WorldWideScience

Sample records for on-line dynamic security

  1. On-line Dynamic Security Assessment in Power Systems

    DEFF Research Database (Denmark)

    Weckesser, Johannes Tilman Gabriel

    tools may no longer be feasible, since they are generally based on extensive off-line studies. A core component of an efficient on-line dynamic security assessment is a fast and reliable contingency screening. As part of this thesis a contingency screening method is developed and its performance......The thesis concerns the development of tools and methods for on-line dynamic security assessment (DSA). In a future power system with low-dependence or even independence of fossil fuels, generation will be based to a large extent on noncontrollable renewable energy sources (RES), such as wind...... and solar radiation. Moreover, ongoing research suggests that demand response will be introduced to maintain power balance between generation and consumption at all times. Due to these changes the operating point of the power system will be less predictable and today’s stability and security assessment...

  2. Application of learning from examples methods for on-line dynamic security assessment of electric power systems - state of the art

    Energy Technology Data Exchange (ETDEWEB)

    Pecas Lopes, J.A. [Universidade do Porto, Porto (Portugal). Faculdade de Engenharia] Hatziargyriou, Nikos D. [National Technical University of Athens, Athens (Greece)

    1994-12-31

    This paper provides an overview of the application of `learning from examples` techniques like pattern recognition, artificial neural networks and decision trees, when used for fast dynamic security assessment. Problems concerning the system security evaluation relatively to transient stability and voltage stability are addressed with more details and references to research works in this field are briefly described. (author) 44 refs., 3 tabs.

  3. Efficient and Secure Comparison for On-Line Auctions

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Krøigaard, Mikkel; Geisler, Martin Joakim

    2007-01-01

    We propose a protocol for secure comparison of integers based on homomorphic encryption. We also propose a homomorphic encryption scheme that can be used in our protocol and makes it more efficient than previous solutions. Our protocol is well-suited for application in on-line auctions, both...... with respect to functionality and performance. It minimizes the amount of information bidders need to send, and for comparison of 16 bit numbers with security based on 1024 bit RSA (executed by two parties), our implementation takes 0.28 seconds including all computation and communication. Using precomputation...

  4. The dynamics of on-line principal component analysis

    NARCIS (Netherlands)

    Biehl, M.; Schlösser, E.

    1998-01-01

    The learning dynamics of an on-line algorithm for principal component analysis is described exactly in the thermodynamic limit by means of coupled ordinary differential equations for a set of order parameters. It is demonstrated that learning is delayed significantly because existing symmetries amon

  5. Differential Electronic Nose in On-Line Dynamic Measurements

    Directory of Open Access Journals (Sweden)

    Osowski S.

    2014-12-01

    Full Text Available The paper presents application of differential electronic nose in the dynamic (on-line volatile measurement. First we compare the classical nose employing only one sensor array and its extension in the differential form containing two sensor arrays working in differential mode. We show that differential nose performs better at changing environmental conditions, especially the temperature, and well performs in the dynamic mode of operation. We show its application in recognition of different brands of tobacco

  6. Innovative Way of Internet Voting - Secure On-line Vote - SOLV

    Directory of Open Access Journals (Sweden)

    Shalini Vermani

    2012-11-01

    Full Text Available With the rapid growth in Information Technology, internet voting system has been evolved. This is a web based system that must provide high level of security. In this paper we have proposed Secure On-line Vote (SOLV, an internet voting system. SOLV gives voters a reliable and highly secure environment to cast their vote on web. This system ensures authentication of voters and guarantees the secrecy and integrity of each vote.

  7. Fractal groups: Emergent dynamics in on-line learning communities

    Directory of Open Access Journals (Sweden)

    Junia de Carvalho Fidelis Braga

    Full Text Available Drawing on complexity theory, this work discusses the complex dynamics and emergent patterns of on-line learning communities based on a doctoral study in the area of Applied Linguistics. The analysis will center on the interlocutions of fifty students who interacted in small groups without the teacher's direct intervention, in an undergraduate course offered by the School of Languages and Literature at the Federal University of Minas Gerais. By analyzing the data, I demonstrate that out of the interactions among the peers of autonomous on-line learning communities arise opportunities for the construction of shared meaning, distributed leadership, as well as other dynamics. I also demonstrate the fractal nature of these communities. Moreover, I discuss how these findings shed light on the creation and development of course designs for large groups.

  8. Dynamic secrets in communication security

    CERN Document Server

    Xiao, Sheng; Towsley, Donald

    2013-01-01

    Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. 'Dynamic Secrets in Communication Security' presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic

  9. On-line control of the nonlinear dynamics for synchrotrons

    Science.gov (United States)

    Bengtsson, J.; Martin, I. P. S.; Rowland, J. H.; Bartolini, R.

    2015-07-01

    We propose a simple approach to the on-line control of the nonlinear dynamics in storage rings, based on compensation of the nonlinear resonance driving terms using beam losses as the main indicator of the strength of a resonance. The correction scheme is built on the analysis of the resonance driving terms in first perturbative order and on the possibility of using independent power supplies in the sextupole magnets, which is nowadays present in many synchrotron light sources. Such freedom allows the definition of "smart sextupole knobs" attacking each resonance separately. The compensation scheme has been tested at the Diamond light source and proved to be effective in opening up the betatron tune space, resonance free, available to the electron beam and to improve the beam lifetime.

  10. Secure High Dynamic Range Images

    OpenAIRE

    Med Amine Touil; Noureddine Ellouze

    2016-01-01

    In this paper, a tone mapping algorithm is proposed to produce LDR (Limited Dynamic Range) images from HDR (High Dynamic Range) images. In the approach, non-linear functions are applied to compress the dynamic range of HDR images. Security tools will be then applied to the resulting LDR images and their effectiveness will be tested on the reconstructed HDR images. Three specific examples of security tools are described in more details: integrity verification using hash function to compute loc...

  11. On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Reijo M. Savola

    2009-09-01

    Full Text Available We propose an integrated security measurement architecture and framework for a dynamic self-organizing monitoring system based on mobile ad hoc networks (MANETs, structured according to currently known security challenges. The aim is to predict, as well as to monitor, the security performance, concentrating on the principal effects contributing to it. We introduce an on-thefly security level estimation mechanism for MANETs. The mechanism can be used to support node-level, network segment-level and network-level decision making. At the node level, it is possible to constantly estimate the security level when choosing applications and communication mechanisms. At the network level, democratic voting among independent estimates originating from different nodes is used to increase the level of security. Furthermore, we introduce a generic security evaluation framework based on definition and decomposition of security requirements, behaviour modelling, evidence collection, and decision making. The goal of the decision making process is to make an assessment of and form conclusions about the information security level or performance of the system under investigation.

  12. Secure High Dynamic Range Images

    Directory of Open Access Journals (Sweden)

    Med Amine Touil

    2016-04-01

    Full Text Available In this paper, a tone mapping algorithm is proposed to produce LDR (Limited Dynamic Range images from HDR (High Dynamic Range images. In the approach, non-linear functions are applied to compress the dynamic range of HDR images. Security tools will be then applied to the resulting LDR images and their effectiveness will be tested on the reconstructed HDR images. Three specific examples of security tools are described in more details: integrity verification using hash function to compute local digital signatures, encryption for confidentiality, and scrambling technique.

  13. Research progress in dynamic security assessment

    Energy Technology Data Exchange (ETDEWEB)

    1982-12-01

    Areas discussed are power system modeling, state estimation, structure decomposition, state forecasting, clustering and security measure development. A detailed dynamic model of a multi-machine power system has been developed. A process state estimator was developed to estimate the long-term dynamic behavior of the power system. The algorithm is identical to the extended Kalman filter but has a modified process noise driving term. A two-stage structure estimation technique was proposed for identifying the power system network configuration. Two approaches to structure decomposition were investigated. A time-scale decomposition of the system equations, based on a singular perturbation approach, was evaluated using a detailed model of a generating system. Spatial decomposition was examined by applying an optimal network decomposition technique to a 39-bus test system. Stochastic approximation based approaches to estimator simplification were examined. Explicit expressions were obtained for the evolution of the first and second moments of the system state. Research into security measures proceeded in three directions. The first area involves viewing the security assessment problem as a hyperplane crossing problem for a stochastic process. The second approach examined the stability of an unforced linear system where the system coefficients are subject to future jumps. The third area of research has led to the formulation of a security measure suitable for on-line assessment of transient stability.

  14. A Novel Multi-Secret Sharing Approach for Secure Data Warehousing and On-Line Analysis Processing in the Cloud

    OpenAIRE

    Attasena, Varunya; Harbi, Nouria; Darmont, Jérôme

    2015-01-01

    International audience; Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications, including data warehouses and on-line analytical processing. However, storing and transferring sensitive data into the cloud raises legitimate security concerns. In this paper, we propose a new multi-secret sharing approach for deploying data warehouses in the cloud and allowing on-line analysis processing, while enforcing ...

  15. A Novel Multi-Secret Sharing Approach for Secure Data Warehousing and On-Line Analysis Processing in the Cloud

    OpenAIRE

    Attasena, Varunya; Harbi, Nouria; Darmont, Jérôme

    2017-01-01

    Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications, including data warehouses and on-line analytical processing. However, storing and transferring sensitive data into the cloud raises legitimate security concerns. In this paper, we propose a new multi-secret sharing approach for deploying data warehouses in the cloud and allowing on-line analysis processing, while enforcing data privacy, integrity ...

  16. On-line Ammonia Sensor and Invisible Security Ink by Fluorescent Zwitterionic Spirocyclic Meisenheimer Complex

    Science.gov (United States)

    Das, Tanmay; Pramanik, Apurba; Haldar, Debasish

    2017-01-01

    Ammonia is not only a highly important gas for civilization but also contribute significantly for climate change and human health hazard. Highly sensitive ammonia sensor has been developed from a fluorescent zwitterionic spirocyclic Meisenheimer complex. Moreover, formation of this Meisenheimer complex can also be utilized for selective as well as naked eye instant detection of nitro aromatic explosive picric acid. The presence of a quaternary nitrogen atom directly attached to the spiro carbon is the unique feature of this Meisenheimer complex. This excellent photoluminescent (PL) Meisenheimer complex has two distinct stimuli responsive sites. One is sensitive towards acid while the other one is towards the base. These two positions can be modulated by adding one equivalent acid and one equivalent base to result two new products which are non fluorescent. One of these two non fluorescent species was found very exciting because of its UV/Vis transparency. Utilizing this concept we have fabricated an on-line sensor for measuring ammonia in dry or humid and condensing sewer air. The sensor was robust against ambient temperature and humidity variation. We have also developed an invisible ink from this Meisenheimer complex, with potential application for security purpose. PMID:28091542

  17. Dynamic security assessment processing system

    Science.gov (United States)

    Tang, Lei

    The architecture of dynamic security assessment processing system (DSAPS) is proposed to address online dynamic security assessment (DSA) with focus of the dissertation on low-probability, high-consequence events. DSAPS upgrades current online DSA functions and adds new functions to fit into the modern power grid. Trajectory sensitivity analysis is introduced and its applications in power system are reviewed. An index is presented to assess transient voltage dips quantitatively using trajectory sensitivities. Then the framework of anticipatory computing system (ACS) for cascading defense is presented as an important function of DSAPS. ACS addresses various security problems and the uncertainties in cascading outages. Corrective control design is automated to mitigate the system stress in cascading progressions. The corrective controls introduced in the dissertation include corrective security constrained optimal power flow, a two-stage load control for severe under-frequency conditions, and transient stability constrained optimal power flow for cascading outages. With state-of-the-art computing facilities to perform high-speed extended-term time-domain simulation and optimization for large-scale systems, DSAPS/ACS efficiently addresses online DSA for low-probability, high-consequence events, which are not addressed by today's industrial practice. Human interference is reduced in the computationally burdensome analysis.

  18. Information Security Awareness On-Line Materials Design with Knowledge Maps

    Science.gov (United States)

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  19. Information Security Awareness On-Line Materials Design with Knowledge Maps

    Science.gov (United States)

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  20. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    Ying-Cheng Lai; Adilson Motter; Takashi Nishikawa; Kwangho Park; Liang Zhao

    2005-04-01

    This paper presents a perspective in the study of complex networks by focusing on how dynamics may affect network security under attacks. In particular, we review two related problems: attack-induced cascading breakdown and range-based attacks on links. A cascade in a network means the failure of a substantial fraction of the entire network in a cascading manner, which can be induced by the failure of or attacks on only a few nodes. These have been reported for the internet and for the power grid (e.g., the August 10, 1996 failure of the western United States power grid). We study a mechanism for cascades in complex networks by constructing a model incorporating the flows of information and physical quantities in the network. Using this model we can also show that the cascading phenomenon can be understood as a phase transition in terms of the key parameter characterizing the node capacity. For a parameter value below the phase-transition point, cascading failures can cause the network to disintegrate almost entirely. We will show how to obtain a theoretical estimate for the phase-transition point. The second problem is motivated by the fact that most existing works on the security of complex networks consider attacks on nodes rather than on links. We address attacks on links. Our investigation leads to the finding that many scale-free networks are more sensitive to attacks on short-range than on long-range links. Considering that the small-world phenomenon in complex networks has been identified as being due to the presence of long-range links, i.e., links connecting nodes that would otherwise be separated by a long node-to-node distance, our result, besides its importance concerning network efficiency and security, has the striking implication that the small-world property of scale-free networks is mainly due to short-range links.

  1. Security Dynamics of Cloud Computing

    OpenAIRE

    Khaled M. Khan

    2009-01-01

    This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing are essentially different in terms of its characteristics and business model. Conventional way of viewing as well as addressing security such as ‘bolting-in’ on the top of cloud computing may not work well. The paper attempts to portray the security spectrum necessary for...

  2. A correction to 'efficient and secure comparison for on-line auctions'

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Krøigaard, Mikkel; Geisler, Martin

    2009-01-01

    In this paper, we describe a correction to the cryptosystem proposed in Damgard et al. from Int. J. Applied Cryptography, Vol. 1, No. 1. Although, the correction is small and does not affect the performance of the protocols from Damgard et al., it is necessary, as the cryptosystem is not secure w...

  3. Strengthening E - Banking security using Keystroke Dynamics

    OpenAIRE

    AHMAD KABIR USMAN; MAHMOOD HUSSA IN SHAH

    2013-01-01

    This paper investigates keystroke dynamics and its possible use as a tool to prevent or detect fraud in the banking industry. Given that banks are constantly on the lookout for improved methods to address the menace of fraud, the paper sets out to review keystroke dynamics, its advantages, disadvantages and potential for improving the security of e-banking systems. This paper evaluates keystroke dynamics suitability of use for enhancing security in the banking sector. Results from the literat...

  4. Vehicle dynamic prediction systems with on-line identification of vehicle parameters and road conditions.

    Science.gov (United States)

    Hsu, Ling-Yuan; Chen, Tsung-Lin

    2012-01-01

    This paper presents a vehicle dynamics prediction system, which consists of a sensor fusion system and a vehicle parameter identification system. This sensor fusion system can obtain the six degree-of-freedom vehicle dynamics and two road angles without using a vehicle model. The vehicle parameter identification system uses the vehicle dynamics from the sensor fusion system to identify ten vehicle parameters in real time, including vehicle mass, moment of inertial, and road friction coefficients. With above two systems, the future vehicle dynamics is predicted by using a vehicle dynamics model, obtained from the parameter identification system, to propagate with time the current vehicle state values, obtained from the sensor fusion system. Comparing with most existing literatures in this field, the proposed approach improves the prediction accuracy both by incorporating more vehicle dynamics to the prediction system and by on-line identification to minimize the vehicle modeling errors. Simulation results show that the proposed method successfully predicts the vehicle dynamics in a left-hand turn event and a rollover event. The prediction inaccuracy is 0.51% in a left-hand turn event and 27.3% in a rollover event.

  5. Dynamical and stationary properties of on-line learning from finite training sets

    Science.gov (United States)

    Luo, Peixun; Michael Wong, K. Y.

    2003-01-01

    The dynamical and stationary properties of on-line learning from finite training sets are analyzed by using the cavity method. For large input dimensions, we derive equations for the macroscopic parameters, namely, the student-teacher correlation, the student-student autocorrelation and the learning force fluctuation. This enables us to provide analytical solutions to Adaline learning as a benchmark. Theoretical predictions of training errors in transient and stationary states are obtained by a Monte Carlo sampling procedure. Generalization and training errors are found to agree with simulations. The physical origin of the critical learning rate is presented. Comparison with batch learning is discussed throughout the paper.

  6. On-line real-time path planning of mobile robots in dynamic uncertain environment

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A new path planning method for mobile robots in globally unknown environment with moving obstacles is presented. With an autoregressive (AR) model to predict the future positions of moving obstacles, and the predicted position taken as the next position of moving obstacles, a motion path in dynamic uncertain environment is planned by means of an on-line real-time path planning technique based on polar coordinates in which the desirable direction angle is taken into consideration as an optimization index. The effectiveness, feasibility, high stability, perfect performance of obstacle avoidance, real-time and optimization capability are demonstrated by simulation examples.

  7. On-line Dynamic Model Correction Based Fault Diagnosis in Chemical Processes

    Institute of Scientific and Technical Information of China (English)

    田文德; 孙素莉

    2007-01-01

    A novel fault detection and diagnosis method was proposed,using dynamic simulation to monitor chemical process and identify faults when large tracking deviations occur.It aims at parameter failures,and the parameters are updated via on-line correction.As it can predict the trend of process and determine the existence of malfunctions simultaneously,this method does not need to design problem-specific observer to estimate unmeasured state variables.Application of the proposed method is presented on one water tank and one aromatization reactor,and the results are compared with those from the traditional method.

  8. On-line Weighted Least Squares Kernel Method for Nonlinear Dynamic Modeling

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Support vector machines (SVM) have been widely used in pattern recognition and have also drawn considerable interest in control areas. Based on rolling optimization method and on-line learning strategies, a novel approach based on weighted least squares support vector machines (WLS-SVM) is proposed for nonlinear dynamic modeling.The good robust property of the novel approach enhances the generalization ability of kernel method-based modeling and some experimental results are presented to illustrate the feasibility of the proposed method.

  9. On-line parameter and delay estimation of continuous-time dynamic systems

    Directory of Open Access Journals (Sweden)

    Kozłowski Janusz

    2015-06-01

    Full Text Available The problem of on-line identification of non-stationary delay systems is considered. The dynamics of supervised industrial processes are usually modeled by ordinary differential equations. Discrete-time mechanizations of continuous-time process models are implemented with the use of dedicated finite-horizon integrating filters. Least-squares and instrumental variable procedures mechanized in recursive forms are applied for simultaneous identification of input delay and spectral parameters of the system models. The performance of the proposed estimation algorithms is verified in an illustrative numerical simulation study.

  10. A Dynamic Framework for Water Security

    Science.gov (United States)

    Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu

    2017-04-01

    Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.

  11. On-line dynamic measurement of blood viscosity, hematocrit and change of blood volume

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Objective: To develop an on-line system for the measurement of blood viscosity and hematocrit. The dynamic changes of the macrovascular blood volumes,microvascular blood volumes and the total blood volume were observed by means of calculating from the testing result. Methods: Applying traditional viscosity measurement principle and specific wavelength optic density measurement method, an on-line system for the measurement of blood viscosity and hematocrit was developed, and the A/D multifunctionai board and the testing circuit were designed by ourselves. The system was validated by experiments both in vitro and in vivo. Therapeutic effects of hypertonic saline dextran solution (HSD) and Lactatic Ringer's solution at the early stage after burn-blast combined injury were compared by this method. Results: The results showed that the system has attained the goal of the design. The changes of the blood viscosity and hematocrit could be detected effectively and continuously. The changes of macrovascular, microvascular and total blood volume could be calculated approximately. Conclusions: The system and the method can continuously on-line test the blood viscosity and hematocrit, and reveal the change and distribution of blood volumes more accurately and dearly in the therapy process by estimating changes of the macrovascular, microvascular and total blood volumes, respectively. It has confirmed that HSD treatment could increase blood pressure and attenuate tissue edema by significantly increasing total blood volume,improving macrocirculatory and microcirculatory blood volumes. This study suggested that it could be desirable to develop an experiment technique based on the method mentioned above.

  12. Strengthening E - Banking security using Keystroke Dynamics

    Directory of Open Access Journals (Sweden)

    AHMAD KABIR USMAN

    2013-12-01

    Full Text Available This paper investigates keystroke dynamics and its possible use as a tool to prevent or detect fraud in the banking industry. Given that banks are constantly on the lookout for improved methods to address the menace of fraud, the paper sets out to review keystroke dynamics, its advantages, disadvantages and potential for improving the security of e-banking systems. This paper evaluates keystroke dynamics suitability of use for enhancing security in the banking sector. Results from the literature review found that keystroke dynamics can offer impressive accuracy rates for user identification. Lcosts of deployment and minimal change to users modus operandi make this technology an attractive investment for banks. The paper goes on to argue that although this behavioural biometric may not be suitable as a primary method of authentication, it can be used as a secondary or tertiary method to complement existing authentication systems.

  13. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  14. Development of a Probabilistic Technique for On-line Parameter and State Estimation in Non-linear Dynamic Systems

    Energy Technology Data Exchange (ETDEWEB)

    Tunc Aldemir; Don W. Miller; Brian k. Hajek; Peng Wang

    2002-04-01

    The DSD (Dynamic System Doctor) is a system-independent, interactive software under development for on-line state/parameter estimation in dynamic systems (1), partially supported through a Nuclear Engineering Education (NEER) grant during 1998-2001. This paper summarizes the recent accomplishments in improving the user-friendliness and computational capability of DSD

  15. PREDICT: Privacy and Security Enhancing Dynamic Information Monitoring

    Science.gov (United States)

    2015-08-03

    AFRL-OSR-VA-TR-2015-0217 PREDICT Privacy and Security Enhancing Dynamic Information Monitoring VAIDY S SUNDERAM EMORY UNIVERSITY Final Report 08/03...TITLE AND SUBTITLE PREDICT: Privacy and Security Enhancing Dynamic Information Monitoring 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA9550-12-1-0240 5c...SUPPLEMENTARY NOTES 14. ABSTRACT The PREDICT project incorporates security and privacy in DDDAS systems to deliver provable guarantees of privacy and

  16. Vehicle Dynamic Prediction Systems with On-Line Identification of Vehicle Parameters and Road Conditions

    OpenAIRE

    Ling-Yuan Hsu; Tsung-Lin Chen

    2012-01-01

    This paper presents a vehicle dynamics prediction system, which consists of a sensor fusion system and a vehicle parameter identification system. This sensor fusion system can obtain the six degree-of-freedom vehicle dynamics and two road angles without using a vehicle model. The vehicle parameter identification system uses the vehicle dynamics from the sensor fusion system to identify ten vehicle parameters in real time, including vehicle mass, moment of inertial, and road friction coefficie...

  17. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges

    Directory of Open Access Journals (Sweden)

    Mrs. D. Shanmugapriya

    2009-09-01

    Full Text Available Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done by observing the change in the typing pattern of the user. A comprehensive survey of the existing keystroke dynamics methods, metrics, different approaches are given in this study. This paper also discusses about the various security issues and challenges faced by keystroke dynamics..Keywords- Biometris; Keystroke Dynamics; computer Security; Information Security; User Authentication.

  18. Drought Dynamics and Food Security in Ukraine

    Science.gov (United States)

    Kussul, N. M.; Kogan, F.; Adamenko, T. I.; Skakun, S. V.; Kravchenko, O. M.; Kryvobok, O. A.; Shelestov, A. Y.; Kolotii, A. V.; Kussul, O. M.; Lavrenyuk, A. M.

    2012-12-01

    In recent years food security became a problem of great importance at global, national and regional scale. Ukraine is one of the most developed agriculture countries and one of the biggest crop producers in the world. According to the 2011 statistics provided by the USDA FAS, Ukraine was the 8th largest exporter and 10th largest producer of wheat in the world. Therefore, identifying current and projecting future trends in climate and agriculture parameters is a key element in providing support to policy makers in food security. This paper combines remote sensing, meteorological, and modeling data to investigate dynamics of extreme events, such as droughts, and its impact on agriculture production in Ukraine. Two main problems have been considered in the study: investigation of drought dynamics in Ukraine and its impact on crop production; and investigation of crop growth models for yield and production forecasting and its comparison with empirical models that use as a predictor satellite-derived parameters and meteorological observations. Large-scale weather disasters in Ukraine such as drought were assessed using vegetation health index (VHI) derived from satellite data. The method is based on estimation of green canopy stress/no stress from indices, characterizing moisture and thermal conditions of vegetation canopy. These conditions are derived from the reflectance/emission in the red, near infrared and infrared parts of solar spectrum measured by the AVHRR flown on the NOAA afternoon polar-orbiting satellites since 1981. Droughts were categorized into exceptional, extreme, severe and moderate. Drought area (DA, in % from total Ukrainian area) was calculated for each category. It was found that maximum DA over past 20 years was 10% for exceptional droughts, 20% for extreme droughts, 50% for severe droughts, and 80% for moderate droughts. Also, it was shown that in general the drought intensity and area did not increase considerably over past 10 years. Analysis

  19. Anticipating the unintended consequences of security dynamics.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Overfelt, James Robert; Malczynski, Leonard A.; Saltiel, David H.; Simon Paul Moulton

    2010-01-01

    In a globalized world, dramatic changes within any one nation causes ripple or even tsunamic effects within neighbor nations and nations geographically far removed. Multinational interventions to prevent or mitigate detrimental changes can easily cause secondary unintended consequences more detrimental and enduring than the feared change instigating the intervention. This LDRD research developed the foundations for a flexible geopolitical and socioeconomic simulation capability that focuses on the dynamic national security implications of natural and man-made trauma for a nation-state and the states linked to it through trade or treaty. The model developed contains a database for simulating all 229 recognized nation-states and sovereignties with the detail of 30 economic sectors including consumers and natural resources. The model explicitly simulates the interactions among the countries and their governments. Decisions among governments and populations is based on expectation formation. In the simulation model, failed expectations are used as a key metric for tension across states, among ethnic groups, and between population factions. This document provides the foundational documentation for the model.

  20. Dynamic security risk assessment and optimization of power transmission system

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The paper presents a practical dynamic security region (PDSR) based dynamic security risk assessment and optimization model for power transmission system. The cost of comprehensive security control and the influence of uncertainties of power injections are considered in the model of dynamic security risk assessment. The transient stability constraints and uncertainties of power injections can be considered easily by PDSR in form of hyper-box. A method to define and classify contingency set is presented, and a risk control optimization model is given which takes total dynamic insecurity risk as the objective function for a dominant con-tingency set. An optimal solution of dynamic insecurity risk is obtained by opti-mizing preventive and emergency control cost and contingency set decomposition. The effectiveness of this model has been proved by test results on the New Eng-land 10-genarator 39-bus system.

  1. On-line surveillance of a dynamic process by a moving system based on pulsed digital holographic interferometry.

    Science.gov (United States)

    Pedrini, Giancarlo; Alexeenko, Igor; Osten, Wolfgang; Schnars, Ulf

    2006-02-10

    A method based on pulsed digital holographic interferometry for the measurement of dynamic deformations of a surface by using a moving system is presented. The measuring system may move with a speed of several meters per minute and can measure deformation of the surface with an accuracy of better than 50 nm. The deformation is obtained by comparison of the wavefronts recorded at different times with different laser pulses produced by a Nd:YAG laser. The effect due to the movement of the measuring system is compensated for by digital processing of the different holograms. The system is well suited for on-line surveillance of a dynamic process such as laser welding and friction stir welding. Experimental results are presented, and the advantages of the method are discussed.

  2. MANAGEMENT OF RESOURCES IN DYNAMICALLY CHANGING SECURITY ENVRIONMENT

    Directory of Open Access Journals (Sweden)

    Sevdalina Dimitrova

    2014-09-01

    Full Text Available The monograph recommends integration between science and practice, experts from national bodies and scientific research potential of academic community of military universities in the field of management of resources of security and defence in accordance to the challenges in security environment caused by its dynamic and often unpredictable changes.

  3. Real-time dynamic security assessment of power grids

    Science.gov (United States)

    Kerin, Uros; Heyde, Chris; Krebs, Rainer; Lerch, Edwin

    2014-10-01

    This paper presents a dynamic security assessment solution, which can be used in the power system control room to improve system stability. It is based on a set of security indices. The indices are able of establishing contingencies' severity levels as a measure of different aspects of power system security. A system based on fuzzy logic is used to combine the indices into a single composite index. The composite index is able to alert the control operator to the network conditions that represent a significant risk to system security based on over-all system performance.

  4. Secure Group Communications for Large Dynamic Multicast Group

    Institute of Scientific and Technical Information of China (English)

    Liu Jing; Zhou Mingtian

    2003-01-01

    As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme.

  5. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mónica Pinto

    2015-03-01

    Full Text Available Providing security and privacy to wireless sensor nodes (WSNs is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs.We evaluate our approach using a case study from the intelligent transportation system domain.

  6. Population dynamics: Social security, markets, and families.

    Science.gov (United States)

    Mason, Andrew W; Lee, Ronald D; Lee, Sang-Hyop

    2010-07-01

    Upward intergenerational flows - from the working ages to old age - are increasing substantially in the advanced industrialized countries and are much larger than in developing countries. Population aging is the most important factor leading to this change. Thus, in the absence of a major demographic shift, e.g., a return to high fertility, an increase in upward flows is inevitable. Even so, three other important factors will influence the magnitudes of upward flows. First, labor income varies at older ages due to differences in average age at retirement, productivity, unemployment, and hours worked. Second, the age patterns of consumption at older ages vary primarily due to differences in spending on health. Third, spending on human capital, i.e., spending child health and education, varies. Human capital spending competes with spending on the elderly, but it also increases the productivity of subsequent generations of workers and the resources available to support consumption in old age. All contemporary societies rely on a variety of institutions and economic mechanisms to shift economic resources from the working ages to the dependent ages - the young and the old. Three institutions dominate intergenerational flows: governments which implement social security, education, and other public transfer programs; markets which are key to the accumulation of assets, e.g., funded pensions and housing; and families which provide economic support to children in all societies and to the elderly in many. The objectives of this paper are, first, to describe how population aging and other changes influence the direction and magnitude of intergenerational flows; and, second, to contrast the institutional approaches to intergenerational flows as they are practiced around the world. The paper relies extensively on National Transfer Accounts, a system for measuring economic flows across age in a manner consistent with the UN System of National Accounts. These accounts are

  7. Population dynamics: Social security, markets, and families

    Science.gov (United States)

    Lee, Ronald D.; Lee, Sang-Hyop

    2015-01-01

    Upward intergenerational flows – from the working ages to old age – are increasing substantially in the advanced industrialized countries and are much larger than in developing countries. Population aging is the most important factor leading to this change. Thus, in the absence of a major demographic shift, e.g., a return to high fertility, an increase in upward flows is inevitable. Even so, three other important factors will influence the magnitudes of upward flows. First, labor income varies at older ages due to differences in average age at retirement, productivity, unemployment, and hours worked. Second, the age patterns of consumption at older ages vary primarily due to differences in spending on health. Third, spending on human capital, i.e., spending child health and education, varies. Human capital spending competes with spending on the elderly, but it also increases the productivity of subsequent generations of workers and the resources available to support consumption in old age. All contemporary societies rely on a variety of institutions and economic mechanisms to shift economic resources from the working ages to the dependent ages – the young and the old. Three institutions dominate intergenerational flows: governments which implement social security, education, and other public transfer programs; markets which are key to the accumulation of assets, e.g., funded pensions and housing; and families which provide economic support to children in all societies and to the elderly in many. The objectives of this paper are, first, to describe how population aging and other changes influence the direction and magnitude of intergenerational flows; and, second, to contrast the institutional approaches to intergenerational flows as they are practiced around the world. The paper relies extensively on National Transfer Accounts, a system for measuring economic flows across age in a manner consistent with the UN System of National Accounts. These accounts are

  8. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges

    CERN Document Server

    Shanmugapriya, D

    2009-01-01

    Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done by observing the change in the typing pattern of the user. A comprehensive survey of the existing keystroke dynamics methods, metrics, different approaches are given in this study. This paper also discusses about the various security issues and challenges faced by keystroke dynamics.

  9. A dynamic,secure,and efficient group key agreement protocol

    Institute of Scientific and Technical Information of China (English)

    ZHENG Shihui; WANG Shaohui; ZHANG Guoyan

    2007-01-01

    The key challenge of dynamic peer communication is how to realize secure and efficient group key management.A two rounds key agreement protocol for dynamic peer group (DPG) is proposed in this paper.The protocol,which was obtained by combining the E1Gamal encryption scheme with the E1Gamal signature scheme,is efficient and simple.The protocol is proven secure against passive attack by using indistinguishable method.Moreover,both perfect forward secrecy (PFS) and key independence (KI) were achieved.Because the protocol is based on the broadcast channel,it is also suitable for key agreement in wireless communications,especially in ad-hoc networks.

  10. On-line calorific value sensor and validation of dynamic models applied to municipal solid waste combustion

    NARCIS (Netherlands)

    Kessel, L.B.M. van; Leskens, M.; Brem, G.

    2002-01-01

    This paper deals with two aspects concerning the optimization of municipal solid waste combustion (MSWC) processes. First of all, an on-line calorific value sensor is discussed by means of which the calorific value of the waste can be estimated from actual process data. Experimental results on a MSW

  11. A coherency-based method to increase dynamic security in power systems

    Energy Technology Data Exchange (ETDEWEB)

    De Tuglie, E. [Dipartimento di Ingegneria dell' Ambiente e per lo Sviluppo Sostenibile - DIASS, Politecnico di Bari, Viale del Turismo 8, 74100 Taranto (Italy); Iannone, S.M.; Torelli, F. [Dipartimento di Elettrotecnica ed Elettronica - DEE, Politecnico di Bari, Via Re David 200, 70125 Bari (Italy)

    2008-08-15

    Dynamic security analysis is the evaluation of the ability of a system to withstand contingencies by surviving transient conditions to acceptable steady-state operative states. When potential instability due to contingency is detected, preventive action may be desired to improve the system security. This is very important in the on-line operation of a power system, especially when the system is stability-limited. The method proposed in this paper is based on the idea that increasing coherency between generators in the transient behaviour following a system perturbation gives rise to a more stable system. In this paper, we suggest the use of the ''input-output feedback-linearization'' with a reference trajectory obtained using a system dynamic equivalent based on the centre of inertia. To quantify coherency levels a new coherency indicator has been assumed for the given reference trajectory. The result is an increasing level in coherency, critical clearing time and system stability. The method is tested on the IEEE 30 bus test system. (author)

  12. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  13. Comparison of quarter-hourly on-line dynamic headspace analysis to purge-and-trap analysis of varying volatile organic compounds in drinking water sources.

    Science.gov (United States)

    Schnable, J G; Dussert, B; Suffet, I H; Hertz, C D

    1990-07-27

    On-line dynamic headspace analysis was refined for the quarter-hourly monitoring of select volatile organic compounds (VOCs) in ground and surface waters, for extended periods of time. Hourly comparisons were made to on-line purge-and-trap analysis, and to purge-and-trap analysis after sample preservation and storage. Variations in VOC concentrations of 6047% biweekly, 222% daily, 97% hourly, and 35% quarter-hourly were observable, with the 15-min cycle of the dynamic headspace analysis. The headspace analyzer had superior retention time stability, required less maintenance, and had 1/4 the analysis time as a typical purge-and-trap-gas chromatograph system used for hourly comparisons.

  14. Privacy Enhanced Pervasive Computing Model with Dynamic Trust and Security

    Directory of Open Access Journals (Sweden)

    Geetha Mariappan

    2014-06-01

    Full Text Available The objective of the research work is to propose a policy aware privacy enhancement model using dynamic trust and security management techniques. The different polices of the stakeholders incorporating device manufacturer, service provider, Mobile agents and mobile users are considered to achieve an enhanced privacy for on-demand request. The entities involving direct and indirect trust establishment with all forms of uncertainties like DDoS attacks are considered along with multiple layers of security management operations across varying trusted entities. The focus is to enhance the existing privacy through an efficient, preventive, detective, response mechanisms for those attacks, which will address the problem of DDoS before, during and after an actual attack. The session time and access time are controlled by the privileges and rights for disclosure of information in pervasive environment.

  15. ACSEPP On-Line Electronic Payment Protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Shao-bin; ZHU Xian; HONG Fan

    2004-01-01

    With analyzing the existing on-line electronic payment protocols, this paper presents a new on-line electronic payment protocol named ACSEPP: Anonymous, Convenient and Secure Electronic Payment Protocol.Its aim is to design a practical electronic payment protocol which is both secure and convenient.Without using PKI_CA frame, it realized the anonymity of consumer and merchant, the convenient of handling, the low cost of maintenance and the security.

  16. Dynamic Data Possession Checking for Secure Cloud Storage Service

    Directory of Open Access Journals (Sweden)

    Wenzhe Jiao

    2013-12-01

    Full Text Available Using cloud storage service, data owners can access their data anywhere at any time and enjoy the on-demand high quality applications and services, without the burden of local data storage and maintenance. Meanwhile, the risk of losing data stored with any untrustworthy service provider is the key barrier to widely adopt cloud storage service. To verify the integrity of data stored in cloud and relieve the security concerns of customers, a privacy-preserving data possession checking (DPC scheme is presented. This scheme uses Merkle Hash Tree to support fully dynamic data operations. To achieve robustness, forward error-correcting codes can be combined with the proposed DPC scheme, which can recover the data when a small amount of file has been corrupted. The scheme allows unlimited times verification without the need for the verifier to compare against the original data, which reduces the communication and computation complexity dramatically and preserves the privacy of the data. Extensive security analysis and simulation show that the proposed scheme is highly provably secure.

  17. ON-LINE DYNAMIC SECURITY ASSESSMENT OF A MICRO-GRID USING FUZZY LOGIC AND DISTRIBUTED PROCESSING

    Directory of Open Access Journals (Sweden)

    GUSTAVO SCHWEICKARDT

    2013-01-01

    Full Text Available La evaluación de la seguridad dinámica en línea se define como la habilidad de un sistema de potencia a soportar contingencias repentinas y sobrevivir el transitorio y llegar a un nuevo estado estacionario aceptable. Durante la operación del sistema la evaluación del nivel de seguridad dinámica es esencial para tomar medidas de control preventivas con el objetivo de llevar al sistema, en caso de que sea necesario, a un estado de operación más seguro. Debido a la gran complejidad de los sistemas de potencia y al gran número de componentes, la evaluación de la seguridad es computacionalmente compleja lo que la hace poco útil. Esto es más complejo cuando se desea evaluar la seguridad dinámica considerando las nuevas micro redes. Para afrontar este problema, se presenta un nuevo enfoque de evaluación de la seguridad dinámica en línea de micro redes. La propuesta emplea procesamiento distribuido y técnicas de inteligencia artificial para reducir los tiempos de cálculo lo que permite su ejecución en línea con la operación del sistema.

  18. Resilience to leaking--dynamic systems modeling of information security.

    Science.gov (United States)

    Hamacher, Kay

    2012-01-01

    Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack 'unjust' systems or 'conspiracies'. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for 'just' and 'unjust' entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the 'conspiracy'). In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean' in direct adversary relations, but do not necessarily increase public benefit and societal immunization to 'conspiracies'. Furthermore, within the model the exploitation of the (open) competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here.

  19. Resilience to Leaking — Dynamic Systems Modeling of Information Security

    Science.gov (United States)

    Hamacher, Kay

    2012-01-01

    Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack ‘unjust’ systems or ‘conspiracies’. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for ‘just’ and ‘unjust’ entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the ‘conspiracy’). In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean’ in direct adversary relations, but do not necessarily increase public benefit and societal immunization to ‘conspiracies’. Furthermore, within the model the exploitation of the (open) competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here. PMID:23227151

  20. Resilience to leaking--dynamic systems modeling of information security.

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    Full Text Available Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack 'unjust' systems or 'conspiracies'. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for 'just' and 'unjust' entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the 'conspiracy'. In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean' in direct adversary relations, but do not necessarily increase public benefit and societal immunization to 'conspiracies'. Furthermore, within the model the exploitation of the (open competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here.

  1. A Neural Dynamic Architecture for Reaching and Grasping Integrates Perception and Movement Generation and Enables On-Line Updating

    Science.gov (United States)

    Knips, Guido; Zibner, Stephan K. U.; Reimann, Hendrik; Schöner, Gregor

    2017-01-01

    Reaching for objects and grasping them is a fundamental skill for any autonomous robot that interacts with its environment. Although this skill seems trivial to adults, who effortlessly pick up even objects they have never seen before, it is hard for other animals, for human infants, and for most autonomous robots. Any time during movement preparation and execution, human reaching movement are updated if the visual scene changes (with a delay of about 100 ms). The capability for online updating highlights how tightly perception, movement planning, and movement generation are integrated in humans. Here, we report on an effort to reproduce this tight integration in a neural dynamic process model of reaching and grasping that covers the complete path from visual perception to movement generation within a unified modeling framework, Dynamic Field Theory. All requisite processes are realized as time-continuous dynamical systems that model the evolution in time of neural population activation. Population level neural processes bring about the attentional selection of objects, the estimation of object shape and pose, and the mapping of pose parameters to suitable movement parameters. Once a target object has been selected, its pose parameters couple into the neural dynamics of movement generation so that changes of pose are propagated through the architecture to update the performed movement online. Implementing the neural architecture on an anthropomorphic robot arm equipped with a Kinect sensor, we evaluate the model by grasping wooden objects. Their size, shape, and pose are estimated from a neural model of scene perception that is based on feature fields. The sequential organization of a reach and grasp act emerges from a sequence of dynamic instabilities within a neural dynamics of behavioral organization, that effectively switches the neural controllers from one phase of the action to the next. Trajectory formation itself is driven by a dynamical systems version of

  2. A Neural Dynamic Architecture for Reaching and Grasping Integrates Perception and Movement Generation and Enables On-Line Updating.

    Science.gov (United States)

    Knips, Guido; Zibner, Stephan K U; Reimann, Hendrik; Schöner, Gregor

    2017-01-01

    Reaching for objects and grasping them is a fundamental skill for any autonomous robot that interacts with its environment. Although this skill seems trivial to adults, who effortlessly pick up even objects they have never seen before, it is hard for other animals, for human infants, and for most autonomous robots. Any time during movement preparation and execution, human reaching movement are updated if the visual scene changes (with a delay of about 100 ms). The capability for online updating highlights how tightly perception, movement planning, and movement generation are integrated in humans. Here, we report on an effort to reproduce this tight integration in a neural dynamic process model of reaching and grasping that covers the complete path from visual perception to movement generation within a unified modeling framework, Dynamic Field Theory. All requisite processes are realized as time-continuous dynamical systems that model the evolution in time of neural population activation. Population level neural processes bring about the attentional selection of objects, the estimation of object shape and pose, and the mapping of pose parameters to suitable movement parameters. Once a target object has been selected, its pose parameters couple into the neural dynamics of movement generation so that changes of pose are propagated through the architecture to update the performed movement online. Implementing the neural architecture on an anthropomorphic robot arm equipped with a Kinect sensor, we evaluate the model by grasping wooden objects. Their size, shape, and pose are estimated from a neural model of scene perception that is based on feature fields. The sequential organization of a reach and grasp act emerges from a sequence of dynamic instabilities within a neural dynamics of behavioral organization, that effectively switches the neural controllers from one phase of the action to the next. Trajectory formation itself is driven by a dynamical systems version of

  3. Information Security: A Scientometric Study of the Profile, Structure, and Dynamics of an Emerging Scholarly Specialty

    Science.gov (United States)

    Olijnyk, Nicholas Victor

    2014-01-01

    The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…

  4. Automated on-line liquid–liquid extraction system for temporal mass spectrometric analysis of dynamic samples

    Energy Technology Data Exchange (ETDEWEB)

    Hsieh, Kai-Ta; Liu, Pei-Han [Department of Applied Chemistry, National Chiao Tung University, 1001 University Rd, Hsinchu, 300, Taiwan (China); Urban, Pawel L. [Department of Applied Chemistry, National Chiao Tung University, 1001 University Rd, Hsinchu, 300, Taiwan (China); Institute of Molecular Science, National Chiao Tung University, 1001 University Rd, Hsinchu, 300, Taiwan (China)

    2015-09-24

    Most real samples cannot directly be infused to mass spectrometers because they could contaminate delicate parts of ion source and guides, or cause ion suppression. Conventional sample preparation procedures limit temporal resolution of analysis. We have developed an automated liquid–liquid extraction system that enables unsupervised repetitive treatment of dynamic samples and instantaneous analysis by mass spectrometry (MS). It incorporates inexpensive open-source microcontroller boards (Arduino and Netduino) to guide the extraction and analysis process. Duration of every extraction cycle is 17 min. The system enables monitoring of dynamic processes over many hours. The extracts are automatically transferred to the ion source incorporating a Venturi pump. Operation of the device has been characterized (repeatability, RSD = 15%, n = 20; concentration range for ibuprofen, 0.053–2.000 mM; LOD for ibuprofen, ∼0.005 mM; including extraction and detection). To exemplify its usefulness in real-world applications, we implemented this device in chemical profiling of pharmaceutical formulation dissolution process. Temporal dissolution profiles of commercial ibuprofen and acetaminophen tablets were recorded during 10 h. The extraction-MS datasets were fitted with exponential functions to characterize the rates of release of the main and auxiliary ingredients (e.g. ibuprofen, k = 0.43 ± 0.01 h{sup −1}). The electronic control unit of this system interacts with the operator via touch screen, internet, voice, and short text messages sent to the mobile phone, which is helpful when launching long-term (e.g. overnight) measurements. Due to these interactive features, the platform brings the concept of the Internet-of-Things (IoT) to the chemistry laboratory environment. - Highlights: • Mass spectrometric analysis normally requires sample preparation. • Liquid–liquid extraction can isolate analytes from complex matrices. • The proposed system automates

  5. Development and Application of On-line Wind Power Risk Assessment System

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Because of the large-scale integration of wind power, the dynamic characteristics of power system have many uncertain effects. Based on deterministic analysis methods, traditional on-line security assessment system cannot quantitatively estimate the actual operating conditions of the power system for only considering the most serious and credible accidents. Therefore, the risk theory is introduced into an on-line security assessment system and then an on-line risk assessment dynamic security assessment system system for wind power is designed Based on multiple data integration, and implemented by combining with the the wind power disturbance probability is available and the security assessment of the power grid can obtain security indices in different aspects. The operating risk index is an expectation of severity, computed by summing up all the products of the result probability and its severity. Analysis results are reported to the dispatchers in on-line environment, while the comprehensive weak links are automatically provided to the power dispatching center. The risk assessment system in operation can verify the reasonableness of the system.

