WorldWideScience

Sample records for secure iris design

  1. Cogeneration of Electricity and Potable Water Using The International Reactor Innovative And Secure (IRIS) Design

    International Nuclear Information System (INIS)

    Ingersoll, D.T.; Binder, J.L.; Kostin, V.I.; Panov, Y.K.; Polunichev, V.; Ricotti, M.E.; Conti, D.; Alonso, G.

    2004-01-01

    The worldwide demand for potable water has been steadily growing and is projected to accelerate, driven by a continued population growth and industrialization of emerging countries. This growth is reflected in a recent market survey by the World Resources Institute, which shows a doubling in the installed capacity of seawater desalination plants every ten years. The production of desalinated water is energy intensive, requiring approximately 3-6 kWh/m3 of produced desalted water. At current U.S. water use rates, a dedicated 1000 MW power plant for every one million people would be required to meet our water needs with desalted water. Nuclear energy plants are attractive for large scale desalination application. The thermal energy produced in a nuclear plant can provide both electricity and desalted water without the production of greenhouse gases. A particularly attractive option for nuclear desalination is to couple a desalination plant with an advanced, modular, passively safe reactor design. The use of small-to-medium sized nuclear power plants allows for countries with smaller electrical grid needs and infrastructure to add new electrical and water capacity in more appropriate increments and allows countries to consider siting plants at a broader number of distributed locations. To meet these needs, a modified version of the International Reactor Innovative and Secure (IRIS) nuclear power plant design has been developed for the cogeneration of electricity and desalted water. The modular, passively safe features of IRIS make it especially well adapted for this application. Furthermore, several design features of the IRIS reactor will ensure a safe and reliable source of energy and water even for countries with limited nuclear power experience and infrastructure. The IRIS-D design utilizes low-quality steam extracted from the low-pressure turbine to boil seawater in a multi-effect distillation desalination plant. The desalination plant is based on the horizontal

  2. IRIS (International Reactor Innovative and Secure) - design overview and deployment prospects

    International Nuclear Information System (INIS)

    Carelli, M.D.; Petrovic, B.; Cavlina, N.; Grgic, D.

    2005-01-01

    The International Reactor Innovative and Secure (IRIS) is an advanced, integral, lightwater cooled, pressurized reactor of medium generating capacity (1000 MWt, or about 335 MWe). It has been under development since the turn of the century by an international team - led by Westinghouse - that includes 19 organizations from 10 countries. In year 2002 it has initiated the pre-application review with the U.S. Nuclear Regulatory Commission (NRC), aiming at final design approval around 2010, and deployment in next decade (about 2015), consistent with the prediction of the growing energy supply gap in both developing and developed countries. This paper describes the reactor layout (i.e., its integral design, with the steam generators, pumps, pressurizer and control rod drive mechanisms all included inside the reactor vessel, together with the core, control rods, and neutron reflector/shield) and discusses the unique s afety-by-design T M IRIS philosophy. This approach, by eliminating accidents at the design stage, or decreasing their consequences and probabilities when outright elimination is not possible, provides a very powerful first level of defense in depth. The ''safety-bydesign'' TM allows a significant reduction and simplification of the passive safety systems, which not only improves its safety but simultaneously reduces the overall cost. Moreover, it supports licensing the power plant with reduced off-site emergency response requirements. The modular IRIS - with each module rated at ∼335 MWe - is an ideal size for smaller energy grids as it allows introducing sequentially single modules in regions only requiring a few hundred MWs at a time. IRIS naturally can be also deployed in multiple modules in areas requiring a larger amount of power increasing with time, thus fulfilling the needs of larger, developed countries as well. The performed top-down economic analysis indicates that the cost of generated electricity is competitive with other nuclear and non

  3. Iris reactor conceptual design

    Energy Technology Data Exchange (ETDEWEB)

    Carelli, M.D.; Conway, L.E.; Petrovic, B.; Paramonov, D.V. [Westinghouse Electric Comp., Pittsburgh, PA (United States); Galvin, M.; Todreas, N.E. [Massachusetts Inst. of Tech., Cambridge, MA (United States); Lombardi, C.V.; Maldari, F.; Ricotti, M.E. [Politecnico di Milano, Milan (Italy); Cinotti, L. [Ansaldo SpA, Genoa (Italy)

    2001-07-01

    IRIS (International Reactor Innovative and Secure) is a modular, integral, light water cooled, low-to-medium power (100-350 MWe) reactor which addresses the requirements defined by the US DOE for Generation IV reactors, i.e., proliferation resistance, enhanced safety, improved economics and fuel cycle sustainability. It relies on the proven technology of light water reactors and features innovative engineering, but it does not require new technology development. This paper discusses the current reference IRIS design, which features a 1000 MWt thermal core with proven 5%-enriched uranium oxide fuel and five-year long straight burn fuel cycle, integral reactor vessel housing helical tube steam generators and immersed spool pumps. Other major contributors to the high level of safety and economic attractiveness are the safety by design and optimized maintenance approaches, which allow elimination of some classes of accidents, lower capital cost, long operating cycle, and high capacity factors. (author)

  4. Nuclear desalination option for the international reactor innovative and secure (IRIS) design

    International Nuclear Information System (INIS)

    Ingersoll, D. T.; Binder, J. L.; Conti, D.; Ricotti, M. E.

    2004-01-01

    The worldwide demand for potable water is on the rise. A recent market survey by the World Resources Institute shows a doubling in desalinated water production every ten years from both seawater and brackish water sources. The production of desalinated water is energy intensive, requiring approximately 3-6 kWh per cubic meter of produced desalted water. At current U.S. water use rates, 1 kW of energy capacity per capita (or 1000 MW for every one million people) would be required to meet water needs with desalted water. The choice of the desalination technology determines the form of energy required: electrical energy for reverse osmosis systems, relatively low quality thermal energy for distillation systems, and both electrical and thermal energy for hybrid systems such as pre-heat RO systems. Nuclear energy plants are attractive for large scale desalination application. Nuclear plants can provide both electrical and thermal energy in an integrated, co-generated fashion to produce a spectrum of energy products including electricity, desalted water, process heat, district heating, and potentially hydrogen generation. A particularly attractive option for nuclear desalination is to couple it with an advanced, modular, passively safe reactor design such as the International Reactor Innovative and Secure (IRIS) plant. This allows for countries with smaller electrical grid needs and infrastructure to add new electrical and desalination capacity in smaller increments and at distributed sites. The safety by design nature of the IRIS reactor will ensure a safe and reliable source of energy even for countries with limited nuclear power experience and infrastructure. Two options for the application of the IRIS nuclear power plant to the cogeneration of electricity and desalted water are presented, including a coupling to a reverse osmosis plant and a multistage flash distillation plant. The results from an economic assessment of the two options are also presented.(author)

  5. IRIS Nuclear Power Plant design

    International Nuclear Information System (INIS)

    Carelli, M. D.; Cobian, J.

    2002-01-01

    IRIS(International Reactor Innovative and Secure) is a novel light water reactor with a modular, integral primary system configuration. This concept, initially developed in response to the first NERI solicitation, is now being pursued by an international consortium of 20 participants from seven countries. IRIS is designed to satisfy the four key requirements for Generation IV systems: enhanced safety, improved economics, proliferation resistance and waste minimization. Its main features are: small-to-medium power (100-335 MWe/module); long life core 5 to 10 years) without shuffling or refueling; optimized maintenance with repair shutdown intervals of a least four years; simplified compact design with the primary vessel housing steam generators, pressurizer and pumps; safety by design where accidents are positively eliminated by design rather than engineering to cope with their consequences; loss of coolant accidents of any size and loss of low accidents are eliminated as major safety concerns; estimated power generation total cost is projected to be competitive with other power options. IRIS is one of four new reactor designs currently under NRC review. Projected schedule calls for design certification by 2008 and being ready for deployment by 2001 or later. This rather short schedule is made possible by the fact that IRIS is based on proven light water technology and new technology development is not required. (Author)

  6. International Reactor Innovative and Secure (IRIS) summary

    International Nuclear Information System (INIS)

    Carelli, Mario D.

    2001-01-01

    The IRIS (International Reactor Innovative and Secure) reactor is described in the first part of the presentation. IRIS is a light water cooled reactor with an integral configuration, where steam generators, pumps and pressurizer are inside the reactor vessel. Partially funded by the DOE NERI program, IRIS is being developed by an international consortium of 16 organizations from seven countries. A key IRIS characteristic is its 'safety by design' approach which strives to eliminate, by design, as many accidents as possible rather than coping with their consequences. Initial returns are very positive; out of the eight Class IV accidents considered in the AP600 only one remains as a Class IV in IRIS, and at much reduced probability. Small-to-medium LOCAs have minimal consequences as the core remains safely under water for days, without the need for safety injection or water makeup. In spite of its novelty IRIS is firmly grounded on proven LWR technology and therefore a prototype is not needed to assure design certification. Rather, very extensive scaled tests will be performed to investigate the performance of in-vessel components such as steam generators and pumps, both individually and as interactive systems. Accident sequences will also be simulated and tested to prove IRIS safety by design claims. The first core fuel is less than 5% enriched and the fuel assembly is very similar to existing PWR assemblies, so there is no licensing challenge regarding the fuel. Because of the safety by design approach, yielding simplifications In design and accident management (e.g., IRIS does not have an emergency core cooling system), some accident scenarios are eliminated and others have lesser consequences. Thus, simplification and streamlining of the regulatory process might be possible. Risk informed regulation will be coupled with safety by design to show lower accident and damage probabilities. This could lead to a relaxation of siting regulatory requirements. It is

  7. IRIS design overview and status update

    International Nuclear Information System (INIS)

    Carelli, M.D.; Petrovic, B.; Conway, L.E.; Oriani, L.; Kling, C.L.; Miller, K.; Lombardi, C.V.; Ricotti, M.E.; Barroso, A.C.O.; Collado, J.M.; Cinotti, L.; Storai, S.; Berra, F.; Todreas, N.E.; Ninokata, H.; Cavlina, N.; Grgic, D.; Oriolo, F.; Moraes, M.M.; Frederico, C.; Henning, F.; Griffith, W.; Love, J.; Ingersoll, D.T.; Wood, R.; Alonso, G.; Kodochigov, N.; Polunichev, V.; Augutis, J.; Alzbutas, R.; Boroughs, R.D.; Naviglio, A.; Panella, B.

    2005-01-01

    The International Reactor Innovative and Secure (IRIS) is an advanced, integral, light-water cooled reactor of medium generating capacity (1000 MWt, or ∼335 MWe), geared at near term deployment (2012- 2015). It has been under development since the turn of the century by an international consortium--led by Westinghouse--that includes 21 organizations from 10 countries, and it is currently in the pre-application licensing process with the U.S. Nuclear Regulatory Commission (NRC). This paper describes its integral design (i.e., steam generators, pumps, pressurizer and control rod drive mechanisms are all included inside the reactor vessel, together with the core, control rods, and neutron reflector/shield) and discusses the unique ('safety-by-design') TM IRIS philosophy. This approach, by eliminating accidents at the design stage, or decreasing their consequences and probabilities when outright elimination is not possible, provides a very powerful first level of defense in depth. The ('safety by- design') TM allows a significant reduction and simplification of the passive safety systems, which not only improves safety but simultaneously reduces the overall cost. Moreover, it supports licensing the power plant without the need for off-site emergency response planning--an objective which is part of the pre-application with NRC and is also pursued within an international research project coordinated by the International Atomic Energy Agency (IAEA). This would allow IRIS to be treated as any other industrial facility, located closer to population centers, and enable its effective dual-purpose use for electricity production and co-generation (district heating, desalination, industrial steam). The modular IRIS--with each module rated at ∼335 MWe--is an ideal size for developing countries as it allows to easily introducing single modules in regions only requiring a few hundred MWs, or a moderate amount of power on limited electric grids. IRIS can be also deployed in

  8. IRIS International Reactor Innovative and Secure Final Technical Progress Report

    International Nuclear Information System (INIS)

    Carelli, M.D.

    2003-01-01

    OAK-B135 This NERI project, originally started as the Secure Transportable Autonomous Light Water Reactor (STAR-LW) and currently known as the International Reactor Innovative and Secure (IRIS) project, had the objective of investigating a novel type of water-cooled reactor to satisfy the Generation IV goals: fuel cycle sustainability, enhanced reliability and safety, and improved economics. The research objectives over the three-year (1999-2002) program were as follows: First year: Assess various design alternatives and establish main characteristics of a point design; Second year: Perform feasibility and engineering assessment of the selected design solutions; Third year: Complete reactor design and performance evaluation, including cost assessment These objectives were fully attained and actually they served to launch IRIS as a full fledged project for eventual commercial deployment. The program did not terminate in 2002 at the end of the NERI program, and has just entered in its fifth year. This has been made possible by the IRIS project participants which have grown from the original four member, two-countries team to the current twenty members, nine countries consortium. All the consortium members work under their own funding and it is estimated that the value of their in-kind contributions over the life of the project has been of the order of $30M. Currently, approximately 100 people worldwide are involved in the project. A very important constituency of the IRIS project is the academia: 7 universities from four countries are members of the consortium and five more US universities are associated via parallel NERI programs. To date, 97 students have worked or are working on IRIS; 59 IRIS-related graduate theses have been prepared or are in preparation, and 41 of these students have already graduated with M.S. (33) or Ph.D. (8) degrees. This ''final'' report (final only as far as the NERI program is concerned) summarizes the work performed in the first four

  9. Embedded Design Research of Iris Information Acquisition System

    Directory of Open Access Journals (Sweden)

    Huiyan Xu

    2014-09-01

    Full Text Available In view of the limitation of traditional identification, it is easy to lose and copy keys, cards or ID cards, and it is easy to forget the password, so we designed an embedded application system based on the iris identification technology, which can realize the functions of gathering, inputting, and registering the iris information and identification. The hardware circuit was designed by using advanced RISC machines (ARM embedded microprocessor as the core. The iris sensor was used to gather the iris information, and the development of software was accomplished with the embedded OS Windows CE. The system can be used on the company entrance guard system, customs security of airport and criminal identification.

  10. IRIS

    International Nuclear Information System (INIS)

    Malfaro, W.; Zygmont, A.

    1991-01-01

    This paper discusses development of ISOLATION RESET INFORMATION SYSTEM (IRIS), an expert system to aid nuclear plant operators during plant transients known as automatic containment isolations. IRIS is implemented using the Personal Consultant Plus expert system shell, taking advantage of the dBase III Plus interface. The design of IRIS is discussed as well as the system's current state of development. The use of expert systems for training operators is discussed. The importance of gaining regulatory acceptance of expert systems is presented. This issue will ultimately determine the extent of expert system use in nuclear applications

  11. Iris

    Science.gov (United States)

    ... of color granules in the iris determines the iris color (pigment). The amount of pigment is often related to a person's genes, skin type, and hair color. Inflammation of the iris is called iritis. Rarely, tumors can form in ...

  12. Security enhanced BioEncoding for protecting iris codes

    Science.gov (United States)

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  13. Maintenance Cycle Extension in the IRIS Advanced Light Water Reactor Plant Design

    International Nuclear Information System (INIS)

    Galvin, Mark R.; Todreas, Neil E.; Conway, Larry E.

