WorldWideScience

Sample records for plane security ldrd

  1. 2007 LDRD ANNUAL REPORT

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-16

    I am pleased to present the fiscal year 2007 Laboratory Directed Research and Development (LDRD) annual report. This represents the first year that SRNL has been eligible for LDRD participation and our results to date demonstrate we are off to an excellent start. SRNL became a National Laboratory in 2004, and was designated the 'Corporate Laboratory' for the DOE Office of Environmental Management (EM) in 2006. As you will see, we have made great progress since these designations. The LDRD program is one of the tools SRNL is using to enable achievement of our strategic goals for the DOE. The LDRD program allows the laboratory to blend a strong basic science component into our applied technical portfolio. This blending of science with applied technology provides opportunities for our scientists to strengthen our capabilities and delivery. The LDRD program is vital to help SRNL attract and retain leading scientists and engineers who will help build SRNL's future and achieve DOE mission objectives. This program has stimulated our research staff creativity, while realizing benefits from their participation. This investment will yield long term dividends to the DOE in its Environmental Management, Energy, and National Security missions.

  2. LDRD FY2004 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kline, K. M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2005-02-28

    The Laboratory Directed Research and Development (LDRD) Program is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and the National Nuclear Security Administration in national security, homeland security, energy security, environmental management, bioscience and healthcare technology, and breakthroughs in fundamental science and technology. The LDRD Program was authorized by Congress in 1991 and is administered by the Laboratory Science and Technology Office. The accomplishments described in this Annual Report demonstrate how the LDRD portfolio is strongly aligned with these missions and contributes to the Laboratory’s success in meeting its goals. The LDRD budget of $69.8 million for FY2004 sponsored 220 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific and technical quality and mission relevance. Each year, the number of meritorious proposals far exceeds the funding available, making the selection a challenging one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the Nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory’s multidisciplinary team approach to science and technology. Safeguarding the Nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle

  3. LDRD Annual Report FY2006

    International Nuclear Information System (INIS)

    Sketchley, J A; Kotta, P; De Yoreo, J; Jackson, K; van Bibber, K

    2007-01-01

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Laboratory Science and Technology Office, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration in national security, energy security, environmental management, bioscience and technology to improve human health, and breakthroughs in fundamental science and technology. The accomplishments described in this Annual Report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $92 million for FY2006 sponsored 188 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest

  4. SRNL LDRD ANNUAL REPORT 2008

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-29

    The Laboratory Director is pleased to have the opportunity to present the 2008 Laboratory Directed Research and Development (LDRD) annual report. This is my first opportunity to do so, and only the second such report that has been issued. As will be obvious, SRNL has built upon the excellent start that was made with the LDRD program last year, and researchers have broken new ground in some important areas. In reviewing the output of this program this year, it is clear that the researchers implemented their ideas with creativity, skill and enthusiasm. It is gratifying to see this level of participation, because the LDRD program remains a key part of meeting SRNL's and DOE's strategic goals, and helps lay a solid scientific foundation for SRNL as the premier applied science laboratory. I also believe that the LDRD program's results this year have demonstrated SRNL's value as the EM Corporate Laboratory, having advanced knowledge in a spectrum of areas, including reduction of the technical risks of cleanup, separations science, packaging and transportation of nuclear materials, and many others. The research in support of Energy Security and National and Homeland Security has been no less notable. SRNL' s researchers have shown again that the nascent LDRD program is a sound investment for DOE that will pay off handsomely for the nation as time goes on.

  5. The theory of diversity and redundancy in information system security : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Mayo, Jackson R. (Sandia National Laboratories, Livermore, CA); Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C. (Sandia National Laboratories, Livermore, CA); Allan, Benjamin A. (Sandia National Laboratories, Livermore, CA); Pierson, Lyndon George

    2010-10-01

    The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

  6. Final report and documentation for the security enabled programmable switch for protection of distributed internetworked computers LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Van Randwyk, Jamie A.; Robertson, Perry J.; Durgin, Nancy Ann; Toole, Timothy J.; Kucera, Brent D.; Campbell, Philip LaRoche; Pierson, Lyndon George

    2010-02-01

    An increasing number of corporate security policies make it desirable to push security closer to the desktop. It is not practical or feasible to place security and monitoring software on all computing devices (e.g. printers, personal digital assistants, copy machines, legacy hardware). We have begun to prototype a hardware and software architecture that will enforce security policies by pushing security functions closer to the end user, whether in the office or home, without interfering with users' desktop environments. We are developing a specialized programmable Ethernet network switch to achieve this. Embodied in this device is the ability to detect and mitigate network attacks that would otherwise disable or compromise the end user's computing nodes. We call this device a 'Secure Programmable Switch' (SPS). The SPS is designed with the ability to be securely reprogrammed in real time to counter rapidly evolving threats such as fast moving worms, etc. This ability to remotely update the functionality of the SPS protection device is cryptographically protected from subversion. With this concept, the user cannot turn off or fail to update virus scanning and personal firewall filtering in the SPS device as he/she could if implemented on the end host. The SPS concept also provides protection to simple/dumb devices such as printers, scanners, legacy hardware, etc. This report also describes the development of a cryptographically protected processor and its internal architecture in which the SPS device is implemented. This processor executes code correctly even if an adversary holds the processor. The processor guarantees both the integrity and the confidentiality of the code: the adversary cannot determine the sequence of instructions, nor can the adversary change the instruction sequence in a goal-oriented way.

  7. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, Timothy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Denman, Matthew R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Williams, R. A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Nevin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jankovsky, Zachary Kyle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities. iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.

  8. 2013 SRNL LDRD Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    McWhorter, S. [Savannah River Site (SRS), Aiken, SC (United States)

    2014-03-07

    This report demonstrates the execution of our LDRD program within the objectives and guidelines outlined by the Department of Energy (DOE) through the DOE Order 413.2b. The projects described within the report align purposefully with SRNL’s strategic vision and provide great value to the DOE. The diversity exhibited in the research and development projects underscores the DOE Office of Environmental Management (DOE-EM) mission and enhances that mission by developing the technical capabilities and human capital necessary to support future DOE-EM national needs. As a multiprogram national laboratory, SRNL is applying those capabilities to achieve tangible results for the nation in National Security, Environmental Stewardship, Clean Energy and Nuclear Materials Management.

  9. 2014 SRNL LDRD Annual Report, Rev. 0

    Energy Technology Data Exchange (ETDEWEB)

    Mcwhorter, S. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-03-15

    Laboratory Directed Research and Development is a congressionally authorized program that provides the ‘innovation inspiration’ from which many of the Laboratory’s multi-discipline advancements are made in both science and engineering technology. The program is the backbone for insuring that scientific, technical and engineering capabilities can meet current and future needs. It is an important tool in reducing the probability of technological surprise by allowing laboratory technical staff room to innovate and keep abreast of scientific breakthroughs. Drawing from the synergism among the EM and NNSA missions, and work from other federal agencies ensures that LDRD is the key element in maintaining the vitality of SRNL’s technical programs. The LDRD program aims to position the Laboratory for new business in clean energy, national security, nuclear materials management and environmental stewardship by leveraging the unique capabilities of the Laboratory to yield foundational scientific research in core business areas, while aligning with SRS strategic initiatives and maintaining a vision for ultimate DOE applications.

  10. LDRD FY 2014 Program Plan

    Energy Technology Data Exchange (ETDEWEB)

    Anita Gianotto; Dena Tomchak

    2013-08-01

    As required by DOE Order 413.2B the FY 2014 Program Plan is written to communicate ares of investment and approximate amounts being requested for the upcoming fiscal year. The program plan also includes brief highlights of current or previous LDRD projects that have an opportunity to impact our Nation's current and future energy challenges.

  11. Small space object imaging : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Ackermann, Mark R.; Valley, Michael T.; Kearney, Sean Patrick

    2009-10-01

    We report the results of an LDRD effort to investigate new technologies for the identification of small-sized (mm to cm) debris in low-earth orbit. This small-yet-energetic debris presents a threat to the integrity of space-assets worldwide and represents significant security challenge to the international community. We present a nonexhaustive review of recent US and Russian efforts to meet the challenges of debris identification and removal and then provide a detailed description of joint US-Russian plans for sensitive, laser-based imaging of small debris at distances of hundreds of kilometers and relative velocities of several kilometers per second. Plans for the upcoming experimental testing of these imaging schemes are presented and a preliminary path toward system integration is identified.

  12. Final report on LDRD project ''proliferation-resistant fuel cycles''

    International Nuclear Information System (INIS)

    Brown, N W; Hassberger, J A.

    1999-01-01

    This report provides a summary of LDRD work completed during 1997 and 1998 to develop the ideas and concepts that lead to the Secure, Transportable, Autonomous Reactor (STAR) program proposals to the DOE Nuclear Energy Research Initiative (NERI). The STAR program consists of a team of three national laboratories (LLNL, ANL, and LANL), three universities, (UC Berkeley, TAMU, and MIT) and the Westinghouse Research Center. Based on the LLNL work and their own efforts on related work this team prepared and integrated a package of twelve proposals that will carry the LDRD work outlined here into the next phase of development. We are proposing to develop a new nuclear system that meets stringent requirements for a high degree of safety and proliferation resistance, and also deals directly with the related nuclear waste and spent fuel management issues

  13. FY2014 LBNL LDRD Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Ho, Darren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-06-01

    Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE’s National Laboratory System, Berkeley Lab supports DOE’s missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation. The LDRD program supports Berkeley Lab’s mission in many ways. First, because LDRD funds can be allocated within a relatively short time frame, Berkeley Lab researchers can support the mission of the Department of Energy (DOE) and serve the needs of the nation by quickly responding to forefront scientific problems. Second, LDRD enables Berkeley Lab to attract and retain highly qualified scientists and to support their efforts to carry out worldleading research. In addition, the LDRD program also supports new projects that involve graduate students and postdoctoral fellows, thus contributing to the education mission of Berkeley Lab.

  14. 1999 LDRD Laboratory Directed Research and Development

    Energy Technology Data Exchange (ETDEWEB)

    Rita Spencer; Kyle Wheeler

    2000-06-01

    This is the FY 1999 Progress Report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes work done on individual research projects, relates the projects to major Laboratory program sponsors, and provides an index to the principal investigators. Project summaries are grouped by their LDRD component: Competency Development, Program Development, and Individual Projects. Within each component, they are further grouped into nine technical categories: (1) materials science, (2) chemistry, (3) mathematics and computational science, (4) atomic, molecular, optical, and plasma physics, fluids, and particle beams, (5) engineering science, (6) instrumentation and diagnostics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) bioscience.

  15. FY 2014 LDRD Annual Report Project Summaries

    Energy Technology Data Exchange (ETDEWEB)

    Tomchak, Dena [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-02-01

    The FY 2014 Laboratory Directed Research and Development (LDRD) Annual Report is a compendium of the diverse research performed to develop and ensure the INL's technical capabilities can support future DOE missions and national research priorities. LDRD is essential to INL - it provides a means for the laboratory to pursue novel scientific and engineering research in areas that are deemed too basic or risky for programmatic investments. This research enahnces technical capabilities at the laboratory, providing scientific and engineering staff with opportunities for skill building and partnership development.

  16. Nanoporous Silica Templated HeteroEpitaxy: Final LDRD Report.

    Energy Technology Data Exchange (ETDEWEB)

    Burckel, David Bruce; Koleske, Daniel; Rowen, Adam M.; Williams, John Dalton; Fan, Hongyou; Arrington, Christian Lew

    2006-11-01

    This one-year out-of-the-box LDRD was focused on exploring the use of porous growth masks as a method for defect reduction during heteroepitaxial crystal growth. Initially our goal was to investigate porous silica as a growth mask, however, we expanded the scope of the research to include several other porous growth masks on various size scales, including mesoporous carbon, and the UV curable epoxy, SU-8. Use of SU-8 as a growth mask represents a new direction, unique in the extensive literature of patterned epitaxial growth, and presents the possibility of providing a single step growth mask. Additional research included investigation of pore viability via electrochemical deposition into high aspect ratio photoresist patterns and pilot work on using SU-8 as a DUV negative resist, another significant potential result. While the late start nature of this project pushed some of the initial research goals out of the time table, significant progress was made. 3 Acknowledgements This work was performed in part at the Nanoscience @ UNM facility, a member of the National Nanotechnology Infrastructure Network, which is supported by the National Science Foundation (Grant ECS 03-35765). Sandia is multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United Stated Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. This work was supported under the Sandia LDRD program (Project 99405). 4

  17. Cognitive Computing for Security.

    Energy Technology Data Exchange (ETDEWEB)

    Debenedictis, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rothganger, Fredrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aimone, James Bradley [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Marinella, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evans, Brian Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warrender, Christina E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mickel, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  18. Exploration of cloud computing late start LDRD #149630 : Raincoat. v. 2.1.

    Energy Technology Data Exchange (ETDEWEB)

    Echeverria, Victor T.; Metral, Michael David; Leger, Michelle A.; Gabert, Kasimir Georg; Edgett, Patrick Garrett; Thai, Tan Q.

    2010-09-01

    This report contains documentation from an interoperability study conducted under the Late Start LDRD 149630, Exploration of Cloud Computing. A small late-start LDRD from last year resulted in a study (Raincoat) on using Virtual Private Networks (VPNs) to enhance security in a hybrid cloud environment. Raincoat initially explored the use of OpenVPN on IPv4 and demonstrates that it is possible to secure the communication channel between two small 'test' clouds (a few nodes each) at New Mexico Tech and Sandia. We extended the Raincoat study to add IPSec support via Vyatta routers, to interface with a public cloud (Amazon Elastic Compute Cloud (EC2)), and to be significantly more scalable than the previous iteration. The study contributed to our understanding of interoperability in a hybrid cloud.

  19. LDRD Highlights at the National Laboratories

    Energy Technology Data Exchange (ETDEWEB)

    Alayat, R. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-10-10

    To meet the nation’s critical challenges, the Department of Energy (DOE) national laboratories have always pushed the boundaries of science, technology, and engineering. The Atomic Energy Act of 1954 provided the basis for these laboratories to engage in the cutting edge of science and technology and respond to technological surprises, while retaining the best scientific and technological minds. To help re-energize this commitment, in 1991 the U.S. Congress authorized the national laboratories to devote a relatively small percentage of their budget to creative and innovative work that serves to maintain their vitality in disciplines relevant to DOE missions. Since then, this effort has been formally called the Laboratory Directed Research and Development (LDRD) Program. LDRD has been an essential mechanism to enable the laboratories to address DOE’s current and future missions with leading-edge research proposed independently by laboratory technical staff, evaluated through expert peer-review committees, and funded by the individual laboratories consistent with the authorizing legislation and the DOE LDRD Order 413.2C.

  20. LDRD 149045 final report distinguishing documents.

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Scott A.

    2010-09-01

    This LDRD 149045 final report describes work that Sandians Scott A. Mitchell, Randall Laviolette, Shawn Martin, Warren Davis, Cindy Philips and Danny Dunlavy performed in 2010. Prof. Afra Zomorodian provided insight. This was a small late-start LDRD. Several other ongoing efforts were leveraged, including the Networks Grand Challenge LDRD, and the Computational Topology CSRF project, and the some of the leveraged work is described here. We proposed a sentence mining technique that exploited both the distribution and the order of parts-of-speech (POS) in sentences in English language documents. The ultimate goal was to be able to discover 'call-to-action' framing documents hidden within a corpus of mostly expository documents, even if the documents were all on the same topic and used the same vocabulary. Using POS was novel. We also took a novel approach to analyzing POS. We used the hypothesis that English follows a dynamical system and the POS are trajectories from one state to another. We analyzed the sequences of POS using support vector machines and the cycles of POS using computational homology. We discovered that the POS were a very weak signal and did not support our hypothesis well. Our original goal appeared to be unobtainable with our original approach. We turned our attention to study an aspect of a more traditional approach to distinguishing documents. Latent Dirichlet Allocation (LDA) turns documents into bags-of-words then into mixture-model points. A distance function is used to cluster groups of points to discover relatedness between documents. We performed a geometric and algebraic analysis of the most popular distance functions and made some significant and surprising discoveries, described in a separate technical report.

  1. Multi-attribute criteria applied to electric generation energy system analysis LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Kuswa, Glenn W.; Tsao, Jeffrey Yeenien; Drennen, Thomas E.; Zuffranieri, Jason V.; Paananen, Orman Henrie; Jones, Scott A.; Ortner, Juergen G. (DLR, German Aerospace, Cologne); Brewer, Jeffrey D.; Valdez, Maximo M.

    2005-10-01

    This report began with a Laboratory-Directed Research and Development (LDRD) project to improve Sandia National Laboratories multidisciplinary capabilities in energy systems analysis. The aim is to understand how various electricity generating options can best serve needs in the United States. The initial product is documented in a series of white papers that span a broad range of topics, including the successes and failures of past modeling studies, sustainability, oil dependence, energy security, and nuclear power. Summaries of these projects are included here. These projects have provided a background and discussion framework for the Energy Systems Analysis LDRD team to carry out an inter-comparison of many of the commonly available electric power sources in present use, comparisons of those options, and efforts needed to realize progress towards those options. A computer aid has been developed to compare various options based on cost and other attributes such as technological, social, and policy constraints. The Energy Systems Analysis team has developed a multi-criteria framework that will allow comparison of energy options with a set of metrics that can be used across all technologies. This report discusses several evaluation techniques and introduces the set of criteria developed for this LDRD.

  2. Neurons to algorithms LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Rothganger, Fredrick H.; Aimone, James Bradley; Warrender, Christina E.; Trumbo, Derek

    2013-09-01

    Over the last three years the Neurons to Algorithms (N2A) LDRD project teams has built infrastructure to discover computational structures in the brain. This consists of a modeling language, a tool that enables model development and simulation in that language, and initial connections with the Neuroinformatics community, a group working toward similar goals. The approach of N2A is to express large complex systems like the brain as populations of a discrete part types that have specific structural relationships with each other, along with internal and structural dynamics. Such an evolving mathematical system may be able to capture the essence of neural processing, and ultimately of thought itself. This final report is a cover for the actual products of the project: the N2A Language Specification, the N2A Application, and a journal paper summarizing our methods.

  3. Multi-target camera tracking, hand-off and display LDRD 158819 final report

    International Nuclear Information System (INIS)

    Anderson, Robert J.

    2014-01-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn't lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identifies individual moving targets from the background imagery, and then displays the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  4. Multi-target camera tracking, hand-off and display LDRD 158819 final report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn't lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identifies individual moving targets from the background imagery, and then displays the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  5. Multi-Target Camera Tracking, Hand-off and Display LDRD 158819 Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Robotic and Security Systems Dept.

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn’t lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identify individual moving targets from the background imagery, and then display the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  6. Idaho National Laboratory Annual Report FY 2013 LDRD Project Summaries

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2014-03-01

    The FY 2013 LDRD Annual Report is a compendium of the diverse research performed to develop and ensure the INL’s technical capabilities support the current and future DOE missions and national research priorities. LDRD is essential to INL—it provides a means for the Laboratory to maintain scientific and technical vitality while funding highly innovative, high-risk science and technology research and development (R&D) projects. The program enhances technical capabilities at the Laboratory, providing scientific and engineering staff with opportunities to explore proof-of-principle ideas, advanced studies of innovative concepts, and preliminary technical analyses. Established by Congress in 1991, the LDRD Program proves its benefit each year through new programs, intellectual property, patents, copyrights, national and international awards, and publications.

  7. Idaho National Laboratory LDRD Annual Report FY 2012

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2013-03-01

    This report provides a glimpse into our diverse research and development portfolio, wwhich encompasses both advanced nuclear science and technology and underlying technologies. IN keeping with the mission, INL's LDRD program fosters technical capabilities necessary to support current and future DOE-Office of Nuclear Energy research and development needs.

  8. Noncontact surface thermometry for microsystems: LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Abel, Mark (Georgia Institute of Technology, Atlanta, GA); Beecham, Thomas (Georgia Institute of Technology, Atlanta, GA); Graham, Samuel (Georgia Institute of Technology, Atlanta, GA); Kearney, Sean Patrick; Serrano, Justin Raymond; Phinney, Leslie Mary

    2006-10-01

    We describe a Laboratory Directed Research and Development (LDRD) effort to develop and apply laser-based thermometry diagnostics for obtaining spatially resolved temperature maps on working microelectromechanical systems (MEMS). The goal of the effort was to cultivate diagnostic approaches that could adequately resolve the extremely fine MEMS device features, required no modifications to MEMS device design, and which did not perturb the delicate operation of these extremely small devices. Two optical diagnostics were used in this study: microscale Raman spectroscopy and microscale thermoreflectance. Both methods use a low-energy, nonperturbing probe laser beam, whose arbitrary wavelength can be selected for a diffraction-limited focus that meets the need for micron-scale spatial resolution. Raman is exploited most frequently, as this technique provides a simple and unambiguous measure of the absolute device temperature for most any MEMS semiconductor or insulator material under steady state operation. Temperatures are obtained from the spectral position and width of readily isolated peaks in the measured Raman spectra with a maximum uncertainty near {+-}10 K and a spatial resolution of about 1 micron. Application of the Raman technique is demonstrated for V-shaped and flexure-style polycrystalline silicon electrothermal actuators, and for a GaN high-electron-mobility transistor. The potential of the Raman technique for simultaneous measurement of temperature and in-plane stress in silicon MEMS is also demonstrated and future Raman-variant diagnostics for ultra spatio-temporal resolution probing are discussed. Microscale thermoreflectance has been developed as a complement for the primary Raman diagnostic. Thermoreflectance exploits the small-but-measurable temperature dependence of surface optical reflectivity for diagnostic purposes. The temperature-dependent reflectance behavior of bulk silicon, SUMMiT-V polycrystalline silicon films and metal surfaces is

  9. Retrospective on the Seniors' Council Tier 1 LDRD portfolio.

    Energy Technology Data Exchange (ETDEWEB)

    Ballard, William Parker

    2012-04-01

    This report describes the Tier 1 LDRD portfolio, administered by the Seniors Council between 2003 and 2011. 73 projects were sponsored over the 9 years of the portfolio at a cost of $10.5 million which includes $1.9M of a special effort in directed innovation targeted at climate change and cyber security. Two of these Tier 1 efforts were the seeds for the Grand Challenge LDRDs in Quantum Computing and Next Generation Photovoltaic conversion. A few LDRDs were terminated early when it appeared clear that the research was not going to succeed. A great many more were successful and led to full Tier 2 LDRDs or direct customer sponsorship. Over a dozen patents are in various stages of prosecution from this work, and one project is being submitted for an R and D 100 award.

  10. Final Report for the Virtual Reliability Realization System LDRD

    Energy Technology Data Exchange (ETDEWEB)

    DELLIN, THEODORE A.; HENDERSON, CHRISTOPHER L.; O' TOOLE, EDWARD J.

    2000-12-01

    Current approaches to reliability are not adequate to keep pace with the need for faster, better and cheaper products and systems. This is especially true in high consequence of failure applications. The original proposal for the LDRD was to look at this challenge and see if there was a new paradigm that could make reliability predictions, along with a quantitative estimate of the risk in that prediction, in a way that was faster, better and cheaper. Such an approach would be based on the underlying science models that are the backbone of reliability predictions. The new paradigm would be implemented in two software tools: the Virtual Reliability Realization System (VRRS) and the Reliability Expert System (REX). The three-year LDRD was funded at a reduced level for the first year ($120K vs. $250K) and not renewed. Because of the reduced funding, we concentrated on the initial development of the expertise system. We developed an interactive semiconductor calculation tool needed for reliability analyses. We also were able to generate a basic functional system using Microsoft Siteserver Commerce Edition and Microsoft Sequel Server. The base system has the capability to store Office documents from multiple authors, and has the ability to track and charge for usage. The full outline of the knowledge model has been incorporated as well as examples of various types of content.

  11. Nearaffine planes

    NARCIS (Netherlands)

    Wilbrink, H.A.

    1982-01-01

    In this paper we develop a theory for nearaffine planes analogous to the theory of ordinary affine translation planes. In a subsequent paper we shall use this theory to give a characterization of a certain class of Minkowski planes.

  12. LDRD 2012 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Bookless, William [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2012-12-31

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY2012, as required. In FY2012, the BNL LDRD Program funded 52 projects, 14 of which were new starts, at a total cost of $10,061,292.

  13. Selected Examples of LDRD Projects Supporting Test Ban Treaty Verification and Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Al-Ayat, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Walter, W. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-02-23

    The Laboratory Directed Research and Development (LDRD) Program at the DOE National Laboratories was established to ensure the scientific and technical vitality of these institutions and to enhance the their ability to respond to evolving missions and anticipate national needs. LDRD allows the Laboratory directors to invest a percentage of their total annual budget in cutting-edge research and development projects within their mission areas. We highlight a selected set of LDRD-funded projects, in chronological order, that have helped provide capabilities, people and infrastructure that contributed greatly to our ability to respond to technical challenges in support of test ban treaty verification and nonproliferation.

  14. LDRD 2014 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, Diane [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2015-03-01

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2014, as required. In FY 2014, the BNL LDRD Program funded 40 projects, 8 of which were new starts, at a total cost of $9.6M.

  15. LDRD 2015 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, D. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2015-12-31

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2015, as required. In FY 2015, the BNL LDRD Program funded 43 projects, 12 of which were new starts, at a total cost of $9.5M.

  16. Final LDRD report : advanced plastic scintillators for neutron detection.

    Energy Technology Data Exchange (ETDEWEB)

    Vance, Andrew L.; Mascarenhas, Nicholas; O' Bryan, Greg; Mrowka, Stanley

    2010-09-01

    This report summarizes the results of a one-year, feasibility-scale LDRD project that was conducted with the goal of developing new plastic scintillators capable of pulse shape discrimination (PSD) for neutron detection. Copolymers composed of matrix materials such as poly(methyl methacrylate) (PMMA) and blocks containing trans-stilbene (tSB) as the scintillator component were prepared and tested for gamma/neutron response. Block copolymer synthesis utilizing tSBMA proved unsuccessful so random copolymers containing up to 30% tSB were prepared. These copolymers were found to function as scintillators upon exposure to gamma radiation; however, they did not exhibit PSD when exposed to a neutron source. This project, while falling short of its ultimate goal, demonstrated the possible utility of single-component, undoped plastics as scintillators for applications that do not require PSD.

  17. THz transceiver characterization : LDRD project 139363 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Nordquist, Christopher Daniel; Wanke, Michael Clement; Cich, Michael Joseph; Reno, John Louis; Fuller, Charles T.; Wendt, Joel Robert; Lee, Mark; Grine, Albert D.

    2009-09-01

    LDRD Project 139363 supported experiments to quantify the performance characteristics of monolithically integrated Schottky diode + quantum cascade laser (QCL) heterodyne mixers at terahertz (THz) frequencies. These integrated mixers are the first all-semiconductor THz devices to successfully incorporate a rectifying diode directly into the optical waveguide of a QCL, obviating the conventional optical coupling between a THz local oscillator and rectifier in a heterodyne mixer system. This integrated mixer was shown to function as a true heterodyne receiver of an externally received THz signal, a breakthrough which may lead to more widespread acceptance of this new THz technology paradigm. In addition, questions about QCL mode shifting in response to temperature, bias, and external feedback, and to what extent internal frequency locking can improve stability have been answered under this project.

  18. Tracking of Nuclear Production using Indigenous Species: Final LDRD Report

    International Nuclear Information System (INIS)

    Alam, Todd Michael; Alam, Mary Kathleen; McIntyre, Sarah K.; Volk, David; Neerathilingam, Muniasamy; Luxon, Bruce A.; Ansari, G. A. Shakeel

    2009-01-01

    Our LDRD research project sought to develop an analytical method for detection of chemicals used in nuclear materials processing. Our approach is distinctly different than current research involving hardware-based sensors. By utilizing the response of indigenous species of plants and/or animals surrounding (or within) a nuclear processing facility, we propose tracking 'suspicious molecules' relevant to nuclear materials processing. As proof of concept, we have examined TBP, tributylphosphate, used in uranium enrichment as well as plutonium extraction from spent nuclear fuels. We will compare TBP to the TPP (triphenylphosphate) analog to determine the uniqueness of the metabonomic response. We show that there is a unique metabonomic response within our animal model to TBP. The TBP signature can further be delineated from that of TPP. We have also developed unique methods of instrumental transfer for metabonomic data sets.

  19. Tracking of Nuclear Production using Indigenous Species: Final LDRD Report

    Energy Technology Data Exchange (ETDEWEB)

    Alam, Todd Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Dept. of Electronic and Nanostructured Materials; Alam, Mary Kathleen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Energetics Characterization Dept.; McIntyre, Sarah K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Dept. of Electronic and Nanostructured Materials; Volk, David [Univ. of Texas, Galveston, TX (United States). Medical Branch; Neerathilingam, Muniasamy [Univ. of Texas, Galveston, TX (United States). Medical Branch; Luxon, Bruce A. [Univ. of Texas, Galveston, TX (United States). Medical Branch; Ansari, G. A. Shakeel [Univ. of Texas, Galveston, TX (United States). Medical Branch

    2009-10-01

    Our LDRD research project sought to develop an analytical method for detection of chemicals used in nuclear materials processing. Our approach is distinctly different than current research involving hardware-based sensors. By utilizing the response of indigenous species of plants and/or animals surrounding (or within) a nuclear processing facility, we propose tracking 'suspicious molecules' relevant to nuclear materials processing. As proof of concept, we have examined TBP, tributylphosphate, used in uranium enrichment as well as plutonium extraction from spent nuclear fuels. We will compare TBP to the TPP (triphenylphosphate) analog to determine the uniqueness of the metabonomic response. We show that there is a unique metabonomic response within our animal model to TBP. The TBP signature can further be delineated from that of TPP. We have also developed unique methods of instrumental transfer for metabonomic data sets.

  20. LDRD final report: photonic analog-to-digital converter (ADC) technology; TOPICAL

    International Nuclear Information System (INIS)

    Bowers, M; Deri, B; Haigh, R; Lowry, M; Sargis, P; Stafford, R; Tong, T

    1999-01-01

    We report on an LDRD seed program of novel technology development (started by an FY98 Engineering Tech-base project) that will enable extremely high-fidelity analog-to-digital converters for a variety of national security missions. High speed (l0+ GS/s ), high precision (l0+ bits) ADC technology requires extremely short aperture times ((approx)1ps ) with very low jitter requirements (sub 10fs ). These fundamental requirements, along with other technological barriers, are difficult to realize with electronics: However, we outline here, a way to achieve these timing apertures using a novel multi-wavelength optoelectronic short-pulse optical source. Our approach uses an optoelectronic feedback scheme with high optical Q to produce an optical pulse train with ultra-low jitter ( sub 5fs) and high amplitude stability ( and lt;10(sup 10)). This approach requires low power and can be integrated into an optoelectronic integrated circuit to minimize the size. Under this seed program we have demonstrated that the optical feedback mechanism can be used to generate a high Q resonator. This has reduced the technical risk for further development, making it an attractive candidate for outside funding

  1. LDRD 2016 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, D. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2017-03-31

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2C dated October 22, 2015. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2016, as required. In FY 2016, the BNL LDRD Program funded 48 projects, 21 of which were new starts, at a total cost of $11.5M. The investments that BNL makes in its LDRD program support the Laboratory’s strategic goals. BNL has identified four Critical Outcomes that define the Laboratory’s scientific future and that will enable it to realize its overall vision. Two operational Critical Outcomes address essential operational support for that future: renewal of the BNL campus; and safe, efficient laboratory operations.

  2. Securing the Internet Control Plane

    Science.gov (United States)

    Benton, Kevin

    2017-01-01

    The Internet carries traffic between billions of devices every day and modern societies depend on the resiliency of the routing technology behind it to work around the frequent link outages caused by natural disasters, equipment failures, destruction of cables, and even wars. However, the routing technology behind all of this, the Border Gateway…

  3. Network discovery, characterization, and prediction : a grand challenge LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Kegelmeyer, W. Philip, Jr.

    2010-11-01

    This report is the final summation of Sandia's Grand Challenge LDRD project No.119351, 'Network Discovery, Characterization and Prediction' (the 'NGC') which ran from FY08 to FY10. The aim of the NGC, in a nutshell, was to research, develop, and evaluate relevant analysis capabilities that address adversarial networks. Unlike some Grand Challenge efforts, that ambition created cultural subgoals, as well as technical and programmatic ones, as the insistence on 'relevancy' required that the Sandia informatics research communities and the analyst user communities come to appreciate each others needs and capabilities in a very deep and concrete way. The NGC generated a number of technical, programmatic, and cultural advances, detailed in this report. There were new algorithmic insights and research that resulted in fifty-three refereed publications and presentations; this report concludes with an abstract-annotated bibliography pointing to them all. The NGC generated three substantial prototypes that not only achieved their intended goals of testing our algorithmic integration, but which also served as vehicles for customer education and program development. The NGC, as intended, has catalyzed future work in this domain; by the end it had already brought in, in new funding, as much funding as had been invested in it. Finally, the NGC knit together previously disparate research staff and user expertise in a fashion that not only addressed our immediate research goals, but which promises to have created an enduring cultural legacy of mutual understanding, in service of Sandia's national security responsibilities in cybersecurity and counter proliferation.