  6. Secure physical layer using dynamic permutations in cognitive OFDMA systems

    DEFF Research Database (Denmark)

    Meucci, F.; Wardana, Satya Ardhy; Prasad, Neeli R.

    2009-01-01

    This paper proposes a novel lightweight mechanism for a secure Physical (PHY) layer in Cognitive Radio Network (CRN) using Orthogonal Frequency Division Multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured...... of the permutations are analyzed for several DSA patterns. Simulations are performed according to the parameters of the IEEE 802.16e system model. The securing mechanism proposed provides intrinsic PHY layer security and it can be easily implemented in the current IEEE 802.16 standard applying almost negligible...

  7. The determination of organochlorine pesticides based on dynamic microwave-assisted extraction coupled with on-line solid-phase extraction of high-performance liquid chromatography

    Energy Technology Data Exchange (ETDEWEB)

    Chen Ligang [College of Chemistry, Jilin University, 2699 Qianjin Street, Changchun 130012 (China); Ding Lan [College of Chemistry, Jilin University, 2699 Qianjin Street, Changchun 130012 (China)]. E-mail: analchem@jlu.edu.cn; Jin Haiyan [College of Chemistry, Jilin University, 2699 Qianjin Street, Changchun 130012 (China); Song Daqian [College of Chemistry, Jilin University, 2699 Qianjin Street, Changchun 130012 (China); Zhang Huarong [College of Chemistry, Jilin University, 2699 Qianjin Street, Changchun 130012 (China); Li Jiantao [College of Chemistry, Jilin University, 2699 Qianjin Street, Changchun 130012 (China); Zhang Kun [College of Chemistry, Jilin University, 2699 Qianjin Street, Changchun 130012 (China); Wang Yutang [College of Chemistry, Jilin University, 2699 Qianjin Street, Changchun 130012 (China); Zhang Hanqi [College of Chemistry, Jilin University, 2699 Qianjin Street, Changchun 130012 (China)

    2007-04-25

    A rapid technique based on dynamic microwave-assisted extraction coupled with on-line solid-phase extraction of high-performance liquid chromatography (DMAE-SPE-HPLC) has been developed. A TM{sub 010} microwave resonance cavity built in the laboratory was applied to concentrate the microwave energy. The sample placed in the zone of microwave irradiation was extracted with 95% acetonitrile (ACN) aqueous solution which was driven by a peristaltic pump at a flow rate of 1.0 mL min{sup -1}. The extraction can be completed in a recirculating system in 10 min. When a number of extraction cycles were completed, the extract (1 mL) was diluted on-line with water. Then the extract was loaded into an SPE column where the analytes were retained while the unretained matrix components were washed away. Subsequently, the analytes were automatically transferred from the SPE column to the analytical column and determined by UV detector at 238 nm. The technique was used for determination of organochlorine pesticides (OCPs) in grains, including wheat, rice, corn and bean. The limits of detection of OCPs are in the range of 19-37 ng g{sup -1}. The recoveries obtained by analyzing the four spiked grain samples are in the range of 86-105%, whereas the relative standard deviation (R.S.D.) values are <8.7% ranging from 1.2 to 8.7%. Our method was demonstrated to be fast, accurate, and precise. In addition, only small quantities of solvent and sample were required.

  8. Dynamic Data Storage and Public Auditability for Cloud Storage Security

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2012-01-01

    IT has moved into next generation with cloud computing being realized. The way application software and databases are stored has been changed. Now they are stored in cloud data centers in which security is a concern from client point of view. The new phenomenon which is used to store and manage...... data without capital investment has brought many security challenges which are not thoroughly understood. This paper focuses on the security and integrity of data stored in cloud data servers. The data integrity verification is done by using a third party auditor who is authorized to check integrity...

  9. Primary, secondary and tertiary frequency control in dynamic security analyses of electric power interconnections

    Directory of Open Access Journals (Sweden)

    Ivanović Milan

    2012-01-01

    Full Text Available This paper presents the incorporation of primary, secondary and tertiary frequency control in the dynamic security analyses of electric power interconnections. This was done in accordance with the wider environment of the existing state of the Serbian power system. The improved software for dynamic security analysis has been tested on the regional transmission network, which includes power systems of Serbia, Montenegro, Bosnia and Herzegovina, Croatia, Hungary, Macedonia, Romania, Bulgaria, Greece and Albania.

  10. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  11. Dynamic Tracking and Comprehensive Evaluation on the Natural Resources Security Elements and System in China

    Institute of Scientific and Technical Information of China (English)

    Yao Yulong; Zhou Hong

    2010-01-01

    System theory,pressure-state-response and drivingpressure-state-impact-response model have been applied to establishing China's dynamic tracking evaluation system of natural resources security in this article.Based on analytic hierarchy process and Delphi methods,the natural resources security situation has been evaluated systematically from 1991 to 2007.The result showed that the overall level of China's natural resources security presented a downtrend from 1991 to 2007.The basic reasons are the pressure indicators such as population,GDP,natural resources trade increased gradually,resulting in tension and fragility of natural resources security.

  12. Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia

    Directory of Open Access Journals (Sweden)

    Angélica Flórez

    2016-07-01

    Full Text Available This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC. This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between them, which allow an understanding of the synergy between the different existing components. The complexity of the CEC is detailed from the view of the Influence Diagram of System Dynamics and the Domain Diagram of Software Engineering. The resulting model makes cyber security evident as a strategic component of national security.

  13. Product of Likelihood Ratio Scores Fusion of Dynamic Face, Text Independent Speech and On-line Signature Based Biometrics Verification Application Systems

    Directory of Open Access Journals (Sweden)

    Mohamed SOLTANE

    2015-09-01

    Full Text Available In this paper, the use of finite Gaussian mixture modal (GMM tuned using Expectation Maximization (EM estimating algorithms for score level data fusion is proposed. Automated biometric systems for human identification measure a “signature” of the human body, compare the resulting characteristic to a database, and render an application dependent decision. These biometric systems for personal authentication and identification are based upon physiological or behavioral features which are typically distinctive, Multi-biometric systems, which consolidate information from multiple biometric sources, are gaining popularity because they are able to overcome limitations such as non-universality, noisy sensor data, large intra-user variations and susceptibility to spoof attacks that are commonly encountered in mono modal biometric systems. Simulation result show that finite mixture modal (GMM is quite effective in modelling the genuine and impostor score densities, fusion based the product of Likelihood Ratio achieves a significant performance on eNTERFACE 2005 multi-biometric database based on dynamic face, on-line signature and text independent speech modalities.

  14. Dynamic Enforcement of Knowledge-based Security Policies

    Science.gov (United States)

    2011-04-05

    probabilistic computation based on sampling. I. INTRODUCTION Facebook, Twitter, Flickr, and other successful on-line ser - vices enable users to easily...work aimed at controlling access to users’ private data has focused on access control policies. For example, Persona [6] users can store personal data...6] R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, “ Persona : an online social network with user- defined privacy,” in SIGCOMM, 2009

  15. Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy

    Science.gov (United States)

    Xue, Mingfu; Hu, Aiqun; He, Chunlong

    We propose a new security model based on MLS Policy to achieve a better security performance on confidentiality, integrity and availability. First, it realizes a combination of BLP model and Biba model through a two-dimensional independent adjustment of integrity and confidentiality. And, the subject's access range is adjusted dynamically according to the security label of related objects and the subject's access history. Second, the security level of the trusted subject is extended to writing and reading privilege range respectively, following the principle of least privilege. Third, it adjusts the objects' security levels after adding confidential information to prevent the information disclosure. Fourth, it uses application-oriented logic to protect specific applications to avoid the degradation of security levels. Thus, it can ensure certain applications operate smoothly. Lastly, examples are presented to show the effectiveness and usability of the proposed model.

  16. Dynamic Security Architecture among E-Commerce Websites

    Directory of Open Access Journals (Sweden)

    Ramesh R

    2015-06-01

    Full Text Available Nowadays privileged channel is utilized by the ISPs and other websites for handling privilege services of important clients only, there by normal clients are discriminated against getting access to privilege channel service. Thus a new global movement known as “Net Neutrality” for providing an open and non-discriminating Internet is fast popularizing in India, Europe and other parts of the world. We are proposing a system among E-Commerce websites so that without much difficulty even normal clients are able to access a particular destination website through a source website using privilege channel network without any hindrance from the ISP and also provides a security protocol for safer referrals. The existing system of security protocols doesn’t allow the e-commerce websites to come forward for making the referral service an option for business opportunity. They are reluctant to initiate site-to-site referral due to security risks and other opportunities they need to sacrifice. The proposed system using site graph shows how mutually trusted web servers can effectively implement a secure referral system by coordinating the traffic flow of referred clients. DDoS attacks and Phishing attacks focused on a particular website can be effectively averted by this coordinated security protocol among e-commerce web servers.

  17. On line routing per mobile phone

    DEFF Research Database (Denmark)

    Bieding, Thomas; Görtz, Simon; Klose, Andreas

    2009-01-01

    On-line routing is concerned with building vehicle routes in an ongoing fashion in such a way that customer requests arriving dynamically in time are efficiently and effectively served. An indispensable prerequisite for applying on-line routing methods is mobile communication technology. Addition...

  18. A secure dynamic collaboration environment in a cloud context

    DEFF Research Database (Denmark)

    Piechotta, C.; Jensen, Adam Enø; Olsen, Martin Grooss;

    In recent years, the cloud has emerged as an attractive means for hosting and delivering services over the Internet. This has resulted in a renewed focus on information security in the case where data is stored in the virtual space of the cloud and is not physically accessible to the customer. Th...

  19. Social security, dynamic efficiency and self-control problems

    NARCIS (Netherlands)

    A. Bucciol

    2008-01-01

    We develop an OLG model with uncertainty on labor income and death age to study the welfare implications of unfunded Social Security programs in an economy where agents are affected by temptation à la Gul and Pesendorfer (2001, Econometrica 69, 1403). Tempted agents give additional value to the pre-

  20. How a system backfires: dynamics of redundancy problems in security.

    Science.gov (United States)

    Ghaffarzadegan, Navid

    2008-12-01

    Increasing attention is being paid to reliability, safety, and security issues in social systems. Scott Sagan examined why more security forces (a redundancy solution) may lead to less security. He discussed how such a solution can backfire due to three major issues (i.e., "common-mode error,"social shirking," and "overcompensation"). In this article, using Sagan's hypotheses, we simulate and analyze a simple and generic security system as more guards are added to the system. Simulation results support two of Sagan's hypotheses. More specifically, the results show that "common-mode error" causes the system to backfire, and "social shirking" leads to an inefficient system while exacerbating the common-mode error's effect. Simulation results show that "overcompensation" has no effect of backfiring, but it leads the system to a critical state in which it can easily be affected by the common-mode error. Furthermore, the simulation results make us question the importance of the initial power of adversaries (e.g., terrorists) as the results show that, for any exogenous level of adversary power, the system endogenously overcompensates to a level that makes the system more susceptible to being attacked.

  1. Dynamic fragmentation and query translation based security framework for distributed databases

    Directory of Open Access Journals (Sweden)

    Arunabha Sengupta

    2015-09-01

    Full Text Available The existing security models for distributed databases suffer from several drawbacks viz. tight coupling with the choice of database; lack of dynamism, granularity and flexibility; non scalability and vulnerability to intrusion attacks. There is a lack of an integrated flexible and interoperable security framework that can dynamically control access to table, row, column and field level data entity. The objective of this proposed framework is to address the issue of security in distributed query processing using the dynamic fragmentation and query translation methodologies based on a parameterized security model which could be tailored based on the business requirements to take care of relational level, record level, column level as well as the atomic data element level security and access requirements. This solution has been implemented and tested for DML operations on distributed relational databases and the execution results are found to be very promising in terms of restricting access to data elements with higher security clearance; blocking queries that return data at/below user’s level but its evaluation requires accessing columns/rows with higher security clearance; and blocking aggregate queries used for inferring classified information.

  2. Climate Change Dynamics and Imperatives for Food Security in Nigeria

    Directory of Open Access Journals (Sweden)

    Olumide D. Onafeso

    2016-02-01

    Full Text Available Decadal variability in African rainfall is projected from General Circulation Models (GCMs to continue under elevated greenhouse gas scenarios. Effects on rain intensity, spatio-temporal variability of growing seasons, flooding, drought, and land-use change impose feedbacks at regional-local scales. Yet, empirical knowledge of associated impacts on crop yield is limited; thus, we examined the imperatives for food security in Nigeria. Bivariate correlation and multiple regression suggests impending drought in the northern region where livestock farming is predominant. Relative contributions of climate independent variables in determining crop yield by backward selection procedures with stepwise approach indexed the impacts of annual climate variability by a parameter computed as annual yield minus mean annual yield divided by the standard deviation. Results show Z-distribution approximately 5 to + 5, when 3 indicate impacts significant at 95% confidence levels. In conclusion, we established the interwoven relationship between climatic change and food security.

  3. PLANNING INTELLIGENCE ACTIVITIES IN A DYNAMIC SECURITY ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Anca Pavel

    2016-10-01

    Full Text Available The hypothesis introduced by this article is that, in order to perform intelligence missions and to obtain valuable intelligence for the consumers it is necessary to implement processes and tools to support planning activities. Today's challenges consist rather in the ability of intelligence organizations to identify and initiate new connections, processes and communication flows with other partners operating in the security environment than to plan in their own name secret operations. From this point of view, planning activities should focus on new procedures, at a much more extensive level in order to align institutional efforts beyond the boundaries of their own organization and the national community of information. Also, in order to coordinate intelligence activities, strategic planning must be anchored into a complex analysis of the potential impact of existing and possible future global phenomena that shape the security environment and thus identify better ways of improving results.

  4. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  5. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges

    OpenAIRE

    D. Shanmugapriya; Padmavathi, Dr. G.

    2009-01-01

    Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done by observing the change in the typing pattern of the user. A comprehensive survey of the existing keystroke dynamics methods, metrics, different approaches are g...

  6. Spatio-temporal dynamics of security investments in an interdependent risk environment

    Science.gov (United States)

    Shafi, Kamran; Bender, Axel; Zhong, Weicai; Abbass, Hussein A.

    2012-10-01

    In a globalised world where risks spread through contagion, the decision of an entity to invest in securing its premises from stochastic risks no longer depends solely on its own actions but also on the actions of other interacting entities in the system. This phenomenon is commonly seen in many domains including airline, logistics and computer security and is referred to as Interdependent Security (IDS). An IDS game models this decision problem from a game-theoretic perspective and deals with the behavioural dynamics of risk-reduction investments in such settings. This paper enhances this model and investigates the spatio-temporal aspects of the IDS games. The spatio-temporal dynamics are studied using simple replicator dynamics on a variety of network structures and for various security cost tradeoffs that lead to different Nash equilibria in an IDS game. The simulation results show that the neighbourhood configuration has a greater effect on the IDS game dynamics than network structure. An in-depth empirical analysis of game dynamics is carried out on regular graphs, which leads to the articulation of necessary and sufficient conditions for dominance in IDS games under spatial constraints.

  7. Dynamic Auditing Protocol for Efficient and Secure Data Storage in Cloud Computing

    Directory of Open Access Journals (Sweden)

    J. Noorul Ameen

    2014-06-01

    Full Text Available Cloud computing, where the data has been stored on cloud servers and retrieved by users (data consumers the data from cloud servers. However, there are some security challenges which are in need of independent auditing services to verify the data integrity and safety in the cloud. Until now a numerous methods has been developed for remote integrity checking whichever only serve for static archive data and cannot be implemented to the auditing service if the data in the cloud is being dynamically updated. Therefore, it is expected to design an efficient and secure dynamic auditing protocol to convince the data owners for t he security and integrity of their data. In this paper, we intent to construct an auditing framework for cloud storage systems for efficient privacy-preserving auditing service. Then, our auditing protocol is extended to support the data dynamic operations for secure auditing in the random oracle model. In addition, our auditing protocol is improved to support batch auditing for both multiple owners and multiple clouds without any trusted organizer. Our proposed auditing protocols will be proved for their secure and efficient computation with reduced cost for the auditing.

  8. Uncertainty-based Estimation of the Secure Range for ISO New England Dynamic Interchange Adjustment

    Energy Technology Data Exchange (ETDEWEB)

    Etingov, Pavel V.; Makarov, Yuri V.; Wu, Di; Hou, Zhangshuan; Sun, Yannan; Maslennikov, S.; Luo, Xiaochuan; Zheng, T.; George, S.; Knowland, T.; Litvinov, E.; Weaver, S.; Sanchez, E.

    2014-04-14

    The paper proposes an approach to estimate the secure range for dynamic interchange adjustment, which assists system operators in scheduling the interchange with neighboring control areas. Uncertainties associated with various sources are incorporated. The proposed method is implemented in the dynamic interchange adjustment (DINA) tool developed by Pacific Northwest National Laboratory (PNNL) for ISO New England. Simulation results are used to validate the effectiveness of the proposed method.

  9. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    Science.gov (United States)

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data.

  10. Dynamic Security Assessment of Danish Power System Based on Decision Trees: Today and Tomorrow

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Liu, Leo; Chen, Zhe;

    2013-01-01

    The research work presented in this paper analyzes the impact of wind energy, phasing out of central power plants and cross border power exchange on dynamic security of Danish Power System. Contingency based decision tree (DT) approach is used to assess the dynamic security of present and future...... Danish Power System. Results from offline time domain simulation for large number of possible operating conditions (OC) and critical contingencies are organized to build up the database, which is then used to predict the security of present and future power system. The mentioned approach is implemented...... in DIgSILENT PowerFactory environment and applied to western Danish Power System which is passing through a phase of major transformation. The results have shown that phasing out of central power plants coupled with large scale wind energy integration and more dependence on international ties can have...

  11. Dynamic Security Assessment of Western Danish Power System Based on Ensemble Decision Trees

    DEFF Research Database (Denmark)

    Liu, Leo; Bak, Claus Leth; Chen, Zhe

    2014-01-01

    With the increasing penetration of renewable energy resources and other forms of dispersed generation, more and more uncertainties will be brought to the dynamic security assessment (DSA) of power systems. This paper proposes an approach that uses ensemble decision trees (EDT) for online DSA. Fed...

  12. Technology transfer of dynamic IT outsourcing requires security measures in SLAs

    NARCIS (Netherlands)

    F. Dickmann (Frank); M. Brodhun (Maximilian); J. Falkner (Jürgen); T.A. Knoch (Tobias); U. Sax (Ulrich)

    2010-01-01

    textabstractFor the present efforts in dynamic IT outsourcing environments like Grid or Cloud computing security and trust are ongoing issues. SLAs are a proved remedy to build up trust in outsourcing relations. Therefore, it is necessary to determine whether SLAs can improve trust from the perspect

  13. Dynamic etching of soluble surface layers with on-line inductively coupled plasma mass spectrometry detection - a novel approach for determination of complex metal oxide surface cation stoichiometry

    OpenAIRE

    Limbeck, A; Rupp, GM; M. Kubicek; Tellez, H.; Druce, J; Ishihara, T.; Kilner, JA; Fleig, J.

    2016-01-01

    In this work, an innovative approach for determining the surface stoichiometry of complex metal oxide (CMO) thin films is presented. The procedure is based on treatment of the sample surface with different etching solutions, followed by on-line analysis of the derived eluates using inductively coupled plasma ? mass spectrometry (ICP-MS). Via consecutive treatment of the sample surface with water and diluted HCl, a differentiation between water soluble and acid soluble parts of near surface re...

  14. Priority and Random Selection for Dynamic Window Secured Implicit Geographic Routing in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Zurina M. Hanapi

    2009-01-01

    Full Text Available Problem statement: Sensor nodes are easily exposed to many attacks since it were deployed in unattended adversarial environment with no global addressing and used for critical applications such as battlefield surveillance and emergency response. While the sensor also needs to act as a router to relay a message to a required recipient, then this increased the vulnerabilities to a network layer. However, existing security mechanisms are not permissible to be fitted directly into any sensor network due to constraints on energy and computational capabilities of sensor node itself that require on the modification on the protocols that associated with the sensor node itself in order to provide the security. Approach: In this study, a Dynamic Window Secured Implicit Geographic Forwarding (DWIGF routing protocol was presented which based on an approach of lazy binding technique and dynamic time on collection window and inherits a geographical routing techniques. Results: The DWIGF was intelligent to minimize a Clear To Send (CTS rushing attack and robust against black hole and selective forwarding attacks with high packet delivery ratios because of selection of a failed node and an attacker was minimized respectively. Moreover, few routing attacks were eliminated since the routing technique used was classified as geographic routing. Conclusion: This novel routing protocol was promising a secured routing without inserting any existing security mechanism inside.

  15. Security dynamics in the South Atlantic: Brazil and the United States in Africa

    Directory of Open Access Journals (Sweden)

    Pedro Seabra

    2013-09-01

    Full Text Available This article acknowledges the international community’s growing concern over the new security dynamics currently brewing in the South Atlantic, and the potential upgrade of this area on the internationalsecurity agenda. By building on both old and new threats in the background interest being displayed by such countries as Brazil and the US towards this specific area, and by highlighting these two countries’ political-strategic interests in Africa, this article provides an accurate portrait of the current security context, which ranges from the chances of competition of all the actors involved to the opportunities for cooperation between them.

  16. Dynamic learning rates algorithm for BPNN to forecast time series of dam security

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Time series data of dam security have a large number of observed values and should be forecasted accurately in time.Neural networks have the powerful approach ablilities of arbitrary functions and have been broadly utilized in many domains.In this paper,a dynamic learning rate training algorithm of hack-propagation neural networks for time series forecasting is proposed and the networks with this algorithm are built to forecast time series of dam security.The application results demonostrate the efficiency of modelling and the effictiveness of forecasting.

  17. 基于支持向量机MPLS的间歇过程故障诊断方法%On-line Fault Detection Using SVM-based Dynamic MPLS for Batch Processes

    Institute of Scientific and Technical Information of China (English)

    李运锋; 汪志锋; 袁景淇

    2006-01-01

    In this article, a nonlinear dynamic multiway partial least squares (MPLS) based on support vector machines (SVM) is developed for on-line fault detection in batch processes. The approach, referred to as SVM-based DMPLS, integrates the SVM with the MPLS model. Process data from normal historical batches are used to develop the MPLS model, and a series of single-input-single-output SVM networks are adopted to approximate nonlinear inner relationship between input and output variables. In addition, the application of a time-lagged window technique not only makes the complementarities of unmeasured data of the monitored batch unnecessary, but also significantly reduces the computation and storage requirements in comparison with the traditional MPLS. The proposed approach is validated by a simulation study of on-line fault detection for a fed-batch penicillin production.

  18. Secure and Dynamic Model for Book Searching on Cloud Computing as Mobile Augmented Reality

    Directory of Open Access Journals (Sweden)

    Adeel Rafiq

    2014-01-01

    Full Text Available Availability of internet on different devices like smart phones like android based, IOs based, windows based and PDA etc. has brought into the evolution of mobile cloud computing, which is a vast side of research nowadays. Internet connectivity has become very easy with the evolution of Wi-Fi, everyone can access the internet using wireless connectivity. A major issue in wireless connectivity is the low level of encryption and low security. This might be a security risk for the sensitive data available on the cloud. There are mobile augmented reality systems based on cloud computing, we want to propose a dynamic framework for the security of cloud and live update data on cloud.

  19. SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network

    CERN Document Server

    Nath, Rajender

    2011-01-01

    Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attacks- wormhole attack, byzantine attack and blackhole attack. SD-AODV protocol was evaluated through simulation experiments done on Glomosim and performance of the network was measured in terms of packet delivery fraction, average end-to-end delay, global throughput and route errors of a mobile ad hoc network where a defined percentage of nodes behave maliciously. Experimentally it was found that the performance of the network did not degrade in the presence of the above said attacks indicating that the proposed protocol was secure against these attacks.

  20. SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Rajender Nath

    2010-11-01

    Full Text Available Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attacks-wormhole attack, byzantine attack and blackhole attack. SD-AODV protocol was evaluated through simulation experiments done on Glomosim and performance of the network was measured in terms of packet delivery fraction, average end-to-end delay, global throughput and route errors of a mobile ad hoc network where a defined percentage of nodes behave maliciously. Experimentally it was found that the performance of the network did not degrade in the presence of the above said attacks indicating that the proposed protocol was secure against these attacks.

  1. Dynamic High Level Cross Layer Security Mechanisms for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sanjeev Puri

    2012-06-01

    Full Text Available In dynamic insensitive application specific network, WSN consists of hundred and thousands of sensor nodes densely deployed in the sensor field. Majority of sensor nodes are static having power limitations, low network throughput, message transfer delays and computation power limits that are major obstacles. The limited communication range of WSN nodes, link asymmetry, and the characteristics of the physical environment lead to a major sources of QoS degradation in WSNs. The potential applications of the WSNs typically range from those in defense, military, environmental monitoring, health monitoring and civilian surveillance applications etc. All of these applications being omnipresent in nature necessitate appropriate heavy secure mechanisms to ensure the data security and privacy. On the other hand, the WSN nodes, being extremely resource constrained, it is really challenging to devise the WSNs security protocols. So need to propose dynamic high level cross layer security mechanism for detecting various attacks and the countermeasures taken to avoid the same without comprising any network resources.

  2. A new transient stability margin based on dynamic security region and its applications

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    A new transient stability margin is proposed based on a new expression of dynamic security region (DSR) which is developed from the existing expression of DSR. Applications of the DSR based transient stability margin to contingency ranking and screening are discussed. Simulations in the 10-machine 39-bus New England system are performed to show the effectiveness of the proposed DSR based tran-sient stability margin.

  3. Dynamic liquid-liquid-solid microextraction based on molecularly imprinted polymer filaments on-line coupling to high performance liquid chromatography for direct analysis of estrogens in complex samples.

    Science.gov (United States)

    Zhong, Qisheng; Hu, Yufei; Hu, Yuling; Li, Gongke

    2012-06-08

    A novel sample preparation technique termed dynamic liquid-liquid-solid microextraction (DLLSME) was developed and on-line coupled to high performance liquid chromatography (HPLC) for direct extraction, desorption, and analysis of trace estrogens in complex samples. The DLLSME consists of the aqueous donor phase, the organic medium phase and the molecularly imprinted polymer filaments (MIPFs) as solid acceptor phase. The organic solvent with lesser density was directly added on top of the aqueous sample, and the dynamic extraction was performed by circulating the organic solvent through the MIPFs inserted into a PEEK tube which served as an extraction and desorption chamber. Afterwards, the extracted analytes on the MIPFs were on-line desorbed and then introduced into the HPLC for analysis. To evaluate the feasibility of the on-line system, a new DLLSME-HPLC method was developed for the analysis of five estrogens in aqueous samples by using 17β-estradiol MIPFs as the solid phase. Under the optimized conditions, the enrichment factors of 51-70, limits of detection of 0.08-0.25 μg/L and precision within 4.5-6.9% were achieved. Furthermore, the proposed method was applied to the analysis of real samples including urine, milk and skin toner, satisfactory recovery (81.9-99.8%) and reproducibility (4.1-7.9%) were obtained. Especially, 0.59 μg/L of 17β-estradiol was determined in female urine sample. The DLLSME offers an attractive alternative for direct analysis of trace analytes in aqueous samples and could potentially be extended to other adsorptive materials.

  4. On line routing per mobile phone

    DEFF Research Database (Denmark)

    Bieding, Thomas; Görtz, Simon; Klose, Andreas

    2009-01-01

    . Additionally it is of utmost importance that the employed communication system is suitable integrated with the firm’s enterprise application system and business processes. On basis of a case study, we describe in this paper a system that is cheap and easy to implement due to the use of simple mobile phones......On-line routing is concerned with building vehicle routes in an ongoing fashion in such a way that customer requests arriving dynamically in time are efficiently and effectively served. An indispensable prerequisite for applying on-line routing methods is mobile communication technology...

  5. Hydrologic variability in dryland regions: impacts on ecosystem dynamics and food security.

    Science.gov (United States)

    D'Odorico, Paolo; Bhattachan, Abinash

    2012-11-19

    Research on ecosystem and societal response to global environmental change typically considers the effects of shifts in mean climate conditions. There is, however, some evidence of ongoing changes also in the variance of hydrologic and climate fluctuations. A relatively high interannual variability is a distinctive feature of the hydrologic regime of dryland regions, particularly at the desert margins. Hydrologic variability has an important impact on ecosystem dynamics, food security and societal reliance on ecosystem services in water-limited environments. Here, we investigate some of the current patterns of hydrologic variability in drylands around the world and review the major effects of hydrologic fluctuations on ecosystem resilience, maintenance of biodiversity and food security. We show that random hydrologic fluctuations may enhance the resilience of dryland ecosystems by obliterating bistable deterministic behaviours and threshold-like responses to external drivers. Moreover, by increasing biodiversity and the associated ecosystem redundancy, hydrologic variability can indirectly enhance post-disturbance recovery, i.e. ecosystem resilience.

  6. Two Stage Secure Dynamic Load Balancing Architecture for SIP Server Clusters

    Directory of Open Access Journals (Sweden)

    G. Vennila

    2014-08-01

    Full Text Available Session Initiation Protocol (SIP is a signaling protocol emerged with an aim to enhance the IP network capabilities in terms of complex service provision. SIP server scalability with load balancing has a greater concern due to the dramatic increase in SIP service demand. Load balancing of session method (request/response and security measures optimizes the SIP server to regulate of network traffic in Voice over Internet Protocol (VoIP. Establishing a honeywall prior to the load balancer significantly reduces SIP traffic and drops inbound malicious load. In this paper, we propose Active Least Call in SIP Server (ALC_Server algorithm fulfills objectives like congestion avoidance, improved response times, throughput, resource utilization, reducing server faults, scalability and protection of SIP call from DoS attacks. From the test bed, the proposed two-tier architecture demonstrates that the ALC_Server method dynamically controls the overload and provides robust security, uniform load distribution for SIP servers.

  7. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT

    Directory of Open Access Journals (Sweden)

    Hyungjoo Kim

    2016-10-01

    Full Text Available The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

  8. Meditsiin on-line

    Directory of Open Access Journals (Sweden)

    Mare Kõiva

    2008-08-01

    Full Text Available The adaptation of information technology to everyday clinical practices coincided with the emergence of online databases, personal medical history and institutional information websites. One of the central issues in online medicine is source credibility. This paper overviews the types and communication of online medical information that have changed the logistics of doctor-patient communication. Inter-doctor communication also benefits from the possibilities for professional communication, and application of multiprofessional knowledge; it helps shape and unify professional terms and nomenclature, guarantees the confidentiality and security of data, while providing easy management of high-quality data; makes provisions for knowledge management and ambulatory e-services.The paper overviews the information portal Kliinik.ee (www.kliinik.ee, OÜ Tervisenõuanne which shares medical information made available by medical professionals for non-medics, mostly for patients. The portal offers a range of e-medicine services, such as responses by specialists, psychologists, pharmacists. The Communication groups offer the patients free medical advice, feedback, a second opinion to their treatment scheme, as well as an opportunity to share knowledge and their personal experiences, and receive emotional support. Writing therapy is becoming increasingly popular and has spontaneously moved online. Today, there are discussion forums available for people suffering from diabetes, cancer and other serious (or incurable medical problems. The Internet is in manyrespects advantageous for this type of therapy: it provides an opportunity to establish a dialogue with others with a similar condition while protecting one’s privacy and anonymity. Medical professionals post comments under their own names which gives them credibility.Seeking medical help at an institutional site from practising doctors makes the language use and attitudes of the online forum official

  9. Formación on line On line learning

    Directory of Open Access Journals (Sweden)

    O. Grau-Perejoan

    2008-09-01

    Full Text Available La formación on line es una modalidad de enseñanza a distancia basada en las nuevas tecnologías. En este artículo se pretende hacer una introducción a base de describir a grandes rasgos sus características principales: asincronía, no presencialidad, comunicación escrita, función del profesor on line, así como los retos, los riesgos, las ventajas y los inconvenientes que plantea. Se exponen las diferencias entre la formación on line y la formación presencial, de manera que los docentes puedan adaptar de la mejor manera posible sus propuestas formativas a la modalidad on line. Se introduce el importantísimo papel de la planificación y de la fase de diseño y, finalmente, se repasan conceptos útiles para comprender mejor el mundo de la formación on line como son los conceptos entorno virtual de aprendizaje (EVA o Blended Learning (B-Learning.On line learning is a type of distance education based on new technologies. This article's aim is to introduce its main characteristics -asynchrony, non-presentiality, written communication, e-teacher role- as well as its challenges, risks, advantages and limitations. Differences between on line learning and face-to-face learning are presented in order to enable educational professionals to adapt their courses to the on line methodology. Planning and designing are introduced as key phases and, finally, useful concepts such as Virtual Learning Environment (VLE or Blended Learning (B-Learning are reviewed in order to achieve a better understanding of the on line learning field.

  10. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  11. Reliability and Security Analysis on Two-Cell Dynamic Redundant System

    Directory of Open Access Journals (Sweden)

    Hongsheng Su

    2013-05-01

    Full Text Available Based on analysis on reliability and security on three types of two-cell dynamic redundant systems which has been widely applied in modern railway signal system, whose isomorphic Markov model was established in this paper. During modeling several important factors, including common-cause failure, coverage of diagnostic systems, online maintainability, and periodic inspection maintenance, and as well as many failure modes, were considered, which made the established model more credible. Through analysis and calculation on reliability and security indexes of the three types of two-module dynamic redundant structures, the paper acquires a significant conclusion, i.e., the safety and reliability of the kind of structure possesses an upper limit, and can not be inordinately improved through the hardware and software comparison methods under the failure and repairing rate fixed. Finally, the paper performs the simulation investigations, and compares the calculation results of the three redundant systems, and analysis each advantages and disadvantages, and gives out each application scope, which provides a theoretical technical support for the railway signal equipments selection.

  12. On-line dynamic extraction and automated determination of readily bioavailable hexavalent chromium in solid substrates using micro-sequential injection bead-injection lab-on-valve hyphenated with electrothermal atomic absorption spectrometry

    DEFF Research Database (Denmark)

    Long, Xiangbao; Miró, Manuel; Hansen, Elo Harald

    2006-01-01

    A novel and miniaturized micro-sequential injection bead injection lab-on-valve (μSI-BI-LOV) fractionation system was developed for in-line microcolumn soil extraction under simulated environmental scenarios and accurate monitoring of the content of easily mobilisable hexavalent chromium in soil...... environments at the sub-low parts-per-million level. The flow system integrates dynamic leaching of hexavalent chromium using deionized water as recommended by the German Standard DIN 38414-S4 method; on-line pH adjustment of the extract by a 0.01 mol L-1 Tris-HNO3 buffer solution; isolation of the chromate......). The effect of simulated acidic rain on the accessibility of chromate forms for plant uptake was also investigated. The proposed approach offers several advantages over conventional speciation/fractionation protocols in the batch mode, including immediate separation with concomitant preconcentration...

  13. From Off-line to On-line Handwriting Recognition

    NARCIS (Netherlands)

    Lallican, P.; Viard-Gaudin, C.; Knerr, S.

    2004-01-01

    On-line handwriting includes more information on time order of the writing signal and on the dynamics of the writing process than off-line handwriting. Therefore, on-line recognition systems achieve higher recognition rates. This can be concluded from results reported in the literature, and has been

  14. COMPARATIVE STUDY ON ENERGY CONSUMPTION IN DYNAMIC WINDOW SECURED IMPLICIT GEOGRAPHIC FORWARDING ROUTING PROTOCOL

    Directory of Open Access Journals (Sweden)

    Abubakar Idris Umar

    2014-01-01

    Full Text Available An Ideal WSNs should operate with the least possible energy required in order to increase the lifetime of the sensor nodes and at the same time, ensure network connectivity. But the Inherent power limitation makes power-awareness a critical requirement for WSN, this calls for the need to manage energy in sensor nodes. Also In order to ensure successful transmission of data from sensor node source to destination, it becomes necessary to maintain network availability. The network must be resilient to individual node failure which can happen due to zero power posses by the node and due to security attacks posed on the node and the network. Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF routing protocol has proven to be robust, efficient and resistant to some security attack which causes failure in network availability. However the extent to which energy is consumed in sensor nodes which deploys DWSIGF as its routing protocol has never been mentioned. In this research, we performed a comparative study on energy consumption in DWSIGF routing protocol. Using the first order radio model, we determined the energy consumed in a network. The protocol (DWSIGF is matched up against its counterpart SIGF as the traffic is increased. Observation shows that DWSIGF due to the variable timing assigned to the CTS collection window, CTS signal fails to reach destination as collection window time expires, thus the need for retransmission. This in turn consumes more energy than the counterpart SIGF which has a fixed CTS collection time. The simulation work was done using Matlab 7.0. Energy consumed in the random variant of both protocols (DWSIGF and SIGF was also observed to be higher than the priority variant of the protocols.

  15. Dynamic Allocation of CPUs in Multicore Processor for Performance Improvement in Network Security Applications

    Directory of Open Access Journals (Sweden)

    Sudhakar Gummadi

    2011-01-01

    Full Text Available Problem statement: Multicore and multithreaded CPUs have become the new approach for increase in the performance of the processor based systems. Numerous applications benefit from use of multiple cores. Increasing performance of the system by increasing the number of CPUs of the multicore processor for a given application warrants detailed experimentation. In this study, the results of the experimentation done by dynamic allocation/deallocation of the CPU based on the workload conditions for the packet processing for security application are analyzed and presented. Approach: This evaluation was conducted on SunfireT1000 server having Sun UltraSPARC T1 multicore processor. OpenMP tasking feature is used for scheduling the logical CPUs for the parallelized application. Dynamic allocation of a CPU to a process is done depending on the workload characterization. Results: Execution time for packet processing was analyzed to arrive at an effective dynamic allocation methodology that is dependant on the hardware and the workload. Conclusion/Recommendations: Based on the analysis, the methodology and the allocation of the number of CPUs for the parallelized application are suggested.

  16. From User Comments to On-line Conversations

    OpenAIRE

    Wang, Chunyan; Ye, Mao; Huberman, Bernardo A.

    2012-01-01

    We present an analysis of user conversations in on-line social media and their evolution over time. We propose a dynamic model that accurately predicts the growth dynamics and structural properties of conversation threads. The model successfully reconciles the differing observations that have been reported in existing studies. By separating artificial factors from user behaviors, we show that there are actually underlying rules in common for on-line conversations in different social media web...

  17. On the security of a dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Lin, Han-Yu

    2013-04-01

    Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.

  18. Dynamic security issues in autonomous power systems with increasing wind power penetration

    DEFF Research Database (Denmark)

    Margaris, I.D.; Hansen, Anca Daniela; Sørensen, Poul Ejnar

    2011-01-01

    Technical requirements set by the network operators nowadays include various aspects, such as fault ride-through capability of wind turbines during faults, voltage-reactive power control and overall control of the wind farms as conventional power plants. Detailed models for the power system as well...... as for the wind farms are therefore essential for power system studies related to these issues, especially when applied to non interconnected systems with high wind power penetration. Detailed generic models for three different wind turbine technologies – Active Stall Induction Generator (ASIG), Doubly Fed...... Asynchronous Generator (DFAG) and Permanent Magnet Synchronous Generator (PMSG) – are applied and issues regarding interaction with the power system are investigated. This paper provides conclusions about the dynamic security of non-interconnected power systems with high wind power penetration based...

  19. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  20. A Hybrid On-line Verification Method of Relay Setting

    Science.gov (United States)

    Gao, Wangyuan; Chen, Qing; Si, Ji; Huang, Xin

    2017-05-01

    Along with the rapid development of the power industry, grid structure gets more sophisticated. The validity and rationality of protective relaying are vital to the security of power systems. To increase the security of power systems, it is essential to verify the setting values of relays online. Traditional verification methods mainly include the comparison of protection range and the comparison of calculated setting value. To realize on-line verification, the verifying speed is the key. The verifying result of comparing protection range is accurate, but the computation burden is heavy, and the verifying speed is slow. Comparing calculated setting value is much faster, but the verifying result is conservative and inaccurate. Taking the overcurrent protection as example, this paper analyses the advantages and disadvantages of the two traditional methods above, and proposes a hybrid method of on-line verification which synthesizes the advantages of the two traditional methods. This hybrid method can meet the requirements of accurate on-line verification.

  1. On-Line Dynamic Index Hybrid Update Scheme Based on Self-Learning of Allocated Space%基于分配空间自学习的在线动态索引混合更新机制

    Institute of Scientific and Technical Information of China (English)

    刘小珠; 彭智勇

    2012-01-01

    To improve time and space efficiencies of index maintenance, an on-line dynamic index hybrid update (ODIHU) technique is proposed based on self-learning of allocated space. Based on Zipf theorem, ODIHU appropriately estimates the number of short and long lists with theoretical analysis, and manages short and long lists with uniform storage model of distinguishing long and short lists based on link. ODIHU manages long list space with history-based adaptive learning allocation (HALA) , and manages short list space with linear allocation (LA), exponential allocation (EA) , and uniform allocation (UA). To decrease index and retrieval cost, ODIHU divides index data set into limited sections and controls index merge with schemes. Then ODIHU merges short lists with immediate merge, and merges long lists with improved Y-limited contiguous multiple merge scheme, which balances the trade-off of the time and space efficiencies effectively. Based on the proposed RABIF, ODIHU not only considers both index level and inverted list level updating, but also effectively improves time and space efficiencies of index updating.%针对索引维护时间和空间效率低的问题,提出了一种基于分配空间自学习的在线动态索引混合更新机制(on-line dynamic index hybrid update,ODIHU).ODIHU根据Zipf分布原理对长短列表数量分布进行估计,并采用基于历史分配空间的自适应学习机制对长短列表空间进行有效管理,然后对短列表采用立即合并更新方式,长列表采用上限Y相邻多路合并的更新方式维护,实现索引更新与查询性能的有效折中.理论分析及实验结果表明,ODIHU能有效地提高索引维护与更新过程中的空间效率、索引合并与查询时间效率.

  2. Development and Application of a New Grey Dynamic Hierarchy Analysis System (GDHAS for Evaluating Urban Ecological Security

    Directory of Open Access Journals (Sweden)

    Qiang Xie

    2013-05-01

    Full Text Available Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indicators systematically, and quantitative research is lacking. We developed an innovative quantitative modeling approach called the grey dynamic hierarchy analytic system (GDHAS for both the procedures of indicator selection and quantitative assessment of urban ecological security. Next, a systematic methodology based on the GDHAS is developed to assess urban ecological security comprehensively and dynamically. This assessment includes indicator selection, driving force-pressure-state-impact-response (DPSIR framework building, and quantitative evaluation. We applied this systematic methodology to assess the urban ecological security of Tianjin, which is a typical coastal super megalopolis and the industry base in China. This case study highlights the key features of our approach. First, 39 representative indicators are selected for the evaluation index system from 62 alternative ones available through the GDHAS. Second, the DPSIR framework is established based on the indicators selected, and the quantitative assessment of the eco-security of Tianjin is conducted. The results illustrate the following: urban ecological security of Tianjin in 2008 was in alert level but not very stable; the driving force and pressure subsystems were in good condition, but the eco-security levels of the remainder of the subsystems were relatively low; the pressure subsystem was the key to urban ecological security; and 10 indicators are defined as the key indicators for five subsystems. These results can be used as the basis for urban eco-environmental management.

  3. The complexity of an investment competition dynamical model with imperfect information in a security market

    Energy Technology Data Exchange (ETDEWEB)

    Xin Baogui [Nonlinear Dynamics and Chaos Group, School of Management, Tianjin University, Tianjin 300072 (China); School of Economics and Management, Shandong University of Science and Technology, Qingdao 266510 (China)], E-mail: baoguixin@yahoo.com; Ma Junhai; Gao Qin [Nonlinear Dynamics and Chaos Group, School of Management, Tianjin University, Tianjin 300072 (China)

    2009-11-30

    We present a nonlinear discrete dynamical model of investment competition with imperfect information for N heterogeneous oligopolists in a security market. In this paper, our focus is on a given three-dimensional model which exhibits highly rich dynamical behaviors. Based on Wen's Hopf bifurcation criterion [Wen GL. Criterion to identify Hopf bifurcations in maps of arbitrary dimension. Phys Rev E 2005;72:026201-3; Wen GL, Xu DL, Han X. On creation of Hopf bifurcations in discrete-time nonlinear systems. Chaos 2002;12(2):350-5] and Kuznetsov's normal form theory [Kuznetsov YA. Elements of applied bifurcation theory. New York: Springer-Verlag; 1998. p. 125-37], we study the model's stability, criterion and direction of Neimark-Sacker bifurcation. Moreover, we numerically simulate a complexity evolution route: fixed point, closed invariant curve, double closed invariant curves, fourfold closed invariant curves, strange attractor, period-3 closed invariant curve, period-3 2-tours, period-4 closed invariant curve, period-4 2-tours.

  4. Security Enhancement of Knowledge-based User Authentication through Keystroke Dynamics

    Directory of Open Access Journals (Sweden)

    Roy Soumen

    2016-01-01

    Full Text Available Keystroke Dynamics is a behavioural biometrics characteristic in Biometric science, which solve the issues in user identification or verification. In Knowledge-based user authentication technique, we compromise with PIN or password which is unsafe due to different type of attacks. It is good to choose password with the combination of upper and lower case letter with some digits and symbols, but which is very hard to remember or generally we forget to distinguish those passwords for different access control systems. Our system not only takes the users’ entered texts but their typing style is also account for. In our experiment, we have not taken hard password type texts, we have chosen some daily used words where users are habituated and comfortable at typing and we obtained the consisting typing pattern. Different distance-based and data mining algorithms we have applied on collected typing pattern and obtained impressive results. As per our experiment, if we use keystroke dynamics in existing knowledge based user authentication system with minimum of five daily used common texts then it increases the security level up to 97.6% to 98.2% (if we remove some of the irrelevant feature sets.