    2003-01-01

    New nuclear power generation in the United States will be realized only if the economic performance can be made competitive with other methods of electrical power generation. The economic performance of a nuclear power plant can be significantly improved by increasing the time spent on-line generating electricity relative to the time spent off-line conducting maintenance and refueling. Maintenance includes planned actions (surveillances) and unplanned actions (corrective maintenance) to respond to component degradation or failure. A methodology is described that can be used to resolve, in the design phase, maintenance-related operating cycle length barriers. A primary goal was to demonstrate the applicability and utility of the methodology in the context of the International Reactor, Innovative and Secure (IRIS) design. IRIS is an advanced light water nuclear power plant that is being designed to maximize this on-line generating time by increasing the operating cycle length. This is consequently a maintenance strategy paper using the IRIS plant as the example.Potential IRIS operating cycle length maintenance-related barriers, determined by modification of an earlier operating pressurized water reactor (PWR) plant cycle length analysis to account for differences between the design of IRIS and this operating PWR, are presented. The proposed methodology to resolve these maintenance-related barriers by the design process is described. The results of applying the methodology to two potential IRIS cycle length barriers, relief valve testing and emergency heat removal system testing, are presented

  14. Iris biometric system design using multispectral imaging

    Science.gov (United States)

    Widhianto, Benedictus Yohanes Bagus Y. B.; Nasution, Aulia M. T.

    2016-11-01

    An identity recognition system is a vital component that cannot be separated from life, iris biometric is one of the biometric that has the best accuracy reaching 99%. Usually, iris biometric systems use infrared spectrum lighting to reduce discomfort caused by radiation when the eye is given direct light, while the eumelamin that is forming the iris has the most flourescent radiation when given a spectrum of visible light. This research will be conducted by detecting iris wavelengths of 850 nm, 560 nm, and 590 nm, where the detection algorithm will be using Daugman algorithm by using a Gabor wavelet extraction feature, and matching feature using a Hamming distance. Results generated will be analyzed to identify how much differences there are, and to improve the accuracy of the multispectral biometric system and as a detector of the authenticity of the iris. The results obtained from the analysis of wavelengths 850 nm, 560 nm, and 590 nm respectively has an accuracy of 99,35 , 97,5 , 64,5 with a matching score of 0,26 , 0,23 , 0,37.

  15. Secure and Robust Iris Recognition Using Random Projections and Sparse Representations.

    Science.gov (United States)

    Pillai, Jaishanker K; Patel, Vishal M; Chellappa, Rama; Ratha, Nalini K

    2011-09-01

    Noncontact biometrics such as face and iris have additional benefits over contact-based biometrics such as fingerprint and hand geometry. However, three important challenges need to be addressed in a noncontact biometrics-based authentication system: ability to handle unconstrained acquisition, robust and accurate matching, and privacy enhancement without compromising security. In this paper, we propose a unified framework based on random projections and sparse representations, that can simultaneously address all three issues mentioned above in relation to iris biometrics. Our proposed quality measure can handle segmentation errors and a wide variety of possible artifacts during iris acquisition. We demonstrate how the proposed approach can be easily extended to handle alignment variations and recognition from iris videos, resulting in a robust and accurate system. The proposed approach includes enhancements to privacy and security by providing ways to create cancelable iris templates. Results on public data sets show significant benefits of the proposed approach.

  16. Modeling IrisCode and its variants as convex polyhedral cones and its security implications.

    Science.gov (United States)

    Kong, Adams Wai-Kin

    2013-03-01

    IrisCode, developed by Daugman, in 1993, is the most influential iris recognition algorithm. A thorough understanding of IrisCode is essential, because over 100 million persons have been enrolled by this algorithm and many biometric personal identification and template protection methods have been developed based on IrisCode. This paper indicates that a template produced by IrisCode or its variants is a convex polyhedral cone in a hyperspace. Its central ray, being a rough representation of the original biometric signal, can be computed by a simple algorithm, which can often be implemented in one Matlab command line. The central ray is an expected ray and also an optimal ray of an objective function on a group of distributions. This algorithm is derived from geometric properties of a convex polyhedral cone but does not rely on any prior knowledge (e.g., iris images). The experimental results show that biometric templates, including iris and palmprint templates, produced by different recognition methods can be matched through the central rays in their convex polyhedral cones and that templates protected by a method extended from IrisCode can be broken into. These experimental results indicate that, without a thorough security analysis, convex polyhedral cone templates cannot be assumed secure. Additionally, the simplicity of the algorithm implies that even junior hackers without knowledge of advanced image processing and biometric databases can still break into protected templates and reveal relationships among templates produced by different recognition methods.

  17. Design Principles for Security

    National Research Council Canada - National Science Library

    Benzel, Terry V; Irvine, Cynthia E; Levin, Timothy E; Bhaskara, Ganesha; Nguyen, Thuy D; Clark, Paul C

    2005-01-01

    As a prelude to the clean-slate design for the SecureCore project, the fundamental security principles from more than four decades of research and development in information security technology were reviewed...

  18. Designing security holograms

    Science.gov (United States)

    James, Randy; Long, Michael; Newcomb, Diana

    2004-06-01

    Over the years, holograms have evolved from purely decorative images to bona fide security devices. During this evolution, highly secure technologies have been developed specifically for product and document protection. To maximize the security potential of these hologram technologies requires a holistic approach. A hologram alone is not enough. To be effective it must be part of a security program and that security program needs to inform the design and development of the actual hologram. In the most elementary case the security program can be as simple as applying a tamper evident label for a one-day event. In a complex implementation it would include multi-level technologies and corresponding verification methods. A holistic approach is accomplished with good planning and articulation of the problem to be solved, and then meeting the defined security objectives. Excellent communication among all the stakeholders in a particular project is critical to the success of the project. The results of this dialogue inform the design of the security hologram.

  19. Use of PRA techniques to optimize the design of the IRIS nuclear power plant

    International Nuclear Information System (INIS)

    Muhlheim, M.D.; Cletcher, J.W. II

    2003-01-01

    True design optimization of a plants inherent safety and performance characteristics results when a probabilistic risk assessment (PRA) is integrated with the plant-level design process. This is the approach being used throughout the design of the International Reactor Innovative and Secure (IRIS) nuclear power plant to maximize safety. A risk-based design optimization tool employing a 'one-button' architecture is being developed by the Oak Ridge National Laboratory to evaluate design changes; new modeling approaches, methods, or theories modeling uncertainties and completeness; physical assumptions; and data changes on component, cabinet, train, and system bases. Unlike current PRAs, the one-button architecture allows components, modules, and data to be interchanged at will with the probabilistic effect immediately apparent. Because all of the current and previous design, and data sets are available via the one-button architecture, the safety ramifications of design options are evaluated, feedback on design alternatives is immediate, and true optimization and understanding can be achieved. Thus, for the first time, PRA analysts and designers can easily determine the probabilistic implications of different design configurations and operating conditions in various combinations for the entire range of initiating events. The power of the one-button architecture becomes evident by the number of design alternatives that can be evaluated C11 component choices yielded 160 design alternatives. Surprisingly, the lessons learned can be counter-intuitive and significant. For example, one of the alternative designs for IRIS evaluated via this architecture revealed that because of common-cause failure probabilities, using the most reliable components actually decreased systems' reliability. (author)

  20. The Infrared Imaging Spectrograph (IRIS) for TMT: multi-tiered wavefront measurements and novel mechanical design

    Science.gov (United States)

    Dunn, Jennifer; Andersen, David; Chapin, Edward; Reshetov, Vlad; Wierzbicki, Ramunas; Herriot, Glen; Chalmer, Dean; Isbrucker, Victor; Larkin, James E.; Moore, Anna M.; Suzuki, Ryuji

    2016-08-01

    The InfraRed Imaging Spectrograph (IRIS) will be the first light adaptive optics instrument on the Thirty Meter Telescope (TMT). IRIS is being built by a collaboration between Caltech, the University of California, NAOJ and NRC Herzberg. In this paper we present novel aspects of the Support Structure, Rotator and On-Instrument Wavefront Sensor systems being developed at NRC Herzberg. IRIS is suspended from the bottom port of the Narrow Field Infrared Adaptive Optics System (NFIRAOS), and provides its own image de-rotation to compensate for sidereal rotation of the focal plane. This arrangement is a challenge because NFIRAOS is designed to host two other science instruments, which imposes strict mass requirements on IRIS. As the mechanical design of all elements has progressed, we have been tasked with keeping the instrument mass under seven tonnes. This requirement has resulted in a mass reduction of 30 percent for the support structure and rotator compared to the most recent IRIS designs. To accomplish this goal, while still being able to withstand earthquakes, we developed a new design with composite materials. As IRIS is a client instrument of NFIRAOS, it benefits from NFIRAOS's superior AO correction. IRIS plays an important role in providing this correction by sensing low-order aberrations with three On-Instrument Wavefront Sensors (OIWFS). The OIWFS consists of three independently positioned natural guide star wavefront sensor probe arms that patrol a 2-arcminute field of view. We expect tip-tilt measurements from faint stars within the IRIS imager focal plane will further stabilize the delivered image quality. We describe how the use of On-Detector Guide Windows (ODGWs) in the IRIS imaging detector can be incorporated into the AO correction. In this paper, we present our strategies for acquiring and tracking sources with this complex AO system, and for mitigating and measuring the various potential sources of image blur and misalignment due to properties of

  1. Iris reactor development

    Energy Technology Data Exchange (ETDEWEB)

    Paramonov, D.V.; Carelli, M.D. [Westinghouse Electric Corp., Baltimore, MD (United States); Miller, K. [BNFL, Inc., (United Kingdom); Lombardi, C.V.; Ricotti, M.E. [Polytechnic of Milan, Polimi (Italy); Todreas, N.E. [Masachussets Institute of Technology, MIT (United States); Greenspan, E. [University of California at Berkeley, UCB (United States); Yamamoto, K. [JAPC Japan Atomic Power Co., Tokyo (Japan); Nagano, A. [Mitsubishi Heavy Industries Ltd., Tokyo (Japan); Ninokata, H. [Tokyo Institut of Technology, TIT (Japan); Robertson, J. [Westinghouse and bechtel (United States); Oriolo, F. [Pisa Univ. (Italy)

    2001-07-01

    The development progress of the IRIS (International Reactor Innovative and Secure) nuclear power system is presented. IRIS is currently being developed by an international consortium of industry, laboratory, university and utility establishments, led by Westinghouse. It is aimed at achieving the four major objectives of the Generation IV nuclear systems, i.e., proliferation resistance, enhanced safety, economic competitiveness and reduced waste. The project first year activities, which are summarized here, were focused on core neutronics, in-vessel configuration, steam generator and containment design, safety approach and economic performance. Details of these studies are provided in parallel papers in these proceedings. (author)

  2. Experiencing Security in Interaction Design

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne

    2011-01-01

    Security is experienced differently in different contexts. This paper argues that in everyday situations, users base their security decisions on a mix of prior experiences. When approaching security and interaction design from an experience approach, tools that help bring out such relevant...... experiences for design are needed. This paper reports on how Prompted exploration workshops and Acting out security were developed to target such experiences when iteratively designing a mobile digital signature solution in a participatory design process. We discuss how these tools helped the design process...... and illustrate how the tangibility of such tools matters. We further demonstrate how the approach grants access to non-trivial insights into people's security experience. We point out how the specific context is essential for exploring the space between experience and expectations, and we illustrate how people...

  3. IRIS Simplified LERF Model

    International Nuclear Information System (INIS)

    Maioli, A.; Finnicum, D.J.; Kumagai, Y.

    2004-01-01

    Westinghouse is currently conducting the pre-application licensing of the International Reactor Innovative and Secure (IRIS). One of the key aspects of the IRIS design is its safety-by-designTM philosophy and within this framework the PRA is being used as an integral part of the design process. The most ambitious risk-related goal for IRIS is to reduce the Emergency Planning Zone (EPZ) to within the exclusion area by demonstrating that the off-site doses are consistent with the US Protective Action Guidelines (PAGs) for initiation of emergency response so that the required protective actions would be limited to the exclusion area. As a first step, a model has been developed to provide a first order approximation of the Large Early Release Frequency (LERF) as a surrogate predictor of the off-site doses. A key-aspect of the LERF model development is the characterization of the possible paths of release. Four main categories have been historically pointed out: (1) Core Damage (CD ) sequences with containment bypass, (2) CD sequences with containment isolation failure, (3) CD sequences with containment failure at low pressure and (4) CD sequences with containment failure at high pressure. They have been reevaluated to account for the IRIS design features

  4. Design-Efficiency in Security

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    In this document, we present our applied results on balancing security and performance using a running example, which is based on sensor networks. These results are forming a basis for a new approach to balance security and performance, and therefore provide design-­efficiency of key updates. We...

  5. AP1000 Design for Security

    International Nuclear Information System (INIS)

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-01-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  6. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  7. The SPES3 Experimental Facility Design for the IRIS Reactor Simulation

    Directory of Open Access Journals (Sweden)

    Mario Carelli

    2009-01-01

    Full Text Available IRIS is an advanced integral pressurized water reactor, developed by an international consortium led by Westinghouse. The licensing process requires the execution of integral and separate effect tests on a properly scaled reactor simulator for reactor concept, safety system verification, and code assessment. Within the framework of an Italian R&D program on Nuclear Fission, managed by ENEA and supported by the Ministry of Economic Development, the SPES3 facility is under design and will be built and operated at SIET laboratories. SPES3 simulates the primary, secondary, and containment systems of IRIS with 1 : 100 volume scale, full elevation, and prototypical thermal-hydraulic conditions. The simulation of the facility with the RELAP5 code and the execution of the tests will provide a reliable tool for data extrapolation and safety analyses of the final IRIS design. This paper summarises the main design steps of the SPES3 integral test facility, underlying choices and phases that lead to the final design.

  8. Iris Recognition Using Wavelet

    Directory of Open Access Journals (Sweden)

    Khaliq Masood

    2013-08-01

    Full Text Available Biometric systems are getting more attention in the present era. Iris recognition is one of the most secure and authentic among the other biometrics and this field demands more authentic, reliable and fast algorithms to implement these biometric systems in real time. In this paper, an efficient localization technique is presented to identify pupil and iris boundaries using histogram of the iris image. Two small portions of iris have been used for polar transformation to reduce computational time and to increase the efficiency of the system. Wavelet transform is used for feature vector generation. Rotation of iris is compensated without shifts in the iris code. System is tested on Multimedia University Iris Database and results show that proposed system has encouraging performance.

  9. The role of small and medium reactors in the energy security of a country, IRIS example

    International Nuclear Information System (INIS)

    Cavlina, N.

    2010-01-01

    Nuclear options for electricity generations are assessed in this paper. Probabilistic (stochastic) method is used for economic comparison of nuclear power plants, wind plants and natural gas fired plants. Optimal nuclear power plant size is also discussed. IRIS is presented as a representative of small and medium reactors

  10. Extending the imaging volume for biometric iris recognition.

    Science.gov (United States)

    Narayanswamy, Ramkumar; Johnson, Gregory E; Silveira, Paulo E X; Wach, Hans B

    2005-02-10

    The use of the human iris as a biometric has recently attracted significant interest in the area of security applications. The need to capture an iris without active user cooperation places demands on the optical system. Unlike a traditional optical design, in which a large imaging volume is traded off for diminished imaging resolution and capacity for collecting light, Wavefront Coded imaging is a computational imaging technology capable of expanding the imaging volume while maintaining an accurate and robust iris identification capability. We apply Wavefront Coded imaging to extend the imaging volume of the iris recognition application.

  11. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  12. Numerical design of an rf-coupling Iris

    International Nuclear Information System (INIS)

    Hanaki, H.

