2 laser eliminates gas circulation and cooling systems, hence the device can be made more compact. A report has been given that several of these compact resonators were combined, from which a laser output of 85W was obtained by using RF discharge of 2kW. 43 refs., 21 figs.

  4. Culturing Security System of Chemical Laboratory in Indonesia

    Directory of Open Access Journals (Sweden)

    Eka Dian Pusfitasari

    2017-04-01

    Full Text Available Indonesia has experiences on the lack of chemical security such as: a number of bombing terrors and hazardous chemicals found in food. Bomb used in terror is a homemade bomb made from chemicals which are widely spread in the research laboratories such as a mixture of pottasium chlorate, sulphur, and alumunium. Therefore, security of chemicals should be implemented to avoid the misused of the chemicals. Although it has experienced many cases of the misuse of chemicals, and many regulations and seminars related to chemical security have been held, but the implementation of chemical security is still a new thing for Indonesian citizens. The evident is coming from the interviews conducted in this study. Questions asked in this interview/survey included: the implementation of chemical safety and chemical security in laboratory; chemical inventory system and its regulation; and training needed for chemical security implementation. Respondents were basically a researcher from Government Research Institutes, University laboratories, senior high school laboratories, and service laboratories were still ambiguous in distinguishing chemical safety and chemical security. Because of this condition, most Indonesia chemical laboratories did not totally apply chemical security system. Education is very important step to raise people awareness and address this problem. Law and regulations should be sustained by all laboratory personnel activities to avoid chemical diversion to be used for harming people and environment. The Indonesia Government could also develop practical guidelines and standards to be applied to all chemical laboratories in Indonesia. These acts can help Government’s efforts to promote chemical security best practices which usually conducted by doing seminars and workshop.

  5. Applying low-energy multipulse excimer laser annealing to improve charge retention of Au nanocrystals embedded MOS capacitors

    International Nuclear Information System (INIS)

    Shen, Kuan-Yuan; Chen, Hung-Ming; Liao, Ting-Wei; Kuan, Chieh-Hsiung

    2015-01-01

    The low-energy multipulse excimer laser annealing (LEM-ELA) is proposed to anneal the nanostructure of nanocrystal (NC) embedded in a SiO 2 thin film without causing atomic diffusion and damaging the NCs, since the LEM-ELA combining the advantages of laser annealing and UV curing features rapid heating and increasing oxide network connectivity. A Fourier transform infrared spectroscopy (FTIR) characterization of SiO 2 thin films annealed using LEM-ELA indicated that the quality was improved through the removal of water-related impurities and the reconstruction of the network Si–O–Si bonds. Then, LEM-ELA was applied to a SiO 2 thin film embedded with Au NCs, which were fabricated as MOS capacitors. The charge retention was greatly improved and the percentage of retained charges was about 10% after 3  ×  10 8  s. To investigate and differentiate the effects of LEM-ELA on charges stored in both oxide traps and in the Au NCs, a double-mechanism charge relaxation analysis was performed. The results indicated that the oxide traps were removed and the confinement ability of Au NCs was enhanced. The separated memory windows contributed from the charges in Au NCs and those in oxide traps were obtained and further confirmed that the LEM-ELA removed oxide traps without damaging the Au NCs. (paper)

  6. Evaluation in vitro of pulpal chamber temperature of deciduous teeth during Er:YAG laser application

    International Nuclear Information System (INIS)

    Sznajder, Alexandre Joseph

    2001-01-01

    The Er:YAG laser technology has been thoroughly studied, since its invention, and has been increasingly recommended in Dentistry. However, its use in deciduous teeth has not been deserving the equivalent attention to its counterpart in permanent teeth, despite of the deciduous teething occur in a phase of life in which it has a far more importance than its substitutes. For that reason, this study aims to identify the suitable parameters to the clinic procedures in deciduous teeth, using the already established protocols in permanent teeth. The study was lead in a way to resemble the most the conditions of the clinical use of the laser. Five groups were analyzed using different energy densities and repetition rates. Each group was composed of 10 first superior right deciduous molars randomly selected. The energy densities and repetition rates used for each group were: 60 mJ 15 Hz, 250 mJ 2 Hz, 250 mJ 15 Hz, 400 mJ 6 Hz and 500 mJ 2 Hz. The results obtained allowed us to conclude that the use of the Er:YAG laser in Odontopediatrics is effective, safe and secure and the main reason for its recommendation is the low transfer of heat to the adjacent tissues of the applied surfaces. (author)

  7. Characterization of a Continuous Wave Laser for Resonance Ionization Mass Spectroscopy Analysis in Nuclear Forensics

    Science.gov (United States)

    2015-06-01

    multimode_optical_fiber. [15] J. Hecht, The Laser Guidebook, 2nd ed, Blue Ride Summit, PA: Mc Graw Hill Professional, 1999, pp. 101–109. [16] F...Available: https://secure.sacher-laser.com/downloads/- technical_documents/t03d6w-en.pdf. [22] J. H. Marquardt, F. C. Cruz, M. Stephens , C. W. Oates

  8. Measuring the effects of topically applied skin optical clearing agents and modeling the effects and consequences for laser therapies

    Science.gov (United States)

    Verkruysse, Wim; Khan, Misbah; Choi, Bernard; Svaasand, Lars O.; Nelson, J. Stuart

    2005-04-01

    Human skin prepared with an optical clearing agent manifests reduced scattering as a result of de-hydration and refractive index matching. This has potentially large effects for laser therapies of several skin lesions such as port wine stain, hair removal and tattoo removal. With most topically applied clearing agents the clearing effect is limited because they penetrate poorly through the intact superficial skin layer (stratum corneum). Agent application modi other than topical are impractical and have limited the success of optical clearing in laser dermatology. In recent reports, however, a mixture of lipofylic and hydrofylic agents was shown to successfully penetrate through the intact stratum corneum layer which has raised new interest in this field. Immediately after application, the optical clearing effect is superficial and, as the agent diffuses through the skin, reduced scattering is manifested in deeper skin layers. For practical purposes as well as to maximize therapeutic success, it is important to quantify the reduced scattering as well as the trans-cutaneous transport dynamics of the agent. We determined the time and tissue depth resolved effects of optically cleared skin by inserting a microscopic reflector array in the skin. Depth dependent light intensity was measured by quantifying the signal of the reflector array with optical coherence tomography. A 1-dimensional mass diffusion model was used to estimate a trans-cutaneous transport diffusion constant for the clearing agent mixture. The results are used in Monte Carlo modeling to determine the optimal time of laser treatment after topical application of the optical clearing agent.

  9. Realizing Scientific Methods for Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.; Greitzer, Frank L.

    2012-07-18

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber security science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.

  10. Simulation of intense laser-dense matter interactions. X-ray production and laser absorption

    Energy Technology Data Exchange (ETDEWEB)

    Ueshima, Yutaka; Kishimoto, Yasuaki; Sasaki, Akira [Japan Atomic Energy Research Inst., Neyagawa, Osaka (Japan). Kansai Research Establishment; Sentoku, Yasuhiko; Tajima, Toshiki

    1998-03-01

    The development of short-pulse ultra high intensity lasers will enable us to generate short-pulse intense soft and hard X-rays. Acceleration of an electron in laser field generates intense illuminated located radiation, Larmor radiation, around KeV at 10{sup 18} W/cm{sup 2} with 100 TW and 1 {mu}m wave length laser. The Coulomb interaction between rest ions and relativistic electron generates broad energy radiation, bremsstrahlung emission, over MeV at 10{sup 18} W/cm{sup 2} with the same condition. These intense radiations come in short pulses of the same order as that of the irradiated laser. The generated intense X-rays, Larmor and bremsstrahlung radiation, can be applied to sources of short pulse X-ray, excitation source of inner-shell X-ray laser, position production and nuclear excitation, etc. (author)

  11. Design of pulsed laser diode drive power for ZY3(02) laser altimeter

    Science.gov (United States)

    Feng, Wen; Li, Mingshan; Meng, Peibei; Yan, Fanjiang; Li, Xu; Wang, Chunhui

    2017-11-01

    Solid laser pumped by semiconductor laser has the large value in the area of space laser technology, because of the advantages of high efficiency, small volume and long life. As the indispensable component of laser, laser power is also very important. Combined with ZY3(02) laser altimeter project, a high voltage(0-300V), high current(0-80A), long pulse width(0-230us) and high precision temperature semiconductor laser power is developed. IGBT is applied in the driving circuit as the switch to provide a current pulse for LD. The heating or cooling capacity of TEC is controlled by PID compensation circuit quickly adjusts the duty cycle of the UC1637 PWM signal, to realize the high accuracy controlling of LD working temperature. The tests in the external ambient temperature of 5°C, 20°C, 30°C show that the LD current pulse is stable and the stability of LD working temperature up to +/-0.1°C around the set point temperature, which ensure the highly stable operation of DPL.

  12. Studies on CO2-laser Hybrid-Welding of Copper

    DEFF Research Database (Denmark)

    Nielsen, Jakob Skov; Olsen, Flemming Ove; Bagger, Claus

    2005-01-01

    CO2-laser welding of copper is known to be difficult due to the high heat conductivity of the material and the high reflectivity of copper at the wavelength of the CO2-laser light. THis paper presents a study of laser welding of copper, applying laser hybrid welding. Welding was performed as a hy...

  13. Who's (Still) Above the Social Security Payroll Tax Cap?

    OpenAIRE

    Nicole Woo; Janelle Jones; John Schmitt

    2012-01-01

    The Social Security payroll tax cap is the earnings level above which no further Social Security taxes are collected. The cap is currently at $110,100, though legislation has been introduced in Congress to apply the Social Security payroll tax to earnings above $250,000 (but not between the current cap and this level). This issue brief updates earlier work, finding that 5.8 percent of workers would be affected if the Social Security cap were eliminated entirely and 1.4 percent would be affect...

  14. Monoenergetic laser wakefield acceleration

    Directory of Open Access Journals (Sweden)

    N. E. Andreev

    2000-02-01

    Full Text Available Three dimensional test particle simulations are applied to optimization of the plasma-channeled laser wakefield accelerator (LWFA operating in a weakly nonlinear regime. Electron beam energy spread, emittance, and luminosity depend upon the proportion of the electron bunch size to the plasma wavelength. This proportion tends to improve with the laser wavelength increase. We simulate a prospective two-stage ∼1GeV LWFA with controlled energy spread and emittance. The input parameters correspond to realistic capabilities of the BNL Accelerator Test Facility that features a picosecond-terawatt CO_{2} laser and a high-brightness electron gun.

  15. 3D THz hyperspectrum applied in security check-in

    Science.gov (United States)

    Damian, V.; Logofǎtu, P. C.; Vasile, T.

    2016-12-01

    We developed a measuring technology using a TDS-THz system to construct hyperspectral images of some objects, including hazardous materials. "T-rays" (the THz spectral domain of the light) have a growing importance in security and imagistic domain. Due to their property of penetrating through dielectric objects, and using non-ionizing radiations, the THz systems have become a standard for "hot-places" (airports, train stations etc.). The hyperspectral images are 3D images having 2D spatial dimension and one spectral dimension. In this way, we obtain simultaneously information about the form of the object and its molecular composition. For discriminating between substances, we must first build a database of spectra for hazardous and dangerous substances. We experiment our system on some items (among them a firecracker, a cigarette and a metal collar) and we tried to discriminate between them using the database of spectra.

  16. Induced Current Characteristics Due to Laser Induced Plasma and Its Application to Laser Processing Monitoring

    International Nuclear Information System (INIS)

    Madjid, Syahrun Nur; Idris, Nasrullah; Kurniawan, Koo Hendrik; Kagawa, Kiichiro

    2011-01-01

    In laser processing, suitable conditions for laser and gas play important role in ensuring a high quality of processing. To determine suitable conditions, we employed the electromagnetic phenomena associated with laser plasma generation. An electrode circuit was utilised to detect induced current due to the fast electrons propelled from the material during laser material processing. The characteristics of induced current were examined by changing parameters such as supplied voltage, laser pulse energy, number of laser shots, and type of ambient gas. These characteristics were compared with the optical emission characteristics. It was shown that the induced current technique proposed in this study is much more sensitive than the optical method in monitoring laser processing, that is to determine the precise focusing condition, and to accurately determine the moment of completion of laser beam penetration. In this study it was also shown that the induced current technique induced by CW CO 2 laser can be applied in industrial material processing for monitoring the penetration completion in a stainless steel plate drilling process.

  17. Secure space-to-space interferometric communications and its nexus to the physics of quantum entanglement

    Science.gov (United States)

    Duarte, F. J.

    2016-12-01

    The history of the probability amplitude equation | ψ > = ( | x , y > - | y , x > ) applicable to quanta pairs, propagating in different directions with entangled polarizations, is reviewed and traced back to the 1947-1949 period. The interferometric Dirac foundations common to | ψ > = ( | x , y > - | y , x > ) and the generalized N-slit interferometric equation, for indistinguishable quanta, are also described. The results from a series of experiments on N-slit laser interferometers, with intra interferometric propagation paths up to 527 m, are reviewed. Particular attention is given to explain the generation of interferometric characters, for secure space-to-space communications, which immediately collapse on attempts of interception. The design of a low divergence N-slit laser interferometer for low Earth orbit-low Earth orbit (LEO-LEO), and LEO-geostationary Earth orbit (LEO-GEO), secure interferometric communications is described and a weight assessment is provided.

  18. Lower Energy Endovenous Laser Ablation of the Great Saphenous Vein with 980 nm Diode Laser in Continuous Mode

    International Nuclear Information System (INIS)

    Kim, Hyun S.; Nwankwo, Ikechi J.; Hong, Kelvin; McElgunn, Patrick S.J.

    2006-01-01

    Purpose. To assess clinical outcomes, complication rates, and unit energy applied using 980 nm diode endovenous laser treatment at 11 watts for symptomatic great saphenous vein (GSV) incompetence and reflux disease. Methods. Thirty-four consecutive ablation therapies with a 980 nm diode endovenous laser at 11 watts were studied. The diagnosis of GSV incompetence with reflux was made by clinical evaluation and duplex Doppler examinations. The treated GSVs had a mean diameter of 1.19 cm (range 0.5-2.2 cm). The patients were followed with clinical evaluation and color flow duplex studies up to 18.5 months (mean 12.19 months ± 4.18). Results. Using 980 nm diode endovenous laser ablation in continuous mode, 100% technical success was noted. The mean length of GSVs treated was 33.82 cm (range 15-45 cm). The mean energy applied during the treatment was 1,155.81 joules (J) ± 239.50 (range 545.40-1620 J) for a mean treatment duration of 90.77 sec ± 21.77. The average laser fiber withdrawal speed was 0.35 cm/sec ± 0.054. The mean energy applied per length of GSV was 35.16 J/cm ± 8.43. Energy fluence, calculated separately for each patient, averaged 9.82 J/cm 2 ± 4.97. At up to 18.5 months follow-up (mean 12.19 months), 0% recanalization was noted; 92% clinical improvement was achieved. There was no major complication. Minor complications included 1 patient with hematoma at the percutaneous venotomy site, 1 patient with thrombophlebitis on superficial tributary varices of the treated GSV, 24% ecchymoses, and 32% self-limiting hypersensitivity/tenderness/'pulling' sensation along the treatment area. One patient developed temporary paresthesia. Four endovenous laser ablation treatments (12%) were followed by adjunctive sclerotherapies for improved cosmetic results. Conclusion. Endovenous laser ablation treatment of GSV using a 980 nm diode laser at 11 watts in continuous mode appears safe and effective. Mean energy applied per treated GSV length of 35.16 J/cm or mean

  19. Multispectral imaging system based on laser-induced fluorescence for security applications

    Science.gov (United States)

    Caneve, L.; Colao, F.; Del Franco, M.; Palucci, A.; Pistilli, M.; Spizzichino, V.

    2016-10-01

    The development of portable sensors for fast screening of crime scenes is required to reduce the number of evidences useful to be collected, optimizing time and resources. Laser based spectroscopic techniques are good candidates to this scope due to their capability to operate in field, in remote and rapid way. In this work, the prototype of a multispectral imaging LIF (Laser Induced Fluorescence) system able to detect evidence of different materials on large very crowded and confusing areas at distances up to some tens of meters will be presented. Data collected as both 2D fluorescence images and LIF spectra are suitable to the identification and the localization of the materials of interest. A reduced scan time, preserving at the same time the accuracy of the results, has been taken into account as a main requirement in the system design. An excimer laser with high energy and repetition rate coupled to a gated high sensitivity ICCD assures very good performances for this purpose. Effort has been devoted to speed up the data processing. The system has been tested in outdoor and indoor real scenarios and some results will be reported. Evidence of the plastics polypropylene (PP) and polyethilene (PE) and polyester have been identified and their localization on the examined scenes has been highlighted through the data processing. By suitable emission bands, the instrument can be used for the rapid detection of other material classes (i.e. textiles, woods, varnishes). The activities of this work have been supported by the EU-FP7 FORLAB project (Forensic Laboratory for in-situ evidence analysis in a post blast scenario).

  20. A broadened typology on energy and security

    International Nuclear Information System (INIS)

    Johansson, Bengt

    2013-01-01

    A broadened typology describing the interconnection between energy and security is developed in this paper, with the aim of improving understanding of the relationship between energy and security by applying different research and policy perspectives. One approach involves studying energy as an object exposed to security threats, using concepts such as security of supply or security of demand. Another approach involves studying the role of the energy system as the subject in generating or enhancing insecurity. The latter approach includes studying the conflict-generating potential inherent in the economic value of energy, the risk of accidents and antagonistic attacks to energy infrastructure and the security risks related to the negative environmental impact of the energy system. In order to make a comprehensive analysis of the security consequences of proposed energy policies or strategies, all these aspects should be taken into account to varying degrees. The typology proposed here could be a valuable tool for ensuring that all security aspects have been considered. - Highlights: • The paper presents a broadened typology of energy and security, useful for policy analysis. • The energy system can be an object for security threats and as a subject generating or contributing to insecurity. • Energy as an object for security threats includes the concepts of security of supply and security of demand. • The economic value of energy can contribute to insecurity. • Technological and environmental risks of specific energy systems also provide potential threats to human security

  1. Superthin resonator dye laser with THz intermode frequency separation

    International Nuclear Information System (INIS)

    Rudych, P D; Surovtsev, N V

    2014-01-01

    Two-color laser irradiation is considered an effective way to pump THz excitations for numerous scientific and applied goals. We present a design for convenient laser source with THz intermode frequency separation. The setup is based on dye laser with superthin resonator pumped by a subnanosecond pulse laser. It was proven that the superthin resonator dye laser is useful, possesses high stability and high energy conversion, and generates narrow laser modes. The ability of this laser to pump CARS processes for THz vibrations is demonstrated. (letter)

  2. Modematic: a fast laser beam analyzing system for high power CO2-laser beams

    Science.gov (United States)

    Olsen, Flemming O.; Ulrich, Dan

    2003-03-01

    The performance of an industrial laser is very much depending upon the characteristics of the laser beam. The ISO standards 11146 and 11154 describing test methods for laser beam parameters have been approved. To implement these methods in industry is difficult and especially for the infrared laser sources, such as the CO2-laser, the availabl analyzing systems are slow, difficult to apply and having limited reliability due to the nature of the detection methods. In an EUREKA-project the goal was defined to develop a laser beam analyzing system dedicated to high power CO2-lasers, which could fulfill the demands for an entire analyzing system, automating the time consuming pre-alignment and beam conditioning work required before a beam mode analyses, automating the analyzing sequences and data analysis required to determine the laser beam caustics and last but not least to deliver reliable close to real time data to the operator. The results of this project work will be described in this paper. The research project has led to the development of the Modematic laser beam analyzer, which is ready for the market.

  3. Mechanism of laser micro-adjustment

    International Nuclear Information System (INIS)

    Shen Hong

    2008-01-01

    Miniaturization is a requirement in engineering to produce competitive products in the field of optical and electronic industries. Laser micro-adjustment is a new and promising technology for sheet metal actuator systems. Efforts have been made to understand the mechanisms of metal plate forming using a laser heating source. Three mechanisms have been proposed for describing the laser forming processes in different scenarios, namely the temperature gradient mechanism (TGM), buckling mechanism and upsetting mechanism (UM). However, none of these mechanisms can fully describe the deformation mechanisms involved in laser micro-adjustment. Based on the thermal and elastoplastic analyses, a coupled TGM and UM are presented in this paper to illustrate the thermal mechanical behaviours of two-bridge actuators when applying a laser forming process. To validate the proposed coupling mechanism, numerical simulations are carried out and the corresponding results demonstrate the mechanism proposed. The mechanism of the micro-laser adjustment could be taken as a supplement to the laser forming process.

  4. A Conceptual Tree of Laser Propulsion

    International Nuclear Information System (INIS)

    Pakhomov, Andrew V.; Sinko, John E.

    2008-01-01

    An original attempt to develop a conceptual tree for laser propulsion is offered. The tree provides a systematic view for practically all possible laser propulsion concepts and all inter-conceptual links, based on propellant phases and phase transfers. It also helps to see which fields of laser propulsion have been already thoroughly explored, where the next effort must be applied, and which paths should be taken with proper care or avoided entirely

  5. 22 CFR 308.10 - Security of records systems-manual and automated.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security of records systems-manual and automated... Security of records systems—manual and automated. The head of the agency has the responsibility of... destruction of manual and automatic record systems. These security safeguards shall apply to all systems in...

  6. Low Intensity Laser Therapy Applied in the Healing of Wounds

    Science.gov (United States)

    Kahn, Fred; Matthews, Jeffrey

    2009-06-01

    Objective: The aim of this study was to determine the outcomes of Low Intensity Laser Therapy (LILT) on wound healing for patients presenting with pain, compromised neurological and physical function and tissue damage associated with vascular/diabetic ulcerations of the lower extremity. Methods: A retrospective case review of six patients treated with LILT (GaAlAs SLD, 660 nm, 750 mW, 3.6 J/cm2; GaAlAs SLD, 840 nm, 1,500 mW, 6.48 J/cm2; GaAlAs laser, 830 nm, 75 mW, 270 J/cm2) was conducted of clinical features including pain, measured by visual analogue scale (VAS), motor function, measured by range of motion (ROM) and visual outcome, measured by wound dimensions for six patients (n = 6; 5 males, 1 female; age = 67.83 years). Results: Significant progress with regard to alleviation of pain (ΔVAS = -5), improvements in motor function (ΔROM = +40%), epithelialization (wound closure rate = 3%/week) and complete wound closure was achieved. No recurrence of pathology at least one month post cessation of therapy was evident (x¯% reduction in wound area = 100%). Conclusions: LILT achieved consistent, effective and clear endpoints, was cost effective, created no adverse effects and ultimately led to the salvage of extremities.