  5. ON-LINE REAL-TIME PATH PLANNING FOR MOBILE ROBOTS IN DYNAMIC UNCERTAIN ENVIRONMENT%动态不确定环境下移动机器人的在线实时路径规划

    Institute of Scientific and Technical Information of China (English)

    庄慧忠; 李晗; 陆震宇

    2011-01-01

    提出一种基于极坐标空间的、以机器人期望运动方向角为路径优化指标的动态不确定环境下移动机器人的在线实时路径规划方法.该法通过机器人的传感器系统,实时探测局部环境信息,在每一采样时刻,机器人首先对"视野"内的动态障碍物的位置进行采样,然后根据所采样的位置信息,利用自回归模型预测出下一采样时刻动态障碍物的位置,再将预测位置上的动态障碍物当作静态障碍物来处理,然后对其规划避碰路径,从而将动态路径规划转化为静态路径规划.仿真和实验结果验证了该方法有效可行,具有实时规划性和良好的避障能力.%This paper presents an on-line real-time path planning method for mobile robots in dynamic uncertain environment. Based on polar coordinates space, this method uses expected movement direction angle of robots as the index of path optimization. It explores information of local environment in time through sensor system of robots. At each sampling time, the robot firstly takes the sample of positions of dynamic obstacles within its ”visual field”, and then predicts the positions of dynamic obstacles at next sampling time with autoregressive model according to sampled positions information, and deals with dynamic obstacles at predicting positions as the static ones afterwards. Then it plans collision avoidance path for them so as to have transformed the dynamic path planning into static path planning. The method is available and feasible, it has real-time planning property and preferably good collision avoidance capacity, all of these are demonstrated by the simulations and experimental results.

  6. CERN Video News on line

    CERN Multimedia

    2003-01-01

    The latest CERN video news is on line. In this issue : an interview with the Director General and reports on the new home for the DELPHI barrel and the CERN firemen's spectacular training programme. There's also a vintage video news clip from 1954. See: www.cern.ch/video or Bulletin web page

  7. The contemporary dynamics of Sino-Indian relations: Examining maritime security, economics, energy and elite dialogue

    Science.gov (United States)

    Athwal, Amardeep

    This dissertation examines the modern-day dynamics of the Sino-Indian relationship---with a particular focus on issues relating to maritime security, economics, energy and elite bilateral dialogue. In exploring the contemporary nature of the Sino-Indian relationship, the dissertation also seeks to assess the accuracy of predominant neorealist accounts of the Sino-Indian relationship. Since the 1962 Sino-Indian War, most analysts have continued to emphasize the conflictual and competitive elements within the Sino-Indian relationship. The dissertation first explores the crucial post-independence history of Sino-Indian relations to provide the appropriate contextual background (chapter one). Thereafter, the dissertation explores the geopolitical significance of the Indian Ocean in light of soaring (global) energy demands. This then leads into an analysis of China and India's naval modernization and China's strategic partnership with Pakistan and Myanmar (chapter two). While acknowledging the credibility of neorealist insights in the realm of maritime security by detailing China and India's naval buildup and naval strategy, overall, it is found that the security dilemma argument is overstated. There is both a lack of threat perception and the existence of alternate explanations for both Chinese and Indian activities in Southern Asia. The dissertation then moves on to explore the positive elements within the Sino-Indian relationship---growing economic interdependence, energy convergence and elite consensus. In the economic realm (chapter three) it is found that Sino-Indian bilateral trade is increasingly being framed institutionally and rapidly expanding every year. The areas where the Sino-Indian economic relationship could be fruitfully expanded are traced and the great potential of bilateral trade is discussed. Thereafter, the dissertation highlights how China and India are beginning to coordinate energy policy (chapter four) as well as the growing political will

  8. Clean Air OnLine

    Energy Technology Data Exchange (ETDEWEB)

    Finney, D. [Environment Canada, Gatineau, PQ (Canada). Air Pollution Prevention Directorate

    2004-04-07

    This presentation describes Clean Air OnLine, a multi-tiered website dedicated to providing Canadians with information on air quality. The website is under development to support action to reduce air emissions, demonstrate the links between air emissions and environmental impacts, and enhance the understanding of sustainable community development issues such as health, energy, and urban sprawl. Partners in the Clean Air OnLine (CAOL) initiative include Environment Canada and the Clean Air Partnership which includes the Greater Toronto Area pilot project. The audience for CAOL includes municipal decision makers, local decision makers, community leaders, and the general public. The project provides Canadians with air pollution contextual information on pollution sources, pollutants, and related issues. It also provides information on health, environmental and economic impacts and the interrelationships with climate change issues and energy use. tabs., figs.

  9. On-line moisture analysis

    CERN Document Server

    Cutmore, N G

    2002-01-01

    Measurement of the moisture content of iron ore has become a key issue for controlling moisture additions for dust suppression. In most cases moisture content is still determined by manual or automatic sampling of the ore stream, followed by conventional laboratory analysis by oven drying. Although this procedure enables the moisture content to be routinely monitored, it is too slow for control purposes. This has generated renewed interest in on-line techniques for the accurate and rapid measurement of moisture in iron ore on conveyors. Microwave transmission techniques have emerged over the past 40 years as the dominant technology for on-line measurement of moisture in bulk materials, including iron ores. Alternative technologies have their limitations. Infra-red analysers are used in a variety of process industries, but rely on the measurement of absorption by moisture in a very thin surface layer. Consequently such probes may be compromised by particle size effects and biased presentation of the bulk mater...

  10. On-line characterization of a hybridoma cell culture process.

    Science.gov (United States)

    Zhou, W; Hu, W S

    1994-06-20

    The on-line determination of the physiological state of a cell culture process requires reliable on-line measurements of various parameters and calculations of specific rates from these measurements. The cell concentration of a hybridoma culture was estimated on-line by measuring optical density (OD) with a laser turbidity probe. The oxygen uptake rate (OUR) was determined by monitoring dynamically dissolved oxygen concentration profiles and closing oxygen balances in the culture. The base addition for neutralizing lactate produced by cells was also monitored on-line via a balance. Using OD and OUR measurements, the specific growth and specific oxygen consumption rates were determined on-line. By combining predetermined stoichiometric relationships among oxygen and glucose consumption and lactate production, the specific glucose consumption and lactate production rates were also calculated on-line. Using these on-line measurements and calculations, the hybridoma culture process was characterized on-line by identifying the physiological states. They will also facilitate the implementation of nutrient feeding strategies for fed-batch and perfusion cultures. (c) 1994 John Wiley & Sons, Inc.

  11. Prediction of Instability Separation Modes and Its Application in Practical Dynamic Security Region

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improve.

  12. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report.

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, Timothy A.; Denman, Matthew R; Williams, R. A.; Martin, Nevin; Jankovsky, Zachary Kyle

    2017-09-01

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities. iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber ex- ploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by cou- pling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated im- pact and the associated degree of difficulty to achieve the attack vector) on accident manage- ment establishes a technical risk informed framework for developing effective cyber security controls for nuclear power. iv

  13. Determination of the cis-trans isomerization barriers of L-alanyl-L-proline in aqueous solutions and at water/hydrophobic interfaces by on-line temperature-jump relaxation HPLC and dynamic on-column reaction HPLC.

    Science.gov (United States)

    Shibukawa, Masami; Miyake, Ayaka; Eda, Sayaka; Saito, Shingo

    2015-09-15

    Proline cis-trans isomerization is known to play a key role in the rate-determining steps of protein folding. It is thus very important to understand the influence of environments, not only bulk solutions but also microenvironments such as interfaces, on the isomerization reaction of proline peptides. Here we present two HPLC methods for measurements of kinetic and equilibrium parameters for the isomerization reactions in bulk solutions and at liquid/solid interfaces. On-line temperature-jump relaxation HPLC (T-jump HPLC) allows the determination of forward and reverse rate constants of the isomerization in a bulk solution by monitoring the whole time course of conversion of pure isomers from both sides of the reaction, in contrast to other HPLC and capillary zone electrophoresis as well as spectrometric and calorimetric methods, which use a mixture of the isomers. We can then determine cis-trans isomerization barriers of the peptide at liquid/solid interfaces from the kinetic data obtained by dynamic on-column reaction HPLC and T-jump HPLC. We observed that the interconversion around the peptide bond for l-alanyl-l-proline (Ala-Pro) in water is accelerated at the surfaces of an alkyl-bonded silica and a poly(styrene-divinylbenzene) copolymer resin, and this is caused by a remarkable decrease in the enthalpy of activation. The molecular structures of the cis and trans forms of Ala-Pro estimated by quantum mechanics calculation reveal that an equilibrium shift toward the cis form as well as the rapid isomerization of Ala-Pro at the water/hydrophobic interfaces can be attributed to the lower polarity of the interfacial water at the surfaces of the hydrophobic materials compared to that of bulk water.

  14. On-line focusing of 5-hydroxy-tryptamine type 3 receptor antagonists via the combination of field-enhanced sample injection and dynamic pH junction in capillary electrophoresis with amperometric detection.

    Science.gov (United States)

    Li, Libo; Xu, Lei; Huang, Jianshe; You, Tianyan

    2014-02-28

    In the present work, an on-line dual focusing technique based on field-enhance sample injection (FASI) and dynamic pH junction (DypH) was developed for the analysis of two 5-hydroxy-tryptamine type 3 receptor (5-HT3) antagonists ondansetron (Ond) and tropisetron (Tro) by capillary electrophoresis with amperometric detection (CE-AD) system. By preparing the sample in a lower conductivity (FASI condition) and lower pH value (DypH condition) matrix relative to the background electrolyte (BGE) solution, a simple and effective dual focusing approach, FASI-DypH was achieved. In this stacking mode, a large amount of analytes could be electrokinetically injected into the capillary and stacked at the boundary of the sample and the BGE zone as a result of deprotonation and decrease in the electric field. Effects of separation, detection and FASI-DypH focusing conditions were investigated in detail. Under the optimum conditions, good separation for Ond and Tro was achieved within 8min. In comparison with the conventional CE-AD analysis method, the present dual focusing technique enabled the enhancement factors in terms of peak heights to reach 357-fold and 345-fold for Ond and Tro, respectively. The limits of detection (LODs) (S/N=3) for Ond and Tro were 2nM and 5nM, respectively. The intraday and interday repeatabilities (RSDs) were less than 4.5% and 2.9% for peak height and migration time, respectively. The proposed method was successfully applied for the analysis of Ond and Tro in human urine sample. Copyright © 2014 Elsevier B.V. All rights reserved.

  15. 支持动态策略的安全核(Security Kernel)机制的研究%Research of Security Kernel Mechanism Supporting Dynamical Policies

    Institute of Scientific and Technical Information of China (English)

    吴新勇; 熊光泽

    2002-01-01

    Security of information system requires a secure operation system. Security kernel meets the requirement and provides a bedrock to security of operation system. This paper extracts the deficiency of traditional security kernel, presents a security kernel mechanism supporting policy flexibility, simplified secure interface. It optimizes the performance by reused policy cache, provids a method to revoke granted permissions and assures the atomicity of revocation permissions and granting new permissions. As a result, all refinements help security kernel to improve its flexibility, extensibility and portability.

  16. A Secured and Improved Dynamic ID based Remote User Authentication Scheme using Smart Card and Hash Function for Distributed Systems

    Directory of Open Access Journals (Sweden)

    S.Ramesh

    2014-08-01

    Full Text Available Authentication is a major concern for accessing remote service residing over on server in an distributed systems. It is difficult to remember different identities and passwords for users. In order to solve the flaws encountered in many remote user authentication schemes in multi-server environment, only authentic user login to the remote server has been used. These remote schemes resist various attacks and have some weakness. Leu and Hsieh proposed an efficient and secure dynamic ID based remote user authentication for distributed environment using smart cards but is vulnerable to impersonation attack, leak verifier attack, stolen smart card attack. We propose a strong authentication scheme with user anonymity and secured dynamic ID based remote user authentication using smart cards that remove aforementioned weakness in distributed systems. The function and performance efficiency of our scheme was analysed and proved to provide a strong mutual authentication between user and server when compared with the existing methods.

  17. PHENIX on-line systems

    Energy Technology Data Exchange (ETDEWEB)

    Adler, S.S.; Allen, M.; Alley, G.; Amirikas, R.; Arai, Y.; Awes, T.C.; Barish, K.N.; Barta, F.; Batsouli, S.; Belikov, S.; Bennett, M.J.; Bobrek, M.; Boissevain, J.G.; Boose, S.; Britton, C.; Britton, L.; Bryan, W.L.; Cafferty, M.M.; Carey, T.A.; Chang, W.C.; Chi, C.Y.; Chiu, M.; Cianciolo, V.; Cole, B.A.; Constantin, P.; Cook, K.C.; Cunitz, H.; Desmond, E.J.; Ebisu, K.; Efremenko, Y.V.; El Chenawi, K.; Emery, M.S.; Engo, D.; Ericson, N.; Fields, D.E.; Frank, S.; Frantz, J.E.; Franz, A.; Frawley, A.D.; Fried, J.; Gannon, J.; Gee, T.F.; Gentry, R.; Giannotti, P.; Gustafsson, H.-A.; Haggerty, J.S.; Hahn, S.; Halliwell, J.; Hamagaki, H.; Hansen, A.G.; Hara, H.; Harder, J.; He, X.; Heistermann, F.; Hemmick, T.K.; Hibino, M.; Hill, J.C. E-mail: jhill@iastate.edu; Homma, K.; Jacak, B.V.; Jagadish, U.; Jia, J.; Kajihara, F.; Kametani, S.; Kamyshkov, Y.; Kandasamy, A.; Kang, J.H.; Kapustinsky, J.; Katou, K.; Kelley, M.A.; Kelly, S.; Kikuchi, J.; Kim, S.Y.; Kim, Y.G.; Kistenev, E.; Kotchetkov, D.; Kurita, K.; Lajoie, J.G.; Lenz, M.; Lenz, W.; Li, X.H.; Lin, S.; Liu, M.X.; Markacs, S.; Matathias, F.; Matsumoto, T.; Mead, J.; Mischke, R.E.; Mishra, G.C.; Moore, A.; Muniruzzamann, M.; Musrock, M.; Nagle, J.L.; Nandi, B.K.; Newby, J.; Nystrand, J.; O' Brien, E.; O' Connor, P.; Ohnishi, H.; Oskarsson, A.; Osterman, L.; Oyama, K.; Paffrath, L.; Pancake, C.E.; Pantuev, V.S.; Petridis, A.N.; Pisani, R.P.; Plagge, T.; Plasil, F.; Purschke, M.L.; Rankowitz, S.; Rao, R.; Rau, M.; Read, K.F.; Ryu, S.S.; Sakaguchi, T.; Sato, H.D.; Seto, R.; Shiina, T.; Silvermyr, D.; Simon-Gillo, J.; Simpson, M.; Sippach, W.; Skank, H.D.; Skutnik, S.; Sleege, G.A.; Smith, G.D.; Smith, M.; Stankus, P.W.; Steinberg, P.; Sugitate, T.; Sullivan, J.P.; Taketani, A.; Tamai, M.; Tanaka, Y.; Thomas, W.D.; Todd, R.; Toldo, F.; Turner, G.; Ushiroda, T.; Velkovska, J.; Hecke, H.W. van; Lith, M. van; Villatte, L.; Achen, W. von; Walker, J.W.; Wang, H.Q.; White, S.N.; Wintenberg, A.L.; Witzig, C.; Wood, L.[and others

    2003-03-01

    The PHENIX On-Line system takes signals from the Front End Modules (FEM) on each detector subsystem for the purpose of generating events for physics analysis. Processing of event data begins when the Data Collection Modules (DCM) receive data via fiber-optic links from the FEMs. The DCMs format and zero suppress the data and generate data packets. These packets go to the Event Builders (EvB) that assemble the events in final form. The Level-1 trigger (LVL1) generates a decision for each beam crossing and eliminates uninteresting events. The FEMs carry out all detector processing of the data so that it is delivered to the DCMs using a standard format. The FEMs also provide buffering for LVL1 trigger processing and DCM data collection. This is carried out using an architecture that is pipelined and deadtimeless. All of this is controlled by the Master Timing System (MTS) that distributes the RHIC clocks. A Level-2 trigger (LVL2) gives additional discrimination. A description of the components and operation of the PHENIX On-Line system is given and the solution to a number of electronic infrastructure problems are discussed.

  18. Causes, rationales and dynamics : exploring the strategic security partnership between the European Union and Africa

    NARCIS (Netherlands)

    Siradag, Abdurrahim

    2012-01-01

    This study examines a strategic partnership in the areas of peace and security between the EU and Africa. The EU has been strengthening its institutional ties with African organisations since 2000, with security relations with Africa a priority on the EU’s agenda following the 9/11 attacks on the Un

  19. Indonesian CPO availability analysis to support food and energy security: a system dynamic approach

    Science.gov (United States)

    Rahman, T.; Arkeman, Y.; Setyaningsih, D.; Saparita, R.

    2017-05-01

    The development of biofuels could be a solution to overcome the energy problem. One of biofuel that has the potential to be developed, namely palm oil biodiesel that is also the raw material for food. As a provider of CPO raw materials, the production of palm biodiesel could trigger competitions, from biofuels demand growth and utilization of agricultural resources. Thus, it needs to be analyzed to determine the adequency of CPO supply to fulfill the need of food and policy recomendation which sets the development of palm oil biodiesel can be synergies with food need especially for the supply of raw material CPO. To obtain the optimal policy in the synergy between the raw material of CPO for food and energy is a need to establish some policy scenarios that allow to be applied and then chosen the best policy alternative of all scenarios. The purpose of this research were to : 1) analysis the availability of CPO to meet the needs of food and energy, 2) provide policy recommendation with regard biodiesel development of food security. The model made used system dynamic method. Several scenarios that used in the model are: 1) existing condition, 2) The scenario increase biodiesel production capacity and increase land productivity, 3) reduction scenario CPO export by 30%, 4) scenario use othe raw material for biodiesel by 20%. The simulation results showed the availability of CPO raw materials would answer all needs of both food and biodiesel when there was an increase in productivity, diversification of raw materials, and also a reduction in palm oil exports. It was needed an integrated policy from upstream to downstream along with the consistency of implementation. Policy suggestions that could be considered were increased productivity through agricultural intensification, enforcement disincentive policies of CPO to exports, and development of non-CPO biodiesel raw materials and development of renewable energy.

  20. Agriculture and food security challenge of climate change: a dynamic analysis for policy selection

    Directory of Open Access Journals (Sweden)

    Ferdous Ahmed

    2016-08-01

    Full Text Available ABSTRACT This study presents an empirical examination of climate change related to vulnerability impacts on food security and remedial adaptation options as a suitable strategy by prioritizing needs over a 50-year period. An Empirical Dynamic Commutable General Equilibrium Model for Climate and the Economy (EDCGECE is applied using future strategies for Malaysia against a baseline scenario of existing conditions, following the top-down options. The model takes into account various climatic variables, including climatic damage, carbon cycle, temperature and rainfall fluctuation, carbon emissions, vulnerability and carbon concentrations, which were adapted from national observational predictions of climatic changes caused by global warming from 2015 to 2065. The results prioritize climate change mitigation for the future. Specifically, this study estimates Malaysia’s food sustainability prospects without adaptation actions and with 5 % to 20 % adaptation actions overtime in different adaptation scenarios, as contrasted with the baseline. The results indicate that food sustainability cost in the baseline in 2015 is 859.3 million US Dollar (USD, which is about a 30-35 % shortage compared with the national targets, and that the shortage will rise over time to USD 987.3 million in 2065. However, the cost of applying different levels of adaptation for food sustainability over time is rising considerably. However, the residual damage also decreases with all adaptation actions in the different scenarios. Thus, adaptation shows a positive sign for Malaysia’s agricultural sectors. As growth values are positive and show rising trends, therefore the projected adaptation policy can be effective for food sustainability for sustainable future strategies in Malaysia.

  1. A Systematic Approach for Dynamic Security Assessment and the Corresponding Preventive Control Scheme Based on Decision Trees

    DEFF Research Database (Denmark)

    Liu, Leo; Sun, Kai; Rather, Zakir Hussain

    2014-01-01

    This paper proposes a decision tree (DT)-based systematic approach for cooperative online power system dynamic security assessment (DSA) and preventive control. This approach adopts a new methodology that trains two contingency-oriented DTs on a daily basis by the databases generated from power...... system simulations. Fed with real-time wide-area measurements, one DT of measurable variables is employed for online DSA to identify potential security issues, and the other DT of controllable variables provides online decision support on preventive control strategies against those issues. A cost......-effective algorithm is adopted in this proposed approach to optimize the trajectory of preventive control. The paper also proposes an importance sampling algorithm on database preparation for efficient DT training for power systems with high penetration of wind power and distributed generation. The performance...

  2. An In-Depth Study of Complex Power System Dynamic Behavior Characteristics for Chinese UHV Power Grid Security

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theo...

  3. Enhanced secure strategy for electro-optic chaotic systems with delayed dynamics by using fractional Fourier transformation.

    Science.gov (United States)

    Cheng, Mengfan; Deng, Lei; Li, Hao; Liu, Deming

    2014-03-10

    We propose a scheme whereby a time domain fractional Fourier transform (FRFT) is used to post process the optical chaotic carrier generated by an electro-optic oscillator. The time delay signature of the delay dynamics is successfully masked by the FRFT when some conditions are satisfied. Meanwhile the dimension space of the physical parameters is increased. Pseudo random binary sequence (PRBS) with low bit rate (hundreds of Mbps) is introduced to control the parameters of the FRFT. The chaotic optical carrier, FRFT parameters and the PRBS are covered by each other so that the eavesdropper has to search the whole key space to crack the system. The scheme allows enhancing the security of communication systems based on delay dynamics without modifying the chaotic source. In this way, the design of chaos based communication systems can be implemented in a modular manner.

  4. On-line EM algorithm for the normalized gaussian network.

    Science.gov (United States)

    Sato, M; Ishii, S

    2000-02-01

    A normalized gaussian network (NGnet) (Moody & Darken, 1989) is a network of local linear regression units. The model softly partitions the input space by normalized gaussian functions, and each local unit linearly approximates the output within the partition. In this article, we propose a new on-line EMalgorithm for the NGnet, which is derived from the batch EMalgorithm (Xu, Jordan, &Hinton 1995), by introducing a discount factor. We show that the on-line EM algorithm is equivalent to the batch EM algorithm if a specific scheduling of the discount factor is employed. In addition, we show that the on-line EM algorithm can be considered as a stochastic approximation method to find the maximum likelihood estimator. A new regularization method is proposed in order to deal with a singular input distribution. In order to manage dynamic environments, where the input-output distribution of data changes over time, unit manipulation mechanisms such as unit production, unit deletion, and unit division are also introduced based on probabilistic interpretation. Experimental results show that our approach is suitable for function approximation problems in dynamic environments. We also apply our on-line EM algorithm to robot dynamics problems and compare our algorithm with the mixtures-of-experts family.

  5. Optimizing On-Line Advertising

    CERN Document Server

    Caruso, Fabrizio

    2010-01-01

    We want to find the optimal strategy for displaying advertisements e.g. banners, videos, in given locations at given times under some realistic dynamic constraints. Our primary goal is to maximize the expected revenue in a given period of time, i.e. the total profit produced by the impressions, which depends on profit-generating events such as the impressions themselves, the ensuing clicks and registrations. Moreover we must take into consideration the possibility that the constraints could change in time in a way that cannot always be foreseen.

  6. Towards Dynamic Authentication in the Grid — Secure and Mobile Business Workflows Using GSet

    Science.gov (United States)

    Mangler, Jürgen; Schikuta, Erich; Witzany, Christoph; Jorns, Oliver; Ul Haq, Irfan; Wanek, Helmut

    Until now, the research community mainly focused on the technical aspects of Grid computing and neglected commercial issues. However, recently the community tends to accept that the success of the Grid is crucially based on commercial exploitation. In our vision Foster's and Kesselman's statement "The Grid is all about sharing." has to be extended by "... and making money out of it!". To allow for the realization of this vision the trust-worthyness of the underlying technology needs to be ensured. This can be achieved by the use of gSET (Gridified Secure Electronic Transaction) as a basic technology for trust management and secure accounting in the presented Grid based workflow. We present a framework, conceptually and technically, from the area of the Mobile-Grid, which justifies the Grid infrastructure as a viable platform to enable commercially successful business workflows.

  7. Are on-line currencies virtual banknotes?

    OpenAIRE

    Stephen F. Quinn; William Roberds

    2003-01-01

    The history of money is marked by innovations that have expanded the role of "inside money"-money created by the private sector. For instance, the past few years have seen the development of several types of on-line payment arrangements, some of which have been dubbed "on-line currencies." ; This article examines the likely success or failure of on-line currencies by means of a historical analogy. The discussion compares the introduction of on-line currencies to the debut of the bearer bankno...

  8. On-Line Impact Load Identification

    Directory of Open Access Journals (Sweden)

    Krzysztof Sekuła

    2013-01-01

    Full Text Available The so-called Adaptive Impact Absorption (AIA is a research area of safety engineering devoted to problems of shock absorption in various unpredictable scenarios of collisions. It makes use of smart technologies (systems equipped with sensors, controllable dissipaters and specialised tools for signal processing. Examples of engineering applications for AIA systems are protective road barriers, automotive bumpers or adaptive landing gears. One of the most challenging problems for AIA systems is on-line identification of impact loads, which is crucial for introducing the optimum real-time strategy of adaptive impact absorption. This paper presents the concept of an impactometer and develops the methodology able to perform real-time impact load identification. Considered dynamic excitation is generated by a mass M1 impacting with initial velocity V0. An analytical formulation of the problem, supported with numerical simulations and experimental verifications is presented. Two identification algorithms based on measured response of the impacted structure are proposed and discussed. Finally, a concept of the AIA device utilizing the idea of impactometer is briefly presented.

  9. Impacts of Base-Case and Post-Contingency Constraint Relaxations on Static and Dynamic Operational Security

    Science.gov (United States)

    Salloum, Ahmed

    Constraint relaxation by definition means that certain security, operational, or financial constraints are allowed to be violated in the energy market model for a predetermined penalty price. System operators utilize this mechanism in an effort to impose a price-cap on shadow prices throughout the market. In addition, constraint relaxations can serve as corrective approximations that help in reducing the occurrence of infeasible or extreme solutions in the day-ahead markets. This work aims to capture the impact constraint relaxations have on system operational security. Moreover, this analysis also provides a better understanding of the correlation between DC market models and AC real-time systems and analyzes how relaxations in market models propagate to real-time systems. This information can be used not only to assess the criticality of constraint relaxations, but also as a basis for determining penalty prices more accurately. Constraint relaxations practice was replicated in this work using a test case and a real-life large-scale system, while capturing both energy market aspects and AC real-time system performance. System performance investigation included static and dynamic security analysis for base-case and post-contingency operating conditions. PJM peak hour loads were dynamically modeled in order to capture delayed voltage recovery and sustained depressed voltage profiles as a result of reactive power deficiency caused by constraint relaxations. Moreover, impacts of constraint relaxations on operational system security were investigated when risk based penalty prices are used. Transmission lines in the PJM system were categorized according to their risk index and each category was as-signed a different penalty price accordingly in order to avoid real-time overloads on high risk lines. This work also extends the investigation of constraint relaxations to post-contingency relaxations, where emergency limits are allowed to be relaxed in energy market models

  10. Robust on-line monitoring of biogas processes; Robusta maettekniker on-line foer optimerad biogasproduktion

    Energy Technology Data Exchange (ETDEWEB)

    Nordberg, Aake; Hansson, Mikael; Kanerot, Mija; Krozer, Anatol; Loefving, Bjoern; Sahlin, Eskil

    2010-03-15

    project showed that pH-adjustment with Na{sub 3}PO{sub 4} can be a way of compensating for the losses of volatile compounds (up to 20% of VS), which occurs when standardized reference methods are used. This is a fundamental problem and requires further research. Monitoring of a laboratory-scale anaerobic digester with NIR showed that a previously developed multivariate model could predict propionate concentrations (R2= 0,92; RMSEP 0,39 g/L) in the interval 0-5 g/L, which is a relevant interval for inhibition (limit ca 3 g/L). A commercial FT-NIR instrument was subsequently installed at the production plant. However, the organic loading was decreased during the evaluation period due to process disturbances, at which the dynamic of the process was not in the range needed for prediction of e.g. propionate. Measurements and evaluation will continue during normal conditions after the completion of this project. Evaluation of a potentiometric sensor for ammonia with potential for on-line application showed low stability and a need for daily calibration, which therefore did not fulfill the requested demand. The project has demonstrated technologies with significant potential for on-line monitoring at production scale facilities, thus improving the knowledge base for making important decisions. Knowledge about on-line implementation has increased, and important insights into the limitations of standardized reference methods and substrate characteristics have been achieved. Instrument suppliers have in general a limited insight in the conditions at a biogas plant, which suggests that this type of WR-financed project is important for development in the area

  11. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization

    Directory of Open Access Journals (Sweden)

    Wai Kuan Yip

    2007-01-01

    Full Text Available We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT and discrete fourier transform (DFT. Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs of and for random and skilled forgeries for stolen token (worst case scenario, and for both forgeries in the genuine token (optimal scenario.

  12. A novel optimization method of transient stability emergency control based on practical dynamic security region (PDSR) of power systems

    Institute of Scientific and Technical Information of China (English)

    YU; Yixin; LIU; Hui; ZENG; Yuan

    2004-01-01

    This paper proposes a novel optimization method of transient stability emergency control based on a new concept of the so-called extended practical dynamic security region (EPDSR) defined in this paper and four experiential laws about the EPDSRs found from a number of studies in real power systems. In this method, the effect of a control action is represented by the displacement of EPDSR's critical hyper-plane boundary in the direction of its outer normal vector. If an unstable contingency occurs, appropriate emergency control actions are triggered so that the enlarged EPDSR can cover the current operating point. Based on these ideas, a mathematics model of emergency control strategy is developed for minimizing its total cost and guaranteeing power system transient stability. The simulation results on the 10-generator, 39-bus New-England Test System as well as other real power systems have shown the validity of this method.

  13. Biomass Productivity Dynamics Monitoring and its Drivers in Sahelian Croplands and Rangelands to Support Food Security Policies

    Science.gov (United States)

    Leroux, L.

    2015-12-01

    Since the Sahelian population livelihood relies mainly on agropastoral activities, accurate information on biomass productivity dynamics and the underlying drivers are needed to manage a wide range of issues such as food security. This study aims to contribute to a better understanding of these drivers in rangeland and cropland, both at the Sahel and local scales (an agropastoral site in South-West Niger). At the Sahel scale, the MODIS Land Cover product was used to extract cropland and rangeland pixels. By analyzing MODIS NDVI trends together with TRMM3B43 annual rainfall (2000-2010), we developed a new classification scheme allowing to identify areas of persistent decline/improvement in biomass productivity and to separate rainfall-driven dynamics from other factors. The results showed an overall increase of productivity in the rangeland, and both an improvement and a degradation in the cropland. We found strong evidence that the increase in biomass productivity was generally linked to increasing rainfall, while the decrease could be attributed chiefly to other factors exclusively or to a combination of both climate- and human-induced factors (see the attached Figure). At the Niger site scale, biomass trends have been put in relation with a set of potential drivers via a RandomForest model, to define which were the explanatory factors of the observed trends. The factor set covered 5 categories: climate, natural constraints, demography, physical accessibility and land cover changes. We highlighted that tiger bushes areas were particularly prone to pressure due to overgrazing and overexploitation of wood, while positive trends were mainly observed near rivers and in fossil valleys where new agricultural practices might have been promoted. The approach developped here could help to delineate areas with decrease in crop and grassland production and thus to assess the vulnerability of the population, but also to target zones with good potential for planning long

  14. 基于动态控制机制的工作流安全访问模型%Workflow Security Access Model Based on Dynamic Control Mechanism

    Institute of Scientific and Technical Information of China (English)

    巫茜; 周庆

    2012-01-01

    为确保工作流系统安全可靠地工作,在传统基于角色的访问控制模型中引入目标案例、用户管理和目标3个关系元素,设计动态授权机制,构建一种基于动态控制机制的工作流安全访问模型,通过基本约束关系与动态约束条件,保证模型的安全运行,并将其与工作流引擎组件进行集成,为独立安全领域应用提供安全授权服务.应用结果表明,该模型可将动态职责与互惠职责较好地分离,对动态职责进行绑定,为系统工作流安全访问提供技术支持.%In order to ensure the workflow system secure and reliable, this paper introduces three relation elements of Target Case(TC), User Management(UM) and Target(T) in the conventional access control model based on role, designs the dynamic authorization mechanism, and builds a sort of security access model in workflow based on dynamic control mechanism, which ensures the secure running of the model by means of basic constraint relation and dynamic constraint conditions. The model is integrated with workflow engine component to provide the security authorization service for the application of independent security field. Application results show that the model can better separate the dynamic responsibility and reciprocal responsibility, make the binding of dynamic responsibility, and provide technical support for security access of system workflow.

  15. Cloud Radar: Near Real-Time Detection of Security Failures in Dynamic Virtualized Infrastructures

    NARCIS (Netherlands)

    Bleikertz, Sören; Vogel, Carsten; Groß, Thomas

    2014-01-01

    Cloud infrastructures are designed to share physical resources among many different tenants while ensuring overall secu- rity and tenant isolation. The complexity of dynamically changing and growing cloud environments, as well as insider attacks, can lead to misconfigurations that ultimately result

  16. On-line generalized Steiner problem

    Energy Technology Data Exchange (ETDEWEB)

    Awerbuch, B.; Azar, Y.; Bartal, Y. [Tel Aviv Univ. (Israel)

    1996-12-31

    The Generalized Steiner Problem (GSP) is defined as follows. We are given a graph with non-negative weights and a set of pairs of vertices. The algorithm has to construct minimum weight subgraph such that the two nodes of each pair are connected by a path. We consider the on-line generalized Steiner problem, in which pairs of vertices arrive on-line and are needed to be connected immediately. We give a simple O(log{sup 2} n) competitive deterministic on-line algorithm. The previous best online algorithm (by Westbrook and Yan) was O({radical}n log n) competitive. We also consider the network connectivity leasing problem which is a generalization of the GSP. Here edges of the graph can be either bought or leased for different costs. We provide simple randomized O(log{sup 2} n) competitive algorithm based on the on-line generalized Steiner problem result.

  17. The war against on-line piracy

    OpenAIRE

    Harris, Julian

    2011-01-01

    A summary by Julian Harris, Deputy General Editor Amicus Curiae, of US attempts to control what it identifies as rogue Internet sites engaged in on-line piracy and opposition to such legislative moves.

  18. Security Analysis of a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    DU Mao-Kang; HE Bo; WANG Yong

    2011-01-01

    Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14(2009)574) proposed a block encryption algorithm based on dynamic sequences of multiple chaotic systems. We analyze the potential Saws in the algorithm. Then, a chosen-plaintext attack is presented. Some remedial measures are suggested to avoid the flaws effectively. Furthermore, an improved encryption algorithm is proposed to resist the attacks and to keep all the merits of the original cryptosystem.

  19. The Secure Dynamic Source Routing Protocol in MANET using MD5 Hash Function

    Directory of Open Access Journals (Sweden)

    Radha S. Savankar

    2012-06-01

    Full Text Available Dynamic Source Routing (DSR is a routing protocol designed specifically for use in mobile ad hoc networks. The protocol allows nodes to dynamically discover a source route across multiple network hops to any destination in the ad hoc network. The protocol is composed of the two mechanisms of Route Discovery and Route Maintenance, which work together to allow nodes to discover and maintain source routes to arbitrary destinations in the ad hoc network. When using source routing, each packet to be routed carries in its header the complete, ordered list of nodes through which the packet must pass. A key advantage of source routing is that intermediate hops do not need to maintain routing information in order to route the packets they receive, since the packets themselves already contain all of the necessary routing information. This, coupled with the dynamic, on-demand nature of Route Discovery, completely eliminates the need for periodic router advertisements and link status packets, reducing the overhead of DSR, especially during periods when the network topology is stable and these packets serve only as keep-alives

  20. On-Line Acquisitions by LOLITA

    Directory of Open Access Journals (Sweden)

    Frances G. Spigai

    1970-12-01

    Full Text Available The on-line acquisition program (LOLITA in use at the Oregon State University Library is described in terms of development costs, equipment requirements, and overall design philosophy. In particular, the record format and content of records in the on-order file, and the on-line processing of these records (input, search, correction, output using a cathode ray tube display terminal are detailed.

  1. On-line Measurements of Settling Charateristics in Activated Sludge

    DEFF Research Database (Denmark)

    Rasmussen, Michael R.; Larsen, Torben

    1997-01-01

    An on-line settling column for measuring the dynamic variations of settling velocity of activated sludge has been developed. The settling column is automatic and self-cleansing insuring continuous and reliable measurements. The settling column was tested on sludge from a batch reactor where sucrose...... was added as an impulse to activated sludge. The continuous measurement of settling velocity revealed a highly dynamic response after the sucrose was added. The result were verified with simultaneous measurement of the initial settling rate. A 200 hour experiment showed variations in settling velocity...

  2. Semi-on-line analysis for fast and precise monitoring of bioreaction processes

    DEFF Research Database (Denmark)

    Christensen, L.H.; Marcher, J.; Schulze, Ulrik

    1996-01-01

    Monitoring of substrates and products during fermentation processes can be achieved either by on-line, in situ sensors or by semi-on-line analysis consisting of an automatic sampling step followed by an ex situ analysis of the retrieved sample. The potential risk of introducing time delays...... and signal bias during sampling makes it necessary to distinguish between real-time, on-line, in situ methods and semi-on-line analysis. In addition, semi-on-line analyzers are often mechanically complex-a circumstance which has to be given special attention during their industrial use on a routine basis....... This review on semi-on-line analysis will focus both on the dynamics and precision of aseptic sampling devices and on the performance of flow injection analysis (FIA) and sequential injection analysis (SIA), especially with regard to their robustness when used in industry. (C) 1996 John Wiley & Sons, Inc....

  3. Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Nithiavathy.R, Suresh.J

    2013-03-01

    Full Text Available Cloud computing hasbeen thegenuinesolution tothe rising storage costs of IT Enterprises.The costofdatastorage devices is too high rate at which datais being generated, where the enterprises orindividual users to frequently update theirhardwareor software. The data outsourced tothecloudwould help inreducing themaintenance.Theuser’s dataare moved from cloudto large datacenters, which are located remotely which does nothave control over it. Hence there is a securitybreech which has to beresolved. To address thisissue, we proposeaneffectivemethodtoachievesecureand dependable cloud storageby usingdistributed storage integrityauditingmechanism,which incorporatehomomorphic token anddistributed erasure-coded data for dynamicallystoring data.The proposed design allows the userwith lightweight communication and computationcost. To maintainreliablecloud storage correctness,and to locatethemisbehaving serverinwhich thedata arefrequently changingincloud. It isanefficient method for dynamic operation whichinclude erase, append, and block modification and itvery effective in fighting against server colludingattacks, byzantinefailure, maliciousdata blockmodifications.

  4. Dynamic Probe Window Based Optimization for Surveillance in Home Security System

    Directory of Open Access Journals (Sweden)

    Bhaskar Kapoor

    2010-02-01

    Full Text Available Tracking of a moving object is very important for video surveillance in a real time scenario. The proposedalgorithm uses dynamic probe window based approach & combines the conventional edge based and framedifferencing approach to achieve better algorithmic time complexity as well as improved results. First itcomputes the edge map of two consecutive frames with the help of first order differential sobel operator dueto its noise resistant attributes and applies the frame differencing method between the two consecutive edgemaps. Apart from the above optimization, our method doesn’t differentiate between the scenario when motionoccurs and when it doesn’t, that is, almost same computation overhead is required even if motion is not thereso it reduces the time complexity of the algorithm when no motion is detected. The effectiveness of theproposed motion detection algorithm is demonstrated in a real time environment and the evaluation resultsare reported.

  5. Formación on line

    Directory of Open Access Journals (Sweden)

    O. Grau-Perejoan

    Full Text Available La formación on line es una modalidad de enseñanza a distancia basada en las nuevas tecnologías. En este artículo se pretende hacer una introducción a base de describir a grandes rasgos sus características principales: asincronía, no presencialidad, comunicación escrita, función del profesor on line, así como los retos, los riesgos, las ventajas y los inconvenientes que plantea. Se exponen las diferencias entre la formación on line y la formación presencial, de manera que los docentes puedan adaptar de la mejor manera posible sus propuestas formativas a la modalidad on line. Se introduce el importantísimo papel de la planificación y de la fase de diseño y, finalmente, se repasan conceptos útiles para comprender mejor el mundo de la formación on line como son los conceptos entorno virtual de aprendizaje (EVA o Blended Learning (B-Learning.

  6. Dynamic monitoring of engineering structures as a key element of its technical security

    Directory of Open Access Journals (Sweden)

    Patrikeev Aleksandr Vladimirovich

    2014-03-01

    Full Text Available On an example of a complex engineering structure with aerodynamically unfavorable constructive form, equipped with mechanisms dampers, the results of long-term observations of the oscillation frequency under the influence of wind loads were reviewed. The experimental dependence of the first tone oscillation frequency on time for this structure is shown. The hypothesis on the causes of frequency oscillations change in engineering structures in time is proposed. The experimental data confirms this hypothesis. The results of a comparison of the experimental data for long-term observations with the oscillation frequency in accordance with the safety criteria of GOST 31937-2011 “Buildings and Constructions. Rules of inspection and monitoring of the technical condition” are shown. It has been shown that the results of comparison indicate technical safety of the whole object. It is offered to use dynamic monitoring systems for technically complex heavy-duty engineering structures for early detection of the transition beginning of the control object to the limited functional or emergency condition.

  7. Educational On-Line Gaming Propensity

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Razmerita, Liana; Kirchner, Kathrin

    2014-01-01

    Educational on-line games are promising for new generations of students who are grown up digital. Th e new generations of students are technology savvy and spend lots of time on the web and on social networks. Based on an exploratory study, this article investigates the factors that infl uence...... students’ willingness to participate in serious games for teaching/learning. Th is study investigates the relationship between students’ behavior on Facebook, Facebook games, and their attitude toward educational on-line games. Th e results of the study reveal that the early adopters of educational games...

  8. Water security, risk and economic growth: lessons from a dynamical systems model

    Science.gov (United States)

    Dadson, Simon; Hall, Jim; Garrick, Dustin; Sadoff, Claudia; Grey, David; Whittington, Dale

    2016-04-01

    Investments in the physical infrastructure, human capital, and institutions needed for water resources management have been a noteworthy feature in the development of most civilisations. These investments affect the economy in two distinct ways: (i) by improving the factor productivity of water in multiple sectors of the economy, especially those that are water intensive such as agriculture and energy; and (ii) by reducing the acute and chronic harmful effects of water-related hazards like floods, droughts, and water-related diseases. The need for capital investment to mitigate these risks in order to promote economic growth is widely acknowledged, but prior work to conceptualise the relationship between water-related risks and economic growth has focused on the productive and harmful roles of water in the economy independently. Here the two influences are combined using a simple, dynamical model of water-related investment, risk, and growth at the national level. The model suggests the existence of a context-specific threshold above which growth proceeds along an 'S'-curve. In many cases there is a requirement for initial investment in water-related assets to enable growth. Below the threshold it is possible for a poverty trap to arise. The presence and location of the poverty trap is context-specific and depends on the relative exposure of productive water-related assets to risk, compared with risks faced by assets in the wider economy. Exogenous changes in the level of water-related risk (through, for example, climate and land cover change) can potentially push an economy away from a growth path towards a poverty trap. These results illustrate the value of accounting for environmental risk in models of economic growth and may offer guidance in the design of robust policies for investment in water-related productive assets to manage risk, particularly in the face of global and regional environmental change.

  9. ON-LINE DOCUMENTS CONTENT MANAGEMENT

    Directory of Open Access Journals (Sweden)

    VASILESCU RAMONA VIOLETA

    2010-05-01

    Full Text Available This paper outlines the steps and technologies used in developing an on-line application server with many desktop clients, and with high power processing for a wide range of input documents to obtain searchable documents on the highest portability standards, PDF and PDF /A.

  10. Dynamic model of minimax control over economic security state of the region in the presence of risks

    Directory of Open Access Journals (Sweden)

    Andrey Fedorovich Shorikov

    2012-06-01

    Full Text Available Investigation and solution of management of economic security state in the region (MESSR requires development of a dynamic economic-mathematical model that takes into account the presence of control actions, uncontrolled parameters (risk modeling errors, etc. and availability of information deficit. At the same time, the existing approaches to solving such problems are based primarily on static models and the use of stochastic modeling of the device, which is required for the application of knowledge of the probability characteristics of the main model parameters and special conditions for the realization of the process. We should note that to use the apparatus of stochastic modeling, very strict conditions are required, which in practice are usually not feasible in advance In this paper, we propose to use a deterministic approach for modeling and solving the original problem in the form of a dynamic programming problem of minimax control (optimization of a guaranteed result MESSR at the determined point of time, taking into account the availability of risks of deterministic and stochastic nature (combined risks model. At thesametime, under therisks in thesocial and economic system we understand thefactors that negatively catastrophically affect the results of the reviewed processes inside it. For an effective use, a technique of prediction and assessment of time rows and stochastic risks in MESSR optimization process is presented, which can serve as a basis for the development of appropriate computer software. To solve the problem of program minimax control MESSR in the presence of risks, we propose a method which is reduced to the realization of a finite number of solutions of linear and convex mathematical programming and discrete optimization problem. The proposed method makes it possible to develop efficient numerical procedures to implement computer simulation of the dynamics of the problem, build program minimax control and gain optimal

  11. Internet Teaching By Style: Profiling the On-line Professor

    Directory of Open Access Journals (Sweden)

    Sharon Strand

    2000-01-01

    Full Text Available The goal of this article is to offer the results of a pilot study which examined the personality type and teaching style preferences of faculty who elected to teach an on-line course. The article will present a description of personality assessments, including the Myers-Briggs Type Indicator (MBTI and Anthony Gregorc's Transaction Ability Inventory used to determine teaching tendencies and styles. In addition, a structured written questionnaire developed by the researchers was used to assess teacher satisfaction with worldwide web-based instruction. Utilizing the results of these psychological assessments, a preliminary analysis of the personal characteristics of college professors who chose to teach on line will be presented. This pilot study found that some preferred teaching styles may be more compatible with the dynamics of distance learning formats. By determining successful teaching styles for on-line courses, we can develop more effective faculty development programs to assist others in successfully transitioning into the cyber-teaching and learning environment.