    1991-07-01

    For an rf coupler of an rf system in high-quality transmission an analytical method may be applied to treat the design problem, if a coupling hole between cavities or waveguides is small enough. However, in most cases of accelerator engineering the dimensions of the coupling slots are not so small compared with the size of a cavity and a waveguide. Numerical design of rf coupling slots for a few cases is tried basically according to Henke's method using an equivalent circuit to treat the matching of microwave components, but taking account of beam loading expressed by the coupling coefficient β. The MAFIA code has been applied for the design. (R.P.) 5 refs., 10 figs., 3 tabs

  13. Design of Computer Network Security

    OpenAIRE

    Ališauskaitė, Vaida

    2008-01-01

    Magistriniame darbe išanalizuoti įvairios paskirties saugos modeliai. Pagal gautus rezultatus sudarytas apibendrintas informacijos saugos praradimo riziką įvertitnantis kompiuterių tinklų saugos modelis. Sukurta grėsmę keliančius įvykius aptinkanti sistema. The master's work analysis different types of security models. It also proposes a new computer network security reference model, which includes risk management process. A suspicious network events detection system is designed to make ne...

  14. Iris and periocular biometrics

    CERN Document Server

    Rathgeb, Christian

    2017-01-01

    This book provides an overview of scientific fundamentals and principles of iris and periocular biometric recognition. It covers: an introduction to iris and periocular recognition; a selective overview of issues and challenges; soft biometric classification; security aspects; privacy protection and forensics; and future trends.

  15. Security patterns in practice designing secure architectures using software patterns

    CERN Document Server

    Fernandez-Buglioni, Eduardo

    2013-01-01

    Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides

  16. Simplified safety and containment systems for the iris reactor

    International Nuclear Information System (INIS)

    Conway, L.E.; Lombardi, C.; Ricotti, M.; Oriani, L.

    2001-01-01

    The IRIS (International Reactor Innovative and Secure) is a 100 - 300 MW modular type pressurized water reactor supported by the U.S. DOE NERI Program. IRIS features a long-life core to provide proliferation resistance and to reduce the volume of spent fuel, as well as reduce maintenance requirements. IRIS utilizes an integral reactor vessel that contains all major primary system components. This integral reactor vessel makes it possible to reduce containment size; making the IRIS more cost competitive. IRIS is being designed to enhance reactor safety, and therefore a key aspect of the IRIS program is the development of the safety and containment systems. These systems are being designed to maximize containment integrity, prevent core uncover following postulated accidents, minimize the probability and consequences of severe accidents, and provide a significant simplification over current safety system designs. The design of the IRIS containment and safety systems has been identified and preliminary analyses have been completed. The IRIS safety concept employs some unique features that minimize the consequences of postulated design basis events. This paper will provide a description of the containment design and safety systems, and will summarize the analysis results. (author)

  17. [Artificial iris].

    Science.gov (United States)

    Szurman, P; Jaissle, G

    2011-08-01

    The flexible iris prosthesis according to Koch with a customized iris design serves for anterior segment reconstruction in patients with partial or complete aniridia. It is designed for implantation in the ciliary sulcus and is recommended only for pseudophakic or aphakic eyes. The multilayered implant consists of a core of a silicone matrix with incorporated color pigment coated with another layer of medical grade silicone. As a design variant the implant is available with or without an additionally embedded tissue layer. Without tissue the implant is more flexible, can be easily folded and perfectly adapts to the anatomical course of the sulcus. In contrast, implants with tissue show a greater rigidity and provide a better grip for sutures. This article describes various techniques for implantation of partial and full prostheses and gives instructions for calculating the implant size. Full prostheses can be combined with other reconstructive measures, such as sutured intraocular lenses and are particularly helpful in silicone oil surgery by avoiding endothelial contact. With careful consideration of the indications and application the flexible iris prosthesis is a valuable extension of the spectrum of reconstructive anterior segment surgery.

  18. IRIS Final Technical Progress Report

    Energy Technology Data Exchange (ETDEWEB)

    M. D. Carelli

    2003-11-03

    OAK-B135 This NERI project, originally started as the Secure Transportable Autonomous Light Water Reactor (STAR-LW) and currently known as the International Reactor Innovative and Secure (IRIS) project, had the objective of investigating a novel type of water-cooled reactor to satisfy the Generation IV goals: fuel cycle sustainability, enhanced reliability and safety, and improved economics. The research objectives over the three-year (1999-2002) program were as follows: First year: Assess various design alternatives and establish main characteristics of a point design; Second year: Perform feasibility and engineering assessment of the selected design solutions; Third year: Complete reactor design and performance evaluation, including cost assessment These objectives were fully attained and actually they served to launch IRIS as a full fledged project for eventual commercial deployment. The program did not terminate in 2002 at the end of the NERI program, and has just entered in its fifth year. This has been made possible by the IRIS project participants which have grown from the original four member, two-countries team to the current twenty members, nine countries consortium. All the consortium members work under their own funding and it is estimated that the value of their in-kind contributions over the life of the project has been of the order of $30M. Currently, approximately 100 people worldwide are involved in the project. A very important constituency of the IRIS project is the academia: 7 universities from four countries are members of the consortium and five more US universities are associated via parallel NERI programs. To date, 97 students have worked or are working on IRIS; 59 IRIS-related graduate theses have been prepared or are in preparation, and 41 of these students have already graduated with M.S. (33) or Ph.D. (8) degrees. This ''final'' report (final only as far as the NERI program is concerned) summarizes the work performed

  19. Flowdown of the TMT astrometry error budget(s) to the IRIS design

    Science.gov (United States)

    Schöck, Matthias; Andersen, David; Rogers, John; Ellerbroek, Brent; Chisholm, Eric; Dunn, Jennifer; Herriot, Glen; Larkin, James; Moore, Anna; Suzuki, Ryuji; Wincentsen, James; Wright, Shelley

    2016-08-01

    TMT has defined the accuracy to be achieved for both absolute and differential astrometry in its top-level requirements documents. Because of the complexities of different types of astrometric observations, these requirements cannot be used to specify system design parameters directly. The TMT astrometry working group therefore developed detailed astrometry error budgets for a variety of science cases. These error budgets detail how astrometric errors propagate through the calibration, observing and data reduction processes. The budgets need to be condensed into sets of specific requirements that can be used by each subsystem team for design purposes. We show how this flowdown from error budgets to design requirements is achieved for the case of TMT's first-light Infrared Imaging Spectrometer (IRIS) instrument.

  20. Design and performance evaluation of a high resolution IRI-microPET preclinical scanner

    Energy Technology Data Exchange (ETDEWEB)

    Islami rad, S.Z., E-mail: szislami@yahoo.com [Department of Physic, Faculty of Science, University of Qom, Qom (Iran, Islamic Republic of); Peyvandi, R. Gholipour; Lehdarboni, M. Askari; Ghafari, A.A. [Instrumentation Research Group, Nuclear Science and Technology Research Institute, Tehran (Iran, Islamic Republic of)

    2015-05-01

    PET for small animal, IRI-microPET, was designed and built at the NSTRI. The scanner is made of four detectors positioned on a rotating gantry at a distance 50 mm from the center. Each detector consists of a 10×10 crystal matrix of 2×2×10 mm{sup 3} directly coupled to a PS-PMT. A position encoding circuit for specific PS-PMT has been designed, built and tested with a PD-MFS-2MS/s-8/14 data acquisition board. After implementing reconstruction algorithms (FBP, MLEM and SART) on sinograms, images quality and system performance were evaluated by energy resolution, timing resolution, spatial resolution, scatter fraction, sensitivity, RMS contrast and SNR parameters. The energy spectra were obtained for the crystals with an energy window of 300–700 keV. The energy resolution in 511 keV averaged over all modules, detectors, and crystals, was 23.5%. A timing resolution of 2.4 ns FWHM obtained by coincidence timing spectrum was measured with crystal LYSO. The radial and tangential resolutions for {sup 18}F (1.15-mm inner diameter) at the center of the field of view were 1.81 mm and 1.90 mm, respectively. At a radial offset of 5 mm, the FWHM values were 1.96 and 2.06 mm. The system scatter fraction was 7.1% for the mouse phantom. The sensitivity was measured for different energy windows, leading to a sensitivity of 1.74% at the center of FOV. Also, images quality was evaluated by RMS contrast and SNR factors, and the results show that the reconstructed images by MLEM algorithm have the best RMS contrast, and SNR. The IRI-microPET presents high image resolution, low scatter fraction values and improved SNR for animal studies.

  1. Design and security of small wireless network

    OpenAIRE

    Žižka, Ladislav

    2012-01-01

    This thesis deals with design and security of small wireless network. Main goal of the thesis is home network design and choice of optimal solution of wireless security. The thesis has four parts. The first part describes computer networks and network components in theory. Next part deals with network design, choosing of network components and setting of them. It also describes some functionalities of alternative firmware DD-WRT. The third part presents common wireless security and network an...

  2. DEMAID - A DESIGN MANAGER'S AID FOR INTELLIGENT DECOMPOSITION (SGI IRIS VERSION)

    Science.gov (United States)

    Rogers, J. L.

    1994-01-01

    Many engineering systems are large and multi-disciplinary. Before the design of new complex systems such as large space platforms can begin, the possible interactions among subsystems and their parts must be determined. Once this is completed the proposed system can be decomposed to identify its hierarchical structure. DeMAID (A Design Manager's Aid for Intelligent Decomposition) is a knowledge-based system for ordering the sequence of modules and identifying a possible multilevel structure for the design problem. DeMAID displays the modules in an N x N matrix format (called a design structure matrix) where a module is any process that requires input and generates an output. (Modules which generate an output but do not require an input, such as an initialization process, are also acceptable.) Although DeMAID requires an investment of time to generate and refine the list of modules for input, it could save a considerable amount of money and time in the total design process, particularly in new design problems where the ordering of the modules has not been defined. The decomposition of a complex design system into subsystems requires the judgement of the design manager. DeMAID reorders and groups the modules based on the links (interactions) among the modules, helping the design manager make decomposition decisions early in the design cycle. The modules are grouped into circuits (the subsystems) and displayed in an N x N matrix format. Feedback links, which indicate an iterative process, are minimized and only occur within a subsystem. Since there are no feedback links among the circuits, the circuits can be displayed in a multilevel format. Thus, a large amount of information is reduced to one or two displays which are stored for later retrieval and modification. The design manager and leaders of the design teams then have a visual display of the design problem and the intricate interactions among the different modules. The design manager could save a substantial

  3. The Economics of IRIS

    International Nuclear Information System (INIS)

    Miller, K.; Paramonov, D.

    2002-01-01

    IRIS (International Reactor Innovative and Secure) is a small to medium advanced light water cooled modular reactor being developed by an international consortium led by Westinghouse/BNFL. This reactor design is specifically aimed at utilities looking to install new (or replacement) nuclear capacity to match market demands, or at developing countries for their distributed power needs. To determine the optimal configuration for IRIS, analysis was undertaken to establish Generation Costs ($/MWh) and Internal Rate of Return (IRR %) to the Utility at alternative power ratings. This was then combined with global market projections for electricity demand out to 2030, segmented into key geographical regions. Finally this information is brought together to form insights, conclusions and recommendations regarding the optimal design. The resultant analysis reveals a single module sized at 335 MWe, with a construction period of 3 years and a 60-year plant life. Individual modules can be installed in a staggered fashion (3 equivalent to 1005 MWe) or built in pairs (2 sets of twin units' equivalent to 1340 MWe). Uncertainty in Market Clearing Price for electricity, Annual Operating Costs and Construction Costs primarily influence lifetime Net Present Values (NPV) and hence IRR % for Utilities. Generation Costs in addition are also influenced by Fuel Costs, Plant Output, Plant Availability and Plant Capacity Factor. Therefore for a site based on 3 single modules, located in North America, Generations Costs of 28.5 $/MWh are required to achieve an IRR of 20%, a level which enables IRIS to compete with all other forms of electricity production. Plant size is critical to commercial success. Sustained (lifetime) high factors for Plant Output, Availability and Capacity Factor are required to achieve a competitive advantage. Modularity offers Utilities the option to match their investments with market conditions, adding additional capacity as and when the circumstances are right

  4. Novel Design of Tunable Microlens with Lowered Driving Voltage and Iris with Conformal Antireflective Surface

    Science.gov (United States)

    Almoallem, Yousuf Dawood

    Miniaturizing camera systems as required in many new compact devices places a severe restriction on the device size and power consumption. In modern life nowadays, a daily used compact devices like mobile phones and tablets must have some essential components such as single or multiple tiny cameras, as a component of micro-optical systems. In fact, for most of the current miniaturized cameras, optical power is varied based on the traditional situation where the distances between the lenses are mechanically varied relying on old-fashioned voice coil motors or equivalent mechanical drivers. Spatial and power consumption could be scaled down drastically with much faster response time when the revolutionary alternative liquid tunable microlens is utilized after acquiring a good understanding of microfluidics. The influence of interfacial tension as a key metric in controlling microfluidics systems (e.g. liquid microlens) has drawn considerable attention in biomedical, industrial, military fields over the past decade. Tunable microlenses overcome aforementioned concerns of miniaturizing optical systems and present a viable solution by tuning the focal length of lenses via, for example, variation in the lens curvature. Here, a novel tunable dielectrophoretic (DEP)-based tunable lens is presented. Out of many other mechanisms of tuning the lenses, the dielectric mechanism is especially promising since having the capability to achieve a faster response and overcome the electrolysis issue. Nonetheless, DEP usually requires high driving voltage levels. The proposed design is operating with a lowered voltage level and is based on a tunable dielectric liquid lens with a double-sided electrode design, unlike in the conventional scheme with a single-sided electrode design. The design methodology, geometrical analysis, device fabrication, simulation, and testing are demonstrated. Furthermore, the design, simulation, fabrication and characterization of a black-silicon (BSi) based

  5. Advanced topics in security computer system design

    International Nuclear Information System (INIS)

    Stachniak, D.E.; Lamb, W.R.

    1989-01-01

    The capability, performance, and speed of contemporary computer processors, plus the associated performance capability of the operating systems accommodating the processors, have enormously expanded the scope of possibilities for designers of nuclear power plant security computer systems. This paper addresses the choices that could be made by a designer of security computer systems working with contemporary computers and describes the improvement in functionality of contemporary security computer systems based on an optimally chosen design. Primary initial considerations concern the selection of (a) the computer hardware and (b) the operating system. Considerations for hardware selection concern processor and memory word length, memory capacity, and numerous processor features

  6. Fingerprint + Iris = IrisPrint

    Science.gov (United States)

    Othman, Asem; Ross, Arun

    2015-05-01

    We consider the problem of generating a biometric image from two different traits. Specifically, we focus on generating an IrisPrint that inherits its structure from a fingerprint image and an iris image. To facilitate this, the continuous phase of the fingerprint image, characterizing its ridge flow, is first extracted. Next, a scheme is developed to extract "minutiae" from an iris image. Finally, an IrisPrint, that resembles a fingerprint, is created by mixing the ridge flow of the fingerprint with the iris minutiae. Preliminary experiments suggest that the new biometric image (i.e., IrisPrint) (a) can potentially be used for authentication by an existing fingerprint matcher, and (b) can potentially conceal and preserve the privacy of the original fingerprint and iris images.

  7. Design Methodologies for Secure Embedded Systems

    CERN Document Server

    Biedermann, Alexander

    2011-01-01

    Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? And how can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration o

  8. Designing, Implementing, and Evaluating Secure Web Browsers

    Science.gov (United States)

    Grier, Christopher L.