  4. Interface physics in microporous media : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Yaklin, Melissa A.; Knutson, Chad E.; Noble, David R.; Aragon, Alicia R.; Chen, Ken Shuang; Giordano, Nicholas J. (Purdue University, West Lafayette, IN); Brooks, Carlton, F.; Pyrak-Nolte, Laura J. (Purdue University, West Lafayette, IN); Liu, Yihong (Purdue University, West Lafayette, IN)

    2008-09-01

    This document contains a summary of the work performed under the LDRD project entitled 'Interface Physics in Microporous Media'. The presence of fluid-fluid interfaces, which can carry non-zero stresses, distinguishes multiphase flows from more readily understood single-phase flows. In this work the physics active at these interfaces has been examined via a combined experimental and computational approach. One of the major difficulties of examining true microporous systems of the type found in filters, membranes, geologic media, etc. is the geometric uncertainty. To help facilitate the examination of transport at the pore-scale without this complication, a significant effort has been made in the area of fabrication of both two-dimensional and three-dimensional micromodels. Using these micromodels, multiphase flow experiments have been performed for liquid-liquid and liquid-gas systems. Laser scanning confocal microscopy has been utilized to provide high resolution, three-dimensional reconstructions as well as time resolved, two-dimensional reconstructions. Computational work has focused on extending lattice Boltzmann (LB) and finite element methods for probing the interface physics at the pore scale. A new LB technique has been developed that provides over 100x speed up for steady flows in complex geometries. A new LB model has been developed that allows for arbitrary density ratios, which has been a significant obstacle in applying LB to air-water flows. A new reduced order model has been developed and implemented in finite element code for examining non-equilibrium wetting in microchannel systems. These advances will enhance Sandia's ability to quantitatively probe the rich interfacial physics present in microporous systems.

  5. Microwave to millimeter-wave electrodynamic response and applications of semiconductor nanostructures: LDRD project 67025 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Shaner, Eric Arthur; Lee, Mark; Averitt, R. D. (Los Alamos National Laboratory); Highstrete, Clark; Taylor, A. J. (Los Alamos National Laboratory); Padilla, W. J. (Los Alamos National Laboratory); Reno, John Louis; Wanke, Michael Clement; Allen, S. James (University of California Santa Barbara)

    2006-11-01

    Solid-state lighting (SSL) technologies, based on semiconductor light emitting devices, have the potential to reduce worldwide electricity consumption by more than 10%, which could significantly reduce U.S. dependence on imported energy and improve energy security. The III-nitride (AlGaInN) materials system forms the foundation for white SSL and could cover a wide spectral range from the deep UV to the infrared. For this LDRD program, we have investigated the synthesis of single-crystalline III-nitride nanowires and heterostructure nanowires, which may possess unique optoelectronic properties. These novel structures could ultimately lead to the development of novel and highly efficient SSL nanodevice applications. GaN and III-nitride core-shell heterostructure nanowires were successfully synthesized by metal organic chemical vapor deposition (MOCVD) on two-inch wafer substrates. The effect of process conditions on nanowire growth was investigated, and characterization of the structural, optical, and electrical properties of the nanowires was also performed.

  6. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  7. Laboratory Directed Research and Development (LDRD) on Mono-uranium Nitride Fuel Development for SSTAR and Space Applications

    International Nuclear Information System (INIS)

    Choi, J; Ebbinghaus, B; Meiers, T; Ahn, J

    2006-01-01

    The US National Energy Policy of 2001 advocated the development of advanced fuel and fuel cycle technologies that are cleaner, more efficient, less waste-intensive, and more proliferation resistant. The need for advanced fuel development is emphasized in on-going DOE-supported programs, e.g., Global Nuclear Energy Initiative (GNEI), Advanced Fuel Cycle Initiative (AFCI), and GEN-IV Technology Development. The Directorates of Energy and Environment (E and E) and Chemistry and Material Sciences (C and MS) at Lawrence Livermore National Laboratory (LLNL) are interested in advanced fuel research and manufacturing using its multi-disciplinary capability and facilities to support a design concept of a small, secure, transportable, and autonomous reactor (SSTAR). The E and E and C and MS Directorates co-sponsored this Laboratory Directed Research and Development (LDRD) Project on Mono-Uranium Nitride Fuel Development for SSTAR and Space Applications. In fact, three out of the six GEN-IV reactor concepts consider using the nitride-based fuel, as shown in Table 1. SSTAR is a liquid-metal cooled, fast reactor. It uses nitride fuel in a sealed reactor vessel that could be shipped to the user and returned to the supplier having never been opened in its long operating lifetime. This sealed reactor concept envisions no fuel refueling nor on-site storage of spent fuel, and as a result, can greatly enhance proliferation resistance. However, the requirement for a sealed, long-life core imposes great challenges to research and development of the nitride fuel and its cladding. Cladding is an important interface between the fuel and coolant and a barrier to prevent fission gas release during normal and accidental conditions. In fabricating the nitride fuel rods and assemblies, the cladding material should be selected based on its the coolant-side corrosion properties, the chemical/physical interaction with the nitride fuel, as well as their thermal and neutronic properties. The US

  8. LDRD 2013 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Bookless, W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2013-12-31

    This LDRD project establishes a research program led by Jingguang Chen, who has started a new position as a Joint Appointee between BNL and Columbia University as of FY2013. Under this project, Dr. Chen will establish a new program in catalysis science at BNL and Columbia University. The LDRD program will provide initial research funding to start research at both BNL and Columbia. At BNL, Dr. Chen will initiate laboratory research, including hiring research staff, and will collaborate with the existing BNL catalysis and electrocatalysis research groups. At Columbia, a subcontract to Dr. Chen will provide startup funding for his laboratory research, including initial graduate student costs. The research efforts will be linked under a common Catalysis Program in Sustainable Fuels. The overall impact of this project will be to strengthen the BNL catalysis science program through new linked research thrusts and the addition of an internationally distinguished catalysis scientist.

  9. LDRD final report : robust analysis of large-scale combinatorial applications.

    Energy Technology Data Exchange (ETDEWEB)

    Carr, Robert D.; Morrison, Todd (University of Colorado, Denver, CO); Hart, William Eugene; Benavides, Nicolas L. (Santa Clara University, Santa Clara, CA); Greenberg, Harvey J. (University of Colorado, Denver, CO); Watson, Jean-Paul; Phillips, Cynthia Ann

    2007-09-01

    Discrete models of large, complex systems like national infrastructures and complex logistics frameworks naturally incorporate many modeling uncertainties. Consequently, there is a clear need for optimization techniques that can robustly account for risks associated with modeling uncertainties. This report summarizes the progress of the Late-Start LDRD 'Robust Analysis of Largescale Combinatorial Applications'. This project developed new heuristics for solving robust optimization models, and developed new robust optimization models for describing uncertainty scenarios.

  10. Efficient Probability of Failure Calculations for QMU using Computational Geometry LDRD 13-0144 Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Scott A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ebeida, Mohamed Salah [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Romero, Vicente J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Swiler, Laura Painton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rushdi, Ahmad A. [Univ. of Texas, Austin, TX (United States); Abdelkader, Ahmad [Univ. of Maryland, College Park, MD (United States)

    2015-09-01

    This SAND report summarizes our work on the Sandia National Laboratory LDRD project titled "Efficient Probability of Failure Calculations for QMU using Computational Geometry" which was project #165617 and proposal #13-0144. This report merely summarizes our work. Those interested in the technical details are encouraged to read the full published results, and contact the report authors for the status of the software and follow-on projects.

  11. Behavior-aware decision support systems : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Hirsch, Gary B.; Homer, Jack (Homer Consulting); Chenoweth, Brooke N.; Backus, George A.; Strip, David R.

    2007-11-01

    As Sandia National Laboratories serves its mission to provide support for the security-related interests of the United States, it is faced with considering the behavioral responses that drive problems, mitigate interventions, or lead to unintended consequences. The effort described here expands earlier works in using healthcare simulation to develop behavior-aware decision support systems. This report focuses on using qualitative choice techniques and enhancing two analysis models developed in a sister project.

  12. FY07 LDRD Final Report Precision, Split Beam, Chirped-Pulse, Seed Laser Technology

    Energy Technology Data Exchange (ETDEWEB)

    Dawson, J W; Messerly, M J; Phan, H H; Crane, J K; Beach, R J; Siders, C W; Barty, C J

    2009-11-12

    The goal of this LDRD ER was to develop a robust and reliable technology to seed high-energy laser systems with chirped pulses that can be amplified to kilo-Joule energies and recompressed to sub-picosecond pulse widths creating extremely high peak powers suitable for petawatt class physics experiments. This LDRD project focused on the development of optical fiber laser technologies compatible with the current long pulse National Ignition Facility (NIF) seed laser. New technologies developed under this project include, high stability mode-locked fiber lasers, fiber based techniques for reduction of compressed pulse pedestals and prepulses, new compact stretchers based on chirped fiber Bragg gratings (CFBGs), new techniques for manipulation of chirped pulses prior to amplification and new high-energy fiber amplifiers. This project was highly successful and met virtually all of its goals. The National Ignition Campaign has found the results of this work to be very helpful. The LDRD developed system is being employed in experiments to engineer the Advanced Radiographic Capability (ARC) front end and the fully engineered version of the ARC Front End will employ much of the technology and techniques developed here.

  13. Laboratory Directed Research and Development LDRD-FY-2011

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2012-03-01

    This report provides a summary of the research conducted at the Idaho National Laboratory (INL) during Fiscal Year (FY) 2011. This report demonstrates the types of cutting edge research the INL is performing to help ensure the nation's energy security. The research conducted under this program is aligned with our strategic direction, benefits the Department of Energy (DOE) and is in compliance with DOE order 413.2B. This report summarizes the diverse research and development portfolio with emphasis on the DOE Office of Nuclear Energy (DOE-NE) mission, encompassing both advanced nuclear science and technology and underlying technologies.

  14. Final report for the mobile node authentication LDRD project.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Lanzone, Andrew J.

    2005-09-01

    In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

  15. Quantum computing accelerator I/O : LDRD 52750 final report

    International Nuclear Information System (INIS)

    Schroeppel, Richard Crabtree; Modine, Normand Arthur; Ganti, Anand; Pierson, Lyndon George; Tigges, Christopher P.

    2003-01-01

    In a superposition of quantum states, a bit can be in both the states '0' and '1' at the same time. This feature of the quantum bit or qubit has no parallel in classical systems. Currently, quantum computers consisting of 4 to 7 qubits in a 'quantum computing register' have been built. Innovative algorithms suited to quantum computing are now beginning to emerge, applicable to sorting and cryptanalysis, and other applications. A framework for overcoming slightly inaccurate quantum gate interactions and for causing quantum states to survive interactions with surrounding environment is emerging, called quantum error correction. Thus there is the potential for rapid advances in this field. Although quantum information processing can be applied to secure communication links (quantum cryptography) and to crack conventional cryptosystems, the first few computing applications will likely involve a 'quantum computing accelerator' similar to a 'floating point arithmetic accelerator' interfaced to a conventional Von Neumann computer architecture. This research is to develop a roadmap for applying Sandia's capabilities to the solution of some of the problems associated with maintaining quantum information, and with getting data into and out of such a 'quantum computing accelerator'. We propose to focus this work on 'quantum I/O technologies' by applying quantum optics on semiconductor nanostructures to leverage Sandia's expertise in semiconductor microelectronic/photonic fabrication techniques, as well as its expertise in information theory, processing, and algorithms. The work will be guided by understanding of practical requirements of computing and communication architectures. This effort will incorporate ongoing collaboration between 9000, 6000 and 1000 and between junior and senior personnel. Follow-on work to fabricate and evaluate appropriate experimental nano/microstructures will be proposed as a result of this work

  16. Final report on LDRD project : coupling strategies for multi-physics applications.

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Matthew Morgan; Moffat, Harry K.; Carnes, Brian; Hooper, Russell Warren; Pawlowski, Roger P.

    2007-11-01

    Many current and future modeling applications at Sandia including ASC milestones will critically depend on the simultaneous solution of vastly different physical phenomena. Issues due to code coupling are often not addressed, understood, or even recognized. The objectives of the LDRD has been both in theory and in code development. We will show that we have provided a fundamental analysis of coupling, i.e., when strong coupling vs. a successive substitution strategy is needed. We have enabled the implementation of tighter coupling strategies through additions to the NOX and Sierra code suites to make coupling strategies available now. We have leveraged existing functionality to do this. Specifically, we have built into NOX the capability to handle fully coupled simulations from multiple codes, and we have also built into NOX the capability to handle Jacobi Free Newton Krylov simulations that link multiple applications. We show how this capability may be accessed from within the Sierra Framework as well as from outside of Sierra. The critical impact from this LDRD is that we have shown how and have delivered strategies for enabling strong Newton-based coupling while respecting the modularity of existing codes. This will facilitate the use of these codes in a coupled manner to solve multi-physic applications.

  17. LDRD Report: Topological Design Optimization of Convolutes in Next Generation Pulsed Power Devices.

    Energy Technology Data Exchange (ETDEWEB)

    Cyr, Eric C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); von Winckel, Gregory John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Kouri, Drew Philip [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gardiner, Thomas Anthony [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ridzal, Denis [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Shadid, John N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Miller, Sean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    This LDRD project was developed around the ambitious goal of applying PDE-constrained opti- mization approaches to design Z-machine components whose performance is governed by elec- tromagnetic and plasma models. This report documents the results of this LDRD project. Our differentiating approach was to use topology optimization methods developed for structural design and extend them for application to electromagnetic systems pertinent to the Z-machine. To achieve this objective a suite of optimization algorithms were implemented in the ROL library part of the Trilinos framework. These methods were applied to standalone demonstration problems and the Drekar multi-physics research application. Out of this exploration a new augmented Lagrangian approach to structural design problems was developed. We demonstrate that this approach has favorable mesh-independent performance. Both the final design and the algorithmic performance were independent of the size of the mesh. In addition, topology optimization formulations for the design of conducting networks were developed and demonstrated. Of note, this formulation was used to develop a design for the inner magnetically insulated transmission line on the Z-machine. The resulting electromagnetic device is compared with theoretically postulated designs.

  18. Building more powerful less expensive supercomputers using Processing-In-Memory (PIM) LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Murphy, Richard C.

    2009-09-01

    This report details the accomplishments of the 'Building More Powerful Less Expensive Supercomputers Using Processing-In-Memory (PIM)' LDRD ('PIM LDRD', number 105809) for FY07-FY09. Latency dominates all levels of supercomputer design. Within a node, increasing memory latency, relative to processor cycle time, limits CPU performance. Between nodes, the same increase in relative latency impacts scalability. Processing-In-Memory (PIM) is an architecture that directly addresses this problem using enhanced chip fabrication technology and machine organization. PIMs combine high-speed logic and dense, low-latency, high-bandwidth DRAM, and lightweight threads that tolerate latency by performing useful work during memory transactions. This work examines the potential of PIM-based architectures to support mission critical Sandia applications and an emerging class of more data intensive informatics applications. This work has resulted in a stronger architecture/implementation collaboration between 1400 and 1700. Additionally, key technology components have impacted vendor roadmaps, and we are in the process of pursuing these new collaborations. This work has the potential to impact future supercomputer design and construction, reducing power and increasing performance. This final report is organized as follow: this summary chapter discusses the impact of the project (Section 1), provides an enumeration of publications and other public discussion of the work (Section 1), and concludes with a discussion of future work and impact from the project (Section 1). The appendix contains reprints of the refereed publications resulting from this work.

  19. Final LDRD report : development of advanced UV light emitters and biological agent detection strategies.

    Energy Technology Data Exchange (ETDEWEB)

    Figiel, Jeffrey James; Crawford, Mary Hagerott; Banas, Michael Anthony; Farrow, Darcie; Armstrong, Andrew M.; Serkland, Darwin Keith; Allerman, Andrew Alan; Schmitt, Randal L.

    2007-12-01

    We present the results of a three year LDRD project which has focused on the development of novel, compact, ultraviolet solid-state sources and fluorescence-based sensing platforms that apply such devices to the sensing of biological and nuclear materials. We describe our development of 270-280 nm AlGaN-based semiconductor UV LEDs with performance suitable for evaluation in biosensor platforms as well as our development efforts towards the realization of a 340 nm AlGaN-based laser diode technology. We further review our sensor development efforts, including evaluation of the efficacy of using modulated LED excitation and phase sensitive detection techniques for fluorescence detection of bio molecules and uranyl-containing compounds.

  20. Terahertz spectral signatures :measurement and detection LDRD project 86361 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Wanke, Michael Clement; Brener, Igal; Lee, Mark

    2005-11-01

    LDRD Project 86361 provided support to upgrade the chemical and material spectral signature measurement and detection capabilities of Sandia National Laboratories using the terahertz (THz) portion of the electromagnetic spectrum, which includes frequencies between 0.1 to 10 THz. Under this project, a THz time-domain spectrometer was completed. This instrument measures sample absorption spectra coherently, obtaining both magnitude and phase of the absorption signal, and has shown an operating signal-to-noise ratio of 10{sub 4}. Additionally, various gas cells and a reflectometer were added to an existing high-resolution THz Fourier transform spectrometer, which greatly extend the functionality of this spectrometer. Finally, preliminary efforts to design an integrated THz transceiver based on a quantum cascade laser were begun.

  1. Final report on LDRD project: Simulation/optimization tools for system variability analysis

    Energy Technology Data Exchange (ETDEWEB)

    R. L. Bierbaum; R. F. Billau; J. E. Campbell; K. D. Marx; R. J. Sikorski; B. M. Thompson; S. D. Wix

    1999-10-01

    >This work was conducted during FY98 (Proposal Number 98-0036) and FY99 (Proposal Number 99-0818) under the auspices of the Sandia National Laboratories Laboratory-Directed Research and Development (LDRD) program. Electrical simulation typically treats a single data point in the very large input space of component properties. For electrical simulation to reach its full potential as a design tool, it must be able to address the unavoidable variability and uncertainty in component properties. Component viability is strongly related to the design margin (and reliability) of the end product. During the course of this project, both tools and methodologies were developed to enable analysis of variability in the context of electrical simulation tools. Two avenues to link relevant tools were also developed, and the resultant toolset was applied to a major component.

  2. LDRD final report : mesoscale modeling of dynamic loading of heterogeneous materials

    Energy Technology Data Exchange (ETDEWEB)

    Robbins, Joshua [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dingreville, Remi Philippe Michel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Voth, Thomas Eugene [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Furnish, Michael David [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-12-01

    Material response to dynamic loading is often dominated by microstructure (grain structure, porosity, inclusions, defects). An example critically important to Sandia's mission is dynamic strength of polycrystalline metals where heterogeneities lead to localization of deformation and loss of shear strength. Microstructural effects are of broad importance to the scientific community and several institutions within DoD and DOE; however, current models rely on inaccurate assumptions about mechanisms at the sub-continuum or mesoscale. Consequently, there is a critical need for accurate and robust methods for modeling heterogeneous material response at this lower length scale. This report summarizes work performed as part of an LDRD effort (FY11 to FY13; project number 151364) to meet these needs.

  3. Final LDRD report :ultraviolet water purification systems for rural environments and mobile applications.

    Energy Technology Data Exchange (ETDEWEB)

    Banas, Michael Anthony; Crawford, Mary Hagerott; Ruby, Douglas Scott; Ross, Michael P.; Nelson, Jeffrey Scott; Allerman, Andrew Alan; Boucher, Ray

    2005-11-01

    We present the results of a one year LDRD program that has focused on evaluating the use of newly developed deep ultraviolet LEDs in water purification. We describe our development efforts that have produced an LED-based water exposure set-up and enumerate the advances that have been made in deep UV LED performance throughout the project. The results of E. coli inactivation with 270-295 nm LEDs are presented along with an assessment of the potential for applying deep ultraviolet LED-based water purification to mobile point-of-use applications as well as to rural and international environments where the benefits of photovoltaic-powered systems can be realized.

  4. LDRD final report : a lightweight operating system for multi-core capability class supercomputers.

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, Suzanne Marie; Hudson, Trammell B. (OS Research); Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Levenhagen, Michael J.; Brightwell, Ronald Brian

    2010-09-01

    The two primary objectives of this LDRD project were to create a lightweight kernel (LWK) operating system(OS) designed to take maximum advantage of multi-core processors, and to leverage the virtualization capabilities in modern multi-core processors to create a more flexible and adaptable LWK environment. The most significant technical accomplishments of this project were the development of the Kitten lightweight kernel, the co-development of the SMARTMAP intra-node memory mapping technique, and the development and demonstration of a scalable virtualization environment for HPC. Each of these topics is presented in this report by the inclusion of a published or submitted research paper. The results of this project are being leveraged by several ongoing and new research projects.

  5. Main group adducts of carbon dioxide and related chemistry (LDRD 149938).

    Energy Technology Data Exchange (ETDEWEB)

    Barry, Brian M. (University of New Mexico, Albuquerque, NM); Kemp, Richard Alan; Stewart, Constantine A.; Dickie, Diane A. (University of New Mexico, Albuquerque, NM)

    2010-11-01

    This late-start LDRD was broadly focused on the synthetic attempts to prepare novel ligands as complexing agents for main group metals for the sequestration of CO{sub 2}. In prior work we have shown that certain main group (p block elements) metals such as tin and zinc, when ligated to phosphinoamido- ligands, can bind CO{sub 2} in a novel fashion. Rather than simple insertion into the metal-nitrogen bonds to form carbamates, we have seen the highly unusual complexation of CO{sub 2} in a mode that is more similar to a chemical 'adduct' rather than complexation schemes that have been observed previously. The overarching goal in this work is to prepare more of these complexes that can (a) sequester (or bind) CO{sub 2} easily in this adduct form, and (b) be stable to chemical or electrochemical reduction designed to convert the CO{sub 2} to useful fuels or fuel precursors. The currently used phosphinoamido- ligands appear at this point to be less-stable than desired under electrochemical reduction conditions. This instability is believed due to the more delicate, reactive nature of the ligand framework system. In order to successfully capture and convert CO{sub 2} to useful organics, this instability must be addressed and solved. Work described in the late-start LDRD was designed to screen a variety of ligand/metal complexes that a priori are believed to be more stable to polar solvents and possible mild hydrolytic conditions than are the phosphinoamido-ligands. Results from ligand syntheses and metal complexation studies are reported.

  6. Integrated computer control system CORBA-based simulator FY98 LDRD project final summary report

    International Nuclear Information System (INIS)

    Bryant, R M; Holloway, F W; Van Arsdall, P J.

    1999-01-01

    The CORBA-based Simulator was a Laboratory Directed Research and Development (LDRD) project that applied simulation techniques to explore critical questions about distributed control architecture. The simulator project used a three-prong approach comprised of a study of object-oriented distribution tools, computer network modeling, and simulation of key control system scenarios. This summary report highlights the findings of the team and provides the architectural context of the study. For the last several years LLNL has been developing the Integrated Computer Control System (ICCS), which is an abstract object-oriented software framework for constructing distributed systems. The framework is capable of implementing large event-driven control systems for mission-critical facilities such as the National Ignition Facility (NIF). Tools developed in this project were applied to the NIF example architecture in order to gain experience with a complex system and derive immediate benefits from this LDRD. The ICCS integrates data acquisition and control hardware with a supervisory system, and reduces the amount of new coding and testing necessary by providing prebuilt components that can be reused and extended to accommodate specific additional requirements. The framework integrates control point hardware with a supervisory system by providing the services needed for distributed control such as database persistence, system start-up and configuration, graphical user interface, status monitoring, event logging, scripting language, alert management, and access control. The design is interoperable among computers of different kinds and provides plug-in software connections by leveraging a common object request brokering architecture (CORBA) to transparently distribute software objects across the network of computers. Because object broker distribution applied to control systems is relatively new and its inherent performance is roughly threefold less than traditional point

  7. Automated Algorithms for Quantum-Level Accuracy in Atomistic Simulations: LDRD Final Report.

    Energy Technology Data Exchange (ETDEWEB)

    Thompson, Aidan Patrick; Schultz, Peter Andrew; Crozier, Paul; Moore, Stan Gerald; Swiler, Laura Painton; Stephens, John Adam; Trott, Christian Robert; Foiles, Stephen Martin; Tucker, Garritt J. (Drexel University)

    2014-09-01

    This report summarizes the result of LDRD project 12-0395, titled "Automated Algorithms for Quantum-level Accuracy in Atomistic Simulations." During the course of this LDRD, we have developed an interatomic potential for solids and liquids called Spectral Neighbor Analysis Poten- tial (SNAP). The SNAP potential has a very general form and uses machine-learning techniques to reproduce the energies, forces, and stress tensors of a large set of small configurations of atoms, which are obtained using high-accuracy quantum electronic structure (QM) calculations. The local environment of each atom is characterized by a set of bispectrum components of the local neighbor density projected on to a basis of hyperspherical harmonics in four dimensions. The SNAP coef- ficients are determined using weighted least-squares linear regression against the full QM training set. This allows the SNAP potential to be fit in a robust, automated manner to large QM data sets using many bispectrum components. The calculation of the bispectrum components and the SNAP potential are implemented in the LAMMPS parallel molecular dynamics code. Global optimization methods in the DAKOTA software package are used to seek out good choices of hyperparameters that define the overall structure of the SNAP potential. FitSnap.py, a Python-based software pack- age interfacing to both LAMMPS and DAKOTA is used to formulate the linear regression problem, solve it, and analyze the accuracy of the resultant SNAP potential. We describe a SNAP potential for tantalum that accurately reproduces a variety of solid and liquid properties. Most significantly, in contrast to existing tantalum potentials, SNAP correctly predicts the Peierls barrier for screw dislocation motion. We also present results from SNAP potentials generated for indium phosphide (InP) and silica (SiO 2 ). We describe efficient algorithms for calculating SNAP forces and energies in molecular dynamics simulations using massively parallel computers

  8. ParaText : scalable solutions for processing and searching very large document collections : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Crossno, Patricia Joyce; Dunlavy, Daniel M.; Stanton, Eric T.; Shead, Timothy M.

    2010-09-01

    This report is a summary of the accomplishments of the 'Scalable Solutions for Processing and Searching Very Large Document Collections' LDRD, which ran from FY08 through FY10. Our goal was to investigate scalable text analysis; specifically, methods for information retrieval and visualization that could scale to extremely large document collections. Towards that end, we designed, implemented, and demonstrated a scalable framework for text analysis - ParaText - as a major project deliverable. Further, we demonstrated the benefits of using visual analysis in text analysis algorithm development, improved performance of heterogeneous ensemble models in data classification problems, and the advantages of information theoretic methods in user analysis and interpretation in cross language information retrieval. The project involved 5 members of the technical staff and 3 summer interns (including one who worked two summers). It resulted in a total of 14 publications, 3 new software libraries (2 open source and 1 internal to Sandia), several new end-user software applications, and over 20 presentations. Several follow-on projects have already begun or will start in FY11, with additional projects currently in proposal.

  9. Real-time discriminatory sensors for water contamination events :LDRD 52595 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Borek, Theodore Thaddeus III (; ); Carrejo-Simpkins, Kimberly; Wheeler, David Roger; Adkins, Douglas Ray; Robinson, Alex Lockwood; Irwin, Adriane Nadine; Lewis, Patrick Raymond; Goodin, Andrew M.; Shelmidine, Gregory J.; Dirk, Shawn M.; Chambers, William Clayton; Mowry, Curtis Dale (1722 Micro-Total-Analytical Systems); Showalter, Steven Kedrick

    2005-10-01

    The gas-phase {mu}ChemLab{trademark} developed by Sandia can detect volatile organics and semi-volatiles organics via gas phase sampling . The goal of this three year Laboratory Directed Research and Development (LDRD) project was to adapt the components and concepts used by the {mu}ChemLab{trademark} system towards the analysis of water-borne chemicals of current concern. In essence, interfacing the gas-phase {mu}ChemLab{trademark} with water to bring the significant prior investment of Sandia and the advantages of microfabrication and portable analysis to a whole new world of important analytes. These include both chemical weapons agents and their hydrolysis products and disinfection by-products such as Trihalomethanes (THMs) and haloacetic acids (HAAs). THMs and HAAs are currently regulated by EPA due to health issues, yet water utilities do not have rapid on-site methods of detection that would allow them to adjust their processes quickly; protecting consumers, meeting water quality standards, and obeying regulations more easily and with greater confidence. This report documents the results, unique hardware and devices, and methods designed during the project toward the goal stated above. It also presents and discusses the portable field system to measure THMs developed in the course of this project.

  10. Quantitative adaptation analytics for assessing dynamic systems of systems: LDRD Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Gauthier, John H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). System Readiness & Sustainment Technologies (6133, M/S 1188); Miner, Nadine E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Military & Energy Systems Analysis (6114, M/S 1188); Wilson, Michael L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Resilience and Regulatory Effects (6921, M/S 1138); Le, Hai D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). System Readiness & Sustainment Technologies (6133, M/S 1188); Kao, Gio K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Networked System Survivability & Assurance (5629, M/S 0671); Melander, Darryl J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Software Systems R& D (9525, M/S 1188); Longsine, Dennis Earl [Sandia National Laboratories, Unknown, Unknown; Vander Meer, Jr., Robert C. [SAIC, Inc., Albuquerque, NM (United States)

    2015-01-01

    Our society is increasingly reliant on systems and interoperating collections of systems, known as systems of systems (SoS). These SoS are often subject to changing missions (e.g., nation- building, arms-control treaties), threats (e.g., asymmetric warfare, terrorism), natural environments (e.g., climate, weather, natural disasters) and budgets. How well can SoS adapt to these types of dynamic conditions? This report details the results of a three year Laboratory Directed Research and Development (LDRD) project aimed at developing metrics and methodologies for quantifying the adaptability of systems and SoS. Work products include: derivation of a set of adaptability metrics, a method for combining the metrics into a system of systems adaptability index (SoSAI) used to compare adaptability of SoS designs, development of a prototype dynamic SoS (proto-dSoS) simulation environment which provides the ability to investigate the validity of the adaptability metric set, and two test cases that evaluate the usefulness of a subset of the adaptability metrics and SoSAI for distinguishing good from poor adaptability in a SoS. Intellectual property results include three patents pending: A Method For Quantifying Relative System Adaptability, Method for Evaluating System Performance, and A Method for Determining Systems Re-Tasking.

  11. RF/microwave properties of nanotubes and nanowires : LDRD Project 105876 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Scrymgeour, David; Lee, Mark; Hsu, Julia W. P.; Highstrete, Clark

    2009-09-01

    LDRD Project 105876 was a research project whose primary goal was to discover the currently unknown science underlying the basic linear and nonlinear electrodynamic response of nanotubes and nanowires in a manner that will support future efforts aimed at converting forefront nanoscience into innovative new high-frequency nanodevices. The project involved experimental and theoretical efforts to discover and understand high frequency (MHz through tens of GHz) electrodynamic response properties of nanomaterials, emphasizing nanowires of silicon, zinc oxide, and carbon nanotubes. While there is much research on DC electrical properties of nanowires, electrodynamic characteristics still represent a major new frontier in nanotechnology. We generated world-leading insight into how the low dimensionality of these nanomaterials yields sometimes desirable and sometimes problematic high-frequency properties that are outside standard model electron dynamics. In the cases of silicon nanowires and carbon nanotubes, evidence of strong disorder or glass-like charge dynamics was measured, indicating that these materials still suffer from serious inhomogeneities that limit there high frequency performance. Zinc oxide nanowires were found to obey conventional Drude dynamics. In all cases, a significant practical problem involving large impedance mismatch between the high intrinsic impedance of all nanowires and nanotubes and high-frequency test equipment had to be overcome.

  12. LDRD project final report : hybrid AI/cognitive tactical behavior framework for LVC.

    Energy Technology Data Exchange (ETDEWEB)

    Djordjevich, Donna D.; Xavier, Patrick Gordon; Brannon, Nathan Gregory; Hart, Brian E.; Hart, Derek H.; Little, Charles Quentin; Oppel, Fred John III; Linebarger, John Michael; Parker, Eric Paul

    2012-01-01

    This Lab-Directed Research and Development (LDRD) sought to develop technology that enhances scenario construction speed, entity behavior robustness, and scalability in Live-Virtual-Constructive (LVC) simulation. We investigated issues in both simulation architecture and behavior modeling. We developed path-planning technology that improves the ability to express intent in the planning task while still permitting an efficient search algorithm. An LVC simulation demonstrated how this enables 'one-click' layout of squad tactical paths, as well as dynamic re-planning for simulated squads and for real and simulated mobile robots. We identified human response latencies that can be exploited in parallel/distributed architectures. We did an experimental study to determine where parallelization would be productive in Umbra-based force-on-force (FOF) simulations. We developed and implemented a data-driven simulation composition approach that solves entity class hierarchy issues and supports assurance of simulation fairness. Finally, we proposed a flexible framework to enable integration of multiple behavior modeling components that model working memory phenomena with different degrees of sophistication.