  12. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  13. Research on early warning of food security using a system dynamics model: evidence from Jiangsu province in China.

    Science.gov (United States)

    Xu, Jianling; Ding, Yi

    2015-01-01

    Analyzing the early warning of food security, this paper sets the self-sufficiency rate as the principal indicator in a standpoint of supplement. It is common to use the quantitative methods to forecast and warning the insecurity. However, this paper considers more about the probable outcome when the government intervenes. By constructing the causal feedbacks among grain supplement, demand, productive input, and the policy factors to simulate the future food security in Jiangsu province, conclusions can be drawn as the following: (1) The situation of food security is insecure if the self-sufficiency rate is under 68.3% according to the development of system inertia. (2) it is difficult to guarantee the food security in Jiangsu just depending on the increase of grain sown area. (3) The valid solution to ensure the food security in Jiangsu is to improve the productivity.

  14. Educational On-Line Gaming Propensity

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Razmerita, Liana; Kirchner, Kathrin

    2014-01-01

    Educational on-line games are promising for new generations of students who are grown up digital. Th e new generations of students are technology savvy and spend lots of time on the web and on social networks. Based on an exploratory study, this article investigates the factors that infl uence...... students’ willingness to participate in serious games for teaching/learning. Th is study investigates the relationship between students’ behavior on Facebook, Facebook games, and their attitude toward educational on-line games. Th e results of the study reveal that the early adopters of educational games...... are likely to be students, who are young, have only a few Facebook connections, who currently play Facebook game(s). Furthermore, the study emphasizes that there may be differences between students coming from various countries....

  15. New Trends in on-line Marketing

    OpenAIRE

    Palkovič, Lukáš

    2011-01-01

    This bachelor thesis deals with new trend of internet marketing, it focuses especially on viral marketing. The theoretical part charasterizes the process of viral campaigns, furthermore deals with the components and aspects of on-line environment. Another separated chapter presents social networks, their place in viral marketing and at last but not least the viral video making process. The practical part contains different analyses of specific viral campaigns. The next and equally the last pa...

  16. Connecting to On-line Data

    Science.gov (United States)

    Eichhorn, G.; Astrophysics Datacenter Executive Committee (ADEC)

    2004-05-01

    The Astrophysics Datacenter Executive Committee (ADEC) is coordinating the development of a system to facilitate the linking to on-line data. This system has three components: 1. Unique dataset identifiers. 2. A verification system for identifiers. 3. Permanent links to on-line data sets. 1. The ADEC has agreed on a naming scheme for data sets that allows for the unique identification of any data set. The ADEC data centers will clearly mark their data with these identifiers to allow the generation of links to these data. 2. Each data center has a utility that can check whether a data set identifier is a valid identifier at that center. A central verifier allows third parties access to these individual verifiers through a single portal. 3. The central verifier also provides permanent links to data sets through a central link forwarding system. This makes it possible to move data sets between data centers while maintaining the permanent links. The ADEC plans to first use this system to implement the linking from the literature to on-line data in a collaboration with the AAS and the University of Chicago Press for the AAS journals.

  17. Secure Dynamic Program Repartitioning

    DEFF Research Database (Denmark)

    Hansen, Rene Rydhoff; Probst, Christian

    2005-01-01

    , but the partitioning compiler becomes a part of the network and can recompile applications, thus alowing hosts to enter or leave the framework. We contend that this setting is superior to static partitioning, since it allows redistribution of data and computations. This is especialy beneficial if the new host alows...

  18. Asset protection through security awareness

    CERN Document Server

    Speed, Tyler Justin

    2011-01-01

    Introduction: What Is Information Security? Creating a Culture of Security Awareness Protecting Corporate Assets Protective MeasuresA Culture of Security AwarenessRemaining DynamicOverview of Security Awareness Categories Overview Industry StandardsPrivacy ConcernsPassword Management Credit Card Compliance (PCI) General File ManagementExamples of Security Regulations and LawsWho Is an IS Professional?Introduction Empowering Security Professionals Top-Down ApproachDiplomacyThe People Portion of Information SecurityThe IS SpecialistDiplomacy-The IS Professional's Best FriendEnd Users Are Great N

  19. PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA

    Directory of Open Access Journals (Sweden)

    Patricia R. Loubeau

    2014-05-01

    Full Text Available This research seeks to develop a better understanding of the factors affecting on-line purchasing behavior among Generation Y (Gen Y consumers in Bulgaria. Also called millenials and born between the mid-1970s and late 1990s, this generation is especially active on-line and will be a dominant influence shaping e-commerce. An empirical study was conducted based on a written survey of a sample consisting of 367 high school and university students in Bulgaria. The most important reason why Bulgarian young people shop on-line is the pursuit of unique products not locally available, followed by convenience and better pricing, and their favorite category of internet purchases is “Apparel and Accessories.” Bulgarian millennials are using the internet to shop for trendy fashion and to obtain a variety of brands that are unavailable locally. Like other regions of the world, concern about financial transactions security is a major barrier limiting the willingness to shop on-line in Bulgaria. Unlike other markets where on-line music purchases are growing, high levels of digital piracy in Bulgaria strongly discourage Bulgarian students from purchasing music on-line. One limitation of this study arises because of its reliance on a convenience sample of students from medium sized cities in Southern Bulgaria. Further research employing stratified random sampling across Bulgaria is needed to assess whether the findings are broadly generalizable for the Gen Y population.

  20. Dynamic DNS update security, based on cryptographically generated addresses and ID-based cryptography, in an IPv6 autoconfiguration context

    OpenAIRE

    Combes, Jean-Michel; Arfaoui, Ghada; LAURENT, Maryline

    2012-01-01

    International audience; This paper proposes a new security method for protecting signalling for Domain Name System (DNS) architecture. That is, it makes secure DNS update messages for binding a Fully Qualified Domain Name (FQDN) of an IPv6 node and the IPv6 address of the node owning this FQDN. This method is based on the use of Cryptographically Generated Addresses (CGA) and IDBased Cryptography (IBC). Combination of these two techniques allows DNS server to check the ownership of the IPv6 a...

  1. Total on-line purchasing system (TOPS)

    Energy Technology Data Exchange (ETDEWEB)

    Collins, N.

    1995-11-01

    The Information Management Division (IMD) at LLNL is developing a new purchasing system for the Procurement Department. The first major development of this new system is called, {open_quotes}Total On-Line Purchasing System{close_quotes} (TOPS). TOPS will help speed up the requisitioning process by having requisitions electronically entered by requesters and electronically sent to buyers to be put on Purchase Orders. The new purchasing system will use Electronic Commerce (EC)/Electronic Data Interchange (EDI), to help increase transaction flows for shipping notices, RFQs, Quotes, Purchase Orders, and Invoices. ANSI X.12 is the EDI standard that this new EC will use.

  2. DYNAMO: A Dynamic Architectural Memory On-line

    Directory of Open Access Journals (Sweden)

    Ann Heylighen

    2000-01-01

    Full Text Available This paper describes the current status of DYNAMO, a web-based design assistant for students and professional designers in the field of architecture. The tool can be considered a Case-Based Design (CBD system in so far that it was inspired by the view of cognition underlying CBD. The paper points out how DYNAMO incorporates this view, and at the same time extrapolates it beyond the individual. In this way, the tool attempts to embrace and profit from several kinds of interaction that are crucial for the development and renewal of design knowledge. This should result in a design tool that both feels cognitively comfortable to (student- designers, and offers them a platform for exchanging knowledge and insights with colleagues in different contexts and at different levels of experience. In addition, the paper describes the implementation of these theoretical ideas as a working prototype, which has recently been tested by 4th year design students. Finally, DYNAMO is situated in the context of other comparable tools that have been or are being developed in the field of architectural design.

  3. Control E-commerce security

    OpenAIRE

    Wu, Yucheng

    2010-01-01

    Electronic commerce has been very popular in the recent years. However, security is one of the barriers, which affects the development of E-commerce. How should merchants of E-commerce solve this problem and maintain a secure environment for their customers? How do customers protect their confidential data when they are shopping on-line? This thesis discusses various common attacks, and presents the protection solutions according to those attacks. Because attacks may take place on the custome...

  4. On-line and Mobil Learning Activities

    Science.gov (United States)

    Ackerman, S. A.; Whittaker, T. M.; Jasmin, T.; Mooney, M. E.

    2012-12-01

    Introductory college-level science courses for non-majors are critical gateways to imparting not only discipline-specific information, but also the basics of the scientific method and how science influences society. They are also indispensable for student success to degree. On-line, web-based homework (whether on computers or mobile devices) is a rapidly growing use of the Internet and is becoming a major component of instruction in science, replacing delayed feedback from a few major exams. Web delivery and grading of traditional textbook-type questions is equally effective as having students write them out for hand grading, as measured by student performance on conceptual and problem solving exams. During this presentation we will demonstrate some of the interactive on-line activities used to teach concepts and how scientists approach problem solving, and how these activities have impacted student learning. Evaluation of the activities, including formative and summative, will be discussed and provide evidence that these interactive activities significantly enhance understanding of introductory meteorological concepts in a college-level science course. More advanced interactive activities are also used in our courses for department majors, some of these will be discussed and demonstrated. Bring your mobile devices to play along! Here is an example on teaching contouring: http://profhorn.aos.wisc.edu/wxwise/contour/index.html

  5. Research on Dynamic Security Appraisal of Saline Water Irrigation%微咸水灌溉动态安全评价理论及方法研究

    Institute of Scientific and Technical Information of China (English)

    李江云; 熊玲; 贺娟; 裴婷

    2012-01-01

    This paper aims at investigating the security of irrigation water,soil,economic crops and eremophytes,together with a number of dynamic factors including irrigation scheduling,irrigation methods,irrigation water management strategies and soil amelioration methods are taken into account at the same time,then index system and method of security appraisal by using saline water are studied.Based on the dynamic security index system,judgment method and grade standards security appraisal software model named SASI are compiled.SASI software is used to appraise the security of using mildly saline groundwater for agricultural irrigation in the southern part of Junggar Basin.The result shows that as the continuous irrigation with mildly saline groundwater for years,soil and crop in the cotton field are gradually polluted to a certain degree.And finally,measures and suggestions for improving the security situation of mildly saline groundwater irrigation are put forward.%针对灌溉水质、土壤安全、经济作物及荒漠植物安全等各项目标,结合灌溉制度、灌水方法、灌溉方式及土壤改良措施等动态因子,就微咸水资源化利用的安全性评价及其指标体系的建立进行了研究,确定了动态安全评价指标体系、评价方法及评价等级并编制了用于微咸水灌溉动态安全性评价的SASI软件。利用该软件对准噶尔盆地南缘莫索湾灌区微咸水农业灌溉的安全性进行了评价。评价结果表明该研究区域内,随着微咸水灌溉年份的增加,棉田土壤及作物虽然仍保持在未受污染的范围内,但污染指数逐渐增大,由此提出改善微咸水灌溉安全状况的措施及建议。

  6. Trivariate Modeling of Interparental Conflict and Adolescent Emotional Security: An Examination of Mother-Father-Child Dynamics.

    Science.gov (United States)

    Cheung, Rebecca Y M; Cummings, E Mark; Zhang, Zhiyong; Davies, Patrick T

    2016-11-01

    Recognizing the significance of interacting family subsystems, the present study addresses how interparental conflict is linked to adolescent emotional security as a function of parental gender. A total of 272 families with a child at 12.60 years of age (133 boys, 139 girls) were invited to participate each year for three consecutive years. A multi-informant method was used, along with trivariate models to test the associations among mothers, fathers, and their adolescent children's behaviors. The findings from separate models of destructive and constructive interparental conflict revealed intricate linkages among family members. In the model of destructive interparental conflict, mothers and fathers predicted each other's conflict behaviors over time. Moreover, adolescents' exposure to negativity expressed by either parent dampened their emotional security. Consistent with child effects models, adolescent emotional insecurity predicted fathers' destructive conflict behaviors. As for the model of constructive interparental conflict, fathers predicted mothers' conflict behaviors over time. Adolescents' exposure to fathers' constructive conflict behaviors also enhanced their sense of emotional security. Consistent with child effects models, adolescent emotional security predicted mothers' and fathers' constructive conflict behaviors. These findings extended the family and the adolescent literature by indicating that family processes are multiidirectional, involving multiple dyads in the study of parents' and adolescents' functioning. Contributions of these findings to the understanding of interparental conflict and emotional security in adolescence are discussed.

  7. Evaluation of power system security and development of transmission pricing method

    Science.gov (United States)

    Kim, Hyungchul

    The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services. The introduction of competition into unbundled electricity services may lead system operation closer to its security boundaries resulting in smaller operating safety margins. The competitive environment is expected to lead to lower price rates for customers and higher efficiency for power suppliers in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing. In power system security assessment, the following issues are discussed (1) The description of probabilistic methods for power system security assessment; (2) The computation time of simulation methods; (3) on-line security assessment for operation. A probabilistic method using Monte-Carlo simulation is proposed for power system security assessment. This method takes into account dynamic and static effects corresponding to contingencies. Two different Kohonen networks, Self-Organizing Maps and Learning Vector Quantization, are employed to speed up the probabilistic method. The combination of Kohonen networks and Monte-Carlo simulation can reduce computation time in comparison with straight Monte-Carlo simulation. A technique for security assessment employing Bayes classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation. This dissertation also suggests an approach for allocating transmission transaction costs based on reliability benefits in transmission services. The proposed method shows the transmission transaction cost of reliability benefits when transmission line capacities are considered. The ratio between allocation by transmission line

  8. On-line estimation of concentration parameters in fermentation processes

    Institute of Scientific and Technical Information of China (English)

    XIONG Zhi-hua; HUANG Guo-hong; SHAO Hui-he

    2005-01-01

    It has long been thought that bioprocess, with their inherent measurement difficulties and complex dynamics, posed almost insurmountable problems to engineers. A novel software sensor is proposed to make more effective use of those measurements that are already available, which enable improvement in fermentation process control. The proposed method is based on mixtures of Gaussian processes (GP) with expectation maximization (EM) algorithm employed for parameter estimation of mixture of models. The mixture model can alleviate computational complexity of GP and also accord with changes of operating condition in fermentation processes, i.e., it would certainly be able to examine what types of process-knowledge would be most relevant for local models' specific operating points of the process and then combine them into a global one. Demonstrated by on-line estimate of yeast concentration in fermentation industry as an example, it is shown that soft sensor based state estimation is a powerful technique for both enhancing automatic control performance of biological systems and implementing on-line monitoring and optimization.

  9. 一种安全的动态源路由协议%A Secure Dynamic Source Routing

    Institute of Scientific and Technical Information of China (English)

    李嘉为; 郭达伟; 张国庆; 陈骁

    2011-01-01

    研究了移动 Ad hoc 网络(MANET)按需路由协议的安全问题,针对 DSR 路由协议分析了现有安全改进方案的优缺点.为了防止恶意攻击,降低网络开销,以一种基于椭圆曲线密码体制的高效数字签名算法为基础,结合后向验证策略,提出了一种适用于 DSR 协议的安全解决方案(Sec-DSR).对协议的安全性进行了论证,并在 QualNet 仿真环境下进行实验验证.仿真过程实现了安全算法,同时使用 blackhole 和 rushing 两种常见攻击模型测试协议抗攻击能力,结果表明 Sec-DSR 协议模型能够以较小的协议开销确保较高的安全性能.%On-demand routing protocol is very popular in multi-hop mobile ad hoc network (MANET) for its low overhead, but vulnerable to malicious attacks for lack of secure mechanism. The advantages and drawbacks of the current secure enhancement method based on the DSR are analyzed. A new secure enhancement method based on an efficient Elliptical Curve Cryptosystem (ECC) digital signature using backward authentication is proposed for DSR protocol Sec-DSR,which has be proved secure and efficient theoretically. By using the blackhole and rushing attack model, Sec-DSR is simulated on the QualNet simulation tools. The results show that the proposed secure protocol can obtain stronger security without sacrificing large overhead.

  10. Secure transmission of static and dynamic images via chaotic encryption in acousto-optic hybrid feedback with profiled light beams

    Science.gov (United States)

    Chatterjee, Monish R.; Almehmadi, Fares S.

    2015-01-01

    Secure information encryption via acousto-optic (AO) chaos with profiled optical beams indicates substantially better performance in terms of system robustness. This paper examines encryption of static and time-varying (video) images onto AO chaotic carriers using Gaussian-profile beams with diffracted data numerically generated using transfer functions. The use of profiled beams leads to considerable improvement in the encrypted signal. While static image encryption exhibits parameter tolerances within about +/-10% for uniform optical beams, profiled beams reduce the tolerance to less than 1%, thereby vastly improving both the overall security of the transmitted information as well as the quality of the image retrieval.

  11. Development of an on-line state estimator for fed-batch filamentous fungal fermentations

    DEFF Research Database (Denmark)

    Mears, Lisa; Stocks, Stuart M.; Albæk, Mads O.

    Bioprocesses can be challenging to model due to complex and non-linear process dynamics [1]. In addition there is a lack of robust, on-line sensors for key parameters of interest in the field, such as substrate, product and biomass concentration [2]. These factors lead to limitations in the ability...... to monitor and control bioprocess systems. There is therefore an interest in state estimation, in order to model these key process states based on available on-line measurements [1]. This work discusses the application of a first principle model to pilot scale filamentous fungal fermentation systems operated...... pressure [4], [5]. This stoichiometric-based coupled process model is successfully applied on-line as a state estimator in order to predict the biomass and product concentration, from robust, available on-line measurements. Such state estimators will be valuable as part of control strategy development...

  12. On-Line Monitoring of Fermentation Processes by Near Infrared and Fluorescence Spectroscopy

    DEFF Research Database (Denmark)

    Svendsen, Carina

    Monitoring and control of fermentation processes is important to ensure high product yield, product quality and product consistency. More knowledge on on-line analytical techniques such as near infrared and fluorescence spectroscopy is desired in the fermentation industry to increase the efficiency...... of on-line monitoring systems. The primary aim of this thesis is to elucidate and explore the dynamics in fermentation processes by spectroscopy. Though a number of successful on-line lab-scale monitoring systems have been reported, it seems that several challenges are still met, which limits the number...... for on-line monitoring if corrections or preventive measures during the quantification are carried out. The findings presented in this thesis have enabled the possibility of obtaining a better process understanding and to ease monitoring and controlling of fermentation processes....

  13. Using a strengths model to build an on-line nursing education program.

    Science.gov (United States)

    Wieck, K Lynn; Alfred, Danita; Haas, Barbara K; Yarbrough, Susan

    2014-01-01

    The on-line environment is the new frontier for academia struggling to define its place in the evolving economy. A concern is how to engage students who maximize their on-line experience and graduate in a timely manner. A strengths model was used as the basis for development of an on-line doctoral nursing program. Upon entering the program, students were given a strengths assessment that focused both students and faculty on the positive attributes students were bringing to their doctoral studies. A positive feedback methodology using on-line discussions in each course was used to support the identified strengths. The optimal picture of a successful entering doctoral student appears to be a person whose top five strengths are learner, achiever, input, connectedness and responsibility. A strengths model promotes a positive learning environment and supports a teacher-learner dynamic where faculty members are encouraged to focus on the students' strengths rather than their challenges.

  14. Aprender a innovar: una experiencia on line

    Directory of Open Access Journals (Sweden)

    Joaquín MORENO MARCHAL

    2014-11-01

    Full Text Available La creatividad y la innovación se han convertido en recursos clave en la denominada sociedad del conocimiento, que bien podría ser también llamada sociedad de la innovación. Pero innovar es una actividad compleja, que integra la aplicación de múltiples capacidades, el pensamiento divergente y convergente, la gestión de equipos humanos, la comunicación. Ahora bien, a innovar se puede, y se debe, aprender. Aprender a innovar es un reto y también una obligación para el conjunto del sistema educativo en todos sus niveles. Partiendo de estas consideraciones este trabajo expone una experiencia de aprendizaje de la creatividad y de la innovación a través de un curso totalmente on line basado en la plataforma MOODLE, en el marco del Programa de Formación Permanente de la Universidad de Cádiz. Se presenta un modelo del proceso de innovación, denominado CREALAB, de elaboración propia. Este modelo se ha utilizado como base del proceso de aprendizaje de la creatividad y de la innovación y en el diseño del curso, está organizado en torno a actividades y tiene un carácter iterativo y realimentado. Se presentan además el conjunto del diseño metodológico y los resultados obtenidos en las dos ediciones celebradas hasta el momento. El diseño del curso totalmente on line y los resultados alcanzados permiten estimar un alto potencial de aplicación, tanto a nivel personal como a nivel organizacional.

  15. On-line chemical composition analyzer development

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, M.J.; Garrison, A.A.; Muly, E.C.; Moore, C.F.

    1992-02-01

    The energy consumed in distillation processes in the United States represents nearly three percent of the total national energy consumption. If effective control of distillation columns can be accomplished, it has been estimated that it would result in a reduction in the national energy consumption of 0.3%. Real-time control based on mixture composition could achieve these savings. However, the major distillation processes represent diverse applications and at present there does not exist a proven on-line chemical composition sensor technology which can be used to control these diverse processes in real-time. This report presents a summary of the findings of the second phase of a three phase effort undertaken to develop an on-line real-time measurement and control system utilizing Raman spectroscopy. A prototype instrument system has been constructed utilizing a Perkin Elmer 1700 Spectrometer, a diode pumped YAG laser, two three axis positioning systems, a process sample cell land a personal computer. This system has been successfully tested using industrially supplied process samples to establish its performance. Also, continued application development was undertaken during this Phase of the program using both the spontaneous Raman and Surface-enhanced Raman modes of operation. The study was performed for the US Department of Energy, Office of Industrial Technologies, whose mission is to conduct cost-shared R D for new high-risk, high-payoff industrial energy conservation technologies. Although this document contains references to individual manufacturers and their products, the opinions expressed on the products reported do not necessarily reflect the position of the Department of Energy.

  16. SecurID

    CERN Document Server

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  17. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  18. On-line blind separation of non-stationary signals

    Directory of Open Access Journals (Sweden)

    Todorović-Zarkula Slavica

    2005-01-01

    Full Text Available This paper addresses the problem of blind separation of non-stationary signals. We introduce an on-line separating algorithm for estimation of independent source signals using the assumption of non-stationary of sources. As a separating model, we apply a self-organizing neural network with lateral connections, and define a contrast function based on correlation of the network outputs. A separating algorithm for adaptation of the network weights is derived using the state-space model of the network dynamics, and the extended Kalman filter. Simulation results obtained in blind separation of artificial and real-world signals from their artificial mixtures have shown that separating algorithm based on the extended Kalman filter outperforms stochastic gradient based algorithm both in convergence speed and estimation accuracy.

  19. Research of on-line monitoring method for insulation condition of power transformer bushing

    Science.gov (United States)

    Xia, Jiuyun; Qian, Zheng; Yu, Hao; Yao, Junda

    2016-01-01

    The power transformer is the key equipment of the power system; its insulation condition will directly influence the security and reliability of the power system. Thus, the on-line monitoring of power transformer is urgently required in order to guarantee the normal operation of the power system. Moreover, the dielectric loss factor is a significant parameter reflecting the condition of transformer bushing, so the on-line measurement of dielectric loss factor is really important. In this paper, the phase-to-phase comparison method is selected as the on-line monitoring method based on the overall analysis and discussion of the existing on-line monitoring methods. At first, the harmonic analysis method is utilized to calculate the dielectric loss of each phase of the three-phase transformer bushing, and then the differences of dielectric loss between every two phases are calculated and analyzed. So the insulation condition of each bushing could be achieved based on the careful analysis of different phase-to-phase dielectric loss. The simulation results of phase-to-phase comparison method are carried out in this paper, and the validity is verified. At last, this method is utilized in an actual equipment of on-line monitoring.

  20. Identification of Variables and Factors Impacting Consumer Behavior in On-line Shopping in India: An Empirical Study

    Science.gov (United States)

    Chhikara, Sudesh

    On-line shopping is a recent phenomenon in the field of E-Business and is definitely going to be the future of shopping in the world. Most of the companies are running their on-line portals to sell their products/services. Though online shopping is very common outside India, its growth in Indian Market, which is a large and strategic consumer market, is still not in line with the global market. The potential growth of on-line shopping has triggered the idea of conducting a study on on-line shopping in India. The present research paper has used exploratory study to depict and highlight the various categories of factors and variables impacting the behavior of consumers towards on-line shopping in India. The data was collected through in-depth interviews on a sample of 41 respondents from Delhi, Mumbai, Chennai and Bangalore. The results of the study show that on-line shopping in India is basically impacted by five categories of factors like demographics factor, Psychographics factor, Online shopping feature and policies, Technological factor, Security factor. The results of the study are used to present a comprehensive model of on-line shopping which could be further used by the researchers and practitioners for conducting future studies in the similar area. A brief operational definition of all the factors and variables impacting on-line shopping in India is also described. And finally practical implications of the study are also elucidated.

  1. 区域旅游生态安全的动态仿真模拟%Dynamic Simulation of Regional Ecological Security of Tourism

    Institute of Scientific and Technical Information of China (English)

    武春友; 郭玲玲; 于惊涛

    2013-01-01

    生态系统的安全是区域旅游业可持续发展的前提与基础.旅游业发展所引起的环境问题威胁着生态系统的安全,而不安全的生态系统也会影响旅游业的可持续发展.运用系统动力学理论与方法,分析区域旅游生态安全系统中各要素的因果反馈关系,构建区域旅游生态安全系统的系统动力学模型,并以辽宁省旅游生态安全系统为例进行系统仿真,通过对模型中主要参数的调控,提出辽宁省旅游业发展的不同模式.最后通过分析,得出环境保护、旅游投资、政策法规与旅游工作人员素质是影响辽宁省旅游生态系统安全状态的主要因素.%Ecological security is the basis for sustainable development of regional tourism. Environmental problems caused by tourism development have threatened the security of ecosystem, while unsafe ecosystem will affect sustainable development of tourism as well. A system dynamics model, which can describe the causal feedback relationships of regional tourist ecological security system, was built by using system dynamics. On basis of system dynamics modeling and simulation, the different modes of tourism development are put forward through regulation and control of several key indexes. Results show that environmental protection, tourism investment, policies, regulations and tourism staff quality are the main influencing factors of ecological security of tourism in Liaoning Province.

  2. Influence of visualization on consumption during on-line shopping

    OpenAIRE

    Hictaler, Urška

    2013-01-01

    This diploma work studies the influence of visualization on consumption during on-line shopping. The first part of the thesis starts with key areas of visualization, consumption and on-line shopping. Visualization, areas of use, human perception and ways of product presentation in on-line shops are defined discussed first. Next, consumption, consumers and factors that influence their decisions and satisfaction are defined. The last topic in the first part of the thesis discusses on-line shopp...

  3. On-Line Learning: One Way to Bring People Together

    Science.gov (United States)

    Goff-Kfouri, Carol Ann

    2006-01-01

    The purpose of this study was to demonstrate the benefits of on-line learning for adult learners and to further demystify three common misconceptions concerning on-line learning: students certainly do receive support from their on-line professors, the professor is pro-active rather than passive, and students may be more motivated to learn than in…

  4. A Distributed System for Learning Programming On-Line

    Science.gov (United States)

    Verdu, Elena; Regueras, Luisa M.; Verdu, Maria J.; Leal, Jose P.; de Castro, Juan P.; Queiros, Ricardo

    2012-01-01

    Several Web-based on-line judges or on-line programming trainers have been developed in order to allow students to train their programming skills. However, their pedagogical functionalities in the learning of programming have not been clearly defined. EduJudge is a project which aims to integrate the "UVA On-line Judge", an existing…

  5. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  6. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  7. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  8. A Comparison Between a Dynamic and Static Approach to Asset Management Using CAPM Models on the Australian Securities Market

    Directory of Open Access Journals (Sweden)

    Dionigi Gerace

    2015-06-01

    Full Text Available Despite the capital asset pricing model being one of the most influential mod¬els in modern portfolio theory, it has also been a victim of criticism in numerous academic papers. Its assumptions which seem to be rather unre¬alistic, have caused many academics to improve the model by relaxing some of its restrictive statements. In this journal article, we compare the performance of an optimal portfolio of securities in the Australian securities market by constructing two theoretical portfolios; one using the capital asset pricing model which uses a single beta throughout a static investment horizon; and another, which allows the op¬timal portfolio to be rebalanced each week with an adjusted beta. The performance of the two theoretical portfolios is compared to determine the superior model. Overall, findings showed that due to rebalancing of the portfolio, the multiple period model was the superior model based on before and after transaction cost returns.

  9. SOL: INNOVACIÓN ON-LINE

    Directory of Open Access Journals (Sweden)

    Rubén Faúndez

    2007-11-01

    Full Text Available Las aplicaciones de simulación tienden a ser cada vez más cercanas a usuarios e industrias. Sin embargo, muchas de ellas no poseen ni la capacidad ni el conocimiento como para desarrollar internamente sus modelos de simulación. Por este motivo, y como una forma de apoyar la toma de decisiones basándose en modelos de simulación, se presenta la plataforma SOL (Simulación On Line. La metodología completa de trabajo, así como la interacción entre SOL, Empresa y Asesor, son presentadas. Su base de datos, los niveles de usuarios, sus funcionalidades, y la creación automatizada de información grafica y visual, también son explicadas. En el caso de aplicación, el uso de SOL para apoyar la toma de decisiones en una operación de movimiento de material, permite a los tomadores de decisión acceder a análisis robustos basados en información extraída de los modelos de simulación. SOL, al almacenar información, funcionar vía web, generar análisis automatizados y crear visualizaciones, permite cumplir con las expectativas de los usuarios respecto a una solución integral en simulación.

  10. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  11. Role of ANN in Secured Wireless Multicast Routing during Dynamic Channel Allocation for User Demanded Packet Optimality

    Directory of Open Access Journals (Sweden)

    Dr. B.S. Pradeep

    2011-09-01

    Full Text Available The application of Artificial Neural Network (ANNís to mobile Ad Hock Network for multicasting where the problem is to find an efficient route to transmit packets over many nodes in the network. For multicasting in MANETS which address the security and Quality of service (Q.O.S. issues on the utility database makes this area highly suitable for ANN implementation. ANN is able to learn the relationship among past, current, and future route discoveries of the different nodes in the mobility range. A wide variety of different ANN has been used for route discoveries in the few years resulting in a noticeable number of publications on the subject. This paper proposes effective and novel application of Artificial Neural Network to Secure Multicasting in MANETís with Supporting Nodes has gained a lot of attention for secure routing using an ANN model. The methodology considers selection of input Variables for the ANN, determination of the optimum number of neurons for the hidden Layer selection of Multicasting with supporting nodes routing function. The proposed ANN model uses the feed forward network using back propagation algorithms.

  12. PUMAS: The On-line journal of Math and Science Examples for Pre-College Education

    Science.gov (United States)

    Trainer, Melissa G.; Kahn, Ralph A.

    2015-11-01

    PUMAS - “Practical Uses of Math And Science” - is an on-line collection of brief examples showing how math and science topics taught in K-12 classes can be used in interesting settings, including every day life. The examples are written primarily by scientists, engineers, and other content experts having practical experience with the material. They are aimed mainly at classroom teachers to enrich their presentation of math and science topics. The goal of PUMAS is to capture, for the benefit of pre-college education, the flavor of the vast experience that working scientists have with interesting and practical uses of math and science. There are currently over 80 examples in the PUMAS collection, and they are organized by curriculum topics and tagged with relevant grade levels and curriculum topic benchmarks. The published examples cover a wide range of subject matter: from demonstrating why summer is hot, to describing the fluid dynamics of a lava lamp, to calculating the best age to collect Social Security Benefits. The examples are available to all interested parties via the PUMAS web site: http://pumas.nasa.gov/.We invite the community to participate in the PUMAS collection. We seek scientists and scientific thinkers to provide innovative examples of practical uses for teachers to use to enrich the classroom experience, and content experts to participate in peer-review. We also seek teachers to review examples for originality, accuracy of content, clarity of presentation, and grade-level appropriateness. Finally, we encourage teachers to mine this rich repository for real-world examples to demonstrate the value of math in science in everyday life.

  13. The Decoration Operator: A Foundation for On-Line Dimensional Data Integration

    DEFF Research Database (Denmark)

    Pedersen, Dennis; Pedersen, Torben Bach; Riis, Karsten

    2004-01-01

    The changing data requirements of today's dynamic business environments are not handled well by current On-Line Analytical Processing (OLAP) systems. Physically integrating unexpected, external data into OLAP cubes, i.e., the data warehousing approach, is a long and time-consuming process, making...

  14. A P2P approach to resource discovery in on-line monitoring of Grid workflows

    NARCIS (Netherlands)

    Łabno, B.; Bubak, M.; Baliś, B.

    2008-01-01

    On-line monitoring of Grid workflows is challenging since workflows are loosely coupled and highly dynamic. An efficient mechanism of automatic resource discovery is needed in order to discover new producers of workflow monitoring data fast. However, currently used Grid information systems are not s

  15. Algorithms for On-line Order Batching in an Order-Picking Warehouse

    OpenAIRE

    Sebastian Henn

    2009-01-01

    In manual order picking systems, order pickers walk or ride through a distribution warehouse in order to collect items required by (internal or external) customers. Order batching consists of combining these – indivisible – customer orders into picking orders. With respect to order batching, two problem types can be distinguished: In off-line (static) batching all customer orders are known in advance. In on-line (dynamic) batching customer orders become available dynamically over time. This r...

  16. Transmission grid security

    CERN Document Server

    Haarla, Liisa; Hirvonen, Ritva; Labeau, Pierre-Etienne

    2011-01-01

    In response to the growing importance of power system security and reliability, ""Transmission Grid Security"" proposes a systematic and probabilistic approach for transmission grid security analysis. The analysis presented uses probabilistic safety assessment (PSA) and takes into account the power system dynamics after severe faults. In the method shown in this book the power system states (stable, not stable, system breakdown, etc.) are connected with the substation reliability model. In this way it is possible to: estimate the system-wide consequences of grid faults; identify a chain of eve

  17. Introduction to network security

    CERN Document Server

    Jacobson, Douglas

    2008-01-01

    … Students can easily understand how things work thanks to the different figures/definitions … students can see the different steps taken to build a secure environment and avoid most of the usual mistakes. … A website (http://www.dougj.net/textbook) is provided to support the book, where the reader can find additional content, like instructor materials, slides to support the book, on-line tutorials, help to start the programming parts. It is not mandatory at all to understand the book, but it is a really nice addition. … the book is really well written, and easily understandable without lackin

  18. The financial crisis impact on the Romanian on-line advertising

    Directory of Open Access Journals (Sweden)

    Duguleană, L.

    2010-12-01

    Full Text Available The last trimester of 2008 brought a 4.4% GDP decrease for the Romanian economy. Due to the new financial constraints, Romanian companies started to look for ways to manage and promote their product efficiently. The World Wide Web became the place where products were relocated and on-line advertising proved to be a cheaper and faster way to access customers. This paper aims to analyze the dynamics of the Romanian web, the new challenges for site owners and the opportunities of today’s on-line marketing.

  19. Process Identification in On-line Optimizing Control, an Application to a Heat Pump

    Directory of Open Access Journals (Sweden)

    Morten C. Svensson

    1996-10-01

    Full Text Available The objective of this paper is to focus on on-line state and parameter estimation in connection with on-line model-based optimizing control of continuous processes. A nonlinear programming approach is used to estimate unmeasured state variables and parameters in systems modelled by nonlinear differential-algebraic equations. The nonlinear dynamic model is discretized by orthogonal collocation on finite elements, and the moving-horizon approach is used to reduce the dimension of the final optimization problem.

  20. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  1. Being Secure

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    As the world wrestles with challenges from nontraditional security threats, a new concept of security management is emerging Security has traditionally been seen as the means of defending a territory, primarily through the use of military power. However, as the world evolves through the process of globalization, so too does the concept of security. It now incorporates military, political, economic, societal and environmental issues, as well as the many links that bind them. Yet for most people in the wor...

  2. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  3. On-line Ciphers and the Hash-CBC Constructions

    DEFF Research Database (Denmark)

    Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde;

    2012-01-01

    of computationally AXU functions. HCBC1 is proven secure against chosen-plaintext attacks assuming that E is a PRP secure against chosen-plaintext attacks, while HCBC2 is proven secure against chosen-ciphertext attacks assuming that E is a PRP secure against chosen-ciphertext attacks....

  4. 一种面向普通用户的Android APP安全性动态分析方法研究%Research on the Security of APP Android Security Dynamic Analysis Method for Average Users

    Institute of Scientific and Technical Information of China (English)

    贾同彬; 蔡阳; 王跃武; 高能

    2015-01-01

    In this paper, a dynamic Android APP security evaluation method for average users is presented and a prototype based on this method is implemented. Firstly, a tailored Android system emulator AVD is implemented through introducing API calls monitoring codes in the Dalvik virtual machine of AVD. Secondly, with Python, we implemented an AVD control Script program. This program may take advantage of adb instructions and Monkey tool to load APP being tested on AVD and record test results. Finally, we implemented APP test service access interface in Web form.%文章设计了一种面向普通用户的Android APP安全性动态分析方法并实现了原型系统.首先,借助于具有API调用监测功能的扩展Dalvik虚拟机对Android系统模拟器AVD进行定制,实现Android APP运行行为的动态分析;然后,使用adb 和 Monkey工具,在通用服务平台上,完成对运行在AVD中的APP程序用户行为模拟测试;最后,基于Web方式,实现了检测服务的用户访问接口.

  5. DOE-EPRI On-Line Monitoring Implementation Guidelines

    Energy Technology Data Exchange (ETDEWEB)

    E. Davis, R. Bickford

    2003-01-02

    Industry and EPRI experience at several plants has shown on-line monitoring to be very effective in identifying out-of-calibration instrument channels or indications of equipment-degradation problems. The EPRI implementation project for on-line monitoring has demonstrated the feasability of on-line monitoring at several participating nuclear plants. The results have been very enouraging, and substantial progress is anticipated in the coming years.

  6. On-line detecting of transformer winding deformation based on parameter identification of leakage inductance

    Institute of Scientific and Technical Information of China (English)

    Hao Zhiguo; Zhang Baohui; Li Peng

    2007-01-01

    Transformers are required to demonstrate the ability to withstand short circuit currents. Over currents caused by short circuit can give rise to windings deformation. In this paper, a novel method is proposed to monitor the state of transformer windings, which is achieved through on-line detecting the leakage inductance of the windings. Specifically, the mathematical model is established for on-line identifying the leakage inductance of the windings by applying least square algorithm (LSA) to the equivalent circuit equations. The effect of measurement and model inaccuracy on the identification error is analyzed, and the corrected model is also given to decrease these adverse effect on the results. Finally, dynamic test is carried out to verify our method. The test results clearly show that our method is very accurate even under the fluctuation of load or power factor. Therefore, our method can be effectively used to on-line detect the windings deformation.

  7. Force-reflecting teleoperation of robots based on on-line correction of a virtual model

    Institute of Scientific and Technical Information of China (English)

    LIU Wei; SONG Aiguo; LI Huijun

    2007-01-01

    Virtual reality is an effective method to eliminate the influence of time delay.However,it depends on the precision of the virtual model.In this paper,we introduce a method that corrects the virtual model on-line to establish a more precise model.The geometric errors of the virtual model were corrected on-line by overlapping the graphics over the images and also by syncretizing the position and force information from the remote.Then the sliding average least squares (SALS)method was adopted to determine the mass,damp,and stiffness of the remote environment and use this information to amend the dynamic model of the environment.Experimental results demonstrate that the on-line correction method we proposed can effectively reduce the impact caused by time delay,and improve the operational performance of the teleoperation system.

  8. Poss On-line (Personalisation of Self-Service Solutions across On-line platforms)

    DEFF Research Database (Denmark)

    Nielsen, Janni; Nielsen, Lene; Jespersen, Mikkel

    2005-01-01

    The project on Personalisation of Self-service Solutions across On-line Platforms (POSS ON-LINE) focuses on users, clients, and self-service solutions. It is based on the understanding that clients and users are different and have different goals, and that self-service takes place in different co...... at the process of development. However, we lack methods to predict user behaviour without having to deal with huge amounts of data and data from both quantitative data as well as life world observations are required....... the client and the user. The system gathers data about the user, which enables the client to push information to the user. Personalisation enables graphic user interface design that is personalised and relevant to the individual user and invites the user to get access to information with less strain....... Personalisation of self-service solutions is promising and IT companies are experiencing an increase in the clients' demands. At the same time the development of solutions moves within a shorter and shorter time span. Hence the process of innovations is paced and there is an increasing need of new ways of looking...

  9. ON-LINE SELF-TESTING FOR MICRO-MACHINED GYROSCOPES

    Institute of Scientific and Technical Information of China (English)

    GAISSERAlexander; GAOZhong-yu; ZHANGRong; CHENZhi-yong; ZHOUBin

    2005-01-01

    An on line self-testing for Coriolis vibratory gyroscopes (CVGs) is realized according to a digital readout electronics for capacitive sensors and micro-machined angular rate sensors. By applying some additional signals to the micro machined structure, the actual noise performance (<0.1°/s) is not worsened. The running of the primary and the secondary oscillators of CVGs is verified by self-testing. Compared with other methods, the device needs not to check the functionality. In this new approach the on-line testing is conducted at any time without disturbing the normal operational mode. Based on the approach the performance of the micro machined gyroscope can be improved and a secure availability of the functionality of the micro-machined angular rate sensor is guaranteed. Furthermore, the error signal is generated when the sensor works incorrectly.

  10. First Field Experience of On-line Partial Discharge Monitoring of MV Cable Systems with location

    Energy Technology Data Exchange (ETDEWEB)

    Van der Wielen, P.; Steennis, F.

    2009-06-15

    A new measuring system is presented for the on-line monitoring and location of partial discharges (PDs) in medium-voltage power cables. The system uses two inductive sensors, each at one cable end. The measuring system is called PD-OL, which stands for PD detection Online with Location. A pulse injection system is used for the time synchronization of the data intake at both cable ends and for the on-line calibration. PD data is send via internet to the KEMA Control Center for interpretation and final presentation, made visible on a secured website for the network owners. This paper discusses the basics of PD-OL and a number of measurement results.

  11. Nonparametric modeling of US interest rate term structure dynamics and implications on the prices of derivative securities

    NARCIS (Netherlands)

    Jiang, GJ

    1998-01-01

    This paper develops a nonparametric model of interest rate term structure dynamics based an a spot rate process that permits only positive interest rates and a market price of interest rate risk that precludes arbitrage opportunities. Both the spot rate process and the market price of interest rate

  12. Nonparametric modeling of US interest rate term structure dynamics and implications on the prices of derivative securities

    NARCIS (Netherlands)

    Jiang, GJ

    1998-01-01

    This paper develops a nonparametric model of interest rate term structure dynamics based an a spot rate process that permits only positive interest rates and a market price of interest rate risk that precludes arbitrage opportunities. Both the spot rate process and the market price of interest rate

  13. 基于安全策略的动态加密技术研究%Research on dynamic encryption based on security policy

    Institute of Scientific and Technical Information of China (English)

    张伯雍; 何泾沙

    2016-01-01

    对数据进行加密是一种保证数据安全性的有效措施,但现有的数据加密方式一般是选定某种加密算法,用该加密算法对数据进行全文加密。而不同终端设备的性能存在很大差异,移动终端设备如智能手机受其体积限制,计算能力和能源供给都十分有限,难以承受全文加密的计算量和能源开销。因此提出了一种动态选择加密方法,动态的选择加密算法对部分数据进行加密,并在该方法的基础上提出了基于安全策略的数据加密传输方案。在保证较高安全强度前提下,降低了加密开销提高了加密效率。%Data encryption is an effective measure to ensure the data security. However, the traditional way is to choose an encryption algorithm, then using this algorithm to encrypt the whole data. There is a big difference in performance of different terminal devices. Mobile devices such as smart phone due to size restrictions, computing power and energy supply is very limited, cannot afford the full encryption computation and energy overhead. Therefore, this paper presents a dynamic selective encryption method. Dynamically select encryption algorithm to encrypt part of the data. And proposed a data encryption transmission scheme based on security policy on the basis of the method. Both to ensure a high security strength, while reducing the encryption overhead and improves the encryption efficiency.

  14. Remote Automatic Material On-Line Sensor

    Energy Technology Data Exchange (ETDEWEB)

    Magnuson, Erik

    2005-12-20

    Low cost NMR sensor for measuring moisture content of forest products. The Department of Energy (DOE) Industries of the Future (IOF) program seeks development and implementation of technologies that make industry more efficient--in particular, more energy-efficient. Quantum Magnetics, Inc. (QM), a wholly-owned subsidiary of GE Security, received an award under the program to investigate roles for low-cost Nuclear Magnetic Resonance (NMR) technology in furtherance of these goals. Most NMR systems are designed for high-resolution spectroscopy applications. These systems use intense magnetic fields produced by superconducting magnets that drive price and operating cost to levels beyond industry tolerance. At low magnetic fields, achievable at low cost, one loses the ability to obtain spectroscopic information. However, measuring the time constants associated with the NMR signal, called NMR relaxometry, gives indications of chemical and physical states of interest to process control and optimization. It was the purpose of this effort to investigate the technical and economic feasibility of using such low-field, low-cost NMR to monitor parameters enabling greater process efficiencies. The primary target industry identified in the Cooperative Development Agreement was the wood industry, where the moisture content of wood is a key process parameter from the time the cut tree enters a mill until the time it is delivered as pieces of lumber. Extracting the moisture is energy consuming, and improvements in drying efficiency stand to reduce costs and emissions substantially. QM designed and developed a new, low-cost NMR instrument suitable for inspecting lumber up to 3 inches by 12 inches in cross section, and other materials of similar size. Low cost is achieved via an inexpensive, permanent magnet and low-cost NMR spectrometer electronics. Laboratory testing demonstrated that the NMR system is capable of accurate ({+-} 0.5%) measurements of the moisture content of wood for

  15. Properties of on-line social systems

    Science.gov (United States)

    Grabowski, A.; Kruszewska, N.; Kosiński, R. A.