    2009-01-01

    Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…

  9. A new method for generating an invariant iris private key based on the fuzzy vault system.

    Science.gov (United States)

    Lee, Youn Joo; Park, Kang Ryoung; Lee, Sung Joo; Bae, Kwanghyuk; Kim, Jaihie

    2008-10-01

    Cryptographic systems have been widely used in many information security applications. One main challenge that these systems have faced has been how to protect private keys from attackers. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. In biometric systems, a critical problem is storing biometric templates in a database. However, fuzzy vault systems do not need to directly store these templates since they are combined with private keys by using cryptography. Previous fuzzy vault systems were designed by using fingerprint, face, and so on. However, there has been no attempt to implement a fuzzy vault system that used an iris. In biometric applications, it is widely known that an iris can discriminate between persons better than other biometric modalities. In this paper, we propose a reliable fuzzy vault system based on local iris features. We extracted multiple iris features from multiple local regions in a given iris image, and the exact values of the unordered set were then produced using the clustering method. To align the iris templates with the new input iris data, a shift-matching technique was applied. Experimental results showed that 128-bit private keys were securely and robustly generated by using any given iris data without requiring prealignment.

  10. A new approach for cancelable iris recognition

    Science.gov (United States)

    Yang, Kai; Sui, Yan; Zhou, Zhi; Du, Yingzi; Zou, Xukai

    2010-04-01

    The iris is a stable and reliable biometric for positive human identification. However, the traditional iris recognition scheme raises several privacy concerns. One's iris pattern is permanently bound with him and cannot be changed. Hence, once it is stolen, this biometric is lost forever as well as all the applications where this biometric is used. Thus, new methods are desirable to secure the original pattern and ensure its revocability and alternatives when compromised. In this paper, we propose a novel scheme which incorporates iris features, non-invertible transformation and data encryption to achieve "cancelability" and at the same time increases iris recognition accuracy.

  11. Secure Supply Chains : Design Restrictions & Organizational Boundaries

    NARCIS (Netherlands)

    Ludema, M.W.

    2009-01-01

    An important issue in the design of secure supply chains is the understanding of the relation between supply chains and the organizational responsibility of specific parts of these supply chains. Organizational boundaries change over time by means of vertical and/or horizontal (des)-integration and

  12. Designing Secure Systems on Reconfigurable Hardware

    OpenAIRE

    Huffmire, Ted; Brotherton, Brett; Callegari, Nick; Valamehr, Jonathan; White, Jeff; Kastner, Ryan; Sherwood, Ted

    2008-01-01

    The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deployment of custom hardware. Embedded systems based on reconfigurable hardware integrate many functions onto a single device. Since embedded designers often have no choice but to use soft IP cores obtained from third parties, the cores operate at different trust levels, resulting in mixed trust designs. The goal of this project is to evaluate recently proposed security primitives for reconfigurab...

  13. IRIS. Progress in licensing and toward deployment

    International Nuclear Information System (INIS)

    Petrovic, B.; Carelli, M.D.; Kling, C.L.; Cavlina, N.; Grgic, D.

    2006-01-01

    The International Reactor Innovative and Secure (IRIS) is an advanced, integral, light water cooled, pressurized reactor of smaller generating capacity (1000 MWt, or 335 MWe). It is being developed through a strong international partnership by a team lead by Westinghouse and including organizations from 10 countries. The main objective of the project is to offer a simple nuclear power plant with outstanding safety, attractive economics and enhanced proliferation resistance characteristics ready for deployment within the next decade. IRIS embodies the requirements set forth by the recently announced US DOE Global Nuclear Energy Partnership (GNEP) program for worldwide deployment of a smaller-scale reactors and provides a viable bridge to Generation IV reactors. IRIS is designed to address the needs of both developed and emerging markets. Its smaller power level provides deployment flexibility in larger developed markets, and makes it in particular well suited for markets with limited grids or where the annual energy demand growth is moderate. Due to its short construction time and the staggered build option, IRIS significantly reduces the required financing, improves cash flow, and provides a viable solution for economies with limited resources. While based on proven and worldwide accepted LWR technology, IRIS introduces a number of innovative solutions to simplify its design and improve safety and operational characteristics, including the integral primary system and its components, as well as the safety-by-design approach. These features will be tested and demonstrated in a testing program that has been initiated. As its centerpiece, the program will include the integral test facility. Results of this program will support licensing with the US NRC. A multinational licensing is considered to facilitate worldwide deployment. (author)

  14. Design of an autonomous exterior security robot

    Science.gov (United States)

    Myers, Scott D.

    1994-01-01

    This paper discusses the requirements and preliminary design of robotic vehicle designed for performing autonomous exterior perimeter security patrols around warehouse areas, ammunition supply depots, and industrial parks for the U.S. Department of Defense. The preliminary design allows for the operation of up to eight vehicles in a six kilometer by six kilometer zone with autonomous navigation and obstacle avoidance. In addition to detection of crawling intruders at 100 meters, the system must perform real-time inventory checking and database comparisons using a microwave tags system.

  15. Compact dynamic microfluidic iris array

    Science.gov (United States)

    Kimmle, Christina; Doering, Christoph; Steuer, Anna; Fouckhardt, Henning

    2011-09-01

    A dynamic microfluidic iris is realized. Light attenuation is achieved by absorption of an opaque liquid (e.g. black ink). The adjustment of the iris diameter is achieved by fluid displacement via a transparent elastomer (silicone) half-sphere. This silicone calotte is hydraulically pressed against a polymethylmethacrylate (PMMA) substrate as the bottom window, such that the opaque liquid is squeezed away, this way opening the iris. With this approach a dynamic range of more than 60 dB can be achieved with response times in the ms to s regime. The design allows the realization of a single iris as well as an iris array. So far the master for the molded silicone structure was fabricated by precision mechanics. The aperture diameter was changed continuously from 0 to 8 mm for a single iris and 0 to 4 mm in case of a 3 x 3 iris array. Moreover, an iris array was combined with a PMMA lens array into a compact module, the distance of both arrays equaling the focal length of the lenses. This way e.g. spatial frequency filter arrays can be realized. The possibility to extend the iris array concept to an array with many elements is demonstrated. Such arrays could be applied e.g. in light-field cameras.

  16. Designing a Secure Point-of-Sale System

    DEFF Research Database (Denmark)

    Sharp, Robin; Pedersen, Allan; Hedegaard, Anders

    2006-01-01

    This paper describes some experiences with using the ''Common Criteria for Information Security Evaluation'' as the basis for a design methodology when designing secure systems. As an example, the design process for a Point-of-Sale (POS) system is described.......This paper describes some experiences with using the ''Common Criteria for Information Security Evaluation'' as the basis for a design methodology when designing secure systems. As an example, the design process for a Point-of-Sale (POS) system is described....

  17. Computer modeling of homogenization of boric acid in IRIS pressurizer

    International Nuclear Information System (INIS)

    Rives Sanz, Ronny; Montesinos Otero, Maria Elena; Gonzalez Mantecon, Javier

    2015-01-01

    Integral layout of nuclear reactor IRIS makes possible the elimination of the spray system; which is usually used to mitigate in-surge transient and help to boron homogenization. The study of transients with deficiencies in the boron homogenization in this technology is very important, because they can cause disturbances in the reactor power and insert a strong reactivity in the core. The aim of the present research is to model the IRIS pressurizer using the CFX code searching for designs alternatives that guaranteed its intrinsic security, focused on the phenomena before mentioned. A symmetric tri dimensional model equivalent to 1/8 of the total geometry was adopted to reduce mesh size and minimize processing time. The relationships are programmed and incorporated into the code. This paper discusses the model developed and the behavior of the system for representative transients sequences. The results of the analyzed IRIS transients could be applied to the design of the pressurizer internal structures and components. (Author)

  18. Fuel management approach in IRIS Reactor

    International Nuclear Information System (INIS)

    Petrovic, B.; Franceschini, F.

    2004-01-01

    This paper provides an overview of fuel management approach employed in IRIS (International Reactor Innovative and Secure). It introduces the initial, rather ambitious, fuel management goals and discusses their evolution that reflected the fast pace of progress of the overall project. The updated objectives rely on using currently licensed fuel technology, thus enabling near-term deployment of IRIS, while still providing improved fuel utilization. The paper focuses on the reference core design and fuel management strategy that is considered in pre-application licensing, which enables extended cycle of three to four years. The extended cycle reduces maintenance outage time and increases capacity factor, thus reducing the cost of electricity. Approaches to achieving this goal are discussed, including use of different reloading strategies. Additional fuel management options, which are not part of the licensing process, but are pursued as long-term research for possible future implementation, are presented as well. (Author)

  19. Computational model for transient studies of IRIS pressurizer behavior

    International Nuclear Information System (INIS)

    Rives Sanz, R.; Montesino Otero, M.E.; Gonzalez Mantecon, J.; Rojas Mazaira, L.

    2014-01-01

    International Reactor Innovative and Secure (IRIS) excels other Small Modular Reactor (SMR) designs due to its innovative characteristics regarding safety. IRIS integral pressurizer makes the design of larger pressurizer system than the conventional PWR, without any additional cost. The IRIS pressurizer volume of steam can provide enough margins to avoid spray requirement to mitigate in-surge transient. The aim of the present research is to model the IRIS pressurizer's dynamic using the commercial finite volume Computational Fluid Dynamic code CFX 14. A symmetric tridimensional model equivalent to 1/8 of the total geometry was adopted to reduce mesh size and minimize processing time. The model considers the coexistence of three phases: liquid, steam, and vapor bubbles in liquid volume. Additionally, it takes into account the heat losses between the pressurizer and primary circuit. The relationships for interfacial mass, energy, and momentum transport are programmed and incorporated into CFX by using expressions in CFX Command Language (CCL) format. Moreover, several additional variables are defined for improving the convergence and allow monitoring of boron dilution sequences and condensation-evaporation rate in different control volumes. For transient states a non - equilibrium stratification in the pressurizer is considered. This paper discusses the model developed and the behavior of the system for representative transients sequences such as the in/out-surge transients and boron dilution sequences. The results of analyzed transients of IRIS can be applied to the design of pressurizer internal structures and components. (author)

  20. Statistical feature extraction based iris recognition system

    Indian Academy of Sciences (India)

    Atul Bansal

    features obtained from one's face [1], finger [2], voice [3] and/or iris [4, 5]. Iris recognition system is widely used in high security areas. A number of researchers have proposed various algorithms for feature extraction. A little work [6,. 7] however, has been reported using statistical techniques directly on pixel values in order to ...

  1. Modeling of emergency heat removal system of the IRIS

    International Nuclear Information System (INIS)

    Mendoza G, G.; Viais J, J.; Maioli, A.; Finnicum, D.

    2004-01-01

    Westinghouse is currently pursuing the pre-application licensing of the International Reactor Innovative and Secure (IRIS) on behalf of the IRIS Consortium. As part of this effort, an IRIS Probabilistic Risk Assessment (PRA) is being generated. The frontline system models have been developed based on the current system design information. To the extent practicable, AP1000 information was used to support the development of the models because of the degree of similarity between the non-safety active system functions of the two reactors as well as some passive safety functions. The AP1000 PRA is also the key source of failure rate information for IRIS. Standard modeling techniques were used to develop the fault tree models for the Emergency Heat Removal System (EHRS). The models include pumps, valves, heat exchangers, motive and control power, and actuation signals. Modeled failure modes include demand failures, run failures, standby failures and common cause failures, as appropriate. For the fluid support systems such as cooling water, the PRA analysts developed simplified system design diagrams based on system descriptions in the Safety Analysis report and the system P and IDs from the equivalent AP1000 systems. These PRA designs were reviewed by the system designers to ensure that they were consistent with the designers understanding of the intended design and operation of the system. The PRA designs were then used to develop the needed fault tree models. (Author)

  2. Computational cameras for moving iris recognition

    Science.gov (United States)

    McCloskey, Scott; Venkatesha, Sharath

    2015-05-01

    Iris-based biometric identification is increasingly used for facility access and other security applications. Like all methods that exploit visual information, however, iris systems are limited by the quality of captured images. Optical defocus due to a small depth of field (DOF) is one such challenge, as is the acquisition of sharply-focused iris images from subjects in motion. This manuscript describes the application of computational motion-deblurring cameras to the problem of moving iris capture, from the underlying theory to system considerations and performance data.

  3. Design and implementation of an algorithm for creating templates for the purpose of iris biometric authentication through the analysis of textures implemented on a FPGA

    Energy Technology Data Exchange (ETDEWEB)

    Giacometto, F J; Vilardy, J M; Torres, C O; Mattos, L, E-mail: franciscogiacometto@unicesar.edu.co [Laboratorio de Optica e Informatica, Universidad Popular del Cesar, Sede balneario Hurtado, Valledupar, Cesar (Colombia)

    2011-01-01

    Currently addressing problems related to security in access control, as a consequence, have been developed applications that work under unique characteristics in individuals, such as biometric features. In the world becomes important working with biometric images such as the liveliness of the iris which are for both the pattern of retinal images as your blood vessels. This paper presents an implementation of an algorithm for creating templates for biometric authentication with ocular features for FPGA, in which the object of study is that the texture pattern of iris is unique to each individual. The authentication will be based in processes such as edge extraction methods, segmentation principle of John Daugman and Libor Masek's, and standardization to obtain necessary templates for the search of matches in a database and then get the expected results of authentication.

  4. Design and implementation of an algorithm for creating templates for the purpose of iris biometric authentication through the analysis of textures implemented on a FPGA

    Science.gov (United States)

    Giacometto, F. J.; Vilardy, J. M.; Torres, C. O.; Mattos, L.

    2011-01-01

    Currently addressing problems related to security in access control, as a consequence, have been developed applications that work under unique characteristics in individuals, such as biometric features. In the world becomes important working with biometric images such as the liveliness of the iris which are for both the pattern of retinal images as your blood vessels. This paper presents an implementation of an algorithm for creating templates for biometric authentication with ocular features for FPGA, in which the object of study is that the texture pattern of iris is unique to each individual. The authentication will be based in processes such as edge extraction methods, segmentation principle of John Daugman and Libor Masek's, and standardization to obtain necessary templates for the search of matches in a database and then get the expected results of authentication.

  5. CDIS: Circle Density Based Iris Segmentation

    Science.gov (United States)

    Gupta, Anand; Kumari, Anita; Kundu, Boris; Agarwal, Isha

    Biometrics is an automated approach of measuring and analysing physical and behavioural characteristics for identity verification. The stability of the Iris texture makes it a robust biometric tool for security and authentication purposes. Reliable Segmentation of Iris is a necessary precondition as an error at this stage will propagate into later stages and requires proper segmentation of non-ideal images having noises like eyelashes, etc. Iris Segmentation work has been done earlier but we feel it lacks in detecting iris in low contrast images, removal of specular reflections, eyelids and eyelashes. Hence, it motivates us to enhance the said parameters. Thus, we advocate a new approach CDIS for Iris segmentation along with new algorithms for removal of eyelashes, eyelids and specular reflections and pupil segmentation. The results obtained have been presented using GAR vs. FAR graphs at the end and have been compared with prior works related to segmentation of iris.

  6. Integrated security systems design a complete reference for building enterprise-wide digital security systems

    CERN Document Server

    Norman, Thomas L

    2014-01-01

    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a

  7. IRIS TECHNOLOGY: A REVIEW ON IRIS BASED BIOMETRIC SYSTEMS FOR UNIQUE HUMAN IDENTIFICATION

    OpenAIRE

    Dr M V Bramhananda Reddy; Dr V Goutham

    2018-01-01

    Biometric features are widely used in real time applications for unique human identification. Iris is one of the physiological biometric features which are regarded as highly reliable in biometric identification systems. Often iris is combined with other biometric features for robust biometric systems. It is also observed that biometrics is combined with cryptography for stronger security mechanisms. Since iris is unique for all individuals across the globe, many researchers focused on using ...