  13. Final report for LDRD project 11-0783 : directed robots for increased military manpower effectiveness.

    Energy Technology Data Exchange (ETDEWEB)

    Rohrer, Brandon Robinson; Rothganger, Fredrick H.; Wagner, John S.; Xavier, Patrick Gordon; Morrow, James Dan

    2011-09-01

    The purpose of this LDRD is to develop technology allowing warfighters to provide high-level commands to their unmanned assets, freeing them to command a group of them or commit the bulk of their attention elsewhere. To this end, a brain-emulating cognition and control architecture (BECCA) was developed, incorporating novel and uniquely capable feature creation and reinforcement learning algorithms. BECCA was demonstrated on both a mobile manipulator platform and on a seven degree of freedom serial link robot arm. Existing military ground robots are almost universally teleoperated and occupy the complete attention of an operator. They may remove a soldier from harm's way, but they do not necessarily reduce manpower requirements. Current research efforts to solve the problem of autonomous operation in an unstructured, dynamic environment fall short of the desired performance. In order to increase the effectiveness of unmanned vehicle (UV) operators, we proposed to develop robots that can be 'directed' rather than remote-controlled. They are instructed and trained by human operators, rather than driven. The technical approach is modeled closely on psychological and neuroscientific models of human learning. Two Sandia-developed models are utilized in this effort: the Sandia Cognitive Framework (SCF), a cognitive psychology-based model of human processes, and BECCA, a psychophysical-based model of learning, motor control, and conceptualization. Together, these models span the functional space from perceptuo-motor abilities, to high-level motivational and attentional processes.

  14. Extremely secure identification documents

    International Nuclear Information System (INIS)

    Tolk, K.M.; Bell, M.

    1997-09-01

    The technology developed in this project uses biometric information printed on the document and public key cryptography to ensure that an adversary cannot issue identification documents to unauthorized individuals or alter existing documents to allow their use by unauthorized individuals. This process can be used to produce many types of identification documents with much higher security than any currently in use. The system is demonstrated using a security badge as an example. This project focused on the technologies requiring development in order to make the approach viable with existing badge printing and laminating technologies. By far the most difficult was the image processing required to verify that the picture on the badge had not been altered. Another area that required considerable work was the high density printed data storage required to get sufficient data on the badge for verification of the picture. The image processing process was successfully tested, and recommendations are included to refine the badge system to ensure high reliability. A two dimensional data array suitable for printing the required data on the badge was proposed, but testing of the readability of the array had to be abandoned due to reallocation of the budgeted funds by the LDRD office

  15. Existence of Projective Planes

    OpenAIRE

    Perrott, Xander

    2016-01-01

    This report gives an overview of the history of finite projective planes and their properties before going on to outline the proof that no projective plane of order 10 exists. The report also investigates the search carried out by MacWilliams, Sloane and Thompson in 1970 [12] and confirms their result by providing independent verification that there is no vector of weight 15 in the code generated by the projective plane of order 10.

  16. Analysis of electromagnetic scattering by nearly periodic structures: an LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, William Arthur; Warne, Larry Kevin; Jorgenson, Roy Eberhardt; Wilton, Donald R. (University of Houston, Houston, TX); Basilio, Lorena I.; Peters, David William; Capolino, F. (University of Houston, Houston, TX)

    2006-10-01

    In this LDRD we examine techniques to analyze the electromagnetic scattering from structures that are nearly periodic. Nearly periodic could mean that one of the structure's unit cells is different from all the others--a defect. It could also mean that the structure is truncated, or butted up against another periodic structure to form a seam. Straightforward electromagnetic analysis of these nearly periodic structures requires us to grid the entire structure, which would overwhelm today's computers and the computers in the foreseeable future. In this report we will examine various approximations that allow us to continue to exploit some aspects of the structure's periodicity and thereby reduce the number of unknowns required for analysis. We will use the Green's Function Interpolation with a Fast Fourier Transform (GIFFT) to examine isolated defects both in the form of a source dipole over a meta-material slab and as a rotated dipole in a finite array of dipoles. We will look at the numerically exact solution of a one-dimensional seam. In order to solve a two-dimensional seam, we formulate an efficient way to calculate the Green's function of a 1d array of point sources. We next formulate ways of calculating the far-field due to a seam and due to array truncation based on both array theory and high-frequency asymptotic methods. We compare the high-frequency and GIFFT results. Finally, we use GIFFT to solve a simple, two-dimensional seam problem.

  17. Final Report for LDRD Project 02-FS-009 Gigapixel Surveillance Camera

    Energy Technology Data Exchange (ETDEWEB)

    Marrs, R E; Bennett, C L

    2010-04-20

    The threats of terrorism and proliferation of weapons of mass destruction add urgency to the development of new techniques for surveillance and intelligence collection. For example, the United States faces a serious and growing threat from adversaries who locate key facilities underground, hide them within other facilities, or otherwise conceal their location and function. Reconnaissance photographs are one of the most important tools for uncovering the capabilities of adversaries. However, current imaging technology provides only infrequent static images of a large area, or occasional video of a small area. We are attempting to add a new dimension to reconnaissance by introducing a capability for large area video surveillance. This capability would enable tracking of all vehicle movements within a very large area. The goal of our project is the development of a gigapixel video surveillance camera for high altitude aircraft or balloon platforms. From very high altitude platforms (20-40 km altitude) it would be possible to track every moving vehicle within an area of roughly 100 km x 100 km, about the size of the San Francisco Bay region, with a gigapixel camera. Reliable tracking of vehicles requires a ground sampling distance (GSD) of 0.5 to 1 m and a framing rate of approximately two frames per second (fps). For a 100 km x 100 km area the corresponding pixel count is 10 gigapixels for a 1-m GSD and 40 gigapixels for a 0.5-m GSD. This is an order of magnitude beyond the 1 gigapixel camera envisioned in our LDRD proposal. We have determined that an instrument of this capacity is feasible.

  18. Chemiresistor microsensors for in-situ monitoring of volatile organic compounds : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Michael Loren; Hughes, Robert Clark; Kooser, Ara S.; McGrath, Lucas K.; Ho, Clifford Kuofei; Wright, Jerome L.; Davis, Chad Edward

    2003-09-01

    This report provides a summary of the three-year LDRD (Laboratory Directed Research and Development) project aimed at developing microchemical sensors for continuous, in-situ monitoring of volatile organic compounds. A chemiresistor sensor array was integrated with a unique, waterproof housing that allows the sensors to be operated in a variety of media including air, soil, and water. Numerous tests were performed to evaluate and improve the sensitivity, stability, and discriminatory capabilities of the chemiresistors. Field tests were conducted in California, Nevada, and New Mexico to further test and develop the sensors in actual environments within integrated monitoring systems. The field tests addressed issues regarding data acquisition, telemetry, power requirements, data processing, and other engineering requirements. Significant advances were made in the areas of polymer optimization, packaging, data analysis, discrimination, design, and information dissemination (e.g., real-time web posting of data; see www.sandia.gov/sensor). This project has stimulated significant interest among commercial and academic institutions. A CRADA (Cooperative Research and Development Agreement) was initiated in FY03 to investigate manufacturing methods, and a Work for Others contract was established between Sandia and Edwards Air Force Base for FY02-FY04. Funding was also obtained from DOE as part of their Advanced Monitoring Systems Initiative program from FY01 to FY03, and a DOE EMSP contract was awarded jointly to Sandia and INEEL for FY04-FY06. Contracts were also established for collaborative research with Brigham Young University to further evaluate, understand, and improve the performance of the chemiresistor sensors.

  19. A Case Study in Competitive Technical and Market Intelligence Support and Lessons Learned for the uChemLab LDRD Grand Challenge Project; TOPICAL

    International Nuclear Information System (INIS)

    SOUTHWELL, EDWIN T.; GARCIA, MARIE L.; MEYERS, CHARLES E.

    2001-01-01

    The(mu)ChemLab(trademark) Laboratory Directed Research and Development (LDRD) Grand Challenge project began in October 1996 and ended in September 2000. The technical managers of the(mu)ChemLab(trademark) project and the LDRD office, with the support of a consultant, conducted a competitive technical and market demand intelligence analysis of the(mu)ChemLab(trademark). The managers used this knowledge to make project decisions and course adjustments. CTI/MDI positively impacted the project's technology development, uncovered potential technology partnerships, and supported eventual industry partner contacts. CTI/MDI analysis is now seen as due diligence and the(mu)ChemLab(trademark) project is now the model for other Sandia LDRD Grand Challenge undertakings. This document describes the CTI/MDI analysis and captures the more important ''lessons learned'' of this Grand Challenge project, as reported by the project's management team

  20. Cross plane scattering correction

    International Nuclear Information System (INIS)

    Shao, L.; Karp, J.S.

    1990-01-01

    Most previous scattering correction techniques for PET are based on assumptions made for a single transaxial plane and are independent of axial variations. These techniques will incorrectly estimate the scattering fraction for volumetric PET imaging systems since they do not take the cross-plane scattering into account. In this paper, the authors propose a new point source scattering deconvolution method (2-D). The cross-plane scattering is incorporated into the algorithm by modeling a scattering point source function. In the model, the scattering dependence both on axial and transaxial directions is reflected in the exponential fitting parameters and these parameters are directly estimated from a limited number of measured point response functions. The authors' results comparing the standard in-plane point source deconvolution to the authors' cross-plane source deconvolution show that for a small source, the former technique overestimates the scatter fraction in the plane of the source and underestimate the scatter fraction in adjacent planes. In addition, the authors also propose a simple approximation technique for deconvolution

  1. Fourier plane imaging microscopy

    Energy Technology Data Exchange (ETDEWEB)

    Dominguez, Daniel, E-mail: daniel.dominguez@ttu.edu; Peralta, Luis Grave de [Department of Physics, Texas Tech University, Lubbock, Texas 79409 (United States); Nano Tech Center, Texas Tech University, Lubbock, Texas 79409 (United States); Alharbi, Nouf; Alhusain, Mdhaoui [Department of Physics, Texas Tech University, Lubbock, Texas 79409 (United States); Bernussi, Ayrton A. [Nano Tech Center, Texas Tech University, Lubbock, Texas 79409 (United States); Department of Electrical and Computer Engineering, Texas Tech University, Lubbock, Texas 79409 (United States)

    2014-09-14

    We show how the image of an unresolved photonic crystal can be reconstructed using a single Fourier plane (FP) image obtained with a second camera that was added to a traditional compound microscope. We discuss how Fourier plane imaging microscopy is an application of a remarkable property of the obtained FP images: they contain more information about the photonic crystals than the images recorded by the camera commonly placed at the real plane of the microscope. We argue that the experimental results support the hypothesis that surface waves, contributing to enhanced resolution abilities, were optically excited in the studied photonic crystals.

  2. Development of a cryogenic EOS capability for the Z Pulsed Radiation Source: Goals and accomplishments of FY97 LDRD project

    International Nuclear Information System (INIS)

    Hanson, D.L.; Johnston, R.R.; Asay, J.R.

    1998-03-01

    Experimental cryogenic capabilities are essential for the study of ICF high-gain target and weapons effects issues involving dynamic materials response at low temperatures. This report describes progress during the period 2/97-11/97 on the FY97 LDRD project ''Cryogenic EOS Capabilities on Pulsed Radiation Sources (Z Pinch)''. The goal of this project is the development of a general purpose cryogenic target system for precision EOS and shock physics measurements at liquid helium temperatures on the Z accelerator Z-pinch pulsed radiation source. Activity during the FY97 LDRD phase of this project has focused on development of a conceptual design for the cryogenic target system based on consideration of physics, operational, and safety issues, design and fabrication of principal system components, construction and instrumentation of a cryogenic test facility for off-line thermal and optical testing at liquid helium temperatures, initial thermal testing of a cryogenic target assembly, and the design of a cryogenic system interface to the Z pulsed radiation source facility. The authors discuss these accomplishments as well as elements of the project that require further work

  3. Instabilities of Kirkendall planes

    NARCIS (Netherlands)

    Dal, van M.J.H.; Gusak, A.M.; Cserhati, C.; Kodentsov, A.; Loo, van F.J.J.

    2001-01-01

    Reconsideration of the Kirkendall effect is presented. It is demonstrated (experimentally as well as theoretically) that Kirkendall planes can be multiple, stable or unstable within a single-phase reaction zone. A general criterion of instabilty is given.

  4. Algebraic Structures on MOD Planes

    OpenAIRE

    Kandasamy, Vasantha; Ilanthenral, K.; Smarandache, Florentin

    2015-01-01

    Study of MOD planes happens to a very recent one. In this book, systematically algebraic structures on MOD planes like, MOD semigroups, MOD groups and MOD rings of different types are defined and studied. Such study is innovative for a large four quadrant planes are made into a small MOD planes. Several distinct features enjoyed by these MOD planes are defined, developed and described.

  5. Transformational plane geometry

    CERN Document Server

    Umble, Ronald N

    2014-01-01

    Axioms of Euclidean Plane Geometry The Existence and Incidence Postulates The Distance and Ruler Postulates The Plane Separation Postulate The Protractor Postulate The Side-Angle-Side Postulate and the Euclidean Parallel Postulate Theorems of Euclidean Plane Geometry The Exterior Angle Theorem Triangle Congruence Theorems The Alternate Interior Angles Theorem and the Angle Sum Theorem Similar Triangles Introduction to Transformations, Isometries, and Similarities Transformations Isometries and SimilaritiesAppendix: Proof of Surjectivity Translations, Rotations, and Reflections Translations Rotations Reflections Appendix: Geometer's Sketchpad Commands Required by Exploratory Activities Compositions of Translations, Rotations, and Reflections The Three Points Theorem Rotations as Compositions of Two Reflections Translations as Compositions of Two Halfturns or Two Reflections The Angle Addition Theorem Glide Reflections Classification of Isometries The Fundamental Theorem and Congruence Classification of Isometr...

  6. Fast Plane Wave Imaging

    DEFF Research Database (Denmark)

    Jensen, Jonas

    This PhD project investigates and further develops methods for ultrasound plane wave imaging and blood flow estimation with the objective of overcoming some of the major limitations in conventional ultrasound systems, which are related to low frame rates and only estimation of velocities along...... the ultrasound beam. The first part of the contribution investigates the compromise between frame rate and plane wave image quality including the influence of grating lobes from a λ-pitch transducer. A method for optimizing the image quality is suggested, and it is shown that the frame rate can be increased...... healthy volunteers. Complex flow patterns were measured in an anthropomorphic flow phantom and showed good agreement with the velocity field simulated using computational fluid dynamics. The last part of the contribution investigates two clinical applications. Plane wave imaging was used for slow velocity...

  7. Simulations of the interaction of intense petawatt laser pulses with dense Z-pinch plasmas : final report LDRD 39670

    International Nuclear Information System (INIS)

    Welch, Dale Robert; MacFarlane, Joseph John; Mehlhorn, Thomas Alan; Campbell, Robert B.

    2004-01-01

    We have studied the feasibility of using the 3D fully electromagnetic implicit hybrid particle code LSP (Large Scale Plasma) to study laser plasma interactions with dense, compressed plasmas like those created with Z, and which might be created with the planned ZR. We have determined that with the proper additional physics and numerical algorithms developed during the LDRD period, LSP was transformed into a unique platform for studying such interactions. Its uniqueness stems from its ability to consider realistic compressed densities and low initial target temperatures (if required), an ability that conventional PIC codes do not possess. Through several test cases, validations, and applications to next generation machines described in this report, we have established the suitability of the code to look at fast ignition issues for ZR, as well as other high-density laser plasma interaction problems relevant to the HEDP program at Sandia (e.g. backlighting)

  8. Characterize and Model Final Waste Formulations and Offgas Solids from Thermal Treatment Processes - FY-98 Final Report for LDRD 2349

    Energy Technology Data Exchange (ETDEWEB)

    Kessinger, Glen Frank; Nelson, Lee Orville; Grandy, Jon Drue; Zuck, Larry Douglas; Kong, Peter Chuen Sun; Anderson, Gail

    1999-08-01

    The purpose of LDRD #2349, Characterize and Model Final Waste Formulations and Offgas Solids from Thermal Treatment Processes, was to develop a set of tools that would allow the user to, based on the chemical composition of a waste stream to be immobilized, predict the durability (leach behavior) of the final waste form and the phase assemblages present in the final waste form. The objectives of the project were: • investigation, testing and selection of thermochemical code • development of auxiliary thermochemical database • synthesis of materials for leach testing • collection of leach data • using leach data for leach model development • thermochemical modeling The progress toward completion of these objectives and a discussion of work that needs to be completed to arrive at a logical finishing point for this project will be presented.

  9. Final LDRD report : development of sample preparation methods for ChIPMA-based imaging mass spectrometry of tissue samples.

    Energy Technology Data Exchange (ETDEWEB)

    Maharrey, Sean P.; Highley, Aaron M.; Behrens, Richard, Jr.; Wiese-Smith, Deneille

    2007-12-01

    The objective of this short-term LDRD project was to acquire the tools needed to use our chemical imaging precision mass analyzer (ChIPMA) instrument to analyze tissue samples. This effort was an outgrowth of discussions with oncologists on the need to find the cellular origin of signals in mass spectra of serum samples, which provide biomarkers for ovarian cancer. The ultimate goal would be to collect chemical images of biopsy samples allowing the chemical images of diseased and nondiseased sections of a sample to be compared. The equipment needed to prepare tissue samples have been acquired and built. This equipment includes an cyro-ultramicrotome for preparing thin sections of samples and a coating unit. The coating unit uses an electrospray system to deposit small droplets of a UV-photo absorbing compound on the surface of the tissue samples. Both units are operational. The tissue sample must be coated with the organic compound to enable matrix assisted laser desorption/ionization (MALDI) and matrix enhanced secondary ion mass spectrometry (ME-SIMS) measurements with the ChIPMA instrument Initial plans to test the sample preparation using human tissue samples required development of administrative procedures beyond the scope of this LDRD. Hence, it was decided to make two types of measurements: (1) Testing the spatial resolution of ME-SIMS by preparing a substrate coated with a mixture of an organic matrix and a bio standard and etching a defined pattern in the coating using a liquid metal ion beam, and (2) preparing and imaging C. elegans worms. Difficulties arose in sectioning the C. elegans for analysis and funds and time to overcome these difficulties were not available in this project. The facilities are now available for preparing biological samples for analysis with the ChIPMA instrument. Some further investment of time and resources in sample preparation should make this a useful tool for chemical imaging applications.

  10. The OBS control plane

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée

    2010-01-01

    . The applicability analysis carried out here focuses on the actual feasibility of the integration and the potential trade-offs which appear when two contradicting principles are combined. Taking advantage of the flexibility of the GMPLS control plane does not seem to be as easy and as straightforward as expected...

  11. Design for Security Workshop

    Science.gov (United States)

    2014-09-30

    plane sees such message, it takes action to re-direct data Design for Security - S. LEEF, July, 201425 Router image source: Cisco web site Carrier of...Confidential Material T3S Status • Engaging/ recruiting additional members & partners  In discussion with other semiconductor companies; network & other

  12. BKP plane partitions

    International Nuclear Information System (INIS)

    Foda, Omar; Wheeler, Michael

    2007-01-01

    Using BKP neutral fermions, we derive a product expression for the generating function of volume-weighted plane partitions that satisfy two conditions. If we call a set of adjacent equal height-h columns, h > 0, an h-path, then 1. Every h-path can assume one of two possible colours. 2. There is a unique way to move along an h-path from any column to another

  13. BKP plane partitions

    Energy Technology Data Exchange (ETDEWEB)

    Foda, Omar; Wheeler, Michael [Department of Mathematics and Statistics, University of Melbourne, Parkville, Victoria 3010 (Australia)

    2007-01-15

    Using BKP neutral fermions, we derive a product expression for the generating function of volume-weighted plane partitions that satisfy two conditions. If we call a set of adjacent equal height-h columns, h > 0, an h-path, then 1. Every h-path can assume one of two possible colours. 2. There is a unique way to move along an h-path from any column to another.

  14. Carbon nanotube plane fastener

    Directory of Open Access Journals (Sweden)

    Kaori Hirahara

    2011-12-01

    Full Text Available We report a feature of carbon nanotubes (CNTs that arises when the surfaces of two vertically-aligned CNT brushes are pressed together. Adhesion between the CNTs creates a plane fastener-like device. Observations from scanning electron microscopy and measurements of adhesion properties indicate a device-dependence on CNT density and shape near the tip region. Among other applications, such fasteners have the potential to attach small components onto micron-sized electronic devices.

  15. Conquest of the Plane

    OpenAIRE

    Colignatus, Thomas

    2011-01-01

    CONQUEST OF THE PLANE provides: an integrated course for geometry and analysis a didactic build-up that avoids traditional clutter use of only the essentials for good understanding proper place for vectors, complex numbers, linear algebra and trigonometry an original and elegant development of trigonometry an original and elegant foundation for calculus examples from physics, economics and statistics integration within the dynamic environment of Mathematica ...

  16. Final report for LDRD Project 93633 : new hash function for data protection.

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, Timothy John; Dautenhahn, Nathan; Schroeppel, Richard Crabtree; Tolk, Keith Michael; Orman, Hilarie (PurpleStreak, Inc.); Walker, Andrea Mae; Malone, Sean; Lee, Eric; Neumann, William Douglas; Cordwell, William R.; Torgerson, Mark Dolan; Anderson, Eric; Lanzone, Andrew J.; Collins, Michael Joseph; McDonald, Timothy Scott; Caskey, Susan Adele

    2009-03-01

    The security of the widely-used cryptographic hash function SHA1 has been impugned. We have developed two replacement hash functions. The first, SHA1X, is a drop-in replacement for SHA1. The second, SANDstorm, has been submitted as a candidate to the NIST-sponsored SHA3 Hash Function competition.

  17. An Algorithm for constructing Hjelmslev planes

    OpenAIRE

    Hall, Joanne L.; Rao, Asha

    2013-01-01

    Projective Hjelmslev planes and Affine Hjelmselv planes are generalisations of projective planes and affine planes. We present an algorithm for constructing a projective Hjelmslev planes and affine Hjelsmelv planes using projective planes, affine planes and orthogonal arrays. We show that all 2-uniform projective Hjelmslev planes, and all 2-uniform affine Hjelsmelv planes can be constructed in this way. As a corollary it is shown that all 2-uniform Affine Hjelmselv planes are sub-geometries o...

  18. Simultaneous orthogonal plane imaging.

    Science.gov (United States)

    Mickevicius, Nikolai J; Paulson, Eric S

    2017-11-01

    Intrafraction motion can result in a smearing of planned external beam radiation therapy dose distributions, resulting in an uncertainty in dose actually deposited in tissue. The purpose of this paper is to present a pulse sequence that is capable of imaging a moving target at a high frame rate in two orthogonal planes simultaneously for MR-guided radiotherapy. By balancing the zero gradient moment on all axes, slices in two orthogonal planes may be spatially encoded simultaneously. The orthogonal slice groups may be acquired with equal or nonequal echo times. A Cartesian spoiled gradient echo simultaneous orthogonal plane imaging (SOPI) sequence was tested in phantom and in vivo. Multiplexed SOPI acquisitions were performed in which two parallel slices were imaged along two orthogonal axes simultaneously. An autocalibrating phase-constrained 2D-SENSE-GRAPPA (generalized autocalibrating partially parallel acquisition) algorithm was implemented to reconstruct the multiplexed data. SOPI images without intraslice motion artifacts were reconstructed at a maximum frame rate of 8.16 Hz. The 2D-SENSE-GRAPPA reconstruction separated the parallel slices aliased along each orthogonal axis. The high spatiotemporal resolution provided by SOPI has the potential to be beneficial for intrafraction motion management during MR-guided radiation therapy or other MRI-guided interventions. Magn Reson Med 78:1700-1710, 2017. © 2016 International Society for Magnetic Resonance in Medicine. © 2016 International Society for Magnetic Resonance in Medicine.

  19. New Capabilities for Hostile Environments on Z Grand Challenge LDRD - Final Status

    Energy Technology Data Exchange (ETDEWEB)

    Cuneo, Michael E. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Griffin, P. J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Balch, D. K. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Bell, K. S. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Bierner, J. A. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Coverdale, C. A. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Flanagan, T. M. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Hansen, S. B. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Slaboszewicz, V. Harper- [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Jones, B. M. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Lamppa, D. C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Martin, W. J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); McKenney, J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Moore, N. W. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Parma, E. J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Peebles, H. C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Rovang, D. C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Savage, M. E. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Tang, R. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Vesey, R. A. [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2016-10-01

    The purpose of this project was to develop new physical simulation capabilities in order to support the science-based qualification of nonnuclear weapon components in hostile radiation environments. The project contributes directly to the goals of maintaining a safe, secure, and effective US nuclear stockpile, maintaining strategic deterrence at lower nuclear force levels, extending the life of the nuclear deterrent capability, and to be ready for technological surprise.

  20. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  1. Plane partition vesicles

    International Nuclear Information System (INIS)

    Rensburg, E J Janse van; Ma, J

    2006-01-01

    We examine partitions and their natural three-dimensional generalizations, plane partitions, as models of vesicles undergoing an inflation-deflation transition. The phase diagrams of these models include a critical point corresponding to an inflation-deflation transition, and exhibits multicritical scaling in the vicinity of a multicritical point located elsewhere on the critical curve. We determine the locations of the multicritical points by analysing the generating functions using analytic and numerical means. In addition, we determine the numerical values of the multicritical scaling exponents associated with the multicritical scaling regimes in these models

  2. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  3. LDRD Final Report - Investigations of the impact of the process integration of deposited magnetic films for magnetic memory technologies on radiation hardened CMOS devices and circuits - LDRD Project (FY99)

    International Nuclear Information System (INIS)

    Myers, David R.; Jessing, Jeffrey R.; Spahn, Olga B.; Shaneyfelt, Marty R.

    2000-01-01

    This project represented a coordinated LLNL-SNL collaboration to investigate the feasibility of developing radiation-hardened magnetic non-volatile memories using giant magnetoresistance (GMR) materials. The intent of this limited-duration study was to investigate whether giant magnetoresistance (GMR) materials similar to those used for magnetic tunnel junctions (MTJs) were process compatible with functioning CMOS circuits. Sandia's work on this project demonstrated that deposition of GMR materials did not affect the operation nor the radiation hardness of Sandia's rad-hard CMOS technology, nor did the integration of GMR materials and exposure to ionizing radiation affect the magnetic properties of the GMR films. Thus, following deposition of GMR films on rad-hard integrated circuits, both the circuits and the films survived ionizing radiation levels consistent with DOE mission requirements. Furthermore, Sandia developed techniques to pattern deposited GMR films without degrading the completed integrated circuits upon which they were deposited. The present feasibility study demonstrated all the necessary processing elements to allow fabrication of the non-volatile memory elements onto an existing CMOS chip, and even allow the use of embedded (on-chip) non-volatile memories for system-on-a-chip applications, even in demanding radiation environments. However, funding agencies DTRA, AIM, and DARPA did not have any funds available to support the required follow-on technology development projects that would have been required to develop functioning prototype circuits, nor were such funds available from LDRD nor from other DOE program funds

  4. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  5. Final LDRD report : science-based solutions to achieve high-performance deep-UV laser diodes.

    Energy Technology Data Exchange (ETDEWEB)

    Armstrong, Andrew M.; Miller, Mary A.; Crawford, Mary Hagerott; Alessi, Leonard J.; Smith, Michael L.; Henry, Tanya A.; Westlake, Karl R.; Cross, Karen Charlene; Allerman, Andrew Alan; Lee, Stephen Roger

    2011-12-01

    We present the results of a three year LDRD project that has focused on overcoming major materials roadblocks to achieving AlGaN-based deep-UV laser diodes. We describe our growth approach to achieving AlGaN templates with greater than ten times reduction of threading dislocations which resulted in greater than seven times enhancement of AlGaN quantum well photoluminescence and 15 times increase in electroluminescence from LED test structures. We describe the application of deep-level optical spectroscopy to AlGaN epilayers to quantify deep level energies and densities and further correlate defect properties with AlGaN luminescence efficiency. We further review our development of p-type short period superlattice structures as an approach to mitigate the high acceptor activation energies in AlGaN alloys. Finally, we describe our laser diode fabrication process, highlighting the development of highly vertical and smooth etched laser facets, as well as characterization of resulting laser heterostructures.

  6. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  7. Duality and noncommutative planes

    DEFF Research Database (Denmark)

    Jøndrup, Søren

    2015-01-01

    We study extensions of simple modules over an associative ring A   and we prove that for twosided ideals mm and nn with artinian factors the condition ExtA1(A/m,A/n)≠0 holds for the left A  -modules A/mA/m and A/nA/n if and only if it holds for the right modules A/nA/n and A/mA/m. The methods pro...... proving this are applied to show that noncommutative models of the plane, i.e. algebras of the form k〈x,y〉/(f)k〈x,y〉/(f), where f∈([x,y])f∈([x,y]) are noetherian only in case (f)=([x,y])...

  8. Quantifiably secure power grid operation, management, and evolution :

    Energy Technology Data Exchange (ETDEWEB)

    Gray, Genetha Anne.; Watson, Jean-Paul; Silva Monroy, Cesar Augusto; Gramacy, Robert B.

    2013-09-01

    This report summarizes findings and results of the Quantifiably Secure Power Grid Operation, Management, and Evolution LDRD. The focus of the LDRD was to develop decisionsupport technologies to enable rational and quantifiable risk management for two key grid operational timescales: scheduling (day-ahead) and planning (month-to-year-ahead). Risk or resiliency metrics are foundational in this effort. The 2003 Northeast Blackout investigative report stressed the criticality of enforceable metrics for system resiliency the grids ability to satisfy demands subject to perturbation. However, we neither have well-defined risk metrics for addressing the pervasive uncertainties in a renewable energy era, nor decision-support tools for their enforcement, which severely impacts efforts to rationally improve grid security. For day-ahead unit commitment, decision-support tools must account for topological security constraints, loss-of-load (economic) costs, and supply and demand variability especially given high renewables penetration. For long-term planning, transmission and generation expansion must ensure realized demand is satisfied for various projected technological, climate, and growth scenarios. The decision-support tools investigated in this project paid particular attention to tailoriented risk metrics for explicitly addressing high-consequence events. Historically, decisionsupport tools for the grid consider expected cost minimization, largely ignoring risk and instead penalizing loss-of-load through artificial parameters. The technical focus of this work was the development of scalable solvers for enforcing risk metrics. Advanced stochastic programming solvers were developed to address generation and transmission expansion and unit commitment, minimizing cost subject to pre-specified risk thresholds. Particular attention was paid to renewables where security critically depends on production and demand prediction accuracy. To address this

  9. LDRD Final Report - Investigations of the impact of the process integration of deposited magnetic films for magnetic memory technologies on radiation-hardened CMOS devices and circuits - LDRD Project (FY99)

    Energy Technology Data Exchange (ETDEWEB)

    MYERS,DAVID R.; JESSING,JEFFREY R.; SPAHN,OLGA B.; SHANEYFELT,MARTY R.

    2000-01-01

    This project represented a coordinated LLNL-SNL collaboration to investigate the feasibility of developing radiation-hardened magnetic non-volatile memories using giant magnetoresistance (GMR) materials. The intent of this limited-duration study was to investigate whether giant magnetoresistance (GMR) materials similar to those used for magnetic tunnel junctions (MTJs) were process compatible with functioning CMOS circuits. Sandia's work on this project demonstrated that deposition of GMR materials did not affect the operation nor the radiation hardness of Sandia's rad-hard CMOS technology, nor did the integration of GMR materials and exposure to ionizing radiation affect the magnetic properties of the GMR films. Thus, following deposition of GMR films on rad-hard integrated circuits, both the circuits and the films survived ionizing radiation levels consistent with DOE mission requirements. Furthermore, Sandia developed techniques to pattern deposited GMR films without degrading the completed integrated circuits upon which they were deposited. The present feasibility study demonstrated all the necessary processing elements to allow fabrication of the non-volatile memory elements onto an existing CMOS chip, and even allow the use of embedded (on-chip) non-volatile memories for system-on-a-chip applications, even in demanding radiation environments. However, funding agencies DTRA, AIM, and DARPA did not have any funds available to support the required follow-on technology development projects that would have been required to develop functioning prototype circuits, nor were such funds available from LDRD nor from other DOE program funds.

  10. Semantic Versus Syntactic Cutting Planes

    OpenAIRE

    Filmus, Yuval; Hrubeš, Pavel; Lauria, Massimo

    2016-01-01

    In this paper, we compare the strength of the semantic and syntactic version of the cutting planes proof system. First, we show that the lower bound technique of Pudlák applies also to semantic cutting planes: the proof system has feasible interpolation via monotone real circuits, which gives an exponential lower bound on lengths of semantic cutting planes refutations. Second, we show that semantic refutations are stronger than syntactic ones. In particular, we give a formula for whic...

  11. Approaches for scalable modeling and emulation of cyber systems : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Mayo, Jackson R.; Minnich, Ronald G.; Armstrong, Robert C.; Rudish, Don W.

    2009-09-01

    The goal of this research was to combine theoretical and computational approaches to better understand the potential emergent behaviors of large-scale cyber systems, such as networks of {approx} 10{sup 6} computers. The scale and sophistication of modern computer software, hardware, and deployed networked systems have significantly exceeded the computational research community's ability to understand, model, and predict current and future behaviors. This predictive understanding, however, is critical to the development of new approaches for proactively designing new systems or enhancing existing systems with robustness to current and future cyber threats, including distributed malware such as botnets. We have developed preliminary theoretical and modeling capabilities that can ultimately answer questions such as: How would we reboot the Internet if it were taken down? Can we change network protocols to make them more secure without disrupting existing Internet connectivity and traffic flow? We have begun to address these issues by developing new capabilities for understanding and modeling Internet systems at scale. Specifically, we have addressed the need for scalable network simulation by carrying out emulations of a network with {approx} 10{sup 6} virtualized operating system instances on a high-performance computing cluster - a 'virtual Internet'. We have also explored mappings between previously studied emergent behaviors of complex systems and their potential cyber counterparts. Our results provide foundational capabilities for further research toward understanding the effects of complexity in cyber systems, to allow anticipating and thwarting hackers.