    2008-11-01

    We study properties of five different social systems: (i) internet society of friends consisting of over 106 people, (ii) social network consisting of 3 × 104 individuals, who interact in a large virtual world of Massive Multiplayer Online Role Playing Games (MMORPGs), (iii) over 106 users of music community website, (iv) over 5 × 106 users of gamers community server and (v) over 0.25 × 106 users of books admirer website. Individuals included in large social network form an Internet community and organize themselves in groups of different sizes. The destiny of those systems, as well as the method of creating of new connections, are different, however we found that the properties of these networks are very similar. We have found that the network components size distribution follow the power-law scaling form. In all five systems we have found interesting scaling laws concerning human dynamics. Our research has shown how long people are interested in a single task, how much time they devote to it and how fast they are making friends. It is surprising that the time evolution of an individual connectivity is very similar in each system.

  16. ON-LINE ELIMINATION OF OIL WHIP

    Institute of Scientific and Technical Information of China (English)

    Zheng Shuiying; Liu Shulian

    2005-01-01

    A new method to eliminate the oil whip online is put forward by use of passive electromagnetic damper. The damper works contactless and with DC current. Neither sensor nor closed loop control is needed. The dynamic equations of rotor-bearing system are built up by combining d'Alemdert principle with Rize way, and the nonlinear oil film forces based on unsteady short bearing model are coupled to system. Such nonlinear equations are numerically solved by Newmark integration method. The calculated results show that the bifurcation behavior of the system can be changed and the oil whip of the rotor may be well damped by external damping. The bifurcation diagrams also show that the subharmonic vibration amplitude decreases in motion and the speed at which the system losses its stability increases obviously by exerting external damping.Then experiments are carried out to demonstrate this phenomenon. It is observed that the complex trajectories of the journal motion are disappeared and the rotor-bearing system became stable when the power of passive electromagnetic damper is turned on. The experiments have good repeatability.

  17. Lithuanian energy security : annual review 2013-2014

    OpenAIRE

    2015-01-01

    The publication “Lithuanian Energy Security. Annual Review 2013– 2014” presents the problems of Lithuanian energy security, energy security research methods and methodology the application of which enables the determination of Lithuanian energy security level. The research is of interdisciplinary character – energy security problems integrate the aspects of energy, economics, politics and sociology. The dynamics of Lithuanian energy security level is covered and compared with the dynamics of ...

  18. ON-LINE PREEMPTIVE SCHEDULING ON UNIFORM MACHINES

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yuzhong; WANG Shouyang; Bo Chen; ZHANG Shuxia

    2001-01-01

    We address the problem of preemptively schedule on-line jobs on arbitrary muniformly related machines with the objective of minimizing the schedule length. We provide the first on-line algorithm for this general problem, and show that the algorithm being the speeds of the m machines.

  19. On-Line and Off-Line Assessment of Metacognition

    Science.gov (United States)

    Saraç, Seda; Karakelle, Sema

    2012-01-01

    The study investigates the interrelationships between different on-line and off-line measures for assessing metacognition. The participants were 47 fifth grade elementary students. Metacognition was assessed through two off-line and two on-line measures. The off-line measures consisted of a teacher rating scale and a self-report questionnaire. The…

  20. On-line optimal control of greenhouse crop cultivation.

    NARCIS (Netherlands)

    Straten, van G.

    1996-01-01

    Thus far, optimal control has primarily been investigated for seasonal crop growth optimization. On-line aspects have received much less attention. The decomposition between long term strategies and on-line control, however, is not trivial. Appreciable losses occur when set-points generated by seaso

  1. On-line optimal control of greenhouse crop cultivation.

    NARCIS (Netherlands)

    Straten, van G.

    1996-01-01

    Thus far, optimal control has primarily been investigated for seasonal crop growth optimization. On-line aspects have received much less attention. The decomposition between long term strategies and on-line control, however, is not trivial. Appreciable losses occur when set-points generated by seaso

  2. SECURITY MECHANISM FOR MANETS

    Directory of Open Access Journals (Sweden)

    YASIR ABDELGADIR MOHAMED

    2009-06-01

    Full Text Available Be short of well-defined networks boundaries, shared medium, collaborative services, and dynamic nature, all are representing some of the key characteristics that distinguish mobile ad hoc networks from the conventional ones. Besides, each node is a possible part of the essential support infrastructure, cooperate with each other to make basic communication services available. Forwarding packets or participating in routing process, either of each can directly affect the network security state. Nevertheless, ad hoc networks are suspectable to the same vulnerabilities and prone to the same types of failures as conventional networks. Even though immune-inspired approaches aren’t essentially new to the research domain, the percentage of applying immune features in solving security problems fluctuates. In this paper, security approach based on both immunity and multi-agent paradigm is presented. Distributability, second response, and self recovery, are the hallmarks of the proposed security model which put a consideration on high nodes mobility.

  3. Algorithms for semi on-line multiprocessor scheduling problems

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    In the classical multiprocessor scheduling problems, it is assumed that the problems are considered in off-line or on-line environment. But in practice, problems are often not really off-line or on-line but somehow in between. This means that, with respect to the on-line problem, some further information about the tasks is available, which allows the improvement of the performance of the best possible algorithms. Problems of this class are called semi on-line ones. The authors studied two semi on-line multiprocessor scheduling problems, in which, the total processing time of all tasks is known in advance, or all processing times lie in a given interval. They proposed approximation algorithms for minimizing the makespan and analyzed their performance guarantee. The algorithms improve the known results for 3 or more processor cases in the literature.

  4. Projections of 21st Century African Climate: Implications for African Savanna Fire Dynamics, Human Health and Food Security

    Science.gov (United States)

    Adegoke, J. O.

    2015-12-01

    Fire is a key agent of change in the African savannas, which are shaped through the complex interactions between trees, C4 grasses, rainfall, temperature, CO2 and fire. These fires and their emitted smoke can have numerous direct and indirect effects on the environment, water resources, air quality, and climate. For instance, veld fires in southern Africa cause large financial losses to agriculture, livestock production and forestry on an annual basis. This study contributes to our understanding of the implications of projected surface temperature evolution in Africa for fire risk, human health and agriculture over the coming decades. We use an ensemble of high-resolution regional climate model simulations of African climate for the 21st century. Regional dowscalings and recent global circulation model projections obtained for Africa indicate that African temperatures are likely to rise at 1.5 times the global rate of temperature increase in the tropics, and at almost twice the global rate of increase in the subtropics. Warming is projected to occur during the 21st century, with increases of 4-6 °C over the subtropics and 3-5 °C over the tropics plausible by the end of the century relative to present-day climate under the A2 (low mitigation) scenario. We explore the significance of the projected warming by documenting increases in projected high fire danger days and heat-wave days. General drying is projected across the continent, even for areas (e.g. tropical Africa) where an increase in rainfall is plausible. This is due to the drastic increases in temperature that are projected, which leads to drier soils (through enhanced evaporation) despite the rainfall increases. This will likely impact negatively on crop yield, particularly on the maize crop that is of crucial importance in terms of African food security.

  5. 基于危险源预控的煤矿网络动态安全体系研究%Research of Coal Mine Network Precontrol Dynamic Security System Based on Hazards

    Institute of Scientific and Technical Information of China (English)

    陈祥章

    2013-01-01

    网络动态安全系统的重要内容是加强煤矿安全生产管理,以防止煤矿事故的发生。所以,在网络动态安全系统工作中务必提高应对各种危险源的能力。在网络动态安全工作中还应加强制度上的规范管理,不断的提高网络动态安全系统设计水平,加强对现场的巡视和设备维护工作。文章结合煤矿开采环境,对网络动态安全系统在煤矿安全生产监督中的应用进行了分析。%The important content of online dynamic security system is to strengthen the coal mine safety production management, to prevent the occurrence of coal mine accidents. So, in the dynamic network security system work must improve the ability to cope with a variety of hazards. In dynamic network security work also should strengthen standard management system, continuously improve the level of online dynamic security system design, strengthen the patrol of the scene and are indispensable links such as equipment maintenance. The author combined with coal mining environment, the dynamic security of network system in coal mine production safety supervision and the application are analyzed, and desire to reference in the operation of the application.

  6. Diagnostics of the Enterprise Economic Security and the Role of Information and Communication in the Context of Sustainability of Dynamical Equilibrium, Operation and Development

    Directory of Open Access Journals (Sweden)

    Skrynkovskyy Ruslan M.

    2015-03-01

    Full Text Available In the scientific article a system for diagnostics of the enterprise economic security is developed. It has been determined that the main business indicators for diagnostics of the enterprise economic security are: the level of the enterprise financial stability (contains the indicator for the enterprise provision with its own funds, rate of independence, financial stability indicator, current assets to equity ratio, liquid ratio, absolute liquidity ratio, current liquidity ratio; level of the enterprise production activity (calculated on the output-capital ratio, capital-labor ratio, index of workforce productivity, quality indicators of fixed assets, production potential indicator, production profitability ratio, input-output coefficient; level of organizational and administrative activities of the enterprise (takes into account the ratio of administrative expenses to the rate of increase in production volume, rate of saving of the managerial apparatus, rate of information processing; level of employee loyalty to the enterprise (calculated on the rate of personnel turnover, rate of personnel continuity, indicator of employee satisfaction, personnel development indicator, education level of employees; level of scientific and technical and innovative activity of the enterprise (including index of profitability of innovations, profitability of expenditures on research and development works; level of investment activity of the enterprise (includes index of investment profitability, rate of investment activity, rate of return on investments, rate of investment in production; level of market reliability (calculated on index of return on sales, index of return on net assets, index of marketability, level of market research. It has been identified that an important role in the context of sustainability of dynamical equilibrium, operation and development of enterprises is played by information and communication.

  7. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  8. Security Engineering

    Science.gov (United States)

    2012-01-31

    attacks cannot be completely addressed by traditional perimeter security solutions [ Wulf and Jones, 2009], as they have been in the past. A new...the mainstay of the current cyber security solution space [ Wulf and Jones, 2009]. This has enabled the system engineering and security communities...Number: H98230-08-D-0171 DO 002 TO 002 RT 028 Report No. SERC-2012-TR-028 January 31, 2012 UNCLASSIFIED 37 W. A. Wulf and A. K. Jones, Reflections on cyber security, Science Magazine, vol. 326, 2009, pp. 943-944.

  9. Grid Security

    CERN Document Server

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  10. Use of the Riccatti Equation On-Line for Adaptively Controlling a CSTR Chemical Reactor.

    OpenAIRE

    Edwards, J B; Mohd Noor, S.B.

    1995-01-01

    An idealised nonlinear model of an isothermal continuous stirred-tank reactor (CSTR) is analysed and simulated for optimal control based on the continuous on-line recomputation of a Riccati Controller as proposed by Banks (1). The controller and resulting behaviour are derived analytically and confirmed to be optimal by derivation also via Dynamic Programming. For comparison purposes, the behaviour of the same model under linear proportional control (with feedforward compensation)is derived a...

  11. A novel approach to implementing digital policy management as an enabler for a dynamic secure information sharing in a cloud environment

    Science.gov (United States)

    Farroha, Bassam S.; Essman, Kristine R.; Farroha, Deborah L.; Cohen, Andy

    2011-06-01

    The traditional way of approaching the management and enforcement of information systems Policy in enterprise environments is to manually translate laws and regulations into a form that can be interpreted and enforced by enterprise devices. In other words we create system commands for routers, bridges, and firewalls to force data transfers and system access to comply with the current policies and approved rules in order to control access and protect private, sensitive, and classified information. As operational needs and threat levels change, the rules are modified to accommodate the required response. It then falls on System Administrators to manually change the configuration of the devices they manage to adapt their operations accordingly. As our user communities continue to rely more heavily on mission information, and the enterprise systems and networks that provide it, our enterprise needs to progress to more automated techniques that enable authorized managers to dynamically update and manage policies in digital formats. Automated management of access rules that control privileges for accessing secure information and enterprise resources, enabled by Digital Policy and other Enterprise Security Management (ESM) capabilities provides the means for system administrators to dynamically respond to changing user needs, threat postures and other environmental factors. With the increased popularity of virtual environments and advent of cloud enterprise services, IA management concepts need to be reexamined. Traditional ESM solutions may be subjected to new classes of threats as physical control of the assets that implement those services are relinquished to virtual environments. Additional operational factors such as invoking critical processing, controlling access to information during processing, ensuring adequate protection of transactions within virtual environments and executing ESM provisions are also affected. The paper describes the relationships among

  12. On-line Autonomous Learning Based on Leamerg Expectation

    Institute of Scientific and Technical Information of China (English)

    李利娜

    2008-01-01

    On-line autonomous learning of College English is one of the important reforms in colleges recently.This paper aims to explore the changes of teachers'role in the new on-line setting.The article first reviews the theoretical study of learner autonomy,then makes a practical investigation into the attitude and expectation learners have on teachers through a self-designed questionnaire,and explores that teachers should make an adjustment to their role orientation and changes their roles into motivators,evaluators and resources supphers in the new on-line setting.

  13. On-line Classical Guitar Course: Blogs for Music Education

    OpenAIRE

    José Luis Navarro; Gilles Lavigne; G. Guadalupe Martínez Salgado

    2009-01-01

    This article introduces an on-line course constructed by means of a blog. The tool was the main goal of a research project titled “Develop, Implementation and evaluation of a Hybrid Course Face to face-On Line for Teaching the Beginning to Play the Classical Guitar”. This work was a three steep project in which it was implemented, applied and evaluated. The on-line course was intended to prepare the students to learn the basic principles to start in classical music with the guitar. The result...

  14. Understanding on-line community: the affordances of virtual space

    Directory of Open Access Journals (Sweden)

    Karen Ruhleder

    2002-01-01

    Full Text Available Increasing numbers of on-line venues for learning are emerging as virtual communities become more accessible and commonplace. This paper looks at one particular virtual community, an on-line degree programme at the University of Illinois, Urbana-Champaign, which offers an M.S. in Library and Information Science (called LEEP. It draws on a framework presented by Mynatt, et al. (1998, which provides a lens for talking about on-line community as a set of affordances. This framework is applied to illustrate the interactions, artefacts, and expectations that shape this community.

  15. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  16. On Line Disaster Response Community: People as Sensors of High Magnitude Disasters Using Internet GIS

    Directory of Open Access Journals (Sweden)

    Kris Kodrich

    2008-05-01

    Full Text Available The Indian Ocean tsunami (2004 and Hurricane Katrina (2005 reveal the coming of age of the on-line disaster response community. Due to the integration of key geospatial technologies (remote sensing - RS, geographic information systems - GIS, global positioning systems – GPS and the Internet, on-line disaster response communities have grown. They include the traditional aspects of disaster preparedness, response, recovery, mitigation, and policy as facilitated by governmental agencies and relief response organizations. However, the contribution from the public via the Internet has changed significantly. The on-line disaster response community includes several key characteristics: the ability to donate money quickly and efficiently due to improved Internet security and reliable donation sites; a computer-savvy segment of the public that creates blogs, uploads pictures, and disseminates information – oftentimes faster than government agencies, and message boards to create interactive information exchange in seeking family members and identifying shelters. A critical and novel occurrence is the development of “people as sensors” - networks of government, NGOs, private companies, and the public - to build rapid response databases of the disaster area for various aspects of disaster relief and response using geospatial technologies. This paper examines these networks, their products, and their future potential.

  17. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  18. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  19. On-Line Trajectory Retargeting for Alternate Landing Sites Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Barron Associates, Inc. proposes to develop a novel on-line trajectory optimization approach for Reusable Launch Vehicles (RLVs) under failure scenarios, targeting...

  20. Dynamic hazard identification and evaluation techniques for regional airport safety and security%支线机场安全动态预警技术研究

    Institute of Scientific and Technical Information of China (English)

    许红军; 田俊改

    2011-01-01

    How to promote management ability of regional airport safety and security is the major problem which China regional airports will face in the future. In order to control the safety and security risk in regional airport operation, a series of dynamic risk early warning technology were put forward in this paper. Based on the safety and security risk management theory, a three dimensions hazard identification model was put forward. In this model,the hazards which the regional airports are facing could be identified by time, space and logistic dimension. Hazard identification in time dimension referred to analyze regional airport running process and identify the risk factor in these process. Hazard identification in spatial dimension refers to identify the risk factor in the spatial composition of regional airport. Hazard identification in the logical dimension was to establish management, personnel, equipment and environment hierarchical evaluation model by analyzing the risk factors in management, man, machine and media. By using this model, the hazards which the regional airports are facing could be identified more comprehensive. The multi-dimension characteristics of the risk were also introduced, such as the likehood, consequence,predictability and the controllability into regional airports risk analysis procedure. The multi-dimension risk assessment model could reflect the effect of risk response measures and give more systematic and comprehensively evaluation for the risk factor. By using these techniques, the hazards which the regional airport are facing could be identified comprehensively and dynamically, which will help improve the risk early warning technology for regional airport.%提升支线机场安全管理能力是中国支线机场未来发展面临的一个重大问题,为提高我国支线机场安全管理水平,本文基于系统动态的风险管理思想,针对支线机场安全风险发生随机、动态和系统的特点,结合支线机场安

  1. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  2. 基于动态强色散控制的光保密通信系统%Optical secure communication system based on dynamic strong dispersion control

    Institute of Scientific and Technical Information of China (English)

    蔡炬; 白秋剑

    2012-01-01

    提出一种全新的基于动态强色散控制原理的光保密通信方案.首先对基于动态强色散控制的保密通信原理进行阐述,根据给出的光保密通信系统结构原理图对整个系统构成及各部分功能进行了详细分析,然后搭建了一个高速仿真系统,对其可行性和系统性能进行了验证.最后展望了该方案在保密通信领域的应用前途.%A novel solution of optical secure communication system by using dynamic strong dispersion control is proposed. Its theoretical principle and system structure are presented firstly, and then its feasibility and performance are verified by simulation.

  3. ON-LINE SCHEDULING WITH REJECTION ON IDENTICAL PARALLEL MACHINES

    Institute of Scientific and Technical Information of China (English)

    Cuixia MIAO; Yuzhong ZHANG

    2006-01-01

    In this paper, we consider the on-line scheduling of unit time jobs with rejection on m identical parallel machines. The objective is to minimize the total completion time of the accepted jobs plus the total penalty of the rejected jobs. We give an on-line algorithm for the problem with competitive ratio 1/2(2 + √3) ≈ 1.86602.

  4. Directions for Future Research in On-line Distance Education

    OpenAIRE

    Alaa SADIK

    2015-01-01

    Although institutions have invested much in developing on-line environments or using already established commercial platforms, only few studies have been conducted to investigate the effectiveness of on-line courses based on empirical data (Jung and Rha, 2000). A review of the literature conducted in this study showed that most of online learning studies investigated the effectiveness of Web-based interaction or Internet conferencing on learning, not the entire learning environment. Even in t...

  5. An On-line Ferrograph for Monitoring Machine Wear

    Institute of Scientific and Technical Information of China (English)

    L(U) Xiao-jun; JING Min-qing; XIE You-bai

    2005-01-01

    In order to improve an on-line ferrograph, this paper simulates a three dimensional magnetic field distribution of an electromagnet, builds a sinking motion model of a wear particle, and investigates the motion law of wear particles under two different conditions. Both numeric results and experimental results show that the on-line ferrograph is capable of monitoring machine wear conditions by measuring the concentration and size distribution of wear particles in lubricating oil.

  6. Secure Objectives for School Security

    Science.gov (United States)

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  7. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  8. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  9. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  10. Wireless Security

    CERN Document Server

    Osterhage, Wolfgang

    2011-01-01

    In the wake of the growing use of wireless communications, new types of security risks have evolved. Wireless Security covers the major topic of wireless communications with relevance both to organizations and private users. The technological background of these applications and protocols is laid out and presented in detail. Special emphasis is placed on the IEEE 802.11x-Standards that have been introduced for WLAN technology. Other technologies covered besides WLAN include: mobile phones, bluetooth and infrared. In each chapter a major part is devoted to security risks and provisions includin

  11. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  12. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  13. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  14. A reconfigurable on-line learning spiking neuromorphic processor comprising 256 neurons and 128K synapses.

    Science.gov (United States)

    Qiao, Ning; Mostafa, Hesham; Corradi, Federico; Osswald, Marc; Stefanini, Fabio; Sumislawska, Dora; Indiveri, Giacomo

    2015-01-01

    Implementing compact, low-power artificial neural processing systems with real-time on-line learning abilities is still an open challenge. In this paper we present a full-custom mixed-signal VLSI device with neuromorphic learning circuits that emulate the biophysics of real spiking neurons and dynamic synapses for exploring the properties of computational neuroscience models and for building brain-inspired computing systems. The proposed architecture allows the on-chip configuration of a wide range of network connectivities, including recurrent and deep networks, with short-term and long-term plasticity. The device comprises 128 K analog synapse and 256 neuron circuits with biologically plausible dynamics and bi-stable spike-based plasticity mechanisms that endow it with on-line learning abilities. In addition to the analog circuits, the device comprises also asynchronous digital logic circuits for setting different synapse and neuron properties as well as different network configurations. This prototype device, fabricated using a 180 nm 1P6M CMOS process, occupies an area of 51.4 mm(2), and consumes approximately 4 mW for typical experiments, for example involving attractor networks. Here we describe the details of the overall architecture and of the individual circuits and present experimental results that showcase its potential. By supporting a wide range of cortical-like computational modules comprising plasticity mechanisms, this device will enable the realization of intelligent autonomous systems with on-line learning capabilities.

  15. Object-Oriented Control System Design Using On-Line Training of Artificial Neural Networks

    Science.gov (United States)

    Rubaai, Ahmed

    1997-01-01

    This report deals with the object-oriented model development of a neuro-controller design for permanent magnet (PM) dc motor drives. The system under study is described as a collection of interacting objects. Each object module describes the object behaviors, called methods. The characteristics of the object are included in its variables. The knowledge of the object exists within its variables, and the performance is determined by its methods. This structure maps well to the real world objects that comprise the system being modeled. A dynamic learning architecture that possesses the capabilities of simultaneous on-line identification and control is incorporated to enforce constraints on connections and control the dynamics of the motor. The control action is implemented "on-line", in "real time" in such a way that the predicted trajectory follows a specified reference model. A design example of controlling a PM dc motor drive on-line shows the effectiveness of the design tool. This will therefore be very useful in aerospace applications. It is expected to provide an innovative and noval software model for the rocket engine numerical simulator executive.

  16. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  17. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  18. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  19. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  20. Energy Security

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With an increasing number of countries becoming industrialized, energy, the so-called blood of modern economies, is becoming increasingly important Energy security has become an important factor that directly influences world economic stability and international relations. In an article posted on People's Daily Online, Liu Jianfei, professor at the International Strategic Research Center of the Party School of the Central Committee of the Communist Party of China, shares his opinions on energy security.

  1. Citizen Security

    OpenAIRE

    Beatriz Abizanda

    2011-01-01

    This is a presentation for the Caribbean Regional ConSoc Retreat held on June 16, 2011 in Kingston, Jamaica. This document outlines crime and violence as major roadblocks to development in the Caribbean; citing statistics and providing examples of the economic costs to the region. This presentation then goes on to describe the IDB's strategy with regard to citizen security and highlights IDB Funded security programs in the region. The presentation also identifies Civil Society as a potentiall...

  2. Security Management Model in Cloud Computing Environment

    OpenAIRE

    2016-01-01

    In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine de...

  3. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  4. On Line Service Composition in the Integrated Clinical Environment for eHealth and Medical Systems.

    Science.gov (United States)

    García-Valls, Marisol; Touahria, Imad Eddine

    2017-06-08

    Medical and eHealth systems are progressively realized in the context of standardized architectures that support safety and ease the integration of the heterogeneous (and often proprietary) medical devices and sensors. The Integrated Clinical Environment (ICE) architecture appeared recently with the goal of becoming a common framework for defining the structure of the medical applications as concerns the safe integration of medical devices and sensors. ICE is simply a high level architecture that defines the functional blocks that should be part of a medical system to support interoperability. As a result, the underlying communication backbone is broadly undefined as concerns the enabling software technology (including the middleware) and associated algorithms that meet the ICE requirements of the flexible integration of medical devices and services. Supporting the on line composition of services in a medical system is also not part of ICE; however, supporting this behavior would enable flexible orchestration of functions (e.g., addition and/or removal of services and medical equipment) on the fly. iLandis one of the few software technologies that supports on line service composition and reconfiguration, ensuring time-bounded transitions across different service orchestrations; it supports the design, deployment and on line reconfiguration of applications, which this paper applies to service-based eHealth domains. This paper designs the integration between ICE architecture and iLand middleware to enhance the capabilities of ICE with on line service composition and the time-bounded reconfiguration of medical systems based on distributed services. A prototype implementation of a service-based eHealth system for the remote monitoring of patients is described; it validates the enhanced capacity of ICE to support dynamic reconfiguration of the application services. Results show that the temporal cost of the on line reconfiguration of the eHealth application is bounded

  5. Sport Management Taught On-Line: A Discussion

    Directory of Open Access Journals (Sweden)

    William F. Stier Jr

    2009-01-01

    Full Text Available An introduction to the world of on-line courses (distance education/learning is presented. In addition, the world of on-line learning, as it pertains to sport management, is examined within the framework of (a pedagogy, (b finances,(c assessment, and (d choosing to transition from the traditional classroom to on-line learning. Pertinent points relative to each of the four categories are presented from the literature. In an effort to stimulate thought and discussion to the subject of on-line learning for sport management programs/courses the authors provide their reactions to the literature points by presenting their comments/reactions from a sport management perspective. Sport management professors and administrators are encouraged to critically examine the feasibility of such on-line courses (distance education/learning within their own curricula while maintaining an appropriate framework revolving around sound theoretical instructional strategies, methods as well as appropriate use of instructional tools, including but not limited to, computersand the WWW.

  6. Modeling a multivariable reactor and on-line model predictive control.

    Science.gov (United States)

    Yu, D W; Yu, D L

    2005-10-01

    A nonlinear first principle model is developed for a laboratory-scaled multivariable chemical reactor rig in this paper and the on-line model predictive control (MPC) is implemented to the rig. The reactor has three variables-temperature, pH, and dissolved oxygen with nonlinear dynamics-and is therefore used as a pilot system for the biochemical industry. A nonlinear discrete-time model is derived for each of the three output variables and their model parameters are estimated from the real data using an adaptive optimization method. The developed model is used in a nonlinear MPC scheme. An accurate multistep-ahead prediction is obtained for MPC, where the extended Kalman filter is used to estimate system unknown states. The on-line control is implemented and a satisfactory tracking performance is achieved. The MPC is compared with three decentralized PID controllers and the advantage of the nonlinear MPC over the PID is clearly shown.

  7. Time-Varying FOPDT Modeling and On-line Parameter Identification

    DEFF Research Database (Denmark)

    Yang, Zhenyu; Sun, Zhen

    2013-01-01

    A type of Time-Varying First-Order Plus Dead-Time (TV-FOPDT) model is extended from SISO format into a MISO version by explicitly taking the disturbance input into consideration. Correspondingly, a set of on-line parameter identification algorithms oriented to MISO TV-FOPDT model are proposed bas...... are firstly illustrated through a numerical example, and then applied to investigate transient superheat dynamic modeling in a supermarket refrigeration system....... on the Mixed-Integer-Nonlinear Programming, Least-Mean-Square and sliding window techniques. The proposed approaches can simultaneously estimate the time-dependent system parameters, as well as the unknown disturbance input if it is the case, in an on-line manner. The proposed concepts and algorithms...

  8. On-line least squares support vector machine algorithm in gas prediction

    Institute of Scientific and Technical Information of China (English)

    ZHAO Xiao-hu; WANG Gang; ZHAO Ke-ke; TAN De-jian

    2009-01-01

    Traditional coal mine safety prediction methods are off-line and do not have dynamic prediction functions. The Support Vector Machine (SVM) is a new machine learning algorithm that has excellent properties. The least squares support vector machine (LS-SVM) algorithm is an improved algorithm of SVM. But the common LS-SVM algorithm, used directly in safety predictions, has some problems. We have first studied gas prediction problems and the basic theory of LS-SVM. Given these problems, we have investigated the affect of the time factor about safety prediction and present an on-line prediction algorithm, based on LS-SVM. Finally, given our observed data, we used the on-line algorithm to predict gas emissions and used other related algorithm to com- pare its performance. The simulation results have verified the validity of the new algorithm.

  9. On-Line Tracking Controller for Brushless DC Motor Drives Using Artificial Neural Networks

    Science.gov (United States)

    Rubaai, Ahmed

    1996-01-01

    A real-time control architecture is developed for time-varying nonlinear brushless dc motors operating in a high performance drives environment. The developed control architecture possesses the capabilities of simultaneous on-line identification and control. The dynamics of the motor are modeled on-line and controlled using an artificial neural network, as the system runs. The control architecture combines the experience and dependability of adaptive tracking systems with potential and promise of the neural computing technology. The sensitivity of real-time controller to parametric changes that occur during training is investigated. Such changes are usually manifested by rapid changes in the load of the brushless motor drives. This sudden change in the external load is simulated for the sigmoidal and sinusoidal reference tracks. The ability of the neuro-controller to maintain reasonable tracking accuracy in the presence of external noise is also verified for a number of desired reference trajectories.

  10. Probabilistic Forecasting for On-line Operation of Urban Drainage Systems

    DEFF Research Database (Denmark)

    Löwe, Roland

    -box model approach. Building on previous work concerning the development of conceptual stochastic rainfall-runoff model structures, we - investigate approaches for the calibration of model parameters that tune the models for multistep predictions, - develop an approach for generating probabilistic multistep......This thesis deals with the generation of probabilistic forecasts in urban hydrology. In particular, we focus on the case of runoff forecasting for real-time control (RTC) on horizons of up to two hours. For the generation of probabilistic on-line runoff forecasts, we apply the stochastic grey...... predictions of runoff volume in an on-line setting, - develop a new approach for dynamically modelling runoff forecast uncertainty. We investigate how rainfall inputs can be optimally combined for runoff forecasting with stochastic grey-box models and what effect different types of radar rainfall measurements...

  11. Adaptive control based on an on-line parameter estimation of an upper limb exoskeleton.

    Science.gov (United States)

    Riani, Akram; Madani, Tarek; Hadri, Abdelhafid El; Benallegue, Abdelaziz

    2017-07-01

    This paper presents an adaptive control strategy for an upper-limb exoskeleton based on an on-line dynamic parameter estimator. The objective is to improve the control performance of this system that plays a critical role in assisting patients for shoulder, elbow and wrist joint movements. In general, the dynamic parameters of the human limb are unknown and differ from a person to another, which degrade the performances of the exoskeleton-human control system. For this reason, the proposed control scheme contains a supplementary loop based on a new efficient on-line estimator of the dynamic parameters. Indeed, the latter is acting upon the parameter adaptation of the controller to ensure the performances of the system in the presence of parameter uncertainties and perturbations. The exoskeleton used in this work is presented and a physical model of the exoskeleton interacting with a 7 Degree of Freedom (DoF) upper limb model is generated using the SimMechanics library of MatLab/Simulink. To illustrate the effectiveness of the proposed approach, an example of passive rehabilitation movements is performed using multi-body dynamic simulation. The aims is to maneuver the exoskeleton that drive the upper limb to track desired trajectories in the case of the passive arm movements.

  12. On-line Geoscience Data Resources for Today's Undergraduates

    Science.gov (United States)

    Goodwillie, A. M.; Ryan, W.; Carbotte, S.; Melkonian, A.; Coplan, J.; Arko, R.; O'Hara, S.; Ferrini, V.; Leung, A.; Bonckzowski, J.

    2008-12-01

    Broadening the experience of undergraduates can be achieved by enabling free, unrestricted and convenient access to real scientific data. With funding from the U.S. National Science Foundation, the Marine Geoscience Data System (MGDS) (http://www.marine-geo.org/) serves as the integrated data portal for various NSF-funded projects and provides free public access and preservation to a wide variety of marine and terrestrial data including rock, fluid, biology and sediment samples information, underway geophysical data and multibeam bathymetry, water column and multi-channel seismics data. Users can easily view the locations of cruise tracks, sample and station locations against a backdrop of a multi-resolution global digital elevation model. A Search For Data web page rapidly extracts data holdings from the database and can be filtered on data and device type, field program ID, investigator name, geographical and date bounds. The data access experience is boosted by the MGDS use of standardised OGC-compliant Web Services to support uniform programmatic interfaces. GeoMapApp (http://www.geomapapp.org/), a free MGDS data visualization tool, supports map-based dynamic exploration of a broad suite of geosciences data. Built-in land and marine data sets include tectonic plate boundary compilations, DSDP/ODP core logs, earthquake events, seafloor photos, and submersible dive tracks. Seamless links take users to data held by external partner repositories including PetDB, UNAVCO, IRIS and NGDC. Users can generate custom maps and grids and import their own data sets and grids. A set of short, video-style on-line tutorials familiarises users step- by-step with GeoMapApp functionality (http://www.geomapapp.org/tutorials/). Virtual Ocean (http://www.virtualocean.org/) combines the functionality of GeoMapApp with a 3-D earth browser built using the NASA WorldWind API for a powerful new data resource. MGDS education involvement (http://www.marine-geo.org/, go to Education tab

  13. Roadmap on optical security

    Science.gov (United States)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  14. On-line Payment System Survey – eCash

    Directory of Open Access Journals (Sweden)

    Marius Popa

    2009-12-01

    Full Text Available The paper presents the main aspects regarding an on-line payment system. Some characteristics of such system are presented and an existing system is analyzed. On its fundamental sense, the electronic commerce is a concept that represents the purchase and sale process or exchange of products, services, information, using o computer network, inclusively the Internet. In the most part of the cases, the electronic commerce imply on-line payments that lead to creation of some kinds of electronic money and some specific payment systems. There are described the some electronic payment mechanisms and the architecture and the functions of the on-line payment system E-Cash are depicted.

  15. On-line laser spectroscopy with thermal atomic beams

    CERN Document Server

    Thibault, C; De Saint-Simon, M; Duong, H T; Guimbal, P; Huber, G; Jacquinot, P; Juncar, P; Klapisch, Robert; Liberman, S; Pesnelle, A; Pillet, P; Pinard, J; Serre, J M; Touchard, F; Vialle, J L

    1981-01-01

    On-line high resolution laser spectroscopy experiments have been performed in which the light from a CW tunable dye laser interacts at right angles with a thermal atomic beam. /sup 76-98/Rb, /sup 118-145 /Cs and /sup 208-213/Fr have been studied using the ionic beam delivered by the ISOLDE on-line mass separator at CERN while /sup 30-31/Na and /sup 38-47/K have been studied by setting the apparatus directly on-line with the PS 20 GeV proton beam. The principle of the method is briefly explained and some results concerning nuclear structure are given. The hyperfine structure, spins and isotope shifts of the alkali isotopes and isomers are measured. (8 refs).

  16. Strengthening weak ties through on-line gaming

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Razmerita, Liana Virginia; Kirchner, Kathrin

    On-line gaming became widespread in the last couple of years. The aim of the research presented in the paper is to figure out to what extent does game playing helps to strengthen weak ties and what additional factors influence this process. The approach is rather exploratory – some factors...... are grounded in theory, some are new. These factors are age, gender, place of origin, number of their Facebook connections (friends in Facebook terminology), the amount of time they are on Facebook, the amount of time they keep the Facebook site open, the amount of time they play on-line games, and the reasons...... for starting to play on-line games. Regarding the latter, we chose to focus only on escapist reasons....

  17. On-Line Voltage Stability Assessment based on PMU Measurements

    DEFF Research Database (Denmark)

    Garcia-Valle, Rodrigo; P. Da Silva, Luiz C.; Nielsen, Arne Hejde

    2009-01-01

    through statistic analysis. During the off-line analysis, a memory of high-risk situations following a pre-defined voltage stability criterion is obtained. Thereafter, basic statistics analyses are applied resulting in the definition of voltage regions. During on-line operation, voltage magnitudes......This paper presents a method for on-line monitoring of risk voltage collapse based on synchronised phasor measurement. As there is no room for intensive computation and analysis in real-time, the method is based on the combination of off-line computation and on-line monitoring, which are correlated...... of critical buses obtained by phasor measurements are monitored in relation to the risk regions. Comprehensive studies demonstrate that the proposed method could assist operators to avoid voltage collapse events, by taking preventive or emergency actions....

  18. On-line tribochemical strengthening of gear surface

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    It has been found that under favorable friction conditions some antiwear elements inlubricating additives can permeate into subsurface of metal which can strengthens the friction sur-faces and improves anti-wear capacity of frication pairs. It is in many ways similar to chemical heattreatment. A new concept, technology of on-line strengthening, was logically put forward. Based oncurrent gear surface treatment technology, the on-line strengthen of gear surface is proposed. Itsdesign method is established. Based on it, the on-line strengthen of gear is achieved on CL-100gear test machine. A new method is put forward for strengthen treatment of gear surface. Andthree kinds of surface film were suggested.

  19. Why do People Stop Playing On-Line Games?

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Razmerita, Liana

    2012-01-01

    The recent initial public offering of shares of Zynga, probably the most important on-line game provider, drew interest of potential investors but also of general public to their business model. What the most interested people learned so far is that if Zynga had not changed their accounting...... practice, they would be in red numbers for several months already. This is most likely caused by people stopping to play their games. This paper provides an estimate of what proportion of people, who played on-line games, already stopped playing them. Additionally, it analyzed the reasons why people...

  20. On-Line Generation of 3D-Waves

    DEFF Research Database (Denmark)

    Frigaard, Peter

    1992-01-01

    The paper describes the technique of filtering white noise for on-line generation of 3D-waves on a small computer in the laboratory. The wave generation package is implemented and tested in the 3D-wave basin at the University of Aalborg.......The paper describes the technique of filtering white noise for on-line generation of 3D-waves on a small computer in the laboratory. The wave generation package is implemented and tested in the 3D-wave basin at the University of Aalborg....

  1. The User-friendly On-Line Diffusion Chamber

    CERN Document Server

    Aviles Acosta, Jaime

    2015-01-01

    The On-Line Diffusion Chamber is a stand-alone apparatus built to carry out short-live radiotracer diffusion studies. The availability of the on-demand production of isotopes in the ISOLDE facility, and the design of the apparatus to streamline the implantation process, annealing treatment, ion gun ablation with a tape transport system, and radiation intensity measurement with a Ge gamma detector all in the same apparatus, gives the On-Line Diffusion Chamber a unique ability to studies with short-lived radioisotopes or isomer states that are not possible in any other facility in the world.

  2. On-line measurement of heat of combustion

    Science.gov (United States)

    Chaturvedi, S. K.; Chegini, H.

    1988-01-01

    An experimental method for an on-line measurement of heat of combustion of a gaseous hydrocarbon fuel mixture of unknown composition is developed. It involves combustion of a test gas with a known quantity of air to achieve a predetermined oxygen concentration level in the combustion products. This is accomplished by a feedback controller which maintains the gas volumetric flow rate at a level consistent with the desired oxygen concentration in the products. The heat of combustion is determined from a known correlation with the gas volumetric flow rate. An on-line microcomputer accesses the gas volumetric flow data, and displays the heat of combustion values at desired time intervals.

  3. 5th Computer Science On-line Conference

    CERN Document Server

    Senkerik, Roman; Oplatkova, Zuzana; Silhavy, Petr; Prokopova, Zdenka

    2016-01-01

    This volume is based on the research papers presented in the 5th Computer Science On-line Conference. The volume Artificial Intelligence Perspectives in Intelligent Systems presents modern trends and methods to real-world problems, and in particular, exploratory research that describes novel approaches in the field of artificial intelligence. New algorithms in a variety of fields are also presented. The Computer Science On-line Conference (CSOC 2016) is intended to provide an international forum for discussions on the latest research results in all areas related to Computer Science. The addressed topics are the theoretical aspects and applications of Computer Science, Artificial Intelligences, Cybernetics, Automation Control Theory and Software Engineering.

  4. 建筑施工阶段动态识别安全风险的指标体系构建%Construction of Index System for Identifying Security Risks Dynamically in the Building Construction Phase

    Institute of Scientific and Technical Information of China (English)

    昝彦国; 侯学良

    2016-01-01

    In the building construction phase,dynamic identification to find security risks is more consistent with the objective law of security risk. So referning research results of the construction projects morbid appearances spectrum,extracts indicators affecting security status,and uses the sequence relations act,the only reference comparison and judgment method and an important analysis method to determine the index weights. On this basis, takes the subentry engineering as a research units to construct the corresponding index system,and thus dynamically identifies the security risk of the whole construction phase,ensures scientific and accuracyidentification of security risk in the construction phase.%建筑工程施工阶段,动态识别安全风险更加符合安全风险发生的客观规律。借鉴建筑工程项目病态表象谱的研究成果,提取影响安全状态的指标,并运用序关系法、唯一参照物比较判断法和重要度分析法确定指标权重。在此基础之上,以分项工程为研究单位构建相应的指标体系,进而对整个施工阶段的安全风险进行动态识别,以保证施工阶段中安全风险识别的科学性和准确性。

  5. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  6. Data security.

    Science.gov (United States)

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  7. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  8. Secure Storage Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  9. Security Architecture of Cloud Computing

    Directory of Open Access Journals (Sweden)

    V.KRISHNA REDDY

    2011-09-01

    Full Text Available The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages on the data security of service consumers. This paper aims to emphasize the main security issues existing in cloud computing environments. The security issues at various levels of cloud computing environment is identified in this paper and categorized based on cloud computing architecture. This paper focuses on the usage of Cloud services and security issues to build these cross-domain Internet-connected collaborations.

  10. On-Line Learning and the Implications for School Design

    Science.gov (United States)

    Stack, Greg

    2011-01-01

    "Disrupting Class," published in 2008, is the story of how disruptive innovation, innovation that changes the business model organizations, will fundamentally change the American school system. The book's most startling prediction is that half of all high school classes will be on-line by 2019. In considering these predictions, the author began to…

  11. On-line multidimensional separation systems for peptide analysis

    NARCIS (Netherlands)

    Stroink, T.

    2005-01-01

    Today, there is an increasing interest in selective and sensitive analysis of proteins and peptides with a relatively high speed. The first chapter of this thesis describes several strategies for the on-line multidimensional analysis of peptides and proteins in biological samples. This overview of t

  12. On-line probabilistic classification with particle filters

    DEFF Research Database (Denmark)

    Højen-Sørensen, Pedro; de Freitas, N.; Fog, Torben L.

    2000-01-01

    We apply particle filters to the problem of on-line classification with possibly overlapping classes. This allows us to compute the probabilities of class membership as the classes evolve. Although we adopt neural network classifiers, the work can be extended to any other parametric classification...

  13. Personal Assistant for onLine Services: Addressing human factors

    NARCIS (Netherlands)

    Lindenberg, J.; Nagata, S.F.; Neerincx, M.A.

    2003-01-01

    The Personal Assistant for onLine Services (PALS) project aims at substantially improving the user experience of mobile internet services. It focuses on a generic solution: a personal assistant, which attunes the interaction to the momentary user needs and use context (e.g. adjusting the

  14. Efficiently Building On-line Tools for Distributed Heterogeneous Environments

    Directory of Open Access Journals (Sweden)

    Günther Rackl

    2002-01-01

    Full Text Available Software development is getting more and more complex, especially within distributed middleware-based environments. A major drawback during the overall software development process is the lack of on-line tools, i.e. tools applied as soon as there is a running prototype of an application. The MIMO MIddleware MOnitor provides a solution to this problem by implementing a framework for an efficient development of on-line tools. This paper presents a methodology for developing on-line tools with MIMO. As an example scenario, we choose a distributed medical image reconstruction application, which represents a test case with high performance requirements. Our distributed, CORBA-based application is instrumented for being observed with MIMO and related tools. Additionally, load balancing mechanisms are integrated for further performance improvements. As a result, we obtain an integrated tool environment for observing and steering the image reconstruction application. By using our rapid tool development process, the integration of on-line tools shows to be very convenient and enables an efficient tool deployment.

  15. Developing an On-Line Interactive Health Psychology Module

    Science.gov (United States)

    Upton, Dominic; Cooper, Carol

    2006-01-01

    On-line teaching material in health psychology was developed which ensured a range of students could access appropriate material for their course and level of study. This material has been developed around the concept of smaller "content chunks" which can be combined into whole units of learning (topics), and ultimately, a module. On the basis of…

  16. Why do People Stop playing On-Line Games?

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Razmerita, Liana

    2012-01-01

    The recent initial public offering of shares of Zynga, probably the most important on-line game provider, drew interest of potential investors but also of general public to their business model. What the most interested people learned so far is that if Zynga had not changed their accounting...

  17. On-line fuzzy logic control of tube bending

    Science.gov (United States)

    Lieh, Junghsen; Li, Wei Jie

    2005-11-01

    This paper describes the simulation and on-line fuzzy logic control of tube bending. By combining elasticity and plasticity theories, a conventional model was developed. The results from simulation were compared with those obtained from testing. The experimental data reveal that there exists certain level of uncertainty and nonlinearity in tube bending, and its variation could be significant. To overcome this, a on-line fuzzy logic controller with self-tuning capabilities was designed. The advantages of this on-line system are (1) its computational requirement is simple in comparison with more algorithmic-based controllers, and (2) the system does not need prior knowledge of material characteristics. The device includes an AC motor, a servo controller, a forming mechanism, a 3D optical sensor, and a microprocessor. This automated bending machine adopts primary and secondary errors between the actual response and desired output to conduct on-line rule reasoning. Results from testing show that the spring back angle can be effectively compensated by the self- tuning fuzzy system in a real-time fashion.