  7. Arbitrary waveform generator to improve laser diode driver performance

    Science.gov (United States)

    Fulkerson, Jr, Edward Steven

    2015-11-03

    An arbitrary waveform generator modifies the input signal to a laser diode driver circuit in order to reduce the overshoot/undershoot and provide a "flat-top" signal to the laser diode driver circuit. The input signal is modified based on the original received signal and the feedback from the laser diode by measuring the actual current flowing in the laser diode after the original signal is applied to the laser diode.

  8. Present and future of laser welding machine; Laser yosetsuki no genjo to tenbo

    Energy Technology Data Exchange (ETDEWEB)

    Taniu, Y. [Ishikawajima-Harima Heavy Industries Co. Ltd., Tokyo (Japan)

    1998-04-01

    This paper describes recent trends of laser welding machine. For CO2 laser welding machine, seam weld of large diameter weld pipes using a 25 kW-class machine, and plate weld of steel plate using a 45 kW-class machine are reported. For YAG laser welding machine, high-output 5.5 kW-class machines are commercialized. Machines with slab structure of plate-like YAG chrystal have been developed which show high-oscillation efficiency and can be applied to cutting. Machines have been developed in which YAG laser output with slab structure is transmitted through GI fiber. High-speed welding of aluminum alloys can be realized by improving the converging performance. Efficiency of YAG laser can be enhanced through the time-divided utilization by switching the beam transmission path using fiber change-over switch. In the automobile industry, CO2 laser is mainly used, and a system combining CO laser with articulate robot is realized. TIG and MIG welding is often used for welding of aluminum for railway vehicles. It is required to reduce the welding strain. In the iron and steel industry, the productivity has been improved by the laser welding. YAG laser is put into practice for nuclear reactors. 5 refs., 8 figs., 1 tab.

  9. Security in a Web 2.0+ World A Standards Based Approach

    CERN Document Server

    Solari , Carlos Curtis

    2010-01-01

    Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know how to make effective security policy decisions to engineers who design ICT systems - a guide to information security and standards in the Web 2.0+ era. It provides an understanding of IT security in the converged world of communications technology based on the Internet Protocol. Many companies are currently applying security mo

  10. Power-scalable, polarization-stable, dual-colour DFB fibre laser system for CW terahertz imaging

    DEFF Research Database (Denmark)

    Eichhorn, Finn; Pedersen, Jens Engholm; Jepsen, Peter Uhd

    Imaging with electromagnetic radiation in the terahertz (THz) range has received a large amount of attention during recent years. THz imaging systems have diverse potential application areas such as security screening, medical diagnostics and non-destructive testing. We will discuss a power......-scalable, dual-colour, polarization-maintaining distributed feedback (DFB) fibre laser system with an inherent narrow linewidth from the DFB fibre laser oscillators. The laser system can be used as source in CW THz systems employing photomixing (optical heterodyning) for generation and detection...

  11. Security Investment in Contagious Networks.

    Science.gov (United States)

    Hasheminasab, Seyed Alireza; Tork Ladani, Behrouz

    2018-01-16

    Security of the systems is normally interdependent in such a way that security risks of one part affect other parts and threats spread through the vulnerable links in the network. So, the risks of the systems can be mitigated through investments in the security of interconnecting links. This article takes an innovative look at the problem of security investment of nodes on their vulnerable links in a given contagious network as a game-theoretic model that can be applied to a variety of applications including information systems. In the proposed game model, each node computes its corresponding risk based on the value of its assets, vulnerabilities, and threats to determine the optimum level of security investments on its external links respecting its limited budget. Furthermore, direct and indirect nonlinear influences of a node's security investment on the risks of other nodes are considered. The existence and uniqueness of the game's Nash equilibrium in the proposed game are also proved. Further analysis of the model in a practical case revealed that taking advantage of the investment effects of other players, perfectly rational players (i.e., those who use the utility function of the proposed game model) make more cost-effective decisions than selfish nonrational or semirational players. © 2018 Society for Risk Analysis.

  12. Laser applications for energy. Fifty years since advent of laser and next thirty years

    International Nuclear Information System (INIS)

    Nakai, Sadao

    2011-01-01

    The utilization of light has been changed since the advent of lasers about fifty years ago. Now in the twenty first century, laser science is being applied in every industry as the fundamental technology. In the recent years, remarkable progresses have been made in the semiconductor lasers of high power and wide wavelength region. The amazing developments of ceramics laser materials like YAG and nonlinear optics materials of organic crystals have been achieved as well as the big progress in the fiber lasers. It is also to be pointed out that very high power ultra short laser pulses have become available. In the field of power photonics, which is based on the power semiconductor lasers, fiber lasers and new laser materials, various industrial applications are expected to be constructed further in civil engineering, manufacturing technology, agricultural and biological applications, medical utilization and space sciences. It is expected, by the development of ultra short pulse and ultra high mean power lasers, that particle accelerations, ultra high density sciences, nuclear fusion neutron sources and laser fusion power reactors are to be advanced drastically. Recent development and future prospects of high power lasers are illustrated. Lasers are now regarded as one of the key technologies in line with the national policy toward the creation of innovative industries. Realization of the laser fusion reactor is the most challenging target in the coming thirty years. (S. Funahashi)

  13. Security systems engineering overview

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.)

  14. Celebrating the Year of Light….. from medicine to security with Optical Coherence Tomography

    CSIR Research Space (South Africa)

    Singh, A

    2015-10-01

    Full Text Available medicine to security with Optical Coherence Tomography Ann Singh1, Ameeth Sharma1, Ted Roberts1, Rethabile Khutlang2, Rocky Ramokolo1, Nico Marome1, Leandra Webb2, Natasha Botha2,Aletta Karsten3, Hencharl Strauss1 1 CSIR, National Laser Centre, P.O Box...

  15. ARGOS laser system mechanical design

    Science.gov (United States)

    Deysenroth, M.; Honsberg, M.; Gemperlein, H.; Ziegleder, J.; Raab, W.; Rabien, S.; Barl, L.; Gässler, W.; Borelli, J. L.

    2014-07-01

    ARGOS, a multi-star adaptive optics system is designed for the wide-field imager and multi-object spectrograph LUCI on the LBT (Large Binocular Telescope). Based on Rayleigh scattering the laser constellation images 3 artificial stars (at 532 nm) per each of the 2 eyes of the LBT, focused at a height of 12 km (Ground Layer Adaptive Optics). The stars are nominally positioned on a circle 2' in radius, but each star can be moved by up to 0.5' in any direction. For all of these needs are following main subsystems necessary: 1. A laser system with its 3 Lasers (Nd:YAG ~18W each) for delivering strong collimated light as for LGS indispensable. 2. The Launch system to project 3 beams per main mirror as a 40 cm telescope to the sky. 3. The Wave Front Sensor with a dichroic mirror. 4. The dichroic mirror unit to grab and interpret the data. 5. A Calibration Unit to adjust the system independently also during day time. 6. Racks + platforms for the WFS units. 7. Platforms and ladders for a secure access. This paper should mainly demonstrate how the ARGOS Laser System is configured and designed to support all other systems.

  16. A Research Agenda for Security Engineering

    Directory of Open Access Journals (Sweden)

    Rich Goyette

    2013-08-01

    Full Text Available Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As cyberadversaries have become more mature, sophisticated, and disciplined in their tradecraft, the science of security engineering has not kept pace. The evidence of the erosion of our digital security – upon which society is increasingly dependent – appears in the news almost daily. In this article, we outline a research agenda designed to begin addressing this deficit and to move information system security engineering toward a mature engineering discipline. Our experience suggests that there are two key areas in which this movement should begin. First, a threat model that is actionable from the perspectives of risk management and security engineering should be developed. Second, a practical and relevant security-measurement framework should be developed to adequately inform security-engineering and risk-management processes. Advances in these areas will particularly benefit business/government risk assessors as well as security engineers performing security design work, leading to more accurate, meaningful, and quantitative risk analyses and more consistent and coherent security design decisions. Threat modelling and security measurement are challenging activities to get right – especially when they need to be applied in a general context. However, these are decisive starting points because they constitute the foundation of a scientific security-engineering practice. Addressing these challenges will require stronger and more coherent integration between the sub-disciplines of risk assessment and security engineering, including new tools to facilitate that integration. More generally, changes will be required in the way security engineering is both taught and practiced to take into account the holistic approach necessary from a mature, scientific

  17. Laser excitation spectroscopy of uranium

    International Nuclear Information System (INIS)

    Solarz, R.W.

    1976-01-01

    Laser excitation spectroscopy, recently applied to uranium enrichment research at LLL, has produced a wealth of new and vitally needed information about the uranium atom and its excited states. Among the data amassed were a large number of cross sections, almost a hundred radiative lifetimes, and many level assignments. Rydberg states, never before observed in uranium or any of the actinides, have been measured and cataloged. This work puts a firm experimental base under laser isotope separation, and permits a choice of the laser frequencies most appropriate for practical uranium enrichment

  18. Ultraviolet laser technology and applications

    CERN Document Server

    Elliott, David L

    1995-01-01

    Ultraviolet Laser Technology and Applications is a hands-on reference text that identifies the main areas of UV laser technology; describes how each is applied; offers clearly illustrated examples of UV opticalsystems applications; and includes technical data on optics, lasers, materials, and systems. This book is unique for its comprehensive, in-depth coverage. Each chapter deals with a different aspect of the subject, beginning with UV light itself; moving through the optics, sources, and systems; and concluding with detailed descriptions of applications in various fields.The text enables pr

  19. Preliminary detection of explosive standard components with Laser Raman Technique

    International Nuclear Information System (INIS)

    Botti, S.; Ciardi, R.

    2008-01-01

    Presently, our section is leader of the ISOTREX project (Integrated System for On-line TRace EXplosives detection in solid, liquid and vapour state), funded in the frame of the PASR 2006 action (Preparatory Action on the enhancement of the European industrial potential in the field of Security Research Preparatory Action) of the 6. EC framework. ISOTREX project will exploit the capabilities of different laser techniques as LIBS (Laser Induced Breakdown Spectroscopy), LPA (Laser Photo Acustic) and CRDS (Cavity Ring Down Spectroscopy) to monitor explosive traces. In this frame, we extended our investigation also to the laser induced Raman effect spectroscopy, in order to investigate its capabilities and possible future integration. We analysed explosive samples in bulk solid phase, diluted liquid phase and as evaporated films over suitable substrate. In the following, we present the main results obtained, outlining preliminary conclusions [it

  20. Computer-aided proofs for multiparty computation with active security

    DEFF Research Database (Denmark)

    Spitters, Bas

    2018-01-01

    public-key encryption, signatures, garbled circuits and differential privacy. Here we show for the first time that it can also be used to prove security of MPC against a malicious adversary. We formalize additive and replicated secret sharing schemes and apply them to Maurer’s MPC protocol for secure...

  1. 48 CFR 32.409-3 - Security, supervision, and covenants.

    Science.gov (United States)

    2010-10-01

    ... replace other security requirements. The lien should cover— (1) Supplies being acquired; (2) Any credit.... Examples of additional security terms are— (1) Personal or corporate endorsements or guarantees; (2.... (f) The requirements of this 32.409-3 do not apply when using letters of credit if an agency's...

  2. Study on Effectiveness of the chaos laser radar

    OpenAIRE

    成田, 義之; 津田, 紀生; 山田, 諄

    2003-01-01

    A laser is widely applied for measurements, since it is invented. There are two types of laser distance meter for short and long distance. For long distance, a laser radar using propagation time of laser light is used. Generally, a distance is measured from delay time using either a periodic signal or a single pulse. But the signal becomes to be buried in noise with increasing distance. A new type of chaos laser radar which processes by only an addition is proposed. This radar can quickly pro...

  3. Australian Experience in Implementing Transport Safety Regulations and Transport Security Recommendations

    International Nuclear Information System (INIS)

    Sarkar, S.

    2016-01-01

    Australian transport safety and security regulatory framework is governed by Commonwealth, State and Territory legislations. There are eleven competent authorities in Australia that includes three Commonwealth authorities, six states and two territory authorities. IAEA Regulations for Safe Transport of Radioactive Material (TS-R-1, 2005 edition) is applied through Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) Code of Practice for Transport of Radioactive Material 2008 by road, rail and waterways not covered by marine legislations. All states and territories apply this Transport Code through their regulatory system. For air transport, the Civil Aviation Act 1988 adopts the requirements of the ICAO Technical Instructions for the Safe Transport of Dangerous Goods by Air DOC 9284, which also adopts TS-R-1. The security of radioactive material in air transport is achieved via the Aviation Transport Security Act 2004. For sea transport Australian Marine Order 41 applies the requirements of IMDG (International Maritime Dangerous Goods) Code which also adopts TS-R-1. The security of radioactive material (nuclear material) is governed by two Commonwealth Agencies namely, ARPANSA and ASNO (Australian Safeguards and Non-proliferation Office) . ARPANSA regulates the security of radioactive sources through ARPANSA Code of Practice for the Security of Radioactive Sources 2007 which is based on the IAEA Draft Security Series. ASNO regulates security of nuclear material including U, Th and Pu through the Nuclear Non-Proliferation (Safeguards) Act, and the object of which is to give effect to certain obligations that Australia has as a party to the NPT, Australia’s safeguards agreement with the IAEA, and other bilateral safeguards agreements and certain obligations that Australia has as a party to the Convention for the Physical Protection of Nuclear Materials (CPPNM). This paper presents the effectiveness of regulatory approaches for safe and secure

  4. Laser processing for manufacturing nanocarbon materials

    Science.gov (United States)

    Van, Hai Hoang

    CNTs have been considered as the excellent candidate to revolutionize a broad range of applications. There have been many method developed to manipulate the chemistry and the structure of CNTs. Laser with non-contact treatment capability exhibits many processing advantages, including solid-state treatment, extremely fast processing rate, and high processing resolution. In addition, the outstanding monochromatic, coherent, and directional beam generates the powerful energy absorption and the resultant extreme processing conditions. In my research, a unique laser scanning method was developed to process CNTs, controlling the oxidation and the graphitization. The achieved controllability of this method was applied to address the important issues of the current CNT processing methods for three applications. The controllable oxidation of CNTs by laser scanning method was applied to cut CNT films to produce high-performance cathodes for FE devices. The production method includes two important self-developed techniques to produce the cold cathodes: the production of highly oriented and uniformly distributed CNT sheets and the precise laser trimming process. Laser cutting is the unique method to produce the cathodes with remarkable features, including ultrathin freestanding structure (~200 nm), greatly high aspect ratio, hybrid CNT-GNR emitter arrays, even emitter separation, and directional emitter alignment. This unique cathode structure was unachievable by other methods. The developed FE devices successfully solved the screening effect issue encounter by current FE devices. The laser-control oxidation method was further developed to sequentially remove graphitic walls of CNTs. The laser oxidation process was directed to occur along the CNT axes by the laser scanning direction. Additionally, the oxidation was further assisted by the curvature stress and the thermal expansion of the graphitic nanotubes, ultimately opening (namely unzipping) the tubular structure to

  5. Laser induced energy transfer

    International Nuclear Information System (INIS)

    Falcone, R.W.

    1979-01-01

    Two related methods of rapidly transferring stored energy from one excited chemical species to another are described. The first of these, called a laser induced collision, involves a reaction in which the energy balance is met by photons from an intense laser beam. A collision cross section of ca 10 - 17 cm 2 was induced in an experiment which demonstrated the predicted dependence of the cross section on wavelength and power density of the applied laser. A second type of laser induced energy transfer involves the inelastic scattering of laser radiation from energetically excited atoms, and subsequent absorption of the scattered light by a second species. The technique of producing the light, ''anti-Stokes Raman'' scattering of visible and infrared wavelength laser photons, is shown to be an efficient source of narrow bandwidth, high brightness, tunable radiation at vacuum ultraviolet wavelengths by using it to excite a rare gas transition at 583.7 A. In addition, this light source was used to make the first measurement of the isotopic shift of the helium metastable level at 601 A. Applications in laser controlled chemistry and spectroscopy, and proposals for new types of lasers using these two energy transfer methods are discussed

  6. The Food Security of Ukraine: Status, Threats, Prospects

    Directory of Open Access Journals (Sweden)

    Rudnichenko Yevhenii M.

    2017-08-01

    Full Text Available The article analyzes the existing approaches to the normative treatment of the category of «food security». An author’s own definition of the concept of «food security» has been proposed, which must be understood as the status of provision to society foods of adequate quality and sufficient quantity. An author’s own approach as to the feasibility of applying qualitative parameters for food security assessment and a critical attitude to quantitative indicators has been formulated. The Food security index and the Ukrainian rating for 2012-2016 with emphasizing the negative tendencies and developments have been provided. The article also provides a detailed characterization of the main indicators of Ukraine’s food security in 2016 by the three directions, which are: financial accessibility of foods; physical accessibility of foods; food quality and safety. Strengths and weaknesses of Ukraine’s food security and the main threats to food security were determined, the main prospects were allocated.

  7. Development of Ultra-sensitive Laser Spectroscopic Analysis Technology

    Energy Technology Data Exchange (ETDEWEB)

    Cha, H. K.; Kim, D. H.; Song, K. S. (and others)

    2007-04-15

    Laser spectroscopic analysis technology has three distinct merits in detecting various nuclides found in nuclear fields. High selectivity originated from small bandwidth of tunable lasers makes it possible to distinguish various kinds of isotopes and isomers. High intensity of focused laser beam makes it possible to analyze ultratrace amount. Remote delivery of laser beam improves safety of workers who are exposed in dangerous environment. Also it can be applied to remote sensing of environment pollution.

  8. Development of Ultra-sensitive Laser Spectroscopic Analysis Technology

    International Nuclear Information System (INIS)

    Cha, H. K.; Kim, D. H.; Song, K. S.

    2007-04-01

    Laser spectroscopic analysis technology has three distinct merits in detecting various nuclides found in nuclear fields. High selectivity originated from small bandwidth of tunable lasers makes it possible to distinguish various kinds of isotopes and isomers. High intensity of focused laser beam makes it possible to analyze ultratrace amount. Remote delivery of laser beam improves safety of workers who are exposed in dangerous environment. Also it can be applied to remote sensing of environment pollution

  9. Ultrafast laser spectroscopy in complex solid state materials

    Energy Technology Data Exchange (ETDEWEB)

    Li, Tianqi [Iowa State Univ., Ames, IA (United States)

    2014-12-01

    This thesis summarizes my work on applying the ultrafast laser spectroscopy to the complex solid state materials. It shows that the ultrafast laser pulse can coherently control the material properties in the femtosecond time scale. And the ultrafast laser spectroscopy can be employed as a dynamical method for revealing the fundamental physical problems in the complex material systems.

  10. Quality of protection evaluation of security mechanisms.

    Science.gov (United States)

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

  11. Quality of Protection Evaluation of Security Mechanisms

    Science.gov (United States)

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol. PMID:25136683

  12. High resolution laser micro sintering / melting using q-switched and high brilliant laser radiation

    Science.gov (United States)

    Exner, H.; Streek, A.

    2015-03-01

    Since the discovery of selective laser sintering/melting, numerous modifications have been made to upgrade or customize this technology for industrial purposes. Laser micro sintering (LMS) is one of those modifications: Powders with particles in the range of a few micrometers are used to obtain products with highly resolved structures. Pulses of a q-switched laser had been considered necessary in order to generate sinter layers from the micrometer scaled metal powders. LMS has been applied with powders from metals as well as from ceramic and cermet feedstock's to generate micro parts. Recent technological progress and the application of high brilliant continuous laser radiation have now allowed an efficient laser sintering/melting of micrometer scaled metal powders. Thereby it is remarkable that thin sinter layers are generated using high continuous laser power. The principles of the process, the state of the art in LMS concerning its advantages and limitations and furthermore the latest results of the recent development of this technology will be presented. Laser Micro Sintering / Laser Micro Melting (LMM) offer a vision for a new dimension of additive fabrication of miniature and precise parts also with application potential in all engineering fields.

  13. Laser cutting of thick steel plates and simulated steel components using a 30 kW fiber laser

    International Nuclear Information System (INIS)

    Tamura, Koji; Ishigami, Ryoya; Yamagishi, Ryuichiro

    2016-01-01

    Laser cutting of thick steel plates and simulated steel components using a 30 kW fiber laser was studied for application to nuclear decommissioning. Successful cutting of carbon steel and stainless steel plates up to 300 mm in thickness was demonstrated, as was that of thick steel components such as simulated reactor vessel walls, a large pipe, and a gate valve. The results indicate that laser cutting applied to nuclear decommissioning is a promising technology. (author)

  14. Security Support in Continuous Deployment Pipeline

    DEFF Research Database (Denmark)

    Ullah, Faheem; Raft, Adam Johannes; Shahin, Mojtaba

    2017-01-01

    Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production. Continuous Deployment Pipeline (CDP) supports CD practice by transferring the changes from the repository to production. Since most of the CDP...... penetration tools. Our findings indicate that the applied tactics improve the security of the major components (i.e., repository, continuous integration server, main server) of a CDP by controlling access to the components and establishing secure connections....

  15. Therapeutic application of lasers in ophthalmology

    International Nuclear Information System (INIS)

    Misiuk-Hojlo, M.; Krzyzanowska-Berkowska, P.; Hill-Bator, A.