  12. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  13. Gravitational Couplings for Gop-Planes and y-Op-Planes

    OpenAIRE

    Giraldo, Juan Fernando Ospina

    2000-01-01

    The Wess-Zumino actions for generalized orientifold planes (GOp-planes) and y-deformed orientifold planes (yOp-planes) are presented and two series power expantions are realized from whiches processes that involves GOp-planes,yOp-planes, RR-forms, gravitons and gaugeons, are obtained. Finally non-standard GOp-planes and y-Op-planes are showed.

  14. Advances in radiation modeling in ALEGRA :a final report for LDRD-67120, efficient implicit mulitgroup radiation calculations.

    Energy Technology Data Exchange (ETDEWEB)

    Mehlhorn, Thomas Alan; Kurecka, Christopher J. (University of Michigan, Ann Arbor, MI); McClarren, Ryan (University of Michigan, Ann Arbor, MI); Brunner, Thomas A.; Holloway, James Paul (University of Michigan, Ann Arbor, MI)

    2005-11-01

    The original LDRD proposal was to use a nonlinear diffusion solver to compute estimates for the material temperature that could then be used in a Implicit Monte Carlo (IMC) calculation. At the end of the first year of the project, it was determined that this was not going to be effective, partially due to the concept, and partially due to the fact that the radiation diffusion package was not as efficient as it could be. The second, and final year, of the project focused on improving the robustness and computational efficiency of the radiation diffusion package in ALEGRA. To this end, several new multigroup diffusion methods have been developed and implemented in ALEGRA. While these methods have been implemented, their effectiveness of reducing overall simulation run time has not been fully tested. Additionally a comprehensive suite of verification problems has been developed for the diffusion package to ensure that it has been implemented correctly. This process took considerable time, but exposed significant bugs in both the previous and new diffusion packages, the linear solve packages, and even the NEVADA Framework's parser. In order to manage this large suite of problem, a new tool called Tampa has been developed. It is a general tool for automating the process of running and analyzing many simulations. Ryan McClarren, at the University of Michigan has been developing a Spherical Harmonics capability for unstructured meshes. While still in the early phases of development, this promises to bridge the gap in accuracy between a full transport solution using IMC and the diffusion approximation.

  15. Advances in radiation modeling in ALEGRA: a final report for LDRD-67120, efficient implicit multigroup radiation calculations

    International Nuclear Information System (INIS)

    Mehlhorn, Thomas Alan; Kurecka, Christopher J.; McClarren, Ryan; Brunner, Thomas A.; Holloway, James Paul

    2005-01-01

    The original LDRD proposal was to use a nonlinear diffusion solver to compute estimates for the material temperature that could then be used in a Implicit Monte Carlo (IMC) calculation. At the end of the first year of the project, it was determined that this was not going to be effective, partially due to the concept, and partially due to the fact that the radiation diffusion package was not as efficient as it could be. The second, and final year, of the project focused on improving the robustness and computational efficiency of the radiation diffusion package in ALEGRA. To this end, several new multigroup diffusion methods have been developed and implemented in ALEGRA. While these methods have been implemented, their effectiveness of reducing overall simulation run time has not been fully tested. Additionally a comprehensive suite of verification problems has been developed for the diffusion package to ensure that it has been implemented correctly. This process took considerable time, but exposed significant bugs in both the previous and new diffusion packages, the linear solve packages, and even the NEVADA Framework's parser. In order to manage this large suite of problem, a new tool called Tampa has been developed. It is a general tool for automating the process of running and analyzing many simulations. Ryan McClarren, at the University of Michigan has been developing a Spherical Harmonics capability for unstructured meshes. While still in the early phases of development, this promises to bridge the gap in accuracy between a full transport solution using IMC and the diffusion approximation

  16. LDRD final report on adaptive-responsive nanostructures for sensing applications.

    Energy Technology Data Exchange (ETDEWEB)

    Shelnutt, John Allen; van Swol, Frank B.; Wang, Zhongchun; Medforth, Craig J.

    2005-11-01

    Functional organic nanostructures such as well-formed tubes or fibers that can easily be fabricated into electronic and photonic devices are needed in many applications. Especially desirable from a national security standpoint are nanostructures that have enhanced sensitivity for the detection of chemicals and biological (CB) agents and other environmental stimuli. We recently discovered the first class of highly responsive and adaptive porphyrin-based nanostructures that may satisfy these requirements. These novel porphyrin nanostructures, which are formed by ionic self-assembly of two oppositely charged porphyrins, may function as conductors, semiconductors, or photoconductors, and they have additional properties that make them suitable for device fabrication (e.g., as ultrasensitive colorimetric CB microsensors). Preliminary studies with porphyrin nanotubes have shown that these nanostructures have novel optical and electronic properties, including strong resonant light scattering, quenched fluorescence, and electrical conductivity. In addition, they are photochemically active and capable of light-harvesting and photosynthesis; they may also have nonlinear optical properties. Remarkably, the nanotubes and potentially other porphyrin nanostructure are mechanically responsive and adaptive (e.g., the rigidity of the micrometers-long nanotubes is altered by light, ultrasound, or chemicals) and they self-heal upon removal the environmental stimulus. Given the tremendous degree of structural variation possible in the porphyrin subunits, additional types of nanostructures and greater control over their morphology can be anticipated. Molecular modification also provides a means of controlling their electronic, photonic, and other functional properties. In this work, we have greatly broadened the range of ionic porphyrin nanostructures that can be made, and determined the optical and responsivity properties of the nanotubes and other porphyrin nanostructures. We have

  17. Conceptual Design of Wave Plane

    DEFF Research Database (Denmark)

    Frigaard, Peter; Trewers, Andrew; Kofoed, Jens Peter

    The Wave Plane is a patented Wave Energy device of the overtopping type, designed to capture potential as well as kinetic energy. This is as such different to other overtopping devices, who usually only focus on potential energy. If Wave Plane A/S can deliver the turbine technology to utilize both...

  18. Three-dimensional gyrokinetic particle-in-cell simulation of plasmas on a massively parallel computer: Final report on LDRD Core Competency Project, FY 1991--FY 1993

    International Nuclear Information System (INIS)

    Byers, J.A.; Williams, T.J.; Cohen, B.I.; Dimits, A.M.

    1994-01-01

    One of the programs of the Magnetic fusion Energy (MFE) Theory and computations Program is studying the anomalous transport of thermal energy across the field lines in the core of a tokamak. We use the method of gyrokinetic particle-in-cell simulation in this study. For this LDRD project we employed massively parallel processing, new algorithms, and new algorithms, and new formal techniques to improve this research. Specifically, we sought to take steps toward: researching experimentally-relevant parameters in our simulations, learning parallel computing to have as a resource for our group, and achieving a 100 x speedup over our starting-point Cray2 simulation code's performance

  19. A Tiered Control Plane Model for Service Function Chaining Isolation

    Directory of Open Access Journals (Sweden)

    Håkon Gunleifsen

    2018-06-01

    Full Text Available This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV domains. Current NFV implementations are designed for deployment within trusted domains, where overlay networks with static trusted links are utilized for enabling network security. Nevertheless, within a Service Function Chain (SFC, Virtual Network Function (VNF flows cannot be isolated and end-to-end encrypted because each VNF requires direct access to the overall SFC data-flow. This restricts both end-users and Service Providers from enabling end-to-end security, and in extended VNF isolation within the SFC data traffic. Encrypting data flows on a per-flow basis results in an extensive amount of secure tunnels, which cannot scale efficiently in manual configurations. Additionally, creating secure data plane tunnels between NFV providers requires secure exchange of key parameters, and the establishment of an east–west control plane protocol. In this article, we present an architecture focusing on these two problems, investigating how overlay networks can be created, isolated, and secured dynamically. Accordingly, we propose an architecture for automated establishment of encrypted tunnels in NFV, which introduces a novel, tiered east–west communication channel between network controllers in a multi-domain environment.

  20. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  1. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  2. Generating asymptotically plane wave spacetimes

    International Nuclear Information System (INIS)

    Hubeny, Veronika E.; Rangamani, Mukund

    2003-01-01

    In an attempt to study asymptotically plane wave spacetimes which admit an event horizon, we find solutions to vacuum Einstein's equations in arbitrary dimension which have a globally null Killing field and rotational symmetry. We show that while such solutions can be deformed to include ones which are asymptotically plane wave, they do not posses a regular event horizon. If we allow for additional matter, such as in supergravity theories, we show that it is possible to have extremal solutions with globally null Killing field, a regular horizon, and which, in addition, are asymptotically plane wave. In particular, we deform the extremal M2-brane solution in 11-dimensional supergravity so that it behaves asymptotically as a 10-dimensional vacuum plane wave times a real line. (author)

  3. Two-transitive MInkowski planes

    NARCIS (Netherlands)

    Wilbrink, H.A.

    1982-01-01

    In this paper we determine all finite Minkowski planes with an automorphism group which satisfies the following transitivity property: any ordered pair of nonparallel points can be mapped onto any other ordered pair of nonparallel points.

  4. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  5. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  6. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  7. Enhanced Micellar Catalysis LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Betty, Rita G.; Tucker, Mark D; Taggart, Gretchen; Kinnan, Mark K.; Glen, Crystal Chanea; Rivera, Danielle; Sanchez, Andres; Alam, Todd Michael

    2012-12-01

    The primary goals of the Enhanced Micellar Catalysis project were to gain an understanding of the micellar environment of DF-200, or similar liquid CBW surfactant-based decontaminants, as well as characterize the aerosolized DF-200 droplet distribution and droplet chemistry under baseline ITW rotary atomization conditions. Micellar characterization of limited surfactant solutions was performed externally through the collection and measurement of Small Angle X-Ray Scattering (SAXS) images and Cryo-Transmission Electron Microscopy (cryo-TEM) images. Micellar characterization was performed externally at the University of Minnesotas Characterization Facility Center, and at the Argonne National Laboratory Advanced Photon Source facility. A micellar diffusion study was conducted internally at Sandia to measure diffusion constants of surfactants over a concentration range, to estimate the effective micelle diameter, to determine the impact of individual components to the micellar environment in solution, and the impact of combined components to surfactant phase behavior. Aerosolized DF-200 sprays were characterized for particle size and distribution and limited chemical composition. Evaporation rates of aerosolized DF-200 sprays were estimated under a set of baseline ITW nozzle test system parameters.

  8. LDRD final report :

    Energy Technology Data Exchange (ETDEWEB)

    Brost, Randolph C.; McLendon, William Clarence,

    2013-01-01

    Modeling geospatial information with semantic graphs enables search for sites of interest based on relationships between features, without requiring strong a priori models of feature shape or other intrinsic properties. Geospatial semantic graphs can be constructed from raw sensor data with suitable preprocessing to obtain a discretized representation. This report describes initial work toward extending geospatial semantic graphs to include temporal information, and initial results applying semantic graph techniques to SAR image data. We describe an efficient graph structure that includes geospatial and temporal information, which is designed to support simultaneous spatial and temporal search queries. We also report a preliminary implementation of feature recognition, semantic graph modeling, and graph search based on input SAR data. The report concludes with lessons learned and suggestions for future improvements.

  9. Final LDRD report :

    Energy Technology Data Exchange (ETDEWEB)

    Kronawitter, Coleman X.; Antoun, Bonnie R.; Mao, Samuel S.

    2012-01-01

    The distinction between electricity and fuel use in analyses of global power consumption statistics highlights the critical importance of establishing efficient synthesis techniques for solar fuelsthose chemicals whose bond energies are obtained through conversion processes driven by solar energy. Photoelectrochemical (PEC) processes show potential for the production of solar fuels because of their demonstrated versatility in facilitating optoelectronic and chemical conversion processes. Tandem PEC-photovoltaic modular configurations for the generation of hydrogen from water and sunlight (solar water splitting) provide an opportunity to develop a low-cost and efficient energy conversion scheme. The critical component in devices of this type is the PEC photoelectrode, which must be optically absorptive, chemically stable, and possess the required electronic band alignment with the electrochemical scale for its charge carriers to have sufficient potential to drive the hydrogen and oxygen evolution reactions. After many decades of investigation, the primary technological obstacle remains the development of photoelectrode structures capable of efficient conversion of light with visible frequencies, which is abundant in the solar spectrum. Metal oxides represent one of the few material classes that can be made photoactive and remain stable to perform the required functions.

  10. Transportation Energy Pathways LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Barter, Garrett. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Reichmuth, David. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Westbrook, Jessica [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Malczynski, Leonard A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Yoshimura, Ann S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Peterson, Meghan B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); West, Todd H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Manley, Dawn Kataoka [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Guzman, Katherine Dunphy [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Edwards, Donna M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hines, Valerie Ann-Peters [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2012-09-01

    This report presents a system dynamics based model of the supply-demand interactions between the US light-duty vehicle (LDV) fleet, its fuels, and the corresponding primary energy sources through the year 2050. An important capability of our model is the ability to conduct parametric analyses. Others have relied upon scenario-based analysis, where one discrete set of values is assigned to the input variables and used to generate one possible realization of the future. While these scenarios can be illustrative of dominant trends and tradeoffs under certain circumstances, changes in input values or assumptions can have a significant impact on results, especially when output metrics are associated with projections far into the future. This type of uncertainty can be addressed by using a parametric study to examine a range of values for the input variables, offering a richer source of data to an analyst.The parametric analysis featured here focuses on a trade space exploration, with emphasis on factors that influence the adoption rates of electric vehicles (EVs), the reduction of GHG emissions, and the reduction of petroleum consumption within the US LDV fleet. The underlying model emphasizes competition between 13 different types of powertrains, including conventional internal combustion engine (ICE) vehicles, flex-fuel vehicles (FFVs), conventional hybrids(HEVs), plug-in hybrids (PHEVs), and battery electric vehicles(BEVs).We find that many factors contribute to the adoption rates of EVs. These include the pace of technological development for the electric powertrain, battery performance, as well as the efficiency improvements in conventional vehicles. Policy initiatives can also have a dramatic impact on the degree of EV adoption. The consumer effective payback period, in particular, can significantly increase the market penetration rates if extended towards the vehicle lifetime.Widespread EV adoption can have noticeable impact on petroleum consumption and greenhouse gas(GHG) emission by the LDV fleet. However, EVs alone cannot drive compliance with the most aggressive GHG emission reduction targets, even as the current electricity source mix shifts away from coal and towards natural gas. Since ICEs will comprise the majority of the LDV fleet for up to forty years, conventional vehicle efficiency improvements have the greatest potential for reductions in LDV GHG emissions over this time.These findings seem robust even if global oil prices rise to two to three times current projections. Thus,investment in improving the internal combustion engine might be the cheapest, lowest risk avenue towards meeting ambitious GHG emission and petroleum consumption reduction targets out to 2050.3 Acknowledgment The authors would like to thank Dr. Andrew Lutz, Dr. Benjamin Wu, Prof. Joan Ogden and Dr. Christopher Yang for their suggestions over the course of this project. This work was funded by the Laboratory Directed Research and Development program at Sandia National Laboratories.

  11. LDRD Final report

    International Nuclear Information System (INIS)

    Stewart, R.E.; Price, D.; Shepherd, R.; White, W.; Walling, R.; More, R.

    1995-01-01

    The goal of this project is to develop a 100-fs pulse length laser capable of heating solid density plasmas to near-kilovolt temperatures before hydrodynamic decompression of the target can take place, and to experimentally determine the properties of these plasmas with it. The authors have successfully developed the laser for this work and measured plasma production and laser absorption with it. This work has demonstrated the capacity to produce solid-density plasmas. Future experiments are described

  12. Final LDRD report :

    Energy Technology Data Exchange (ETDEWEB)

    Ambrosini, Andrea; Miller, James Edward; Allendorf, Mark D.; Coker, Eric Nicholas; Ermanoski, Ivan; Hogan, Roy E.,; McDaniel, Anthony H.

    2014-01-01

    Despite rapid progress, solar thermochemistry remains high risk; improvements in both active materials and reactor systems are needed. This claim is supported by studies conducted both prior to and as part of this project. Materials offer a particular large opportunity space as, until recently, very little effort apart from basic thermodynamic analysis was extended towards understanding this most fundamental component of a metal oxide thermochemical cycle. Without this knowledge, system design was hampered, but more importantly, advances in these crucial materials were rare and resulted more from intuition rather than detailed insight. As a result, only two basic families of potentially viable solid materials have been widely considered, each of which has significant challenges. Recent efforts towards applying an increased level of scientific rigor to the study of thermochemical materials have provided a much needed framework and insights toward developing the next generation of highly improved thermochemically active materials. The primary goal of this project was to apply this hard-won knowledge to rapidly advance the field of thermochemistry to produce a material within 2 years that is capable of yielding CO from CO2 at a 12.5 % reactor efficiency. Three principal approaches spanning a range of risk and potential rewards were pursued: modification of known materials, structuring known materials, and identifying/developing new materials for the application. A newly developed best-of-class material produces more fuel (9x more H2, 6x more CO) under milder conditions than the previous state of the art. Analyses of thermochemical reactor and system efficiencies and economics were performed and a new hybrid concept was reported. The larger case for solar fuels was also further refined and documented.

  13. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  14. Error Analysis on Plane-to-Plane Linear Approximate Coordinate ...

    Indian Academy of Sciences (India)

    Abstract. In this paper, the error analysis has been done for the linear approximate transformation between two tangent planes in celestial sphere in a simple case. The results demonstrate that the error from the linear transformation does not meet the requirement of high-precision astrometry under some conditions, so the ...

  15. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  16. Testing of focal plane arrays

    International Nuclear Information System (INIS)

    Merriam, J.D.

    1988-01-01

    Problems associated with the testing of focal plane arrays are briefly examined with reference to the instrumentation and measurement procedures. In particular, the approach and instrumentation used as the Naval Ocean Systems Center is presented. Most of the measurements are made with flooded illumination on the focal plane array. The array is treated as an ensemble of individual pixels, data being taken on each pixel and array averages and standard deviations computed for the entire array. Data maps are generated, showing the pixel data in the proper spatial position on the array and the array statistics

  17. Interaction of gravitational plane waves

    International Nuclear Information System (INIS)

    Ferrari, V.

    1988-01-01

    The mathematical theory of colliding, infinite-fronted, plane gravitational waves is presented. The process of focusing, the creation of singularities and horizons, due to the interaction, and the lens effect due to a beam-like gravitational wave are discussed

  18. Force Lines in Plane Stress

    DEFF Research Database (Denmark)

    Rathkjen, Arne

    A state of plane stress is illustrated by means of two families of curves, each family representing constant values of a derivative of Airy's stress function. The two families of curves form a map giving in the first place an overall picture of regions of high and low stress, and in the second...

  19. Blocking sets in Desarguesian planes

    NARCIS (Netherlands)

    Blokhuis, A.; Miklós, D.; Sós, V.T.; Szönyi, T.

    1996-01-01

    We survey recent results concerning the size of blocking sets in desarguesian projective and affine planes, and implications of these results and the technique to prove them, to related problemis, such as the size of maximal partial spreads, small complete arcs, small strong representative systems

  20. Where to repair my plane...

    OpenAIRE

    MIHAIESCU, Nicolaie

    2013-01-01

    We all know that the European Commission's strategic vision is aiming to maximize consumer participation and trust in the market by reinforcing consumer safety, enhancing knowledge, stepping up enforcement and securing redress, aligning consumer rights and policies to changes in society and in the economy. The European Union has indeed a substantial corpus of consumer law, and consumer rights exist in practice thanks to continuous improving of enforcement and securing redress. Consumers are r...

  1. Gravitational Couplings for y-Gop-Planes

    OpenAIRE

    Giraldo, Juan Fernando Ospina

    2000-01-01

    The Wess-Zumino action for y deformed and generalized orientifold planes (yGOp-planes) is presented and one power expantion is realized from which processes that involves yGOp-planes, RR-forms, gravitons and gaugeons, are obtained. Finally non-standard yGOp-planes are showed.

  2. Gravitational Couplings for Generalized Orientifold Planes

    OpenAIRE

    Giraldo, Juan Fernando Ospina

    2000-01-01

    The Wess-Zumino action for generalized orientifold planes (GOp-planes) is presented and a series power expantion is realized from which processes that involves GOp-planes, RR-forms, gravitons and gaugeons, are obtained. Finally non-standard GOp-planes are showed.

  3. Anticipating the unintended consequences of security dynamics.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Overfelt, James Robert; Malczynski, Leonard A.; Saltiel, David H.; Simon Paul Moulton

    2010-01-01

    In a globalized world, dramatic changes within any one nation causes ripple or even tsunamic effects within neighbor nations and nations geographically far removed. Multinational interventions to prevent or mitigate detrimental changes can easily cause secondary unintended consequences more detrimental and enduring than the feared change instigating the intervention. This LDRD research developed the foundations for a flexible geopolitical and socioeconomic simulation capability that focuses on the dynamic national security implications of natural and man-made trauma for a nation-state and the states linked to it through trade or treaty. The model developed contains a database for simulating all 229 recognized nation-states and sovereignties with the detail of 30 economic sectors including consumers and natural resources. The model explicitly simulates the interactions among the countries and their governments. Decisions among governments and populations is based on expectation formation. In the simulation model, failed expectations are used as a key metric for tension across states, among ethnic groups, and between population factions. This document provides the foundational documentation for the model.

  4. Hydrodynamics of planing monohull watercraft

    CERN Document Server

    Vorus, William S

    2017-01-01

    This book addresses the principles involved in the design and engineering of planing monohull power boats, with an emphasis on the theoretical fundamentals that readers need in order to be fully functional in marine design and engineering. Author William Vorus focuses on three topics: boat resistance, seaway response, and propulsion and explains the physical principles, mathematical details, and theoretical details that support physical understanding. In particular, he explains the approximations and simplifications in mathematics that lead to success in the applications of planing craft design engineering, and begins with the simplest configuration that embodies the basic physics. He leads readers, step-by-step, through the physical complications that occur, leading to a useful working knowledge of marine design and engineering. Included in the book are a wealth of examples that exemplify some of the most important naval architecture and marine engineering problems that challenge many of today’s engineers.

  5. Plane waves with weak singularities

    International Nuclear Information System (INIS)

    David, Justin R.

    2003-03-01

    We study a class of time dependent solutions of the vacuum Einstein equations which are plane waves with weak null singularities. This singularity is weak in the sense that though the tidal forces diverge at the singularity, the rate of divergence is such that the distortion suffered by a freely falling observer remains finite. Among such weak singular plane waves there is a sub-class which does not exhibit large back reaction in the presence of test scalar probes. String propagation in these backgrounds is smooth and there is a natural way to continue the metric beyond the singularity. This continued metric admits string propagation without the string becoming infinitely excited. We construct a one parameter family of smooth metrics which are at a finite distance in the space of metrics from the extended metric and a well defined operator in the string sigma model which resolves the singularity. (author)

  6. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  7. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  8. Functional Aesthetic Occlusal Plane (FAOP)

    OpenAIRE

    Câmara, Carlos Alexandre; Martins, Renato Parsekian

    2016-01-01

    ABSTRACT Introduction: A reasonable exposure of incisors and gingival tissues is generally considered more attractive than excess or lack of exposure. A reasonable gingival exposure is considered to be around 0 to 2 mm when smiling and 2-4 mm exposure of the maxillary incisor edge when the lips are at rest. Objective: The aim of this paper is to present the Functional Aesthetic Occlusal Plane (FAOP), which aims to help in the diagnosis of the relationships established among molars, incisors...

  9. Plane waves and spacelike infinity

    International Nuclear Information System (INIS)

    Marolf, Donald; Ross, Simon F

    2003-01-01

    In an earlier paper, we showed that the causal boundary of any homogeneous plane wave satisfying the null convergence condition consists of a single null curve. In Einstein-Hilbert gravity, this would include any homogeneous plane wave satisfying the weak null energy condition. For conformally flat plane waves such as the Penrose limit of AdS 5 x S 5 , all spacelike curves that reach infinity also end on this boundary and the completion is Hausdorff. However, the more generic case (including, e.g., the Penrose limits of AdS 4 x S 7 and AdS 7 x S 4 ) is more complicated. In one natural topology, not all spacelike curves have limit points in the causal completion, indicating the need to introduce additional points at 'spacelike infinity' - the endpoints of spacelike curves. We classify the distinct ways in which spacelike curves can approach infinity, finding a two-dimensional set of distinct limits. The dimensionality of the set of points at spacelike infinity is not, however, fixed from this argument. In an alternative topology, the causal completion is already compact, but the completion is non-Hausdorff

  10. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  11. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  12. Some Considerations Regarding Plane to Plane Parallelism Error Effects in Robotic Systems

    Directory of Open Access Journals (Sweden)

    Stelian Alaci

    2015-06-01

    Full Text Available The paper shows that by imposing the parallelism constraint between the measured plane and the reference plane, the position of the current plane is not univocal specified and is impossible to specify the way to attain the parallelism errors imposed by accuracy constrains. The parameters involved in the calculus of plane to plane parallelism error can be used to set univocal the relative position between the two planes.

  13. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  14. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  15. A 1.3 giga pixels focal plane for GAIA

    Science.gov (United States)

    Laborie, Anouk; Pouny, Pierre; Vetel, Cyril; Collados, Emmanuel; Rougier, Gilles; Davancens, Robert; Zayer, Igor; Perryman, Michael; Pace, Oscar

    2004-06-01

    The astrometric mission GAIA is a cornerstone mission of the European Space Agency, due for launch in the 2010 time frame. Requiring extremely demanding performance GAIA calls for the development of an unprecedented large focal plane featuring innovative technologies. For securing the very challenging GAIA development, a significant number of technology activities have been initiated by ESA through a competitive selection process. In this context, an industrial consortium led by EADS-Astrium (France) with e2v technologies (UK) as major subcontractor was selected for the GAIA CCD and Focal Plane Technology Demonstrators programme, which is by far the most significant and the most critical GAIA pre-development for all aspects: science performance, development schedule and cost. This programme has started since August 2002 and will end early 2005 prior to commencement of the GAIA Phase B. While the GAIA payload will host three instruments and related focal planes, the major mission objectives are assigned to the Astrometric (ASTRO) Focal Plane, which is the subject of this presentation.

  16. High-efficiency high-energy Ka source for the critically-required maximum illumination of x-ray optics on Z using Z-petawatt-driven laser-breakout-afterburner accelerated ultrarelativistic electrons LDRD .

    Energy Technology Data Exchange (ETDEWEB)

    Sefkow, Adam B.; Bennett, Guy R.

    2010-09-01

    Under the auspices of the Science of Extreme Environments LDRD program, a <2 year theoretical- and computational-physics study was performed (LDRD Project 130805) by Guy R Bennett (formally in Center-01600) and Adam B. Sefkow (Center-01600): To investigate novel target designs by which a short-pulse, PW-class beam could create a brighter K{alpha} x-ray source than by simple, direct-laser-irradiation of a flat foil; Direct-Foil-Irradiation (DFI). The computational studies - which are still ongoing at this writing - were performed primarily on the RedStorm supercomputer at Sandia National Laboratories Albuquerque site. The motivation for a higher efficiency K{alpha} emitter was very clear: as the backlighter flux for any x-ray imaging technique on the Z accelerator increases, the signal-to-noise and signal-to-background ratios improve. This ultimately allows the imaging system to reach its full quantitative potential as a diagnostic. Depending on the particular application/experiment this would imply, for example, that the system would have reached its full design spatial resolution and thus the capability to see features that might otherwise be indiscernible with a traditional DFI-like x-ray source. This LDRD began FY09 and ended FY10.

  17. Work Planing Automation at Mechanical Subdivision

    OpenAIRE

    Dzindzelėta, Vytautas

    2005-01-01

    Work planing automation, installation possibilities and future outlook at mechanical subdivision. To study how the work planing has changed before and after automation process and to analyse automation process methodology.

  18. Combinatorial geometry in the plane

    CERN Document Server

    Hadwiger, Hugo; Klee, Victor

    2014-01-01

    Geared toward advanced undergraduates familiar with analysis and college geometry, this concise book discusses theorems on topics restricted to the plane such as convexity, coverings, and graphs. In addition to helping students cultivate rigorous thought, the text encourages the development of mathematical intuition and clarifies the nature of mathematical research.The two-part treatment begins with specific topics including integral distances, covering problems, point set geometry and convexity, simple paradoxes involving point sets, and pure combinatorics, among other subjects. The second pa

  19. SNAP Satellite Focal Plane Development

    International Nuclear Information System (INIS)

    Bebek, C.; Akerlof, C.; Aldering, G.; Amanullah, R.; Astier, P.; Baltay, C.; Barrelet, E.; Basa, S.; Bercovitz, J.; Bergstrom, L.; Berstein, G.P.; Bester, M.; Bohlin, R.; Bonissent, A.; Bower, C.; Campbell, M.; Carithers, W.; Commins, E.; Day, C.; Deustua, S.; DiGennaro, R.; Ealet, A.; Ellis, R.; Emmett, W.; Eriksson, M.; Fouchez, D.; Fruchter, A.; Genat, J-F.; Goldhaber, G.; Goobar, A.; Groom, D.; Heetderks, H.; Holland, S.; Huterer, D.; Johnson, W.; Kadel, R.; Karcher, A.; Kim, A.; Kolbe, W.; Lafever, R.; Lamoureaux, J.; Lampton, M.; Lefevre, O.; Levi, M.; Levin, D.; Linder, E.; Loken, S.; Malina, R.; Mazure, A.; McKay, T.; McKee, S.; Miquel, R.; Morgan, N.; Mortsell, E.; Mostek, N.; Mufson, S.; Musser, J.; Roe, N.; Nugent, P.; Oluseyi, H.; Pain, R.; Palaio, N.; Pankow, D.; Perlmutter, S.; Prieto, E.; Rabinowitz, D.; Refregier, A.; Rhodes, J.; Schubnell, M.; Sholl, M.; Smadja, G.; Smith, R.; Smoot, G.; Snyder, J.; Spadafora, A.; Szymkowiak, A.; Tarle, G.; Taylor, K.; Tilquin, A.; Tomasch, A.; Vincent, D.; von der Lippe, H.; Walder, J-P.; Wang, G.

    2003-01-01

    The proposed SuperNova/Acceleration Probe (SNAP) mission will have a two-meter class telescope delivering diffraction-limited images to an instrumented 0.7 square degree field in the visible and near-infrared wavelength regime. The requirements for the instrument suite and the present configuration of the focal plane concept are presented. A two year R and D phase, largely supported by the Department of Energy, is just beginning. We describe the development activities that are taking place to advance our preparedness for mission proposal in the areas of detectors and electronics

  20. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  1. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  2. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bandlow, Alisa [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Waddell, Lucas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Levin, Drew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whetzel, Jonathan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for a performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (PI) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.

  3. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  4. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  5. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  6. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  7. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  8. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  9. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  10. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  11. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  12. An introduction to finite projective planes

    CERN Document Server

    Albert, Abraham Adrian

    2015-01-01

    Geared toward both beginning and advanced undergraduate and graduate students, this self-contained treatment offers an elementary approach to finite projective planes. Following a review of the basics of projective geometry, the text examines finite planes, field planes, and coordinates in an arbitrary plane. Additional topics include central collineations and the little Desargues' property, the fundamental theorem, and examples of finite non-Desarguesian planes.Virtually no knowledge or sophistication on the part of the student is assumed, and every algebraic system that arises is defined and

  13. Systems considerations in mosaic focal planes

    Science.gov (United States)

    White, K. P., III

    1983-08-01

    Two key reasons for pursuing the development of mosaic focal planes are reviewed and it is shown that rapid frame repetition rate is the only requirement that can be solved no other way than through mosaic focal planes. With the view that spaceborne mosaic focal plane sensors are necessarily 'smart sensors' requiring a lot of onboard processing just to function, it is pointed out that various artificial intelligence techniques may be the most appropriate to incorporate in the data processing. Finally, a novel mosaic focal plane design is proposed, termed a virtual mosaic focal plane, in response to other system constraints.

  14. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  15. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  16. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  17. A Collaborative Knowledge Plane for Autonomic Networks

    Science.gov (United States)

    Mbaye, Maïssa; Krief, Francine

    Autonomic networking aims to give network components self-managing capabilities. Several autonomic architectures have been proposed. Each of these architectures includes sort of a knowledge plane which is very important to mimic an autonomic behavior. Knowledge plane has a central role for self-functions by providing suitable knowledge to equipment and needs to learn new strategies for more accuracy.However, defining knowledge plane's architecture is still a challenge for researchers. Specially, defining the way cognitive supports interact each other in knowledge plane and implementing them. Decision making process depends on these interactions between reasoning and learning parts of knowledge plane. In this paper we propose a knowledge plane's architecture based on machine learning (inductive logic programming) paradigm and situated view to deal with distributed environment. This architecture is focused on two self-functions that include all other self-functions: self-adaptation and self-organization. Study cases are given and implemented.

  18. Radioactivity in the galactic plane

    Science.gov (United States)

    Walraven, G. D.; Haymes, R. C.