  18. On-Line Learning and the Implications for School Design

    Science.gov (United States)

    Stack, Greg

    2011-01-01

    "Disrupting Class," published in 2008, is the story of how disruptive innovation, innovation that changes the business model organizations, will fundamentally change the American school system. The book's most startling prediction is that half of all high school classes will be on-line by 2019. In considering these predictions, the author began to…

  19. Specialization processes in on-line unsupervised learning

    NARCIS (Netherlands)

    Biehl, M.; Freking, A.; Reents, G.; Schlösser, E.

    1998-01-01

    From the recent analysis of supervised learning by on-line gradient descent in multilayered neural networks it is known that the necessary process of student specialization can be delayed significantly. We demonstrate that this phenomenon also occurs in various models of unsupervised learning. A sol

  20. On-line sample treatment - Capillary gas chromatography

    NARCIS (Netherlands)

    Goosens, EC; de Jong, D; de Jong, GJ; Brinkman, UAT

    1998-01-01

    Sample pretreatment is often the bottleneck of a trace level analytical procedure. In order to increase performance, increasing attention is therefore being devoted to combining sample pretreatment on-line with the separation technique that has to be used. In the present review, a variety of procedu

  1. A New On-Line Resource for Psycholinguistic Studies

    Science.gov (United States)

    Szekely, Anna; Jacobsen, Thomas; D'Amico, Simona; Devescovi, Antonella; Andonoa, Elena; Herron, Daniel; Lu, Ching Ching; Pechmann, Thomas; Pleh, Csaba; Wicha, Nicole; Federmeier, Kara; Gerdjikova, Irina; Gutierrez, Gabriel; Hung, Daisy, Hsu, Jeanne; Iyer, Gowri; Kohnert, Kathryn; Mehotcheva, Teodora; Orozco-Figueroa, Araceli; Tzeng, Angela; Tzeng, Ovid; Arevalo, Analia; Vargha, Andras; Butler, Andrew C.; Buffington, Robert; Bates, Elizabeth

    2004-01-01

    Picture naming is a widely used technique in psycholinguistic studies. Here, we describe new on-line resources that our project has compiled and made available to researchers on the world wide web at http://crl.ucsd.edu/~aszekely/ipnp/. The website provides access to a wide range of picture stimuli and related norms in seven languages. Picture…

  2. ADAPTIVE CONTEXT PROCESSING IN ON-LINE HANDWRITTEN CHARACTER RECOGNITION

    NARCIS (Netherlands)

    Iwayama, N.; Ishigaki, K.

    2004-01-01

    We propose a new approach to context processing in on-line handwritten character recognition (OLCR). Based on the observation that writers often repeat the strings that they input, we take the approach of adaptive context processing. (ACP). In ACP, the strings input by a writer are automatically

  3. The Lesson Observation On-Line (Evidence Portfolio) Platform

    Science.gov (United States)

    Cooper, David G.

    2015-01-01

    At a time when teacher training is being moved to school-based programmes it is important to engage in a research-informed dialogue about creating more distinctive, and cost-effective 21st century models of teacher training. Three years ago I began feasibility field testing the Lesson Observation On-line (Evidence Portfolio) Platform [LOOP]…

  4. On-Line Synthesis and Analysis by Mass Spectrometry

    Science.gov (United States)

    Bain, Ryan M.; Pulliam, Christopher J.; Raab, Shannon A.; Cooks, R. Graham

    2015-01-01

    In this laboratory experiment, students learn how to use ESI to accelerate chemical synthesis and to couple it with on-line mass spectrometry for structural analysis. The Hantzsch synthesis of symmetric 1,4-dihydropyridines is a classic example of a one-pot reaction in which multiple intermediates can serve to indicate the progress of the reaction…

  5. Investigating on-line pornography at the University of Johannesburg

    Directory of Open Access Journals (Sweden)

    P. Laughton

    2008-01-01

    Full Text Available The on-line user of today has access to a vast collection of information resources. In addition, the developments in Internet and Web technologies have made it even easier for surfers to anonymously get access to on-line pornography. The purpose of this research was to investigate the extent to which access to on-line pornography at the University of Johannesburg can be managed. For the empirical part of this research 1037 questionnaires were proportionally distributed to and completed by students on all five campuses of the university. The questionnaire consisted of four sections: biographical information; university computer facility usage; university acceptable use policy; and personal experience with university computer facilities. The gender distribution for the sample was almost even, with a total of 49,4% male participants and 50,6% female, with the largest grouping of respondents (61,6% aged between 19 years and 21 years. Of the respondents, 36,7% indicated that exposure to unsolicited pornography did not bother them. When asked to what extent students should have access to pornography, 60,5% stated 'None' while 32,6% believed that 'Restricted' access should be granted for research purposes and 6,9% believed that students should be granted 'Total' access to pornography. Results from the research will be used to manage access to on-line resources at the University of Johannesburg better.

  6. Investigating on-line pornography at the University of Johannesburg

    Directory of Open Access Journals (Sweden)

    P. Laughton

    2007-12-01

    Full Text Available The on-line user of today has access to a vast collection of information resources. In addition, the developments in Internet and Web technologies have made it even easier for surfers to anonymously get access to on-line pornography. The purpose of this research was to investigate the extent to which access to on-line pornography at the University of Johannesburg can be managed. For the empirical part of this research 1037 questionnaires were proportionally distributed to and completed by students on all five campuses of the university. The questionnaire consisted of four sections: biographical information; university computer facility usage; university acceptable use policy; and personal experience with university computer facilities. The gender distribution for the sample was almost even, with total of 49,4% male participants and 50,6% female, with the largest grouping of respondents(61,6% aged between 19 years and 21 years. Of the respondents, 36,7% indicated that exposure to unsolicited pornography did not bother them. When asked to what extent students should have access to pornography, 60,5% stated 'None' while 32,6% believed that 'Restricted' access should be granted for research purposes and 6,9% believed that students should be granted 'Total' access to pornography. Results from the research will be used to manage access to on-line resources at the University of Johannesburg better.

  7. On-Line NDE for Advanced Reactor Designs

    Science.gov (United States)

    Nakagawa, N.; Inanc, F.; Thompson, R. B.; Junker, W. R.; Ruddy, F. H.; Beatty, J. M.; Arlia, N. G.

    2003-03-01

    This expository paper introduces the concept of on-line sensor methodologies for monitoring the integrity of components in next generation power systems, and explains general benefits of the approach, while describing early conceptual developments of suitable NDE methodologies. The paper first explains the philosophy behind this approach (i.e. the design-for-inspectability concept). Specifically, we describe where and how decades of accumulated knowledge and experience in nuclear power system maintenance are utilized in Generation IV power system designs, as the designs are being actively developed, in order to advance their safety and economy. Second, we explain that Generation IV reactor design features call for the replacement of the current outage-based maintenance by on-line inspection and monitoring. Third, the model-based approach toward design and performance optimization of on-line sensor systems, using electromagnetic, ultrasonic, and radiation detectors, will be explained. Fourth, general types of NDE inspections that are considered amenable to on-line health monitoring will be listed. Fifth, we will describe specific modeling developments to be used for radiography, EMAT UT, and EC detector design studies.

  8. On-Line Synthesis and Analysis by Mass Spectrometry

    Science.gov (United States)

    Bain, Ryan M.; Pulliam, Christopher J.; Raab, Shannon A.; Cooks, R. Graham

    2015-01-01

    In this laboratory experiment, students learn how to use ESI to accelerate chemical synthesis and to couple it with on-line mass spectrometry for structural analysis. The Hantzsch synthesis of symmetric 1,4-dihydropyridines is a classic example of a one-pot reaction in which multiple intermediates can serve to indicate the progress of the reaction…

  9. Why do People Stop Playing On-Line Games?

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Razmerita, Liana

    2012-01-01

    The recent initial public offering of shares of Zynga, probably the most important on-line game provider, drew interest of potential investors but also of general public to their business model. What the most interested people learned so far is that if Zynga had not changed their accounting...

  10. On-line survivable routing in WDM networks

    NARCIS (Netherlands)

    Beshir, A.A.; Kuipers, F.A.; Van Mieghem, P.F.A.; Orda, A.

    2009-01-01

    In WDM networks, survivable routing and wavelength assignment (SRWA) involves assigning link-disjoint primary and backup lightpaths. In the on-line SRWA problem, a sequence of requests arrive and each request is either accepted or rejected based only on the input sequence seen so far. For special

  11. On-line Survivable Routing in WDM Networks

    NARCIS (Netherlands)

    Beshir, A.A.; Kuipers, F.A.; Van Mieghem, P.; Orda, A.

    In WDM networks, survivable routing and wavelength assignment (SRWA) involves assigning link-disjoint primary and backup lightpaths. In the on-line SRWA problem, a sequence of requests arrive and each request is either accepted or rejected based only on the input sequence seen so far. For special

  12. Research on On-Line Coordinated Control Strategy to Improve the Voltage Vulnerability after Disturbance

    Institute of Scientific and Technical Information of China (English)

    Qun-Ying Liu; Qi-Fang Liu; Deng Liu; Yong-Feng Liao

    2014-01-01

    The on-line coordinated control strategy among multi-voltage controls is important to keep voltage security in post-fault systems. Based on the wide area measuring information, the energy function, which can qualify the impacts of the different control actions on voltage of different nodes, is proposed. And then, considering the impacts of different control actions on the node voltage being treated as a weight matrix, the energy margin is used as the objective function and the reactive power margin is innovatively used as the constraint to regulate the control actions globally according to the weight values. At last, the objective functions are solved to get the optimal global coordinated control strategies. The proposed method is identified in an IEEE-30 Bus system and the simulation results show that it effectively improves the voltage stability.

  13. On-line transient stability assessment of large-scale power systems by using ball vector machines

    Energy Technology Data Exchange (ETDEWEB)

    Mohammadi, M., E-mail: m.mohammadi@aut.ac.i [School of Electrical and Computer Engineering, Shiraz University, Shiraz (Iran, Islamic Republic of); Gharehpetian, G.B., E-mail: grptian@aut.ac.i [Electrical Engineering Department, Amirkabir University of Technology, Tehran (Iran, Islamic Republic of)

    2010-04-15

    In this paper ball vector machine (BVM) has been used for on-line transient stability assessment of large-scale power systems. To classify the system transient security status, a BVM has been trained for all contingencies. The proposed BVM based security assessment algorithm has very small training time and space in comparison with artificial neural networks (ANN), support vector machines (SVM) and other machine learning based algorithms. In addition, the proposed algorithm has less support vectors (SV) and therefore is faster than existing algorithms for on-line applications. One of the main points, to apply a machine learning method is feature selection. In this paper, a new Decision Tree (DT) based feature selection technique has been presented. The proposed BVM based algorithm has been applied to New England 39-bus power system. The simulation results show the effectiveness and the stability of the proposed method for on-line transient stability assessment procedure of large-scale power system. The proposed feature selection algorithm has been compared with different feature selection algorithms. The simulation results demonstrate the effectiveness of the proposed feature algorithm.

  14. IOOS Data Portals and Uniform On-line Browse Capabilities

    Science.gov (United States)

    Howard, M.; Currier, R. D.; Kobara, S.; Gayanilo, F.

    2015-12-01

    The Gulf of Mexico Coastal Ocean Observing System Regional Association (GCOOS-RA) is one of eleven Regional Associations organized under the NOAA-led U.S. Integrated Ocean Observing System (IOOS) Program Office. Each of the RAs operate standards-based regional data portals designed to aggregate near real-time and historical observed data and modeled outputs from distributed providers and to offer these and derived products in standardized ways to a diverse set of users. The RA's portals are based on the IOOS Data and Communications Plan which describes the functional elements needed for an interoperable system. One of these elements is called "Uniform On-line Browse" which is an informational service designed primarily to visualize the inventory of a portal. An on-line browse service supports the end user's need to discover what parameters are available, to learn the spatial and temporal extend of the holdings, and to examine the character of the data (e.g, variability, gappiness, etc). These pieces of information help the end user decide if the data are fit for his/her purpose and to construct valid data requests. Note that on-line browse is a distinctly different activity than data analysis because it seeks to yield knowledge about the inventory and not about what the data mean. "Uniform" on-line browse is a service that takes advantage of the standardization of the data portal's data access points. Most portals represent station locations on a map. This is a view of the data inventory but these plots are rarely generated by pulling data through the standards-based services offered to the end users but through methods only available to the portal programmers. This work will present results of Uniform On-line browse tools developed within GCOOS-RA and their applicability to other RA portals.

  15. Mentoring Narratives ON-LINE:Teaching the Principalship

    Directory of Open Access Journals (Sweden)

    Allison I. Griffith

    2002-05-01

    Full Text Available The need to develop new models for preparation of school administrators has been a prominent concern in educational discourse in the last decade. Having been criticized for the inadequate preparation of the school leadership cadre, academic departments responsible for training future school administrators have had to revisit their approaches and to reframe their teaching philosophies to ensure the readiness of their graduates for the challenges and complexities of school leadership. This article reports on the new model of principals' training that has been used in York University's Principals' Qualification Program (PQP from the late 1990s onward. One component of the program brings traditional case methodology into a computer-mediated/on-line environment. The on-line cases are narratives from the everyday lives of the Ontario school administrators who serve as mentors in the on-line environment. Situating our discussion within the context of the rapidly changing educational landscape of Ontario, we focus on the PQP model to explore experientially generated case narratives as one method for teaching and learning the work of the local school administrator. We focus particularly on the teaching and learning embedded in computer-mediated or on-line case narratives used in training teachers for school leadership. We argue that the complexities of school leadership—the social, cultural, relational, ethical and moral context of school leadership—can be taught effectively through the reflective processes of on-line case narratives. We seek to contribute to the ongoing dialogue on the potential of new pedagogies and new technologies to help prepare the competent and responsible leaders for tomorrow's schools.

  16. Diagnostics of the Enterprise Economic Security and the Role of Information and Communication in the Context of Sustainability of Dynamical Equilibrium, Operation and Development

    OpenAIRE

    Skrynkovskyy Ruslan M.; Maksymchuk Iaroslava S.; Kharuk Kateryna B.

    2015-01-01

    In the scientific article a system for diagnostics of the enterprise economic security is developed. It has been determined that the main business indicators for diagnostics of the enterprise economic security are: the level of the enterprise financial stability (contains the indicator for the enterprise provision with its own funds, rate of independence, financial stability indicator, current assets to equity ratio, liquid ratio, absolute liquidity ratio, current liquidity ...

  17. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  18. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  19. Secure Ties

    NARCIS (Netherlands)

    Joep de Hart; Frans Knol; Cora Maas - de Waal; Theo Roes

    2002-01-01

    Original title: Zekere banden. Discussions about the Netherlands of today often throw up terms such as 'social cohesion', 'social integration', 'liveability' and 'security'. The Netherlands Institute for Social Research/SCP has carried out a study of this phenomenon and presents the results in this

  20. Secured transactions

    NARCIS (Netherlands)

    Beale, H.

    2008-01-01

    In this paper I describe the work that is currently under way, within the Network of Excellence charged with creating a draft Common Frame of Reference, to draft rules on security over moveable assets. After a brief introduction, I deal with two broad questions: (1) the general aims and scope of the

  1. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no state

  2. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  3. Intelligent control using multiple models based on on-line learning

    Institute of Scientific and Technical Information of China (English)

    Junyong ZHAI; Shumin FEI; Feipeng DA

    2006-01-01

    In this paper we deal with the problem of plants with large parameter variations under different operating modes. A novel intelligent control algorithm based on multiple models is proposed to improve the dynamical response performance. At the same time adaptive model bank is applied to establish models without prior system information.Multiple models and corresponding controllers are automatically established on-line by a conventionally adaptive model and a re-initialized one. A best controller is chosen by the performance function at every instant. The closed-loop system's stability and asymptotical convergence of tracking error can be guaranteed. Simulation results have confirmed the validity of the proposed method.

  4. On-Line Optimizing Control of a Simulated Continuous Yeast Fermentation

    DEFF Research Database (Denmark)

    Andersen, Maria Y.; Asferg, L.; Brabrand, H.;

    1989-01-01

    On-line optimizing control of a simulated fermentation is investigated using a non-segregated dynamic model of aerobic glucose limited growth of saccharomyces cerevisiae. The optimization procedure is carried out with an underlying adaptive regulator to stabilize the culture. This stabilization...... is especially important during the setpoint changes specified by the optimizing routine. A linear ARMAX model structure is used for the fermentation process with dilution rate as input and biomass as output variable. The parameters of the linear model structure are estimated using a pseudo linear regression...

  5. Opinions about Component Energetic Security

    OpenAIRE

    Elena GOLUMBEANU (GEORGESCU)

    2012-01-01

    Collective security (international) represent the morphological expression of individual security components. According to the Report presented at the United Nations Development Programme, collective security (international) as well as national security, is the expression of seven synergistic dimensions as follows: economic security, food security, environmental security, personal security, community security, political security and individual security. As part of economic security, energy an...

  6. Astronomy On-Line Programme Enters "hot Week"

    Science.gov (United States)

    1996-11-01

    World's Biggest Astronomy WWW-Event Attracts Thousands of Students The Astronomy On-line Programme (See ESO Press Release 09/96 of 18 June 1996) began officially on 1 October and is now about to enter its most intense phase, known as the Hot Week . On 18 - 22 November, an estimated 4000 astronomy-interested, mostly young people in Europe and on four other continents will get together during five days in what - not unexpected - has become the world's biggest astronomy event ever organised on the World Wide Web. This carefully structured Programme is carried out in collaboration between the European Association for Astronomy Education (EAAE), the European Southern Observatory and the European Commission, under the auspices of the Fourth European Week for Scientific and Technological Culture. The Programme has already had a most visible impact on the school education of natural sciences in various countries; for instance, the Internet-connection of schools has been advanced in some, in order to allow groups to participate. There have been numerous contacts among the groups across the borders and there are clear signs that many Astronomy On-line participants have progressed to use the impressive possibilities of the Web in an efficient and structured way. There has been a lively media interest in Astronomy On-line all over Europe and it is expected to increase during the next week. The current status of Astronomy On-line It is obvious that the pilot function of the Astronomy On-line Programme in the use of the Web has been very effective and that the associated dissemination of astronomical knowledge has been successful. At this time, more than 650 groups have registered with Astronomy On-line. Most come from 31 different European countries and a few dozen groups are located in North and South America as well as in Asia and Australia. Together they have experienced the steady build-up of Astronomy On-line over the past weeks, by means of numerous contributions from a

  7. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  8. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  9. ANALISIS SISTEM KEAMANAN JARINGAN DENGAN MENGGUNAKAN SWITCH PORT SECURITY

    Directory of Open Access Journals (Sweden)

    Oris Krianto Sulaiman

    2016-01-01

    Full Text Available Abstrak — Perkembangan teknologi dalam jaringan komputer lambat laun semakin pesat seiring dengan meningkatnya kebutuhan akan akses jaringan yang efisien , stabil dan cepat serta kemanan yang handal. Salah satu faktor yang mempengaruhi kualitas dalam jaringan adalah network security atau keamanan jaringan, banyak teknik yang dapat dilakukan dalam meningkatkan keamanan jaringan, baik dengan membangun sistem firewall, dengan menggunakan layer7 protocol maupun dengan port security, port security memanfaatkan port-port yang ada untuk mengizinkan akses ke jaringan, switch port security merupakan suatu kemampuan perangkat switch untuk mengamankan jaringan LAN (Local Area Network terdapat beberapa jenis switch port security yang digunakan yaitu default/ static port security, port security dynamic learning dan sticky port security, penulis akan melakukan analisis terhadap masing-masing jenis switch port security untuk menentukan kehandalan, kegunaan dan pemanfaatannya dilapangan. Keywords :  network security, port security, switch port security

  10. Food security vs. nutrition security.

    Science.gov (United States)

    Venugopal, K R

    1999-01-01

    This article presents the status of food security versus nutrition security in India. Food security is defined as the availability and the access of food to all people; whereas nutrition security demands the intake of a wide range of foods which provides the essential needed nutrients. It is estimated that the average dietary intake in India is 2280 calories. In 9 major states, the average was less than 2400 calories, suggesting poverty. In a 1988-90 survey, only 10% of the children, and about 50% of the adults, were considered to have a normal nutritional status. The rest suffered from different levels of Chronic Energy Deficiency. In addition, contradictions have also developed within policies in India that seek to address these issues. Recognizing that agriculture is the key to poverty eradication, India recently drafted the Agriculture Policy. The Policy focuses on rain-fed farming, unemployment, and malnutrition in rural areas, revitalizing the cooperatives, and increasing the involvement of nongovernmental organizations. However, there are certain issues of concern in the Policy with the most damaging aspect seen in the promotion of existing inequalities in the rural sector.

  11. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  12. On-line Measuring Method for Shell Chamber Volume

    Institute of Scientific and Technical Information of China (English)

    ZHANG Li-zhong; WANG De-min; JIANG Tao; CAO Guo-hua; WANG Qi

    2005-01-01

    Using the ideal gas state equation, an on-line measuring method for the shell chamber volume is studied in this paper. After analyzing how various measurement parameters affect the measurement accuracy, the system parameters are optimized in this method. Because the shape and volume of the tested items are similar, the method of using "tamping" to raise the accuracy and speed of the measurement is put forward. Based on the work above, a prototype of the testing instrument for shell chamber volume was developed, automatically testing and controlling. Compared with the method of "water weight", this method is more accurate, quicker and more automotive, so it is adaptable for the use of on-line detection.

  13. On-line Ramsey Numbers for Paths and Stars

    Directory of Open Access Journals (Sweden)

    Jaroslaw Grytczuk

    2008-08-01

    Full Text Available We study on-line version of size-Ramsey numbers of graphs defined via a game played between Builder and Painter: in one round Builder joins two vertices by an edge and Painter paints it red or blue. The goal of Builder is to force Painter to create a monochromatic copy of a fixed graph H in as few rounds as possible. The minimum number of rounds (assuming both players play perfectly is the on-line Ramsey number r(H of the graph H. We determine exact values of r(H for a few short paths and obtain a general upper bound r(Pn ≤ 4n-7. We also study asymmetric version of this parameter when one of the target graphs is a star Sn with n edges. We prove that r(Sn,H≤n ·e(H when H is any tree, cycle or clique.

  14. On-line corrosion monitoring in district heating systems

    DEFF Research Database (Denmark)

    Richter, Sonja; Thorarinsdottir, R.I.; Hilbert, Lisbeth Rischel

    2004-01-01

    complicates the chemistry of the environment. Hydrogen sulphide is present in geothermal systems and can be formed as a by-product of sulphate-reducing-bacteria (SRB). The application of electrochemical methods makes on-line monitoring possible. These methods include: Linear Polarization Resistance (LPR......), Electrochemical Noise (EN) and Zero Resistance Ammetry (ZRA). Electrochemical Resistance (ER) has also been used to measure corrosion. The method traditionally only measures corrosion off-line but with newly developed high-sensitive ER technique developed by MetriCorr in Denmark, on-line monitoring is possible......Traditionally corrosion monitoring in district heating systems has been performed offline via weight loss coupons. These measurements give information about the past and not the present situation and require long exposure time (weeks or months). The good quality of district heating medium makes...

  15. On-Line Metrology with Conoscopic Holography: Beyond Triangulation

    Science.gov (United States)

    Álvarez, Ignacio; Enguita, Jose M.; Frade, María; Marina, Jorge; Ojea, Guillermo

    2009-01-01

    On-line non-contact surface inspection with high precision is still an open problem. Laser triangulation techniques are the most common solution for this kind of systems, but there exist fundamental limitations to their applicability when high precisions, long standoffs or large apertures are needed, and when there are difficult operating conditions. Other methods are, in general, not applicable in hostile environments or inadequate for on-line measurement. In this paper we review the latest research in Conoscopic Holography, an interferometric technique that has been applied successfully in this kind of applications, ranging from submicrometric roughness measurements, to long standoff sensors for surface defect detection in steel at high temperatures. PMID:22399984

  16. Escapist Motives for Playing On-Line Games

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Razmerita, Liana

    , Harteveld and Mayer’s framework (2009) of escapist motives, which identifies four main motives for playing on-line games: mundane breaking, stress relieving, pleasure seeking, and imagination conjuring. In the paper, we report preliminary findings from an exploratory questionnaire survey. Besides importance...... of escapist motives for playing Facebook and other on-line games, we investigate how they are linked to demographic data such as: age, gender, place of origin, along with other social interactions patterns and social network usage behavior, current gaming status and an estimate of gaming time. According......Social games have become popular along with the tremendous growth of social networking sites, esp. Facebook. There is a gap in literature on what motivates people to play Facebook games. This paper studies social games usage behavior of students. We focus on escapist reasons, based on Warmelink...

  17. On-line Corrosion Monitoring in District Heating Systems

    DEFF Research Database (Denmark)

    Richter, Sonja; Thorarinsdottir, R.I.; Hilbert, Lisbeth Rischel

    2005-01-01

    The corrosion control in district heating systems is today performed primarily with control of the water quality. The corrosion rate is kept low by assuring low dissolved oxygen concentration, high pH and low conductivity. Corrosion failures can occur, e.g. as a result of unknown oxygen ingress......, precipitation of deposits or crevices. The authors describe methods used for on-line monitoring of corrosion, cover the complications and the main results of a Nordic project....

  18. On-Line and Back at S.F.U.

    Directory of Open Access Journals (Sweden)

    M. Sanderson

    1973-06-01

    Full Text Available Simon Fraser University library began operation with an automated circulation system. After deliberation, it mounted the first phase of a two-phase online circulation system. A radically revised loan pol·icy caused the system design and assumptions to be called into question. A cheaper, simpler, and more effective off-line system eventually replaced the on-line system. The systems, fiscal, and administrative implications of this decision are reviewed.

  19. Two Types of Designs for On-Line Circulation Systems

    Directory of Open Access Journals (Sweden)

    Rob McGee

    1972-09-01

    Full Text Available On-line circulation systems divide into two types. One type contains records only for charged or otherwise absent items. The other contains a file of records for all titles or volumes in the library collection, regardless of their circulation status. This paper traces differences between the two types, examining different kinds of files and terminals, transaction evidence, the quality of bibliographic data, querying, and the possibility of functions outside circulation. Aspects of both operational and potential systems are considered.

  20. On-line phase space measurement with kicker excitation

    Science.gov (United States)

    Dietrich, J.; Maier, R.; Mohos, I.

    1998-12-01

    A new method for on-line phase space measurements with kicker excitation at COSY was developed. The position data were measured using the analog output of two beam position monitors (BPMs) and directly monitored on a digital storage oscilloscope with an external clock (bunch-synchronous sampling). Nonlinear behavior of the proton beam was visible as well as were resonance islands. Typical measurements are presented.

  1. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    , but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral power. The Great War proves that these laws provided an adequate tool to be wielded by the politicians actually in office during that conflict. Following....... Moreover, they estimated that armed defence was a priori hopeless and possibly even dangerous as it might attract unnecessary attention by a would-be belligerent. Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During...... the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe, but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral...

  2. Image Security

    Science.gov (United States)

    2007-11-02

    popularity, contemplates the cru- cial needs for protecting intellectual property rights on multimedia content like images, video, audio , and oth- ers...protection for still images, audio , video, and multimedia products.’ The networking environment of the future will require tools that provide m secure and fast...technique known as steganography ? Steganography , or “covered writing,” George Voyatzis and Ioannis Pitas University of Thessaloniki has a long

  3. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  4. The new on-line Czech Food Composition Database.

    Science.gov (United States)

    Machackova, Marie; Holasova, Marie; Maskova, Eva

    2013-10-01

    The new on-line Czech Food Composition Database (FCDB) was launched on http://www.czfcdb.cz in December 2010 as a main freely available channel for dissemination of Czech food composition data. The application is based on a complied FCDB documented according to the EuroFIR standardised procedure for full value documentation and indexing of foods by the LanguaL™ Thesaurus. A content management system was implemented for administration of the website and performing data export (comma-separated values or EuroFIR XML transport package formats) by a compiler. Reference/s are provided for each published value with linking to available freely accessible on-line sources of data (e.g. full texts, EuroFIR Document Repository, on-line national FCDBs). LanguaL™ codes are displayed within each food record as searchable keywords of the database. A photo (or a photo gallery) is used as a visual descriptor of a food item. The application is searchable on foods, components, food groups, alphabet and a multi-field advanced search. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. Review of trigger and on-line processors at SLAC

    Energy Technology Data Exchange (ETDEWEB)

    Lankford, A.J.

    1984-07-01

    The role of trigger and on-line processors in reducing data rates to manageable proportions in e/sup +/e/sup -/ physics experiments is defined not by high physics or background rates, but by the large event sizes of the general-purpose detectors employed. The rate of e/sup +/e/sup -/ annihilation is low, and backgrounds are not high; yet the number of physics processes which can be studied is vast and varied. This paper begins by briefly describing the role of trigger processors in the e/sup +/e/sup -/ context. The usual flow of the trigger decision process is illustrated with selected examples of SLAC trigger processing. The features are mentioned of triggering at the SLC and the trigger processing plans of the two SLC detectors: The Mark II and the SLD. The most common on-line processors at SLAC, the BADC, the SLAC Scanner Processor, the SLAC FASTBUS Controller, and the VAX CAMAC Channel, are discussed. Uses of the 168/E, 3081/E, and FASTBUS VAX processors are mentioned. The manner in which these processors are interfaced and the function they serve on line is described. Finally, the accelerator control system for the SLC is outlined. This paper is a survey in nature, and hence, relies heavily upon references to previous publications for detailed description of work mentioned here. 27 references, 9 figures, 1 table.

  6. DEVELOPMENT OF AN ON-LINE COAL WASHABILITY ANALYZER

    Energy Technology Data Exchange (ETDEWEB)

    J.D. Miller; C.L. Lin; G.H. Luttrell; G.T. Adel; Barbara Marin

    2001-06-26

    Washability analysis is the basis for nearly all coal preparation plant separations. Unfortunately, there are no on- line techniques for determining this most fundamental of all coal cleaning information. In light of recent successes at the University of Utah, it now appears possible to determine coal washability on-line through the use of x-ray computed tomography (CT) analysis. The successful development of such a device is critical to the establishment of process control and automated coal blending systems. In this regard, Virginia Tech, Terra Tek Inc., and U.S. coal producers have joined with the University of Utah and to undertake the development of an X-ray CT-based on- line coal washability analyzer with financial assistance from DOE. Each project participant brought special expertise to the project in order to create a new dimension in coal cleaning technology. The project involves development of appropriate software and extensive testing/evaluation of well-characterized coal samples from operating coal preparation plants. Data collected to date suggest that this new technology is capable of serving as a universal analyzer that can not only provide washability analysis, but also particle size distribution analysis, ash analysis, and perhaps pyritic sulfur analysis.

  7. DEVELOPMENT OF AN ON-LINE COAL WASHABILITY ANALYZER

    Energy Technology Data Exchange (ETDEWEB)

    J.D. Miller

    1999-09-30

    Washability analysis is the basis for nearly all coal preparation plant separations. Unfortunately, there are no on-line techniques for determining this most fundamental of all coal cleaning information. In light of recent successes at the University of Utah, it now appears possible to determine coal washability on-line through the use of x-ray computed tomography (CT) analysis. The successful development of such a device is critical to the establishment of process control and automated coal blending systems. In this regard, Virginia Tech, Terra Tek Inc., and several eastern coal companies have joined with the University of Utah and agreed to undertake the development of a x-ray CT-based on-line coal washability analyzer with financial assistance from DOE. The three-year project will cost $594,571, of which 33% ($194,575) will be cost-shared by the participants. The project involves development of appropriate software and extensive testing/evaluation of well-characterized coal samples from operating coal preparation plants. Each project participant brings special expertise to the project which is expected to create a new dimension in coal cleaning technology. Finally, it should be noted that the analyzer may prove to be a universal analyzer capable of providing not only washability analysis, but also particle size distribution analysis, ash analysis and perhaps pyritic sulfur analysis.

  8. Designing effective on-line continuing medical education.

    Science.gov (United States)

    Zimitat, Craig

    2001-03-01

    The Internet, and new information and communication technologies available through the Internet, provides medical educators with an opportunity to develop unique on-line learning environments with real potential to improve physicians' knowledge and effect change in their clinical practice. There are approximately 100 websites offering on-line CME courses in the USA alone. However, few of these CME courses appear to be based on sound educational principles or CME research and may have little chance of achieving the broader goals of CME. The majority of these courses closely resemble their traditional counterparts (e.g. paper-based books are now electronic books) and appear to be mere substitutions for old-technology CME resources. Whilst some CME providers add unique features of the Internet to enrich their websites, they do not employ strategies to optimize the learning opportunities afforded by this new technology. The adoption of adult learning principles, reflective practice and problem-based approaches can be used as a foundation for sound CME course design. In addition, knowledge of Internet technology and the learning opportunities it affords, together with strategies to maintain participation and new assessment paradigms, are all needed for developing online CME. We argue for an evidence-based and strategic approach to the development of on-line CME courses designed to enhance physician learning and facilitate change in clinical behaviour.

  9. A note on on-line Ramsey numbers for quadrilaterals

    Directory of Open Access Journals (Sweden)

    Joanna Cyman

    2014-01-01

    Full Text Available We consider on-line Ramsey numbers defined by a game played between two players, Builder and Painter. In each round Builder draws an the edge and Painter colors it either red or blue, as it appears. Builder's goal is to force Painter to create a monochromatic copy of a fixed graph \\(H\\ in as few rounds as possible. The minimum number of rounds (assuming both players play perfectly is the on-line Ramsey number \\(\\widetilde{r}(H\\ of the graph \\(H\\. An asymmetric version of the on-line Ramsey numbers \\(\\widetilde{r}(G,H\\ is defined accordingly. In 2005, Kurek and Ruciński computed \\(\\widetilde{r}(C_3\\. In this paper, we compute \\(\\widetilde{r}(C_4,C_k\\ for \\(3 \\le k \\le 7\\. Most of the results are based on computer algorithms but we obtain the exact value \\(\\widetilde{r}(C_4\\ and do so without the help of computer algorithms.

  10. On-line prognosis of fatigue crack propagation based on Gaussian weight-mixture proposal particle filter.

    Science.gov (United States)

    Chen, Jian; Yuan, Shenfang; Qiu, Lei; Wang, Hui; Yang, Weibo

    2017-07-25

    Accurate on-line prognosis of fatigue crack propagation is of great meaning for prognostics and health management (PHM) technologies to ensure structural integrity, which is a challenging task because of uncertainties which arise from sources such as intrinsic material properties, loading, and environmental factors. The particle filter algorithm has been proved to be a powerful tool to deal with prognostic problems those are affected by uncertainties. However, most studies adopted the basic particle filter algorithm, which uses the transition probability density function as the importance density and may suffer from serious particle degeneracy problem. This paper proposes an on-line fatigue crack propagation prognosis method based on a novel Gaussian weight-mixture proposal particle filter and the active guided wave based on-line crack monitoring. Based on the on-line crack measurement, the mixture of the measurement probability density function and the transition probability density function is proposed to be the importance density. In addition, an on-line dynamic update procedure is proposed to adjust the parameter of the state equation. The proposed method is verified on the fatigue test of attachment lugs which are a kind of important joint components in aircraft structures. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Artificial Chattering Free on-line Modified Sliding Mode Algorithm: Applied in Continuum Robot Manipulator

    Directory of Open Access Journals (Sweden)

    Mohammad Mahdi Ebrahimi

    2013-11-01

    Full Text Available In this research, an artificial chattering free adaptive fuzzy modified sliding mode control design and application to continuum robotic manipulator has proposed in order to design high performance nonlinear controller in the presence of uncertainties. Regarding to the positive points in sliding mode controller, fuzzy logic controller and online tuning method, the output improves. Each method by adding to the previous controller has covered negative points. The main target in this research is design of model free estimator on-line sliding mode fuzzy algorithm for continuum robot manipulator to reach an acceptable performance. Continuum robot manipulators are highly nonlinear, and a number of parameters are uncertain, therefore design model free controller by both analytical and empirical paradigms are the main goal. Although classical sliding mode methodology has acceptable performance with known dynamic parameters such as stability and robustness but there are two important disadvantages as below: chattering phenomenon and mathematical nonlinear dynamic equivalent controller part. To solve the chattering fuzzy logic inference applied instead of dead zone function. To solve the equivalent problems in classical sliding mode controller this paper focuses on applied on-line tuning method in classical controller. This algorithm works very well in certain and uncertain environment. The system performance in sliding mode controller is sensitive to the sliding function. Therefore, compute the optimum value of sliding function for a system is the next challenge. This problem has solved by adjusting sliding function of the on-line method continuously in real-time. In this way, the overall system performance has improved with respect to the classical sliding mode controller. This controller solved chattering phenomenon as well as mathematical nonlinear equivalent part by applied modified PID supervisory method in modified fuzzy sliding mode controller and

  12. BUSINESS INTELLIGENCE SECURITY

    Directory of Open Access Journals (Sweden)

    Dragoş Ovidiu TOFAN

    2016-11-01

    Full Text Available Excess information characteristic to the current environment leads to the need for a change of the organizations’ perspective and strategy not only through the raw data processing, but also in terms of existing applications generating new information. The overwhelming evolution of digital technologies and web changes led to the adoption of new and adapted internal policies and the emergence of regulations at level of governments or different social organisms. Information security risks arising from the current dynamics demand fast solutions linked to hardware, software and also to education of human resources. Business Intelligence (BI solutions have their specific evolution in order to bring their contribution to ensure the protection of data through specific components (Big Data, cloud, analytics. The current trend of development of BI applications on mobile devices brings with it a number of shortcomings related to information security and require additional protective measure regarding flows, specific processing and data storage.

  13. Security of supply

    OpenAIRE

    2007-01-01

    Paul Isbell revisits the energy security debate; John Gault considers European security and natural gas supplies; William C. Ramsay discusses security of energy supplies in a global market; Hasan M. Qabazard outlines OPEC’s abiding commitment to energy security.

  14. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  15. SOA-based security governance middleware

    CERN Document Server

    de Leusse, Pierre; 10.1109/SECURWARE.2010.17

    2012-01-01

    Business requirements for rapid operational efficiency, customer responsiveness as well as rapid adaptability are actively driving the need for ever increasing communication and integration apabilities of software assets. In this context, security, although acknowledged as being a necessity, is often perceived as a hindrance. Indeed, dynamic environments require flexible and understandable security that can be customized, adapted and reconfigured dynamically to face changing requirements. In this paper, the authors propose SOA based security governance middleware that handles security requirements on behalf of a resource exposed through it. The middleware aims at providing different security settings through the use of managed compositions of security services called profiles. The main added value of this work compared to existing handlers or centralized approaches lies in its enhanced flexibility and transparency.

  16. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  17. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  18. Information Security

    OpenAIRE

    Hartel, Pieter; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W. Ph.

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  19. A secure solution on hierarchical access control

    CERN Document Server

    Wei, Chuan-Sheng; Huang, Tone-Yau; Ong, Yao Lin

    2011-01-01

    Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.'s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access control. Lie, Hsu and Tripathy, Paul pointed out some secure leaks on the secure-filter and presented some improvements to eliminate these secure flaws. In this paper, we revise the secure-filter in Jeng-Wang method and propose another secure solutions in hierarchical access control problem. CA is a super security class (user) in our proposed method and the secure-filter of $u_i$ in our solutions is a polynomial of degree $n_i+1$ in $\\mathbb{Z}_p^*$, $f_i(x)=(x-h_i)(x-a_1)...(x-a_{n_i})+L_{l_i}(K_i)$. Although the degree of our secure-filter is larger than others solutions, our solution is secure and efficient in dynamics access control.

  20. Discovering Hidden Networks in On-line Social Networks

    Directory of Open Access Journals (Sweden)

    Pooja Wadhwa

    2014-04-01

    Full Text Available Rapid developments in information technology and Web 2.0 have provided a platform for the evolution of terrorist organizations, extremists from a traditional pyramidal structure to a technology enabled networked structure. Growing presence of these subversive groups on social networking sites has emerged as one of the prominent threats to the society, governments and law enforcement agencies across the world. Identifying messages relevant to the domain of security can serve as a stepping stone in criminal network analysis. In this paper, we deploy a rule based approach for classifying messages in Twitter which can also successfully reveal overlapping clusters. The approach incorporates dictionaries of enriched themes where each theme is categorized by semantically related words. The message is vectorized according to the security dictionaries and is termed as ‘Security Vector’. The documents are classified in categories on the basis of security associations. Further, the approach can also be used along the temporal dimension for classifying messages into topics and rank the most prominent topics of conversation at a particular instance of time. We further employ social network analysis techniques to visualize the hidden network at a particular time. Some of the results of our approach obtained through experiment with information network of Twitter are also discussed.

  1. A Dynamic Reactive Power Reserve Optimization Method to Enhance Transient Voltage Security%提高暂态电压安全水平的动态无功备用优化方法

    Institute of Scientific and Technical Information of China (English)

    孙全才; 程浩忠; 张健; 王琦; 宋越; 刘明松; 杨堤; 李诗旸

    2015-01-01

    Dynamic reactive power reserve of power system is vital to improve transient voltage security. An novel definition of reactive power reserve considering transient voltage security in transient procession was proposed. Correction coefficient to evaluate reactive power reserve's contribution to transient voltage security was given. Corrected reactive power reserve was computed through trace sensitivity method. Then an optimization model to enhance transient voltage security was built. It was solved by primal dual interior point method. Testing on IEEE 39-node system,it is indicated that three weight coefficients proposed are reasonable and effective. The evaluation method can give consideration both supporting capacity of one bus to the other and demand of reactive power reserve according to severity of faults. The system's transient voltage security is enhanced by the way of optimization of system's dynamic reactive power reserve. Hence, the method proposed can be used to prevent the happening of transient voltage collapse during system's fault.%电力系统动态无功储备对提高系统暂态电压安全水平具有重要作用,因此提出一种在系统暂态过程中考虑暂态电压安全的无功备用概念,并给出其对暂态电压安全贡献的评价方法及相应的修正系数.通过轨迹灵敏度方法实现对修正后的无功源动态无功备用的计算,建立提高系统暂态电压安全水平的无功备用优化模型,利用原对偶内点法进行求解.IEEE 39节点算例结果表明,所提3种权重系数合理、有效,通过该评价方式可以充分考虑到无功备用点对点的支撑能力以及故障严重性对无功备用的要求程度,通过系统动态无功备用的优化可提高系统的整体暂态电压安全水平,因此所提方法能够有效地预防系统故障时暂态电压安全问题的发生.

  2. A Refreshable, On-line Cache for HST Data Retrieval

    Science.gov (United States)

    Fraquelli, Dorothy A.; Ellis, Tracy A.; Ridgaway, Michael; DPAS Team

    2016-01-01

    We discuss upgrades to the HST Data Processing System, with an emphasis on the changes Hubble Space Telescope (HST) Archive users will experience. In particular, data are now held on-line (in a cache) removing the need to reprocess the data every time they are requested from the Archive. OTFR (on the fly reprocessing) has been replaced by a reprocessing system, which runs in the background. Data in the cache are automatically placed in the reprocessing queue when updated calibration reference files are received or when an improved calibration algorithm is installed. Data in the on-line cache are expected to be the most up to date version. These changes were phased in throughout 2015 for all active instruments.The on-line cache was populated instrument by instrument over the course of 2015. As data were placed in the cache, the flag that triggers OTFR was reset so that OTFR no longer runs on these data. "Hybrid" requests to the Archive are handled transparently, with data not yet in the cache provided via OTFR and the remaining data provided from the cache. Users do not need to make separate requests.Users of the MAST Portal will be able to download data from the cache immediately. For data not in the cache, the Portal will send the user to the standard "Retrieval Options Page," allowing the user to direct the Archive to process and deliver the data.The classic MAST Search and Retrieval interface has the same look and feel as previously. Minor changes, unrelated to the cache, have been made to the format of the Retrieval Options Page.

  3. On-line learning algorithms for locally recurrent neural networks.

    Science.gov (United States)

    Campolucci, P; Uncini, A; Piazza, F; Rao, B D

    1999-01-01

    This paper focuses on on-line learning procedures for locally recurrent neural networks with emphasis on multilayer perceptron (MLP) with infinite impulse response (IIR) synapses and its variations which include generalized output and activation feedback multilayer networks (MLN's). We propose a new gradient-based procedure called recursive backpropagation (RBP) whose on-line version, causal recursive backpropagation (CRBP), presents some advantages with respect to the other on-line training methods. The new CRBP algorithm includes as particular cases backpropagation (BP), temporal backpropagation (TBP), backpropagation for sequences (BPS), Back-Tsoi algorithm among others, thereby providing a unifying view on gradient calculation techniques for recurrent networks with local feedback. The only learning method that has been proposed for locally recurrent networks with no architectural restriction is the one by Back and Tsoi. The proposed algorithm has better stability and higher speed of convergence with respect to the Back-Tsoi algorithm, which is supported by the theoretical development and confirmed by simulations. The computational complexity of the CRBP is comparable with that of the Back-Tsoi algorithm, e.g., less that a factor of 1.5 for usual architectures and parameter settings. The superior performance of the new algorithm, however, easily justifies this small increase in computational burden. In addition, the general paradigms of truncated BPTT and RTRL are applied to networks with local feedback and compared with the new CRBP method. The simulations show that CRBP exhibits similar performances and the detailed analysis of complexity reveals that CRBP is much simpler and easier to implement, e.g., CRBP is local in space and in time while RTRL is not local in space.