    2007-01-01

    Lasers have found application in diverse branches of medicine. In ophthalmology, laser technology has various therapeutic and diagnostic applications. The purpose of this article is to review the major therapeutic applications of lasers in different eye disorders. The effects of lasers on biological tissues and different laser techniques as well as the indications for laser therapy in various parts of the eye are discussed. Lasers are used to treat glaucoma and many vascular disorders of the retina. Laser treatment may be useful in preventing the development of neovascularization in diabetic retinopathy, BRVO, or CRVO. Laser techniques are also available for the treatment of the exudative form of age-related macular degeneration (AMD) and some malignant and benign intraocular tumors and in retina abnormalities which predispose to rhegmatogenous retinal detachment. Corneal laser surgery is the most frequently applied laser procedure in ophthalmology. PRK, LASIK, and LASEK are used to correct errors in vision such as myopia, hyperopia, and astigmatism. Laser photocoagulation is also helpful in cataract surgery. Nowadays, lasers have become so universal that it is difficult to imagine ophthalmology without them. We are still witnessing rapid advances in the development of laser techniques, especially in plastic surgery, cataract extraction, and ocular imaging. (authors)

  16. Development of technique for laser welding of biological tissues using laser welding device and nanocomposite solder.

    Science.gov (United States)

    Gerasimenko, A; Ichcitidze, L; Podgaetsky, V; Ryabkin, D; Pyankov, E; Saveliev, M; Selishchev, S

    2015-08-01

    The laser device for welding of biological tissues has been developed involving quality control and temperature stabilization of weld seam. Laser nanocomposite solder applied onto a wound to be weld has been used. Physicochemical properties of the nanocomposite solder have been elucidated. The nature of the tissue-organizing nanoscaffold has been analyzed at the site of biotissue welding.

  17. Relay telescope for high power laser alignment system

    Science.gov (United States)

    Dane, C. Brent; Hackel, Lloyd; Harris, Fritz B.

    2006-09-19

    A laser system includes an optical path having an intracavity relay telescope with a telescope focal point for imaging an output of the gain medium between an image location at or near the gain medium and an image location at or near an output coupler for the laser system. A kinematic mount is provided within a vacuum chamber, and adapted to secure beam baffles near the telescope focal point. An access port on the vacuum chamber is adapted for allowing insertion and removal of the beam baffles. A first baffle formed using an alignment pinhole aperture is used during alignment of the laser system. A second tapered baffle replaces the alignment aperture during operation and acts as a far-field baffle in which off angle beams strike the baffle a grazing angle of incidence, reducing fluence levels at the impact areas.

  18. Laser Remote Sensing and Photoacoustic Spectrometry Applied in Air Pollution Investigation

    Czech Academy of Sciences Publication Activity Database

    Zelinger, Zdeněk; Střižík, M.; Kubát, Pavel; Jaňour, Zbyněk; Berger, P.; Černý, A.; Engst, P.

    2004-01-01

    Roč. 42, - (2004), s. 403-412 ISSN 0143-8166 R&D Projects: GA AV ČR IAA3040101; GA ČR GA205/02/0898; GA MŠk OC 723.002 Institutional research plan: CEZ:AV0Z4040901 Keywords : DIAL * air pollution * laser photoacoustic spectroscopy Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 0.935, year: 2004

  19. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  20. Simulation analysis of impulse characteristics of space debris irradiated by multi-pulse laser

    Science.gov (United States)

    Lin, Zhengguo; Jin, Xing; Chang, Hao; You, Xiangyu

    2018-02-01

    Cleaning space debris with laser is a hot topic in the field of space security research. Impulse characteristics are the basis of cleaning space debris with laser. In order to study the impulse characteristics of rotating irregular space debris irradiated by multi-pulse laser, the impulse calculation method of rotating space debris irradiated by multi-pulse laser is established based on the area matrix method. The calculation method of impulse and impulsive moment under multi-pulse irradiation is given. The calculation process of total impulse under multi-pulse irradiation is analyzed. With a typical non-planar space debris (cube) as example, the impulse characteristics of space debris irradiated by multi-pulse laser are simulated and analyzed. The effects of initial angular velocity, spot size and pulse frequency on impulse characteristics are investigated.

  1. A Game-Theoretical Approach to Multimedia Social Networks Security

    Science.gov (United States)

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226

  2. Objectivity applied to embodied subjects in health care and social security medicine: definition of a comprehensive concept of cognitive objectivity and criteria for its application.

    Science.gov (United States)

    Solli, Hans Magnus; Barbosa da Silva, António

    2018-03-02

    The article defines a comprehensive concept of cognitive objectivity (CCCO) applied to embodied subjects in health care. The aims of this study were: (1) to specify some necessary conditions for the definition of a CCCO that will allow objective descriptions and assessments in health care, (2) to formulate criteria for application of such a CCCO, and (3) to investigate the usefulness of the criteria in work disability assessments in medical certificates from health care provided for social security purposes. The study design was based on a philosophical conceptual analysis of objectivity and subjectivity, the phenomenological notions 'embodied subject', 'life-world', 'phenomenological object' and 'empathy', and an interpretation of certificates as texts. The study material consisted of 18 disability assessments from a total collection of 86 medical certificates provided for social security purposes, written in a Norwegian hospital-based mental health clinic. Four necessary conditions identified for defining a CCCO were: (A) acknowledging the patient's social context and life-world, (B) perceiving patients as cognitive objects providing a variety of meaningful data (clinical, psychometric, and behavioural data - i.e. activities and actions, meaningful expressions and self-reflection), (C) interpreting data in context, and (D) using general epistemological principles. The criteria corresponding to these conditions were: (a) describing the patient's social context and recognizing the patient's perspective, (b) taking into consideration a variety of quantitative and qualitative data drawn from the clinician's perceptions of the patient as embodied subject, (c) being aware of the need to interpret the data in context, and (d) applying epistemological principles (professional expertise, dialogical intersubjectivity, impartiality, accuracy and correctness). Genuine communication is presupposed. These criteria were tested in the work disability assessments of medical

  3. Diode laser pumped solid state laser. Part IV. ; Noise analysis. Handotai laser reiki kotai laser. 4. ; Noise kaiseki

    Energy Technology Data Exchange (ETDEWEB)

    Sakurai, H.; Seno, T.; Tanabe, Y. (Asahi Glass Co. Ltd., Tokyo (Japan))

    1991-06-10

    Concerning the second harmonic generation(SHG) of diode laser pumped solid state laser using a nonlinear optical material, the researches are carried out to pracitically apply to the optical pickup. Therefore, the reduction of output optical noise has become the important researching subject. The theoretical and experimental analyses of noise generating mechanism were carried out for the system in which Nd;YAG as the laser diode and KTP (KTiOPO {sub 4}) as the nonlinear optical crystal were used. The following findings for the noise generating mechanism could be obtained: The competitive interaction between the polarization modes was dominant noise mechanism in the high frequency range from 1 to 20MHz and the noise could be removed sufficiently by using the QWP(quarter wave plate). On the other hand, the noise observed in the low frequency range from 100 to 200kHz depended on the resonance length, agreed qualitatively with the theoretical analysis of the noise to the competitive longitudinal modes and agreed quantitatively with the noise generating frequency range. 10 refs., 13 figs., 1 tab.

  4. Recent results in mirror based high power laser cutting

    DEFF Research Database (Denmark)

    Olsen, Flemming Ove; Nielsen, Jakob Skov; Elvang, Mads

    2004-01-01

    In this paper, recent results in high power laser cutting, obtained in reseach and development projects are presented. Two types of mirror based focussing systems for laser cutting have been developed and applied in laser cutting studies on CO2-lasers up to 12 kW. In shipyard environment cutting...... speed increase relative to state-of-the-art cutting of over 100 % has been achieved....

  5. Surface wettability of silicon substrates enhanced by laser ablation

    Energy Technology Data Exchange (ETDEWEB)

    Tseng, Shih-Feng [National Applied Research Laboratories, Instrument Technology Research Center, Hsinchu (China); National Chiao Tung University, Department of Mechanical Engineering, Hsinchu (China); Hsiao, Wen-Tse; Huang, Kuo-Cheng; Hsiao, Sheng-Yi [National Applied Research Laboratories, Instrument Technology Research Center, Hsinchu (China); Chen, Ming-Fei [National Changhua University of Education, Department of Mechatronics Engineering, Changhua (China); Lin, Yung-Sheng [Hungkuang University, Department of Applied Cosmetology and Graduate Institute of Cosmetic Science, Taichung (China); Chou, Chang-Pin [National Chiao Tung University, Department of Mechanical Engineering, Hsinchu (China)

    2010-11-15

    Laser-ablation techniques have been widely applied for removing material from a solid surface using a laser-beam irradiating apparatus. This paper presents a surface-texturing technique to create rough patterns on a silicon substrate using a pulsed Nd:YAG laser system. The different degrees of microstructure and surface roughness were adjusted by the laser fluence and laser pulse duration. A scanning electron microscope (SEM) and a 3D confocal laser-scanning microscope are used to measure the surface micrograph and roughness of the patterns, respectively. The contact angle variations between droplets on the textured surface were measured using an FTA 188 video contact angle analyzer. The results indicate that increasing the values of laser fluence and laser pulse duration pushes more molten slag piled around these patterns to create micro-sized craters and leads to an increase in the crater height and surface roughness. A typical example of a droplet on a laser-textured surface shows that the droplet spreads very quickly and almost disappears within 0.5167 s, compared to a contact angle of 47.9 on an untextured surface. This processing technique can also be applied to fabricating Si solar panels to increase the absorption efficiency of light. (orig.)

  6. Machine Learning for Security

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Applied statistics, aka ‘Machine Learning’, offers a wealth of techniques for answering security questions. It’s a much hyped topic in the big data world, with many companies now providing machine learning as a service. This talk will demystify these techniques, explain the math, and demonstrate their application to security problems. The presentation will include how-to’s on classifying malware, looking into encrypted tunnels, and finding botnets in DNS data. About the speaker Josiah is a security researcher with HP TippingPoint DVLabs Research Group. He has over 15 years of professional software development experience. Josiah used to do AI, with work focused on graph theory, search, and deductive inference on large knowledge bases. As rules only get you so far, he moved from AI to using machine learning techniques identifying failure modes in email traffic. There followed digressions into clustered data storage and later integrated control systems. Current ...

  7. Bio-inspiring cyber security and cloud services trends and innovations

    CERN Document Server

    Kim, Tai-Hoon; Kacprzyk, Janusz; Awad, Ali

    2014-01-01

    This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.  

  8. Foundations of laser spectroscopy

    CERN Document Server

    Stenholm, Stig

    2005-01-01

    A simple presentation of the theoretical foundations of steady-state laser spectroscopy, this text helps students to apply theory to calculations with a systematic series of examples and exercises. 1984 edition.

  9. Applying Trusted Network Technology To Process Control Systems

    Science.gov (United States)

    Okhravi, Hamed; Nicol, David

    Interconnections between process control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hardware and software technologies. This paper describes new technologies that can be applied to the design of next generation security architectures for industrial control systems. The technologies are discussed along with their security benefits and design trade-offs.

  10. Spatiotemporal control of laser intensity

    Science.gov (United States)

    Froula, Dustin H.; Turnbull, David; Davies, Andrew S.; Kessler, Terrance J.; Haberberger, Dan; Palastro, John P.; Bahk, Seung-Whan; Begishev, Ildar A.; Boni, Robert; Bucht, Sara; Katz, Joseph; Shaw, Jessica L.

    2018-05-01

    The controlled coupling of a laser to plasma has the potential to address grand scientific challenges1-6, but many applications have limited flexibility and poor control over the laser focal volume. Here, we present an advanced focusing scheme called a `flying focus', where a chromatic focusing system combined with chirped laser pulses enables a small-diameter laser focus to propagate nearly 100 times its Rayleigh length. Furthermore, the speed at which the focus moves (and hence the peak intensity) is decoupled from the group velocity of the laser. It can co- or counter-propagate along the laser axis at any velocity. Experiments validating the concept measured subluminal (-0.09c) to superluminal (39c) focal-spot velocities, generating a nearly constant peak intensity over 4.5 mm. Among possible applications, the flying focus could be applied to a photon accelerator7 to mitigate dephasing, facilitating the production of tunable XUV sources.

  11. Laser-plasma interactions and applications

    CERN Document Server

    Neely, David; Bingham, Robert; Jaroszynski, Dino

    2013-01-01

    Laser-Plasma Interactions and Applications covers the fundamental and applied aspects of high power laser-plasma physics. With an internationally renowned team of authors, the book broadens the knowledge of young researchers working in high power laser-plasma science by providing them with a thorough pedagogical grounding in the interaction of laser radiation with matter, laser-plasma accelerators, and inertial confinement fusion. The text is organised such that the theoretical foundations of the subject are discussed first, in Part I. In Part II, topics in the area of high energy density physics are covered. Parts III and IV deal with the applications to inertial confinement fusion and as a driver of particle and radiation sources, respectively. Finally, Part V describes the principle diagnostic, targetry, and computational approaches used in the field. This book is designed to give students a thorough foundation in the fundamental physics of laser-plasma interactions. It will also provide readers with knowl...

  12. The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets

    Directory of Open Access Journals (Sweden)

    Antonio Santos-Olmo

    2016-07-01

    Full Text Available The information society is increasingly more dependent on Information Security Management Systems (ISMSs, and the availability of these kinds of systems is now vital for the development of Small and Medium-Sized Enterprises (SMEs. However, these companies require ISMSs that have been adapted to their special features, and which are optimized as regards the resources needed to deploy and maintain them. This article shows how important the security culture within ISMSs is for SMEs, and how the concept of security culture has been introduced into a security management methodology (MARISMA is a Methodology for “Information Security Management System in SMEs” developed by the Sicaman Nuevas Tecnologías Company, Research Group GSyA and Alarcos of the University of Castilla-La Mancha. for SMEs. This model is currently being directly applied to real cases, thus allowing a steady improvement to be made to its implementation.

  13. Usage of laser techniques and digital aerial coverage as a layer for as-built applied to the LPG pipeline Urucu-Coari right-of-way

    Energy Technology Data Exchange (ETDEWEB)

    Furquim, Antonio J. [ESTEIO Engenharia e Aerolevantamentos S.A, Curitiba, PR (Brazil)

    2009-07-01

    The usage of taking of digital aerial images is a reality worldwide, but in Brazil there is few sensors in use available, which makes recognize the pioneer aspect of the technique. Something similar also occurs with the airborne LASER scanning, whose technique has been applied for more time, used in the obtaining of digital terrain models. The use of digital imaging along with the LASER survey can offer an option for the generation of high quality products in a very fast and efficient way, aiming at numberless applications. Among such applications, the generation of cartographic products for the implantation of pipelines, as well as the as-built drawings of these same rights-of-ways after the implantation can be highlighted. The pipeline sector has been the focus of great investments and keeps on presenting demand for new projects and implantations. That allows to deduce that the speed in the generation of accurate bases for such purpose shall progress towards the continuous development of such aerial survey techniques. This paper presents the application of images and LASER survey to obtain ortho photos of Urucu-Coari liquefied petroleum gas (LPG) pipeline. (author)

  14. Modelling security properties in a grid-based operating system with anti-goals

    OpenAIRE

    Arenas, A.; Aziz, Benjamin; Bicarregui, J.; Matthews, B.; Yang, E.

    2008-01-01

    In this paper, we discuss the use of formal requirements-engineering techniques in capturing security requirements for a Grid-based operating system. We use KAOS goal model to represent two security goals for Grid systems, namely authorisation and single-sign on authentication. We apply goal-refinement to derive security requirements for these two security goals and we develop a model of antigoals and show how system vulnerabilities and threats to the security goals can arise from such anti-m...

  15. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  16. Information security of power enterprises of North-Arctic region

    Science.gov (United States)

    Sushko, O. P.

    2018-05-01

    The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.

  17. Security and Privacy in Fog Computing: Challenges

    OpenAIRE

    Mukherjee, Mithun; Matam, Rakesh; Shu, Lei; Maglaras, Leandros; Ferrag, Mohamed Amine; Choudhry, Nikumani; Kumar, Vikas

    2017-01-01

    open access article Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing toward the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. However, the characteristics of fog computing arise new security and privacy challenges. The existing security and privacy measurements for cloud computing cannot be directly applied to the fog computing due to its features, such as mobility, heteroge...

  18. Teaching introductory computer security at a Department of Defense university

    OpenAIRE

    Irvine, Cynthia E.

    1997-01-01

    The Naval Postgraduate School Center for Information Systems Security (INFOSEC) Studies and Research (NPS CISR) has developed an instructional program in computer security. Its objective is to insure that students not only understand practical aspects of computer security associated with current technology, but also learn the fundamental principles that can be applied to the development of systems for which high confidence in policy enforcement can be achieved. Introduction to Computer Sec...

  19. Laser therapy for periodontitis

    Science.gov (United States)

    Efanov, O. I.

    2001-04-01

    An investigation was made of applying pulsed (lambda) equals 0.89 micrometers laser radiation in the treatment for early diagnosed periodontitis. The investigation was made on 65 patients (47 patients constituted the experimental group and 18 patients constituted a control group) affected by periodontitis. Clinical and functional tests revealed that laser therapy produced a string effect on the course of the illness. It reduced bleeding, inflammation, and pruritus. However, it did not produce an affect on electroexcitation. Biomicroscopic examinations and periodontium rheography revealed that the gingival blood flow became normal after the course of laser therapy. The capillary permeability and venous congestion decreased, which was confirmed by the increased time of vacuum tests, raised gingival temperature, reduced tissue clearance, and increased oxygen tension. Apart from that, laser therapy subsided fibrinolysis, proteolytic tissue activity, and decreased the exudative inflammation of periodontium.

  20. High-power fiber-coupled pump lasers for fiber lasers

    Science.gov (United States)

    Kasai, Yohei; Aizawa, Takuya; Tanaka, Daiichiro

    2018-02-01

    We present high-power fiber-coupled pump modules utilized effectively for ultra-high power single-mode (SM) fiber lasers. Maximum output power of 392 W was achieved at 23 A for 915 nm pump, and 394 W for 976 nm pump. Fiber core diameter is 118 μm and case temperature is 25deg. C. Polarization multiplexing technique was newly applied to our optical system. High-reliability of the laser diodes (LD) at high-power operation has been demonstrated by aging tests. Advanced package structure was developed that manages uncoupled light around input end of the fiber. 800 hours continuous drive with uncoupled light power of 100 W has been achieved.

  1. Indicators of energy security in industrialised countries

    International Nuclear Information System (INIS)

    Loeschel, Andreas; Moslener, Ulf; Ruebbelke, Dirk T.G.

    2010-01-01

    Energy security has become a popular catch phrase, both in the scientific arena as well as in the political discussion. Yet, in general the applied concepts of energy security are rather vague. This paper sheds some light on concepts and indicators of energy security. First, we conceptually discuss the issue of energy supply security and explain why it is not to handle by one science alone and what economics may contribute in order to structure the topic. After providing a brief survey of existing attempts to define or measure energy security we suggest an additional dimension along which indicators of energy security may be classified: ex-post and ex-ante indicators. Finally, we illustrate our concept on the basis of several simplified indicators. While ex-post indicators are mostly based on price developments, ex-ante indicators are to a greater extent aimed at illustrating potential problems. Our illustration suggests that it is worthwhile to take into account the market structure along with the political stability of exporting countries. (author)

  2. Risk assessment techniques for civil aviation security

    Energy Technology Data Exchange (ETDEWEB)

    Tamasi, Galileo, E-mail: g.tamasi@enac.rupa.i [Ente Nazionale per l' Aviazione Civile-Direzione Progetti, Studi e Ricerche, Via di Villa Ricotti, 42, 00161 Roma (Italy); Demichela, Micaela, E-mail: micaela.demichela@polito.i [SAfeR-Centro Studi su Sicurezza, Affidabilita e Rischi, Dipartimento di Scienza dei Materiali e Ingegneria Chimica, Politecnico di Torino, Corso Duca degli Abruzzi, 24, 10129 Torino (Italy)

    2011-08-15

    Following the 9/11 terrorists attacks in New York a strong economical effort was made to improve and adapt aviation security, both in infrastructures as in airplanes. National and international guidelines were promptly developed with the objective of creating a security management system able to supervise the identification of risks and the definition and optimization of control measures. Risk assessment techniques are thus crucial in the above process, since an incorrect risk identification and quantification can strongly affect both the security level as the investments needed to reach it. The paper proposes a set of methodologies to qualitatively and quantitatively assess the risk in the security of civil aviation and the risk assessment process based on the threats, criticality and vulnerabilities concepts, highlighting their correlation in determining the level of risk. RAMS techniques are applied to the airport security system in order to analyze the protection equipment for critical facilities located in air-side, allowing also the estimation of the importance of the security improving measures vs. their effectiveness.

  3. Risk assessment techniques for civil aviation security

    International Nuclear Information System (INIS)

    Tamasi, Galileo; Demichela, Micaela

    2011-01-01

    Following the 9/11 terrorists attacks in New York a strong economical effort was made to improve and adapt aviation security, both in infrastructures as in airplanes. National and international guidelines were promptly developed with the objective of creating a security management system able to supervise the identification of risks and the definition and optimization of control measures. Risk assessment techniques are thus crucial in the above process, since an incorrect risk identification and quantification can strongly affect both the security level as the investments needed to reach it. The paper proposes a set of methodologies to qualitatively and quantitatively assess the risk in the security of civil aviation and the risk assessment process based on the threats, criticality and vulnerabilities concepts, highlighting their correlation in determining the level of risk. RAMS techniques are applied to the airport security system in order to analyze the protection equipment for critical facilities located in air-side, allowing also the estimation of the importance of the security improving measures vs. their effectiveness.

  4. Effects of infrared lasers on chemical extraction reactions in liquid-liquid systems

    International Nuclear Information System (INIS)

    Baoyu, X.