    1976-01-01

    The paper reports the detection of a large concentration of interstellar radioactivity during balloon-altitude measurements of gamma-ray energy spectra in the band between 0.02 and 12.27 MeV from galactic and extragalactic sources. Enhanced counting rates were observed in three directions towards the plane of the Galaxy; a power-law energy spectrum is computed for one of these directions (designated B 10). A large statistical deviation from the power law in a 1.0-FWHM interval centered near 1.16 MeV is discussed, and the existence of a nuclear gamma-ray line at 1.15 MeV in B 10 is postulated. It is suggested that Ca-44, which emits gamma radiation at 1.156 MeV following the decay of radioactive Sc-44, is a likely candidate for this line, noting that Sc-44 arises from Ti-44 according to explosive models of supernova nucleosynthesis. The 1.16-MeV line flux inferred from the present data is shown to equal the predicted flux for a supernova at a distance of approximately 3 kpc and an age not exceeding about 100 years.

  19. Compact planes, mostly 8-dimensional. A retrospect

    OpenAIRE

    Salzmann, Helmut R.

    2014-01-01

    Results on $8$-dimensional topological planes are scattered in the literature. It is the aim of the present paper to give a survey of these geometries, in particular of information obtained after the appearance of the treatise Compact Projective Planes or not included in this book. For some theorems new proofs are given and a few related results concerning planes of other dimensions are presented.

  20. Nanostructured carbon films with oriented graphitic planes

    International Nuclear Information System (INIS)

    Teo, E. H. T.; Kalish, R.; Kulik, J.; Kauffmann, Y.; Lifshitz, Y.

    2011-01-01

    Nanostructured carbon films with oriented graphitic planes can be deposited by applying energetic carbon bombardment. The present work shows the possibility of structuring graphitic planes perpendicular to the substrate in following two distinct ways: (i) applying sufficiently large carbon energies for deposition at room temperature (E>10 keV), (ii) utilizing much lower energies for deposition at elevated substrate temperatures (T>200 deg. C). High resolution transmission electron microscopy is used to probe the graphitic planes. The alignment achieved at elevated temperatures does not depend on the deposition angle. The data provides insight into the mechanisms leading to the growth of oriented graphitic planes under different conditions.

  1. Lower incisor inclination regarding different reference planes.

    Science.gov (United States)

    Zataráin, Brenda; Avila, Josué; Moyaho, Angeles; Carrasco, Rosendo; Velasco, Carmen

    2016-09-01

    The purpose of this study was to assess the degree of lower incisor inclination with respect to different reference planes. It was an observational, analytical, longitudinal, prospective study conducted on 100 lateral cephalograms which were corrected according to the photograph in natural head position in order to draw the true vertical plane (TVP). The incisor mandibular plane angle (IMPA) was compensated to eliminate the variation of the mandibular plane growth type with the formula "FMApx.- 25 (FMA) + IMPApx. = compensated IMPA (IMPACOM)". As the data followed normal distribution determined by the KolmogorovSmirnov test, parametric tests were used for the statistical analysis, Ttest, ANOVA and Pearson coefficient correlation test. Statistical analysis was performed using a statistical significance of p planes. There were statistically significant differences among the means of the planes measured, except for IMPACOM, FMIA and TVP. The IMPA differed significantly from the IMPACOM. The compensated IMPA and the FMIA did not differ significantly from the TVP. The true horizontal plane was mismatched with Frankfort plane in 84% of the sample with a range of 19°. The true vertical plane is adequate for measuring lower incisor inclination. Sociedad Argentina de Investigación Odontológica.

  2. Flux dynamics in ultrasensitive superconducting focal planes

    Data.gov (United States)

    National Aeronautics and Space Administration — The performance of superconducting focal planes will drive the achievable specifications of ultrasensitive instruments for NASA astrophysics missions, yet they have...

  3. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  4. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  5. Colliding almost-plane gravitational waves: Colliding plane waves and general properties of almost-plane-wave spacetimes

    International Nuclear Information System (INIS)

    Yurtsever, U.

    1988-01-01

    It is well known that when two precisely plane-symmetric gravitational waves propagating in an otherwise flat background collide, they focus each other so strongly as to produce a curvature singularity. This paper is the first of several devoted to almost-plane gravitational waves and their collisions. Such waves are more realistic than plane waves in having a finite but very large transverse size. In this paper we review some crucial features of the well-known exact solutions for colliding plane waves and we argue that one of these features, the breakdown of ''local inextendibility'' can be regarded as nongeneric. We then introduce a new framework for analyzing general colliding plane-wave spacetimes; we give an alternative proof of a theorem due to Tipler implying the existence of singularities in all generic colliding plane-wave solutions; and we discuss the fact that the recently constructed Chandrasekhar-Xanthopoulos colliding plane-wave solutions are not strictly plane symmetric and thus do not satisfy the conditions and the conclusion of Tipler's theorem

  6. FY05 LDRD Final Report A Computational Design Tool for Microdevices and Components in Pathogen Detection Systems

    Energy Technology Data Exchange (ETDEWEB)

    Trebotich, D

    2006-02-07

    We have developed new algorithms to model complex biological flows in integrated biodetection microdevice components. The proposed work is important because the design strategy for the next-generation Autonomous Pathogen Detection System at LLNL is the microfluidic-based Biobriefcase, being developed under the Chemical and Biological Countermeasures Program in the Homeland Security Organization. This miniaturization strategy introduces a new flow regime to systems where biological flow is already complex and not well understood. Also, design and fabrication of MEMS devices is time-consuming and costly due to the current trial-and-error approach. Furthermore, existing devices, in general, are not optimized. There are several MEMS CAD capabilities currently available, but their computational fluid dynamics modeling capabilities are rudimentary at best. Therefore, we proposed a collaboration to develop computational tools at LLNL which will (1) provide critical understanding of the fundamental flow physics involved in bioMEMS devices, (2) shorten the design and fabrication process, and thus reduce costs, (3) optimize current prototypes and (4) provide a prediction capability for the design of new, more advanced microfluidic systems. Computational expertise was provided by Comp-CASC and UC Davis-DAS. The simulation work was supported by key experiments for guidance and validation at UC Berkeley-BioE.

  7. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  8. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  9. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  10. Discretization of superintegrable systems on a plane

    Science.gov (United States)

    Kabát, Z.

    2012-02-01

    We construct difference analogues of so called Smorodinsky-Winternitz superintegrable systems in the Euclidean plane. Using methods of umbral calculus, we obtain difference equations for generalized isotropic harmonic oscillator on the uniform lattice, and also its solution in terms of power series. In the case of gauge-rotated Hamiltonian, the solution is a polynomial, well-defined in the whole plane.

  11. Slipping and Rolling on an Inclined Plane

    Science.gov (United States)

    Aghamohammadi, Cina; Aghamohammadi, Amir

    2011-01-01

    In the first part of the paper, using a direct calculation two-dimensional motion of a particle sliding on an inclined plane is investigated for general values of friction coefficient ([mu]). A parametric equation for the trajectory of the particle is also obtained. In the second part of the paper, the motion of a sphere on the inclined plane is…

  12. Moving vertices to make drawings plane

    NARCIS (Netherlands)

    Goaoc, X.; Kratochvil, J.; Okamoto, Y.; Shin, C.S.; Wolff, A.; Hong, S.K.; Nishizeki, T.; Quan, W.

    2008-01-01

    In John Tantalo’s on-line game Planarity the player is given a non-plane straight-line drawing of a planar graph. The aim is to make the drawing plane as quickly as possible by moving vertices. In this paper we investigate the related problem MinMovedVertices which asks for the minimum number of

  13. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  14. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  15. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  16. Open Cluster Dynamics via Fundamental Plane

    Science.gov (United States)

    Lin, Chien-Cheng; Pang, Xiao-Ying

    2018-04-01

    Open clusters (OCs) are important objects for stellar dynamics studies. The short survival timescale of OCs makes them closely related to the formation of Galactic field stars. We motivate to investigate the dynamical evolution of OCs on the aspect of internal effect and the external influence. Firstly, we make use of the known OC catalog to obtain OCs masses, effective radii. Additionally, we estimate OCs kinematics properties by OC members cross-matched with radial velocity and metallicity from SDSSIV/APOGEE2. We then establish the fundamental plane of OCs based on the radial velocity dispersion, the effective radius, and average surface brightness. The deviation of the fundamental plane from the Virial Plane, so called the tilt, and the r.m.s. dispersion of OCs around the average plane are used to indicate the dynamical status of OCs. Parameters of the fitted plane will vary with cluster age and distance.

  17. Slipping and rolling on an inclined plane

    International Nuclear Information System (INIS)

    Aghamohammadi, Cina; Aghamohammadi, Amir

    2011-01-01

    In the first part of the paper, using a direct calculation two-dimensional motion of a particle sliding on an inclined plane is investigated for general values of friction coefficient (μ). A parametric equation for the trajectory of the particle is also obtained. In the second part of the paper, the motion of a sphere on the inclined plane is studied. It is shown that the evolution equation for the contact point of a sliding sphere is similar to that of a point particle sliding on an inclined plane whose friction coefficient is 7/2 μ. If μ > 2/7 tan θ, for any arbitrary initial velocity and angular velocity, the sphere will roll on the inclined plane after some finite time. In other cases, it will slip on the inclined plane. In the case of rolling, the centre of the sphere moves on a parabola. Finally the velocity and angular velocity of the sphere are exactly computed.

  18. Coherent field propagation between tilted planes.

    Science.gov (United States)

    Stock, Johannes; Worku, Norman Girma; Gross, Herbert

    2017-10-01

    Propagating electromagnetic light fields between nonparallel planes is of special importance, e.g., within the design of novel computer-generated holograms or the simulation of optical systems. In contrast to the extensively discussed evaluation between parallel planes, the diffraction-based propagation of light onto a tilted plane is more burdensome, since discrete fast Fourier transforms cannot be applied directly. In this work, we propose a quasi-fast algorithm (O(N 3  log N)) that deals with this problem. Based on a proper decomposition into three rotations, the vectorial field distribution is calculated on a tilted plane using the spectrum of plane waves. The algorithm works on equidistant grids, so neither nonuniform Fourier transforms nor an explicit complex interpolation is necessary. The proposed algorithm is discussed in detail and applied to several examples of practical interest.

  19. Study the Z-Plane Strip Capacitance

    International Nuclear Information System (INIS)

    Parikh, H.; Swain, S.

    2005-01-01

    The BaBaR detector at the Stanford Linear Accelerator Center is currently undergoing an upgrade to improve its muon and neutral hadron detection system. The Resistive Plate Chambers (RPCs) that had been used till now have deteriorated in performance over the past few years and are being replaced by Limited Streamer Tube (LSTs). Each layer of the system consists of a set of up to 10 streamer tube modules which provide one coordinate (φ coordinate) and a single ''Z-plane'' which provides the Z coordinate of the hit. The large area Z-planes (up to 12m 2 ) are 1mm thick and contain 96 copper strips that detect the induced charge from avalanches created in the streamer tube wires. All the Z-planes needed for the upgrade have already been constructed, but only a third of the planes were installed last summer. After installing the 24 Z-planes last year, it was learned that 0.7% of the strips were dead when put inside the detector. This was mainly due to the delicate solder joint between the read-out cable and the strip, and since it is difficult to access or replace the Z-planes inside the detector, it is very important to perform various tests to make sure that the Z-planes will be efficient and effective in the long term. We measure the capacitance between the copper strips and the ground plane, and compare it to the theoretical value that we expect. Instead of measuring the capacitance channel by channel, which would be a very tedious job, we developed a more effective method of measuring the capacitance. Since all the Z-planes were built at SLAC, we also built a smaller 46 cm by 30 cm Z-plane with 12 strips just to see how they were constructed and to gain a better understanding about the solder joints

  20. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  1. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  2. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  3. Slip patterns and preferred dislocation boundary planes

    DEFF Research Database (Denmark)

    Winther, G.

    2003-01-01

    The planes of deformation induced extended planar dislocation boundaries are analysed in two different co-ordinate systems, namely the macroscopic system defined by the deformation axes and the crystallographic system given by the crystallographic lattice. The analysis covers single and polycryst......The planes of deformation induced extended planar dislocation boundaries are analysed in two different co-ordinate systems, namely the macroscopic system defined by the deformation axes and the crystallographic system given by the crystallographic lattice. The analysis covers single...... and polycrystals of fcc metals in three deformation modes (rolling, tension and torsion). In the macroscopic system, boundaries lie close to the macroscopically most stressed planes. In the crystallographic system, the boundary plane depends on the grain/crystal orientation. The boundary planes in both co......-ordinate systems are rationalised based on the slip. The more the slip is concentrated on a slip plane, the closer the boundaries lie to this. The macroscopic preference arises from the macroscopic directionality of the slip. The established relations are applied to (a) prediction of boundary planes from slip...

  4. In-plane and cross-plane thermal conductivities of molybdenum disulfide

    International Nuclear Information System (INIS)

    Ding, Zhiwei; Pei, Qing-Xiang; Zhang, Yong-Wei; Jiang, Jin-Wu

    2015-01-01

    We investigate the in-plane and cross-plane thermal conductivities of molybdenum disulfide (MoS 2 ) using non-equilibrium molecular dynamics simulations. We find that the in-plane thermal conductivity of monolayer MoS 2 is about 19.76 W mK −1 . Interestingly, the in-plane thermal conductivity of multilayer MoS 2 is insensitive to the number of layers, which is in strong contrast to the in-plane thermal conductivity of graphene where the interlayer interaction strongly affects the in-plane thermal conductivity. This layer number insensitivity is attributable to the finite energy gap in the phonon spectrum of MoS 2 , which makes the phonon–phonon scattering channel almost unchanged with increasing layer number. For the cross-plane thermal transport, we find that the cross-plane thermal conductivity of multilayer MoS 2 can be effectively tuned by applying cross-plane strain. More specifically, a 10% cross-plane compressive strain can enhance the thermal conductivity by a factor of 10, while a 5% cross-plane tensile strain can reduce the thermal conductivity by 90%. Our findings are important for thermal management in MoS 2 based nanodevices and for thermoelectric applications of MoS 2 . (paper)

  5. Influence of mandibular fixation method on stability of the maxillary occlusal plane after occlusal plane alteration.

    Science.gov (United States)

    Yosano, Akira; Katakura, Akira; Takaki, Takashi; Shibahara, Takahiko

    2009-05-01

    In this study, we investigated how method of mandibular fixation influenced longterm postoperative stability of the maxilla in Class III cases. In particular, we investigated change in the maxillary occlusal plane after Occlusal Plane Alteration. Therefore, we focused on change in the palatal plane to evaluate stability of the maxillary occlusal plane, as the position of the palatal plane affects the maxillary occlusal plane. This study included 16 patients diagnosed with mandibular protrusion. Alteration of the occlusal plane was achieved by clockwise rotation of the maxilla by Le Fort I osteotomy and mandibular setback was performed by bilateral sagittal split ramus osteotomy. We analyzed and examined lateral cephalometric radiographs taken at 1 month, 3 months, 6 months, and 1 year after surgery. Stability achieved by two methods of mandibular fixation was compared. In one group of patients (group S) titanium screws were used, and in the other group (group P) titanium-locking mini-plates were used. No significant displacement was recognized in group S, whereas an approximately 0.7mm upward vertical displacement was recognized in the anterior nasal spine in group P. As a result, not only the angle of the palatal plane and S-N plane, but also occlusal plane angle in group P showed a greater decrease than that in group S. The results suggest that fixing the mandible with screws yielded greater stability of the maxilla and maxillary occlusal plane than fixing the mandible with titanium plates.

  6. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  7. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  8. Streptococcus anginosus infections: crossing tissue planes.

    Science.gov (United States)

    Sunwoo, Bernie Y; Miller, Wallace T

    2014-10-01

    Streptococcus anginosus has long been recognized to cause invasive pyogenic infections. This holds true for thoracic infections where S. anginosus has a propensity for abscess and empyema formation. Early diagnosis is important given the significant morbidity and mortality associated with thoracic S. anginosus infections. Yet, distinguishing thoracic S. anginosus clinically is difficult. We present three cases of thoracic S. anginosus that demonstrated radiographic extension across tissue planes, including the interlobar fissure, diaphragm, and chest wall. Few infectious etiologies are known to cross tissue planes. Accordingly, we propose S. anginosus be considered among the differential diagnosis of potential infectious etiologies causing radiographic extension across tissue planes.

  9. Optically sectioned imaging by oblique plane microscopy

    Science.gov (United States)

    Kumar, Sunil; Lin, Ziduo; Lyon, Alex R.; MacLeod, Ken T.; Dunsby, Chris

    2011-03-01

    Oblique Plane Microscopy (OPM) is a light sheet microscopy technique that combines oblique illumination with correction optics that tilt the focal plane of the collection system. OPM can be used to image conventionally mounted specimens on coverslips or tissue culture dishes and has low out-of-plane photobleaching and phototoxicity. No moving parts are required to achieve an optically sectioned image and so high speed optically sectioned imaging is possible. The first OPM results obtained using a high NA water immersion lens on a commercially available inverted microscope frame are presented, together with a measurement of the achievable optical resolution.

  10. Renovation of the sealing planes of WWER-400 reactors pressure vessel

    International Nuclear Information System (INIS)

    Jablonicky, P.; Pilat, P.

    2007-01-01

    An article describes technical solution for renovation of the sealing planes of WWER-440 reactor's pressure vessel. Four nickel sealing rings placed in four concentric grooves are providing hermetic sealing between the vessel and the lid of this type of the reactor. Impeccable seal of the reactor's pressure vessel, where the fission reaction takes place, represents a basic security factor for safe electric energy production. Principle of renovation of the reactor's pressure vessel and lid sealing planes is based on mechanical enlargement of defective grooves and following cladding of the new material by TIG welding. Final step for renovation includes machining of new grooves according to geometrical and surface quality requirements (Authors)

  11. Causal inheritance in plane wave quotients

    International Nuclear Information System (INIS)

    Hubeny, Veronika E.; Rangamani, Mukund; Ross, Simon F.

    2003-01-01

    We investigate the appearance of closed timelike curves in quotients of plane waves along spacelike isometries. First we formulate a necessary and sufficient condition for a quotient of a general spacetime to preserve stable causality. We explicitly show that the plane waves are stably causal; in passing, we observe that some pp-waves are not even distinguishing. We then consider the classification of all quotients of the maximally supersymmetric ten-dimensional plane wave under a spacelike isometry, and show that the quotient will lead to closed timelike curves iff the isometry involves a translation along the u direction. The appearance of these closed timelike curves is thus connected to the special properties of the light cones in plane wave spacetimes. We show that all other quotients preserve stable causality

  12. Lieb's correlation inequality for plane rotors

    International Nuclear Information System (INIS)

    Rivasseau, V.

    1980-01-01

    We prove a conjecture by E. Lieb, which leads to the Lieb inequality for plane rotors. As in the Ising model case, this inequality implies the existence of an algorithm to compute the transition temperature of this model. (orig.)

  13. Titanium Heat Pipe Thermal Plane, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — The objective of the Phase II program is to complete the development of the titanium heat pipe thermal plane and establish all necessary steps for production of this...

  14. Null-plane quantization of fermions

    International Nuclear Information System (INIS)

    Mustaki, D.

    1990-01-01

    Massive Dirac fermions are canonically quantized on the null plane using the Dirac-Bergmann algorithm. The procedure is carried out in the framework of quantum electrodynamics as an illustration of a rigorous treatment of interacting fermion fields

  15. Some Features of the Plane Couette Flow

    National Research Council Canada - National Science Library

    Skovorodko, Petr

    2000-01-01

    In the previous paper 1 it was found, in particular, that in the transition regime of the plane Couette flow the values of total energy flux and shear stress may exceed the corresponding free molecular values...

  16. Causal inheritance in plane wave quotients

    Science.gov (United States)

    Hubeny, Veronika E.; Rangamani, Mukund; Ross, Simon F.

    2004-01-01

    We investigate the appearance of closed timelike curves in quotients of plane waves along spacelike isometries. First we formulate a necessary and sufficient condition for a quotient of a general space-time to preserve stable causality. We explicitly show that the plane waves are stably causal; in passing, we observe that some pp waves are not even distinguishing. We then consider the classification of all quotients of the maximally supersymmetric ten-dimensional plane wave under a spacelike isometry, and show that the quotient will lead to closed timelike curves iff the isometry involves a translation along the u direction. The appearance of these closed timelike curves is thus connected to the special properties of the light cones in plane wave space-times. We show that all other quotients preserve stable causality.

  17. Proof of Polyakov conjecture on supercomplex plane

    International Nuclear Information System (INIS)

    Kachkachi, M.; Kouadik, S.

    1994-10-01

    Using Neumann series, we solve iteratively SBE to arbitrary order. Then applying this, we compute the energy momentum tensor and n points functions for generic n starting from WZP action on the supercomplex plane. We solve the superconformal Ward identity and we show that the iterative solution to arbitrary order is resumed by WZP action. This proves the Polyakov conjecture on supercomplex plane. (author). 8 refs

  18. Constructive curves in non-Euclidean planes

    OpenAIRE

    Horváth, Ákos G.

    2016-01-01

    In this paper we overview the theory of conics and roulettes in four non-Euclidean planes. We collect the literature about these classical concepts, from the eighteenth century to the present, including papers available only on arXiv. The comparison of the four non-Euclidean planes, in terms of the known results on conics and roulettes, reflects only the very subjective view of the author.

  19. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  20. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  1. Heteroepitaxial growth of basal plane stacking fault free a-plane GaN

    Energy Technology Data Exchange (ETDEWEB)

    Wieneke, Matthias; Hempel, Thomas; Noltemeyer, Martin; Witte, Hartmut; Dadgar, Armin; Blaesing, Juergen; Christen, Juergen; Krost, Alois [Otto-von-Guericke Universitaet Magdeburg, FNW/IEP, Magdeburg (Germany)

    2010-07-01

    Growth of light emitting quantum-wells based on a-plane GaN is a possibility to reduce or even to avoid polarization correlated luminescence red shift and reduction of radiative recombination efficiency. But until now heteroepitaxially grown a-plane GaN films are characterized by a poor crystalline quality expressed by a high density of basal plane stacking faults (BSF) and partial dislocations. We present Si doped a-plane GaN films grown on r-plane sapphire substrates by metal organic vapor phase epitaxy using high temperature AlGaN nucleation layers. FE-SEM images revealed three dimensionally grown GaN crystallites sized up to tenth micrometer in the basal plane and a few tenth micrometers along the c-axes. Though, the full width at half maxima of the X-ray diffraction {omega}-scans of the in-plane GaN(1 anti 100) and GaN(0002) Bragg reflections exhibited a very high crystal quality. Furthermore, luminescence spectra were dominated by near band gap emission, while there was no separated peak of the basal plane stacking fault. In summary we present heteroepitaxially grown a-plane GaN without an evidence of basal plane stacking faults in X-ray diffraction measurements and luminescence spectra.

  2. Fabrication of a Cryogenic Bias Filter for Ultrasensitive Focal Plane

    Science.gov (United States)

    Chervenak, James; Wollack, Edward

    2012-01-01

    A fabrication process has been developed for cryogenic in-line filtering for the bias and readout of ultrasensitive cryogenic bolometers for millimeter and submillimeter wavelengths. The design is a microstripline filter that cuts out, or strongly attenuates, frequencies (10 50 GHz) that can be carried by wiring staged at cryogenic temperatures. The filter must have 100-percent transmission at DC and low frequencies where the bias and readout lines will carry signal. The fabrication requires the encapsulation of superconducting wiring in a dielectric-metal envelope with precise electrical characteristics. Sufficiently thick insulation layers with high-conductivity metal layers fully surrounding a patterned superconducting wire in arrayable formats have been demonstrated. A degenerately doped silicon wafer has been chosen to provide a metallic ground plane. A metallic seed layer is patterned to enable attachment to the ground plane. Thick silicon dioxide films are deposited at low temperatures to provide tunable dielectric isolation without degrading the metallic seed layer. Superconducting wiring is deposited and patterned using microstripline filtering techniques to cut out the relevant frequencies. A low Tc superconductor is used so that it will attenuate power strongly above the gap frequency. Thick dielectric is deposited on top of the circuit, and then vias are patterned through both dielectric layers. A thick conductive film is deposited conformally over the entire circuit, except for the contact pads for the signal and bias attachments to complete the encapsulating ground plane. Filters are high-aspect- ratio rectangles, allowing close packing in one direction, while enabling the chip to feed through the wall of a copper enclosure. The chip is secured in the copper wall using a soft metal seal to make good thermal and electrical contact to the outer shield.

  3. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  4. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  5. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  6. "A Tale of Two Planes": Deep Versus Superficial Serratus Plane Block for Postmastectomy Pain Syndrome.

    Science.gov (United States)

    Piracha, Mohammad M; Thorp, Stephen L; Puttanniah, Vinay; Gulati, Amitabh

    Postmastectomy pain syndrome (PMPS) is a significant burden for breast cancer survivors. Although multiple therapies have been described, an evolving field of serratus anterior plane blocks has been described in this population. We describe the addition of the deep serratus anterior plane block (DSPB) for PMPS. Four patients with history of PMPS underwent DSPB for anterior chest wall pain. A retrospective review of these patients' outcomes was obtained through postprocedure interviews. Three of the patients previously had a superficial serratus anterior plane block, which was not as efficacious as the DSPB. The fourth patient had a superficial serratus anterior plane that was difficult to separate with hydrodissection but had improved pain control with a DSPB. We illustrate 4 patients who have benefitted from a DSPB and describe indications that this block may be more efficacious than a superficial serratus plane block. Further study is recommended to understand the intercostal nerve branches within the lateral and anterior muscular chest wall planes.

  7. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  8. Affine planes, ternary rings, and examples of non-Desarguesian planes

    OpenAIRE

    Ivanov, Nikolai V.

    2016-01-01

    The paper is devoted to a detailed self-contained exposition of a part of the theory of affine planes leading to a construction of affine (or, equivalently, projective) planes not satisfying the Desarques axiom. It is intended to complement the introductory expositions of the theory of affine and projective planes. A novelty of our exposition is a new notation for the ternary operation in a ternary ring, much more suggestive than the standard one.

  9. LDRD HPC4Energy Wrapup Report - LDRD 12-ERD-074

    Energy Technology Data Exchange (ETDEWEB)

    Dube, E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Grosh, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-01-23

    High-performance computing and simulation has the potential to optimize production, distribution, and conversion of energy. Although a number of concepts have been discussed, a comprehensive research project to establish and quantify the effectiveness of computing and simulation at scale to core energy problems has not been conducted. We propose to perform the basic research to adapt existing high-performance computing tools and simulation approaches to two selected classes of problems common across the energy sector. The first, applying uncertainty quantification and contingency analysis techniques to energy optimization, allows us to assess the effectiveness of LLNL core competencies to problems such as grid optimization and building-system efficiency. The second, applying adaptive meshing and numerical analysis techniques to physical problems at fine scale, could allow immediate impacts in key areas such as efficient combustion and fracture and spallation. By creating an integrated project team with the necessary expertise, we can efficiently address these issues, delivering both near-term results as well as quantifying developments needed to address future energy challenges.

  10. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  11. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  12. Deflection of electron beams by ground planes

    International Nuclear Information System (INIS)

    Fernsler, R.F.; Lampe, M.

    1991-01-01

    Analytic methods are used to determine the effect of a nearby ground plane on the trajectory of a relativistic electron beam passing through dense gas. The beam is shown to respond to the ground plane in one of two distinct modes, determined by beam current and energy. Low-power beams deflect from the ground plane and tear longitudinally. High-power beams do not deflect or tear but tilt, i.e., the beam axis is no longer parallel to the direction of propagation. This conclusion is reached by computing the net beam force as a superposition of the ''bare'' ground-plane forces, the shielding forces from the beam-generated plasma, the body coupling forces induced by beam tilt, and the force that arises as the beam separates from the plasma. Effects from electromagnetic retardation and ground resistivity are shown to be negligible in typical cases of interest, and the interaction between ground planes and other external forces is discussed as well

  13. The horizontal plane appearances of scoliosis

    DEFF Research Database (Denmark)

    Illés, Tamás S.; Burkus, Máté; Somoskeőy, Szabolcs

    2017-01-01

    Purpose: A posterior-anterior vertebral vector is proposed to facilitate visualization and understanding of scoliosis. The aim of this study was to highlight the interest of using vertebral vectors, especially in the horizontal plane, in clinical practice. Methods: We used an EOS two-/three-dimen......Purpose: A posterior-anterior vertebral vector is proposed to facilitate visualization and understanding of scoliosis. The aim of this study was to highlight the interest of using vertebral vectors, especially in the horizontal plane, in clinical practice. Methods: We used an EOS two...... cases of a normal spine and a thoracic scoliosis are presented. Results: For a normal spine, vector projections in the transverse plane are aligned with the posterior-anterior anatomical axis. For a scoliotic spine, vector projections in the horizontal plane provide information on the lateral...... decompensation of the spine and the lateral displacement of vertebrae. In the horizontal plane view, vertebral rotation and projections of the sagittal curves can also be analyzed simultaneously. Conclusions: The use of posterior-anterior vertebral vector facilitates the understanding of the 3D nature...

  14. A Viewpoint on the Quantity "Plane Angle"

    Science.gov (United States)

    Eder, W. E.

    1982-01-01

    Properties of the quantity "plane angle" are explored under the hypothesis that it is a dimensional quantity. The exploration proceeds especially with respect to the physical concept, its mathematical treatment, vector concepts, measurement theory, units of related quantities, engineering pragmatism, and SI. An attempt is made to bring these different relations into a rational, logical and consistent framework, and thus to justify the hypothesis. Various types of vectorial quantities are recognized, and their properties described with an outline of the necessary algebraic manipulations. The concept of plane angle is amplified, and its interdependence with the circular arc is explored. The resulting units of plane angle form a class of similar scales of measurement. Consequences of the confirmed hypothesis are developed for mathematical expressions involving trigonometric functions, rotational volumes and areas, mathematical limits, differentiation and series expansion. Consequences for mechanical rotational quantities are developed, with proposals for revisions to a number of expressions for derived units within SI. A revised definition for the quantity "plane angle" is stated to take account of the developed insights. There is a clear need to reconsider the status of plane angle and some other quantities within the international framework of SI.

  15. Computed tomography of peripancreatic fat planes

    International Nuclear Information System (INIS)

    Wittich, G.R.; Van Sonnenberg, E.; Willson, S.A.; Tobin, R.S.; Cubberley, D.A.; Marx, M.Q.

    1987-01-01

    Obliteration of peripancreatic fat planes usually is considered an indicator of peripancreatic tumour infiltration in the presence of a malignant mass, or of inflammation of peripancreatic tissues in patients with pancreatitis. However, absence of peripancreatic fat planes also may be found in patients without evidence of pancreatic disease. Hence, CT scans of 125 patients without clinical or computed tomographic evidence of pancreatic disease were evaluated to assess normal variations in the anatomy of the pancreas and its relation to surrounding vessels and bowel loops. The fat plane separating the superior mesenteric artery from the pancreas was preserved in 100% of patients. Conversely, fat planes between the pancreas and the superior mesenteric vein, inferior vena cava, and adjacent bowel loops were partially or totally obliterated in 13% to 50% of patients. It is concluded that the absence of fat around the superior mesenteric artery is highly suggestive of pathologic changes of the pancreas, while the lack of fat planes between the pancreas and other splanchnic vessels or bowel loops frequently is normal, and therefore, is an unreliable sign of pancreatic disease. The applications of these findings to the assessment of tumour resectability by CT, and to CT scanning techniques, are discussed. (orig.)

  16. NOSArmor: Building a Secure Network Operating System

    Directory of Open Access Journals (Sweden)

    Hyeonseong Jo

    2018-01-01

    Full Text Available Software-Defined Networking (SDN, controlling underlying network devices (i.e., data plane in a logically centralized manner, is now actively adopted in many real world networking environments. It is clear that a network administrator can easily understand and manage his networking environments with the help of SDN. In SDN, a network operating system (NOS, also known as an SDN controller, is the most critical component because it should be involved in all transactions for controlling network devices, and thus the security of NOS cannot be highly exaggerated. However, in spite of its importance, no previous works have thoroughly investigated the security of NOS. In this work, to address this problem, we present the NOSArmor, which integrates several security mechanisms, named as security building block (SBB, into a consolidated SDN controller. NOSArmor consists of eight SBBs and each of them addresses different security principles of network assets. For example, while role-based authorization focuses on securing confidentiality of internal storage from malicious applications, OpenFlow protocol verifier protects availability of core service in the controller from malformed control messages received from switches. In addition, NOSArmor shows competitive performance compared to existing other controllers (i.e., ONOS, Floodlight with secureness of network assets.

  17. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  18. On the theory of twinning plane superconductivity

    International Nuclear Information System (INIS)

    Mishonov, T.M.

    1988-01-01

    The thermodynamic potential of the superconducting layer in the twinning plane (TP) vicinity for the type I superconductors is found. The corrections to the surface tension in powers of the Ginsburg-Landau parameter κ are obtained. The corresponding states law for the supercooling field for the type I twinning plane superconductivity (TPS) is obtained, as well as the critical field law for the type II TPS. A review of experimental and theoretical works on TPS and some similar systems is given. The conditions for the Berezinski-Kosterlitz-Thouless transition for the proximity effect are discussed, as well as the possible mechanisms for the conducting phase transition TPS in Nb and the pinning forces close to the twinning plane. The obtained order parameter distribution can be used for description of the superlattices from normal and superconducting metals as well. 6 figs., 44 refs

  19. Plane wave limits and T-duality

    International Nuclear Information System (INIS)

    Guven, R.