  8. Penetrating keratoplasty for perforated corneal ulcers: preservation of iris by corneal debulking.

    Science.gov (United States)

    Vajpayee, Rasik B; Singhvi, Arun; Sharma, Namrata; Sinha, Rajesh

    2006-01-01

    This study was designed to study an alternative technique of lamellar separation of corneal layers for therapeutic keratoplasty in place of an en bloc removal of host corneal button in eyes with perforated corneal ulcers with pseudocornea. Twelve eyes with perforated corneal ulcers with pseudocornea in which therapeutic keratoplasty was planned were included in the study. A new technique was used in which the host corneal tissue was removed in layers by lamellar dissection started peripherally and proceeding centripetally with care taken to prevent perforation at the site of iris incarceration. After injection of viscoelastic into the anterior chamber with a 26-gauge needle entered tangentially, the deeper layer of the cornea was then gently dissected and peeled away from the iris tissue, with care not to avulse the fragile iris and the overlying fibrotic membrane. Adjunctive procedures were performed, and the donor tissue was secured over the host bed. A complete separation of the iris tissue from corneal button and the fibrous membrane was achieved in 9 eyes. In 3 eyes, iris was partly trimmed along with the fibrous membrane, because the membrane was totally adherent to the iris tissue. Eight patients required pupilloplasty. Apart from minimal bleeding, no other complication was encountered. At the end of 3 months, 9 of 12 grafts remained clear. Debulking and layer-by-layer removal of host corneal tissue is effective in preservation of iris while performing therapeutic keratoplasty in eyes with perforated corneal ulcers with pseudocornea.

  9. Secure wireless embedded systems via component-based design

    DEFF Research Database (Denmark)

    Hjorth, T.; Torbensen, R.

    2010-01-01

    communication component for distributed wireless embedded devices. The components communicate using the Secure Embedded Exchange Protocol (SEEP), which has been designed for flexible trust establishment so that small, resource-constrained, wireless embedded systems are able to communicate short command messages......This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure applications through verified, reusable software. Following this method we propose a security framework with a secure...

  10. Secure system design and trustable computing

    CERN Document Server

    Potkonjak, Miodrag

    2016-01-01

    This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions, and networking services.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.

  11. CC-based Design of Secure Application Systems

    DEFF Research Database (Denmark)

    Sharp, Robin

    2009-01-01

    This paper describes some experiences with using the Common Criteria for Information Security Evaluation as the basis for a design methodology for secure application systems. The examples considered include a Point-of-Sale (POS) system, a wind turbine park monitoring and control system and a secure...

  12. IRIS Responsiveness to Generation IV Road-map Goals

    International Nuclear Information System (INIS)

    Carelli, M.D.; Paramonov, D.V.; Petrovic, B.

    2002-01-01

    The DOE Generation IV road-map process is in its second and final year. Almost one hundred concepts submitted from all over the world have been reviewed against the Generation IV goals of resources sustainability; safety and reliability; and, economics. Advanced LWRs are taken as the reference point. IRIS (International Reactor Innovative and Secure), a 100-335 MWe integral light water reactor being developed by a vast international consortium led by Westinghouse, is one on the concepts being considered in the road-map and is perhaps the most visible representative of the concept set known as Integral Primary System Reactors (IPSR). This paper presents how IRIS satisfies the prescribed goals. The first goal of resource sustainability includes criteria like utilization of fuel resources, amount and toxicity of waste produced, environmental impact, proliferation and sabotage resistance. As a thermal reactor IRIS does not have the same fuel utilization as fast reactors. However, it has a significant flexibility in fuel cycles as it is designed to utilize either UO 2 or MOX with straight burn cycles of 4 to 10 years, depending on the fissile content. High discharge burnup and Pu recycling result in good fuel utilization and lower waste; IRIS has also attractive proliferation resistance characteristics, due to the reduced accessibility of the fuel. The safety and reliability goal include reliability, workers' exposure, robust safety features, models with well characterized uncertainty, source term and mechanisms of energy release, robust mitigation of accidents. IRIS is significantly better than advanced LWRs because of its safety by design which eliminates a variety of accidents such as LOCAs, its containment vessel coupled design which maintains the core safely covered during the accident sequences, its design simplification features such as no (or reduced) soluble boron, internal shielding and four-year refueling/maintenance interval which significantly reduce

  13. A Design Methodology for Computer Security Testing

    OpenAIRE

    Ramilli, Marco

    2013-01-01

    The field of "computer security" is often considered something in between Art and Science. This is partly due to the lack of widely agreed and standardized methodologies to evaluate the degree of the security of a system. This dissertation intends to contribute to this area by investigating the most common security testing strategies applied nowadays and by proposing an enhanced methodology that may be effectively applied to different threat scenarios with the same degree of effectiveness. ...

  14. Locating An IRIS From Image Using Canny And Hough Transform

    Directory of Open Access Journals (Sweden)

    Poorvi Bhatt

    2017-11-01

    Full Text Available Iris recognition a relatively new biometric technology has great advantages such as variability stability and security thus it is the most promising for high security environments. The proposed system here is a simple system design and implemented to find the iris from the image using Hough Transform Algorithm. Canny Edge detector has been used to get edge image to use it as an input to the Hough Transform. To get the general idea of Hough Transform the Hough Transform for circle is also implemented. RGB value of 3-D accumulator array of peaks of inner circle and outer circle has been performed. And at the end some suggestions are made to improve the system and performance gets discussed.

  15. IRIS economics. A sensitivity review

    International Nuclear Information System (INIS)

    Miller, Keith

    2003-01-01

    IRIS (International Reactor Innovative and Secure) is a small to medium advanced light water cooled modular reactor being developed by an international consortium led by Westinghouse/BNFL. This reactor design is specifically aimed at utilities looking to install new (or replacement) nuclear capacity to match market demands, or at developing countries for their distributed power needs. To determine the optimal configuration for IRIS, analysis was undertaken to establish Generation Costs ($/MWh) and Internal Rate of Return (IRR %) to the Utility at alternative power ratings. This was then combined with global market projections for electricity demand out to 2030, segmented into key geographical regions. Finally this information is brought together to form insights, conclusions and recommendations regarding the optimal design. The resultant analysis reveals an optimum power rating for a single module of 335 MWe, with a construction period of 3 years or less and a minimum plant life of 60 years. Individual modules can be installed in a staggered fashion (3 equivalent to 1005 MWe) or built in pairs (2 sets of twin units' equivalent to 1340 MWe). Uncertainty in Market Clearing Price for electricity, Annual Operating Costs and Construction Costs primarily influence lifetime Net Present Values (NPV) and hence IRR % for Utilities. Generation Costs in addition are also influenced by Fuel Costs, Plant Output, Plant Availability and Plant Capacity Factor. Therefore for a site based on 3 single modules, located in North America, Generations Costs of 28.5 $/MWh are required to achieve an IRR of 20%, a level which enables IRIS to compete with all other forms of electricity production. Plant size is critical to commercial success. Sustained (lifetime) high factors for Plant Output, Availability and Capacity Factor are required to achieve a competitive advantage. Modularity offers Utilities the option to match their investments with market conditions, adding additional capacity as

  16. Iris analysis for biometric recognition systems

    CERN Document Server

    Bodade, Rajesh M

    2014-01-01

    The book presents three most significant areas in Biometrics and Pattern Recognition. A step-by-step approach for design and implementation of Dual Tree Complex Wavelet Transform (DTCWT) plus Rotated Complex Wavelet Filters (RCWF) is discussed in detail. In addition to the above, the book provides detailed analysis of iris images and two methods of iris segmentation. It also discusses simplified study of some subspace-based methods and distance measures for iris recognition backed by empirical studies and statistical success verifications.

  17. Maquiladoras and National Security: Design Theory as a Guide

    Science.gov (United States)

    2011-10-25

    1990’s, with the total reaching over 3000 in the following decade.10 NAFTA changed the way Mexico treated imports from countries other than the...instability along the U.S.- Mexico border and will prove to be a serious national security issue for the United States. This paper leverages Design theory to... MEXICO , EXPORT, MAQUILADORAS, COMPETITION, BORDER, SECURITY, STABILITY, DESIGN 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18

  18. The IRIS consortium: international cooperation in advanced reactor development

    International Nuclear Information System (INIS)

    Carelli, M.; Petrovic, B.; Miller, K.; Lombardi, C.; Ricotti, M.E.

    2005-01-01

    Besides its many outstanding technical innovations in the design and safety, the most innovative feature of the International Reactor Innovative and Secure (IRIS), is perhaps the international cooperation which carries on its development. IRIS is designed by an international consortium which currently numbers 21 organizations from ten countries across four continents. It includes reactor, fuel and fuel cycle vendors, component manufacturers, laboratories, academia, architect engineers and power producers. The defining organizational characteristics of IRIS is that while Westinghouse has overall lead and responsibility, this lead is of the type of 'primus inter pares' (first among equals) rather than the traditional owner versus suppliers/contractors relationship. All members of the IRIS consortium contribute and expect to have a return, should IRIS be successfully deployed, commensurate to their investment. The nature of such return will be tailored to the type of each organization, because it will of course be of a different nature for say a component manufacturer, university, or architect engineer. One fundamental tenet of the consortium is that all members, regardless of their amount of contribution, have equal access to all information developed within the project. Technical work is thus being coordinated by integrated subgroups and the whole team meets twice a year to perform an overall review of the work, discuss policy and strategy and plan future activities. Personnel from consortium members have performed internships, mostly at Westinghouse locations in Pittsburgh, Pennsylvania, and Windsor, Connecticut, but also at other members, as it has been the case for several graduate students. In fact, more than one hundred students at the various universities have been working on IRIS, most of them conducting graduate theses at the master or doctoral level. The IRIS experience has proved very helpful to the students in successfully landing their employment choice

  19. AHMCT Intelligent Roadway Information System (IRIS) technical support and testing.

    Science.gov (United States)

    2011-12-01

    This report documents the research project AHMCT IRIS Technical Support and Testing, : performed under contract 65A0275, Task ID 1777. It presents an overview of the Intelligent : Roadway Information System (IRIS), and its design and function. ...

  20. AHMCT Intelligent Roadway Information System (IRIS) technical support and testing

    Science.gov (United States)

    2011-12-31

    This report documents the research project AHMCT IRIS Technical Support and Testing, : performed under contract 65A0275, Task ID 1777. It presents an overview of the Intelligent : Roadway Information System (IRIS), and its design and function. ...

  1. Secure Block Ciphers - Cryptanalysis and Design

    DEFF Research Database (Denmark)

    Tiessen, Tyge

    The rapid evolution of computational devices and the widespread adoption of digital communication have deeply transformed the way we conduct both business and everyday life and they continue to do so. The ability to ensure confidentiality and integrity of information sent over digital channels...... is fundamental to this development and is absolutely essential for all private and corporate communication, ranging from bank transactions, digital citizen services, and remote computer access, to cell phone calls and instant messaging. The vast majority of secured data sent over all types of networks...... is encrypted using so-called symmetric ciphers. The security of our digital infrastructure thus rests at its very base on their security. The central topic of this thesis is the security of block ciphers – the most prominent form of symmetric ciphers. This thesis is separated in two parts. The first part...

  2. Flowdown of the TMT astrometry error budget(s) to the IRIS design

    OpenAIRE

    Schöck, Matthias; Andersen, David; Rogers, John; Ellerbroek, Brent; Chisholm, Eric; Dunn, Jennifer; Herriot, Glen; Larkin, James; Moore, Anna; Suzuki, Ryuji; Wincentsen, James; Wright, Shelley

    2016-01-01

    TMT has defined the accuracy to be achieved for both absolute and differential astrometry in its top-level requirements documents. Because of the complexities of different types of astrometric observations, these requirements cannot be used to specify system design parameters directly. The TMT astrometry working group therefore developed detailed astrometry error budgets for a variety of science cases. These error budgets detail how astrometric errors propagate through the calibration, observ...

  3. Aspect-oriented security hardening of UML design models

    CERN Document Server

    Mouheb, Djedjiga; Pourzandi, Makan; Wang, Lingyu; Nouh, Mariam; Ziarati, Raha; Alhadidi, Dima; Talhi, Chamseddine; Lima, Vitor

    2015-01-01

    This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The

  4. Computational model for transient studies of IRIS pressurizer behavior; Modelo computacional para el estudio de transitorios en el compensador de presion IRIS

    Energy Technology Data Exchange (ETDEWEB)

    Rives Sanz, R.; Montesino Otero, M.E.; Gonzalez Mantecon, J.; Rojas Mazaira, L., E-mail: mmontesi@instec.cu [Higher Institute of Technology and Applied Science, La Habana (Cuba). Department of Nuclear Engineering; Lira, C.A. Brayner de Oliveira [Universidade Federal de Pernambuco (UFPE), Recife, PE (Brazil)

    2014-07-01

    International Reactor Innovative and Secure (IRIS) excels other Small Modular Reactor (SMR) designs due to its innovative characteristics regarding safety. IRIS integral pressurizer makes the design of larger pressurizer system than the conventional PWR, without any additional cost. The IRIS pressurizer volume of steam can provide enough margins to avoid spray requirement to mitigate in-surge transient. The aim of the present research is to model the IRIS pressurizer's dynamic using the commercial finite volume Computational Fluid Dynamic code CFX 14. A symmetric tridimensional model equivalent to 1/8 of the total geometry was adopted to reduce mesh size and minimize processing time. The model considers the coexistence of three phases: liquid, steam, and vapor bubbles in liquid volume. Additionally, it takes into account the heat losses between the pressurizer and primary circuit. The relationships for interfacial mass, energy, and momentum transport are programmed and incorporated into CFX by using expressions in CFX Command Language (CCL) format. Moreover, several additional variables are defined for improving the convergence and allow monitoring of boron dilution sequences and condensation-evaporation rate in different control volumes. For transient states a non - equilibrium stratification in the pressurizer is considered. This paper discusses the model developed and the behavior of the system for representative transients sequences such as the in/out-surge transients and boron dilution sequences. The results of analyzed transients of IRIS can be applied to the design of pressurizer internal structures and components. (author)

  5. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  6. Information Aggregation, Currency Swaps, and the Design of Derivative Securities

    OpenAIRE

    Chowdhry, Bhagwan; Grinblatt, Mark

    1997-01-01

    A model of security design based on the principle of information aggregation and alignment is used to show that (i) firms needing to finance their operations should issue different securities to different groups of investors in order to aggregate their disparate information and (ii) each security should be highly correlated (closely aligned) with the private information signal of the investor to whom it is marketed. This alignment reduces the adverse selection penalty paid by a firm with su...

  7. Intrinsic information Security: Embedding security issues in the design process of telematics systems

    NARCIS (Netherlands)

    Tettero, Olaf; Tettero, O.

    This book presents a systematic approach to embed information security issues in the design process of telematics systems. The approach supports both designers and user organisations. We elaborate on the activities that designers should perform to design telematics systems in which information

  8. [Electronic Device for Retinal and Iris Imaging].

    Science.gov (United States)

    Drahanský, M; Kolář, R; Mňuk, T

    This paper describes design and construction of a new device for automatic capturing of eye retina and iris. This device has two possible ways of utilization - either for biometric purposes (persons recognition on the base of their eye characteristics) or for medical purposes as supporting diagnostic device. eye retina, eye iris, device, acquisition, image.

  9. Secure wireless embedded systems via component-based design

    DEFF Research Database (Denmark)

    Hjorth, T.; Torbensen, R.