  4. On-line yields obtained with the ISOLDE RILIS

    Energy Technology Data Exchange (ETDEWEB)

    Koester, U. E-mail: ulli.koster@cern.ch; Fedoseyev, V.N.; Andreyev, A.N.; Bergmann, U.C.; Catherall, R.; Cederkaell, J.; Dietrich, M.; De Witte, H.; Fedorov, D.V.; Fraile, L.; Franchoo, S.; Fynbo, H.; Georg, U.; Giles, T.; Gorska, M.; Hannawald, M.; Huyse, M.; Joinet, A.; Jonsson, O.C.; Kratz, K.L.; Kruglov, K.; Lau, Ch.; Lettry, J.; Mishin, V.I.; Oinonen, M.; Partes, K.; Peraejaervi, K.; Pfeiffer, B.; Ravn, H.L.; Seliverstov, M.D.; Thirolf, P.; Van de Vel, K.; Van Duppen, P.; Van Roosbroeck, J.; Weissman, L

    2003-05-01

    The ISOLDE resonance ionization laser ion source (RILIS) allows to ionize efficiently and selectively many metallic elements. In recent yield surveys and on-line experiments with the ISOLDE RILIS we observed {sup 23-34}Mg, {sup 26-34}Al, {sup 98-132}Cd, {sup 149}Tb, {sup 155-177}Yb, {sup 179-200}Tl, {sup 183-215}Pb and {sup 188-218}Bi. The obtained yields are presented together with measured release parameters which allow to extrapolate the release efficiency towards more exotic (short-lived) nuclides of the same elements.

  5. Integrated sensor array for on-line monitoring micro bioreactors

    NARCIS (Netherlands)

    Krommenhoek, Erik Eduard

    2007-01-01

    In this thesis the development of a microbioreactor array with integrated sensoss suitable for on-line screening of micro organisms is described. Therefore, an array of 2 micro bioreactors compatible with the 96-well microtiterplate format has been made and tested. The developed system was shown to 

  6. TELCAL: The On-line Calibration Software for ALMA

    Science.gov (United States)

    Broguière, D.; Lucas, R.; Pardo, J.; Roche, J.-C.

    2011-07-01

    The ALMA on-line calibration regroups all the operations needed to maintain the ALMA interferometer optimally tuned to successfully execute the planned observations. The results of the calibrations are used in quasi-real time by the ALMA Control System. Since the first ALMA antennas were put into operation in 2009, TELCAL has been used for all the basic calibration operations and is still being improved following the project advancement. We describe here the calibrations done by TELCAL, its relationships with the other ALMA software subsystems and, briefly, the architecture of the software based on CORBA.

  7. Molecularly imprinted polymers for on-line extraction techniques.

    Science.gov (United States)

    Moein, Mohammad M; Abdel-Rehim, Mohamed

    2015-01-01

    Recent years have seen an increasing interest in the use of molecularly imprinted polymers (MIPs) as a sorbent for different extraction methods and this is due to its high selectivity. The MIP is designed to show specificity for the analyte of interest. Moreover, MIPs show physical robustness, resistance to high temperatures and pressures, and stability in the presence of acids, bases and a wide range of organic solvents. In the present article, various novel sample preparation techniques which MIPs applied as sorbent and on-line connected with analytical instruments were highlighted and discussed. The future aspects of MIPs as well were described.

  8. Enhancing Learner Autonomy in an On-line Editing Programme

    Directory of Open Access Journals (Sweden)

    Hebe Wong

    2011-09-01

    Full Text Available Little (1999 argues that in formal educational contexts, “the basis of learner autonomy is acceptance of responsibility for one’s own learning” (p.11. An autonomous learner takes responsibility for various aspects of learning (Benson & Voller, 1997; Holec, 1981. This study examines how learner autonomy opportunities were provided at various stages of writing in an on-line editing programme for a group of electronic engineering students and how the students took charge of their language learning when receiving feedback on their technical writing. The impact on their own learning effectiveness of the decisions students made is also discussed.

  9. On-line Adaptive Radiation Treatment of Prostate Cancer

    Science.gov (United States)

    2008-01-01

    volume (GTV), mandible, rainstem, parotids , and lymph nodes. Another physician repeated he contouring on all planning and on-line images...computed entation. Note the consistency of delineation of gross olume; light blue, nodes; purple, parotid glands; green,k com ostregicomp urs on e...0.9 1.0 Mandible D S C in de x Patient # 1 2 3 4 5 6 7 0.5 0.6 0.7 0.8 0.9 1.0 Left Parotid D S C in de x Patient # Fig. 6. Dice similarity

  10. Adaptive calibration method with on-line growing complexity

    Directory of Open Access Journals (Sweden)

    Šika Z.

    2011-12-01

    Full Text Available This paper describes a modified variant of a kinematical calibration algorithm. In the beginning, a brief review of the calibration algorithm and its simple modification are described. As the described calibration modification uses some ideas used by the Lolimot algorithm, the algorithm is described and explained. Main topic of this paper is a description of a synthesis of the Lolimot-based calibration that leads to an adaptive algorithm with an on-line growing complexity. The paper contains a comparison of simple examples results and a discussion. A note about future research topics is also included.

  11. Lower Bounds and Semi On-line Multiprocessor Scheduling

    Directory of Open Access Journals (Sweden)

    T.C. Edwin Cheng

    2003-10-01

    Full Text Available We are given a set of identical machines and a sequence of jobs from which we know the sum of the job weights in advance. The jobs have to be assigned on-line to one of the machines and the objective is to minimize the makespan. An algorithm with performance ratio 1.6 and a lower bound of 1.5 is presented. This improves recent results by Azar and Regev who published an algorithm with performance ratio 1.625 for the less general problem that the optimal makespan is known in advance.

  12. On-line Monitoring and Active Control for Transformer Noise

    Science.gov (United States)

    Liang, Jiabi; Zhao, Tong; Tian, Chun; Wang, Xia; He, Zhenhua; Duan, Lunfeng

    This paper introduces the system for on-line monitoring and active noise control towards the transformer noise based on LabVIEW and the hardware equipment including the hardware and software. For the hardware part, it is mainly focused on the composition and the role of hardware devices, as well as the mounting location in the active noise control experiment. And the software part introduces the software flow chats, the measurement and analysis module for the sound pressure level including A, B, C weighting methods, the 1/n octave spectrum and the power spectrum, active noise control module and noise data access module.

  13. Robust Control Methods for On-Line Statistical Learning

    Directory of Open Access Journals (Sweden)

    Capobianco Enrico

    2001-01-01

    Full Text Available The issue of controlling that data processing in an experiment results not affected by the presence of outliers is relevant for statistical control and learning studies. Learning schemes should thus be tested for their capacity of handling outliers in the observed training set so to achieve reliable estimates with respect to the crucial bias and variance aspects. We describe possible ways of endowing neural networks with statistically robust properties by defining feasible error criteria. It is convenient to cast neural nets in state space representations and apply both Kalman filter and stochastic approximation procedures in order to suggest statistically robustified solutions for on-line learning.

  14. On-line matrix addition for detecting aerosol particles

    Institute of Scientific and Technical Information of China (English)

    ZHOU; Liuzhu; ZHU; Yuan; GUO; Xiaoyong; ZHAO; Wenwu; ZHENG; Haiyang; Gu; Xuejun; FANG; Li; ZHANG; Weijun

    2006-01-01

    Single aerosol particles were measured by matrix-assisted laser desorption/ionization (MALDI) with an aerosol time-of-flight mass spectrometer (ATOFMS). The inlet to the ATOFMS was coupled with an evaporation/condensation flow cell that allowed matrix addition by condensation onto the particles. The coated particles entered the ion source through three-stage differentially pumped capillary inlet and were then ionized by a focused 266 nm Nd:YAG laser. The mass spectra and aerodynamic size of the single particles can be obtained simultaneously. The on-line matrix addition technique makes it possible to identify biological aerosols in real-time.

  15. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  16. Security Verification of Secure MANET Routing Protocols

    Science.gov (United States)

    2012-03-22

    the destination. The route discovery phase is complete upon receipt of the RREP at the requesting node. The DYMO protocol is a simpler version of AODV ...described in this appendix. The protocols are Secure AODV (SAODV), Secure Efficient Distance Vector (SEAD), and Secure Link State Routing Protocol (SLSP...SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ENG/12-03 DEPARTMENT OF THE AIR FORCE AIR

  17. Evaluation of four subcritical response methods for on-line prediction of flutter onset in wind-tunnel tests

    Science.gov (United States)

    Ruhlin, C. L.; Watson, J. J.; Ricketts, R. H.; Doggett, R. V., Jr.

    1982-01-01

    Four subcritical response methods were evaluated for on-line use in transonic wind-tunnel tests where the flutter model is excited solely by airstream turbulence. The methods were: randomdec, power-spectral-density, peak-hold, and cross-spectrum. Subcritical response data were obtained during tests in the Langley Transonic Dynamics Tunnel of a cantilevered flutter model wing. The test procedure was to maintain a constant Mach number and increase the dynamic pressure (q) in incremental steps. The four methods provided damping trends by which the flutter mode could be tracked and extrapolated to a flutter-onset q. A hard flutter point was obtained at M = 0.82. The peak-mold and cross-spectrum methods gave reliable results and could be most readily used for on-line testing.

  18. Research of on-line detection system for power capacitor

    Science.gov (United States)

    Yao, Junda; Qian, Zheng; Yu, Hao; Xia, Jiuyun

    2016-01-01

    The hidden danger exists in the power capacitor of power system due to long-time operation under the environment of high voltage. Thus, it is possible to induce serious fault, and the on-line detection system is urgently required. In this paper, two methods of the on-line detection system are compared in order to realize the better real-time condition detection. The first method is based on the STM microprocessor with an internal 12 bit A/D converter, which converts analog signals which is arrived from the sample circuit into digital signals, and then the FFT algorithm is used to accomplish the measurement of the voltage and current values of the capacitor. The second method is based on the special electric energy metering IC, which can obtain RMS (Root Mean Square) of voltage and current by processing the sampled data of the voltage and current, and store RMS of voltage and current in its certain registers. The operating condition of the capacitor can be obtained after getting the values of voltage and current. By comparing the measuring results of two methods, the second method could achieve a higher measurement accuracy and more simple construction.

  19. Polar On-Line Acquisition Relay and Transmission System (POLARATS)

    Energy Technology Data Exchange (ETDEWEB)

    Yuracko, K.

    2004-07-15

    POLARATS (Polar On-Line Acquisition Relay And Transmission System) is being developed by YAHSGS LLC (YAHSGS) and Oak Ridge National Laboratory (ORNL) to provide remote, unattended monitoring of environmental parameters under harsh environmental conditions. In particular, instrumental design and engineering is oriented towards protection of human health in the Arctic, and with the additional goal of advancing Arctic education and research. POLARATS will obtain and transmit environmental data from hardened monitoring devices deployed in locations important to understanding atmospheric and aquatic pollutant migration as it is biomagnified in Arctic food chains. An Internet- and personal computer (PC)-based educational module will provide real time sensor data, on-line educational content, and will be integrated with workbooks and textbooks for use in middle and high school science programs. The educational elements of POLARATS include an Internet-based educational module that will instruct students in the use of the data and how those data fit into changing Arctic environments and food chains. POLARATS will: (1) Enable students, members of the community, and scientific researchers to monitor local environmental conditions in real time over the Internet; and (2) Provide additional educational benefits through integration with middle- and high-school science curricula. Information will be relayed from POLARATS devices to classrooms and libraries along with custom-designed POLARATS teaching materials that will be integrated into existing curricula to enhance the educational benefits realized from the information obtained.

  20. Increased Cortical Thickness in Professional On-Line Gamers

    Science.gov (United States)

    Hyun, Gi Jung; Shin, Yong Wook; Kim, Bung-Nyun; Cheong, Jae Hoon; Jin, Seong Nam

    2013-01-01

    Objective The bulk of recent studies have tested whether video games change the brain in terms of activity and cortical volume. However, such studies are limited by several factors including cross-sectional comparisons, co-morbidity, and short-term follow-up periods. In the present study, we hypothesized that cognitive flexibility and the volume of brain cortex would be correlated with the career length of on-line pro-gamers. Methods High-resolution magnetic resonance scans were acquired in twenty-three pro-gamers recruited from StarCraft pro-game teams. We measured cortical thickness in each individual using FreeSurfer and the cortical thickness was correlated with the career length and the performance of the pro-gamers. Results Career length was positively correlated with cortical thickness in three brain regions: right superior frontal gyrus, right superior parietal gyrus, and right precentral gyrus. Additionally, increased cortical thickness in the prefrontal cortex was correlated with winning rates of the pro-game league. Increased cortical thickness in the prefrontal and parietal cortices was also associated with higher performance of Wisconsin Card Sorting Test. Conclusion Our results suggest that in individuals without pathologic conditions, regular, long-term playing of on-line games is associated with volume changes in the prefrontal and parietal cortices, which are associated with cognitive flexibility. PMID:24474988

  1. On-line structure-lossless digital mammogram image compression

    Science.gov (United States)

    Wang, Jun; Huang, H. K.

    1996-04-01

    This paper proposes a novel on-line structure lossless compression method for digital mammograms during the film digitization process. The structure-lossless compression segments the breast and the background, compresses the former with a predictive lossless coding method and discards the latter. This compression scheme is carried out during the film digitization process and no additional time is required for the compression. Digital mammograms are compressed on-the-fly while they are created. During digitization, lines of scanned data are first acquired into a small temporary buffer in the scanner, then they are transferred to a large image buffer in an acquisition computer which is connected to the scanner. The compression process, running concurrently with the digitization process in the acquisition computer, constantly checks the image buffer and compresses any newly arrived data. Since compression is faster than digitization, data compression is completed as soon as digitization is finished. On-line compression during digitization does not increase overall digitizing time. Additionally, it reduces the mammogram image size by a factor of 3 to 9 with no loss of information. This algorithm has been implemented in a film digitizer. Statistics were obtained based on digitizing 46 mammograms at four sampling distances from 50 to 200 microns.

  2. On-Line Core Thermal-Hydraulic Model Improvement

    Energy Technology Data Exchange (ETDEWEB)

    In, Wang Kee; Chun, Tae Hyun; Oh, Dong Seok; Shin, Chang Hwan; Hwang, Dae Hyun; Seo, Kyung Won

    2007-02-15

    The objective of this project is to implement a fast-running 4-channel based code CETOP-D in an advanced reactor core protection calculator system(RCOPS). The part required for the on-line calculation of DNBR were extracted from the source of the CETOP-D code based on analysis of the CETOP-D code. The CETOP-D code was revised to maintain the input and output variables which are the same as in CPC DNBR module. Since the DNBR module performs a complex calculation, it is divided into sub-modules per major calculation step. The functional design requirements for the DNBR module is documented and the values of the database(DB) constants were decided. This project also developed a Fortran module(BEST) of the RCOPS Fortran Simulator and a computer code RCOPS-SDNBR to independently calculate DNBR. A test was also conducted to verify the functional design and DB of thermal-hydraulic model which is necessary to calculate the DNBR on-line in RCOPS. The DNBR margin is expected to increase by 2%-3% once the CETOP-D code is used to calculate the RCOPS DNBR. It should be noted that the final DNBR margin improvement could be determined in the future based on overall uncertainty analysis of the RCOPS.

  3. The Leuven isotope separator on-line laser ion source

    CERN Document Server

    Kudryavtsev, Y; Franchoo, S; Huyse, M; Gentens, J; Kruglov, K; Müller, W F; Prasad, N V S; Raabe, R; Reusen, I; Van den Bergh, P; Van Duppen, P; Van Roosbroeck, J; Vermeeren, L; Weissman, L

    2002-01-01

    An element-selective laser ion source has been used to produce beams of exotic radioactive nuclei and to study their decay properties. The operational principle of the ion source is based on selective resonant laser ionization of nuclear reaction products thermalized and neutralized in a noble gas at high pressure. The ion source has been installed at the Leuven Isotope Separator On-Line (LISOL), which is coupled on-line to the cyclotron accelerator at Louvain-la-Neuve. sup 5 sup 4 sup , sup 5 sup 5 Ni and sup 5 sup 4 sup , sup 5 sup 5 Co isotopes were produced in light-ion-induced fusion reactions. Exotic nickel, cobalt and copper nuclei were produced in proton-induced fission of sup 2 sup 3 sup 8 U. The b decay of the sup 6 sup 8 sup - sup 7 sup 4 Ni, sup 6 sup 7 sup - sup 7 sup 0 Co, sup 7 sup 0 sup - sup 7 sup 5 Cu and sup 1 sup 1 sup 0 sup - sup 1 sup 1 sup 4 Rh isotopes has been studied by means of beta-gamma and gamma-gamma spectroscopy. Recently, the laser ion source has been used to produce neutron-d...

  4. Increased cortical thickness in professional on-line gamers.

    Science.gov (United States)

    Hyun, Gi Jung; Shin, Yong Wook; Kim, Bung-Nyun; Cheong, Jae Hoon; Jin, Seong Nam; Han, Doug Hyun

    2013-12-01

    The bulk of recent studies have tested whether video games change the brain in terms of activity and cortical volume. However, such studies are limited by several factors including cross-sectional comparisons, co-morbidity, and short-term follow-up periods. In the present study, we hypothesized that cognitive flexibility and the volume of brain cortex would be correlated with the career length of on-line pro-gamers. High-resolution magnetic resonance scans were acquired in twenty-three pro-gamers recruited from StarCraft pro-game teams. We measured cortical thickness in each individual using FreeSurfer and the cortical thickness was correlated with the career length and the performance of the pro-gamers. CAREER LENGTH WAS POSITIVELY CORRELATED WITH CORTICAL THICKNESS IN THREE BRAIN REGIONS: right superior frontal gyrus, right superior parietal gyrus, and right precentral gyrus. Additionally, increased cortical thickness in the prefrontal cortex was correlated with winning rates of the pro-game league. Increased cortical thickness in the prefrontal and parietal cortices was also associated with higher performance of Wisconsin Card Sorting Test. Our results suggest that in individuals without pathologic conditions, regular, long-term playing of on-line games is associated with volume changes in the prefrontal and parietal cortices, which are associated with cognitive flexibility.

  5. Precise On-line Position Measurement for Particle Therapy

    CERN Document Server

    Actis, O; König, S

    2014-01-01

    An on-line beam position monitoring and regular beam stability tests are of utmost importance for the Quality Assurance (QA) of the patient treatment at any particle therapy facility. The Gantry${0.5 mm}2$ at the Paul Scherrer Institute uses a strip ionization chamber for the on-line beam position verification. The design of the strip chamber placed in the beam in front of the patient allows for a small beam penumbra in order to achieve a high-quality lateral beam delivery. The detector granularity and the low noise allow the reconstruction of the signals offered by Gantry${0.5 mm}2$ with a precision of about 0.1 mm. The frond-end electronics and the whole data processing sequence have been optimized for minimizing the dead time between the beam applications to about 2 ms: the charge collection is performed in about 1 ms, read-out takes place in 100 $\\mu$s while data verification and logging are completed in less than 1 ms. The sub-millimeter precision of the lateral reconstruction allows the dose inhomogenei...

  6. Fully On-line Introductory Physics with a Lab

    Science.gov (United States)

    Schatz, Michael

    We describe the development and implementation of a college-level introductory physics (mechanics) course and laboratory that is suited for both on-campus and on-line environments. The course emphasizes a ``Your World is Your Lab'' approach whereby students first examine and capture on video (using cellphones) motion in their immediate surroundings, and then use free, open-source software both to extract data from the video and to apply physics principles to build models that describe, predict, and visualize the observations. Each student reports findings by creating a video lab report and posting it online; these video lab reports are then distributed to the rest of the class for peer review. In this talk, we will discuss the student and instructor experiences in courses offered to three distinct audiences in different venues: (1) a Massively Open On-line Course (MOOC) for off-campus participants, (2) a flipped/blended course for on-campus students, and, most recently, (3) a fully-online course for off-campus students.

  7. Secure Storage Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  8. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  9. An integrated on-line irradiation and in situ live cell imaging system

    Science.gov (United States)

    Liang, Ying; Fu, Qibin; Wang, Weikang; Liu, Yu; Liu, Feng; Yang, Gen; Wang, Yugang

    2015-09-01

    Ionizing radiation poses a threat to genome integrity by introducing DNA damages, particularly DNA double-strand breaks (DSB) in cells. Understanding how cells react to DSB and maintain genome integrity is of major importance, since increasing evidences indicate the links of DSB with genome instability and cancer predispositions. However, tracking the dynamics of DNA damages and repair response to ionizing radiation in individual cell is difficult. Here we describe the development of an on-line irradiation and in situ live cell imaging system based on isotopic sources at Institute of Heavy Ion Physics, Peking University. The system was designed to irradiate cells and in situ observe the cellular responses to ionizing radiation in real time. On-line irradiation was achieved by mounting a metal framework that hold an isotopic γ source above the cell culture dish for γ irradiation; or by integrating an isotopic α source to an objective lens under the specialized cell culture dish for α irradiation. Live cell imaging was performed on a confocal microscope with an environmental chamber installed on the microscope stage. Culture conditions in the environment chamber such as CO2, O2 concentration as well as temperature are adjustable, which further extends the capacity of the system and allows more flexible experimental design. We demonstrate the use of this system by tracking the DSB foci formation and disappearance in individual cells after exposure to irradiation. On-line irradiation together with in situ live cell imaging in adjustable culture conditions, the system overall provides a powerful tool for investigation of cellular and subcellular response to ionizing radiation under different physiological conditions such as hyperthermia or hypoxia.

  10. An integrated on-line irradiation and in situ live cell imaging system

    Energy Technology Data Exchange (ETDEWEB)

    Liang, Ying; Fu, Qibin; Wang, Weikang; Liu, Yu; Liu, Feng; Yang, Gen, E-mail: gen.yang@pku.edu.cn; Wang, Yugang

    2015-09-01

    Ionizing radiation poses a threat to genome integrity by introducing DNA damages, particularly DNA double-strand breaks (DSB) in cells. Understanding how cells react to DSB and maintain genome integrity is of major importance, since increasing evidences indicate the links of DSB with genome instability and cancer predispositions. However, tracking the dynamics of DNA damages and repair response to ionizing radiation in individual cell is difficult. Here we describe the development of an on-line irradiation and in situ live cell imaging system based on isotopic sources at Institute of Heavy Ion Physics, Peking University. The system was designed to irradiate cells and in situ observe the cellular responses to ionizing radiation in real time. On-line irradiation was achieved by mounting a metal framework that hold an isotopic γ source above the cell culture dish for γ irradiation; or by integrating an isotopic α source to an objective lens under the specialized cell culture dish for α irradiation. Live cell imaging was performed on a confocal microscope with an environmental chamber installed on the microscope stage. Culture conditions in the environment chamber such as CO{sub 2}, O{sub 2} concentration as well as temperature are adjustable, which further extends the capacity of the system and allows more flexible experimental design. We demonstrate the use of this system by tracking the DSB foci formation and disappearance in individual cells after exposure to irradiation. On-line irradiation together with in situ live cell imaging in adjustable culture conditions, the system overall provides a powerful tool for investigation of cellular and subcellular response to ionizing radiation under different physiological conditions such as hyperthermia or hypoxia.

  11. FEDIX on-line information service: Design, develop, test, and implement, an on-line research and education information service

    Energy Technology Data Exchange (ETDEWEB)

    Rodman, J.A.

    1992-01-01

    The FEDIX Annual Status Report provides details regarding an on-line information project designed, developed and implemented by Federal Information Exchange, Inc., a diversified information services company. This document details the project design activities, summarizes the developmental phases of the project and describes the implementation activities generated to fulfill the project's objectives. The information contained in this document illustrates FIE's continuing commitment to serve as the link that facilitates the dissemination of federal information to the education community. This report reviews the project accomplishments and describes intended service enhancements.

  12. BOOK REVIEW: ON-LINE EDUCATION: AN EMANCIPATING VISION

    Directory of Open Access Journals (Sweden)

    Reviewed by Dr. Abdullah KUZU

    2006-04-01

    courses. The courses are presented as educational projects in which several methodological strategies are considered, such as: brainstorming, work groups, group dynamics, questionnaires, and direct interviews in on-line time. While making a presentation of the structure of this type of course, a permanent participation of the people involved in the educational process should be encouraged. This interaction will allow the establishing of a foundation for other types of instruments that enrich the project, meaning that it will suggest a permanent systematization of the performed work, during and afterwards, thus outlining the collective work. During the creation process of WEB courses, it has to be considered that these are "oriented by popular education principles, the rhizome, by participation design, by ultiple subjects and by pedagogical mediations. According to our view, it involves a concrete exercise of the participants, a subject treatment of both the learning and the form. In the same way, it implies a socio-historical situation of the constituents of the project, an organization according to the methodologies that was constructed by them". With regard to the actual use of the proposition, it could be said that because of the moment and the conjuncture we are living in, it demands an educational situation of permanent innovation that provides new meaning with respect to the education of the teacher and, for that, the pedagogical mediation processes and the participation programs of web courses have to be acknowledged as relevant. Here it is also worth noting that this proposal does not only include a epistemological dimension but also presents in an outstanding way the 'how, why and for what' of long distance education by exposing several important points of the LDE–Long Distance Education, utilizing an emancipating vision that joins a series of pertinent ideas to a different model for the development of courses, to their processes, as well as to the more

  13. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  14. On-Line RSSI-Range Model Learning for Target Localization and Tracking

    Directory of Open Access Journals (Sweden)

    José Ramiro Martínez-de Dios

    2017-08-01

    Full Text Available The interactions of Received Signal Strength Indicator (RSSI with the environment are very difficult to be modeled, inducing significant errors in RSSI-range models and highly disturbing target localization and tracking methods. Some techniques adopt a training-based approach in which they off-line learn the RSSI-range characteristics of the environment in a prior training phase. However, the training phase is a time-consuming process and must be repeated in case of changes in the environment, constraining flexibility and adaptability. This paper presents schemes in which each anchor node on-line learns its RSSI-range models adapted to the particularities of its environment and then uses its trained model for target localization and tracking. Two methods are presented. The first uses the information of the location of anchor nodes to dynamically adapt the RSSI-range model. In the second one, each anchor node uses estimates of the target location –anchor nodes are assumed equipped with cameras—to on-line adapt its RSSI-range model. The paper presents both methods, describes their operation integrated in localization and tracking schemes and experimentally evaluates their performance in the UBILOC testbed.

  15. [The development of acetylene on-line monitoring technology based on laser absorption spectrum].

    Science.gov (United States)

    He, Ying; Zhang, Yu-jun; Kan, Rui-feng; Xia, Hui; Wang, Min; Cui, Xiao-juan; Chen, Jiu-ying; Chen, Dong; Liu, Wen-qing; Liu, Jian-guo

    2008-10-01

    As one of the materials in organic chemical industry, acetylene has been used in many aspects of chemical industry. But acetylene is a very dangerous inflammable and explosive gas, so it needs in-situ monitoring during industrial storage and production. Tunable diode laser absorption spectroscopy (TDLAS) technology has been widely used in atmospheric trace gases detection, because it has a lot of advantageous characteristics, such as high sensitivity, good selectivity, and rapid time response. The distribution characteristics of absorption lines of acetylene in near infrared band were studied, and then the system designing scheme of acetylene on-line monitoring based on near infrared tunable diode laser absorption spectroscopy technology was discussed in detail. Moreover, the system of experiment measurement was set up and the method of signal detection and the algorithm of concentration inversion were studied. In addition, the sample cell with a path length of 10 cm, and the acetylene of different known concentrations were measured. As a result, the detection limit obtained reached 1.46 cm3 x m(-3). Finally the dynamic detection experiment was carried out, and the measurement result is stable and reliable, so the design of the system is practicable through experiment analysis. On-line acetylene leakage monitoring system was developed based on the experiment, and it is suitable for giving a leakage alarm of acetylene during its storage, transportation and use.

  16. Differential surface models for tactile perception of shape and on-line tracking of features

    Science.gov (United States)

    Hemami, H.

    1987-01-01

    Tactile perception of shape involves an on-line controller and a shape perceptor. The purpose of the on-line controller is to maintain gliding or rolling contact with the surface, and collect information, or track specific features of the surface such as edges of a certain sharpness. The shape perceptor uses the information to perceive, estimate the parameters of, or recognize the shape. The differential surface model depends on the information collected and on the a priori information known about the robot and its physical parameters. These differential models are certain functionals that are projections of the dynamics of the robot onto the surface gradient or onto the tangent plane. A number of differential properties may be directly measured from present day tactile sensors. Others may have to be indirectly computed from measurements. Others may constitute design objectives for distributed tactile sensors of the future. A parameterization of the surface leads to linear and nonlinear sequential parameter estimation techniques for identification of the surface. Many interesting compromises between measurement and computation are possible.

  17. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  18. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  19. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  20. An SLA based SaaS Security Level

    Directory of Open Access Journals (Sweden)

    Yongjing A. Li

    2013-07-01

    Full Text Available This paper proposes a data security protection strategy of the SaaS mode -the SLA based SaaS Security Level. At the same time, it gives concept model and implementation architecture of the security scheme which based on the SaaS Security Level. The SLA based SaaS Security Level takes the requirements of tenants to the data security as a starting point, and it mainly relates to data security of the data center, data security of the servers and data security of the clients. This Security Level can better meet diversified users needs than the traditional security model. According to the tenants desired service number and the protection degree of data information, they can dynamically select different levels of the security strategies. Then, according to the dynamic changes of SLA, the SaaS vendors can adjust data protection strategy of the user timely. For supporting our SaaS Security Level, we build SSM (SaaS Security Model test-bed. On the SSM test-bed, we have done some experiments, which confirmed our SaaS Security Level is feasible and easy to use.  

  1. Configuration Database for BaBar On-line

    Energy Technology Data Exchange (ETDEWEB)

    Salnikov, Andrei

    2003-05-27

    The configuration database is one of the vital systems in the BaBar on-line system. It provides services for the different parts of the data acquisition system and control system, which require run-time parameters. The original design and implementation of the configuration database played a significant role in the successful BaBar operations since the beginning of experiment. Recent additions to the design of the configuration database provide better means for the management of data and add new tools to simplify main configuration tasks. We describe the design of the configuration database, its implementation with the Objectivity/DB object-oriented database, and our experience collected during the years of operation.

  2. On-line corrosion monitoring in district heating systems

    DEFF Research Database (Denmark)

    Richter, Sonja; Thorarinsdottir, R.I.; Hilbert, Lisbeth Rischel

    2004-01-01

    Traditionally corrosion monitoring in district heating systems has been performed offline via weight loss coupons. These measurements give information about the past and not the present situation and require long exposure time (weeks or months). The good quality of district heating medium makes...... corrosion monitoring a challenge. Under normal conditions the pH is high (app. 9), conductivity is low (app. 10-200 µS/cm) and the concentration of dissolved oxygen is negligible. The low corrosion rates (in the order of µm/y) are difficult to measure and furthermore, factors such as hydrogen sulphide......), Electrochemical Noise (EN) and Zero Resistance Ammetry (ZRA). Electrochemical Resistance (ER) has also been used to measure corrosion. The method traditionally only measures corrosion off-line but with newly developed high-sensitive ER technique developed by MetriCorr in Denmark, on-line monitoring is possible...

  3. The Task Manager for the LHCb On-Line Farm

    CERN Document Server

    Bonifazi, F; Carbone, A; Galli, D; Gregori, D; Marconi, U; Peco, G; Vagnoni, V

    2004-01-01

    The Task Manager is a utility to start, stop and list processes on the on-line farm. Each process started by the Task Manager has a string environment variable set, named UTGID (User defined unique Thread Group Identifier) which allows to identify the process. The Task Manager uses the UTGID to list the running processes and to identify the processes to be stopped. It has also the ability to start a process using a particular user name and to set the scheduler type and the priority for the process itself. The Task Manager package includes a Linux DIM server (tmSrv), four Linux command line DIM clients (tmStart, tmLs, tmKill and tmStop) and a JCOP (Joint Control Project) PVSS client.

  4. On-line Test for Train Communication Based System

    Institute of Scientific and Technical Information of China (English)

    Zeng Xiaoqing; Masayuki Matsumoto; Kinji Mori; XU Fucang

    2002-01-01

    This paper gives out a new train automatic control system, which is based on train communication, and proposes a high assurance method to construct the system from current system. In current automatic train control (ATC) system, the central logic device detects position of each train and calculates permissible speed of each blocking section. Therefore, the central logic device controls speed of all trains. On the contrary, in the new system proposed in this paper, there is no central logical device and, train can communicate each other. The train detects the position and calculates the permissible speed itself according to the received position information of the preceding train. In the traditional method of changing an old system to a new one, test must be done off-line.While the integration technique proposed in this paper achieves on-line properties, and high assurance can be satisfied.

  5. On-line methods for rotorcraft aeroelastic mode identification

    Science.gov (United States)

    Molusis, J. A.; Kleinman, D. L.

    1982-01-01

    The requirements for the on-line identification of rotorcraft aeroelastic blade modes from random response test data are presented. A recursive maximum likelihood (RML) technique is used in conjunction with a bandpass filter to identify isolated blade mode damping and frequency. The RML technique is demonstrated to have excellent convergence characteristics in random measurement noise and random process noise excitation. The RML identification technique uses an ARMA representation for the aeroelastic stochastic system and requires virtually no user interaction while providing accurate confidence bands on the parameter estimates. Comparisons are made with an off-line Newton type maximum likelihood algorithm which uses a state variable model representation. Results are presented from simulation random response data which quantify the identifed parameter convergence behavior for various levels of random excitation which is typical of wind tunnel turbulence levels. The RML technique is applied to hingless rotor test data from the NASA Langley Research Center Helicopter Hover Facility.

  6. An on-line method in studying music parsing.

    Science.gov (United States)

    Berent, I; Perfetti, C A

    1993-03-01

    Listening to music entails the construction of a mental representation based on partial and ambiguous information. This study examines an experimental method that reflects such parsing decisions on-line by detecting the cognitive load resulting from temporary parsing failures. The method investigated was a divided attention paradigm in which listening to music was the primary task and click detection was a concurrent secondary task. It was hypothesized that increasing the complexity of the primary task by introducing an unprepared chromatic modulation results in an increase in response latencies to a click presented immediately after the modulatory shift. The support of this prediction by musicians' data provides evidence for the sensitivity of the paradigm. The failure of non-musicians to reflect the expected load is attributed to their attention-allocation strategy. These results are discussed in terms of their implications on the view of the musical parser as deterministic.

  7. 3rd Computer Science On-line Conference

    CERN Document Server

    Senkerik, Roman; Oplatkova, Zuzana; Silhavy, Petr; Prokopova, Zdenka

    2014-01-01

    This book is based on the research papers presented in the 3rd Computer Science On-line Conference 2014 (CSOC 2014).   The conference is intended to provide an international forum for discussions on the latest high-quality research results in all areas related to Computer Science. The topics addressed are the theoretical aspects and applications of Artificial Intelligences, Computer Science, Informatics and Software Engineering.   The authors provide new approaches and methods to real-world problems, and in particular, exploratory research that describes novel approaches in their field. Particular emphasis is laid on modern trends in selected fields of interest. New algorithms or methods in a variety of fields are also presented.   This book is divided into three sections and covers topics including Artificial Intelligence, Computer Science and Software Engineering. Each section consists of new theoretical contributions and applications which can be used for the further development of knowledge of everybod...

  8. On-Line Adaptive Radiation Therapy: Feasibility and Clinical Study

    Directory of Open Access Journals (Sweden)

    Taoran Li

    2010-01-01

    Full Text Available The purpose of this paper is to evaluate the feasibility and clinical dosimetric benefit of an on-line, that is, with the patient in the treatment position, Adaptive Radiation Therapy (ART system for prostate cancer treatment based on daily cone-beam CT imaging and fast volumetric reoptimization of treatment plans. A fast intensity-modulated radiotherapy (IMRT plan reoptimization algorithm is implemented and evaluated with clinical cases. The quality of these adapted plans is compared to the corresponding new plans generated by an experienced planner using a commercial treatment planning system and also evaluated by an in-house developed tool estimating achievable dose-volume histograms (DVHs based on a database of existing treatment plans. In addition, a clinical implementation scheme for ART is designed and evaluated using clinical cases for its dosimetric qualities and efficiency.

  9. The Monitor System for the LHCb on-line farm

    CERN Document Server

    Bonifazi, F; Carbone, A; Galli, D; Gregori, D; Marconi, U; Peco, G; Vagnoni, V

    2005-01-01

    The aim of the LHCb on-line farm Monitor System is to keep under control all the working indicators which are relevant for the farm operation, and to set the appropriate alarms whenever an error or a critical condition comes up. Since the most stressing tasks of the farm are the data transfer and processing, relevant indicators includes the CPU and the memory load of the system, the network interface and the TCP/IP stack parameters, the rates of the interrupts raised by the network interface card and the detailed status of the running processes. The monitoring of computers’ physical conditions (temperatures, fan speeds and motherboard voltages) are the subject of a separate technical note, since they are accessed in a different way, by using the IPMI protocol.

  10. The Message Logger for the LHCb on-line farm

    CERN Document Server

    Bonifazi, F; Carbone, A; Galli, D; Gregori, D; Marconi, U; Peco, G; Vagnoni, V

    2005-01-01

    The Message Logger is a utility which provide a logger facility for the processes running on the nodes of the on-line farm. It can also be used to collect the processes stdout/stderr. The Message Logger can be exploited using two different policies: either as a no-drop logger facility (messages cannot be lost, but a write to the logger facility blocks in case of full-buffer condition, due e.g. to a network congestion) or as a congestion-proof logger facility (a write to the logger facility never locks even in case of network congestion, but, in this case, messages are dropped). The Message Logger package includes a Linux DIM server (logSrv), a Linux terminal/command-line DIM client (logViewer) and a PVSS DIM client.

  11. A Fingerprint Minutiae Matching Method Based on Line Segment Vector

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Minutiae-based fingerprint matching is the most commonly used in an automatic fingerprint identification system. In this paper, we propose a minutia matching method based on line segment vector. This method uses all the detected minutiae (the ridge ending and the ridge bifurcation) in a fingerprint image to create a set of new vectors (line segment vector). Using these vectors, we can determine a truer reference point more efficiently. In addition, this new minutiae vector can also increase the accuracy of the minutiae matching. By experiment on the public domain collections of fingerprint images fvc2004 DB3 set A and DB4 set A, the result shows that our algorithm can obtain an improved verification performance.

  12. A versatile apparatus for on-line emission channeling experiments

    CERN Document Server

    da Silva, Manuel Ribeiro; Correia, João Guilherme; Amorim, Lígia Marina; Pereira, Lino Miguel da Costa

    2013-01-01

    The concept and functionality of an apparatus dedicated to emission channeling experiments using short-lived isotopes on-line at ISOLDE/CERN is described. The setup is assembled in two functional blocks - (a) base stand including beam collimation, implantation and measurement chamber, cryogenic extension, and vacuum control system and - (b) Panmure goniometer extension including maneuvering cradle and sample heating furnace. This setup allows for in situ implantation and sample analysis in the as-implanted state and upon cooling down to 50 K and during annealing up to 1200 K. The functionality of the setup will be illustrated with the example of establishing the lattice location of $^{56}$Mn probes implanted into GaAs.

  13. BCal: an on-line Bayesian radiocarbon calibration tool

    Directory of Open Access Journals (Sweden)

    Caitlin E. Buck

    1999-09-01

    Full Text Available In this paper we describe newly launched software for on-line Bayesian calibration of archaeological radiocarbon determinations. The software is known as BCal and we invite members of the world-wide archaeological research community to use it should they so wish. All that is required to gain access to the software is a computer connected to the Internet with a modern World-wide Web browser (of the sort you are probably using to read this. BCal does not require access to any additional 'Plug-ins' on your machine. Since the computations needed to obtain the calibrations are undertaken on the BCal server, if you have enough computer power to run your World-wide Web browser you have enough power to use BCal.

  14. Parity Codes Used for On-Line Testing in FPGA

    Directory of Open Access Journals (Sweden)

    P. Kubalík

    2005-01-01

    Full Text Available This paper deals with on-line error detection in digital circuits implemented in FPGAs. Error detection codes have been used to ensure the self-checking property. The adopted fault model is discussed. A fault in a given combinational circuit must be detected and signalized at the time of its appearance and before further distribution of errors. Hence safe operation of the designed system is guaranteed. The check bits generator and the checker were added to the original combinational circuit to detect an error during normal circuit operation. This concurrent error detection ensures the Totally Self-Checking property. Combinational circuit benchmarks have been used in this work in order to compute the quality of the proposed codes. The description of the benchmarks is based on equations and tables. All of our experimental results are obtained by XILINX FPGA implementation EDA tools. A possible TSC structure consisting of several TSC blocks is presented. 

  15. PROPOSITION OF A DYNAMIC MODEL FOR MANAGING SECURITY INFORMATION ON INDUSTRIAL ENVIRONMENTS PROPOSIÇÃO DE UM MODELO DINÂMICO DE GESTÃO DE SEGURANÇA DA INFORMAÇÃO PARA AMBIENTES INDUSTRIAIS

    Directory of Open Access Journals (Sweden)

    Alexandre Dias da Silva

    2010-12-01

    Full Text Available The security information exchanged in industrial environment is a key factor for the success of modern organizations, because it refers to characteristics of the product and its manufacturing process. Such information is very sensitive and cannot be disclosed to competitors, under penalty of incurrence in competitiveness loss. The ongoing computerization brings benefits to the industry as it increases cooperation between people, but it also increases the vulnerability of information security. As a consequence, information security management models also need to change. This paper presents a bibliographic review about security issues concerning information management and proposes a dynamic management model in which people interaction, cooperation and motivation (senior management, sector managers and employees are prioritized to achieve the new information security management requirements: responsibility, trust and ethics. A segurança da informação que circula em ambiente de trabalho industrial é um fator fundamental para o sucesso das organizações modernas, pois, em geral, se refere a características do produto e de seu processo de fabricação, que são bastante sensíveis e não podem ser divulgadas para concorrentes, sob pena de perda de competitividade. A constante informatização traz benefícios às indústrias, pois aumenta a cooperação entre as pessoas, porém incrementa as vulnerabilidades da segurança da informação. Este incremento no nível de informatização é um fator que tem provocado mudança nos modelos de gestão de segurança da informação. Este artigo parte de uma pesquisa bibliográfica sobre os problemas relacionados à segurança da informação para, em seguida, propor um modelo dinâmico de gestão da segurança da informação em que a interação, a cooperação e a motivação das pessoas (alta-gerência, chefes e funcionários são priorizadas para atender aos novos requisitos da gestão da seguran

  16. A Comparison of Multiscale Permutation Entropy Measures in On-Line Depth of Anesthesia Monitoring

    Science.gov (United States)

    Li, Xiaoli; Li, Duan; Li, Yongwang; Ursino, Mauro

    2016-01-01

    Objective Multiscale permutation entropy (MSPE) is becoming an interesting tool to explore neurophysiological mechanisms in recent years. In this study, six MSPE measures were proposed for on-line depth of anesthesia (DoA) monitoring to quantify the anesthetic effect on the real-time EEG recordings. The performance of these measures in describing the transient characters of simulated neural populations and clinical anesthesia EEG were evaluated and compared. Methods Six MSPE algorithms—derived from Shannon permutation entropy (SPE), Renyi permutation entropy (RPE) and Tsallis permutation entropy (TPE) combined with the decomposition procedures of coarse-graining (CG) method and moving average (MA) analysis—were studied. A thalamo-cortical neural mass model (TCNMM) was used to generate noise-free EEG under anesthesia to quantitatively assess the robustness of each MSPE measure against noise. Then, the clinical anesthesia EEG recordings from 20 patients were analyzed with these measures. To validate their effectiveness, the ability of six measures were compared in terms of tracking the dynamical changes in EEG data and the performance in state discrimination. The Pearson correlation coefficient (R) was used to assess the relationship among MSPE measures. Results CG-based MSPEs failed in on-line DoA monitoring at multiscale analysis. In on-line EEG analysis, the MA-based MSPE measures at 5 decomposed scales could track the transient changes of EEG recordings and statistically distinguish the awake state, unconsciousness and recovery of consciousness (RoC) state significantly. Compared to single-scale SPE and RPE, MSPEs had better anti-noise ability and MA-RPE at scale 5 performed best in this aspect. MA-TPE outperformed other measures with faster tracking speed of the loss of unconsciousness. Conclusions MA-based multiscale permutation entropies have the potential for on-line anesthesia EEG analysis with its simple computation and sensitivity to drug effect

  17. On-line alkali detector based on surface ionization

    Energy Technology Data Exchange (ETDEWEB)

    Olsson, J.G.; Loenn, B.; Jaeglid, B.; Engvall, K.; Pettersson, J.B.C. [Chalmers University of Technology, Goeteborg (Sweden). Dept. of Physical Chemistry GU

    1998-12-31

    This project adapts a new on-line alkali measurement technique to coal and biomass combustion and gasification. Alkali metal atoms are known to easily ionize in contact with hot metal surfaces, and the instrument is based on this principle called surface ionization (SI). The primary parts of the detector are a platinum filament and an ion collector. The platinum filament is supported between two electrodes and heated to the temperature for alkali vaporization in ionic form. The ion collector is situated close to the filament. The measured current is proportional to the arrival rate of alkali atoms onto the filament. Laboratory tests were performed on detector sensitivity, detection limit, and time response. Similar sensitivity to both sodium and potassium regardless of molecular form was found. The time response of the detector is determined to be approximately 1 ms enabling it to monitor fast concentration changes in flue gas. Particles with a size below 5 nm melt completely on the hot platinum surface and give similar signals. For larger particles, the ionization efficiency is not 100% and depends on the type of salt. This problem can be overcome with an alternative filament configuration. The detector function was tested in a laboratory high pressure furnace using different fuel samples, atmospheres, and pressures. Alkali release from coal in general is lower than for biomass samples, rate constants and activation energies for alkali release were determined. Measurements were carried out in a biomass pyrolysis apparatus and a gasification pilot plant. The detector function was not influenced by a high concentration of hydrocarbons in the gas phase, and the measurements confirmed detector function in a hostile environment. The detector performed well in laboratory tests, and is a strong candidate for further development into a standard on-line monitor of alkali species in hot flue gas. 10 refs., 16 figs.