    2000-04-01

    The Penrose limit is generalized to show that, any leading order solution of the low-energy field equations in any one of the five string theories has a plane wave solution as a limit. This limiting procedure takes into account all the massless fields that may arise and commutes with the T-duality so that any dual solution has again a plane wave limit. The scaling rules used in the limit are unique and stem from the scaling property of the D = 11 supergravity action. Although the leading order dual solutions need not be exact or supersymmetric, their plane wave limits always preserve some portion of the Poincare supersymmetry and solve the relevant field equations in all powers of the string tension parameter. Further properties of the limiting procedure are discussed. (author)

  20. LDRD report nonlinear model reduction

    Energy Technology Data Exchange (ETDEWEB)

    Segalman, D.; Heinstein, M.

    1997-09-01

    The very general problem of model reduction of nonlinear systems was made tractable by focusing on the very large subclass consisting of linear subsystems connected by nonlinear interfaces. Such problems constitute a large part of the nonlinear structural problems encountered in addressing the Sandia missions. A synthesis approach to this class of problems was developed consisting of: detailed modeling of the interface mechanics; collapsing the interface simulation results into simple nonlinear interface models; constructing system models by assembling model approximations of the linear subsystems and the nonlinear interface models. These system models, though nonlinear, would have very few degrees of freedom. A paradigm problem, that of machine tool vibration, was selected for application of the reduction approach outlined above. Research results achieved along the way as well as the overall modeling of a specific machine tool have been very encouraging. In order to confirm the interface models resulting from simulation, it was necessary to develop techniques to deduce interface mechanics from experimental data collected from the overall nonlinear structure. A program to develop such techniques was also pursued with good success.

  1. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  2. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  3. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  4. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  5. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  6. Topologically protected edge states for out-of-plane and in-plane bulk elastic waves

    Science.gov (United States)

    Huo, Shao-Yong; Chen, Jiu-Jiu; Huang, Hong-Bo

    2018-04-01

    Topological phononic insulators (TPnIs) show promise for application in the manipulation of acoustic waves for the design of low-loss transmission and perfectly integrated communication devices. Since solid phononic crystals exist as a transverse polarization mode and a mixed longitudinal-transverse polarization mode, the realization of topological edge states for both out-of-plane and in-plane bulk elastic waves is desirable to enhance the controllability of the edge waves in solid systems. In this paper, a two-dimensional (2D) solid/solid hexagonal-latticed phononic system that simultaneously supports the topologically protected edge states for out-of-plane and in-plane bulk elastic waves is investigated. Firstly, two pairs of two-fold Dirac cones, respectively corresponding to the out-of-plane and in-plane waves, are obtained at the same frequency by tuning the crystal parameters. Then, a strategy of zone folding is invoked to form double Dirac cones. By shrinking and expanding the steel scatterer, the lattice symmetry is broken, and band inversions induced, giving rise to an intriguing topological phase transition. Finally, the topologically protected edge states for both out-of-plane and in-plane bulk elastic waves, which can be simultaneously located at the frequency range from 1.223 to 1.251 MHz, are numerically observed. Robust pseudospin-dependent elastic edge wave propagation along arbitrary paths is further demonstrated. Our results will significantly broaden its practical application in the engineering field.

  7. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  8. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  9. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  10. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  11. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  12. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  13. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  14. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  15. Multiple fracture planes in deuteron irradiated metals

    International Nuclear Information System (INIS)

    Jones, W.R.; Johnson, P.B.

    1987-01-01

    Evidence has been found of multiple fracture planes in the blistering and flaking of metals observed at room temperature following irradiation at 120 K with 200 keV deuterons. In particular, two fracture planes are identified in copper, gold and stainless steel and three in aluminium. In nickel only one fracture plane is found. Qualitative models are proposed which explain the different fracture planes that are observed. In these models it is proposed that several mechanisms are important. (i) High levels of compressional stress in the implanted layer inhibits bubble nucleation and bubble growth in the depth region near the maxima in the damage and gas deposition profiles. (ii) The lateral stress varies from compression in the implant region to tension in the material below. In the region of tension bubble growth is enhanced. The vertical gradient in the lateral stress may also assist gas to move deeper into the target to further enhance bubble growth in this region. (iii) Shear resulting from differential expansion due to a combination of radiation induced swelling and localised heating is an important mechanism leading to fracture. (orig.)

  16. Copernican Revolution in the Complex Plane

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 17; Issue 11. Copernican Revolution in the Complex Plane - An Algebraic Way to Show the "Chief Point" of Copernican Innovation. Giorgio Goldoni. General Article Volume 17 Issue 11 November 2012 pp 1065-1084 ...

  17. Infrared MUSIC from Z technology focal planes

    International Nuclear Information System (INIS)

    Waters, C.R.; Sommese, A.; Johnston, D.; Landau, H.

    1989-01-01

    Presented is the Multiple Signal Classification (MUSIC) algorithm which uses the high frequency differences in sensed time signals to discriminate, count, and accurately locate closely spaced targets. Z technology focal planes allow the implementation of this algorithm and the trade-off between finer spatial resolution systems and systems with coarser resolution but higher sampling rates

  18. Construction of the STAR Event Plane Detector

    Science.gov (United States)

    Adams, Joseph

    2017-09-01

    The Event Plane Detector (EPD) is an upgrade to the STAR experiment at RHIC, providing high granularity and acceptance in the forward (2.2 run for commissioning. In this talk I will discuss the construction of the EPD, the installation of the quarter wheel, and plans for full installation in 2018.

  19. Ruler of the plane - Games of geometry

    NARCIS (Netherlands)

    Beekhuis, S.; Buchin, K.; Castermans, T.; Hurks, T.; Sonke, W.; Aronov, B.; Katz, M.J.

    2017-01-01

    Ruler of the Plane is a set of games illustrating concepts from combinatorial and computational geometry. The games are based on the art gallery problem, ham-sandwich cuts, the Voronoi game, and geometric network connectivity problems like the Euclidean minimum spanning tree and traveling

  20. Trigonometric Characterization of Some Plane Curves

    Indian Academy of Sciences (India)

    IAS Admin

    (Figure 1). A relation between tan θ and tanψ gives the trigonometric equation of the family of curves. In this article, trigonometric equations of some known plane curves are deduced and it is shown that these equations reveal some geometric characteristics of the families of the curves under consideration. In Section 2,.

  1. On Generalisation of Polynomials in Complex Plane

    Directory of Open Access Journals (Sweden)

    Maslina Darus

    2010-01-01

    Full Text Available The generalised Bell and Laguerre polynomials of fractional-order in complex z-plane are defined. Some properties are studied. Moreover, we proved that these polynomials are univalent solutions for second order differential equations. Also, the Laguerre-type of some special functions are introduced.

  2. Covariant quantum mechanics on a null plane

    International Nuclear Information System (INIS)

    Leutwyler, H.; Stern, J.

    1977-03-01

    Lorentz invariance implies that the null plane wave functions factorize into a kinematical part describing the motion of the system as a whole and an inner wave function that involves the specific dynamical properties of the system - in complete correspondence with the non-relativistic situation. Covariance is equivalent to an angular condition which admits non-trivial solutions

  3. Does monocular visual space contain planes?

    NARCIS (Netherlands)

    Koenderink, Jan J.; Albertazzi, Liliana; van Doorn, Andrea J.; van Ee, Raymond; van de Grind, Wim A.; Kappers, Astrid M L; Lappin, Joe S.; Farley Norman, J.; (Stijn) Oomes, A. H J; te Pas, Susan P.; Phillips, Flip; Pont, Sylvia C.; Richards, Whitman A.; Todd, James T.; Verstraten, Frans A J; de Vries, Sjoerd

    The issue of the existence of planes-understood as the carriers of a nexus of straight lines-in the monocular visual space of a stationary human observer has never been addressed. The most recent empirical data apply to binocular visual space and date from the 1960s (Foley, 1964). This appears to be

  4. In-plane user positioning indoors

    NARCIS (Netherlands)

    Jovanovic, N.; Özçelebi, T.; Lukkien, J.J.; Skoric, B.; Ignatenko, T.

    2014-01-01

    Indoor positioning is a service required by many smart environment applications for various purposes, such as activity classification, indoor navigation and context awareness. In this paper, we present a novel approach to the user positioning problem based on in-plane detection enabled by a set of

  5. Techniques to measure complex-plane fields

    CSIR Research Space (South Africa)

    Dudley, Angela L

    2014-09-25

    Full Text Available In this work we construct coherent superpositions of Gaussian and vortex modes which can be described to occupy the complex-plane. We demonstrate how these fields can be experimentally constructed in a digital, controllable manner with a spatial...

  6. Personnel thermoluminescent dosimetry of plane pilots

    International Nuclear Information System (INIS)

    Azorin V, J.C.; Rivera M, T.; Azorin N, J.

    1999-01-01

    In this work are presented the results of the research realized in the pilots of commercial planes of the different flight equipment existing. The results obtained show that the pilots receive during their work, doses of ionizing radiation greater than the limit recommended by the International Commission of Radiological Protection. (Author)

  7. Elastic Constants of Plane Orthotropic Elasticity

    DEFF Research Database (Denmark)

    Krenk, Steen

    1979-01-01

    The four independent material parameters of plane orthotropic elasti city are introduced as the effective stiffness, the effective Poisson ratio, the stiffness ratio and the shear parameter. It is proved that stress boundary value problems with zero resulting force on internal contours lead...

  8. Cues for localization in the horizontal plane

    DEFF Research Database (Denmark)

    Jeppesen, Jakob; Møller, Henrik

    2005-01-01

    manipulated in HRTFs used for binaural synthesis of sound in the horizontal plane. The manipulation of cues resulted in HRTFs with cues ranging from correct combinations of spectral information and ITDs to combinations with severely conflicting cues. Both the ITD and the spectral information seem...

  9. Locating a minisum circle in the plane

    DEFF Research Database (Denmark)

    Brimberg, Jack; Juel, Henrik; Schöbel, Anita

    2009-01-01

    We consider the problem of locating a circle with respect to existing facilities in the plane such that the sum of weighted distances between the circle and the facilities is minimized, i.e., we approximate a set of given points by a circle regarding the sum of weighted distances. If the radius...

  10. Crack initiation under generalized plane strain conditions

    International Nuclear Information System (INIS)

    Shum, D.K.M.; Merkle, J.G.

    1991-01-01

    A method for estimating the decrease in crack-initiation toughness, from a reference plane strain value, due to positive straining along the crack front of a circumferential flaw in a reactor pressure vessel is presented in this study. This method relates crack initiation under generalized plane strain conditions with material failure at points within a distance of a few crack-tip-opening displacements ahead of a crack front, and involves the formulation of a micromechanical crack-initiation model. While this study is intended to address concerns regarding the effects of positive out-of- plane straining on ductile crack initiation, the approach adopted in this work can be extended in a straightforward fashion to examine conditions of macroscopic cleavage crack initiation. Provided single- parameter dominance of near-tip fields exists in the flawed structure, results from this study could be used to examine the appropriateness of applying plane strain fracture toughness to the evaluation of circumferential flaws, in particular to those in ring-forged vessels which have no longitudinal welds. In addition, results from this study could also be applied toward the analysis of the effects of thermal streaming on the fracture resistance of circumferentially oriented flaws in a pressure vessel. 37 refs., 8 figs., 1 tab

  11. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  12. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  13. Still I can repair my plane

    OpenAIRE

    MIHAIESCU, Nicolaie

    2013-01-01

    Within the framework of the well-known European Commission's strategic vision (aiming to maximize consumer participation and trust in the market by reinforcing consumer safety, enhancing knowledge, stepping up enforcement and securing redress, aligning consumer rights and policies to changes in society and in the economy), and of the substantial corpus of consumer law, and consumer rights (which exist in practice thanks to continuous improving of enforcement and securing redress), consumers a...

  14. Origin of the Local Group satellite planes

    Science.gov (United States)

    Banik, Indranil; O'Ryan, David; Zhao, Hongsheng

    2018-04-01

    We attempt to understand the planes of satellite galaxies orbiting the Milky Way (MW) and M31 in the context of Modified Newtonian Dynamics (MOND), which implies a close MW-M31 flyby occurred ≈8 Gyr ago. Using the timing argument, we obtain MW-M31 trajectories consistent with cosmological initial conditions and present observations. We adjust the present M31 proper motion within its uncertainty in order to simulate a range of orbital geometries and closest approach distances. Treating the MW and M31 as point masses, we follow the trajectories of surrounding test particle disks, thereby mapping out the tidal debris distribution. Around each galaxy, the resulting tidal debris tends to cluster around a particular orbital pole. We find some models in which these preferred spin vectors align fairly well with those of the corresponding observed satellite planes. The radial distributions of material in the simulated satellite planes are similar to what we observe. Around the MW, our best-fitting model yields a significant fraction (0.22) of counter-rotating material, perhaps explaining why Sculptor counter-rotates within the MW satellite plane. In contrast, our model yields no counter-rotating material around M31. This is testable with proper motions of M31 satellites. In our best model, the MW disk is thickened by the flyby 7.65 Gyr ago to a root mean square height of 0.75 kpc. This is similar to the observed age and thickness of the Galactic thick disk. Thus, the MW thick disk may have formed together with the MW and M31 satellite planes during a past MW-M31 flyby.

  15. Instability of in-plane vortices in two-dimensional easy-plane ferromagnets

    International Nuclear Information System (INIS)

    Wysin, G.M.

    1994-01-01

    An analysis of the core region of an in-plane vortex in the two-dimensional Heisenberg model with easy-plane anisotropy λ=J z /J xy leads to a clear understanding of the instability towards transformation into an out-of-plane vortex as a function of anisotropy. The anisotropy parameter λ c at which the in-plane vortex becomes unstable and develops into an out-of-plane vortex is determined with an accuracy comparable to computer simulations for square, hexagonal, and triangular lattices. For λ c , the in-plane vortex is stable but exhibits a normal mode whose frequency goes to zero as ω∝(λ c -λ) 1/2 as λ approaches λ c . For λ>λ c , the static nonzero out-of-plane spin components grow as (λ-λ c ) 1/2 . The lattice dependence of λ c is determined strongly by the number of spins in the core plaquette, is fundamentally a discreteness effect, and cannot be obtained in a continuum theory

  16. Determining the ice-binding planes of antifreeze proteins by fluorescence-based ice plane affinity.

    Science.gov (United States)

    Basu, Koli; Garnham, Christopher P; Nishimiya, Yoshiyuki; Tsuda, Sakae; Braslavsky, Ido; Davies, Peter

    2014-01-15

    Antifreeze proteins (AFPs) are expressed in a variety of cold-hardy organisms to prevent or slow internal ice growth. AFPs bind to specific planes of ice through their ice-binding surfaces. Fluorescence-based ice plane affinity (FIPA) analysis is a modified technique used to determine the ice planes to which the AFPs bind. FIPA is based on the original ice-etching method for determining AFP-bound ice-planes. It produces clearer images in a shortened experimental time. In FIPA analysis, AFPs are fluorescently labeled with a chimeric tag or a covalent dye then slowly incorporated into a macroscopic single ice crystal, which has been preformed into a hemisphere and oriented to determine the a- and c-axes. The AFP-bound ice hemisphere is imaged under UV light to visualize AFP-bound planes using filters to block out nonspecific light. Fluorescent labeling of the AFPs allows real-time monitoring of AFP adsorption into ice. The labels have been found not to influence the planes to which AFPs bind. FIPA analysis also introduces the option to bind more than one differently tagged AFP on the same single ice crystal to help differentiate their binding planes. These applications of FIPA are helping to advance our understanding of how AFPs bind to ice to halt its growth and why many AFP-producing organisms express multiple AFP isoforms.

  17. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  18. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  19. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  20. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  1. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  2. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  3. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  4. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  5. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  6. Multi-planed unified switching topologies

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip; Sugawara, Yutaka

    2017-07-04

    An apparatus and method for extending the scalability and improving the partitionability of networks that contain all-to-all links for transporting packet traffic from a source endpoint to a destination endpoint with low per-endpoint (per-server) cost and a small number of hops. An all-to-all wiring in the baseline topology is decomposed into smaller all-to-all components in which each smaller all-to-all connection is replaced with star topology by using global switches. Stacking multiple copies of the star topology baseline network creates a multi-planed switching topology for transporting packet traffic. Point-to-point unified stacking method using global switch wiring methods connects multiple planes of a baseline topology by using the global switches to create a large network size with a low number of hops, i.e., low network latency. Grouped unified stacking method increases the scalability (network size) of a stacked topology.

  7. Suicide plane crash against nuclear power plants

    International Nuclear Information System (INIS)

    Richard, A.

    2002-01-01

    Cea (French atomic energy commission) and EDF (Electricity of France) are reassessing their safety standards concerning suicide plane attacks against nuclear facilities. The general idea is to study the non-linear behaviour of reinforced concrete in case of mechanical impact. American studies carried out in 1988 show that a F-14 phantom crashing into a 3,6 meter thick wall at a speed of 774 km/h penetrates only the first 5 cm of the wall. More recent studies performed in Germany and based on computerized simulations show that the reactor containment can sustain impacts from a F15 plane or even from a 747-Boeing but contiguous buildings like the one which houses spent fuels might be more easily damaged because of their metal roofing. (A.C.)

  8. A multiplicity jump trigger using silicon planes

    International Nuclear Information System (INIS)

    Alexopoulos, T.; Erwin, A.R.

    1993-01-01

    Since silicon tracking planes are already present in a B decay experiment, it is an attractive idea to use these as part of a multiplicity jump detector. Two average B decays would produce a multiplicity jump of around 10 in the final state. Such a trigger has been tried for a fixed target Charm experiment with disappointing success. The failure was attributed to the difficulty in adequately controlling the gains of a large number of microstrip amplifies

  9. Wafer plane inspection for advanced reticle defects

    Science.gov (United States)

    Nagpal, Rajesh; Ghadiali, Firoz; Kim, Jun; Huang, Tracy; Pang, Song

    2008-05-01

    Readiness of new mask defect inspection technology is one of the key enablers for insertion & transition of the next generation technology from development into production. High volume production in mask shops and wafer fabs demands a reticle inspection system with superior sensitivity complemented by a low false defect rate to ensure fast turnaround of reticle repair and defect disposition (W. Chou et al 2007). Wafer Plane Inspection (WPI) is a novel approach to mask defect inspection, complementing the high resolution inspection capabilities of the TeraScanHR defect inspection system. WPI is accomplished by using the high resolution mask images to construct a physical mask model (D. Pettibone et al 1999). This mask model is then used to create the mask image in the wafer aerial plane. A threshold model is applied to enhance the inspectability of printing defects. WPI can eliminate the mask restrictions imposed on OPC solutions by inspection tool limitations in the past. Historically, minimum image restrictions were required to avoid nuisance inspection stops and/or subsequent loss of sensitivity to defects. WPI has the potential to eliminate these limitations by moving the mask defect inspections to the wafer plane. This paper outlines Wafer Plane Inspection technology, and explores the application of this technology to advanced reticle inspection. A total of twelve representative critical layers were inspected using WPI die-to-die mode. The results from scanning these advanced reticles have shown that applying WPI with a pixel size of 90nm (WPI P90) captures all the defects of interest (DOI) with low false defect detection rates. In validating CD predictions, the delta CDs from WPI are compared against Aerial Imaging Measurement System (AIMS), where a good correlation is established between WPI and AIMSTM.

  10. Cues for localization in the horizontal plane

    DEFF Research Database (Denmark)

    Jeppesen, Jakob; Møller, Henrik

    2005-01-01

    Spatial localization of sound is often described as unconscious evaluation of cues given by the interaural time difference (ITD) and the spectral information of the sound that reaches the two ears. Our present knowledge suggests the hypothesis that the ITD roughly determines the cone of the perce...... independently in HRTFs used for binaural synthesis. The ITD seems to be dominant for localization in the horizontal plane even when the spectral information is severely degraded....

  11. Resonant power processors. I - State plane analysis

    Science.gov (United States)

    Oruganti, R.; Lee, F. C.

    1984-01-01

    State-plane techniques in conjunction with piecewise-linear analysis is employed to study the steady-state and transient characteristics of a series resonant converter. With the direct viewing of the resonant tank energy and the device switching instants, the state portrayal provides unique insights into the complex behavior of the converter. Operation of the converter under both continuous and discontinuous current modes and at frequencies both below and above resonant frequency are discussed.

  12. The Off-plane Grating Rocket Experiment

    Science.gov (United States)

    Donovan, Benjamin

    2018-01-01

    The next generation of X-ray spectrometers necessitate significant increases in both resolution and effective area to achieve the science goals set forth in the 2010 Decadal Survey and the 2013 Astrophysics Roadmap. The Off-plane Grating Rocket Experiment (OGRE), an X-ray spectroscopy suborbital rocket payload currently scheduled for launch in Q3 2020, will serve as a testbed for several key technologies which can help achieve the desired performance increases of future spectrometers. OGRE will be the first instrument to fly mono-crystalline silicon X-ray mirrors developed at NASA Goddard Space Flight Center. The payload will also utilize an array of off-plane gratings manufactured at The Pennsylvania State University. Additionally, the focal plane will be populated with an array of four electron-multiplying CCDs developed by the Open University and XCAM Ltd. With these key technologies, OGRE hopes to achieve the highest resolution on-sky soft X-ray spectrum to date. We discuss the optical design, expected performance, and the current status of the payload.

  13. Blackfolds, plane waves and minimal surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Armas, Jay [Physique Théorique et Mathématique, Université Libre de Bruxelles and International Solvay Institutes, ULB-Campus Plaine CP231, B-1050 Brussels (Belgium); Albert Einstein Center for Fundamental Physics, University of Bern,Sidlerstrasse 5, 3012 Bern (Switzerland); Blau, Matthias [Albert Einstein Center for Fundamental Physics, University of Bern,Sidlerstrasse 5, 3012 Bern (Switzerland)

    2015-07-29

    Minimal surfaces in Euclidean space provide examples of possible non-compact horizon geometries and topologies in asymptotically flat space-time. On the other hand, the existence of limiting surfaces in the space-time provides a simple mechanism for making these configurations compact. Limiting surfaces appear naturally in a given space-time by making minimal surfaces rotate but they are also inherent to plane wave or de Sitter space-times in which case minimal surfaces can be static and compact. We use the blackfold approach in order to scan for possible black hole horizon geometries and topologies in asymptotically flat, plane wave and de Sitter space-times. In the process we uncover several new configurations, such as black helicoids and catenoids, some of which have an asymptotically flat counterpart. In particular, we find that the ultraspinning regime of singly-spinning Myers-Perry black holes, described in terms of the simplest minimal surface (the plane), can be obtained as a limit of a black helicoid, suggesting that these two families of black holes are connected. We also show that minimal surfaces embedded in spheres rather than Euclidean space can be used to construct static compact horizons in asymptotically de Sitter space-times.

  14. Focal plane scanner with reciprocating spatial window

    Science.gov (United States)

    Mao, Chengye (Inventor)

    2000-01-01

    A focal plane scanner having a front objective lens, a spatial window for selectively passing a portion of the image therethrough, and a CCD array for receiving the passed portion of the image. All embodiments have a common feature whereby the spatial window and CCD array are mounted for simultaneous relative reciprocating movement with respect to the front objective lens, and the spatial window is mounted within the focal plane of the front objective. In a first embodiment, the spatial window is a slit and the CCD array is one-dimensional, and successive rows of the image in the focal plane of the front objective lens are passed to the CCD array by an image relay lens interposed between the slit and the CCD array. In a second embodiment, the spatial window is a slit, the CCD array is two-dimensional, and a prism-grating-prism optical spectrometer is interposed between the slit and the CCD array so as to cause the scanned row to be split into a plurality of spectral separations onto the CCD array. In a third embodiment, the CCD array is two-dimensional and the spatial window is a rectangular linear variable filter (LVF) window, so as to cause the scanned rows impinging on the LVF to be bandpass filtered into spectral components onto the CCD array through an image relay lens interposed between the LVF and the CCD array.

  15. Blackfolds, plane waves and minimal surfaces

    Science.gov (United States)

    Armas, Jay; Blau, Matthias

    2015-07-01

    Minimal surfaces in Euclidean space provide examples of possible non-compact horizon geometries and topologies in asymptotically flat space-time. On the other hand, the existence of limiting surfaces in the space-time provides a simple mechanism for making these configurations compact. Limiting surfaces appear naturally in a given space-time by making minimal surfaces rotate but they are also inherent to plane wave or de Sitter space-times in which case minimal surfaces can be static and compact. We use the blackfold approach in order to scan for possible black hole horizon geometries and topologies in asymptotically flat, plane wave and de Sitter space-times. In the process we uncover several new configurations, such as black helicoids and catenoids, some of which have an asymptotically flat counterpart. In particular, we find that the ultraspinning regime of singly-spinning Myers-Perry black holes, described in terms of the simplest minimal surface (the plane), can be obtained as a limit of a black helicoid, suggesting that these two families of black holes are connected. We also show that minimal surfaces embedded in spheres rather than Euclidean space can be used to construct static compact horizons in asymptotically de Sitter space-times.

  16. Linearized motion estimation for articulated planes.

    Science.gov (United States)

    Datta, Ankur; Sheikh, Yaser; Kanade, Takeo

    2011-04-01

    In this paper, we describe the explicit application of articulation constraints for estimating the motion of a system of articulated planes. We relate articulations to the relative homography between planes and show that these articulations translate into linearized equality constraints on a linear least-squares system, which can be solved efficiently using a Karush-Kuhn-Tucker system. The articulation constraints can be applied for both gradient-based and feature-based motion estimation algorithms and to illustrate this, we describe a gradient-based motion estimation algorithm for an affine camera and a feature-based motion estimation algorithm for a projective camera that explicitly enforces articulation constraints. We show that explicit application of articulation constraints leads to numerically stable estimates of motion. The simultaneous computation of motion estimates for all of the articulated planes in a scene allows us to handle scene areas where there is limited texture information and areas that leave the field of view. Our results demonstrate the wide applicability of the algorithm in a variety of challenging real-world cases such as human body tracking, motion estimation of rigid, piecewise planar scenes, and motion estimation of triangulated meshes.

  17. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  18. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  19. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  20. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  1. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  2. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  3. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  4. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  5. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  6. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  7. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  8. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  9. Bit-level plane image encryption based on coupled map lattice with time-varying delay

    Science.gov (United States)

    Lv, Xiupin; Liao, Xiaofeng; Yang, Bo

    2018-04-01

    Most of the existing image encryption algorithms had two basic properties: confusion and diffusion in a pixel-level plane based on various chaotic systems. Actually, permutation in a pixel-level plane could not change the statistical characteristics of an image, and many of the existing color image encryption schemes utilized the same method to encrypt R, G and B components, which means that the three color components of a color image are processed three times independently. Additionally, dynamical performance of a single chaotic system degrades greatly with finite precisions in computer simulations. In this paper, a novel coupled map lattice with time-varying delay therefore is applied in color images bit-level plane encryption to solve the above issues. Spatiotemporal chaotic system with both much longer period in digitalization and much excellent performances in cryptography is recommended. Time-varying delay embedded in coupled map lattice enhances dynamical behaviors of the system. Bit-level plane image encryption algorithm has greatly reduced the statistical characteristics of an image through the scrambling processing. The R, G and B components cross and mix with one another, which reduces the correlation among the three components. Finally, simulations are carried out and all the experimental results illustrate that the proposed image encryption algorithm is highly secure, and at the same time, also demonstrates superior performance.

  10. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  11. Simulation Exploration through Immersive Parallel Planes: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Brunhart-Lupo, Nicholas; Bush, Brian W.; Gruchalla, Kenny; Smith, Steve

    2016-03-01

    We present a visualization-driven simulation system that tightly couples systems dynamics simulations with an immersive virtual environment to allow analysts to rapidly develop and test hypotheses in a high-dimensional parameter space. To accomplish this, we generalize the two-dimensional parallel-coordinates statistical graphic as an immersive 'parallel-planes' visualization for multivariate time series emitted by simulations running in parallel with the visualization. In contrast to traditional parallel coordinate's mapping the multivariate dimensions onto coordinate axes represented by a series of parallel lines, we map pairs of the multivariate dimensions onto a series of parallel rectangles. As in the case of parallel coordinates, each individual observation in the dataset is mapped to a polyline whose vertices coincide with its coordinate values. Regions of the rectangles can be 'brushed' to highlight and select observations of interest: a 'slider' control allows the user to filter the observations by their time coordinate. In an immersive virtual environment, users interact with the parallel planes using a joystick that can select regions on the planes, manipulate selection, and filter time. The brushing and selection actions are used to both explore existing data as well as to launch additional simulations corresponding to the visually selected portions of the input parameter space. As soon as the new simulations complete, their resulting observations are displayed in the virtual environment. This tight feedback loop between simulation and immersive analytics accelerates users' realization of insights about the simulation and its output.

  12. Wafer plane inspection with soft resist thresholding

    Science.gov (United States)

    Hess, Carl; Shi, Rui-fang; Wihl, Mark; Xiong, Yalin; Pang, Song

    2008-10-01

    Wafer Plane Inspection (WPI) is an inspection mode on the KLA-Tencor TeraScaTM platform that uses the high signalto- noise ratio images from the high numerical aperture microscope, and then models the entire lithographic process to enable defect detection on the wafer plane[1]. This technology meets the needs of some advanced mask manufacturers to identify the lithographically-significant defects while ignoring the other non-lithographically-significant defects. WPI accomplishes this goal by performing defect detection based on a modeled image of how the mask features would actually print in the photoresist. There are several advantages to this approach: (1) the high fidelity of the images provide a sensitivity advantage over competing approaches; (2) the ability to perform defect detection on the wafer plane allows one to only see those defects that have a printing impact on the wafer; (3) the use of modeling on the lithographic portion of the flow enables unprecedented flexibility to support arbitrary illumination profiles, process-window inspection in unit time, and combination modes to find both printing and non-printing defects. WPI is proving to be a valuable addition to the KLA-Tencor detection algorithm suite. The modeling portion of WPI uses a single resist threshold as the final step in the processing. This has been shown to be adequate on several advanced customer layers, but is not ideal for all layers. Actual resist chemistry has complicated processes including acid and base-diffusion and quench that are not consistently well-modeled with a single resist threshold. We have considered the use of an advanced resist model for WPI, but rejected it because the burdensome requirements for the calibration of the model were not practical for reticle inspection. This paper describes an alternative approach that allows for a "soft" resist threshold to be applied that provides a more robust solution for the most challenging processes. This approach is just

  13. Simulation Exploration through Immersive Parallel Planes

    Energy Technology Data Exchange (ETDEWEB)

    Brunhart-Lupo, Nicholas J [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Bush, Brian W [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Gruchalla, Kenny M [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Smith, Steve [Los Alamos Visualization Associates

    2017-05-25

    We present a visualization-driven simulation system that tightly couples systems dynamics simulations with an immersive virtual environment to allow analysts to rapidly develop and test hypotheses in a high-dimensional parameter space. To accomplish this, we generalize the two-dimensional parallel-coordinates statistical graphic as an immersive 'parallel-planes' visualization for multivariate time series emitted by simulations running in parallel with the visualization. In contrast to traditional parallel coordinate's mapping the multivariate dimensions onto coordinate axes represented by a series of parallel lines, we map pairs of the multivariate dimensions onto a series of parallel rectangles. As in the case of parallel coordinates, each individual observation in the dataset is mapped to a polyline whose vertices coincide with its coordinate values. Regions of the rectangles can be 'brushed' to highlight and select observations of interest: a 'slider' control allows the user to filter the observations by their time coordinate. In an immersive virtual environment, users interact with the parallel planes using a joystick that can select regions on the planes, manipulate selection, and filter time. The brushing and selection actions are used to both explore existing data as well as to launch additional simulations corresponding to the visually selected portions of the input parameter space. As soon as the new simulations complete, their resulting observations are displayed in the virtual environment. This tight feedback loop between simulation and immersive analytics accelerates users' realization of insights about the simulation and its output.

  14. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  15. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  16. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  17. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  18. ARC Code TI: X-Plane Communications Toolbox (XPC)

    Data.gov (United States)

    National Aeronautics and Space Administration — The X-Plane Communications Toolbox (XPC) is an open source research tool used to interact with the commercial flight simulator software X-Plane. XPC allows users to...

  19. Dose distributions of pendulum fields in the field border plane

    International Nuclear Information System (INIS)

    Schrader, R.

    1986-01-01

    Calculations (program SIDOS-U2) and LiF measurements taken in a cylindric water phantom are used to investigate the isodose distributions of different pendulum irradiation methods (Co-60) in a plane which is parallel to the central ray plane and crosses the field borders at the depth of the axis. The dose values compared to the maximum values of the central ray plane are completely different for each pendulum method. In case of monoaxial pendulum methods around small angles, the maximum dose value found in the border plane is less than 50% of the dose in the central ray plane. The relative maximum of the border plane moves to tissues laying in a greater depth. In case of bi-axial methods, the maximum value of the border plane can be much more than 50% of the maximum dose measured in the central ray plane. (orig.) [de

  20. Vacuum Predisperser For A Large Plane-Grating Spectrograph

    Science.gov (United States)

    Engleman, R.; Palmer, B. A.; Steinhaus, D. W.

    1980-11-01

    A plane grating predisperser has been constructed which acts as an "order-sorter" for a large plane-grating spectrograph. This combination can photograph relatively wide regions of spectra in a single exposure with no loss of resolution.