    2010-01-01

    This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure applications through verified, reusable software. Following this method we propose a security framework with a secure...... communication component for distributed wireless embedded devices. The components communicate using the Secure Embedded Exchange Protocol (SEEP), which has been designed for flexible trust establishment so that small, resource-constrained, wireless embedded systems are able to communicate short command messages......, with full support for confidentiality, authentication, and integrity using keypairs. The approach has been demonstrated in a multi-platform home automation prototype that can remotely unlock a door using a PDA over the Internet....

  10. IRIS-economics review

    International Nuclear Information System (INIS)

    Miller, K.

    2005-01-01

    IRIS is a medium sized advanced light water cooled modular reactor being developed by an international Group led by Westinghouse/BNFL. This reactor design is aimed at a broad spectrum of Utilities looking to install nuclear capacity to match market demands, or at emerging Nations with specific financial constraints looking to strategically optimise their debit levels. The IRIS building block is a multiple module sized at 335 MWe, with a construction period of 3 years and a 60-year plant life. Modules can be installed individually or in parks. In the latter case, deployment can be in single modules or in pairs (twin-unit); both will be built in staggered fashion at time intervals as dictated by economic and market considerations. One of the unique features of IRIS is its ability to offer reduction in costs through increased experience 'Learning' at a single site: In construction, the principal benefit is derived for subsequent modules, and is dependent on maintaining the 'core' team throughout. This is particularly important if there is any significant period between the completion of say module 1 and the start of module 2. This time frame will be driven by the overall market size, projected growth in demand and the level of financial risk the utility is prepared to accept. Learning benefits in construction are derived from skills and experience retention impacting on reducing the number of inputs and construction time. Learning in operation may benefit from a certain delay between modules as this allows operators to build up their 'cumulative experience'. Reactor operations on day 1 would be significantly different from those of say 3 years later. These benefits would be passed on to modules 2 and 3, which would realise them from day 1. Learning in operation is dependent on the ability to retain within the organisation knowledge and records of key events. The benefits from Learning in operation may also be applicable to different sites, in different countries. It

  11. Security Design Flaws That Affect Usability in Online Banking

    Science.gov (United States)

    Gurlen, Stephanie

    2013-01-01

    As the popularity of online banking Websites has increased, the security of these sites has become increasingly critical as attacks against these sites are on the rise. However, the design decisions made during construction of the sites could make usability more difficult, where the user has difficulty making good security decisions. This study…

  12. Planning for nuclear security: Design Basis Threats and physical ...

    African Journals Online (AJOL)

    A competent authority for nuclear security then gives approval for the implementation of the physical protection plan. The DBT assessment methodology is an International Atomic Energy Agency (IAEA) recommended method for designing security measures corresponding to the categories of radioactive sources. The higher ...

  13. Design and development of a password- based door lock security ...

    African Journals Online (AJOL)

    This work is a design and development of a micro-controller based, password enabled door lock for home security. The work involved building a working model of a security door lock that is password protected with an AT89C52 microcontroller which operates by sending control signals to a H-bridge that controls the ...

  14. Bartus Iris biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R.; Grace, W.

    1996-07-01

    This is the final report of a one-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). We won a 1994 R&D 100 Award for inventing the Bartas Iris Verification System. The system has been delivered to a sponsor and is no longer available to us. This technology can verify the identity of a person for purposes of access control, national security, law enforcement, forensics, counter-terrorism, and medical, financial, or scholastic records. The technique is non-invasive, psychologically acceptable, works in real-time, and obtains more biometric data than any other biometric except DNA analysis. This project sought to develop a new, second-generation prototype instrument.

  15. 75 FR 77783 - Designation of National Security Positions

    Science.gov (United States)

    2010-12-14

    ... 3206-AM27 Designation of National Security Positions AGENCY: Office of Personnel Management. ACTION... responsibilities related to public safety, law enforcement, and the protection of Government information systems... protecting or controlling access to facilities or information systems; controlling, maintaining custody...

  16. RECENT DEVELOPMENTS OF THE IRIS PROJECT OF INTEREST FOR LATIN AMERICA

    Energy Technology Data Exchange (ETDEWEB)

    Carelli, M.D.; Petrovic, B.

    2004-10-03

    The IRIS (International Reactor Innovative and Secure) reactor design is being developed by an international consortium of 21 organizations from ten countries, including three members from Brazil and one from Mexico. This reflects the interest that Latin America has for a project which addresses the energy needs of the region. Presented here are some of the most recent developments in the IRIS project. The project's highest priority is the current pre-application licensing with the US NRC, which has required an investigation of the major accident sequences and a preliminary probabilistic risk assessment (PRA). The results of the accident analyses confirmed the outstanding inherent safety of the IRIS configuration and the PRA analyses indicated a core damage frequency due to internal events of the order of 2E-8. This not only highlights the enhanced safety characteristic of IRIS which should enhance its public acceptance, but it has also prompted IRIS to consider the possibility of being licensed without the need for off-site emergency response planning which would have a very positive economic implication. The modular IRIS, with each module rated at {approx} 335 MWe, is of course an ideal size for developing countries as it allows to easily introduce a moderate amount of power on limited electric grids. IRIS can be deployed in single modules in regions only requiring a few hundred MWs or in multiple modules deployed successively at time intervals in large urban areas requiring a larger amount of power increasing with time. IRIS is designed to operate ''hands-off'' as much as possible, with a small crew, having in mind deployment in areas with limited infrastructure. Thus IRIS has a 48-months maintenance interval, long refueling cycles in excess of three years, and is designed to increase as much as possible operational reliability. For example, the project has recently adopted internal control rod drive mechanisms to eliminate vessel head

  17. RECENT DEVELOPMENTS OF THE IRIS PROJECT OF INTEREST FOR LATIN AMERICA

    International Nuclear Information System (INIS)

    Carelli, M.D.; Petrovic, B.

    2004-01-01

    The IRIS (International Reactor Innovative and Secure) reactor design is being developed by an international consortium of 21 organizations from ten countries, including three members from Brazil and one from Mexico. This reflects the interest that Latin America has for a project which addresses the energy needs of the region. Presented here are some of the most recent developments in the IRIS project. The project's highest priority is the current pre-application licensing with the US NRC, which has required an investigation of the major accident sequences and a preliminary probabilistic risk assessment (PRA). The results of the accident analyses confirmed the outstanding inherent safety of the IRIS configuration and the PRA analyses indicated a core damage frequency due to internal events of the order of 2E-8. This not only highlights the enhanced safety characteristic of IRIS which should enhance its public acceptance, but it has also prompted IRIS to consider the possibility of being licensed without the need for off-site emergency response planning which would have a very positive economic implication. The modular IRIS, with each module rated at ∼ 335 MWe, is of course an ideal size for developing countries as it allows to easily introduce a moderate amount of power on limited electric grids. IRIS can be deployed in single modules in regions only requiring a few hundred MWs or in multiple modules deployed successively at time intervals in large urban areas requiring a larger amount of power increasing with time. IRIS is designed to operate ''hands-off'' as much as possible, with a small crew, having in mind deployment in areas with limited infrastructure. Thus IRIS has a 48-months maintenance interval, long refueling cycles in excess of three years, and is designed to increase as much as possible operational reliability. For example, the project has recently adopted internal control rod drive mechanisms to eliminate vessel head penetrations and the

  18. Improved iris localization by using wide and narrow field of view cameras for iris recognition

    Science.gov (United States)

    Kim, Yeong Gon; Shin, Kwang Yong; Park, Kang Ryoung

    2013-10-01

    Biometrics is a method of identifying individuals by their physiological or behavioral characteristics. Among other biometric identifiers, iris recognition has been widely used for various applications that require a high level of security. When a conventional iris recognition camera is used, the size and position of the iris region in a captured image vary according to the X, Y positions of a user's eye and the Z distance between a user and the camera. Therefore, the searching area of the iris detection algorithm is increased, which can inevitably decrease both the detection speed and accuracy. To solve these problems, we propose a new method of iris localization that uses wide field of view (WFOV) and narrow field of view (NFOV) cameras. Our study is new as compared to previous studies in the following four ways. First, the device used in our research acquires three images, one each of the face and both irises, using one WFOV and two NFOV cameras simultaneously. The relation between the WFOV and NFOV cameras is determined by simple geometric transformation without complex calibration. Second, the Z distance (between a user's eye and the iris camera) is estimated based on the iris size in the WFOV image and anthropometric data of the size of the human iris. Third, the accuracy of the geometric transformation between the WFOV and NFOV cameras is enhanced by using multiple matrices of the transformation according to the Z distance. Fourth, the searching region for iris localization in the NFOV image is significantly reduced based on the detected iris region in the WFOV image and the matrix of geometric transformation corresponding to the estimated Z distance. Experimental results showed that the performance of the proposed iris localization method is better than that of conventional methods in terms of accuracy and processing time.

  19. Integrating Safeguards and Security with Safety into Design

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Bean; John W. Hockert; David J. Hebditch

    2009-05-01

    There is a need to minimize security risks, proliferation hazards, and safety risks in the design of new nuclear facilities in a global environment of nuclear power expansion, while improving the synergy of major design features and raising operational efficiency. In 2008, the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) launched the Next Generation Safeguards Initiative (NGSI) covering many safeguards areas. One of these, launched by NNSA with support of the DOE Office of Nuclear Energy, was a multi-laboratory project, led by the Idaho National Laboratory (INL), to develop safeguards by design. The proposed Safeguards-by-Design (SBD) process has been developed as a structured approach to ensure the timely, efficient, and cost effective integration of international safeguards and other nonproliferation barriers with national material control and accountability, physical security, and safety objectives into the overall design process for the nuclear facility lifecycle. A graded, iterative process was developed to integrate these areas throughout the project phases. It identified activities, deliverables, interfaces, and hold points covering both domestic regulatory requirements and international safeguards using the DOE regulatory environment as exemplar to provide a framework and guidance for project management and integration of safety with security during design. Further work, reported in this paper, created a generalized SBD process which could also be employed within the licensed nuclear industry and internationally for design of new facilities. Several tools for integrating safeguards, safety, and security into design are discussed here. SBD appears complementary to the EFCOG TROSSI process for security and safety integration created in 2006, which focuses on standardized upgrades to enable existing DOE facilities to meet a more severe design basis threat. A collaborative approach is suggested.

  20. The Design and Realization of Household Intelligent Security System

    Directory of Open Access Journals (Sweden)

    Huang Sheng-Bo

    2016-01-01

    Full Text Available It is known that Smart home has brought great convenience to the lives of humans. However, we have attached quantities of interest in its security as the development of technology goes on. According to the security requirements at the moment, we introduce the scheme of smart home security system based on ZigBee, and design system hardware and software process. By applying a STC89C52 microcontroller, our system is able to accurately detect and give alarms automatically to house fire, harmful gases and thefts.

  1. Multispectral iris fusion for enhancement, interoperability, and cross wavelength matching

    Science.gov (United States)

    Burge, Mark J.; Monaco, Matthew K.

    2009-05-01

    Traditionally, only a narrow band of the Near-Infrared (NIR) spectrum (700-900nm) is utilized for iris recognition since this alleviates any physical discomfort from illumination, reduces specular reflections and increases the amount of texture captured for some iris colors. However, previous research has shown that matching performance is not invariant to iris color and can be improved by imaging outside of the NIR spectrum. Building on this research, we demonstrate that iris texture increases with the frequency of the illumination for lighter colored sections of the iris and decreases for darker sections. Using registered visible light and NIR iris images captured using a single-lens multispectral camera, we illustrate how physiological properties of the iris (e.g., the amount and distribution of melanin) impact the transmission, absorbance, and reflectance of different portions of the electromagnetic spectrum and consequently affect the quality of the imaged iris texture. We introduce a novel iris code, Multispectral Enhanced irisCode (MEC), which uses pixel-level fusion algorithms to exploit texture variations elicited by illuminating the iris at different frequencies, to improve iris matcher performance and reduce Failure-To-Enroll (FTE) rates. Finally, we present a model for approximating an NIR iris image using features derived from the color and structure of a visible light iris image. The simulated NIR images generated by this model are designed to improve the interoperability between legacy NIR iris images and those acquired under visible light by enabling cross wavelength matching of NIR and visible light iris images.

  2. Computational fluid dynamics as a virtual facility for R and D in the IRIS project: an overview

    International Nuclear Information System (INIS)

    Colombo, E.; Inzoli, F.; Ricotti, M.; Uddin, R.; Yan, Y.; Sobh, N.

    2004-01-01

    The pressurized light water cooled, medium power (1000 MWt) IRIS (International Reactor Innovative and Secure) has been under development for four years by an international consortium of over 21 organizations from ten countries. The plant conceptual design was completed in 2001 and the preliminary design is nearing completion. The pre-application licensing process with NRC started in October, 2002 and IRIS is one of the designs considered by US utilities as part of the ESP (Early Site Permit) process. The development of a new nuclear plant concept presents the opportunity and potential for a significant usage of computational fluid dynamics (CFD) in the design process, as it is in many conventional applications related to power generation. A CFD-Group of international scientists has been given the mission of investigating the many application opportunities for CFD related to the IRIS project and to verify the support that the IRIS design process may gain from CFD in terms of time, costs, resource saving, and visibility. The key objective identified is the use of CFD as a design tool for virtual tests in order to simplify the optimization effort for the nuclear plant's components and support the IRIS testing program. In this paper, the CFD-Group is described in terms of their resources and capabilities. A program of activities with identified goals and a possible schedule is also presented.(author)

  3. Design and evaluation of security multimedia warnings for children's smartphones

    Science.gov (United States)

    Menzel, Wiebke; Tuchscheerer, Sven; Fruth, Jana; Kraetzer, Christian; Dittmann, Jana

    2012-02-01

    This article describes primarily the development and empiric validation of a design for security warning messages on smartphones for primary school children (7-10 years old). Our design approach for security warnings for children uses a specific character and is based on recommendations of a paediatrician expert. The design criteria are adapted to children's skills, e.g. their visual, acoustic, and haptic perception and their literacy. The developed security warnings are prototypically implemented in an iOS application (on the iPhone 3G/4G) where children are warned by a simulated anti-malware background service, while they are busy with another task. For the evaluation we select methods for empiric validation of the design approach from the field of usability testing ("think aloud" test, questionnaires, log-files, etc.). Our security warnings prototype is evaluated in an empiric user study with 13 primary school children, aged between 8 and 9 years and of different gender (5 girls, 8 boys). The evaluation analysis shows, that nearly all children liked the design of our security warnings. Surprisingly, on several security warning messages most of the children react in the right way after reading the warning, although the meaning couldn't be interpreted in the right way. Another interesting result is, that several children relate specific information, e.g. update, to a specific character. Furthermore, it could be seen that most of the primary school test candidates have little awareness of security threats on smartphones. It is a very strong argument to develop e.g. tutorials or websites in order to raise awareness and teach children how to recognize security threats and how to react to them. Our design approach of security warnings for children's smartphones can be a basis for warning on other systems or applications like tutorials, which are used by children. In a second investigation, we focus on webpages, designed for children since smartphones and webpages (the

  4. Expansiveness and Security Through Materials and Design

    OpenAIRE

    Hamblin, Jr., Keith Alan

    2008-01-01

    This is a youth hostel designed to provide maximum functional comfort and efficiency in a relatively confined space. Because of its narrow floor plan, the windows are made large to make the rooms seem bigger and frame the view to the outside by drawing the viewerâ s eye out from the dense interior creating expansion to the outside. The orientation of the structure allows natural light to fill almost the entire interior and invites the cityscape to become a part of the interior spaces. In ...