    A study was made of the effects of infrared lasers on equilibrium distributions of uranyl ions between aqueous solution phases containing nitric acid or hydrochloric acid and organic solvent phases of tributyl phosphate (TBP). The experimental results indicated that uranium concentrations in the organic solvent phase increased under TEA CO 2 laser irradiation up to a maximum of 44% as compared to cases in which laser radiation was not applied. The possibility that this type of laser extraction effect might be applied to separation of uranium isotopes was also discussed

  5. Development of portable laser peening systems for nuclear power reactors

    International Nuclear Information System (INIS)

    Chida, Itaru; Uehara, Takuya; Yoda, Masaki; Miyasaka, Hiroyuki; Kato, Hiromi

    2009-01-01

    Stress corrosion cracking (SCC) is the major factor to reduce the reliability of aged reactor components. Toshiba has developed various laser-based maintenance and repair technologies and applied them to existing nuclear power plants. Laser-based technology is considered to be the best tool for remote processing in nuclear power plants, and particularly so for the maintenance and repair of reactor core components. Accessibility could be drastically improved by a simple handling system owing to the absence of reactive force against laser irradiation and the flexible optical fiber. For the preventive maintenance, laser peening technology was developed and applied to reactor components in operating BWRs and PWRs. Laser peening is a novel process to improve residual stress from tensile to compressive on material surface layer by irradiating focused high-power laser pulses in water without any surface preparations. Laser peening systems, which deliver laser pulses with mirrors or through an optical fiber, were developed and have been applied to preventive maintenance against SCC in nuclear power reactors since 1999. Each system was composed of laser oscillators, a beam delivery system, a laser irradiation head, remote handling equipment and a monitor/control system. Beam delivery with mirrors was accomplished through alignment/tracking functions with sufficient accuracy. Reliable fiber-delivery was attained by the development of a novel input coupling optics and an irradiation head with auto-focusing. Recently, we have developed portable laser peening (PLP) system which could employ both mirror- and fiber- delivery technologies. Size and weight of the PLP system for BWR bottom was almost 1/25 compared to the previous system. PLP system would be the applicable to both BWRs and PWRs as one of the maintenance technologies. (author)

  6. Infrared technique for decoding of invisible laser markings

    Science.gov (United States)

    Haferkamp, Heinz; Jaeschke, Peter; Stein, Johannes; Goede, Martin

    2002-03-01

    Counterfeiting and product piracy continues to be an important issue not only for the Western industry, but also for the society in general. Due to the drastic increase in product imitation and the request for plagiarism protection as well as for reducing thefts there is a high interest in new protection methods providing new security features. The method presented here consists of security markings which are included below paint layers. These markings are invisible for the human eye due to the non-transparency of the upper layers in the visible spectral range. However, the markings can be detected by an infrared technique taking advantage on the partial transparency of the upper paint layers in the IR-region. Metal sheets are marked using laser radiation. The beam of a Nd:YAG-laser provides a modification of the surface structure, resulting in dark markings due to the annealing effect. After coating of the laser-marked material, the markings are invisible for the bare eye. In order to read out the invisible information below the coating, an infrared reflection technique is used. The samples are illuminated with halogen lamps or infrared radiators. Many coating materials (i. e. paints) show a certain transparency in the mid-infrared region, especially between 3 - 5 micrometers . The reflected radiation is detected using an IR-camera with a sensitivity range from 3.4 - 5 micrometers . Due to the different reflection properties between the markings and their surrounding, the information can be detected.

  7. Secure Coding for Safety I and C Systems on Nuclear Power Plants

    International Nuclear Information System (INIS)

    Kim, Y. M.; Park, H. S.; Kim, T. H.

    2015-01-01

    This paper addresses secure coding technologies which can reduce the software vulnerabilities and provides secure coding application guidelines for nuclear safety I and C systems. The use of digital equipment may improve their reliability and reduce maintenance costs. But, the design characteristics of nuclear I and C systems are becoming more complex and the possibility of cyber-attacks using software vulnerabilities has been increased. Software defects, bugs and logic flaws have been consistently the primary causes of software vulnerabilities which can introduce security vulnerabilities. In this study, we described a applying methods for secure coding which can reduce the software vulnerabilities. Software defects lists, countermeasures for each defect and coding rules can be applied properly depending on target system's condition. We expect that the results of this study can help developing the secure coding guidelines and significantly reducing or eliminating vulnerabilities in nuclear safety I and C software

  8. Secure Coding for Safety I and C Systems on Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Y. M.; Park, H. S. [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, T. H. [Formal Works Inc., Seoul (Korea, Republic of)

    2015-10-15

    This paper addresses secure coding technologies which can reduce the software vulnerabilities and provides secure coding application guidelines for nuclear safety I and C systems. The use of digital equipment may improve their reliability and reduce maintenance costs. But, the design characteristics of nuclear I and C systems are becoming more complex and the possibility of cyber-attacks using software vulnerabilities has been increased. Software defects, bugs and logic flaws have been consistently the primary causes of software vulnerabilities which can introduce security vulnerabilities. In this study, we described a applying methods for secure coding which can reduce the software vulnerabilities. Software defects lists, countermeasures for each defect and coding rules can be applied properly depending on target system's condition. We expect that the results of this study can help developing the secure coding guidelines and significantly reducing or eliminating vulnerabilities in nuclear safety I and C software.

  9. Optical double-locked semiconductor lasers

    Science.gov (United States)

    AlMulla, Mohammad

    2018-06-01

    Self-sustained period-one (P1) nonlinear dynamics of a semiconductor laser are investigated when both optical injection and modulation are applied for stable microwave frequency generation. Locking the P1 oscillation through modulation on the bias current, injection strength, or detuning frequency stabilizes the P1 oscillation. Through the phase noise variance, the different modulation types are compared. It is demonstrated that locking the P1 oscillation through optical modulation on the output of the master laser outperforms bias-current modulation of the slave laser. Master laser modulation shows wider P1-oscillation locking range and lower phase noise variance. The locking characteristics of the P1 oscillation also depend on the operating conditions of the optical injection system

  10. 49 CFR 393.124 - What are the rules for securing concrete pipe?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false What are the rules for securing concrete pipe? 393... Specific Securement Requirements by Commodity Type § 393.124 What are the rules for securing concrete pipe? (a) Applicability. (1) The rules in this section apply to the transportation of concrete pipe on...

  11. Effect of laser power on clad metal in laser-TIG combined metal cladding

    Science.gov (United States)

    Utsumi, Akihiro; Hino, Takanori; Matsuda, Jun; Tasoda, Takashi; Yoneda, Masafumi; Katsumura, Munehide; Yano, Tetsuo; Araki, Takao

    2003-03-01

    TIG arc welding has been used to date as a method for clad welding of white metal as bearing material. We propose a new clad welding process that combines a CO2 laser and a TIG arc, as a method for cladding at high speed. We hypothesized that this method would permit appropriate control of the melted quantity of base metal by varying the laser power. We carried out cladding while varying the laser power, and investigated the structure near the boundary between the clad layer and the base metal. Using the laser-TIG combined cladding, we found we were able to control appropriately the degree of dilution with the base metal. By applying this result to subsequent cladding, we were able to obtain a clad layer of high quality, which was slightly diluted with the base metal.

  12. Laser cooling at resonance

    Science.gov (United States)

    Yudkin, Yaakov; Khaykovich, Lev

    2018-05-01

    We show experimentally that three-dimensional laser cooling of lithium atoms on the D2 line is possible when the laser light is tuned exactly to resonance with the dominant atomic transition. Qualitatively, it can be understood by applying simple Doppler cooling arguments to the specific hyperfine structure of the excited state of lithium atoms, which is both dense and inverted. However, to build a quantitative theory, we must resolve to a full model which takes into account both the entire atomic structure of all 24 Zeeman sublevels and the laser light polarization. Moreover, by means of Monte Carlo simulations, we show that coherent processes play an important role in showing consistency between the theory and the experimental results.

  13. Multimedia and security: Workshop at ACM Multimedia '98, Bristol, U.K., September 12 - 13, 1998

    OpenAIRE

    Dittmann, J.; Wohlmacher, P.; Horster, P.; Steinmetz, R.

    1998-01-01

    In this paper we describe the most important security requirements, which must be fulfilled by today's IT-systems, and the security measures used to satisfy these requirements. These security measures are based on modern cryptographic mechanisms as well as on security infrastructures. Regarding data security and communication security in particular in the field of multimedia, the requirements on security increase. If and in which way the discussed security mechanisms can be applied to multime...

  14. Silicon nanostructures produced by laser direct etching

    DEFF Research Database (Denmark)

    Müllenborn, Matthias; Dirac, Paul Andreas Holger; Petersen, Jon Wulff

    1995-01-01

    A laser direct-write process has been applied to structure silicon on a nanometer scale. In this process, a silicon substrate, placed in a chlorine ambience, is locally heated above its melting point by a continuous-wave laser and translated by high-resolution direct-current motor stages. Only...

  15. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  16. Fractional laser skin resurfacing.

    Science.gov (United States)

    Alexiades-Armenakas, Macrene R; Dover, Jeffrey S; Arndt, Kenneth A

    2012-11-01

    Laser skin resurfacing (LSR) has evolved over the past 2 decades from traditional ablative to fractional nonablative and fractional ablative resurfacing. Traditional ablative LSR was highly effective in reducing rhytides, photoaging, and acne scarring but was associated with significant side effects and complications. In contrast, nonablative LSR was very safe but failed to deliver consistent clinical improvement. Fractional LSR has achieved the middle ground; it combined the efficacy of traditional LSR with the safety of nonablative modalities. The first fractional laser was a nonablative erbium-doped yttrium aluminum garnet (Er:YAG) laser that produced microscopic columns of thermal injury in the epidermis and upper dermis. Heralding an entirely new concept of laser energy delivery, it delivered the laser beam in microarrays. It resulted in microscopic columns of treated tissue and intervening areas of untreated skin, which yielded rapid reepithelialization. Fractional delivery was quickly applied to ablative wavelengths such as carbon dioxide, Er:YAG, and yttrium scandium gallium garnet (2,790 nm), providing more significant clinical outcomes. Adjustable laser parameters, including power, pitch, dwell time, and spot density, allowed for precise determination of percent surface area, affected penetration depth, and clinical recovery time and efficacy. Fractional LSR has been a significant advance to the laser field, striking the balance between safety and efficacy.

  17. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  18. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  19. Laser-induced selective copper plating of polypropylene surface

    Science.gov (United States)

    Ratautas, K.; Gedvilas, M.; Stankevičiene, I.; JagminienÄ--, A.; Norkus, E.; Li Pira, N.; Sinopoli, S.; Emanuele, U.; Račiukaitis, G.

    2016-03-01

    Laser writing for selective plating of electro-conductive lines for electronics has several significant advantages, compared to conventional printed circuit board technology. Firstly, this method is faster and cheaper at the prototyping stage. Secondly, material consumption is reduced, because it works selectively. However, the biggest merit of this method is potentiality to produce moulded interconnect device, enabling to create electronics on complex 3D surfaces, thus saving space, materials and cost of production. There are two basic techniques of laser writing for selective plating on plastics: the laser-induced selective activation (LISA) and laser direct structuring (LDS). In the LISA method, pure plastics without any dopant (filler) can be used. In the LDS method, special fillers are mixed in the polymer matrix. These fillers are activated during laser writing process, and, in the next processing step, the laser modified area can be selectively plated with metals. In this work, both methods of the laser writing for the selective plating of polymers were investigated and compared. For LDS approach, new material: polypropylene with carbon-based additives was tested using picosecond and nanosecond laser pulses. Different laser processing parameters (laser pulse energy, scanning speed, the number of scans, pulse durations, wavelength and overlapping of scanned lines) were applied in order to find out the optimal regime of activation. Areal selectivity tests showed a high plating resolution. The narrowest width of a copper-plated line was less than 23 μm. Finally, our material was applied to the prototype of the electronic circuit board on a 2D surface.

  20. High resolution laser patterning of ITO on PET substrate

    Science.gov (United States)

    Zhang, Tao; Liu, Di; Park, Hee K.; Yu, Dong X.; Hwang, David J.

    2013-03-01

    Cost-effective laser patterning of indium tin oxide (ITO) thin film coated on flexible polyethylene terephthalate (PET) film substrate for touch panel was studied. The target scribing width was set to the order of 10 μm in order to examine issues involved with higher feature resolution. Picosecond-pulsed laser and Q-switched nanosecond-pulsed laser at the wavelength of 532nm were applied for the comparison of laser patterning in picosecond and nanosecond regimes. While relatively superior scribing quality was achieved by picosecond laser, 532 nm wavelength showed a limitation due to weaker absorption in ITO film. In order to seek for cost-effective solution for high resolution ITO scribing, nanosecond laser pulses were applied and performance of 532nm and 1064nm wavelengths were compared. 1064nm wavelength shows relatively better scribing quality due to the higher absorption ratio in ITO film, yet at noticeable substrate damage. Through single pulse based scribing experiments, we inspected that reduced pulse overlapping is preferred in order to minimize the substrate damage during line patterning.

  1. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  2. Security Provision and Political Formation in Hybrid Orders

    Directory of Open Access Journals (Sweden)

    Michael Lawrence

    2017-08-01

    Full Text Available The security sector reform literature is increasingly turning towards the inclusion of non-state security providers, but the long-term patterns of political development to which such engagement might contribute remain underexplored. This article thus provides several lenses with which to understand the relationship between non-state security provision and political development. It first presents three perspectives (functionalism, political economy, and communitarianism with which to understand the nature and behavior of non-state security providers. Second, it outlines five possible long-term trajectories of political formation and the role of non-state security providers in each. These discussions highlight the idea of hybridity, and the remainder of the paper argues that the concept can be usefully applied in (at least two ways. The third section proposes that hybridity can help overcome longstanding but misleading conceptual binaries, while the fourth rearticulates hybridity as a dynamic developmental process – 'hybridization' – that can be contrasted with security politics as the underlying logic by which security providers (both state and non-state interact and change over time.

  3. Information Security System and Development of a Modern Organization

    OpenAIRE

    Wawak, Slawomir

    2009-01-01

    Information security management systems are increasingly applied in a number of sectors of the new, global, interconnected economy. They are used by production and service companies, businesses that provide information technology and telecom services, state administration authorities and local governments. Specifically, they are used in case of crime groups or as a means of securing illegal transactions.

  4. Secure Block Ciphers - Cryptanalysis and Design

    DEFF Research Database (Denmark)

    Tiessen, Tyge

    be applied to the AES can be transferred to this block cipher, albeit with a higher attack complexity. The second publication introduces a new block cipher family which is targeted for new applications in fully homomorphic encryption and multi-party computation. We demonstrate the soundness of the design...... is encrypted using so-called symmetric ciphers. The security of our digital infrastructure thus rests at its very base on their security. The central topic of this thesis is the security of block ciphers – the most prominent form of symmetric ciphers. This thesis is separated in two parts. The first part...... is an introduction to block ciphers and their cryptanalysis, the second part contains publications written and published during the PhD studies. The first publication evaluates the security of a modification of the AES in which the choice of S-box is unknown to the attacker. We find that some of the attacks that can...

  5. Sustainability and Security: Timber Certification in Asia-Pacific Region

    Directory of Open Access Journals (Sweden)

    Antonina Ivanova

    2008-10-01

    Full Text Available The expansion of sustainable development initiatives since the 1990’s reflected an emphasis on integrated solutions to economic development, socio-political stability and environmental health in the global community. In the same context the traditional concept of security needed to be open in two directions. First, the notion of security should no longer be applied only to the military realm, but also to the economic, the societal, the environmental, and the political fields. Second, the referent object of the “security” should not be conceptualized solely in terms of the state, but should embrace the individual below the state, and the international system above it. The forests industry timber certification in Asia-Pacific region has been selected as a case study because it is an excellent example to illustrate the links between the sustainable development and the environmental security, including also certain elements of economic security. This article is presenting a critical overview of the forest industry and the status of timber certification globally, with an emphasis on Asia – Pacific countries applying the Systemic Thinking approach. In conclusion, an outlook is presented concerning the future of timber certification and possible impacts on security and sustainable development.

  6. The KAERI laser facility with temporal laser beam shaping for application's user

    International Nuclear Information System (INIS)

    Hong, Sung Ki; Kim, Min Suk; Kim, Young Won; Ko, Kwanghoon; Lim, Changhwan; Seo, Young Seok

    2008-01-01

    The Korea Atomic Energy Research Institute(KAERI)has been developed a high energy Nd:Glass laser facility(KLF)for fast ignition research and high energy physics applications at early 2008. Now, we are researching the temporal laser beam shaping for application's user. The temporal laser beam shaping has been applied to a number of industrial applications. The KLF beam shaping system with fiber based consists of two electro optic modulator with DC bias using a Mach Zehnder interferometer, an arbitrary electronic waveform generator, a continuous wavelength fiber laser source, a fiber based pulse amplification system and DC bias source to generate temporally shaped pulses with a high extinction ratio and high resolution. RF signal waveform user defined by an arbitrary electronic waveform generator is only connected to one electro optic modulator. DC bias source with auto feed back or manual controller is connected both two electro optic modulators. Emitting laser light from a continuous wavelength fiber laser source is modulated to meet a user defined laser pulse with a high extinction ratio by two electro optic modulators. Experimental results are shown in Fig.1. Figure 1(a)shows two programmed waveforms with the signal width 10ns in an arbitrary electronic waveform generator. Figure 1(b)shows output laser pulses with sub mJ energy from amplification results of the KLF beam shaping system which can control the pulse width ranges from 400ps to sub us

  7. Implementation Support of Security Design Patterns Using Test Templates

    Directory of Open Access Journals (Sweden)

    Masatoshi Yoshizawa

    2016-06-01

    Full Text Available Security patterns are intended to support software developers as the patterns encapsulate security expert knowledge. However, these patterns may be inappropriately applied because most developers are not security experts, leading to threats and vulnerabilities. Here we propose a support method for security design patterns in the implementation phase of software development. Our method creates a test template from a security design pattern, consisting of an “aspect test template” to observe the internal processing and a “test case template”. Providing design information creates a test from the test template with a tool. Because our test template is reusable, it can easily perform a test to validate a security design pattern. In an experiment involving four students majoring in information sciences, we confirm that our method can realize an effective test, verify pattern applications, and support pattern implementation.

  8. Mobile terawatt laser propagation facility (Conference Presentation)

    Science.gov (United States)

    Shah, Lawrence; Roumayah, Patrick; Bodnar, Nathan; Bradford, Joshua D.; Maukonen, Douglas; Richardson, Martin C.

    2017-03-01

    This presentation will describe the design and construction status of a new mobile high-energy femtosecond laser systems producing 500 mJ, 100 fs pulses at 10 Hz. This facility is built into a shipping container and includes a cleanroom housing the laser system, a separate section for the beam director optics with a retractable roof, and the environmental control equipment necessary to maintain stable operation. The laser system includes several innovations to improve the utility of the system for "in field" experiments. For example, this system utilizes a fiber laser oscillator and a monolithic chirped Bragg grating stretcher to improve system robustness/size and employs software to enable remote monitoring and system control. Uniquely, this facility incorporates a precision motion-controlled gimbal altitude-azimuth mount with a coudé path to enable aiming of the beam over a wide field of view. In addition to providing the ability to precisely aim at multiple targets, it is also possible to coordinate the beam with separate tracking/diagnostic sensing equipment as well as other laser systems. This mobile platform will be deployed at the Townes Institute Science and Technology Experimental Facility (TISTEF) located at the Kennedy Space Center in Florida, to utilize the 1-km secured laser propagation range and the wide array of meteorological instrumentation for atmospheric and turbulence characterization. This will provide significant new data on the propagation of high peak power ultrashort laser pulses and detailed information on the atmospheric conditions in a coastal semi-tropical environment.

  9. Laser removal of water repellent treatments on limestone

    Energy Technology Data Exchange (ETDEWEB)

    Gomez-Heras, Miguel; Alvarez de Buergo, Monica; Rebollar, Esther; Oujja, Mohamed; Castillejo, Marta; Fort, Rafael

    2003-12-15

    Protective and water repellent treatments are applied on stone materials used on buildings or sculptures of artistic value to reduce water intrusion without limiting the natural permeability to water vapour of the material. The effect of the wavelength associated with the laser removal of two water repellent treatments applied on limestone, Paraloid B-72, a copolymer of methyl acrylate and ethyl methacrylate, and Tegosivin HL-100, a modified polysiloxane resin, was investigated by using the four harmonics of a Q-switched Nd:YAG laser (1064, 532, 355 and 266 nm). The modifications induced on the surface of limestone samples by laser irradiation were studied using colorimetry, roughness measurements and scanning electron microscopy (SEM). The removal of the treatments was found to be dependent on the laser irradiation conditions and on the characteristics of the coatings. The fundamental laser radiation was effective in removing both treatments, but thermal alteration processes were induced on the constituent calcite crystals. The best results were obtained by irradiation in the near UV at 355 nm.

  10. Laser streaming: Turning a laser beam into a flow of liquid.

    Science.gov (United States)

    Wang, Yanan; Zhang, Qiuhui; Zhu, Zhuan; Lin, Feng; Deng, Jiangdong; Ku, Geng; Dong, Suchuan; Song, Shuo; Alam, Md Kamrul; Liu, Dong; Wang, Zhiming; Bao, Jiming

    2017-09-01

    Transforming a laser beam into a mass flow has been a challenge both scientifically and technologically. We report the discovery of a new optofluidic principle and demonstrate the generation of a steady-state water flow by a pulsed laser beam through a glass window. To generate a flow or stream in the same path as the refracted laser beam in pure water from an arbitrary spot on the window, we first fill a glass cuvette with an aqueous solution of Au nanoparticles. A flow will emerge from the focused laser spot on the window after the laser is turned on for a few to tens of minutes; the flow remains after the colloidal solution is completely replaced by pure water. Microscopically, this transformation is made possible by an underlying plasmonic nanoparticle-decorated cavity, which is self-fabricated on the glass by nanoparticle-assisted laser etching and exhibits size and shape uniquely tailored to the incident beam profile. Hydrophone signals indicate that the flow is driven via acoustic streaming by a long-lasting ultrasound wave that is resonantly generated by the laser and the cavity through the photoacoustic effect. The principle of this light-driven flow via ultrasound, that is, photoacoustic streaming by coupling photoacoustics to acoustic streaming, is general and can be applied to any liquid, opening up new research and applications in optofluidics as well as traditional photoacoustics and acoustic streaming.

  11. Applications of lasers and electro-optics

    International Nuclear Information System (INIS)

    Tan, B.C.; Low, K.S.; Chen, Y.H.; Harith bin Ahmad; Tou, T.Y.