  1. Plane wave fast color flow mode imaging

    DEFF Research Database (Denmark)

    Bolic, Ibrahim; Udesen, Jesper; Gran, Fredrik

    2006-01-01

    A new Plane wave fast color flow imaging method (PWM) has been investigated, and performance evaluation of the PWM based on experimental measurements has been made. The results show that it is possible to obtain a CFM image using only 8 echo-pulse emissions for beam to flow angles between 45...... degrees and 75 degrees. Compared to the conventional ultrasound imaging the frame rate is similar to 30 - 60 times higher. The bias, B-est of the velocity profile estimate, based on 8 pulse-echo emissions, is between 3.3% and 6.1% for beam to flow angles between 45 degrees and 75 degrees, and the standard...

  2. Synchrotron-radiation plane-wave topography

    International Nuclear Information System (INIS)

    Riglet, P.; Sauvage, M.; Petroff, J.F.; Epelboin, Y.

    1980-01-01

    A computer program based on the Takagi-Taupin differential equations for X-ray propagation in distorted crystals has been developed in order to simulate dislocation images in the Bragg case. The program is valid both for thin and thick crystals. Simulated images of misfit dislocations formed either in a thin epilayer or in a thick substrate are compared with experimental images obtained by synchrotron-radiation plane-wave topography. The influence of the various strain components on the image features is discussed. (author)

  3. PSB Chromaticity Correction in both Planes

    CERN Document Server

    Bartosik, Hannes; CERN. Geneva. ATS Department

    2017-01-01

    In view of the LHC injector upgrade program (LIU[1]), all LHC pre-accelerators and in particular the CERN Booster (PSB) are being reviewed for potential lattice optics and equipment optimizations. The option to correct the chromaticity in both planes would be very helpful for a better control of the beam in the presence of both non-linearities and space charge. Moreover, one could reduce decoherence phenomena that otherwise limit the usefulness of resonance measurement techniques based on a turn-by-turn BPM system.

  4. New plastic plane stress model for concrete

    International Nuclear Information System (INIS)

    Winnicki, A.; Cichon, Cz.

    1993-01-01

    In the paper a description of concrete behaviour in the plane stress case is given on the basis of the modified bounding surface plasticity theory. Three independent plastic mechanisms have been introduced describing axiatoric and deviatoric plastic strains and their coupling. All the new analytical formulae for material functions being in agreement with experiments and loading/unloading criteria have been proposed. In addition, for the proper description of concrete behaviour in tension a new, separate function of bounding surface shrinkage has been introduced. (author)

  5. The Simbol-X Focal Plane

    Science.gov (United States)

    Laurent, P.

    2009-05-01

    The Simbol-X focal plane is designed to detect photons focused by the mirror in the 0.5 to 100 keV energy band. Composed of two detectors, it will measure the position, energy, and arrival time of each incoming X-ray. On top of it will be a collimator to shield all photons not coming from the mirror field of view. The whole system is surrounded by an active and passive shielding in order to ensure the required very low background.

  6. Characterization of DECam focal plane detectors

    Energy Technology Data Exchange (ETDEWEB)

    Diehl, H.Thomas; Angstadt, Robert; Campa, Julia; Cease, Herman; Derylo, Greg; Emes, John H.; Estrada, Juan; Kibik, Donna; Flaugher, Brenna L.; Holland, Steve E.; Jonas, Michelle; /Fermilab /Madrid, CIEMAT /LBL, Berkeley /Argonne /Pennsylvania U.

    2008-06-01

    DECam is a 520 Mpix, 3 square-deg FOV imager being built for the Blanco 4m Telescope at CTIO. This facility instrument will be used for the 'Dark Energy Survey' of the southern galactic cap. DECam has chosen 250 ?m thick CCDs, developed at LBNL, with good QE in the near IR for the focal plane. In this work we present the characterization of these detectors done by the DES team, and compare it to the DECam technical requirements. The results demonstrate that the detectors satisfy the needs for instrument.

  7. The memory effect for plane gravitational waves

    Science.gov (United States)

    Zhang, P.-M.; Duval, C.; Gibbons, G. W.; Horvathy, P. A.

    2017-09-01

    We give an account of the gravitational memory effect in the presence of the exact plane wave solution of Einstein's vacuum equations. This allows an elementary but exact description of the soft gravitons and how their presence may be detected by observing the motion of freely falling particles. The theorem of Bondi and Pirani on caustics (for which we present a new proof) implies that the asymptotic relative velocity is constant but not zero, in contradiction with the permanent displacement claimed by Zel'dovich and Polnarev. A non-vanishing asymptotic relative velocity might be used to detect gravitational waves through the "velocity memory effect", considered by Braginsky, Thorne, Grishchuk, and Polnarev.

  8. On Helmholtz Problem for Plane Periodical Structures

    International Nuclear Information System (INIS)

    Akishin, P.G.; Vinitskij, S.I.

    1994-01-01

    The plane Helmholtz problem of the periodical disc structures with the phase shifts conditions of the solutions along the basis lattice vectors and the Dirichlet conditions on the basic boundaries is considered. The Green function satisfying the quasi periodical conditions on the lattice is constructed. The Helmholtz problem is reduced to the boundary integral equations for the simple layer potentials of this Green function. The methods of the discretization of the arising integral equations are proposed. The procedures of calculation of the matrix elements are discussed. The reality of the spectral parameter of the nonlinear continuous and discretized problems is shown. 8 refs., 2 figs

  9. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  10. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  11. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  12. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  13. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  14. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  15. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  16. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  17. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  18. In-plane and out-of-plane nonlinear dynamics of an axially moving beam

    International Nuclear Information System (INIS)

    Farokhi, Hamed; Ghayesh, Mergen H.; Amabili, Marco

    2013-01-01

    In the present study, the nonlinear forced dynamics of an axially moving beam is investigated numerically taking into account the in-plane and out-of-plane motions. The nonlinear partial differential equations governing the motion of the system are derived via Hamilton’s principle. The Galerkin scheme is then introduced to these partial differential equations yielding a set of second-order nonlinear ordinary differential equations with coupled terms. This set is transformed into a new set of first-order nonlinear ordinary differential equations by means of a change of variables. A direct time integration technique is conducted upon the new set of equations resulting in the bifurcation diagrams of Poincaré maps of the system. The dynamical characteristics of the system are investigated for different system parameters and presented through use of time histories, phase-plane portraits, Poincaré sections, and fast Fourier transforms

  19. 16-dimensional smooth projective planes with large collineation groups

    OpenAIRE

    Bödi, Richard

    1998-01-01

    Erworben im Rahmen der Schweizer Nationallizenzen (http://www.nationallizenzen.ch) Smooth projective planes are projective planes defined on smooth manifolds (i.e. the set of points and the set of lines are smooth manifolds) such that the geometric operations of join and intersection are smooth. A systematic study of such planes and of their collineation groups can be found in previous works of the author. We prove in this paper that a 16-dimensional smooth projective plane which admits a ...

  20. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  1. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  2. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  3. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  4. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  5. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  6. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  7. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  8. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  9. On Finite Hjelmslev Planes of Parameters (pk−1, p)

    OpenAIRE

    Atilla Akpinar

    2010-01-01

    In this paper, we study on finite projective Hjelmslev planes M(Zq) coordinatized by Hjelmslev ring Zq (where prime power q = pk). We obtain finite hyperbolic Klingenberg planes from these planes under certain conditions. Also, we give a combinatorical result on M(Zq), related by deleting a line from lines in same neighbour.

  10. Multispectral linear array (MLA) focal plane mechanical and thermal design

    Science.gov (United States)

    Mitchell, A. S.; Kaminski, E. F.

    1982-01-01

    The mechanical and thermal design of an integrated focal plane subsystem of a Multispectral Linear Array (MLA) instrument is discussed in terms of focal-plane alignment, thermoelastic performance, and thermal requirements. The modular construction and thermal control of the focal plane array are discussed.

  11. The Curious Out-of-Plane Conductivity of PEDOT : PSS

    NARCIS (Netherlands)

    van de Ruit, Kevin; Katsouras, Ilias; Bollen, Dirk; van Mol, Ton; Janssen, Rene A. J.; de Leeuw, Dago M.; Kemerink, Martijn

    2013-01-01

    For its application as transparent conductor in light-emitting diodes and photovoltaic cells, both the in-plane and out-of-plane conductivity of PEDOT:PSS are important. However, studies into the conductivity of PEDOT:PSS rarely address the out-of-plane conductivity and those that do, report widely

  12. Fermi system with planes and charge reservoir: Anisotropic in-plane resistivity

    International Nuclear Information System (INIS)

    Levin, G.A.; Quader, K.F.

    1992-01-01

    The authors explore the normal state in-plane resistivity of a model Fermi system with two planes and a charge reservoir. When the Fermi energy lies near the top of one of the resulting sub-bands, the system can be described by two types of quasiparticle excitations with different energy spectra and relaxation times. They show that for certain stoichiometry, ρ ab is linear in temperature with positive or negative intercepts. A relation between the slopes and intercepts of resistivities in the a and b directions in untwinned crystals is derived. The results are in good agreement with experimental data on YBCO. 7 refs., 1 tab

  13. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  14. Traces of chiral symmetry on light planes

    International Nuclear Information System (INIS)

    Sazdjian, Hagop.

    1975-01-01

    The possibility of a description of the hadronic world by field theories defined on light planes and formulated in terms of three interacting quark field variables has been investigated. The framework of models where the chiral symmetry breaking is produced by the only mechanical masses of quarks has been considered. The hypothesis that the light plane charges generate in the real world approximate symmetries of one particle states has also been emitted. The projection of the algebraic structure of the observables in the space of physical states have yielded various relations in terms of the masses and couplings of the low lying mesons. They seem to be in agreement with experimental data, and suggest the consistency of the adopted model to describe symmetry breaking phenomena. The quark mechanical masses m(u) approximately 30MeV and m(s) approximately 200MeV have also been estimated. The smallness of these masses in respect to those of hadrons seems to indicate that they do not constitute the only mass scale of the hadronic world, but that there should exist another scale parameter, independent of the quark mechanical masses, and symmetric of SU(3) [fr

  15. The plane motion control of the quadrocopter

    Directory of Open Access Journals (Sweden)

    A. N. Kanatnikov

    2015-01-01

    Full Text Available Among a large number of modern flying vehicles, the quadrocopter relates to unmanned aerial vehicles (UAV which are relatively cheap and easy to design. Quadrocopters are able to fly in bad weather, hang in the air for quite a long time, observe the objects and perform many other tasks. They have been applied in rescue operations, in agriculture, in the military and many other fields.For quadrocopters, the problems of path planning and control are relevant. These problems have many variants in which limited resources of modern UAV, possible obstacles, for instance, for flying in a cross-country terrain or in a city environment and weather conditions (particularly, wind conditions are taken into account. Many research studies are concerned with these problems and reflected in series of publications (note the interesting survey [1] and references therein. Various methods were used for the control synthesis for these vehicles: linear approximations [2], sliding mode control [3], the covering method [4] and so on.In the paper, a quadrocopter is considered as a rigid body. The kinematic and dynamic equations of the motion are analyzed. Two cases of motion are emphasized: a motion in a vertical plane and in a horizontal plane. The control is based on transferring of the affine system to the canonical form [5] and the nonlinear stabilization method [6].

  16. The Sentinel-4 UVN focal plane assemblies

    Science.gov (United States)

    Hinger, Jürgen; Hohn, Rüdiger; Gebhardt, Eyk; Reichardt, Jörg

    2017-09-01

    The Sentinel-4 UVN Instrument is a dispersive imaging spectrometer covering the UV-VIS and the NIR wavelength. It is developed and built under an ESA contract by an industrial consortium led by Airbus Defence and Space. It will be accommodated on board of the MTG-S (Meteosat Third Generation - Sounder) satellite that will be placed in a geostationary orbit over Europe sampling data for generating two-dimensional maps of a number of atmospheric trace gases. The incoming light is dispersed by reflective gratings and detected by the two (UVVIS and NIR) CCDs mounted inside the focal plane assemblies. Both CCD detectors acquire spectral channels and spatial sampling in two orthogonal directions and will be operated at about 215 K mainly to minimize random telegraph signal effects and to reduce dark current. Stringent detector temperature as well as alignment stability requirements of less than +/-0.1 K per day respectively of less than 2 micrometers/2 arcseconds from ground to orbit are driving the FPA thermo-mechanical design. A specific FPA design feature is the redundant LED-calibration system for bad pixel detection as well as pixel gain and linearity monitoring. This paper reports on the design and qualification of the Focal Plane Assemblies with emphasis on thermo-mechanical as well as alignment stability verification.

  17. The Sentinel 4 focal plane subsystem

    Science.gov (United States)

    Hohn, Rüdiger; Skegg, Michael P.; Hermsen, Markus; Hinger, Jürgen; Williges, Christian; Reulke, Ralf

    2017-09-01

    The Sentinel 4 instrument is an imaging spectrometer, developed by Airbus under ESA contract in the frame of the joint European Union (EU)/ESA COPERNICUS program with the objective of monitoring trace gas concentrations. Sentinel 4 will provide accurate measurements of key atmospheric constituents such as ozone, nitrogen dioxide, sulfur dioxide, formaldehyde, as well as aerosol and cloud properties. Sentinel 4 is unique in being the first geostationary UVN mission. The SENTINEL 4 space segment will be integrated on EUMETSAT's Meteosat Third Generation Sounder satellite (MTG-S). Sentinel 4 will provide coverage of Europe and adjacent regions. The Sentinel 4 instrument comprises as a major element two Focal Plane Subsystems (FPS) covering the wavelength ranges 305 nm to 500 nm (UVVIS) and 750 nm to 775 nm (NIR) respectively. The paper describes the Focal Plane Subsystems, comprising the detectors, the optical bench and the control electronics. Further the design and development approach will be presented as well as first measurement results of FPS Qualification Model.

  18. Mathematical Foundation for Plane Covering Using Hexagons

    Science.gov (United States)

    Johnson, Gordon G.

    1999-01-01

    This work is to indicate the development and mathematical underpinnings of the algorithms previously developed for covering the plane and the addressing of the elements of the covering. The algorithms are of interest in that they provides a simple systematic way of increasing or decreasing resolution, in the sense that if we have the covering in place and there is an image superimposed upon the covering, then we may view the image in a rough form or in a very detailed form with minimal effort. Such ability allows for quick searches of crude forms to determine a class in which to make a detailed search. In addition, the addressing algorithms provide an efficient way to process large data sets that have related subsets. The algorithms produced were based in part upon the work of D. Lucas "A Multiplication in N Space" which suggested a set of three vectors, any two of which would serve as a bases for the plane and also that the hexagon is the natural geometric object to be used in a covering with a suggested bases. The second portion is a refinement of the eyeball vision system, the globular viewer.

  19. Plasma drift towards a plane equipotential surface

    International Nuclear Information System (INIS)

    Carlqvist, P.

    1984-03-01

    Recently Alfven has qualitatively described how a collisionless plasma drifts in crossed electric and magnetic fields towards an infinite conducting plate of constant potential. In the present note we quantitatively study three models which are closely related to Alfven's model. It is found that when the plasma comes sufficiently close to a plane equipotential surface (conducting plate) it is deflected approximately along the surface. The deflection is not caused by pressure effects but rather by the electric and magnetic fields. Small fluxes of ions and electrons also cross the plane equipotential surface. These fluxes account for an electric current in the plasma which induces a magnetic field in the same direction as the total magnetic field assumed to be homogeneous. It is shown that if the Alfven number, M(sub)A, is much smaller than unity in the volume considered the magnetic field induced by plasma currents is small compared to the total magnetic field. However, if M(sub)A is of the order of unity or larger the total magnetic field is to a substantial degree generated by plasma currents. (Author)

  20. A Single-Element Plane Grating Monochromator

    Directory of Open Access Journals (Sweden)

    Michael C. Hettrick

    2016-01-01

    Full Text Available Concerted rotations of a self-focused varied line-space diffraction grating about its groove axis and surface normal define a new geometric class of monochromator. Defocusing is canceled, while the scanned wavelength is reinforced at fixed conjugate distances and horizontal deviation angle. This enables high spectral resolution over a wide band, and is of particular advantage at grazing reflection angles. A new, rigorous light-path formulation employs non-paraxial reference points to isolate the lateral ray aberrations, with those of power-sum ≤ 3 explicitly expanded for a plane grating. Each of these 14 Fermat equations agrees precisely with the value extracted from numerical raytrace simulations. An example soft X-ray design (6° deviation angle and 2 × 4 mrad aperture attains a resolving power > 25 , 000 over a three octave scan range. The proposed rotation scheme is not limited to plane surfaces or monochromators, providing a new degree of freedom in optical design.

  1. Efficient Closed Form Cut-Off Planes and Propagation Planes Characteristics for Dielectric Slab Loaded Boundary Value Problems

    OpenAIRE

    Zafar, Junaid

    2012-01-01

    The geometrical relationship between the cut-off and propagating planes of any waveguide system is a prerequisite for any design process. The characterization of cut-off planes and optimisation are challenging for numerical methods, closed-form solutions are always preferred. In this paper Maxwells coupled field equations are used to characterise twin E-plane and H-plane slab loaded boundary value problems. The single mode bandwidths and dispersion characteristics of these structures are pres...

  2. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  3. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  4. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  5. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  6. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  7. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  8. On the necessity of connection between plane and curve space metrics in gravity theory on a plane background

    International Nuclear Information System (INIS)

    Vlasov, A.A.

    1988-01-01

    The necessity of covariant connection of plane space metrics in the gravity theory ''on a plane background'' is underlined. It is shown that this connection in the relativistic gravity theory results in its difference from the general relativity theory ''on a plane background''

  9. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  10. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  11. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  12. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  13. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  14. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  15. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  16. The in-focus variable line spacing plane grating monochromator

    International Nuclear Information System (INIS)

    Reininger, R.

    2011-01-01

    The in-focus variable line spacing plane grating monochromator is based on only two plane optical elements, a variable line spacing plane grating and a plane pre-mirror that illuminates the grating at the angle of incidence that will focus the required photon energy. A high throughput beamline requires only a third optical element after the exit slit, an aberration corrected elliptical toroid. Since plane elements can be manufactured with the smallest figure errors, this monochromator design can achieve very high resolving power. Furthermore, this optical design can correct the deformations induced by the heat load on the optics along the dispersion plane. This should allow obtaining a resolution of 10 meV at 1 keV with currently achievable figure errors on plane optics. The position of the photon source when an insertion device center is not located at the center of the straight section, a common occurrence in new insertion device beamlines, is investigated.

  17. Guide-Plane Retention in Designing Removable Partial Dentures.

    Science.gov (United States)

    Mothopi-Peri, Matshediso; Owen, C Peter

    To compare the influence of abutment teeth guide planes and guiding surfaces on retention of a removable partial denture (RPD). Extracted teeth embedded into a maxillary cast in the first premolar and second molar positions simulated two bounded saddles. Acrylic resin RPDs were made with no guide planes, then with guide planes, then with guiding surfaces added to directly contact the guide planes. The maximum loads on removal from the cast were recorded. There was a significant increase in retention force of 1.6 times when only guide planes were present and of 10.2 times when guiding surfaces intimately contacted the guide planes. The retention of acrylic resin RPDs can be substantially increased by making their guiding surfaces intimately contact the guide planes of the teeth.

  18. Plane grating monochromators for synchrotron radiation

    International Nuclear Information System (INIS)

    Howells, M.R.

    1979-01-01

    The general background and theoretical basis of plane grating monochromators (PGM's) is reviewed and the particular case of grazing incidence PGM's suitable for use with synchrotron radiation is considered in detail. The theory of reflection filtering is described and the problem of the finite source distance is shown to be of special importance with high brightness storage rings. The design philosophy of previous instruments is discussed and a new scheme proposed, aimed at dealing with the problem of the finite source distance. This scheme, involving a parabolic collimating mirror fabricated by diamond turning, is considered in the context of Wolter-type telescopes and microscopes. Some practical details concerning an instrument presently under construction using the new design are presented

  19. Drawing Contour Trees in the Plane.

    Science.gov (United States)

    Heine, C; Schneider, D; Carr, Hamish; Scheuermann, G

    2011-11-01

    The contour tree compactly describes scalar field topology. From the viewpoint of graph drawing, it is a tree with attributes at vertices and optionally on edges. Standard tree drawing algorithms emphasize structural properties of the tree and neglect the attributes. Applying known techniques to convey this information proves hard and sometimes even impossible. We present several adaptions of popular graph drawing approaches to the problem of contour tree drawing and evaluate them. We identify five esthetic criteria for drawing contour trees and present a novel algorithm for drawing contour trees in the plane that satisfies four of these criteria. Our implementation is fast and effective for contour tree sizes usually used in interactive systems (around 100 branches) and also produces readable pictures for larger trees, as is shown for an 800 branch example.

  20. Landau levels on the hyperbolic plane

    International Nuclear Information System (INIS)

    Fakhri, H; Shariati, M

    2004-01-01

    The quantum states of a spinless charged particle on a hyperbolic plane in the presence of a uniform magnetic field with a generalized quantization condition are proved to be the bases of the irreducible Hilbert representation spaces of the Lie algebra u(1, 1). The dynamical symmetry group U(1, 1) with the explicit form of the Lie algebra generators is extracted. It is also shown that the energy has an infinite-fold degeneracy in each of the representation spaces which are allocated to the different values of the magnetic field strength. Based on the simultaneous shift of two parameters, it is also noted that the quantum states realize the representations of Lie algebra u(2) by shifting the magnetic field strength. (letter to the editor)

  1. Landau levels on the hyperbolic plane

    Energy Technology Data Exchange (ETDEWEB)

    Fakhri, H [Institute for Studies in Theoretical Physics and Mathematics (IPM), Tehran 19395-5531 (Iran, Islamic Republic of); Shariati, M [Department of Physics, Khajeh Nassir-Al-Deen Toosi University of Technology, Tehran 15418 (Iran, Islamic Republic of)

    2004-11-05

    The quantum states of a spinless charged particle on a hyperbolic plane in the presence of a uniform magnetic field with a generalized quantization condition are proved to be the bases of the irreducible Hilbert representation spaces of the Lie algebra u(1, 1). The dynamical symmetry group U(1, 1) with the explicit form of the Lie algebra generators is extracted. It is also shown that the energy has an infinite-fold degeneracy in each of the representation spaces which are allocated to the different values of the magnetic field strength. Based on the simultaneous shift of two parameters, it is also noted that the quantum states realize the representations of Lie algebra u(2) by shifting the magnetic field strength. (letter to the editor)

  2. Smart trigger logic for focal plane arrays

    Science.gov (United States)

    Levy, James E; Campbell, David V; Holmes, Michael L; Lovejoy, Robert; Wojciechowski, Kenneth; Kay, Randolph R; Cavanaugh, William S; Gurrieri, Thomas M

    2014-03-25

    An electronic device includes a memory configured to receive data representing light intensity values from pixels in a focal plane array and a processor that analyzes the received data to determine which light values correspond to triggered pixels, where the triggered pixels are those pixels that meet a predefined set of criteria, and determines, for each triggered pixel, a set of neighbor pixels for which light intensity values are to be stored. The electronic device also includes a buffer that temporarily stores light intensity values for at least one previously processed row of pixels, so that when a triggered pixel is identified in a current row, light intensity values for the neighbor pixels in the previously processed row and for the triggered pixel are persistently stored, as well as a data transmitter that transmits the persistently stored light intensity values for the triggered and neighbor pixels to a data receiver.

  3. Plane shock wave studies of geologic media

    International Nuclear Information System (INIS)

    Anderson, G.D.; Larson, D.B.

    1977-01-01

    Plane shock wave experiments have been conducted on eight geologic materials in an effort to determine the importance of time-dependent mechanical behavior. Of the eight rocks studied, only Westerly granite and nugget sandstone appear to show time independence. In the slightly porous materials (1-5 percent), Blair dolomite and sodium chloride, and in the highly porous (15 to 40 percent) rock, Mt. Helen tuff and Indiana limestone, time-dependent behavior is associated with the time required to close the available porosity. In water-saturated rocks the time dependence arises because the water that is present shows no indication of transformation to the higher pressure ice phases, thus suggesting the possibility that a metastable form of water exists under dynamic conditions

  4. A ''quadratized'' augmented plane wave method

    International Nuclear Information System (INIS)

    Smrcka, L.

    1982-02-01

    The exact radial solution inside the muffin-tin sphere is replaced by its Taylor expansion with respect to the energy, truncated after the quadratic term. Making use of it the energy independent augmented plane waves are formed which lead to the secular equations linear in energy. The method resembles the currently used linearized APW method but yields higher accuracy. The analysis of solution inside one muffin-tin sphere shows that the eigenvalue error is proportional to (E-E 0 ) 6 as compared with (E-E 0 ) 4 for LAPW. The error of eigenfunctions is (E-E 0 ) 3 ((E-E 0 ) 2 for LAPW). These conclusions are confirmed by direct numerical calculation of band structure of Cu and Al. (author)

  5. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  6. NUMERICAL DERIVATIONS OF A MACROSCOPIC MODEL FOR REINFORCED CONCRETE WALLS CONSIDERING IN-PLANE AND OUT-OF-PLANE BEHAVIOR

    OpenAIRE

    LATCHAROTE; Panon KAI, Yoshiro

    2015-01-01

    A macroscopic model, macro plate model, was proposed to represent a wall member of RC walls. Both in-plane and out-of-plane behavior were considered for numerical derivations of macro plate model. For out-of-plane behavior, bending deformation was incorporated with shear deformation to consider out-of-plane deformation as same as in-plane behavior. The hysteretic behavior of macro plate model can be directly expressed by stress-strain relationships in any conventional hysteretic rules, which ...

  7. OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN

    OpenAIRE

    Han, Biao; Yang, Xiangrui; Sun, Zhigang; Huang, Jinfeng; Su, Jinshu

    2018-01-01

    Distributed Denial of Service (DDoS) attacks are one of the biggest concerns for security professionals. Traditional middle-box based DDoS attack defense is lack of network-wide monitoring flexibility. With the development of software-defined networking (SDN), it becomes prevalent to exploit centralized controllers to defend against DDoS attacks. However, current solutions suffer with serious southbound communication overhead and detection delay. In this paper, we propose a cross-plane DDoS a...

  8. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  9. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  10. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  11. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  12. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  13. Materialism and food security.

    Science.gov (United States)

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  14. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  15. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  16. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  17. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  18. ITIL® and information security

    International Nuclear Information System (INIS)

    Jašek, Roman; Králík, Lukáš; Popelka, Miroslav

    2015-01-01

    This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework

  19. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  20. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  1. Cloud Infrastructure Security

    OpenAIRE

    Velev , Dimiter; Zlateva , Plamena

    2010-01-01

    Part 4: Security for Clouds; International audience; Cloud computing can help companies accomplish more by eliminating the physical bonds between an IT infrastructure and its users. Users can purchase services from a cloud environment that could allow them to save money and focus on their core business. At the same time certain concerns have emerged as potential barriers to rapid adoption of cloud services such as security, privacy and reliability. Usually the information security professiona...

  2. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  3. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  4. Auditing Organizational Security

    Science.gov (United States)

    2017-01-01

    Organi- zation for Standardiza- tion ( ISO ): ISO 27000 : Information Systems Se- curity Management. A robust program of internal auditing of a...improvement is the basis and underpinning of the ISO . All processes must be considered ongoing and never at an “end state.” Top management develops a...security management system, including security policies and security objectives, plus threats and risks. Orga- nizations already working with ISO 9000

  5. Intercorporate Security Event Correlation

    Directory of Open Access Journals (Sweden)

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  6. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  7. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  8. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  9. Secure Virtual Enclaves

    National Research Council Canada - National Science Library

    Shands, Deborah

    2002-01-01

    The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application resources, while respecting organizational autonomy over local resources...

  10. Beginning ASPNET Security

    CERN Document Server

    Dorrans, Barry

    2010-01-01

    Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and

  11. Governing for Enterprise Security

    National Research Council Canada - National Science Library

    Allen, Julia

    2005-01-01

    ... business. If an organization's management -- including boards of directors, senior executives, and all managers -- does not establish and reinforce the business need for effective enterprise security...

  12. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  13. National Security Whistleblowers

    National Research Council Canada - National Science Library

    Fisher, Louis

    2005-01-01

    .... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...

  14. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  15. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  16. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  17. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  18. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  19. Estimating the Value of the Inclination Angle of the Lunar Plane to the Ecliptic Plane

    Science.gov (United States)

    Isildak, R. Suat; Isik, Hakan; Küçüközer, H. Asuman

    2018-01-01

    Sky appears to our students as a vast volume surrounding the Earth. The most striking astronomical events that they can witness in the sky are lunar phases and eclipses. However, eclipses do not occur as often as full and new phases of the Moon. This difference is due to the fact that the orbital planes of the Moon and the Earth do not overlap.…

  20. In-plane and out-of-plane bending tests on carbon steel pipe bends

    International Nuclear Information System (INIS)

    Brouard, D.; Tremblais, A.; Vrillon, B.

    1979-01-01

    The objectives of these tests were to obtain experimental results on bends behaviour in elastic and plastic regime by in plane and out of plane bending. Results were used to improve the computer model, for large distorsion of bends, to be used in a simplified beam type computer code for piping calculations. Tests were made on type ANSI B 169 DN 5 bends in ASTM A 106 Grade B carbon steel. These tests made it possible to measure, for identical bends, in elastic regime, the flexibility factors and, in plastic regime, the total evolution in opening, in closing and out of plane. Flexibility factors of 180 0 bend without flanges are approximately the same in opening and in closing. The end effect due to flanges is not very significant, but it is important for 90 0 bends. In plastic regime, collapse loads or collapse moments of bends depends also of both the end effects and the angle bend. The end effects and the angle bend are more sensitive in opening than in closing. The interest of these tests is to procure some precise evolution curves of identical bends well characterized in geometry and metal strength, deflected in large distorsions. (orig./HP)

  1. First results from the INTEGRAL galactic plane scans

    DEFF Research Database (Denmark)

    Winkler, C.; Gehrels, N.; Schonfelder, V.

    2003-01-01

    Scans of the Galactic plane performed at regular intervals constitute a key element of the guaranteed time observations of the INTEGRAL observing programme. These scans are done for two reasons: frequent monitoring of the Galactic plane in order to detect transient sources, and time resolved mapp...... mapping of the Galactic plane in continuum and diffuse line emission. This paper describes first results obtained from the Galactic plane scans executed so far during the early phase (Dec. 2002-May 2003) of the nominal mission.......Scans of the Galactic plane performed at regular intervals constitute a key element of the guaranteed time observations of the INTEGRAL observing programme. These scans are done for two reasons: frequent monitoring of the Galactic plane in order to detect transient sources, and time resolved...

  2. On the determination of general plane stress states in orthotropic materials from ultrasonic velocity data in non symmetry planes

    International Nuclear Information System (INIS)

    Goncalves Filho, Orlando J.A.

    2015-01-01

    This work reports the progress in the development of a new experimental protocol for plane stress determination in orthotropic materials based on the ultrasonic velocity of bulk waves propagating in non symmetry planes with oblique incidence. The presence of stress-induced deformation introduces an acoustic anisotropy in the material in addition to that defined by its texture. Orthotropic materials under general plane stress states become acoustically monoclic and its orthotropic planes orthogonal to the stress plane become non symmetry planes. The inverse solution of the generalized Christoffel equation for ultrasonic bulk waves propagating in non symmetry planes of anisotropic bodies is known to be numerically unstable. The suggested protocol deals with this numerical instability without recourse to bulk wave propagation in the stress plane as proposed in the literature. Hence, it should be useful for plane stress analysis of thin wall pressure vessels where ultrasonic measurements in the direction of the wall plane are not possible. For the initial validation of the suggested protocol and verification of the stability of the inversion algorithm, computer simulation of stress determination have been performed from synthetic sets of velocity data obtained by the forward solution of the generalized Christoffel equation. Preliminary results for slightly orthotropic aluminium highlight the potential of the suggested protocol. (author)

  3. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  4. 21st Century Security Manager

    OpenAIRE

    Stelian ARION

    2010-01-01

    We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers ...

  5. Helical waves in easy-plane antiferromagnets

    Science.gov (United States)

    Semenov, Yuriy G.; Li, Xi-Lai; Xu, Xinyi; Kim, Ki Wook

    2017-12-01

    Effective spin torques can generate the Néel vector oscillations in antiferromagnets (AFMs). Here, it is theoretically shown that these torques applied at one end of a normal AFM strip can excite a helical type of spin wave in the strip whose properties are drastically different from characteristic spin waves. An analysis based on both a Néel vector dynamical equation and the micromagnetic simulation identifies the direction of magnetic anisotropy and the damping factor as the two key parameters determining the dynamics. Helical wave propagation requires the hard axis of the easy-plane AFM to be aligned with the traveling direction, while the damping limits its spatial extent. If the damping is neglected, the calculation leads to a uniform periodic domain wall structure. On the other hand, finite damping decelerates the helical wave rotation around the hard axis, ultimately causing stoppage of its propagation along the strip. With the group velocity staying close to spin-wave velocity at the wave front, the wavelength becomes correspondingly longer away from the excitation point. In a sufficiently short strip, a steady-state oscillation can be established whose frequency is controlled by the waveguide length as well as the excitation energy or torque.