  5. Market Design and Supply Security in Imperfect Power Markets

    DEFF Research Database (Denmark)

    Schwenen, Sebastian

    2014-01-01

    Supply security in imperfect power markets is modelled under different market designs. In a uniform price auction for electricity with two firms, strategic behaviour may leave firms offering too few capacities and unable to supply all realized demand. Market design that relies oncapacity markets...... increases available generation capacities for sufficiently high capacity prices and consequently decreases energy prices. However, equilibrium capacity prices are non-competitive. Capacity markets can increase security of supply, but cannot mitigate market power, which is exercised in the capacity market...

  6. TAPIOCA MELANOMA OF THE IRIS

    NARCIS (Netherlands)

    DEKEIZER, RJW; OOSTERHUIS, JA; HOUTMAN, WA; DEWOLFFROUENDAAL, D

    Clinical identification of tapioca melanoma of the iris is important because its medical treatment may differ from that of other malignant iris melanomas. The characteristic iris nodules must be differentiated from granulomatous uveitis, metastases, and Lisch nodules (neurofibromatosis). We will

  7. Design of an Internet Based Security System | David | Nigerian ...

    African Journals Online (AJOL)

    The system has a way of monitoring requests for access to the secured areas as well as reacting to intruder attempts. To achieve this, a successful hardware data acquisition unit based on a microcontroller is designed. The data from the hardware unit is connected to the PC via the parallel port interface so as to monitor all ...

  8. Extending AADL for Security Design Assurance of Cyber Physical Systems

    Science.gov (United States)

    2015-12-16

    Resolute: An AADL Analysis Tool 13 3.1.1 Developing Assurance Cases for Security 13 4 STRIDE Analysis of the Infotainment System 16 4.1 Spoofing 16...AADL Description 23 5.2 Security Analysis for the Infotainment Example in AADL 24 5.3 Architectural Models in the Design Process 27 5.3.1 Focus...page 8. Instead, the attacks created a new connection. Add-ons such as an infotain - ment system extend the attack surface and provide an opportunity

  9. Re-designing the PhEDEx security model

    CERN Document Server

    Wildish, Anthony

    2013-01-01

    PhEDEx. the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model was designed to provide a safe working environment for site agents and operators, but provided little more protection than that. CMS data was not sufficiently protected against accidental loss caused by operator error or software bugs or from loss of data caused by deliberate manipulation of the database. Operations staff were given high levels of access to the database, beyond what should have been needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time.In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and r...

  10. Iris recognition in the presence of ocular disease.

    Science.gov (United States)

    Aslam, Tariq Mehmood; Tan, Shi Zhuan; Dhillon, Baljean

    2009-05-06

    Iris recognition systems are among the most accurate of all biometric technologies with immense potential for use in worldwide security applications. This study examined the effect of eye pathology on iris recognition and in particular whether eye disease could cause iris recognition systems to fail. The experiment involved a prospective cohort of 54 patients with anterior segment eye disease who were seen at the acute referral unit of the Princess Alexandra Eye Pavilion in Edinburgh. Iris camera images were obtained from patients before treatment was commenced and again at follow-up appointments after treatment had been given. The principal outcome measure was that of mathematical difference in the iris recognition templates obtained from patients' eyes before and after treatment of the eye disease. Results showed that the performance of iris recognition was remarkably resilient to most ophthalmic disease states, including corneal oedema, iridotomies (laser puncture of iris) and conjunctivitis. Problems were, however, encountered in some patients with acute inflammation of the iris (iritis/anterior uveitis). The effects of a subject developing anterior uveitis may cause current recognition systems to fail. Those developing and deploying iris recognition should be aware of the potential problems that this could cause to this key biometric technology.

  11. Iris recognition as a biometric method after cataract surgery

    Directory of Open Access Journals (Sweden)

    Roizenblatt Jaime

    2004-01-01

    Full Text Available Abstract Background Biometric methods are security technologies, which use human characteristics for personal identification. Iris recognition systems use iris textures as unique identifiers. This paper presents an analysis of the verification of iris identities after intra-ocular procedures, when individuals were enrolled before the surgery. Methods Fifty-five eyes from fifty-five patients had their irises enrolled before a cataract surgery was performed. They had their irises verified three times before and three times after the procedure, and the Hamming (mathematical distance of each identification trial was determined, in a controlled ideal biometric environment. The mathematical difference between the iris code before and after the surgery was also compared to a subjective evaluation of the iris anatomy alteration by an experienced surgeon. Results A correlation between visible subjective iris texture alteration and mathematical difference was verified. We found only six cases in which the eye was no more recognizable, but these eyes were later reenrolled. The main anatomical changes that were found in the new impostor eyes are described. Conclusions Cataract surgeries change iris textures in such a way that iris recognition systems, which perform mathematical comparisons of textural biometric features, are able to detect these changes and sometimes even discard a pre-enrolled iris considering it an impostor. In our study, re-enrollment proved to be a feasible procedure.

  12. Iris recognition as a biometric method after cataract surgery.

    Science.gov (United States)

    Roizenblatt, Roberto; Schor, Paulo; Dante, Fabio; Roizenblatt, Jaime; Belfort, Rubens

    2004-01-28

    Biometric methods are security technologies, which use human characteristics for personal identification. Iris recognition systems use iris textures as unique identifiers. This paper presents an analysis of the verification of iris identities after intra-ocular procedures, when individuals were enrolled before the surgery. Fifty-five eyes from fifty-five patients had their irises enrolled before a cataract surgery was performed. They had their irises verified three times before and three times after the procedure, and the Hamming (mathematical) distance of each identification trial was determined, in a controlled ideal biometric environment. The mathematical difference between the iris code before and after the surgery was also compared to a subjective evaluation of the iris anatomy alteration by an experienced surgeon. A correlation between visible subjective iris texture alteration and mathematical difference was verified. We found only six cases in which the eye was no more recognizable, but these eyes were later reenrolled. The main anatomical changes that were found in the new impostor eyes are described. Cataract surgeries change iris textures in such a way that iris recognition systems, which perform mathematical comparisons of textural biometric features, are able to detect these changes and sometimes even discard a pre-enrolled iris considering it an impostor. In our study, re-enrollment proved to be a feasible procedure.

  13. Design and implementation of a high performance network security processor

    Science.gov (United States)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  14. Market design and supply security in imperfect power markets

    International Nuclear Information System (INIS)

    Schwenen, Sebastian

    2014-01-01

    Supply security in imperfect power markets is modelled under different market designs. In a uniform price auction for electricity with two firms, strategic behaviour may leave firms offering too few capacities and unable to supply all realized demand. Market design that relies on capacity markets increases available generation capacities for sufficiently high capacity prices and consequently decreases energy prices. However, equilibrium capacity prices are non-competitive. Capacity markets can increase security of supply, but cannot mitigate market power, which is exercised in the capacity market instead of the energy market. - Highlights: • I model two power generating firms who compete to serve stochastic demand in a multiunit uniform price auction. • In equilibrium, blackout probabilities can arise through capacity withholding. • Capacity mechanisms decrease capacity withholding and the expected energy price. • With dominant firms, capacity mechanisms are only effective if capacity prices are non-competitive and include a mark-up for leaving the energy-only market optimum

  15. New modelling strategy for IRIS dynamic response simulation

    International Nuclear Information System (INIS)

    Cammi, A.; Ricotti, M. E.; Casella, F.; Schiavo, F.

    2004-01-01

    The pressurized light water cooled, medium power (1000 MWt) IRIS (International Reactor Innovative and Secure) has been under development for four years by an international consortium of over 21 organizations from ten countries. The plant conceptual design was completed in 2001 and the preliminary design is nearing completion. The pre-application licensing process with NRC started in October, 2002 and IRIS is one of the designs considered by US utilities as part of the ESP (Early Site Permit) process. In this paper the development of an adequate modeling and simulation tool for Dynamics and Control tasks is presented. The key features of the developed simulator are: a) Modularity: the system model is built by connecting the models of its components, which are written independently of their boundary conditions; b) Openness: the code of each component model is clearly readable and close to the original equations and easily customised by the experienced user; c) Efficiency: the simulation code is fast; d) Tool support: the simulation tool is based on reliable, tested and well-documented software. To achieve these objectives, the Modelica language was used as a basis for the development of the simulator. The Modelica language is the results of recent advances in the field of object-oriented, multi-physics, dynamic system modelling. The language definition is open-source and it has already been successfully adopted in several industrial fields. To provide the required capabilities for the analysis, specific models for nuclear reactor components have been developed, to be applied for the dynamic simulation of the IRIS integral reactor, albeit keeping general validity for PWR plants. The following Modelica models have been written to satisfy the IRIS modelling requirements and are presented in this paper: neutronics point kinetic, fuel heat transfer, control rods model, including the innovative internal drive mechanism type, and a once-through type steam generator, thus

  16. Investigation on Optimization in Segmentation Phase of Iris Recognition

    Directory of Open Access Journals (Sweden)

    Selvamuthukumaran Shanmugam

    2010-01-01

    Full Text Available In a progressively more digital society, the demandfor secure identification has led to amplified development ofbiometric systems. Iris biometric systems are becoming widelyadopted and accepted as one of the most effective ways topositively identify people. In this paper, the Segmentation phasesof Iris recognition has been examined. The performance of theSegmentation phase could be amplified by the proposedoptimization technique- Optimized Iris Segmentation using SobelEdge Detection. By the proposed method, the overall rank-onerecognition rate of 90% is being achieved which is much betterthan reported accuracies for iris recognition in the literature.Also the proposed approach makes the overall iris recognitionsystem performance by the improvement factor of 10 fold as well.

  17. Exploiting iris dynamics

    Science.gov (United States)

    Hsu, Charles; Szu, Harold

    2010-04-01

    The human iris is a circular curtain over the light entrance pupil which is controlled directly by the intensity of blue light from photosensitive ganglions in the retina within the eye. The human iris dynamic is remarkable in that it is capable of shrinking concentrically along the radial direction by a factor 4 from 8mm to 2mm, and constantly oscillates in 1/2 second periodicity. Pupil dilation and contraction causes the iris texture to undergo nonlinear deformation with discrete components and minutia features. Thus, iris recognition must be scale invariant due to the pupil dynamics. We propose the Mandelbrot fractal dimension count of minutia iris details, at different intensity thresholds, in dilation-invariant wedge-boxes, formed at specific angular sizes, but spatially varying over 4 90° quadrants due to the cellular growth under the gravity. Despite the concentric dynamic, we have sought an invariant fractal dimensionality in the circular direction and discovered the non-isotropic effect, departed from the simple Richardson fractal law. Furthermore, we choose an optimum Rayleigh criterion λ/D matching the robust fine resolution scale for the given lens aperture D and the illumination wavelength λ for a potential application from a distant, with the help of comprehensive biometric including iris.

  18. Security credentials management system (SCMS) design and analysis for the connected vehicle system : draft.

    Science.gov (United States)

    2013-12-27

    This report presents an analysis by Booz Allen Hamilton (Booz Allen) of the technical design for the Security Credentials Management System (SCMS) intended to support communications security for the connected vehicle system. The SCMS technical design...

  19. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design.

    Science.gov (United States)

    Selimis, Georgios; Huang, Li; Massé, Fabien; Tsekoura, Ioanna; Ashouei, Maryam; Catthoor, Francky; Huisken, Jos; Stuyt, Jan; Dolmans, Guido; Penders, Julien; De Groot, Harmke

    2011-10-01

    In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor node increases the size of the stored software program in program memory, the required time that the sensor's microprocessor needs to process the data and the wireless network traffic which is exchanged among sensors. This security overhead has dominant impact on the energy dissipation which is strongly related to the lifetime of the sensor, a critical aspect in wireless sensor network (WSN) technology. Strict definition of the security functionality, complete hardware model (microprocessor and radio), WBAN topology and the structure of the medium access control (MAC) frame are required for an accurate estimation of the energy that security introduces into the WBAN. In this work, we define a lightweight security scheme for WBAN, we estimate the additional energy consumption that the security scheme introduces to WBAN based on commercial available off-the-shelf hardware components (microprocessor and radio), the network topology and the MAC frame. Furthermore, we propose a new microcontroller design in order to reduce the energy consumption of the system. Experimental results and comparisons with other works are given.

  20. Unconstrained Iris Acquisition and Recognition Using COTS PTZ Camera

    Directory of Open Access Journals (Sweden)

    Venugopalan Shreyas

    2010-01-01

    Full Text Available Abstract Uniqueness of iris patterns among individuals has resulted in the ubiquity of iris recognition systems in virtual and physical spaces, at high security facilities around the globe. Traditional methods of acquiring iris patterns in commercial systems scan the iris when an individual is at a predetermined location in front of the scanner. Most state-of-the-art techniques for unconstrained iris acquisition in literature use expensive custom equipment and are composed of a multicamera setup, which is bulky, expensive, and requires calibration. This paper investigates a method of unconstrained iris acquisition and recognition using a single commercial off-the-shelf (COTS pan-tilt-zoom (PTZ camera, that is compact and that reduces the cost of the final system, compared to other proposed hierarchical multicomponent systems. We employ state-of-the-art techniques for face detection and a robust eye detection scheme using active shape models for accurate landmark localization. Additionally, our system alleviates the need for any calibration stage prior to its use. We present results using a database of iris images captured using our system, while operating in an unconstrained acquisition mode at 1.5 m standoff, yielding an iris diameter in the 150–200 pixels range.

  1. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  2. Inherent secure communications using lattice based waveform design

    Energy Technology Data Exchange (ETDEWEB)

    Pugh, Matthew Owen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-12-01

    The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the ability of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.

  3. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  4. Iris Recognition for Human Identification

    Science.gov (United States)

    Alandkar, Lajari; Gengaje, Sachin

    2010-11-01

    Iris recognition system is the biometric identification system. Iris has an intricate structure, uniqueness, stability, and natural protection. Due to these features of the iris it can be used for biometric identification. This system gives better performance than other biometric identification systems. A novel eyelash removal method for preprocessing of human iris images in a human iris recognition system is presented.. Discrete cosine transform (DCT) method is used for feature extraction. For matching of two-iris code Hamming distance calculation is used. EER value must be less for the optimum performance of the system.

  5. Fundamentals of IP and SoC security design, verification, and debug

    CERN Document Server

    Ray, Sandip; Sur-Kolay, Susmita

    2017-01-01

    This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the “trenches” of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on desi...

  6. Limbus Impact on Off-angle Iris Degradation

    Energy Technology Data Exchange (ETDEWEB)

    Karakaya, Mahmut [ORNL; Barstow, Del R [ORNL; Santos-Villalobos, Hector J [ORNL; Thompson, Joseph W [ORNL; Bolme, David S [ORNL; Boehnen, Chris Bensing [ORNL

    2013-01-01

    The accuracy of iris recognition depends on the quality of data capture and is negatively affected by several factors such as angle, occlusion, and dilation. Off-angle iris recognition is a new research focus in biometrics that tries to address several issues including corneal refraction, complex 3D iris texture, and blur. In this paper, we present an additional significant challenge that degrades the performance of the off-angle iris recognition systems, called the limbus effect . The limbus is the region at the border of the cornea where the cornea joins the sclera. The limbus is a semitransparent tissue that occludes a side portion of the iris plane. The amount of occluded iris texture on the side nearest the camera increases as the image acquisition angle increases. Without considering the role of the limbus effect, it is difficult to design an accurate off-angle iris recognition system. To the best of our knowledge, this is the first work that investigates the limbus effect in detail from a biometrics perspective. Based on results from real images and simulated experiments with real iris texture, the limbus effect increases the hamming distance score between frontal and off-angle iris images ranging from 0.05 to 0.2 depending upon the limbus height.