    1994-01-01

    Supported by the IRPA Programme on Laser Technology and Applications, many types of lasers have been designed, constructed and applied in various areas of science, medicine and industries. Amongst these lasers constructed were high power carbon dioxide lasers, rare gas halide excimer lasers, solid state Neodymium-YAG lasers, nitrogen lasers, flashlamp pumped dye lasers and nitrogen and excimer laser pumped dye lasers. These lasers and the associated electro-optics system, some with computer controlled, are designed and developed for the following areas of applications: 1. Industrial applications of high power carbon dioxide lasers for making of i.c. components and other materials processing purposes. Prototype operational systems have been developed. 2. Medical applications of lasers for cancer treatment using the technique of photodynamic therapy. A new and more effective treatment protocol has been proposed. 3. Agricultural applications of lasers in palm oil and palm fruit-fluorescence diagnostic studies. Fruit ripeness signature has been developed and palm oil oxidation level were investigated. 4. Development of atmospheric pollution monitoring systems using laser lidar techniques. Laboratory scale systems were developed. 5. Other applications of lasers including laser holographic and interferometric methods for the non destructive testing of materials. The activities of the group (from 1988-1990) have resulted in the submission of a patent for a laser device, publication of many research paper sin local and overseas journals and conference proceedings, completion of 1 Ph.D. dissertation and 6 M. Phil theses. Currently (1991), a total of 3 Ph.D., 6 M. Phil research programmes are involved in this research and development programme

  12. Holmium:YAG laser effects on articular cartilage metabolism: in vitro

    Science.gov (United States)

    Smith, R. Lane; Montgomery, L.; Fanton, G.; Dillingham, M.; Schurman, D. J.

    1994-09-01

    We report effects of applying variable doses of Holmium:YAG laser energy to bovine articular cartilage in vitro. The response of the cartilage to the Holmium:YAG laser energy was determined by quantification of cell proliferation and extracellular matrix glycosaminoglycan synthesis. This study demonstrates that articular cartilage cell metabolism was maintained at a normal level following treatment of cartilage at a dose of 0.6 joules/pulse. The laser energy was applied at 10 Hz for 10 seconds at 1 mm distance from the cartilage. Under these conditions and at a dose of 0.6 joules/pulse, the total energy density was calculated to be 240 joules/cm2, assuming minimal loss of energy due to water absorption. Energy levels grater than 0.8 joules/pulse corresponding to calculated energy densities greater than 320 joules/cm2 proved harmful to cartilage. Our data demonstrate that low levels of Holmium:YAG laser energy can be applied to articular cartilage under conditions that maintain and/or stimulate cell metabolism.

  13. Internetting tactical security sensor systems

    Science.gov (United States)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control

  14. Carbon nanotube formation by laser direct writing

    International Nuclear Information System (INIS)

    Wu, Y.-T.; Su, H.-C.; Tsai, C.-M.; Liu, K.-L.; Chen, G.-D.; Huang, R.-H.; Yew, T.-R.

    2008-01-01

    This letter presents carbon nanotube (CNT) formation by laser direct writing using 248 nm KrF excimer pulsed laser in air at room temperature, which was applied to irradiate amorphous carbon (a-C) assisted by Ni catalysts underneath for the transformation of carbon species into CNTs. The CNTs were synthesized under appropriate combination of laser energy density and a-C thickness. The growth mechanism and key parameters to determine the success of CNT formation were also discussed. The demonstration of the CNT growth by laser direct writing in air at room temperature opens an opportunity of in-position CNT formation at low temperatures

  15. Laser speckle decorrelation for fingerprint acquisition

    International Nuclear Information System (INIS)

    Schirripa Spagnolo, Giuseppe; Cozzella, Lorenzo

    2012-01-01

    Biometry is gaining popularity as a physical security approach in situations where a high level of security is necessary. Currently, biometric solutions are embedded in a very large and heterogeneous group of applications. One of the most sensible is for airport security access to boarding gates. More airports are introducing biometric solutions based on face, fingerprint or iris recognition for passenger identification. In particular, fingerprints are the most widely used biometric, and they are mandatorily included in electronic identification documents. One important issue, which is difficult to address in traditional fingerprint acquisition systems, is preventing contact between subsequent users; sebum, which can be a potential vector for contagious diseases. Currently, non-contact devices are used to overcome this problem. In this paper, a new contact device based on laser speckle decorrelation is presented. Our system has the advantage of being compact and low-cost compared with an actual contactless system, allowing enhancement of the sebum pattern imaging contrast in a simple and low-cost way. Furthermore, it avoids the spreading of contagious diseases. (paper)

  16. AP1000 Design for Security

    International Nuclear Information System (INIS)

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-01-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  17. Security and efficiency data sharing scheme for cloud storage

    International Nuclear Information System (INIS)

    Han, Ke; Li, Qingbo; Deng, Zhongliang

    2016-01-01

    With the adoption and diffusion of data sharing paradigm in cloud storage, there have been increasing demands and concerns for shared data security. Ciphertext Policy Attribute-Based Encryption (CP-ABE) is becoming a promising cryptographic solution to the security problem of shared data in cloud storage. However due to key escrow, backward security and inefficiency problems, existing CP-ABE schemes cannot be directly applied to cloud storage system. In this paper, an effective and secure access control scheme for shared data is proposed to solve those problems. The proposed scheme refines the security of existing CP-ABE based schemes. Specifically, key escrow and conclusion problem are addressed by dividing key generation center into several distributed semi-trusted parts. Moreover, secrecy revocation algorithm is proposed to address not only back secrecy but efficient problem in existing CP-ABE based scheme. Furthermore, security and performance analyses indicate that the proposed scheme is both secure and efficient for cloud storage.

  18. Acousto-optic replication of ultrashort laser pulses

    Science.gov (United States)

    Yushkov, Konstantin B.; Molchanov, Vladimir Ya.; Ovchinnikov, Andrey V.; Chefonov, Oleg V.

    2017-10-01

    Precisely controlled sequences of ultrashort laser pulses are required in various scientific and engineering applications. We developed a phase-only acousto-optic pulse shaping method for replication of ultrashort laser pulses in a TW laser system. A sequence of several Fourier-transform-limited pulses is generated from a single femtosecond laser pulse by means of applying a piecewise linear phase modulation over the whole emission spectrum. Analysis demonstrates that the main factor which limits maximum delay between the pulse replicas is spectral resolution of the acousto-optic dispersive delay line used for pulse shaping. In experiments with a Cr:forsterite laser system, we obtained delays from 0.3 to 3.5 ps between two replicas of 190 fs transform-limited pulses at the central wavelength of laser emission, 1230 nm.

  19. Security analysis of Microsoft RMS

    Directory of Open Access Journals (Sweden)

    Joanna Dmitruk

    2017-12-01

    Full Text Available Microsoft Rights Management Services (RMS is a system designed to ensure the protection and proper use of electronic documents. RMS allows to apply different access policies for documents, thus allowing to control their use in time. The system allows not only defining access policies at document creation, but also after its distribution. Microsoft RMS uses a number of advanced cryptographic mechanisms and primitives to ensure overall service security. In this paper, we have analyzed the security of RMS, indicating a number of possible gaps. The methods of solving those problems, especially those related to data integrity, have been proposed. Keywords: DRM, cryptography, cryptanalysis, RMS, Microsoft

  20. Laser induced magnetization switching in a TbFeCo ferrimagnetic thin film: discerning the impact of dipolar fields, laser heating and laser helicity by XPEEM

    International Nuclear Information System (INIS)

    Gierster, L.; Ünal, A.A.; Pape, L.; Radu, F.; Kronast, F.

    2015-01-01

    We investigate laser induced magnetic switching in a ferrimagnetic thin film of Tb_2_2Fe_6_9Co_9 by PEEM. Using a small laser beam with a spot size of 3–5 µm in diameter in combination with high resolution magnetic soft X-ray microscopy we are able to discriminate between different effects that govern the microscopic switching process, namely the influence of the laser heating, of the helicity dependent momentum transfer, and of the dipolar coupling. Applying a sequence of femtosecond laser pulses to a previously saturated TbFeCo film leads to the formation of ring shaped magnetic structures in which all three effects can be observed. Laser helicity assisted switching is only observed in a narrow region within the Gaussian profile of the laser spot. Whereas in the center of the laser spot we find clear evidence for thermal demagnetization and in the outermost areas magnetic switching is determined by dipolar coupling with the surrounding film. Our findings demonstrate that by reducing the laser spot size the influence of dipolar coupling on laser induced switching is becoming increasingly important. - Highlights: • With a new PEEM sample holder a laser spot size of 3–5 µm in diameter is reached. • Spatial resolved imaging of laser induced magnetization reversal. • A single femtosecond laser pulse leads to a multi-domain state in TbFeCo. • A pulse sequence results in a ring-shaped magnetic pattern caused by dipolar fields. • Laser helicity dependent effects appear only in a narrow fluence region.

  1. E-Commerce and Security Governance in Developing Countries

    Science.gov (United States)

    Sanayei, Ali.; Rajabion, Lila

    Security is very often mentioned as one of the preconditions for the faster growth of e-commerce. Without a secure and reliable internet, customer will continue to be reluctant to provide confidential information online, such as credit card number. Moreover, organizations of all types and sizes around the world rely heavily on technologies of electronic commerce (e-commerce) for conducting their day-to-day business transaction. Providing organizations with a secure e-commerce environment is a major issue and challenging one especially in Middle Eastern countries. Without secure e-commerce, it is almost impossible to take advantage of the opportunities offered by e-commerce technologies. E-commerce can create opportunities for small entrepreneurs in Middle Eastern countries. This requires removing infrastructure blockages in telecommunications and logistics alongside the governance of e-commerce with policies on consumer protection, security of transactions, privacy of records and intellectual property. In this paper, we will explore the legal implications of e-commerce security governance by establishing who is responsible for ensuring compliance with this discipline, demonstrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline. Our main focus will be on analyzing the importance and implication of e-commerce security governance in developing countries.

  2. Solid state laser technology - A NASA perspective

    Science.gov (United States)

    Allario, F.

    1985-01-01

    NASA's program for developing solid-state laser technology and applying it to the Space Shuttle and Space Platform is discussed. Solid-state lasers are required to fulfill the Earth Observation System's requirements. The role of the Office of Aeronautics and Space Technology in developing a NASA tunable solid-state laser program is described. The major goals of the program involve developing a solid-state pump laser in the green, using AlGaAs array technology, pumping a Nd:YAG/SLAB crystal or glass, and fabricating a lidar system, with either a CO2 laser at 10.6 microns or a Nd:YAG laser at 1.06 microns, to measure tropospheric winds to an accuracy of + or - 1 m/s and a vertical resolution of 1 km. The procedures to be followed in order to visualize this technology plan include: (1) material development and characterization, (2) laser development, and (3) implementation of the lasers.

  3. Laser doppler velocimetry and confined flows

    Directory of Open Access Journals (Sweden)

    Ilić Jelena T.

    2017-01-01

    Full Text Available Finding the mode, in which two component laser Doppler velocimetry can be applied to flows confined in cylindrical tubes or vessels, was the aim of this study. We have identified principle issues that influence the propagation of laser beams in laser Doppler velocimetry system, applied to flow confined in cylindrical tube. Among them, the most important are influences of fluid and wall refractive indices, wall thickness and internal radius ratio and beam intersection angle. In analysis of the degrees of these influences, we have applied mathematical model, based on geometrical optics. The separation of measurement volumes, that measure different velocity components, has been recognized as the main drawback. To overcome this, we propose a lens with dual focal length – primary focal length for the measurement of one velocity component and secondary focal length for the measurement of the other velocity component. We present here the procedure for calculating the optimal value of secondary focal length, depending on experimental set-up parameters. The mathematical simulation of the application of the dual focal length lens, for chosen cases presented here, confirmed the accuracy of the proposed procedure.

  4. Laser-induced breakdown spectroscopy applied to the characterization of rock by support vector machine combined with principal component analysis

    International Nuclear Information System (INIS)

    Yang Hong-Xing; Fu Hong-Bo; Wang Hua-Dong; Jia Jun-Wei; Dong Feng-Zhong; Sigrist, Markus W

    2016-01-01

    Laser-induced breakdown spectroscopy (LIBS) is a versatile tool for both qualitative and quantitative analysis. In this paper, LIBS combined with principal component analysis (PCA) and support vector machine (SVM) is applied to rock analysis. Fourteen emission lines including Fe, Mg, Ca, Al, Si, and Ti are selected as analysis lines. A good accuracy (91.38% for the real rock) is achieved by using SVM to analyze the spectroscopic peak area data which are processed by PCA. It can not only reduce the noise and dimensionality which contributes to improving the efficiency of the program, but also solve the problem of linear inseparability by combining PCA and SVM. By this method, the ability of LIBS to classify rock is validated. (paper)

  5. A Proven Methodology for Developing Secure Software and Applying It to Ground Systems

    Science.gov (United States)

    Bailey, Brandon

    2016-01-01

    Part Two expands upon Part One in an attempt to translate the methodology for ground system personnel. The goal is to build upon the methodology presented in Part One by showing examples and details on how to implement the methodology. Section 1: Ground Systems Overview; Section 2: Secure Software Development; Section 3: Defense in Depth for Ground Systems; Section 4: What Now?

  6. Formation of laser-induced periodic surface structures on niobium by femtosecond laser irradiation

    International Nuclear Information System (INIS)

    Pan, A.; Dias, A.; Gomez-Aranzadi, M.; Olaizola, S. M.; Rodriguez, A.

    2014-01-01

    The surface morphology of a Niobium sample, irradiated in air by a femtosecond laser with a wavelength of 800 nm and pulse duration of 100 fs, was examined. The period of the micro/nanostructures, parallel and perpendicularly oriented to the linearly polarized fs-laser beam, was studied by means of 2D Fast Fourier Transform analysis. The observed Laser-Induced Periodic Surface Structures (LIPSS) were classified as Low Spatial Frequency LIPSS (periods about 600 nm) and High Spatial Frequency LIPSS, showing a periodicity around 300 nm, both of them perpendicularly oriented to the polarization of the incident laser wave. Moreover, parallel high spatial frequency LIPSS were observed with periods around 100 nm located at the peripheral areas of the laser fingerprint and overwritten on the perpendicular periodic gratings. The results indicate that this method of micro/nanostructuring allows controlling the Niobium grating period by the number of pulses applied, so the scan speed and not the fluence is the key parameter of control. A discussion on the mechanism of the surface topology evolution was also introduced

  7. Formation of laser-induced periodic surface structures on niobium by femtosecond laser irradiation

    Energy Technology Data Exchange (ETDEWEB)

    Pan, A.; Dias, A.; Gomez-Aranzadi, M.; Olaizola, S. M. [CIC microGUNE, Goiru Kalea 9 Polo Innovación Garaia, 20500 Arrasate-Mondragón (Spain); CEIT-IK4 and Tecnun, University of Navarra, Manuel Lardizábal 15, 20018 San Sebastián (Spain); Rodriguez, A. [CIC microGUNE, Goiru Kalea 9 Polo Innovación Garaia, 20500 Arrasate-Mondragón (Spain)

    2014-05-07

    The surface morphology of a Niobium sample, irradiated in air by a femtosecond laser with a wavelength of 800 nm and pulse duration of 100 fs, was examined. The period of the micro/nanostructures, parallel and perpendicularly oriented to the linearly polarized fs-laser beam, was studied by means of 2D Fast Fourier Transform analysis. The observed Laser-Induced Periodic Surface Structures (LIPSS) were classified as Low Spatial Frequency LIPSS (periods about 600 nm) and High Spatial Frequency LIPSS, showing a periodicity around 300 nm, both of them perpendicularly oriented to the polarization of the incident laser wave. Moreover, parallel high spatial frequency LIPSS were observed with periods around 100 nm located at the peripheral areas of the laser fingerprint and overwritten on the perpendicular periodic gratings. The results indicate that this method of micro/nanostructuring allows controlling the Niobium grating period by the number of pulses applied, so the scan speed and not the fluence is the key parameter of control. A discussion on the mechanism of the surface topology evolution was also introduced.

  8. Laser surface treatment of grey cast iron for automotive applications

    NARCIS (Netherlands)

    Ocelik, V.; Tang, P.N.; de Boer, M.C.; de Oliveira, U.; de Hosson, J.T.M.; DeHosson, JTM; Brebbia, CA; Nishida, SI

    2005-01-01

    The surface of pearlitic grey cast iron was treated using a 2 kW Nd:YAG laser beam with the final aim to improve its surface properties, mainly for automotive applications. Two kinds of laser surface treatments were experimentally applied. In the laser surface hardening approach the surface of cast

  9. Nuclear non-proliferation and security culture within EDF nuclear fleet

    International Nuclear Information System (INIS)

    Debes, M.

    2013-01-01

    This document describes the nuclear non-proliferation strategy and the safety culture of EDF. The author lists all the mandatory rules and regulations at international and national levels EDF has to comply with. All these requirements are applied in EDF nuclear facilities through adequate procedures that assure a nuclear material accountancy, a follow-up of any item containing nuclear material in the facility, and internal controls. External independent controls are also performed. The EDF security policy goal is to protect human, material and knowledge assets, and to preserve operational capacity, competitiveness and public confidence, within national regulatory framework and regulation on 'vital importance facilities'. The treatment of events or incident (detection, analysis, lessons drawn, experience feedback) is a tool to progress, along with reporting, internal control process and audits. The security requirements cover the different related domains important to EDF industrial assets: security of employees against assaults; security of data according to their sensibility level; security of the information system and telecom; awareness and training of employees; relations with external suppliers or contractors; business premises; security of staff and projects abroad. For industrial facilities and grids (facilities of 'vital importance'...), the defense in depth principles are applied against the different threat scenarios. Security measures are studied at the design stage in a consistent way with nuclear safety measures, while taking into account the protective means deployed by public authorities. These risk analysis are periodically reassessed. The paper is followed by the slides of the presentation. (A.C.)

  10. Main Issues in Big Data Security

    Directory of Open Access Journals (Sweden)

    Julio Moreno

    2016-09-01

    Full Text Available Data is currently one of the most important assets for companies in every field. The continuous growth in the importance and volume of data has created a new problem: it cannot be handled by traditional analysis techniques. This problem was, therefore, solved through the creation of a new paradigm: Big Data. However, Big Data originated new issues related not only to the volume or the variety of the data, but also to data security and privacy. In order to obtain a full perspective of the problem, we decided to carry out an investigation with the objective of highlighting the main issues regarding Big Data security, and also the solutions proposed by the scientific community to solve them. In this paper, we explain the results obtained after applying a systematic mapping study to security in the Big Data ecosystem. It is almost impossible to carry out detailed research into the entire topic of security, and the outcome of this research is, therefore, a big picture of the main problems related to security in a Big Data system, along with the principal solutions to them proposed by the research community.

  11. 31 CFR 356.32 - What tax rules apply?

    Science.gov (United States)

    2010-07-01

    ... political subdivision of a State, except for State estate or inheritance taxes and other exceptions as... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What tax rules apply? 356.32 Section...) Miscellaneous Provisions § 356.32 What tax rules apply? (a) General. Securities issued under this part are...

  12. Laser shock wave and its applications

    Science.gov (United States)

    Yang, Chaojun; Zhang, Yongkang; Zhou, Jianzhong; Zhang, Fang; Feng, Aixin

    2007-12-01

    The technology of laser shock wave is used to not only surface modification but also metal forming. It can be divided into three parts: laser shock processing, laser shock forming (LSF) and laser peenforming(LPF). Laser shock processing as a surface treatment to metals can make engineering components have a residual compressive stress so that it obviously improves their fatigue strength and stress corrosion performances, while laser shock forming (LSF) is a novel technique that is used in plastic deformation of sheet metal recently and Laser peen forming (LPF) is another new sheet metal forming process presented in recent years. They all can be carried out by a high-power and repetition pulse Nd:Glass laser device made by Jiangsu University. Laser shock technology has characterized of ultrahigh pressure and high strain rate (10 6 - 10 7s -1). Now, for different materials, we are able to form different metals to contours and shapes and simultaneity leave their surfaces in crack-resistant compressive stress state. The results show that the technology of laser shock wave can strengthen surface property and prolong fatigue life and especially can deform metals to shapes that could not be adequately made using conventional methods. With the development of the technology of laser shock wave, the applied fields of laser will become greater and greater.

  13. Transurethral laser therapy of tumours of the bladder

    International Nuclear Information System (INIS)

    Noeske, H.D.; Rothauge, C.F.; Kraushaar, J.

    1979-01-01

    Surgical treatment of tumours of the bladder is still not generally accepted, and its results are unsatisfactory. To ameliorate this situation, the new energy source of laser is now being tested in transurethral treatment. There are several groups of scientists who study the use of lasers suited for human medicine: CO 2 laser (Tel Aviv), YAG neodymium laser (Munich), and argon laser (Giessen). In the urological university hospital at Giessen, where a human bladder carcinoma received laser treatment for the first time in the world in 1976, 45 argon laser operations on 38 patients are investigated. There were 37 bladder tumours of different stages and one haemangioma. Laser monotherapy was applied in 11 cases. The bulk of the cases, however, was treated by combined electro-laser-surgical treatment where the tumour bed and its immediate neighbourhood were irradiated after TUR. The results do not give a satisfactory answer as to the therapeutic value of laser. Advantages over TUR will probably be purely technical. (orig.) [de

  14. Femtosecond lasers for microsurgery of cornea

    International Nuclear Information System (INIS)

    Vartapetov, Sergei K; Khudyakov, D V; Lapshin, Konstantin E; Obidin, Aleksei Z; Shcherbakov, Ivan A

    2012-01-01

    The review of femtosecond laser installations for medical applications is given and a new femtosecond ophthalmologic system for creation of a flap of corneal tissue during the LASIK operation is described. An all-fibre femtosecond laser emitting ∼400-fs pulses at 1067 nm is used. The pulse repetition rate can vary from 200 kHz up to 1 MHz. The output energy of the femtosecond system does not exceed 1 μJ. A specially developed objective with small spherical and chromatic aberrations is applied to focus laser radiation to an area of an eye cornea. The size of the focusing spot does not exceed 3 μm. To process the required area, scanning by a laser beam is applied with a speed no less than 5 m s -1 . At a stage of preliminary tests of the system, the Κ8 glass, organic PMMA glass and specially prepared agarose gels are used as a phantom of an eye. The femtosecond system is successfully clinically tested on a plenty of eyes of a pig and on several human eyes. The duration of the procedure of creation of a corneal flap does not exceed 20 s.