  18. Review of Worcestershire On-line Fabric Type Series website

    Directory of Open Access Journals (Sweden)

    Beverley Nenk

    2003-06-01

    Full Text Available The study of archaeological ceramics is advanced through the creation and development of regional and national pottery type-series, which contain samples of each type of pottery identified from a particular area or region. Pottery researchers working in any period, from prehistoric to post-medieval, require access to such type-series, and to their associated data, in order to be able to advance the identification of all types of pottery, not only those types produced in the local area, but those produced in surrounding regions, as well as those imported from abroad. The publication of such type-series, as well as their accessibility to researchers, is essential if the information they contain is to be disseminated. The development of the Worcestershire On-Line Fabric Type Series is the first stage in a remarkable project designed to make the complete fabric and form type series for Worcestershire ceramics accessible on the internet. As part of the Historic Environment Record for Worcestershire, formerly the Sites and Monuments Record, it is designed to improve access to finds and environmental data, with the aim of encouraging and facilitating research. Funded by Worcestershire County Council as part of its commitment to e-government, it is being developed by Worcestershire County Council Archaeology Service with OxfordArchDigital. It is one of a proposed series of on-line specialist resources (to include, for example, clay pipes, environmental archaeology, flint tools, historic buildings, which are also designed to stand alone as research tools. The ceramics website is the first part of Pottery in Perspective, a web-based project to provide information on the pottery used and made in Worcestershire from prehistory to c. 1900AD.

  19. Dairy plants financial and economic security evaluation

    Directory of Open Access Journals (Sweden)

    Ganna Misko

    2015-06-01

    Full Text Available The essence of the concept “financial and economic security of the enterprise” is covered. Methodological approaches to the enterprise financial and economic security evaluation are considered, enabling the method of index numberrating score of the enterprise financial and economic security to be found. Dynamics of milk anddairy production in Ukraine has been studied. Ukrainian regions leading in liquid processed milk production have been identified. Dynamics of milk and dairy production per man has been analyzed which allowed to find out the annual increase in demand per man. Integrated index of the dairy enterprise financial and economic security has been evaluated. As a result, the ways to increase the managerial efficiency of financial and economic security of the following enterprises:PJSC "Dubnomoloko", PJSC "Kupyans'ki milk canning plant", PJSC the "Yagotyns'ki creamery", PJSC the "Pervomais'ki milk canning plant" are offered.

  20. Dynamics

    CERN Document Server

    Goodman, Lawrence E

    2001-01-01

    Beginning text presents complete theoretical treatment of mechanical model systems and deals with technological applications. Topics include introduction to calculus of vectors, particle motion, dynamics of particle systems and plane rigid bodies, technical applications in plane motions, theory of mechanical vibrations, and more. Exercises and answers appear in each chapter.

  1. On-line evaluating on quality of mild steel joints in resistance spot welding

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    A method was developed to realize quality evaluation on every weld-spot in resistance spot welding based on information processing of artificial intelligent. Firstly, the signals of welding current and welding voltage, as information source, were synchronously collected. Input power and dynamic resistance were selected as monitoring waveforms. Eight characteristic parameters relating to weld quality were extracted from the monitoring waveforms. Secondly, tensile-shear strength of the spot-welded joint was employed as evaluating target of weld quality. Through correlation analysis between every two parameters of characteristic vector, five characteristic parameters were reasonably selected to found a mapping model of weld quality estimation. At last, the model was realized by means of the algorithms of Radial Basic Function neural network and sample matrixes. The results showed validations by a satisfaction in evaluating weld quality of mild steel joint on-line in spot welding process.

  2. Multiple-function multi-input/multi-output digital control and on-line analysis

    Science.gov (United States)

    Hoadley, Sherwood T.; Wieseman, Carol D.; Mcgraw, Sandra M.

    1992-01-01

    The design and capabilities of two digital controller systems for aeroelastic wind-tunnel models are described. The first allowed control of flutter while performing roll maneuvers with wing load control as well as coordinating the acquisition, storage, and transfer of data for on-line analysis. This system, which employs several digital signal multi-processor (DSP) boards programmed in high-level software languages, is housed in a SUN Workstation environment. A second DCS provides a measure of wind-tunnel safety by functioning as a trip system during testing in the case of high model dynamic response or in case the first DCS fails. The second DCS uses National Instruments LabVIEW Software and Hardware within a Macintosh environment.

  3. On-line Fault Diagnosis in Industrial Processes Using Variable Moving Window and Hidden Markov Model

    Institute of Scientific and Technical Information of China (English)

    周韶园; 谢磊; 王树青

    2005-01-01

    An integrated framework is presented to represent and classify process data for on-line identifying abnormal operating conditions. It is based on pattern recognition principles and consists of a feature extraction step, by which wavelet transform and principal component analysis are used to capture the inherent characteristics from process measurements, followed by a similarity assessment step using hidden Markov model (HMM) for pattern comparison. In most previous cases, a fixed-length moving window was employed to track dynamic data, and often failed to capture enough information for each fault and sometimes even deteriorated the diagnostic performance. A variable moving window, the length of which is modified with time, is introduced in this paper and case studies on the Tennessee Eastman process illustrate the potential of the proposed method.

  4. On-line tracking of pulverized coal and biomass fuels through flame spectrum analysis

    Institute of Scientific and Technical Information of China (English)

    迟天阳; 张宏建

    2007-01-01

    This paper presents a new approach to the on-line tracking of pulverized coal and biomass fuels through flame spectrum analysis. A flame detector containing four photodiodes is used to derive multiple signals covering a wide spectrum of the flame from visible, near-infrared and mid-infrared spectral bands as well as a part of far-infrared band. Different features are extracted in time and frequency domains to identify the dynamic "fingerprints" of the flame. Fuzzy logic inference techniques are employed to combine typical features together and infer the type of fuel being burnt. Four types of pulverized coal and five types of biomass are burnt on a laboratory-scale combustion test rig. Results obtained demonstrate that this approach is capable of tracking the type of fuel under steady combustion conditions.

  5. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  6. Social Security Administration

    Science.gov (United States)

    ... Languages Sign in / up The United States Social Security Administration Cost-Of-Living Adjustment (COLA) Information about ... replacement Medicare card Change of Address my Social Security Check out your Social Security Statement , change your ...

  7. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  8. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  9. Security and Security Complex: Operational Concepts

    OpenAIRE

    Luis Tomé

    2010-01-01

    Security is one of the most ambiguous, contested, and debated ideas in the conceptual framework of international relations. The "traditional" perspective has been severely contested as new approaches develop, and the concept of security has been reworked in all its fundamental components and dimensions, from object and reference to range and security instruments. Likewise, the discussion over the definition and characterization of international security systems, namely regarding competitive s...

  10. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  11. Institutionalizing information security.

    OpenAIRE

    2008-01-01

    Information security has become a much discussed subject all over the world in the last few years. This is because information security is no longer a luxury, but a necessity in all organisations. The securing of information is not an easy task because information security is flexible and always seems to be in a state of development. This means that information security has undergone different development changes due to new technologies in the past few years. Information security became promi...

  12. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  13. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  14. A Novel Advanced Heap Corruption and Security Method

    Directory of Open Access Journals (Sweden)

    Arundhati Walia

    2012-05-01

    Full Text Available Heap security has been a major concern since the past two decades. Recently many methods have been proposed to secure heap i.e. to avoid heap overrun and attacks. The paper describes a method suggested to secure heap at the operating system level. Major emphasis is given to Solaris operating systems dynamic memory manager. When memory is required dynamically during runtime, the SysVmalloc acts as a memory allocator.Vmalloc allocates the chunks of memory in the form of splay tree structure. A self adjusting binary tree structure is reviewed in the paper, moreover major security issue to secure heap area is also suggested in the paper.

  15. Simulation and experimental research on line throwing rocket with flight

    Institute of Scientific and Technical Information of China (English)

    Wen-bin GU; Ming LU; Jian-qing LIU; Qin-xing DONG; Zhen-xiong WANG; Jiang-hai CHEN

    2014-01-01

    The finite segment method is used to model the line throwing rocket system. A dynamic model of line throwing rocket with flight motion based on Kane’s method is presented by the kinematics description of the system and the consideration of the forces acting on the system. The experiment designed according to the parameters of the dynamic model is made. The simulation and experiment results, such as range, velocity and flight time, are compared and analyzed. The simulation results are basically agreed with the test data, which shows that the flight motion of the line throwing rocket can be predicted by the dynamic model. A theoretical model and guide for the further research on the disturbance of rope and the guidance, flight control of line throwing rocket are provided by the dynamic modeling.

  16. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  17. Determination of anions with an on-line capillary electrophoresis method; Anionien on-line maeaeritys kapillaarielektroforeesilla - MPKT 10

    Energy Technology Data Exchange (ETDEWEB)

    Siren, H.; Saerme, T.; Kotiaho, T.; Hiissa, T.; Savolahti, P.; Komppa, V. [VTT Chemical Technology, Espoo (Finland)

    1998-12-31

    The aim of the study was to set-up an on-line capillary electrophoresis method for determination of anions in process waters of pulp and paper industry with exporting the results to the process control system of the mill. The quantification is important, since it will give information about the possible causes of precipitation. In recent years, the capillary electrophoresis (CE) due to its high separation efficiency has been shown as a method to take into consideration when analyzing chemical species ranging from small inorganic anions to different macromolecules. Many compounds are not easily detected in their native state, why analysis methods must be developed to improve their detection. Especially, small inorganic and organic anions which do not have chromophores are not sensitive enough for direct-UV detection. In such analyses the anions are mostly detected with indirect-UV technique. Capillary electrophoresis instruments are used to analyze samples in off-line, which seldom represent the situation in process. Therefore, on-line instrument technology with autoanalyzing settings will be needed in quality control. The development of a fully automatic capillary electrophoresis system is underway in co-operation with KCL (The Finnish Pulp and Paper Research Institute). In our research, we have first concentrated on the determination of sulphate in waters of paper industry. The method used for detection of sulphate is based on indirect-UV detection with CE, where the background electrolyte (BGE) is an absorbing mixture of secondary amines. The whole procedure for quantification of sulphate is performed within 15 minutes, after which a new sample is analyzed automatically. The only sample pretreatment is filtration, which is necessary before analysis. The concentrations of sulphate in process waters tested were between 300 and 800 ppm. Our tests show that a simultaneous determination of chloride, sulphate, nitrate, nitrite, sulphite, carbonate and oxalate is also

  18. Markov Decision Process Based Energy-Efficient On-Line Scheduling for Slice-Parallel Video Decoders on Multicore Systems

    CERN Document Server

    Mastronarde, Nicholas; Atienza, David; Frossard, Pascal; van der Schaar, Mihaela

    2011-01-01

    We consider the problem of energy-efficient on-line scheduling for slice-parallel video decoders on multicore systems. We assume that each of the processors are Dynamic Voltage Frequency Scaling (DVFS) enabled such that they can independently trade off performance for power, while taking the video decoding workload into account. In the past, scheduling and DVFS policies in multi-core systems have been formulated heuristically due to the inherent complexity of the on-line multicore scheduling problem. The key contribution of this report is that we rigorously formulate the problem as a Markov decision process (MDP), which simultaneously takes into account the on-line scheduling and per-core DVFS capabilities; the separate power consumption of the processor cores and caches; and the loss tolerant and dynamic nature of the video decoder's traffic. In particular, we model the video traffic using a Direct Acyclic Graph (DAG) to capture the precedence constraints among frames in a Group of Pictures (GOP) structure, ...

  19. A Re-configurable On-line Learning Spiking Neuromorphic Processor comprising 256 neurons and 128K synapses

    Directory of Open Access Journals (Sweden)

    Ning eQiao

    2015-04-01

    Full Text Available Implementing compact, low-power artificial neural processing systems with real-time on-line learning abilities is still an open challenge. In this paper we present a full-custom mixed-signal VLSI device with neuromorphic learning circuits that emulate the biophysics of real spiking neurons and dynamic synapses for exploring the properties of computational neuroscience models and for building brain-inspired computing systems. The proposed architecture allows the on-chip configuration of a wide range of network connectivities, including recurrent and deep networks with short-term and long-term plasticity. The device comprises 128 K analog synapse and 256 neuron circuits with biologically plausible dynamics and bi-stable spike-based plasticity mechanisms that endow it with on-line learning abilities. In addition to the analog circuits, the device comprises also asynchronous digital logic circuits for setting different synapse and neuron properties as well as different network configurations. This prototype device, fabricated using a 180 nm 1P6M CMOS process, occupies an area of 51.4 mm 2 , and consumes approximately 4 mW for typical experiments, for example involving attractor networks. Here we describe the details of the overall architecture and of the individual circuits and present experimental results that showcase its potential. By supporting a wide range of cortical-like computational modules comprising plasticity mechanisms, this device will enable the realization of intelligent autonomous systems with on-line learning capabilities.

  20. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  1. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  2. Protein security and food security in China

    Directory of Open Access Journals (Sweden)

    Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

    2015-06-01

    Full Text Available Food security, the need to meet nutritional requirements, and four main problems for food protein security in China are analyzed. From the perspective of residentsrsquo; nutritional requirements and balanced dietary patterns, the conclusion is that food security in China is in essence dependent on protein production and security of supply and that fat and carbohydrates supply in China can reach self-sufficiency. Considering the situation of food protein production and consumption in China, policy suggestions are made, which could ensure a balanced supply and demand for food protein and food security in China.

  3. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  4. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  5. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  6. 77 FR 55811 - Manufacturing Extension Partnership Advisory Board On-line Open Meeting

    Science.gov (United States)

    2012-09-11

    ... National Institute of Standards and Technology Manufacturing Extension Partnership Advisory Board On-line... Manufacturing Extension Partnership (MEP) Advisory Board will hold an open, on-line meeting via webcast on... their remote location. Questions regarding the on-line meeting should be sent to the...

  7. Women Physicians Are Early Adopters of On-Line Continuing Medical Education

    Science.gov (United States)

    Harris, John M., Jr.; Novalis-Marine, Cheryl; Harris, Robin B.

    2003-01-01

    Introduction: On-line continuing medical education (CME) provides advantages to physicians and to medical educators. Although practicing physicians increasingly use on-line CME to meet their educational needs, the overall use of on-line CME remains limited. There are few data to describe the physicians who use this new educational medium; yet,…

  8. Report from the Light Water Reactor Sustainability Workshop on On-Line Monitoring Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas Baldwin; Magdy Tawfik; Leonard Bond

    2010-06-01

    In support of expanding the use of nuclear power, interest is growing in methods of determining the feasibility of longer term operation for the U.S. fleet of nuclear power plants, particularly operation beyond 60 years. To help establish the scientific and technical basis for such longer term operation, the DOE-NE has established a research and development (R&D) objective. This objective seeks to develop technologies and other solutions that can improve the reliability, sustain the safety, and extend the life of current reactors. The Light Water Reactor Sustainability (LWRS) Program, which addresses the needs of this objective, is being developed in collaboration with industry R&D programs to provide the technical foundations for licensing and managing the long-term, safe, and economical operation of nuclear power plants. The LWRS Program focus is on longer-term and higher-risk/reward research that contributes to the national policy objectives of energy and environmental security. In moving to identify priorities and plan activities, the Light Water Reactor Sustainability Workshop on On-Line Monitoring (OLM) Technologies was held June 10–12, 2010, in Seattle, Washington. The workshop was run to enable industry stakeholders and researchers to identify the nuclear industry needs in the areas of future OLM technologies and corresponding technology gaps and research capabilities. It also sought to identify approaches for collaboration that would be able to bridge or fill the technology gaps. This report is the meeting proceedings, documenting the presentations and discussions of the workshop and is intended to serve as a basis for a plan which is under development that will enable the I&C research pathway to achieve its goals. Benefits to the nuclear industry accruing from On Line Monitoring Technology cannot be ignored. Information gathered thus far has contributed significantly to the Department of Energy’s Light Water Reactor Sustainability Program. DOE has

  9. Homeland security in the USA: past, present, and future.

    Science.gov (United States)

    Kemp, Roger L

    2012-01-01

    This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.

  10. On-line forecasting model for zinc output based on self-tuning support vector regression and its application

    Institute of Scientific and Technical Information of China (English)

    胡志坤; 桂卫华; 彭小奇

    2004-01-01

    An on-line forecasting model based on self-tuning support vectors regression for zinc output was put forward to maximize zinc output by adjusting operational parameters in the process of imperial smelting furnace. In this model, the mathematical model of support vector regression was converted into the same format as support vector machine for classification. Then a simplified sequential minimal optimization for classification was applied to train the regression coefficient vector α- α* and threshold b. Sequentially penalty parameter C was tuned dynamically through forecasting result during the training process. Finally, an on-line forecasting algorithm for zinc output was proposed. The simulation result shows that in spite of a relatively small industrial data set, the effective error is less than 10% with a remarkable performance of real time. The model was applied to the optimization operation and fault diagnosis system for imperial smelting furnace.

  11. A multisyringe flow-through sequential extraction system for on-line monitoring of orthophosphate in soils and sediments

    DEFF Research Database (Denmark)

    Buanuam, Janya; Miró, Manuel; Hansen, Elo Harald

    2007-01-01

    A fully automated flow-through microcolumn fractionation system with on-line post-extraction derivatization is proposed for monitoring of orthophosphate in solid samples of environmental relevance. The system integrates dynamic sequential extraction using 1.0 mol l-1 NH4Cl, 0.1 mol l-1 NaOH and 0.......5 mol l-1 HCl as extractants according to the Hietjles-Lijklema (HL) scheme for fractionation of phosphorus associated with different geological phases, and on-line processing of the extracts via the Molybdenum Blue (MB) reaction by exploiting multisyringe flow injection as the interface between...... the solid containing microcolumn and the flow-through detector. The proposed flow assembly, capitalizing on the features of the multicommutation concept, implies several advantages as compared to fractionation analysis in the batch mode in terms of saving of extractants and MB reagents, shortening...

  12. Development of on-line laser power monitoring system

    Science.gov (United States)

    Ding, Chien-Fang; Lee, Meng-Shiou; Li, Kuan-Ming

    2016-03-01

    Since the laser was invented, laser has been applied in many fields such as material processing, communication, measurement, biomedical engineering, defense industries and etc. Laser power is an important parameter in laser material processing, i.e. laser cutting, and laser drilling. However, the laser power is easily affected by the environment temperature, we tend to monitor the laser power status, ensuring there is an effective material processing. Besides, the response time of current laser power meters is too long, they cannot measure laser power accurately in a short time. To be more precisely, we can know the status of laser power and help us to achieve an effective material processing at the same time. To monitor the laser power, this study utilize a CMOS (Complementary metal-oxide-semiconductor) camera to develop an on-line laser power monitoring system. The CMOS camera captures images of incident laser beam after it is split and attenuated by beam splitter and neutral density filter. By comparing the average brightness of the beam spots and measurement results from laser power meter, laser power can be estimated. Under continuous measuring mode, the average measuring error is about 3%, and the response time is at least 3.6 second shorter than thermopile power meters; under trigger measuring mode which enables the CMOS camera to synchronize with intermittent laser output, the average measuring error is less than 3%, and the shortest response time is 20 millisecond.

  13. AMADEUS on-line trigger and filtering methods

    Energy Technology Data Exchange (ETDEWEB)

    Neff, M. [Erlangen Centre for Astroparticle Physics (ECAP), Friedrich-Alexander-Universitaet Erlangen-Nuernberg, Physikalisches Institut, Erwin-Rommel-Strasse 1, D-91058 Erlangen (Germany)], E-mail: max.neff@physik.uni-erlangen.de; Anton, G.; Graf, K.; Hoessl, J.; Katz, U.; Lahmann, R.; Richardt, C. [Erlangen Centre for Astroparticle Physics (ECAP), Friedrich-Alexander-Universitaet Erlangen-Nuernberg, Physikalisches Institut, Erwin-Rommel-Strasse 1, D-91058 Erlangen (Germany)

    2009-06-01

    AMADEUS is a system designed to investigate the method of acoustic particle detection for high energy neutrinos and the acoustic environment in the deep sea as part of the ANTARES neutrino telescope. In this context, six local clusters of six acoustic sensors each were integrated into the ANTARES infrastructure. The first three clusters have been taking data since December 2007 and the second three since the completion of ANTARES in May 2008. In the paper, the methods used for the on-line triggering and filtering of the data acquired with the AMADEUS set-up are described. On-shore, a dedicated computer-cluster is used to control the off-shore DAQ hardware, to process and store the acoustic data arriving from the sensors. On this cluster different data filtering schemes and triggers are implemented. Transient signals are selected by a variable threshold, which is self-adjusting to the changing conditions of the deep sea. For bipolar pulses-the characteristic acoustic signature of a neutrino-a pattern recognition is used based on cross-correlating the output of the sensors with a pre-defined bipolar pulse. To study the characteristics of the ambient noise in the deep sea an amount of unfiltered data is stored in regular intervals.

  14. On-Line Condition Monitoring using Computational Intelligence

    CERN Document Server

    Vilakazi, C B; Mautla, P; Moloto, E

    2007-01-01

    This paper presents bushing condition monitoring frameworks that use multi-layer perceptrons (MLP), radial basis functions (RBF) and support vector machines (SVM) classifiers. The first level of the framework determines if the bushing is faulty or not while the second level determines the type of fault. The diagnostic gases in the bushings are analyzed using the dissolve gas analysis. MLP gives superior performance in terms of accuracy and training time than SVM and RBF. In addition, an on-line bushing condition monitoring approach, which is able to adapt to newly acquired data are introduced. This approach is able to accommodate new classes that are introduced by incoming data and is implemented using an incremental learning algorithm that uses MLP. The testing results improved from 67.5% to 95.8% as new data were introduced and the testing results improved from 60% to 95.3% as new conditions were introduced. On average the confidence value of the framework on its decision was 0.92.

  15. EXPANDING ACADEMIC VOCABULARY WITH AN INTERACTIVE ON-LINE DATABASE

    Directory of Open Access Journals (Sweden)

    Marlise Horst

    2005-05-01

    Full Text Available University students used a set of existing and purpose-built on-line tools for vocabulary learning in an experimental ESL course. The resources included concordance, dictionary, cloze-builder, hypertext, and a database with interactive self-quizzing feature (all freely available at www.lextutor.ca. The vocabulary targeted for learning consisted of (a Coxhead's (2000 Academic Word List, a list of items that occur frequently in university textbooks, and (b unfamiliar words students had met in academic texts and selected for entry into the class database. The suite of tools were designed to foster retention by engaging learners in deep processing, an aspect that is often described as missing in computer exercises for vocabulary learning. Database entries were examined to determine whether context sentences supported word meanings adequately and whether entered words reflected the unavailability of cognates in the various first languages of the participants. Pre- and post-treatment performance on tests of knowledge of words targeted for learning in the course were compared to establish learning gains. Regression analyses investigated connections between use of specific computer tools and gains.

  16. On-line range images registration with GPGPU

    Science.gov (United States)

    Będkowski, J.; Naruniec, J.

    2013-03-01

    This paper concerns implementation of algorithms in the two important aspects of modern 3D data processing: data registration and segmentation. Solution proposed for the first topic is based on the 3D space decomposition, while the latter on image processing and local neighbourhood search. Data processing is implemented by using NVIDIA compute unified device architecture (NIVIDIA CUDA) parallel computation. The result of the segmentation is a coloured map where different colours correspond to different objects, such as walls, floor and stairs. The research is related to the problem of collecting 3D data with a RGB-D camera mounted on a rotated head, to be used in mobile robot applications. Performance of the data registration algorithm is aimed for on-line processing. The iterative closest point (ICP) approach is chosen as a registration method. Computations are based on the parallel fast nearest neighbour search. This procedure decomposes 3D space into cubic buckets and, therefore, the time of the matching is deterministic. First technique of the data segmentation uses accele-rometers integrated with a RGB-D sensor to obtain rotation compensation and image processing method for defining pre-requisites of the known categories. The second technique uses the adapted nearest neighbour search procedure for obtaining normal vectors for each range point.

  17. The on-line low temperature nuclear orientation facility NICOLE

    Science.gov (United States)

    Ohtsubo, T.; Roccia, S.; Stone, N. J.; Stone, J. R.; Gaulard, C.; Köster, U.; Nikolov, J.; Simpson, G. S.; Veskovic, M.

    2017-04-01

    We review major experiments and results obtained by the on-line low temperature nuclear orientation method at the NICOLE facility at ISOLDE, CERN since the year 2000 and highlight their general physical impact. This versatile facility, providing a large degree of controlled nuclear polarization, was used for a long-standing study of magnetic moments at shell closures in the region Z = 28, N = 28–50 but also for dedicated studies in the deformed region around A ∼ 180. Another physics program was conducted to test symmetry in the weak sector and constrain weak coupling beyond V–A. Those two programs were supported by careful measurements of the involved solid state physics parameters to attain the full sensitivity of the technique and provide interesting interdisciplinary results. Future plans for this facility include the challenging idea of measuring the beta–gamma–neutron angular distributions from polarized beta delayed neutron emitters, further test of fundamental symmetries and obtaining nuclear structure data used in medical applications. The facility will also continue to contribute to both the nuclear structure and fundamental symmetry test programs.

  18. The Efficiency of the On-line Samplings

    Directory of Open Access Journals (Sweden)

    Ileana Gabriela NICULESCU-ARON

    2006-01-01

    Full Text Available The rapid growth of the technology from the last decades led to the collateral development of many other sciences. One of the most important inventions was the Internet and the web technologies with a tremendous impact on the society. Statistics, as a social science, at its turn in ongoing development has only to gain from that. Lately, the on line sampling technique greatly developed. Each web site of a certain importance includes in various forms of the questionnaires. These vary from a mere question to lengthy ones and are a part of daily life of those who access the World Wide Web. The main question is how feasible are the results derived from these samplings as the main issue is the representativiness. A nonrepresentative sampling is a futile one. It is a more convenient solution to post a question on the web page and to wait for an answer from the page’s visitors? But how representative is this answer for the target audience? The present paper aims to list the on-lone methodology as well as analyze their efficiency through presenting their advantages and drawbacks.

  19. Using on-line altered auditory feedback treating Parkinsonian speech

    Science.gov (United States)

    Wang, Emily; Verhagen, Leo; de Vries, Meinou H.

    2005-09-01

    Patients with advanced Parkinson's disease tend to have dysarthric speech that is hesitant, accelerated, and repetitive, and that is often resistant to behavior speech therapy. In this pilot study, the speech disturbances were treated using on-line altered feedbacks (AF) provided by SpeechEasy (SE), an in-the-ear device registered with the FDA for use in humans to treat chronic stuttering. Eight PD patients participated in the study. All had moderate to severe speech disturbances. In addition, two patients had moderate recurring stuttering at the onset of PD after long remission since adolescence, two had bilateral STN DBS, and two bilateral pallidal DBS. An effective combination of delayed auditory feedback and frequency-altered feedback was selected for each subject and provided via SE worn in one ear. All subjects produced speech samples (structured-monologue and reading) under three conditions: baseline, with SE without, and with feedbacks. The speech samples were randomly presented and rated for speech intelligibility goodness using UPDRS-III item 18 and the speaking rate. The results indicted that SpeechEasy is well tolerated and AF can improve speech intelligibility in spontaneous speech. Further investigational use of this device for treating speech disorders in PD is warranted [Work partially supported by Janus Dev. Group, Inc.].

  20. Chromatographic on-line detection of bioactives in food

    Directory of Open Access Journals (Sweden)

    Remmelt Van der Werf

    2013-08-01

    Full Text Available ABSTRACTFindings were focused on the anti-oxidative activity of numerous fruits and vegetables by means of an on-line HPLC radical scavenging detection method. The reactant used was the ABTS•+ green radical cation. The system has been optimized in terms of reactor design, and chemical reactions kinetics. It has been qualified to classify molecules in order of their increasing activity to scavenge exogenous radicals. It may be used as a powerful high resolution screening tool to investigate the radical scavenging activities of natural plants. Bioassays consisting in cellular in vitro antioxidant assay using pancreatic β-cells have been used to confirm the bioactivity of the selected micronutrients. This study demonstrated that it is possible to screen at the molecular level, the bioactivity of numerous natural samples and to point out the richness of the local biodiversity in terms of natural resource of functional food ingredients usable for their potential benefits for consumer’s health, wellbeing and wellaging.Key words: HPLC radical scavenging detection method, bioactivity of natural samples

  1. On-line catalytic upgrading of biomass fast pyrolysis products

    Institute of Scientific and Technical Information of China (English)

    LU Qiang; ZHU XiFeng; LI WenZhi; ZHANG Ying; CHEN DengYu

    2009-01-01

    Pyrolysis-gas chromatography/mass spectrometry (Py-GC/MS) was employed to achieve fast pyrolysis of biomass and on-line analysis of the pyrolysis vapors. Four biomass materials (poplar wood, fir wood, cotton straw and rice husk) were pyrolyzed to reveal the difference among their products. Moreover, catalytic cracking of the pyrolysis vapors from cotton straw was performed by using five catalysts, including two microporous zeolites (HZSM-5 and HY) and three mesoporous catalysts (ZrO2&TiO2, SBA-15 and AI/SBA-15). The results showed that the distribution of the pyrolytic products from the four materials differed a little from each other, while catalytic cracking could significantly alter the pyrolytic products. Those important primary pyrolytic products such as levoglucosen, hydroxyacetaldehyde and 1-hydroxy-2-propanone were decreased greatly after catalysis. The two microporous zeolites were ef-fective to generate high yields of hydrocarbons, while the three mesoporous materials favored the formation of furan, furfural and other furan compounds, as well as acetic acid.

  2. Virtual laboratories: Collaborative environments and facilities-on-line

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, C.E. Jr. [Oak Ridge National Lab., TN (United States). I and C Div.; Cavallini, J.S.; Seweryniak, G.R.; Kitchens, T.A.; Hitchcock, D.A.; Scott, M.A.; Welch, L.C. [Dept. of Energy, Germantown, MD (United States). Mathematical Information, and Computational Sciences Div.; Aiken, R.J. [Dept. of Energy, Germantown, MD (United States). Mathematical Information, and Computational Sciences Div.]|[Lawrence Livermore National Lab., CA (United States); Stevens, R.L. [Argonne National Lab., IL (United States). Mathematics and Computer Sciences Div.

    1995-07-01

    The Department of Energy (DOE) has major research laboratories in a number of locations in the US, typically co-located with large research instruments or research facilities valued at tens of millions to even billions of dollars. Present budget exigencies facing the entire nation are felt very deeply at DOE, just as elsewhere. Advances over the last few years in networking and computing technologies make virtual collaborative environments and conduct of experiments over the internetwork structure a possibility. The authors believe that development of these collaborative environments and facilities-on-line could lead to a ``virtual laboratory`` with tremendous potential for decreasing the costs of research and increasing the productivity of their capital investment in research facilities. The majority of these cost savings would be due to increased productivity of their research efforts, better utilization of resources and facilities, and avoiding duplication of expensive facilities. A vision of how this might all fit together and a discussion of the infrastructure necessary to enable these developments is presented.

  3. Dynamics of Landscape Ecological Security Based on PSR Model in the Bailongjiang River Watershed%基于PSR模型的白龙江流域景观生态安全时空变化

    Institute of Scientific and Technical Information of China (English)

    谢余初; 巩杰; 张玲玲

    2015-01-01

    Bailongjiang River watershed (BRW), a typical geomorphic area with frequent-hazards, located in the transitional ecotone among the Loess Plateau, Qinba Mountains and Tibet Plateau, was chosen as the study area to analyze the landscape ecological security (LES). Based on the Pressure-State-Response (PSR) concep-tual framework and platforms of GIS and RS technology, an evaluation system for landscape ecological securi-ty was suggested with three dimensions (Pressure, State and Response) from 1990 to 2010. The three compo-nents, namely each of the three dimensions and two factors specific to the particular dimension, were deter-mined separately from each other, and then integrated into a single rating. The factors were also divided into two types, depending on their impact on the ecological security:positive (+) or negative (-). Here the pressure index, which reflected the pressure that geomorphic hazard exerted on the environment, consists of landslides, debris flows, soil and water erosion. The landscape state index, which was related to the quality of the environ-ment, was composed of landscape vulnerability index and ecological service value. The response index, which was described as reaction of human beings to landscape dynamics, was defined as adjusted intensity of natural reserve districts, water area, forest, grazing district and crop lands. And then, the landscape ecological security was classified into 5 levels:low, slight, medium, medium-high and high. In the same time, the evaluation units were Landsat TM pixels and the fundamental data set was obtained by classifying raw TM data in this study;and the factors used in PSR model were obtained by using different data from meteorological station, soil sur-veys and maps, digitized topographic maps, NDVI, DEM and Landsat TM images. The results showed that:the maximum value of landscape pressure index was 0.697, 0.699, and 0.709 in 1990, 2002 and 2010 respec-tively, although the average value change was not

  4. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  5. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  6. DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS

    Directory of Open Access Journals (Sweden)

    Dr.S.Subasree and Dr.N.K.Sakthivel

    2010-02-01

    Full Text Available A Computer Network is an interconnected group of autonomous computing nodes, which use a well defined, mutually agreed set of rules and conventions known as protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a major impact on today’s business. It is desired to communicate data with high security. Security Attacks compromises the security and hence various Symmetric and Asymmetric cryptographic algorithms have been proposed to achieve the security services such as Authentication, Confidentiality, Integrity, Non-Repudiation and Availability. At present, various types of cryptographic algorithms provide high security to information on controlled networks. These algorithms are required to provide data security and users authenticity. To improve the strength of these security algorithms, a new security protocol for on line transaction can be designed using combination of both symmetric and asymmetric cryptographic techniques. This protocol provides three cryptographic primitives such as integrity, confidentiality and authentication. These three primitives can be achieved with the help of Elliptic Curve Cryptography, Dual-RSA algorithm and Message Digest MD5. That is it uses Elliptic Curve Cryptography for encryption, Dual-RSA algorithm for authentication and MD-5 for integrity. This new security protocol has been designed for better security with integrity using a combination of both symmetric and asymmetric cryptographic techniques.

  7. Survey of information security

    Institute of Scientific and Technical Information of China (English)

    SHEN ChangXiang; ZHANG HuangGuo; FENG DengGuo; CAO ZhenFu; HUANG JiWu

    2007-01-01

    The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of jnformation security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.

  8. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  9. ON THE RELEVANCE OF ON-LINE TRAFFIC ENGINEERING

    NARCIS (Netherlands)

    Fu, B.; Uhlig, S.P.W.G.

    The evaluation of dynamic Traffic Engineering (TE) algorithms is usually carried out using some specific network(s), traffic pattern(s) and traffic engineering objective(s). As the behavior of a TE algorithm is a consequence of the interactions between the network, the traffic demand and the algorit

  10. Lecture 2: Software Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  11. The 1-way on-line coupled atmospheric chemistry model system MECO(n – Part 2: On-line coupling with the Multi-Model-Driver (MMD

    Directory of Open Access Journals (Sweden)

    A. Kerkweg

    2012-01-01

    Full Text Available A new, highly flexible model system for the seamless dynamical down-scaling of meteorological and chemical processes from the global to the meso-γ scale is presented. A global model and a cascade of an arbitrary number of limited-area model instances run concurrently in the same parallel environment, in which the coarser grained instances provide the boundary data for the finer grained instances. Thus, disk-space intensive and time consuming intermediate and pre-processing steps are entirely avoided and the time interpolation errors of common off-line nesting approaches are minimised. More specifically, the regional model COSMO of the German Weather Service (DWD is nested on-line into the atmospheric general circulation model ECHAM5 within the Modular Earth Submodel System (MESSy framework. ECHAM5 and COSMO have previously been equipped with the MESSy infrastructure, implying that the same process formulations (MESSy submodels are available for both models. This guarantees the highest degree of achievable consistency, between both, the meteorological and chemical conditions at the domain boundaries of the nested limited-area model, and between the process formulations on all scales.

    The on-line nesting of the different models is established by a client-server approach with the newly developed Multi-Model-Driver (MMD, an additional component of the MESSy infrastructure. With MMD an arbitrary number of model instances can be run concurrently within the same message passing interface (MPI environment, the respective coarser model (either global or regional is the server for the nested finer (regional client model, i.e. it provides the data required to calculate the initial and boundary fields to the client model. On-line nesting means that the coupled (client-server models exchange their data via the computer memory, in contrast to the data exchange via files on disk in common off-line nesting approaches. MMD consists of a library

  12. The 1-way on-line coupled atmospheric chemistry model system MECO(n – Part 2: On-line coupling

    Directory of Open Access Journals (Sweden)

    A. Kerkweg

    2011-06-01

    Full Text Available A new, highly flexible model system for the seamless dynamical down-scaling of meteorological and chemical processes from the global to the meso-γ scale is presented. A global model and a cascade of an arbitrary number of limited-area model instances run concurrently in the same parallel environment, in which the coarser grained instances provide the boundary data for the finer grained instances. Thus, disk-space intensive and time consuming intermediate and pre-processing steps are entirely avoided and the time interpolation errors of common off-line nesting approaches are minimised. More specifically, the regional model COSMO of the German Weather Service (DWD is nested on-line into the atmospheric general circulation model ECHAM5 within the Modular Earth Submodel System (MESSy framework. ECHAM5 and COSMO have previously been equipped with the MESSy infrastructure, implying that the same process formulations (MESSy submodels are available for both models. This guarantees the highest degree of achievable consistency, between both, the meteorological and chemical conditions at the domain boundaries of the nested limited-area model, and between the process formulations on all scales.

    The on-line nesting of the different models is established by a client-server approach with the newly developed Multi-Model-Driver (MMD, an additional component of the MESSy infrastructure. With MMD an arbitrary number of model instances can be run concurrently within the same message passing interface (MPI environment, the respective coarser model (either global or regional is the server for the nested finer (regional client model, i.e., it provides the data required to calculate the initial and boundary fields to the client model. On-line nesting means that the coupled (client-server models exchange their data via the computer memory, in contrast to the data exchange via files on disk in common off-line nesting approaches. MMD consists of a library

  13. Worldwide On-line Distance Learning University Astronomy

    Science.gov (United States)

    Eyres, S. P. S.; Hassall, B. J. M.; Butchart, I.; Bromage, G. E.

    2006-08-01

    The University of Central Lancashire operates a suite of distance learning courses in Astronomy, available both on-line and via CD-ROM. The courses are available worldwide, and emphasise flexibility of study. To this end students can study anything from a single module (1/6^th of a full year at degree level) all the way up to an entire degree entirely by distance learning. Study rates vary from one to four modules each year, and students can move on to Level 2 modules (equivalent to second year level in a UK degree) before completing the full set of Level 1 modules. Over 1000 awards have been made to date. The core syllabus is Astronomy and Cosmology at Level 1, alongside skills in literature research, using computers, and basic observing. We also offer a basic history of European astronomy. At Level 2 we look at the astrophysics of the Sun, the stars, and galaxies including the Milky Way. By Level 3 students are expected to engage in a large individual project, and a collaborative investigation with other students, alongside high-level courses in cosmology, relativity, extreme states of matter and the origins of the elements, life and astronomical objects. While many students are retired people looking to exercise their brains, keen amateur amateurs or professionals with disposable incomes, and significant fraction are teachers seeking to improve their subject knowledge or high school students gaining an edge in the UK University entrance competition. Via our involvement with SALT we offer our courses to members of previously disadvantaged communities. This leads to an incredibly diverse and lively student body.

  14. Wireless Network Security Using Randomness

    Science.gov (United States)

    2012-06-19

    decision, unless so designated by other documentation. 12. DISTRIBUTION AVAILIBILITY STATEMENT Approved for public release; distribution is unlimited. UU...connectivity with the wireless network and the highly dynamic connections between nodes rule out the use of complex key distribution methods and make...Protected Access ( WPA and WPA2). WEP is a scheme used to secure IEEE 802.11 wireless networks, and is part of the IEEE 802.11 wireless networking standard

  15. Network Security Scanner

    OpenAIRE

    2011-01-01

    Network Security Scanner (NSS) is a tool that allows auditing and monitoring remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Network Security Scanner is a complete networking utilities package that includes a wide range of tools for network security auditing, vulnerability Auditing, scanning, monitoring and more. Network Security Scanner (NSS) is an easy to use, intuitive network security scanner that c...

  16. From Subjective Trust to Objective Trustworthiness in On-line Social Networks: Overview and Challenges

    Directory of Open Access Journals (Sweden)

    David Zejda

    2010-04-01

    Full Text Available Nowadays dozens of people share their content in the current Web 2.0 space, talk with friends in social networking sites such as Facebook and live on the Net in many other ways. They do all this quite naturally, forgetting the healthy cautiousness sometimes. In real life we rely on trusted people. Do we know how to reflect real-world trust mechanisms into on-line social software? In the article we focused to bring overview on state of the art in main ideas behind a trust processing in online social networking systems. What are common sources of subjective trust, how the trust emerges and what are the sources of trust dynamics? How can be trust captured into the systems, how can be explicit trust processed to infer indirect trust, the trust between users who do not know each other? And what are the ways to infer objective metrics of trust, the reputation or trustworthiness? Finally, we point out selected challenges related to the trust in current highly dynamic social networks.

  17. On-line Free-viewpoint Video: From Single to Multiple View Rendering

    Institute of Scientific and Technical Information of China (English)

    Vincent Nozick; Hideo Saito

    2008-01-01

    In recent years, many image-based rendering techniques have advanced from static to dynamic scenes and thus become video-based rendering (VBR) methods. But actually, only a few of them can render new views on-line. We present a new VBR system that creates new views of a live dynamic scene. This system provides high quality images and does not require any background subtraction. Our method follows a plane-sweep approach and reaches real-time rendering using consumer graphic hardware, graphics processing unit (GPU). Only one computer is used for both acquisition and rendering. The video stream acquisition is performed by at least 3 webcams. We propose an additional video stream management that extends the number of webcams to 10 or more. These considerations make our system low-cost and hence accessible for everyone. We also present an adaptation of our plane-sweep method to create simultaneously multiple views of the scene in real-time. Our system is especially designed for stereovision using autostereoscopic displays. The new views are computed from 4 webcams connected to a computer and are compressed in order to be transfered to a mobile phone. Using CPU programming, our method provides up to 16 images of the scene in real-time. The use of both GPU and CPU makes this method work on only one consumer grade computer.

  18. [On-line monitoring of oxygen uptake rate and its application in hybridoma culture].

    Science.gov (United States)

    Feng, Qiang; Mi, Li; Li, Ling; Wang, Xian-Hui; Chen, Zhi-Nan

    2003-09-01

    On-line analysis and control are critical for the optimization of product yields in animal cell culture. The close monitor of viable cell number helps to gain a better insight into the metabolism and to refine culture strategy. In this study, we use the oxygen uptake rate (OUR) to estimate the number of viable cell and the OUR-based feed-back control strategy for nutrients feeding to improve the efficiency of cell culture. A hybridoma cell line (HAb18) was cultured in fed-batch and perfusion model using serum free medium in 5L CelliGen Plus bioreactor (NBS Co., American) and 5L Biostat B bioreactor (Braun Co., Germany). The system and the method for online monitoring OUR in bioreactors, based on the dynamic measurement of dissolved oxygen (DO), were developed. The method of on-line cell concentration estimation was established based on the relationship between the growth of the hybridoma and the uptake rate of oxygen. This method was then used to determine OUR and the concentrations of cell, antibody, glucose, lactate, glutamine and ammonia in the bioreactors at given times. The relationship between OUR and nutrients metabolism was studied and OUR-based feed-back control strategy, which used the state deltaOUR = 0 as the regulation point, was established and used to control the rates of nutrients or medium feeding rate in the perfusion culture. The results showed that there was close relationship between OUR, concentration of live cells, productivity of antibody and consumption of glutamine. The sudden decrease in OUR may be caused by glutamine depletion, and with different delay times, the viable cell concentration and antibody productivity also decreased. The further analysis revealed the linear relationship between OUR and the density of live cells in the exponential growth phase as qOUR = (0.103 +/- 0.028) x 10(-12) mol/cell/h. These findings can be applied to the on-line detection of live cell density. Our study also indicated that by adjusting the perfusion

  19. On-line MR imaging for dose validation of abdominal radiotherapy

    Science.gov (United States)

    Glitzner, M.; Crijns, S. P. M.; de Senneville, B. Denis; Kontaxis, C.; Prins, F. M.; Lagendijk, J. J. W.; Raaymakers, B. W.

    2015-11-01

    For quality assurance and adaptive radiotherapy, validation of the actual delivered dose is crucial. Intrafractional anatomy changes cannot be captured satisfactorily during treatment with hitherto available imaging modalitites. Consequently, dose calculations are based on the assumption of static anatomy throughout the treatment. However, intra- and interfraction anatomy is dynamic and changes can be significant. In this paper, we investigate the use of an MR-linac as a dose tracking modality for the validation of treatments in abdominal targets where both respiratory and long-term peristaltic and drift motion occur. The on-line MR imaging capability of the modality provides the means to perform respiratory gating of both delivery and acquisition yielding a model-free respiratory motion management under free breathing conditions. In parallel to the treatment, the volumetric patient anatomy was captured and used to calculate the applied dose. Subsequently, the individual doses were warped back to the planning grid to obtain the actual dose accumulated over the entire treatment duration. Ultimately, the planned dose was validated by comparison with the accumulated dose. Representative for a site subject to breathing modulation, two kidney cases (25 Gy target dose) demonstrated the working principle on volunteer data and simulated delivery. The proposed workflow successfully showed its ability to track local dosimetric changes. Integration of the on-line anatomy information could reveal local dose variations  -2.3-1.5 Gy in the target volume of a volunteer dataset. In the adjacent organs at risk, high local dose errors ranging from  -2.5 to 1.9 Gy could be traced back.

  20. A Framework for Secure Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ahmed E. Youssef

    2012-07-01

    Full Text Available Cloud computing is one of the most discussed topics today in the field of information technology. It introduces a new Internet-based environment for on-demand, dynamic provision of reconfigurable computing resources. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data and critical applications. In this paper, we propose a framework that identifies security and privacy challenges in cloud computing. It highlights cloud-specific attacks and risks and clearly illustrates their mitigations and countermeasures. We also propose a generic cloud computing security model that helps satisfy security and privacy requirements in the clouds and protect them against various vulnerabilities. The purpose of this work is to advise on security and privacy considerations that should be taken and solutions that might be considered when using the cloud environment by individuals and organizations.