  6. Planes y proyectos para un desarrollo sustentable

    Directory of Open Access Journals (Sweden)

    Mg. Arq. Jorge Montenegro

    2014-12-01

    Full Text Available La cátedra de Urbanismo I A de la Facultad de Arquitectura, Urbanismo y Diseño de la Universidad Nacional de Córdoba, considera que es fundamental educar a los alumnos en la construcción de un pensamiento crítico reflexivo, sobre la base de teorías, modelos y metodologías preocupados por el desarrollo sustentable de nuestras ciudades. En este contexto, la cátedra promueve la construcción de una visión holística sobre la ciudad, abordando los contenidos, metodologías e instrumentación específca —planes maestros, proyectos urbanos— desde los enfoques tradicionales: físico–funcional y morfológico–perceptual, los que se complementan con una mirada socioambiental del fenómeno urbano. En este artículo presentamos una síntesis de la tarea académica que desarrollamos.

  7. planes de estudio y orientaciones oficiales

    Directory of Open Access Journals (Sweden)

    María Eugenia Fernández Fraile

    2005-01-01

    Full Text Available El presente artículo se propone, a través del análisis de los cambios introducidos en los Planes de estudios que más incidencia tienen sobre la enseñanza de las lenguas vivas (1900, 1926, 1934, 1938, 1953/1957, 1970 y 1990, destacar las tendencias evolutivas o las líneas maestras que configuran el concepto del Francés como Lengua Extranjera en tanto que disciplina escolar Se abordan así, en una presentación cronológica, las siguientes cuestiones: la regulación de la materia en sus aspectos “materiales” (horario, cursos, el concepto “social” e “institucional” de la disciplina (en conexión con el resto de las lenguas vivas y, finalmente, los objetivos-contenidos didácticos y las orientaciones metodológicas presentes en los textos oficiales.

  8. Grand unification in the projective plane

    International Nuclear Information System (INIS)

    Hebecker, A.

    2004-01-01

    A 6-dimensional grand unified theory with the compact space having the topology of a real projective plane, i.e., a 2-sphere with opposite points identified, is considered. The space is locally flat except for two conical singularities where the curvature is concentrated. One supersymmetry is preserved in the effective 4d theory. The unified gauge symmetry, for example SU(5), is broken only by the non-trivial global topology. In contrast to the Hosotani mechanism, no adjoint Wilson-line modulus associated with this breaking appears. Since, locally, SU(5) remains a good symmetry everywhere, no UV-sensitive threshold corrections arise and SU(5)-violating local operators are forbidden. Doublet-triplet splitting can be addressed in the context of a 6d N=2 super Yang-Mills theory with gauge group SU(6). If this symmetry is first broken to SU(5) at a fixed point and then further reduced to the standard model group in the above non-local way, the two light Higgs doublets of the MSSM are predicted by the group-theoretical and geometrical structure of the model. (author)

  9. Hybrid inflation in the complex plane

    International Nuclear Information System (INIS)

    Buchmueller, W.; Domcke, V.; Kamada, K.; Schmitz, K.

    2014-04-01

    Supersymmetric hybrid inflation is an exquisite framework to connect inflationary cosmology to particle physics at the scale of grand unification. Ending in a phase transition associated with spontaneous symmetry breaking, it can naturally explain the generation of entropy, matter and dark matter. Coupling F-term hybrid inflation to soft supersymmetry breaking distorts the rotational invariance in the complex inflaton plane - an important fact, which has been neglected in all previous studies. Based on the δN formalism, we analyze the cosmological perturbations for the first time in the full two-field model, also taking into account the fast-roll dynamics at and after the end of inflation. As a consequence of the two-field nature of hybrid inflation, the predictions for the primordial fluctuations depend not only on the parameters of the Lagrangian, but are eventually fixed by the choice of the inflationary trajectory. Recognizing hybrid inflation as a two-field model resolves two shortcomings often times attributed to it: The fine-tuning problem of the initial conditions is greatly relaxed and a spectral index in accordance with the PLANCK data can be achieved in a large part of the parameter space without the aid of supergravity corrections. Our analysis can be easily generalized to other (including large-field) scenarios of inflation in which soft supersymmetry breaking transforms an initially single-field model into a multi-field model.

  10. Condensation on a cooled plane upright wall

    International Nuclear Information System (INIS)

    Fortier, Andre.

    1975-01-01

    The vapor condensation along a cooled upright plane wall was studied. The theoretical and experimental results obtained in the simple case, give the essential characteristics of the phenomenon of condensation along a cold wall that keeps the vapor apart from the coolant inside a surface condenser. The phenomenon presents two different appearances according as the wall is wetted or not by the liquid. In the first case a continuous liquid film runs down the wall and a conventional Nusselt calculation gives the film thickness and the heat exchange coefficient between a pure saturated vapor and the cold wall. The calculation is developed in detail and the effect of a vapor flow along the film is discussed as well as that of the presence of a noncondensable gas inside the vapor. In the second case, separated liquid drops are formed on the wall, the phenomenon is called ''dropwise condensation'' and the heat exchange coefficients obtained are much higher than with film condensation. The theoretical aspects of the problem are discussed with some experimental results [fr

  11. Context based Coding of Quantized Alpha Planes for Video Objects

    DEFF Research Database (Denmark)

    Aghito, Shankar Manuel; Forchhammer, Søren

    2002-01-01

    In object based video, each frame is a composition of objects that are coded separately. The composition is performed through the alpha plane that represents the transparency of the object. We present an alternative to MPEG-4 for coding of alpha planes that considers their specific properties....... Comparisons in terms of rate and distortion are provided, showing that the proposed coding scheme for still alpha planes is better than the algorithms for I-frames used in MPEG-4....

  12. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  13. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  14. OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN

    Directory of Open Access Journals (Sweden)

    Biao Han

    2018-01-01

    Full Text Available Distributed Denial of Service (DDoS attacks are one of the biggest concerns for security professionals. Traditional middle-box based DDoS attack defense is lack of network-wide monitoring flexibility. With the development of software-defined networking (SDN, it becomes prevalent to exploit centralized controllers to defend against DDoS attacks. However, current solutions suffer with serious southbound communication overhead and detection delay. In this paper, we propose a cross-plane DDoS attack defense framework in SDN, called OverWatch, which exploits collaborative intelligence between data plane and control plane with high defense efficiency. Attack detection and reaction are two key procedures of the proposed framework. We develop a collaborative DDoS attack detection mechanism, which consists of a coarse-grained flow monitoring algorithm on the data plane and a fine-grained machine learning based attack classification algorithm on the control plane. We propose a novel defense strategy offloading mechanism to dynamically deploy defense applications across the controller and switches, by which rapid attack reaction and accurate botnet location can be achieved. We conduct extensive experiments on a real-world SDN network. Experimental results validate the efficiency of our proposed OverWatch framework with high detection accuracy and real-time DDoS attack reaction, as well as reduced communication overhead on SDN southbound interface.

  15. A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane

    Science.gov (United States)

    Zhao, Liang; Adhikari, Avishek; Sakurai, Kouichi

    Watermarking is one of the most effective techniques for copyright protection and information hiding. It can be applied in many fields of our society. Nowadays, some image scrambling schemes are used as one part of the watermarking algorithm to enhance the security. Therefore, how to select an image scrambling scheme and what kind of the image scrambling scheme may be used for watermarking are the key problems. Evaluation method of the image scrambling schemes can be seen as a useful test tool for showing the property or flaw of the image scrambling method. In this paper, a new scrambling evaluation system based on spatial distribution entropy and centroid difference of bit-plane is presented to obtain the scrambling degree of image scrambling schemes. Our scheme is illustrated and justified through computer simulations. The experimental results show (in Figs. 6 and 7) that for the general gray-scale image, the evaluation degree of the corresponding cipher image for the first 4 significant bit-planes selection is nearly the same as that for the 8 bit-planes selection. That is why, instead of taking 8 bit-planes of a gray-scale image, it is sufficient to take only the first 4 significant bit-planes for the experiment to find the scrambling degree. This 50% reduction in the computational cost makes our scheme efficient.

  16. Study of combined cycle engine for aerospace plane

    OpenAIRE

    苅田, 丈士; KANDA, Takeshi; 工藤, 賢司; KUDO, Kenji

    2002-01-01

    At the Ramjet Propulsion Research Center, the scramjet engine for an aerospace plane has been studied. Other engines are required for the plane to go into orbit. Recently, a combined cycle engine including scramjet mode has been also studied to complete the engine system for the plane. The scramjet and the combined cycle engine are most effective with application to the Single-Stage-to-Orbit (SSTO) aerospace plane, as shown in Figure 1. Recent activity on the combined cycle engine and the SST...

  17. Quantum Mechanics on the h-deformed Quantum Plane

    OpenAIRE

    Cho, Sunggoo

    1998-01-01

    We find the covariant deformed Heisenberg algebra and the Laplace-Beltrami operator on the extended $h$-deformed quantum plane and solve the Schr\\"odinger equations explicitly for some physical systems on the quantum plane. In the commutative limit the behaviour of a quantum particle on the quantum plane becomes that of the quantum particle on the Poincar\\'e half-plane, a surface of constant negative Gaussian curvature. We show the bound state energy spectra for particles under specific poten...

  18. Angle measures, general rotations, and roulettes in normed planes

    Science.gov (United States)

    Balestro, Vitor; Horváth, Ákos G.; Martini, Horst

    2017-12-01

    In this paper a special group of bijective maps of a normed plane (or, more generally, even of a plane with a suitable Jordan curve as unit circle) is introduced which we call the group of general rotations of that plane. It contains the isometry group as a subgroup. The concept of general rotations leads to the notion of flexible motions of the plane, and to the concept of Minkowskian roulettes. As a nice consequence of this new approach to motions the validity of strong analogues to the Euler-Savary equations for Minkowskian roulettes is proved.

  19. Social Security Administration

    Science.gov (United States)

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  20. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  1. Women and social security

    NARCIS (Netherlands)

    Westerveld, M.; Pennings, F.; Vonk, G.

    2015-01-01

    Does ‘the’ social security take sufficient account of women? Are its protection schemes sufficiently aimed at safeguarding women’s interests? These are the questions I was invited to answer for this handbook on social security law. At the same time I was asked to adopt an unorthodox approach, one

  2. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  3. Information security management principles

    CERN Document Server

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  4. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  5. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  6. VMware view security essentials

    CERN Document Server

    Langenhan, Daniel

    2013-01-01

    A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a ""how-to"" for the novice, a ""reference guide"" for the advanced user, and a ""go to"" for the experienced user in all the aspects of VMware View desktop virtualization security.

  7. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  8. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  9. Security in the cloud.

    Science.gov (United States)

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  10. Systems Security Engineering

    Science.gov (United States)

    2010-08-22

    environment that contains network- borne cybersecurity threats, an argument may be made that the firewall increases overall system functionality by reserving...the number of administered devices. This approach to security analysis is at once old and new. In the early days of eCommerce , security

  11. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  12. Formalizing physical security procedures

    NARCIS (Netherlands)

    Meadows, C.; Pavlovic, Dusko

    Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now

  13. No energy security without climate security

    International Nuclear Information System (INIS)

    Hiller, M.

    2006-06-01

    WWF urges the G8 nations to embark on a serious global 'Climate and Energy Security Plan' akin in dimension to the Marshall plan after the Second World War. The plan would aim at dramatically augmenting energy efficiency measures and renewable energy sources within the next five years

  14. Estimates of plastic loads for pipe bends under combined in-plane and out-of-plane bending moment

    International Nuclear Information System (INIS)

    Kim, Nak Hyun; Oh, Chang Sik; Kim, Yun Jae

    2008-01-01

    This paper provides a method to estimate plastic loads (defined by twice-elastic-slope) for pipe bends under combined in-plane and out-of-plane bending moment, based on detailed 3-D FE limit analyses using elastic-perfectly plastic materials. Because closing bending moment is always lower than opening bending moment, the combination of in-plane closing bending and out-of-plane bending moment becomes the most significant case. Due to conservatism of each bending moments, the resultant moment provided by ASME B and PV code is unduly conservative. However, the concept of the resultant moment is still valid. In this paper, FE results show that the accurate solutions of bending moments provide better estimates of plastic loads of pipe bend under combined in-plane bending and out-of-plane bending moment

  15. In-plane and out-of-plane emission of nuclear matter in Au+Au collisions

    International Nuclear Information System (INIS)

    Bastid, N.; Dupieux, P.; Ramillien, V.; Alard, J.P.; Amouroux, V.; Berger, L.; Boussange, S.; Fraysse, L.; Ibnouzahir, M.; Montarou, G.

    1995-01-01

    Collective flow effects in Au (E/A = 150 to 800 MeV) on Au collisions measured with the phase I setup of the FOPI detector at GSI - Darmstadt are presented. Directed side ward flow is studied, by the mean transverse momentum in the reaction plane x (y)>, without reaction plane reconstruction. A more quantitative measurement of the global amount of directed side ward flow is also made and some comparisons with the predictions of different QMD versions are given. Experimental results concerning the preferential emission of particles in a direction perpendicular to the reaction plane are also presented. Azimuthal distributions of fragments around the beam axis, with respect to the reaction plane are studied in the mid-rapidity region and the associated R N (out-of-plane/in-plane ratios) are extracted. The dependence of R N upon transverse momentum, centrality, fragment charge and bombarding energy is studied. (authors). 24 refs., 10 figs., 1 tab

  16. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  17. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  18. The secure heating reactor

    International Nuclear Information System (INIS)

    Pind, C.

    1987-01-01

    The SECURE heating reactor was designed by ASEA-ATOM as a realistic alternative for district heating in urban areas and for supplying heat to process industries. SECURE has unique safety characteristics, that are based on fundamental laws of physics. The safety does not depend on active components or operator intervention for shutdown and cooling of the reactor. The inherent safety characteristics of the plant cannot be affected by operator errors. Due to its very low environment impact, it can be sited close to heat consumers. The SECURE heating reactor has been shown to be competitive in comparison with other alternatives for heating Helsinki and Seoul. The SECURE heating reactor forms a basis for the power-producing SECURE-P reactor known as PIUS (Process Inherent Ultimate Safety), which is based on the same inherent safety principles. The thermohydraulic function and transient response have been demonstrated in a large electrically heated loop at the ASEA-ATOM laboratories

  19. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  20. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  1. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  2. Indirection and computer security.

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  3. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  4. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  5. LDRD final report for improving human effectiveness for extreme-scale problem solving : assessing the effectiveness of electronic brainstorming in an industrial setting.

    Energy Technology Data Exchange (ETDEWEB)

    Dornburg, Courtney C.; Stevens, Susan Marie; Davidson, George S.; Hendrickson, Stacey M. Langfitt

    2008-09-01

    An experiment was conducted comparing the effectiveness of individual versus group electronic brainstorming in order to address difficult, real world challenges. While industrial reliance on electronic communications has become ubiquitous, empirical and theoretical understanding of the bounds of its effectiveness have been limited. Previous research using short-term, laboratory experiments have engaged small groups of students in answering questions irrelevant to an industrial setting. The present experiment extends current findings beyond the laboratory to larger groups of real-world employees addressing organization-relevant challenges over the course of four days. Employees and contractors at a national security laboratory participated, either in a group setting or individually, in an electronic brainstorm to pose solutions to a 'wickedly' difficult problem. The data demonstrate that (for this design) individuals perform at least as well as groups in producing quantity of electronic ideas, regardless of brainstorming duration. However, when judged with respect to quality along three dimensions (originality, feasibility, and effectiveness), the individuals significantly (p<0.05) out-performed the group working together. When idea quality is used as the benchmark of success, these data indicate that work-relevant challenges are better solved by aggregating electronic individual responses, rather than electronically convening a group. This research suggests that industrial reliance upon electronic problem solving groups should be tempered, and large nominal groups might be the more appropriate vehicle for solving wicked corporate issues.

  6. Human factors in network security

    OpenAIRE

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  7. 76 FR 8946 - Security Ratings

    Science.gov (United States)

    2011-02-16

    ... grade securities (such as foreign currency or other cash settled derivative securities). See... investment grade securities (such as foreign currency or other cash settled derivative securities). See... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 200, 229, 230, 232, 239, 240, and 249 [Release No...

  8. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  9. Quantum secure communication models comparison

    Directory of Open Access Journals (Sweden)

    Georgi Petrov Bebrov

    2017-12-01

    Full Text Available The paper concerns the quantum cryptography, more specifically, the quantum secure communication type of schemes. The main focus here is on making a comparison between the distinct secure quantum communication models – quantum secure direct communication and deterministic secure quantum communication, in terms of three parameters: resource efficiency, eavesdropping check efficiency, and security (degree of preserving the confidentiality.

  10. Natural gas and energy security

    International Nuclear Information System (INIS)

    Saga, B.P.

    1996-01-01

    This paper relates to energy security by natural gas supply seen in an International Energy Agency perspective. Topics are: Security of supply, what is it; the role gas on the European energy scene; short term security of supply; long term security of supply; future structural and regulatory developments and possible implications for security of supply. 6 figs

  11. Ultrasound-Guided Out-of-Plane vs. In-Plane Interscalene Catheters: A Randomized, Prospective Study

    OpenAIRE

    Schwenk, Eric S.; Gandhi, Kishor; Baratta, Jaime L.; Torjman, Marc; Epstein, Richard H.; Chung, Jaeyoon; Vaghari, Benjamin A.; Beausang, David; Bojaxhi, Elird; Grady, Bernadette

    2015-01-01

    Background: Continuous interscalene blocks provide excellent analgesia after shoulder surgery. Although the safety of the ultrasound-guided in-plane approach has been touted, technical and patient factors can limit this approach. We developed a caudad-to-cephalad out-of-plane approach and hypothesized that it would decrease pain ratings due to better catheter alignment with the brachial plexus compared to the in-plane technique in a randomized, controlled study. Objectives: To compare an out-...

  12. Securing Land Tenure, Improving Food Security and Reducing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Securing Land Tenure, Improving Food Security and Reducing Poverty in Rural ... land tenure regimes as obstacles to food security, economic integration and ... its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  13. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  14. ARBITRARY INTERACTION OF PLANE SUPERSONIC FLOWS

    Directory of Open Access Journals (Sweden)

    P. V. Bulat

    2015-11-01

    Full Text Available Subject of study.We consider the Riemann problem for parameters at collision of two plane flows at a certain angle. The problem is solved in the exact statement. Most cases of interference, both stationary and non-stationary gas-dynamic discontinuities, followed by supersonic flows can be reduced to the problem of random interaction of two supersonic flows. Depending on the ratio of the parameters in the flows, outgoing discontinuities turn out to be shock waves, or rarefactionwaves. In some cases, there is no solution at all. It is important to know how to find the domain of existence for the relevant decisions, as the type of shock-wave structures in these domains is known in advance. The Riemann problem is used in numerical methods such as the method of Godunov. As a rule, approximate solution is used, known as the Osher solution, but for a number of problems with a high precision required, solution of this problem needs to be in the exact statement. Main results.Domains of existence for solutions with different types of shock-wave structure have been considered. Boundaries of existence for solutions with two outgoing shock waves are analytically defined, as well as with the outgoing shock wave and rarefaction wave. We identify the area of Mach numbers and angles at which the flows interact and there is no solution. Specific flows with two outgoing rarefaction waves are not considered. Practical significance. The results supplement interference theory of stationary gas-dynamic discontinuities and can be used to develop new methods of numerical calculation with extraction of discontinuities.

  15. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo

    2011-01-01

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  16. Preliminary embryological study of the radiological concept of retroperitoneal interfascial planes: what are the interfascial planes?

    Science.gov (United States)

    Ishikawa, Kazuo; Nakao, Shota; Murakami, Gen; Rodríguez-Vázquez, Jose Francisco; Matsuoka, Tetsuya; Nakamuro, Makoto; Shimazu, Takeshi

    2014-12-01

    Recently, the radiological concept of retroperitoneal interfascial planes has been widely accepted to explain the extension of retroperitoneal pathologies. This study aimed to explore embryologically based corroborative evidence, which remains to be elucidated, for this concept. Using serial or semi-serial transverse sections from 29 human fetuses at the 5th-25th week of fetal age, we microscopically observed the development of the retroperitoneal fasciae and other structures in the retroperitoneal connective tissue. A hypothesis for the formation of the interfascial planes was generated from the developmental study and analysis of retroperitoneal fasciae in computed tomography images from 224 patients. Whereas the loose connective tissue was uniformly distributed in the retroperitoneum by the 9th week, the primitive renal and transversalis fasciae appeared at the 10th-12th week, as previous research has noted. By the 23rd week, the renal fascia, transversalis fascia, and primitive adipose tissue of the flank pad emerged. In addition, the primitive lateroconal fascia, which runs parallel to and close to the posterior renal fascia, emerged between the renal fascia and the adipose tissue of the flank pad. Conversely, pre-existing loose connective tissue was sandwiched between the opposing fasciae and was compressed and narrowed by the developing organs and fatty tissues. Through this developmental study, we provided the hypothesis that the compressed loose connective tissue and both opposed fasciae compose the interfascial planes. Analysis of the thickened retroperitoneal fasciae in computed tomography images supported this hypothesis. Further developmental or histological studies are required to verify our hypothesis.

  17. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  18. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  19. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  20. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  1. Models of Quantum Space Time: Quantum Field Planes

    OpenAIRE

    Mack, G.; Schomerus, V.

    1994-01-01

    Quantum field planes furnish a noncommutative differential algebra $\\Omega$ which substitutes for the commutative algebra of functions and forms on a contractible manifold. The data required in their construction come from a quantum field theory. The basic idea is to replace the ground field ${\\bf C}$ of quantum planes by the noncommutative algebra ${\\cal A}$ of observables of the quantum field theory.

  2. Random skew plane partitions with a piecewise periodic back wall

    DEFF Research Database (Denmark)

    Boutillier, Cedric; Mkrtchyan, Sevak; Reshetikhin, Nicolai

    Random skew plane partitions of large size distributed according to an appropriately scaled Schur process develop limit shapes. In the present work we consider the limit of large random skew plane partitions where the inner boundary approaches a piecewise linear curve with non-lattice slopes. Muc...

  3. Positivity properties of phase-plane distribution functions

    NARCIS (Netherlands)

    Janssen, A.J.E.M.

    1984-01-01

    The aim of this paper is to compare the members of Cohen's class of phase-plane distributions with respect to positivity properties. It is known that certain averages (which are in a sense compatible with Heisenberg's uncertainty principle) of the Wigner distribution over the phase-plane yield

  4. Bilinear phase-plane distribution functions and positivity

    NARCIS (Netherlands)

    Janssen, A.J.E.M.

    1985-01-01

    There is a theorem of Wigner that states that phase-plane distribution functions involving the state bilinearly and having correct marginals must take negative values for certain states. The purpose of this paper is to support the statement that these phase-plane distribution functions are for

  5. 16 CFR Figure 1 to Part 1203 - Anatomical Planes

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Anatomical Planes 1 Figure 1 to Part 1203 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION CONSUMER PRODUCT SAFETY ACT REGULATIONS SAFETY STANDARD FOR BICYCLE HELMETS Pt. 1203, Fig. 1 Figure 1 to Part 1203—Anatomical Planes ER10MR98.001 ...

  6. Wood working: planing and moulding in the last frontier

    Science.gov (United States)

    David Nicholls

    2007-01-01

    Planing and moulding is an important step in the value-added manufacture of wood products, and recent advances in Alaska have been noteworthy. Just a few years ago, most planing occurred on simple shop planers, producing lumber for retail sale or for wood working uses such as cabinet stock. Currently there are at least 26 planers and 13 moulders in-production at...

  7. Plane-wave least-squares reverse-time migration

    KAUST Repository

    Dai, Wei

    2013-06-03

    A plane-wave least-squares reverse-time migration (LSRTM) is formulated with a new parameterization, where the migration image of each shot gather is updated separately and an ensemble of prestack images is produced along with common image gathers. The merits of plane-wave prestack LSRTM are the following: (1) plane-wave prestack LSRTM can sometimes offer stable convergence even when the migration velocity has bulk errors of up to 5%; (2) to significantly reduce computation cost, linear phase-shift encoding is applied to hundreds of shot gathers to produce dozens of plane waves. Unlike phase-shift encoding with random time shifts applied to each shot gather, plane-wave encoding can be effectively applied to data with a marine streamer geometry. (3) Plane-wave prestack LSRTM can provide higher-quality images than standard reverse-time migration. Numerical tests on the Marmousi2 model and a marine field data set are performed to illustrate the benefits of plane-wave LSRTM. Empirical results show that LSRTM in the plane-wave domain, compared to standard reversetime migration, produces images efficiently with fewer artifacts and better spatial resolution. Moreover, the prestack image ensemble accommodates more unknowns to makes it more robust than conventional least-squares migration in the presence of migration velocity errors. © 2013 Society of Exploration Geophysicists.

  8. Lower bound plane stress element for modelling 3D structures

    DEFF Research Database (Denmark)

    Herfelt, Morten Andersen; Poulsen, Peter Noe; Hoang, Linh Cao

    2017-01-01

    In-plane action is often the primary load-carrying mechanism of reinforced concrete structures. The plate bending action will be secondary, and the behaviour of the structure can be modelled with a reasonable accuracy using a generalised three-dimensional plane stress element. In this paper...

  9. Crack Propagation in Plane Strain under Variable Amplitude Loading

    DEFF Research Database (Denmark)

    Ricardo, Luiz Carlos Hernandes

    2010-01-01

    . In this paper procedures to determine the crack opening and closure by finite elements analyses in plane strain will be presented. The objective of this paper is also provide a review of retardation models under variable spectrum loading considering plane strain constraint as well as their correlation...

  10. Selection of planes in nuclear magnetic resonance tomography

    International Nuclear Information System (INIS)

    Bonagamba, T.J.

    1986-01-01

    A prototype aiming to obtain images in nuclear magnetic resonance tomography was developed, by adjusting NMR spectrometer in the IFQSC Laboratory. The techniques for selecting planes were analysed by a set of computer codes, which were elaborated from Bloch equation solutions to simulate the spin system behaviour. Images were obtained using planes with thickness inferior to 1 cm. (M.C.K.)

  11. Plane Stratified Flow in a Room Ventilated by Displacement Ventilation

    DEFF Research Database (Denmark)

    Nielsen, Peter Vilhelm; Nickel, J.; Baron, D. J. G.

    2004-01-01

    The air movement in the occupied zone of a room ventilated by displacement ventilation exists as a stratified flow along the floor. This flow can be radial or plane according to the number of wall-mounted diffusers and the room geometry. The paper addresses the situations where plane flow...

  12. Plane-wave least-squares reverse-time migration

    KAUST Repository

    Dai, Wei; Schuster, Gerard T.

    2013-01-01

    . The merits of plane-wave prestack LSRTM are the following: (1) plane-wave prestack LSRTM can sometimes offer stable convergence even when the migration velocity has bulk errors of up to 5%; (2) to significantly reduce computation cost, linear phase

  13. Surface anatomy and anatomical planes in the adult turkish population.

    Science.gov (United States)

    Uzun, C; Atman, E D; Ustuner, E; Mirjalili, S A; Oztuna, D; Esmer, T S

    2016-03-01

    Surface anatomy and anatomical planes are widely used in education and clinical practice. The planes are largely derived from cadaveric studies and their projections on the skin show discrepancies between and within anatomical reference textbooks. In this study, we reassessed the accuracy of common thoracic and abdominopelvic anatomical planes using computed tomography (CT) imaging in the live adult Turkish population. After patients with distorting pathologies had been excluded, CT images of 150 supine patients at the end tidal inspiration were analyzed. Sternal angle, transpyloric, subcostal, supracristal and pubic crest planes and their relationships to anatomical structures were established by dual consensus. The tracheal bifurcation, azygos vein/superior vena cava (SVC) junction and pulmonary bifurcation were usually below the sternal angle while the concavity of the aortic arch was generally within the plane. The tip of the tenth rib, the superior mesenteric artery and the portal vein were usually within the transpyloric plane while the renal hila and the fundus of the gallbladder were below it. The inferior mesenteric artery was below the subcostal plane and the aortic bifurcation was below the supracristal plane in most adults. Projectional surface anatomy is fundamental to medical education and clinical practice. Modern cross-sectional imaging techniques allow large groups of live patients to be examined. Classic textbook information regarding anatomy needs to be reviewed and updated using the data gathered from these recent studies, taking ethnic differences into consideration. © 2015 Wiley Periodicals, Inc.

  14. Plane Transformations in a Complex Setting III: Similarities

    Science.gov (United States)

    Dana-Picard, Thierry

    2009-01-01

    This is the third part of a study of plane transformations described in a complex setting. After the study of homotheties, translations, rotations and reflections, we proceed now to the study of plane similarities, either direct or inverse. Their group theoretical properties are described, and their action on classical geometrical objects is…

  15. Precession of a Spinning Ball Rolling down an Inclined Plane

    Science.gov (United States)

    Cross, Rod

    2015-01-01

    A routine problem in an introductory physics course considers a rectangular block at rest on a plane inclined at angle a to the horizontal. In order for the block not to slide down the incline, the coefficient of sliding friction, µ, must be at least tan a. The situation is similar for the case of a ball rolling down an inclined plane. In order…

  16. Identification of Critical Transmission Limits in Injection Impedance Plane

    DEFF Research Database (Denmark)

    Jóhannsson, Hjörtur; Østergaard, Jacob; Nielsen, Arne Hejde

    2012-01-01

    In this paper, equations are derived that describe the mapping of critical boundaries and characteristic lines from the three dimensionalPQV-surface into the two-dimensional injection impedance plane (load impedance plane for both positive and negativeresistance). The expressions derived....... The situational awareness method will bedescribed in a later paper, where this paper focuses on the derivations of some system characteristics in the injection (or load)impedance plane. The critical lines from the PQV-surface that are mapped into the impedance plane are the ones representing theconditions where...... the partial derivatives of the variables P,Q and V in respect to each other become zero. In addition to the mappingof the critical lines, some characteristic lines are mapped as well. These include the mapping of the lines of constant P,Q,Vand d from the PQV-surface into the impedance plane. All of the mapped...

  17. Phase Plane Analysis Method of Nonlinear Traffic Phenomena

    Directory of Open Access Journals (Sweden)

    Wenhuan Ai

    2015-01-01

    Full Text Available A new phase plane analysis method for analyzing the complex nonlinear traffic phenomena is presented in this paper. This method makes use of variable substitution to transform a traditional traffic flow model into a new model which is suitable for the analysis in phase plane. According to the new model, various traffic phenomena, such as the well-known shock waves, rarefaction waves, and stop-and-go waves, are analyzed in the phase plane. From the phase plane diagrams, we can see the relationship between traffic jams and system instability. So the problem of traffic flow could be converted into that of system stability. The results show that the traffic phenomena described by the new method is consistent with that described by traditional methods. Moreover, the phase plane analysis highlights the unstable traffic phenomena we are chiefly concerned about and describes the variation of density or velocity with time or sections more clearly.

  18. Effect of twinning plane on superconductor magnetic properties

    International Nuclear Information System (INIS)

    Buzdin, A.I.; Kuptsov, D.A.

    1989-01-01

    Effect of twinning planes on pinning of the Abrikosov vortices in superconductors of the second order with the Ginsburg-Landau parameter, κ >> 1, is considered. The modified Ginsburg-Landau functional, where the effect of superconducting properties improvement near the twinning plane is taken into account by adding the additional δ-function component, is used to descibe superconductivity of twinning plane. Force of interaction of a vortex filament and the twinning plane is calculated. It is shown that in case of the twinning plane opaque to electrons, additional attractive force, being analogous to that occurring in the problem on the surface Been-Livingston barrier, affects the vortex filament. The results can explain anisotropy of vortex pinning observed in the periodic twinning structure in high-temperature superconductors

  19. Peptidoglycan architecture can specify division planes in Staphylococcus aureus.

    Science.gov (United States)

    Turner, Robert D; Ratcliffe, Emma C; Wheeler, Richard; Golestanian, Ramin; Hobbs, Jamie K; Foster, Simon J

    2010-06-15

    Division in Staphylococci occurs equatorially and on specific sequentially orthogonal planes in three dimensions, resulting, after incomplete cell separation, in the 'bunch of grapes' cluster organization that defines the genus. The shape of Staphylococci is principally maintained by peptidoglycan. In this study, we use Atomic Force Microscopy (AFM) and fluorescence microscopy with vancomycin labelling to examine purified peptidoglycan architecture and its dynamics in Staphylococcus aureus and correlate these with the cell cycle. At the presumptive septum, cells were found to form a large belt of peptidoglycan in the division plane before the centripetal formation of the septal disc; this often had a 'piecrust' texture. After division, the structures remain as orthogonal ribs, encoding the location of past division planes in the cell wall. We propose that this epigenetic information is used to enable S. aureus to divide in sequentially orthogonal planes, explaining how a spherical organism can maintain division plane localization with fidelity over many generations.

  20. Elements of social security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security is a comparative study of important elements of the social security systems in Denmark (DK), Sweden (S), Finland (FIN), Austria (A), Germany (D), the Netherlands (NL), Great Britain (GB) and Canada (CAN). It should be emphasized that Germany is the former West Germany...... (Alte Länder). This is the 9th and last edition of the publication,covering income levels and rules for social security and personal taxation for 1999. Basis for the projections to 1999 income levels is the 1998 data (in some cases 1999 data)for OECD's Taxing Wages as reported by national experts....