  15. Femtosecond lasers for microsurgery of cornea

    Energy Technology Data Exchange (ETDEWEB)

    Vartapetov, Sergei K; Khudyakov, D V; Lapshin, Konstantin E; Obidin, Aleksei Z; Shcherbakov, Ivan A

    2012-03-31

    The review of femtosecond laser installations for medical applications is given and a new femtosecond ophthalmologic system for creation of a flap of corneal tissue during the LASIK operation is described. An all-fibre femtosecond laser emitting {approx}400-fs pulses at 1067 nm is used. The pulse repetition rate can vary from 200 kHz up to 1 MHz. The output energy of the femtosecond system does not exceed 1 {mu}J. A specially developed objective with small spherical and chromatic aberrations is applied to focus laser radiation to an area of an eye cornea. The size of the focusing spot does not exceed 3 {mu}m. To process the required area, scanning by a laser beam is applied with a speed no less than 5 m s{sup -1}. At a stage of preliminary tests of the system, the {Kappa}8 glass, organic PMMA glass and specially prepared agarose gels are used as a phantom of an eye. The femtosecond system is successfully clinically tested on a plenty of eyes of a pig and on several human eyes. The duration of the procedure of creation of a corneal flap does not exceed 20 s.

  16. 76 FR 75829 - Treasury Inflation-Protected Securities Issued at a Premium

    Science.gov (United States)

    2011-12-05

    ... Treasury Inflation-Protected Securities Issued at a Premium AGENCY: Internal Revenue Service (IRS... IRS is issuing temporary regulations that provide guidance on the tax treatment of Treasury Inflation....1275-7(d) applies to Treasury Inflation-Protected Securities (TIPS) issued with more than a de minimis...

  17. Secure communications with low-orbit spacecraft using quantum cryptography

    Science.gov (United States)

    Hughes, Richard J.; Buttler, William T.; Kwiat, Paul G.; Luther, Gabriel G.; Morgan, George L; Nordholt, Jane E.; Peterson, Charles G.; Simmons, Charles M.

    1999-01-01

    Apparatus and method for secure communication between an earth station and spacecraft. A laser outputs single pulses that are split into preceding bright pulses and delayed attenuated pulses, and polarized. A Pockels cell changes the polarization of the polarized delayed attenuated pulses according to a string of random numbers, a first polarization representing a "1," and a second polarization representing a "0." At the receiving station, a beamsplitter randomly directs the preceding bright pulses and the polarized delayed attenuated pulses onto longer and shorter paths, both terminating in a beamsplitter which directs the preceding bright pulses and a first portion of the polarized delayed attenuated pulses to a first detector, and a second portion of the polarized delayed attenuated pulses to a second detector to generate a key for secure communication between the earth station and the spacecraft.

  18. Risk assessment for sustainable food security in China according to integrated food security--taking Dongting Lake area for example.

    Science.gov (United States)

    Qi, Xiaoxing; Liu, Liming; Liu, Yabin; Yao, Lan

    2013-06-01

    Integrated food security covers three aspects: food quantity security, food quality security, and sustainable food security. Because sustainable food security requires that food security must be compatible with sustainable development, the risk assessment of sustainable food security is becoming one of the most important issues. This paper mainly focuses on the characteristics of sustainable food security problems in the major grain-producing areas in China. We establish an index system based on land resources and eco-environmental conditions and apply a dynamic assessment method based on status assessments and trend analysis models to overcome the shortcomings of the static evaluation method. Using fuzzy mathematics, the risks are categorized into four grades: negligible risk, low risk, medium risk, and high risk. A case study was conducted in one of China's major grain-producing areas: Dongting Lake area. The results predict that the status of the sustainable food security in the Dongting Lake area is unsatisfactory for the foreseeable future. The number of districts at the medium-risk range will increase from six to ten by 2015 due to increasing population pressure, a decrease in the cultivated area, and a decrease in the effective irrigation area. Therefore, appropriate policies and measures should be put forward to improve it. The results could also provide direct support for an early warning system-which could be used to monitor food security trends or nutritional status so to inform policy makers of impending food shortages-to prevent sustainable food security risk based on some classical systematic methods. This is the first research of sustainable food security in terms of risk assessment, from the perspective of resources and the environment, at the regional scale.

  19. Applications Of Laser Processing For Automotive Manufacturing In Japan

    Science.gov (United States)

    Ito, Masashi; Ueda, Katsuhiko; Takagi, Soya

    1986-11-01

    Recently in Japan, laser processing is increasingly being employed for production, so that laser cutting, laser welding and other laser material processing have begun to be used in various industries. As a result, the number of lasers sold has been increasing year by year in Japan. In the Japanese automotive industry, a number applications have been introduced in laboratories and production lines. In this paper, several current instances of such laser applications will be introduced. In the case of welding, studies have been conducted on applying laser welding to automatic transmission components, in place of electron beam welding. Another example of application, the combination of lasers and robots to form highly flexible manufacturing systems, has been adopted for trimming steel panel and plastic components.

  20. The Design and Realization of Household Intelligent Security System

    Directory of Open Access Journals (Sweden)

    Huang Sheng-Bo

    2016-01-01

    Full Text Available It is known that Smart home has brought great convenience to the lives of humans. However, we have attached quantities of interest in its security as the development of technology goes on. According to the security requirements at the moment, we introduce the scheme of smart home security system based on ZigBee, and design system hardware and software process. By applying a STC89C52 microcontroller, our system is able to accurately detect and give alarms automatically to house fire, harmful gases and thefts.

  1. Nanosecond-laser induced crosstalk of CMOS image sensor

    Science.gov (United States)

    Zhu, Rongzhen; Wang, Yanbin; Chen, Qianrong; Zhou, Xuanfeng; Ren, Guangsen; Cui, Longfei; Li, Hua; Hao, Daoliang

    2018-02-01

    The CMOS Image Sensor (CIS) is photoelectricity image device which focused the photosensitive array, amplifier, A/D transfer, storage, DSP, computer interface circuit on the same silicon substrate[1]. It has low power consumption, high integration,low cost etc. With large scale integrated circuit technology progress, the noise suppression level of CIS is enhanced unceasingly, and its image quality is getting better and better. It has been in the security monitoring, biometrice, detection and imaging and even military reconnaissance and other field is widely used. CIS is easily disturbed and damaged while it is irradiated by laser. It is of great significance to study the effect of laser irradiation on optoelectronic countermeasure and device for the laser strengthening resistance is of great significance. There are some researchers have studied the laser induced disturbed and damaged of CIS. They focused on the saturation, supersaturated effects, and they observed different effects as for unsaturation, saturation, supersaturated, allsaturated and pixel flip etc. This paper research 1064nm laser interference effect in a typical before type CMOS, and observring the saturated crosstalk and half the crosstalk line. This paper extracted from cmos devices working principle and signal detection methods such as the Angle of the formation mechanism of the crosstalk line phenomenon are analyzed.

  2. Medium-Level Laser in Chronic Tinnitus Treatment

    OpenAIRE

    Dejakum, K.; Piegger, J.; Plewka, C.; Gunkel, A.; Thumfart, W.; Kudaibergenova, S.; Goebel, G.; Kral, F.; Freysinger, W.

    2013-01-01

    The purpose of this study was to evaluate the effect of medium-level laser therapy in chronic tinnitus treatment. In a prospective double-blind placebo-controlled trial, either active laser (450 mW, 830 nm combined Ga-Al-As diode laser) or placebo irradiation was applied through the external acoustic meatus of the affected ear towards the cochlea. Fourty-eight patients with chronic tinnitus were studied. The main outcome was measured using the Goebel tinnitus questionnaire, visual analogue sc...

  3. Calculation and optimization of laser acceleration in vacuum

    Directory of Open Access Journals (Sweden)

    Z. Huang

    2004-01-01

    Full Text Available Extraordinarily high fields generated by focused lasers are envisioned to accelerate particles to high energies. In this paper, we develop a new method to calculate laser acceleration in vacuum based on the energy exchange arising from the interference of the laser field with the radiation field of the particle. We apply this method to a simple accelerating structure, a perfectly conducting screen with a round hole, and show how to optimize the energy gain with respect to the hole radius, laser angle, and spot size, as well as the transverse profile of the laser. Limitations and energy scaling of this acceleration method are also discussed.

  4. Proton radiography using highpower femtosecond laser

    International Nuclear Information System (INIS)

    Choi, Chang Il

    2010-08-01

    A femtosecond laser emits pulses whose width is between few and few hundreds femtoseconds (10 -15 s). The production mechanism of the high energy protons generated by the femtosecond laser is not clear so far, but the technologies have been improving. The applications using the generated protons are the proton therapy, proton radiography, nuclear physics, security inspection, and so on. Especially in the radiography, the laser-generated protons are very useful to obtain high quality images of thin objects, because protons are able to penetrate an object following an almost straight path and give a depth distribution information of various elements in a subject. Since the laser-driven protons require lower cost and smaller facility than accelerator-based protons, the radiography using laser-driven protons have been of interest. In this research, we have performed the radiography experiments by using protons generated by the 100 TW titanium sapphire femtosecond laser facility of Advanced Photonics Research Institute (APRI) of Gwangju Institute of Science Technology (GIST). A CR-39 Solid State Nuclear Track Detector (SSNTD) has been used as radiography screen. The radiography digital images have been obtained by using an optical microscope and a CCD camera. Modulation Transfer Function (MTF) has been derived from analyzing the obtained images, and the spatial resolution of the images have been evaluated. And, we have performed the radiography experiments of monoenergetic proton from the Tandem Van de Graaff accelerator of Korea Institute of Geoscience and Mineral Resources (KIGAM). We have obtained and compared the radiography images from other proton production methods which are the laser and the accelerator, respectively. And also, we have found out the optimized chemical etching condition, in order to improve the spatial resolution of the radiography images. Finally, the evaluated maximum spatial resolution of the images are 2.09 μm

  5. Food Security Framings within the UK and the Integration of Local Food Systems

    Science.gov (United States)

    Kirwan, James; Maye, Damian

    2013-01-01

    This paper provides a critical interpretation of food security politics in the UK. It applies the notion of food security collective action frames to assess how specific action frames are maintained and contested. The interdependency between scale and framing in food security discourse is also scrutinised. It does this through an examination of…

  6. Evaluation of the standard normal variate method for Laser-Induced Breakdown Spectroscopy data treatment applied to the discrimination of painting layers

    Science.gov (United States)

    Syvilay, D.; Wilkie-Chancellier, N.; Trichereau, B.; Texier, A.; Martinez, L.; Serfaty, S.; Detalle, V.

    2015-12-01

    Nowadays, Laser-Induced Breakdown Spectroscopy (LIBS) is frequently used for in situ analyses to identify pigments from mural paintings. Nonetheless, in situ analyses require a robust instrumentation in order to face to hard experimental conditions. This may imply variation of fluencies and thus inducing variation of LIBS signal, which degrades spectra and then results. Usually, to overcome these experimental errors, LIBS signal is processed. Signal processing methods most commonly used are the baseline subtraction and the normalization by using a spectral line. However, the latter suggests that this chosen element is a constant component of the material, which may not be the case in paint layers organized in stratigraphic layers. For this reason, it is sometimes difficult to apply this normalization. In this study, another normalization will be carried out to throw off these signal variations. Standard normal variate (SNV) is a normalization designed for these conditions. It is sometimes implemented in Diffuse Reflectance Infrared Fourier Transform Spectroscopy and in Raman Spectroscopy but rarely in LIBS. The SNV transformation is not newly applied on LIBS data, but for the first time the effect of SNV on LIBS spectra was evaluated in details (energy of laser, shot by shot, quantification). The aim of this paper is the quick visualization of the different layers of a stratigraphic painting sample by simple data representations (3D or 2D) after SNV normalization. In this investigation, we showed the potential power of SNV transformation to overcome undesired LIBS signal variations but also its limit of application. This method appears as a promising way to normalize LIBS data, which may be interesting for in-situ depth analyses.

  7. Short-wavelength soft-x-ray laser pumped in double-pulse single-beam non-normal incidence

    International Nuclear Information System (INIS)

    Zimmer, D.; Ros, D.; Guilbaud, O.; Habib, J.; Kazamias, S.; Zielbauer, B.; Bagnoud, V.; Ecker, B.; Aurand, B.; Kuehl, T.; Hochhaus, D. C.; Neumayer, P.

    2010-01-01

    We demonstrated a 7.36 nm Ni-like samarium soft-x-ray laser, pumped by 36 J of a neodymium:glass chirped-pulse amplification laser. Double-pulse single-beam non-normal-incidence pumping was applied for efficient soft-x-ray laser generation. In this case, the applied technique included a single-optic focusing geometry for large beam diameters, a single-pass grating compressor, traveling-wave tuning capability, and an optimized high-energy laser double pulse. This scheme has the potential for even shorter-wavelength soft-x-ray laser pumping.

  8. Act of 4 August 1955 concerning State Security in the Nuclear Field

    International Nuclear Information System (INIS)

    1955-01-01

    This Act governing State security in the nuclear field lays down that the King may determine the security measures to be complied with concerning nuclear research, materials, methods of production used by establishments and legal or physical persons having in their possession information, documents or material obtained either directly from the Government or with its consent. The Act was supplemented by Royal Order of 14 March 1956 which amplified its provisions by laying down specific requirements regarding the classification of information and material, the security measures to be applied thereto, and to establishments involved in related research work. It also provides for the security clearance to be applied to persons who shall be authorised to obtain such information and classified material. A Royal Order of 18 October 1974 amends this Order in respect of the authorities responsible for its implementation. (NEA) [fr

  9. Nuclear security standard: Argentina approach

    International Nuclear Information System (INIS)

    Bonet Duran, Stella M.; Rodriguez, Carlos E.; Menossi, Sergio A.; Serdeiro, Nelida H.

    2007-01-01

    Argentina has a comprehensive regulatory system designed to assure the security and safety of radioactive sources, which has been in place for more than fifty years. In 1989 the Radiation Protection and Nuclear Safety branch of the National Atomic Energy Commission created the 'Council of Physical Protection of Nuclear Materials and Installations' (CAPFMIN). This Council published in 1992 a Physical Protection Standard based on a deep and careful analysis of INFCIRC 225/Rev.2 including topics like 'sabotage scenario'. Since then, the world's scenario has changed, and some concepts like 'design basis threat', 'detection, delay and response', 'performance approach and prescriptive approach', have been applied to the design of physical protection systems in facilities other than nuclear installations. In Argentina, radioactive sources are widely used in medical and industrial applications with more than 1,600 facilities controlled by the Nuclear Regulatory Authority (in spanish ARN). During 2005, measures like 'access control', 'timely detection of intruder', 'background checks', and 'security plan', were required by ARN for implementation in facilities with radioactive sources. To 'close the cycle' the next step is to produce a regulatory standard based on the operational experience acquired during 2005. ARN has developed a set of criteria for including them in a new standard on security of radioactive materials. Besides, a specific Regulatory Guide is being prepared to help licensees of facilities in design a security system and to fulfill the 'Design of Security System Questionnaire'. The present paper describes the proposed Standard on Security of Radioactive Sources and the draft of the Nuclear Security Regulatory Guidance, based on our regulatory experience and the latest international recommendations. (author)

  10. Remote sensing with laser spectrum radar

    Science.gov (United States)

    Wang, Tianhe; Zhou, Tao; Jia, Xiaodong

    2016-10-01

    The unmanned airborne (UAV) laser spectrum radar has played a leading role in remote sensing because the transmitter and the receiver are together at laser spectrum radar. The advantages of the integrated transceiver laser spectrum radar is that it can be used in the oil and gas pipeline leak detection patrol line which needs the non-contact reflective detection. The UAV laser spectrum radar can patrol the line and specially detect the swept the area are now in no man's land because most of the oil and gas pipelines are in no man's land. It can save labor costs compared to the manned aircraft and ensure the safety of the pilots. The UAV laser spectrum radar can be also applied in the post disaster relief which detects the gas composition before the firefighters entering the scene of the rescue.

  11. Comparative study between thulium laser (Tm: YAG) 150W and greenlight laser (LBO:ND-YAG) 120W for the treatment of benign prostatic hyperpplasia: Short-term efficacy and security.

    Science.gov (United States)

    Palmero-Martí, J L; Panach-Navarrete, J; Valls-González, L; Ganau-Ituren, A; Miralles-Aguado, J; Benedicto-Redón, A

    2017-04-01

    To compare the results of efficacy and safety of Thulium laser 150W against Greenlight laser 120W in the treatment of short term benign prostatic hyperplasia (12 months after surgery). This is a retrospective observational study where men who underwent the surgical technique of prostate vaporization over a period of four years in our center are included. The homogeneity of the sample was checked, and postoperative complications (acute urinary retention, reentry, need for transfusion), failures per year of surgery (reoperation, peak flow .05). No differences in complications were observed: in urine acute retention, 4.3% with thulium and 6.8% with green laser (P=.41); in readmissions, 2.6% with thulium and 1.7% with green laser (P=.68); in need for transfusion, 2.6% with thulium and 0% with green laser (P=.12). No differences were observed in the percentage of patients reoperation (1.7% in the group of thulium, 5.1% in the green laser, P=.28); or in individuals with Qmáx less than 15ml/sec (6.9% with thulium, 6.77% with green laser, P=.75), or in the absence of improvement in the IPSS (5, 2% with thulium, 3.4% with green laser, P=.65). There was also no difference in the levels of PSA in ng/mL a year after surgery: with thulium 2.78±2.09 and with green laser 1.83±1.48 (P=.75). Prostate vaporization with thulium laser 150W is comparable to that made with green laser 120W for the treatment of lower urinary tract symptoms caused by BPH, being both effective and safe techniques to 12 months after surgery. Future prospective randomized studies are needed to confirm this conclusion on both techniques. Copyright © 2016 AEU. Publicado por Elsevier España, S.L.U. All rights reserved.

  12. Characterization of hard coatings produced by laser cladding using laser-induced breakdown spectroscopy technique

    Energy Technology Data Exchange (ETDEWEB)

    Varela, J.A.; Amado, J.M.; Tobar, M.J.; Mateo, M.P.; Yañez, A.; Nicolas, G., E-mail: gines@udc.es

    2015-05-01

    Highlights: • Chemical mapping and profiling by laser-induced breakdown spectroscopy (LIBS) of coatings produced by laser cladding. • Production of laser clads using tungsten carbide (WC) and nickel based matrix (NiCrBSi) powders. • Calibration by LIBS of hardfacing alloys with different WC concentrations. - Abstract: Protective coatings with a high abrasive wear resistance can be obtained from powders by laser cladding technique, in order to extend the service life of some industrial components. In this work, laser clad layers of self-fluxing NiCrBSi alloy powder mixed with WC powder have been produced on stainless steel substrates of austenitic type (AISI 304) in a first step and then chemically characterized by laser-induced breakdown spectroscopy (LIBS) technique. With the suitable laser processing parameters (mainly output power, beam scan speed and flow rate) and powders mixture proportions between WC ceramics and NiCrBSi alloys, dense pore free layers have been obtained on single tracks and on large areas with overlapped tracks. The results achieved by LIBS technique and applied for the first time to the analysis of laser clads provided the chemical composition of the tungsten carbides in metal alloy matrix. Different measurement modes (multiple point analyses, depth profiles and chemical maps) have been employed, demonstrating the usefulness of LIBS technique for the characterization of laser clads based on hardfacing alloys. The behavior of hardness can be explained by LIBS maps which evidenced the partial dilution of some WC spheres in the coating.

  13. Security Attributes Based Digital Rights Management

    NARCIS (Netherlands)

    Chong, C.N.; van Buuren, R.; van Buuren, R.F.; Hartel, Pieter H.; Kleinhuis, Geert; Boavida, F.; Monteiro, E.; Orvalho, J.

    2002-01-01

    Most real-life systems delegate responsibilities to different authorities. We apply this model to a digital rights management system, to achieve flexible security. In our model a hierarchy of authorities issues certificates that are linked by cryptographic means. This linkage establishes a chain of

  14. Principles and applications of compact laser-plasma accelerators

    Energy Technology Data Exchange (ETDEWEB)

    Malka, V; Faure, J; Gauduel, Y A; Rousse, A; Faure, J [Ecole Polytech, CNRS, Ecole Nationale Superieure des Techniques Avancees, Lab Optique Appliquee, UMR 7639, 91 - Palaiseau (France); Lefebvre, E [CEA Bruyeres-le-Chatel, Dept. de Physique Theorique et Appliquee, 91 (France)

    2008-06-15

    Rapid progress in the development of high-intensity laser systems has extended our ability to study light-matter interactions far into the relativistic domain, in which electrons are driven to velocities close to the speed of light. As well as being of fundamental interest in their own right, these interactions enable the generation of high-energy particle beams that are short, bright and have good spatial quality. Along with steady improvements in the size, cost and repetition rate of high-intensity lasers, the unique characteristics of laser-driven particle beams are expected to be useful for a wide range of contexts, including proton therapy for the treatment of cancers, materials characterization, radiation-driven chemistry, border security through the detection of explosives, narcotics and other dangerous substances, and of course high-energy particle physics. Here, we review progress that has been made towards realizing such possibilities and the principles that underlie them. (authors)

  15. Principles and applications of compact laser-plasma accelerators

    International Nuclear Information System (INIS)

    Malka, V.; Faure, J.; Gauduel, Y.A.; Rousse, A.; Faure, J.; Lefebvre, E.

    2008-01-01

    Rapid progress in the development of high-intensity laser systems has extended our ability to study light-matter interactions far into the relativistic domain, in which electrons are driven to velocities close to the speed of light. As well as being of fundamental interest in their own right, these interactions enable the generation of high-energy particle beams that are short, bright and have good spatial quality. Along with steady improvements in the size, cost and repetition rate of high-intensity lasers, the unique characteristics of laser-driven particle beams are expected to be useful for a wide range of contexts, including proton therapy for the treatment of cancers, materials characterization, radiation-driven chemistry, border security through the detection of explosives, narcotics and other dangerous substances, and of course high-energy particle physics. Here, we review progress that has been made towards realizing such possibilities and the principles that underlie them. (authors)

  16. Energy security and climate policy. Assessing interactions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-03-28

    World energy demand is surging. Oil, coal and natural gas still meet most global energy needs, creating serious implications for the environment. One result is that CO2 emissions, the principal cause of global warming, are rising. This new study underlines the close link between efforts to ensure energy security and those to mitigate climate change. Decisions on one side affect the other. To optimise the efficiency of their energy policy, OECD countries must consider energy security and climate change mitigation priorities jointly. The book presents a framework to assess interactions between energy security and climate change policies, combining qualitative and quantitative analyses. The quantitative analysis is based on the development of energy security indicators, tracking the evolution of policy concerns linked to energy resource concentration. The 'indicators' are applied to a reference scenario and CO2 policy cases for five case-study countries: The Czech Republic, France, Italy, the Netherlands, and the United Kingdom. Simultaneously resolving energy security and environmental concerns is a key challenge for policy makers today. This study helps chart the course.

  17. Characterization of hard coatings produced by laser cladding using laser-induced breakdown spectroscopy technique

    Science.gov (United States)

    Varela, J. A.; Amado, J. M.; Tobar, M. J.; Mateo, M. P.; Yañez, A.; Nicolas, G.

    2015-05-01

    Protective coatings with a high abrasive wear resistance can be obtained from powders by laser cladding technique, in order to extend the service life of some industrial components. In this work, laser clad layers of self-fluxing NiCrBSi alloy powder mixed with WC powder have been produced on stainless steel substrates of austenitic type (AISI 304) in a first step and then chemically characterized by laser-induced breakdown spectroscopy (LIBS) technique. With the suitable laser processing parameters (mainly output power, beam scan speed and flow rate) and powders mixture proportions between WC ceramics and NiCrBSi alloys, dense pore free layers have been obtained on single tracks and on large areas with overlapped tracks. The results achieved by LIBS technique and applied for the first time to the analysis of laser clads provided the chemical composition of the tungsten carbides in metal alloy matrix. Different measurement modes (multiple point analyses, depth profiles and chemical maps) have been employed, demonstrating the usefulness of LIBS technique for the characterization of laser clads based on hardfacing alloys. The behavior of hardness can be explained by LIBS maps which evidenced the partial dilution of some WC spheres in the coating.

  18. Cyber Security Analysis by Attack Trees for a Reactor Protection System

    International Nuclear Information System (INIS)

    Park, Gee-Yong; Lee, Cheol Kwon; Choi, Jong Gyun; Kim, Dong Hoon; Lee, Young Jun; Kwon, Kee-Choon

    2008-01-01

    As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I and C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for the cyber security has been performed in the KNICS (Korea Nuclear I and C Systems) project where the cyber security analysis has been applied to a reactor protection system (RPS). In this paper, the cyber security analysis based on the attack trees is proposed for the KNICS RPS

  19. Application of escape probability to line transfer in laser-produced plasmas

    International Nuclear Information System (INIS)

    Lee, Y.T.; London, R.A.; Zimmerman, G.B.; Haglestein, P.L.

    1989-01-01

    In this paper the authors apply the escape probability method to treat transfer of optically thick lines in laser-produced plasmas in plan-parallel geometry. They investigate the effect of self-absorption on the ionization balance and ion level populations. In addition, they calculate such effect on the laser gains in an exploding foil target heated by an optical laser. Due to the large ion streaming motion in laser-produced plasmas, absorption of an emitted photon occurs only over the length in which the Doppler shift is equal to the line width. They find that the escape probability calculated with the Doppler shift is larger compared to the escape probability for a static plasma. Therefore, the ion streaming motion contributes significantly to the line transfer process in laser-produced plasmas. As examples, they have applied escape probability to calculate transfer of optically thick lines in both ablating slab and exploding foil targets under irradiation of a high-power optical laser

  20. NIF small optics laser damage test specifications

    International Nuclear Information System (INIS)

    Sheehan, L

    1999-01-01

    The Laser Damage Group is currently conducting tests on small optics samples supplied for initial evaluation of potential NIF suppliers. This document is meant to define the specification of laser-induced damage for small optics and the test methods used to collect the data. A rating system which will be applied for vendor selection is presented

  1. A Characterization of Cirrus Cloud Properties That Affect Laser Propagation

    National Research Council Canada - National Science Library

    Norquist, Donald C; Desrochers, Paul R; McNicholl, Patrick J; Roadcap, John R

    2008-01-01

    Future high-altitude laser systems may be affected by cirrus clouds. Laser transmission models were applied to measured and retrieved cirrus properties to determine cirrus impact on power incident on a target or receiver...

  2. Laser tissue welding in ophthalmic surgery.

    Science.gov (United States)

    Rossi, Francesca; Matteini, Paolo; Ratto, Fulvio; Menabuoni, Luca; Lenzetti, Ivo; Pini, Roberto

    2008-09-01

    Laser welding of ocular tissues is an alternative technique or adjunct to conventional suturing in ophthalmic surgery. It is based on the photothermal interaction of laser light with the main components of the extracellular matrix of connective tissues. The advantages of the welding procedure with respect to standard suturing and stapling are reduced operation times, lesser inflammation, faster healing and increased ability to induce tissue regeneration. The procedure we set up is based on the use of an infrared diode laser in association with the topical application of the chromophore Indocyanine Green. Laser light may be delivered either continuously or in pulses, thus identifying two different techniques that have been applied clinically in various types of transplants of the cornea.

  3. Additional external electromagnetic fields for laser microprocessing of metals.

    Science.gov (United States)

    Schütz, V; Bischoff, K; Brief, S; Koch, J; Suttmann, O; Overmeyer, L

    2016-11-14

    Ultra-short pulsed laser processing is a potent tool for microstructuring of a lot of materials. At certain laser parameters, particular periodical and/or quasi-periodical µm-size surface structures evolve apparently during processing. With extended plasmonics theory, it is possible to predict the structure formation, and a systematic technology can be derived to alter the surface for laser processing. In this work, we have demonstrated the modification of the laser processing with applying tailored dynamic surface electro-magnetic fields. Possible improvement in applications is seen in the fields of process efficiency of laser ablation and a superior control of the surface topography.

  4. 76 FR 61438 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Proposed Rule...

    Science.gov (United States)

    2011-10-04

    ... clarify that 2102(e) applies to trading halts in new derivative securities, so as to not be confused with... derivative securities products when a temporary interruption occurs in the calculation or wide dissemination... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65425; File No. SR-ISE-2011-61] Self-Regulatory...

  5. Lasers plasmas and magnetic field

    International Nuclear Information System (INIS)

    Albertazzi, Bruno

    2014-01-01

    We studied the coupling between a laser produced plasmas and a magnetic field in two cases: 1) in the context of Inertial Fusion Confinement (ICF), we first studied how magnetic fields are self generated during the interaction between a target and a laser, then 2) to progress in the understanding of the large-scale shaping of astrophysical jets, we studied the influence of an externally applied magnetic field on the dynamics of a laser-produced plasma expanding into vacuum. The first part of this thesis is thus dedicated to a numerical and experimental study of the self generated magnetic fields that are produced following the irradiation of a solid target by a high power laser (having pulse duration in the nanosecond and picosecond regimes). These fields play an important role in the frame of ICF since they influence the dynamics of the electrons produced during the laser-matter interaction, and thus condition the success of ICF experiments. The second part of this thesis is a numerical and experimental study of the influence of an externally applied magnetic field on the morphology of a laser produced plasma freely otherwise expanding into vacuum. This work aims at better understanding the observed large-scale collimation of astrophysical jets which cannot be understood in the frame of existing models. We notably show that a purely axial magnetic field can force an initially isotropic laboratory flow, scaled to be representative of a flow emerging from a Young Star Object, in a re-collimation shock, from which emerges a narrow, well collimated jet. We also show that the plasma heating induced at the re-collimation point could explain the 'puzzling' observations of stationary X ray emission zones embedded within astrophysical jets. (author) [fr

  6. Specifying and Verifying Organizational Security Properties in First-Order Logic

    Science.gov (United States)

    Brandt, Christoph; Otten, Jens; Kreitz, Christoph; Bibel, Wolfgang

    In certain critical cases the data flow between business departments in banking organizations has to respect security policies known as Chinese Wall or Bell-La Padula. We show that these policies can be represented by formal requirements and constraints in first-order logic. By additionally providing a formal model for the flow of data between business departments we demonstrate how security policies can be applied to a concrete organizational setting and checked with a first-order theorem prover. Our approach can be applied without requiring a deep formal expertise and it therefore promises a high potential of usability in the business.

  7. On Using TPM for Secure Identities in Future Home Networks

    Directory of Open Access Journals (Sweden)

    Georg Carle

    2011-01-01

    Full Text Available Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and show that our scheme can be applied to any next generation network. As home networks are no safe place, we apply Trusted Computing technology to prevent the abuse of identities, i.e., identity theft.

  8. Security-aware design for cyber-physical systems a platform-based approach

    CERN Document Server

    Lin, Chung-Wei

    2017-01-01

    Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science. .

  9. Ideal Based Cyber Security Technical Metrics for Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    W. F. Boyer; M. A. McQueen

    2007-10-01

    Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the infrastructure. A cyber security technical metric is the security relevant output from an explicit mathematical model that makes use of objective measurements of a technical object. A specific set of technical security metrics are proposed for use by the operators of control systems. Our proposed metrics are based on seven security ideals associated with seven corresponding abstract dimensions of security. We have defined at least one metric for each of the seven ideals. Each metric is a measure of how nearly the associated ideal has been achieved. These seven ideals provide a useful structure for further metrics development. A case study shows how the proposed metrics can be applied to an operational control system.

  10. Security Attributes Based Digital Rights Management

    NARCIS (Netherlands)

    Chong, C.N.; van Buuren, R.; Hartel, Pieter H.; Kleinhuis, Geert

    ost real-life systems delegate responsibilities to di�erent authorities. We apply this model to a dig- ital rights management system, to achieve exible security. In our model a hierarchy of authorities issues certi�cates that are linked by cryptographic means. This linkage establishes a chain of

  11. High speed laser cutting machine. Kosoku reza kakoki

    Energy Technology Data Exchange (ETDEWEB)

    Shinno, N. (Matsushita Electric Industrial Co. Ltd., Kadoma, Osaka (Japan))

    1993-11-01

    The carbon dioxide gas laser cutting machine is being used widely for from cutting soft steel and stainless steel, etc. to intermetallic welding and in the field of cutting in particular, concerning sheet cutting, it has been changing the existing monopoly of the turret punch press, and as for medium and thick plate cutting, that of the gas plasma fusing device. This article is the general description of high speed laser cutting machine. Concerning the laser cutting (sheet cutting in particular), as the essential items for securing severe cutting accuracy and, at the same time, improving the cutting speed, the following matters are picked up for respective explanation; improvement of stationary machine accuracy, improvement of dynamic machine accuracy, improvement of quality of laser beam as well as optimization of cutting conditions, and shortening of piercing time. Also explanation is given to the respective items, namely speeding-up of medium and thick plate cutting, and reduction of load onto the operator by improved operation. Finally, feeding and removing of a sheet only, and feeding and removing with a pallet are mentioned as the efforts for automation and energy saving. 3 figs., 1 tab.

  12. Physical and data-link security techniques for future communication systems

    CERN Document Server

    Tomasin, Stefano

    2016-01-01

     This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, I...

  13. Correlative microscopy including CLSM and SEM to improve high-speed, high-resolution laser-engraved print and embossing forms

    Science.gov (United States)

    Bohrer, Markus; Schweitzer, Michael; Nirnberger, Robert; Weinberger, Bernhard

    2015-10-01

    The industrial market for processing large-scale films has seen dramatic changes since the 1980s and has almost completely been replaced by lasers and digital processes. A commonly used technology for engraving screens, print and embossing forms in the printing industry, well known since then, is the use of RF-excited CO2 lasers with a beam power up to about 1 kW, modulated in accordance to the pattern to be engraved. Future needs for high-security printing (banknotes, security papers, passports, etc.) will require laser engraving of at least half a million or even more structured elements with a depth from some μm up to 500 μm. Industry now wants photorealistic pictures in packaging design, which requires a similar performance. To ensure 'trusted pulses' from the digital process to the print result the use of correlative microscopy (CLSM and SEM) is demonstrated as a complete chain for a correlative print process in this paper.

  14. Alternative laser system for cesium magneto-optical trap via optical injection locking to sideband of a 9-GHz current-modulated diode laser.

    Science.gov (United States)

    Diao, Wenting; He, Jun; Liu, Zhi; Yang, Baodong; Wang, Junmin

    2012-03-26

    By optical injection of an 852-nm extended-cavity diode laser (master laser) to lock the + 1-order sideband of a ~9-GHz-current-modulated diode laser (slave laser), we generate a pair of phase-locked lasers with a frequency difference up to ~9-GHz for a cesium (Cs) magneto-optical trap (MOT) with convenient tuning capability. For a cesium MOT, the master laser acts as repumping laser, locked to the Cs 6S₁/₂ (F = 3) - 6P₃/₂ (F' = 4) transition. When the + 1-order sideband of the 8.9536-GHz-current-modulated slave laser is optically injection-locked, the carrier operates on the Cs 6S₁/₂ (F = 4) - 6P₃/₂ (F' = 5) cooling cycle transition with -12 MHz detuning and acts as cooling/trapping laser. When carrying a 9.1926-GHz modulation signal, this phase-locked laser system can be applied in the fields of coherent population trapping and coherent manipulation of Cs atomic ground states.

  15. Revolutionizing safety and security in the chemical and process industry: applying the CHESS concept

    NARCIS (Netherlands)

    Reniers, G.L.L.M.E.; Khakzad Rostami, N.

    2017-01-01

    This paper argues that a new concept, summarized as ‘CHESS’, should be used in the chemical industry to further substantially advance safety (where we use the term in a broad sense, that is, safety and physical security, amongst others). The different domains that need to be focused upon, and where

  16. Pulsed Laser Annealing of Thin Films of Self-Assembled Nanocrystals

    KAUST Repository

    Baumgardner, William J.; Choi, Joshua J.; Bian, Kaifu; Fitting Kourkoutis, Lena; Smilgies, Detlef-M.; Thompson, Michael O.; Hanrath, Tobias

    2011-01-01

    We investigated how pulsed laser annealing can be applied to process thin films of colloidal nanocrystals (NCs) into interconnected nanostructures. We illustrate the relationship between incident laser fluence and changes in morphology of PbSe NC

  17. Low power cw-laser signatures on human skin

    International Nuclear Information System (INIS)

    Lihachev, A; Lesinsh, J; Jakovels, D; Spigulis, J

    2011-01-01

    Impact of cw laser radiation on autofluorescence features of human skin is studied. Two methods of autofluorescence detection are applied: the spectral method with the use of a fibreoptic probe and spectrometer for determining the autofluorescence recovery kinetics at a fixed skin area of ∼12 mm 2 , and the multispectral visualisation method with the use of a multispectral imaging camera for visualising long-term autofluorescence changes in a skin area of ∼4 cm 2 . The autofluorescence recovery kinetics after preliminary laser irradiation is determined. Skin autofluorescence images with visible long-term changes - 'signatures' of low power laser treatment are acquired. (application of lasers and laser-optical methods in life sciences)

  18. Laser frequency stabilization using a commercial wavelength meter

    Science.gov (United States)

    Couturier, Luc; Nosske, Ingo; Hu, Fachao; Tan, Canzhu; Qiao, Chang; Jiang, Y. H.; Chen, Peng; Weidemüller, Matthias

    2018-04-01

    We present the characterization of a laser frequency stabilization scheme using a state-of-the-art wavelength meter based on solid Fizeau interferometers. For a frequency-doubled Ti-sapphire laser operated at 461 nm, an absolute Allan deviation below 10-9 with a standard deviation of 1 MHz over 10 h is achieved. Using this laser for cooling and trapping of strontium atoms, the wavemeter scheme provides excellent stability in single-channel operation. Multi-channel operation with a multimode fiber switch results in fluctuations of the atomic fluorescence correlated to residual frequency excursions of the laser. The wavemeter-based frequency stabilization scheme can be applied to a wide range of atoms and molecules for laser spectroscopy, cooling, and trapping.

  19. Illumination Effect of Laser Light in Foggy Objects Using an Active Imaging System

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Seong-Ouk; Park, Seung-Kyu; Ahn, Yong-Jin; Baik, Sung-Hoon; Choi, Young-Soo; Jeong, Kyung-Min [KAERI, Daejeon (Korea, Republic of)

    2015-05-15

    Active imaging techniques usually provide improved image information when compared to passive imaging techniques. Active vision is a direct visualization technique using an artificial illuminant. Range-gated imaging (RGI) technique is one of active vision technologies. The RGI technique extracts vision information by summing time sliced vision images. In the RGI system, objects are illuminated for ultra-short time by a high intensity illuminant and then the light reflected from objects is captured by a highly sensitive image sensor with the exposure of ultra-short time. The Range-gated imaging is an emerging technology in the field of surveillance for security application, especially in the visualization of darken night or foggy environment. Although RGI viewing was discovered in the 1960's, this technology is currently more applicable by virtue of the rapid development of optical and sensor technologies, such as highly sensitive imaging sensor and ultra-short pulse laser light. Especially, this system can be adopted in robot-vision system by virtue of the compact system configuration. During the past decades, several applications of this technology have been applied in target recognition and in harsh environments, such as fog, underwater vision. Also, this technology has been demonstrated range imaging based on range-gated imaging. Laser light having a short pulse width is usually used for the range-gated imaging system. In this paper, an illumination effect of laser light in foggy objects is studied using a range-gated imaging system. The used imaging system consists of an ultra-short pulse (0.35 ns) laser light and a gated imaging sensor. The experiment is carried out to monitor objects in a box filled by fog. In this paper, the effects by fog particles in range-gated imaging technique are studied. Edge blurring and range distortion are the generated by fog particles.

  20. Illumination Effect of Laser Light in Foggy Objects Using an Active Imaging System

    International Nuclear Information System (INIS)

    Kwon, Seong-Ouk; Park, Seung-Kyu; Ahn, Yong-Jin; Baik, Sung-Hoon; Choi, Young-Soo; Jeong, Kyung-Min

    2015-01-01

    Active imaging techniques usually provide improved image information when compared to passive imaging techniques. Active vision is a direct visualization technique using an artificial illuminant. Range-gated imaging (RGI) technique is one of active vision technologies. The RGI technique extracts vision information by summing time sliced vision images. In the RGI system, objects are illuminated for ultra-short time by a high intensity illuminant and then the light reflected from objects is captured by a highly sensitive image sensor with the exposure of ultra-short time. The Range-gated imaging is an emerging technology in the field of surveillance for security application, especially in the visualization of darken night or foggy environment. Although RGI viewing was discovered in the 1960's, this technology is currently more applicable by virtue of the rapid development of optical and sensor technologies, such as highly sensitive imaging sensor and ultra-short pulse laser light. Especially, this system can be adopted in robot-vision system by virtue of the compact system configuration. During the past decades, several applications of this technology have been applied in target recognition and in harsh environments, such as fog, underwater vision. Also, this technology has been demonstrated range imaging based on range-gated imaging. Laser light having a short pulse width is usually used for the range-gated imaging system. In this paper, an illumination effect of laser light in foggy objects is studied using a range-gated imaging system. The used imaging system consists of an ultra-short pulse (0.35 ns) laser light and a gated imaging sensor. The experiment is carried out to monitor objects in a box filled by fog. In this paper, the effects by fog particles in range-gated imaging technique are studied. Edge blurring and range distortion are the generated by fog particles

  1. Homeland Security: The Department of Defense's Role

    National Research Council Canada - National Science Library

    Bowman, Steve

    2003-01-01

    ...) more closely with federal, state, and local agencies in their homeland security activities. DoD resources are unique in the government, both in their size and capabilities, and can be applied to both deter and respond to terrorist acts...

  2. Impossibility of secure two-party classical computation

    International Nuclear Information System (INIS)

    Colbeck, Roger

    2007-01-01

    We present attacks that show that unconditionally secure two-party classical computation is impossible for many classes of function. Our analysis applies to both quantum and relativistic protocols. We illustrate our results by showing the impossibility of oblivious transfer

  3. Molecular transport network security using multi-wavelength optical spins.

    Science.gov (United States)

    Tunsiri, Surachai; Thammawongsa, Nopparat; Mitatha, Somsak; Yupapin, Preecha P

    2016-01-01

    Multi-wavelength generation system using an optical spin within the modified add-drop optical filter known as a PANDA ring resonator for molecular transport network security is proposed. By using the dark-bright soliton pair control, the optical capsules can be constructed and applied to securely transport the trapped molecules within the network. The advantage is that the dark and bright soliton pair (components) can securely propagate for long distance without electromagnetic interference. In operation, the optical intensity from PANDA ring resonator is fed into gold nano-antenna, where the surface plasmon oscillation between soliton pair and metallic waveguide is established.

  4. Impurity monitoring by laser-induced fluorescence techniques

    International Nuclear Information System (INIS)

    Gelbwachs, J.A.

    1984-01-01

    Laser-induced fluorescence spectroscopy can provide a highly sensitive and selective means of detecting atomic and ionic impurities. Because the photodetector can be physically isolated from the laser-excited region, these techniques can be applied to monitoring in hostile environments. The basic concepts behind fluorescence detection are reviewed. Saturated optical excitation is shown to maximize impurity atom emission yield while mitigating effects of laser intensity fluctuations upon absolute density calibration. Monitoring in high- and low-pressure monitoring environments is compared. Methods to improve detection sensitivity by luminescence background suppression are presented

  5. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  6. Security of differential-phase-shift quantum key distribution against individual attacks

    International Nuclear Information System (INIS)

    Waks, Edo; Takesue, Hiroki; Yamamoto, Yoshihisa

    2006-01-01

    We derive a proof of security for the differential-phase-shift quantum key distribution protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful

  7. Data security in Intelligent Transport Systems

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2012-10-01

    Full Text Available Intelligent Transport Services expect availability of the secure seamless communications solutions typically covering widely spread areas. Different ITS solutions require different portfolio of telecommunications service quality. These parameters have to correspond with ITS service performance parameters required by specific service. Even though quite extensive range of public wireless data services with reasonable coverage are provided, most of them are provided with no guaranteed quality and security. ITS requirements can be in most parameters easier reached if multi-path communications systems are applied core solution is combined with both public as well as private ones where and when it is needed. Such solution requires implementation of relevant flexible system architecture supported by the efficient decision processes. This paper is concentrated the telecommunications security issues relevant to the ITS wide area networking. Expected level of security varies in dependence on relevant ITS service requirements. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure (C2I or other vehicles (C2C progressively grow. Such trend upsurges the fatal problems appearance probability in case security of the wide area networks is not relevantly treated. That is reason why relevant communications security treatment becomes crucial part of the ITS solution. Besides of available "off shelf" security tools we present solution based on non-public universal identifier with dynamical extension (time and position dependency as an autonomous variables and data selection according to actor role or category. Presented results were obtained within projects e-Ident1, DOTEK2 and SRATVU3.

  8. Cyber Security Analysis by Attack Trees for a Reactor Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Park, Gee-Yong; Lee, Cheol Kwon; Choi, Jong Gyun; Kim, Dong Hoon; Lee, Young Jun; Kwon, Kee-Choon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2008-10-15

    As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I and C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for the cyber security has been performed in the KNICS (Korea Nuclear I and C Systems) project where the cyber security analysis has been applied to a reactor protection system (RPS). In this paper, the cyber security analysis based on the attack trees is proposed for the KNICS RPS.

  9. The Safe Use of Ultraviolet Lasers in Industry and Research

    International Nuclear Information System (INIS)

    Lowe, A.J.; O'Hagan, J.B.

    2000-01-01

    UV lasers are being applied to a number of industries, including metrology and manufacture. The safety issues from the use of such lasers are discussed. A risk assessment methodology is described which takes account of the different stages of the life cycle of the laser application, the different people at risk and the individual components of the laser application. In this way, the specific hazards can be identified and addresses to ensure that the risks are adequately managed. (author)

  10. Development of the power control system for semiconductor lasers

    International Nuclear Information System (INIS)

    Kim, Kwang Suk; Kim, Cheol Jung

    1997-12-01

    For the first year plan of this program, we developed the power control system for semiconductor lasers. We applied the high-current switching mode techniques to fabricating a power control system. Then, we investigated the direct side pumping techniques with GaA1As diode laser bars to laser crystal without pumping optics. We obtained 0.5W average output power from this DPSSL. (author). 54 refs., 3 tabs., 18 figs

  11. Study of laser - matter interaction applied to the decontamination of paints; Etude de l'interaction laser - matiere appliquee a la decontamination de peintures

    Energy Technology Data Exchange (ETDEWEB)

    Brygo, F

    2005-12-15

    In nuclear industry, the paint layer on the walls must be removed during dismantling or maintenance operation. Laser ablation of the paint layer allows to reduce the generated waste volume, compared to the current techniques. Paints consist of a polymeric base in which fillers and pigments are included. The energy deposition of the laser beam in this scattering medium is studied using a multiple scattering model, and measurements of reflection / transmission of beam through thin layers. The paint ablation is studied with several Nd: YAG lasers and a TEA-CO{sub 2} laser, allowing to modify the fluence, the wavelength, the pulse duration, the repetition rate and the number of shots. Optical benches were carried out, and the parametric tests allow to define the optimal ablation parameters, in term of ablation efficiency. Ablation at high repetition rate is studied using an optical pyrometer and a specifically developed thermal model. Measurements and modelling highlight the heat accumulation that appears at high repetition rate. This accumulation allows to reduce the ablation threshold fluence and to increase the ablation efficiency. Analyses of the interaction and ablation regimes are proposed on the basis of the experimental results and models, and allow to optimise the decontamination process. (author)

  12. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  13. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon; Kang, Mingyun

    2015-01-01

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately

  14. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Kang, Mingyun [E-Gonggam Co. Ltd., Daejeon (Korea, Republic of)

    2015-10-15

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately.

  15. THERAPY OF SKIN VASCULAR MALFORMATIONS USING COPPER VAPOR LASER AND PULSED DYE LASER

    Directory of Open Access Journals (Sweden)

    Svetlana V. Klyuchareva

    2018-01-01

    Full Text Available Aim. Comparison of effectiveness of the application of copper vapor laser (CVL and pulsed dye laser (PDL in clinical practice. Development of choice criteria of the more effective method of treatment.Materials and methods. The clinical data using CVL and PDL in the treatment of skin vascular malformations are presented. The treatment gave good results in removing of dysplastic skin vessels in 2 and 6 months. The treatment was not painful, and patients did not need general and local anesthesia. The results were presented concerning computer modeling of selective heating of vessels in tissue with CVL and PDL radiation. These results allowed to determine the depth of location and dimensions of vessels for selective and secure removing and the safe dosage ranges were found.Results. On the base of the calculated data, one could conclude that the mode of heating of dysplastic vessels with micropulse series of CVL is more safe and effective than the mode of powerful short pulses in the case of PDL.

  16. Development of an observation and control system for industrial laser cladding

    NARCIS (Netherlands)

    Hofman, Johannes Tjaard

    2009-01-01

    Laser cladding has become an important surface modification technique in today’s industry. It is not only applied for coating new products but also for repair and refurbishment as well as in rapid prototyping. A laser clad workstation has been developed. It uses a 4 kW Nd:YAG fibre coupled laser as

  17. Laser Spot Welding of Copper-aluminum Joints Using a Pulsed Dual Wavelength Laser at 532 and 1064 nm

    Science.gov (United States)

    Stritt, Peter; Hagenlocher, Christian; Kizler, Christine; Weber, Rudolf; Rüttimann, Christoph; Graf, Thomas

    A modulated pulsed laser source emitting green and infrared laser light is used to join the dissimilar metals copper and aluminum. The resultant dynamic welding process is analyzed using the back reflected laser light and high speed video observations of the interaction zone. Different pulse shapes are applied to influence the melt pool dynamics and thereby the forming grain structure and intermetallic phases. The results of high-speed images and back-reflections prove that a modulation of the pulse shape is transferred to oscillations of the melt pool at the applied frequency. The outcome of the melt pool oscillation is shown by the metallurgically prepared cross-section, which indicates different solidification lines and grain shapes. An energy-dispersivex-ray analysis shows the mixture and the resultant distribution of the two metals, copper and aluminum, within the spot weld. It can be seen that the mixture is homogenized the observed melt pool oscillations.

  18. Separating uranium by laser: the atomic process

    Energy Technology Data Exchange (ETDEWEB)

    Destro, Marcelo G.; Damiao, Alvaro J.; Neri, Jose W.; Schwab, Carlos; Rodrigues, Nicolau A.S.; Riva, Rudimar [Centro Tecnico Aeroespacial (CTA-IEAv), Sao Jose dos Campos, SP (Brazil). Inst. de Estudos Avancados

    1996-07-01

    Among the countries around the world that utilizes nuclear energy, several ones are investing significantly in the development of laser techniques applied to isotope separation. In Brazil these studies are concentrated in one research institute, the IEAv (Institute for Advanced Studies), and aim at demonstrating the viability of this process using, as much as possible, resources available in the country. In this paper we briefly describe the laser methods for isotope separation, giving an overview of the present research and development status in this area. We also show some results obtained our laboratories. We focused this report on the atomic route for laser isotope separation, mainly in the areas of laser development and spectroscopy. (author)

  19. Separating uranium by laser: the atomic process

    International Nuclear Information System (INIS)

    Destro, Marcelo G.; Damiao, Alvaro J.; Neri, Jose W.; Schwab, Carlos; Rodrigues, Nicolau A.S.; Riva, Rudimar

    1996-01-01

    Among the countries around the world that utilizes nuclear energy, several ones are investing significantly in the development of laser techniques applied to isotope separation. In Brazil these studies are concentrated in one research institute, the IEAv (Institute for Advanced Studies), and aim at demonstrating the viability of this process using, as much as possible, resources available in the country. In this paper we briefly describe the laser methods for isotope separation, giving an overview of the present research and development status in this area. We also show some results obtained our laboratories. We focused this report on the atomic route for laser isotope separation, mainly in the areas of laser development and spectroscopy. (author)

  20. Security Scenario Generator (SecGen): A Framework for Generating Randomly Vulnerable Rich-scenario VMs for Learning Computer Security and Hosting CTF Events

    OpenAIRE

    Schreuders, ZC; Shaw, T; Shan-A-Khuda, M; Ravichandran, G; Keighley, J; Ordean, M

    2017-01-01

    Computer security students benefit from hands-on experience applying security tools and techniques to attack and defend vulnerable systems. Virtual machines (VMs) provide an effective way of sharing targets for hacking. However, developing these hacking challenges is time consuming, and once created, essentially static. That is, once the challenge has been "solved" there is no remaining challenge for the student, and if the challenge is created for a competition or assessment, the challenge c...

  1. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  2. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  3. Laser ion source with solenoid field

    Science.gov (United States)

    Kanesue, Takeshi; Fuwa, Yasuhiro; Kondo, Kotaro; Okamura, Masahiro

    2014-11-01

    Pulse length extension of highly charged ion beam generated from a laser ion source is experimentally demonstrated. The laser ion source (LIS) has been recognized as one of the most powerful heavy ion source. However, it was difficult to provide long pulse beams. By applying a solenoid field (90 mT, 1 m) at plasma drifting section, a pulse length of carbon ion beam reached 3.2 μs which was 4.4 times longer than the width from a conventional LIS. The particle number of carbon ions accelerated by a radio frequency quadrupole linear accelerator was 1.2 × 1011, which was provided by a single 1 J Nd-YAG laser shot. A laser ion source with solenoid field could be used in a next generation heavy ion accelerator.

  4. Resonance ionization mass spectrometry using tunable diode lasers

    International Nuclear Information System (INIS)

    Shaw, R.W.; Young, J.P.; Smith, D.H.

    1990-01-01

    Tunable semiconductor diode lasers will find many important applications in atomic spectroscopy. They exhibit the desirable attributes of lasers: narrow bandwidth, tunability, and spatial coherence. At the same time, they possess few of the disadvantages of other tunable lasers. They require no alignment, are simple to operate, and are inexpensive. Practical laser spectroscopic instruments can be envisioned. The authors have applied diode lasers to resonance ionization mass spectrometry (RIMS) of some of the lanthanide elements. Sub-Doppler resolution spectra have been recorded and have been used for atomic hyperfine structure analysis. Isotopically-selective ionization has been accomplished, even in cases where photons from a broadband dye laser are part of the overall ionization process and where the isotopic spectral shift is very small. A convenient RIMS instrument for isotope ratio measurements that employs only diode lasers, along with electric field ionization, should be possible

  5. Help for the Developers of Control System Cyber Security Standards

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  6. DIRAC distributed secure framework

    International Nuclear Information System (INIS)

    Casajus, A; Graciani, R

    2010-01-01

    DIRAC, the LHCb community Grid solution, provides access to a vast amount of computing and storage resources to a large number of users. In DIRAC users are organized in groups with different needs and permissions. In order to ensure that only allowed users can access the resources and to enforce that there are no abuses, security is mandatory. All DIRAC services and clients use secure connections that are authenticated using certificates and grid proxies. Once a client has been authenticated, authorization rules are applied to the requested action based on the presented credentials. These authorization rules and the list of users and groups are centrally managed in the DIRAC Configuration Service. Users submit jobs to DIRAC using their local credentials. From then on, DIRAC has to interact with different Grid services on behalf of this user. DIRAC has a proxy management service where users upload short-lived proxies to be used when DIRAC needs to act on behalf of them. Long duration proxies are uploaded by users to a MyProxy service, and DIRAC retrieves new short delegated proxies when necessary. This contribution discusses the details of the implementation of this security infrastructure in DIRAC.

  7. Laser application in high temperature materials

    International Nuclear Information System (INIS)

    Ohse, R.W.

    1988-01-01

    The scope and priorities of laser application in materials science and technology are attracting widespread interest. After a brief discussion of the unique capabilities of laser application in the various fields of materials science, main emphasis is given on the three areas of materials processing, surface modification and alloying, and property measurements at high temperatures. In materials processing the operational regimes for surface hardening, drilling, welding and laser glazing are discussed. Surface modifications by laser melting, quenching and surface alloying, the formation of solid solutions, metastable phases and amorphous solids on the basis of rapid solidification, ion implantation and ion beam mixing are considered. The influence of solidification rates and interface velocities on the surface properties are given. The extension of property measurements up to and beyond the melting point of refractory materials into their critical region by a transient-type dynamic laser pulse heating technique is given for the three examples of vapour pressure measurement, density and heat capacity determination in the solid and liquid phases. A new approach, the laser autoclave technique, applying laser heating and x-ray shadow technique under autoclave conditions to acoustically levitated spheres will be presented. (author)

  8. Development of laser material processing and laser metrology techniques. Development of the power supply of high power CO{sub 2} laser for material processing

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Heon Ju; Lee, Yong Hak; Jang, Do Hyun; Kim, Su Hun [Cheju National University, Cheju (Korea, Republic of)

    1994-08-01

    The 2 Kw solid state RF power supply has been designed and fabricated The power supply was composed of oscillator, driver amplifier and power amplifier. Each part of the power supply was developed and tested. The impedance matching circuit to apply this RF power supply for laser discharge excitation was fabricated also. The RF discharge experiment for the excitation of CO{sub 2} laser was performed. The radiofrequency power supply which has the output power of 2 Kw has been developed. The subsystems of the power supply have been fabricated and their performances were reliable. The RF discharge experiment to generate the laser plasma has been performed and input power density of 6 W/cm{sub 3} has been achieved. (author). 5 refs., 28 figs., 8 tabs.

  9. Application of YAG laser processing in underwater welding and cutting

    Energy Technology Data Exchange (ETDEWEB)

    Ohwaki, Katsura; Morita, Ichiro; Kojima, Toshio; Sato, Shuichi [Ishikawajima-Harima Heavy Industries Co. Ltd., Tokyo (Japan)

    2002-09-01

    The high-power YAG laser is a new fabrication tool. The laser torch is easy to combine with complex with complex mechanics because of beam delivery through optical fiber. A direct underwater laser welding technology has been developed and applied to the preservation, maintenance and removal of nuclear power plants. For subdividing or removing operations for retirement of plants, the laser cutting properties were confirmed to allow a maximum cutting thickness of 80 mm. For repairing inner surface of stainless steel tanks, an underwater laser welding system using a remote-controlled robot was developed and the high quality of underwater laser welding was confirmed. (author)

  10. Laser application maintenance technologies for nuclear power plant

    International Nuclear Information System (INIS)

    Shima, Seishi; Sato, Kenji; Kobayashi, Masahiro; Sano, Yuji; Kimura, Seiichiro

    2000-01-01

    Several plants that were the first to be constructed in Japan have been operating for more than 20 years now, and preventive maintenance is therefore a matter of great importance. This paper summarizes the status of applied laser maintenance technologies both preventive and repair. Especially for the laser peening and laser de-sensitization treatment technology, field applications were also described in detail. In future, expansion of field application area on the preventive maintenance, repair and inspection technologies will be developed. (author)

  11. Time-resolved diagnostics of excimer laser-generated ablation plasmas used for pulsed laser deposition

    Energy Technology Data Exchange (ETDEWEB)

    Geohegan, D.B.

    1994-09-01

    Characteristics of laser plasmas used for pulsed laser deposition (PLD) of thin films are examined with four in situ diagnostic techniques: Optical emission spectroscopy, optical absorption spectroscopy, ion probe studies, and gated ICCD (intensified charge-coupled-device array) fast photography. These four techniques are complementary and permit simultaneous views of the transport of ions, excited states, ground state neutrals and ions, and hot particulates following KrF laser ablation of YBCO, BN, graphite and Si in vacuum and background gases. The implementation and advantages of the four techniques are first described in order to introduce the key features of laser plasmas for pulsed laser deposition. Aspects of the interaction of the ablation plume with background gases (i.e., thermalization, attenuation, shock formation) and the collision of the plasma plume with the substrate heater are then summarized. The techniques of fast ICCD photography and gated photon counting are then applied to investigate the temperature, velocity, and spatial distribution of hot particles generated during KrF ablation of YBCO, BN, Si and graphite. Finally, key features of fast imaging of the laser ablation of graphite into high pressure rare gases are presented in order to elucidate internal reflected shocks within the plume, redeposition of material on a surface, and formation of hot nanoparticles within the plume.

  12. Time-resolved diagnostics of excimer laser-generated ablation plasmas used for pulsed laser deposition

    International Nuclear Information System (INIS)

    Geohegan, D.B.

    1994-01-01

    Characteristics of laser plasmas used for pulsed laser deposition (PLD) of thin films are examined with four in situ diagnostic techniques: Optical emission spectroscopy, optical absorption spectroscopy, ion probe studies, and gated ICCD (intensified charge-coupled-device array) fast photography. These four techniques are complementary and permit simultaneous views of the transport of ions, excited states, ground state neutrals and ions, and hot particulates following KrF laser ablation of YBCO, BN, graphite and Si in vacuum and background gases. The implementation and advantages of the four techniques are first described in order to introduce the key features of laser plasmas for pulsed laser deposition. Aspects of the interaction of the ablation plume with background gases (i.e., thermalization, attenuation, shock formation) and the collision of the plasma plume with the substrate heater are then summarized. The techniques of fast ICCD photography and gated photon counting are then applied to investigate the temperature, velocity, and spatial distribution of hot particles generated during KrF ablation of YBCO, BN, Si and graphite. Finally, key features of fast imaging of the laser ablation of graphite into high pressure rare gases are presented in order to elucidate internal reflected shocks within the plume, redeposition of material on a surface, and formation of hot nanoparticles within the plume

  13. Dual-beam, second-derivative tunable diode-laser infrared spectroscopy applied to trace-gas measurement

    International Nuclear Information System (INIS)

    Tallant, D.R.; Jungst, R.G.

    1981-04-01

    A dual beam diode laser spectrometer has been constructed using off-axis reflective optics. The spectrometer can be amplitude modulated for direct absorption measurements or frequency modulated to obtain derivative spectra. The spectrometer has high throughput, is easy to operate and align, provides good dual beam compensation, and has no evidence of the interference effects that have been observed in diode laser spectrometers using refractive optics. Unpurged, using second derivative techniques, the instrument has measured 108 parts-per-million CO (10 cm absorption cell, atmospheric pressure-broadened) with good signal/noise. With the replacement of marginal instrumental components, the signal/noise should be substantially increased. This instrument was developed to monitor the evolution of decomposition gases in sealed containers of small volume at atmospheric pressure

  14. An annular laser for penetrating radiations

    International Nuclear Information System (INIS)

    Marie, G.R.P.

    1974-01-01

    Description is given of an annular laser generating an emission of X rays or gamma rays, from a pumping beam provided by a light wave or infra-red laser and applied to an active substance. Said laser essentially comprises a semi toroidal metal groove wherein is placed said active substance. That substance is illuminated by the pumping beam after reflection of the latter on a mirror provided with an opening through which pass X rays or gamma rays after several reflections on the groove bottom. The pumping-beam uses a revolution symmetry mode, the electric field lines of which are circles coaxial with said beam [fr

  15. EDITORIAL: Semiconductor lasers: the first fifty years Semiconductor lasers: the first fifty years

    Science.gov (United States)

    Calvez, S.; Adams, M. J.

    2012-09-01

    Anniversaries call for celebrations. Since it is now fifty years since the first semiconductor lasers were reported, it is highly appropriate to celebrate this anniversary with a Special Issue dedicated to the topic. The semiconductor laser now has a major effect on our daily lives since it has been a key enabler in the development of optical fibre communications (and hence the internet and e-mail), optical storage (CDs, DVDs, etc) and barcode scanners. In the early 1960s it was impossible for most people (with the exception of very few visionaries) to foresee any of these future developments, and the first applications identified were for military purposes (range-finders, target markers, etc). Of course, many of the subsequent laser applications were made possible by developments in semiconductor materials, in the associated growth and fabrication technology, and in the increased understanding of the underlying fundamental physics. These developments continue today, so that the subject of semiconductor lasers, although mature, is in good health and continues to grow. Hence, we can be confident that the pervasive influence of semiconductor lasers will continue to develop as optoelectronics technology makes further advances into other sectors such as healthcare, security and a whole host of applications based on the global imperatives to reduce energy consumption, minimise environmental impact and conserve resources. The papers in this Special Issue are intended to tell some of the story of the last fifty years of laser development as well as to provide evidence of the current state of semiconductor laser research. Hence, there are a number of papers where the early developments are recalled by authors who played prominent parts in the story, followed by a selection of papers from authors who are active in today's exciting research. The twenty-fifth anniversary of the semiconductor laser was celebrated by the publication of a number of papers dealing with the early

  16. Development and application of preventive maintenance technique for pipes using laser cladding method

    International Nuclear Information System (INIS)

    Hatakenaka, Hiroaki; Yamadera, Masao; Shiraiwa, Takanori.

    1995-01-01

    A laser cladding method which produces a highly corrosion-resisting coating (cladding) on the surface of the material was developed for the purpose of preventing stress corrosion cracking (SCC) in the austenitic stainless steel (Type 304). In this method, metallic powder paste is applied on the inner surface of pipes, and then a YAG laser beam is irradiated to the paste, which melts and forms a clad with excellent corrosion resistance. Recently, the laser cladding method was practically and successfully applied to the actual nuclear power plant in Japan. This report describes this laser cladding technique, the equipment, and actual works in the field. (author)

  17. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  18. Nuclear security assessment with Markov model approach

    International Nuclear Information System (INIS)

    Suzuki, Mitsutoshi; Terao, Norichika

    2013-01-01

    Nuclear security risk assessment with the Markov model based on random event is performed to explore evaluation methodology for physical protection in nuclear facilities. Because the security incidences are initiated by malicious and intentional acts, expert judgment and Bayes updating are used to estimate scenario and initiation likelihood, and it is assumed that the Markov model derived from stochastic process can be applied to incidence sequence. Both an unauthorized intrusion as Design Based Threat (DBT) and a stand-off attack as beyond-DBT are assumed to hypothetical facilities, and performance of physical protection and mitigation and minimization of consequence are investigated to develop the assessment methodology in a semi-quantitative manner. It is shown that cooperation between facility operator and security authority is important to respond to the beyond-DBT incidence. (author)

  19. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2010-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  20. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.