  7. CONSIDERING ANTI-PIRACY SHIP SECURITY: CITADEL DESIGN AND USE

    Directory of Open Access Journals (Sweden)

    L. Carral

    2015-09-01

    Full Text Available As piracy continues to pose a threat to the shipping industry, a number of measures for protecting ships, cargo and crew will need to be implemented. Along with other steps, such as deploying military rescue teams, securing the crew within a ship’s citadel has proved to be a highly effective form of self-protection against hostage-taking by pirates. From a design standpoint, aspects that should be considered include the location and dimensions of the citadel, the maximum time crew can stay within it and the specific requirements for various elements of the ship or citadel equipment. Exploiting data on pirate attacks recently occurring in High Risk Areas, this article analyses the design and use of the citadel as a self-protection measure against piracy. As a conclusion, various requirements for these structures are recommended.

  8. Iris - nimi marmortahvlilt / Tiit Tuumalu

    Index Scriptorium Estoniae

    Tuumalu, Tiit, 1971-

    2003-01-01

    Briti kirjanikust Iris Murdochist pajatava inglise-ameerika mängufilmist "Iris" eesti videolevisse jõudmise puhul. Võrreldakse inglise teatrilavastaja Richard Eyre filmidebüüti Elmo Nüganeni debüütfilmiga "Nimed marmortahvlil"

  9. Iris Crypts Influence Dynamic Changes of Iris Volume.

    Science.gov (United States)

    Chua, Jacqueline; Thakku, Sri Gowtham; Tun, Tin A; Nongpiur, Monisha E; Tan, Marcus Chiang Lee; Girard, Michael J A; Wong, Tien Yin; Quah, Joanne Hui Min; Aung, Tin; Cheng, Ching-Yu

    2016-10-01

    To determine the association of iris surface features with iris volume change after physiologic pupil dilation in adults. Cross-sectional observational study. Chinese adults aged ≥ 50 years without ocular diseases. Digital iris photographs were taken from eyes of each participant and graded for crypts (by number and size) and furrows (by number and circumferential extent) following a standardized grading scheme. Iris color was measured objectively, using the Commission Internationale de l'Eclairage (CIE) L* color parameter (higher value denoting lighter iris). The anterior segment was imaged by swept-source optical coherence tomography (SS-OCT) (Casia; Tomey, Nagoya, Japan) under bright light and dark room conditions. Iris volumes in light and dark conditions were measured with custom semiautomated software, and the change in iris volume was quantified. Associations of the change in iris volume after pupil dilation with underlying iris surface features in right eyes were assessed using linear regression analysis. Iris volume change after physiologic pupil dilation from light to dark condition. A total of 65 Chinese participants (mean age, 59.8±5.7 years) had gradable data for iris surface features. In light condition, higher iris crypt grade was associated independently with smaller iris volume (β [change in iris volume in millimeters per crypt grade increment] = -1.43, 95% confidence interval [CI], -2.26 to -0.59; P = 0.001) and greater reduction of iris volume on pupil dilation (β [change in iris volume in millimeters per crypt grade increment] = 0.23, 95% CI, 0.06-0.40; P = 0.010), adjusting for age, gender, presence of corneal arcus, and change in pupil size. Iris furrows and iris color were not associated with iris volume in light condition or change in iris volume (all P > 0.05). Although few Chinese persons have multiple crypts on their irides, irides with more crypts were significantly thinner and lost more volume on pupil dilation. In view that

  10. Design and realization of a network security model

    OpenAIRE

    WANG, Jiahai; HAN, Fangxi; Tang, Zheng; TAMURA, Hiroki; Ishii, Masahiro

    2002-01-01

    The security of information is a key problem in the development of network technology. The basic requirements of security of information clearly include confidentiality, integrity, authentication and non-repudiation. This paper proposes a network security model that is composed of security system, security connection and communication, and key management. The model carries out encrypting, decrypting, signature and ensures confidentiality, integrity, authentication and non-repudiation. Finally...

  11. The Buyers’ Perspective on Security Design: Hedge Funds and Convertible Bond Call Provisions

    NARCIS (Netherlands)

    B.D. Grundy (Bruce); P. Verwijmeren (Patrick)

    2016-01-01

    textabstractWe provide evidence that security design reflects the interplay of capital supplier and security issuer preferences. While call provisions have historically been the default option in convertible security design, only a minority of post-2005 issues are callable. Because hedge funds

  12. Iris Recognition - Beyond One Meter

    Science.gov (United States)

    Matey, James R.; Kennell, Lauren R.

    Iris recognition Iris recognition is, arguably, the most robust form of biometric Biometrics identification. It has been deployed in large-scale systems that have been very effective. The systems deployed to date make use of iris Remote Biometric cameras that require significant user cooperation; that in turn imposes significant constraints on the deployment scenarios that are practical.

  13. Tapioca melanoma of the iris without iris heterochromia.

    Science.gov (United States)

    Bach, Austin; McGowan, Sara; Gold, Aaron S; Villegas, Victor M; Wildner, Andrea C; Ehlies, Fiona J; Thompson, Jordan M; Bermudez-Magner, Jose Antonio; Dubovy, Sander R; Murray, Timothy G

    2014-04-01

    A case of a teenage girl with tapioca melanoma of the iris is presented. This case is unusual, as the patient did not have heterochromia and did not present with elevated intraocular pressure. A 14-year-old female patient presented with an amelanotic, multinodular, multifocal lesion of the right iris. Pathology confirmed a diagnosis of tapioca melanoma using immunohistologic staining. The patient underwent enucleation of her right eye and has been free of metastatic disease 3 years later. Tapioca melanoma of the iris must be included among the other differential diagnoses when examining patients with amelanotic iris lesions, even when iris heterochromia is not clearly evident.

  14. Hardware security and trust design and deployment of integrated circuits in a threatened environment

    CERN Document Server

    Chaves, Ricardo; Natale, Giorgio; Regazzoni, Francesco

    2017-01-01

    This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers. Covers all aspects of hardware security including design, manufacturing, testing, reliability, validation and utilization; Describes new methods and algorithms for the identification/detection of hardware trojans; Defines new architectures capable o...

  15. Perancangan Program Aplikasi Deteksi Iris Mata untuk Absensi Karyawan Menggunakan Metode Gabor Wavelet

    Directory of Open Access Journals (Sweden)

    Zahedi Zahedi

    2011-06-01

    Full Text Available To take the employees’ absences in a company, a variety of invented tools or technologies are and already used, for example, attendance cards, fingerprints attendance tool, and attendance tool that uses facial recognition. Attendance tool with a facial recognition uses iris recognition of those employees. Iris code has many properties that hard to forge. Thus, the detection and iris recognition is one of the most secure and accurate for identification. 

  16. Image compression with Iris-C

    Science.gov (United States)

    Gains, David

    2009-05-01

    Iris-C is an image codec designed for streaming video applications that demand low bit rate, low latency, lossless image compression. To achieve compression and low latency the codec features the discrete wavelet transform, Exp-Golomb coding, and online processes that construct dynamic models of the input video. Like H.264 and Dirac, the Iris-C codec accepts input video from both the YUV and YCOCG colour spaces, but the system can also operate on Bayer RAW data read directly from an image sensor. Testing shows that the Iris-C codec is competitive with the Dirac low delay syntax codec which is typically regarded as the state-of-the-art low latency, lossless video compressor.

  17. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor

    Directory of Open Access Journals (Sweden)

    Dat Tien Nguyen

    2018-04-01

    Full Text Available Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD method for an iris recognition system (iPAD using a near infrared light (NIR camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED. Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM. Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.

  18. Effect of tamsulosin on iris vasculature and morphology

    Science.gov (United States)

    Shtein, Roni M.; Hussain, Munira T.; Cooney, Theresa M.; Elner, Victor M.; Hood, Christopher T.

    2015-01-01

    PURPOSE To determine whether preoperative iris vasculature and morphology are altered in patients who have taken tamsulosin (Flomax). SETTING Academic multispecialty practice. DESIGN Case series. METHODS Patients with current or past tamsulosin use and age- and sex-matched control patients were included. Anterior segment optical coherence tomography (AS-OCT) and iris fluorescein angiography were performed to measure iris vasculature and thickness before cataract surgery. Data collected at surgery included pupil diameter, clinical signs of intraoperative floppy-iris syndrome, and surgical complications. RESULTS Tamsulosin was currently used by 16 patients and in the past by 4 patients; the control group comprised 10 patients. Pharmacologically dilated pupil diameter was significantly smaller preoperatively and immediately postoperatively in the tamsulosin group than in the control group (P = .009 and P = .003, respectively). There was a statistically significant decrease in pupil size intraoperatively in the tamsulosin group (P = .05) but not in the control group (P = .3). Iris-vasculature parameters, specifically time to first vessel fill and percentage of vessel fill on iris fluorescein angiography, were not significantly different between the 2 groups. The AS-OCT measurements of iris morphology were not statistically significantly different between the groups. No surgical complications occurred. No fluorescein dye leakage, staining, or other vascular anomalies were observed. CONCLUSIONS Although there were differences in pupil measurements and intraoperative iris behavior between patients who had been on tamsulosin and control patients, there were no significant differences in iris vasculature on iris fluorescein angiography or in iris morphology on AS-OCT. PMID:24631201

  19. Iris image recognition wavelet filter-banks based iris feature extraction schemes

    CERN Document Server

    Rahulkar, Amol D

    2014-01-01

    This book provides the new results in wavelet filter banks based feature extraction, and the classifier in the field of iris image recognition. It provides the broad treatment on the design of separable, non-separable wavelets filter banks, and the classifier. The design techniques presented in the book are applied on iris image analysis for person authentication. This book also brings together the three strands of research (wavelets, iris image analysis, and classifier). It compares the performance of the presented techniques with state-of-the-art available schemes. This book contains the compilation of basic material on the design of wavelets that avoids reading many different books. Therefore, it provide an easier path for the new-comers, researchers to master the contents. In addition, the designed filter banks and classifier can also be effectively used than existing filter-banks in many signal processing applications like pattern classification, data-compression, watermarking, denoising etc.  that will...

  20. Designing Intelligent Secure Android Application for Effective Chemical Inventory

    Science.gov (United States)

    Shukran, Mohd Afizi Mohd; Naim Abdullah, Muhammad; Nazri Ismail, Mohd; Maskat, Kamaruzaman; Isa, Mohd Rizal Mohd; Shahfee Ishak, Muhammad; Adib Khairuddin, Muhamad

    2017-08-01

    Mobile services support various situations in everyday life and with the increasing sophistication of phone functions, the daily life is much more easier and better especially in term of managing tools and apparatus. Since chemical inventory management system has been experiencing a new revolution from antiquated to an automated inventory management system, some additional features should be added in current chemical inventory system. Parallel with the modern technologies, chemical inventory application using smart phone has been developed. Several studies about current related chemical inventory management using smart phone application has been done in this paper in order to obtain an overview on recent studies in smartphone application for chemical inventory system which are needed in schools, universities or other education institutions. This paper also discuss about designing the proposed secure mobile chemical inventory system. The study of this paper can provide forceful review analysis support for the chemical inventory management system related research.

  1. IRIS (Version 200)

    International Nuclear Information System (INIS)

    Pansart, J.P.

    1987-01-01

    IRIS is a Monte Carlo generator of nucleon-nucleus and nucleus-nucleus interactions at high energy (≥50 GeV per nucleon for the projectile on a fixed target). The physics basis of the generator is the exchange of colour. (orig./HSI)

  2. IRI topside correction

    CERN Document Server

    Bilitza, D

    2002-01-01

    The topside segment of the International Reference Ionosphere (IRI) electron density model (and also of the Bent model) is based on the limited amount of topside data available at the time (approx 40,000 Alouette 1 profiles). Being established from such a small database it is therefore not surprising that these models have well-known shortcomings, for example, at high solar activities. Meanwhile a large data base of close to 200,000 topside profiles from Alouette 1, 2, and ISIS 1, 2 has become available online. A program of automated scaling and inversion of a large volume of digitized ionograms adds continuously to this data pool. We have used the currently available ISIS/Alouette topside profiles to evaluate the IRI topside model and to investigate ways of improving the model. The IRI model performs generally well at middle latitudes and shows discrepancies at low and high latitudes and these discrepancies are largest during high solar activity. In the upper topside IRI consistently overestimates the measur...

  3. Designing Fuzzy Rule Based Expert System for Cyber Security

    OpenAIRE

    Goztepe, Kerim

    2016-01-01

    The state of cyber security has begun to attract more attention and interest outside the community of computer security experts. Cyber security is not a single problem, but rather a group of highly different problems involving different sets of threats. Fuzzy Rule based system for cyber security is a system consists of a rule depository and a mechanism for accessing and running the rules. The depository is usually constructed with a collection of related rule sets. The aim of this study is to...

  4. Using crypts as iris minutiae

    Science.gov (United States)

    Shen, Feng; Flynn, Patrick J.

    2013-05-01

    Iris recognition is one of the most reliable biometric technologies for identity recognition and verification, but it has not been used in a forensic context because the representation and matching of iris features are not straightforward for traditional iris recognition techniques. In this paper we concentrate on the iris crypt as a visible feature used to represent the characteristics of irises in a similar way to fingerprint minutiae. The matching of crypts is based on their appearances and locations. The number of matching crypt pairs found between two irises can be used for identity verification and the convenience of manual inspection makes iris crypts a potential candidate for forensic applications.

  5. Iris pigmentation and AC thresholds.

    Science.gov (United States)

    Roche, A F; Mukherjee, D; Chumlea, W C; Siervogel, R M

    1983-03-01

    Data from 160 White children were used to analyze possible associations between iris pigmentation and AC pure-tone thresholds. Iris pigmentation was graded from iris color using glass models of eyes, and AC thresholds were obtained under carefully controlled conditions. Analyses of variance using two groupings of iris color grades showed no evidence of an association between iris color grade and AC thresholds. Furthermore, inspection of arrays of the actual glass eye models, in conjunction with the order of mean thresholds at each test frequency, did not indicate the presence of an association between iris color grades and thresholds. It was concluded that while iris pigmentation may be related to some aspects of hearing ability, it does not appear to be related to AC thresholds in children.

  6. Integrated radiotherapy imaging system (IRIS): design considerations of tumour tracking with linac gantry-mounted diagnostic x-ray systems with flat-panel detectors.

    Science.gov (United States)

    Berbeco, Ross I; Jiang, Steve B; Sharp, Gregory C; Chen, George T; Mostafavi, Hassan; Shirato, Hiroki

    2004-01-21

    The design of an integrated radiotherapy imaging system (IRIS), consisting of gantry mounted diagnostic (kV) x-ray tubes and fast read-out flat-panel amorphous-silicon detectors, has been studied. The system is meant to be capable of three main functions: radiographs for three-dimensional (3D) patient set-up, cone-beam CT and real-time tumour/marker tracking. The goal of the current study is to determine whether one source/panel pair is sufficient for real-time tumour/marker tracking and, if two are needed, the optimal position of each relative to other components and the isocentre. A single gantry-mounted source/imager pair is certainly capable of the first two of the three functions listed above and may also be useful for the third, if combined with prior knowledge of the target's trajectory. This would be necessary because only motion in two dimensions is visible with a single imager/source system. However, with previously collected information about the trajectory, the third coordinate may be derived from the other two with sufficient accuracy to facilitate tracking. This deduction of the third coordinate can only be made if the 3D tumour/marker trajectory is consistent from fraction to fraction. The feasibility of tumour tracking with one source/imager pair has been theoretically examined here using measured lung marker trajectory data for seven patients from multiple treatment fractions. The patients' selection criteria include minimum mean amplitudes of the tumour motions greater than 1 cm peak-to-peak. The marker trajectory for each patient was modelled using the first fraction data. Then for the rest of the data, marker positions were derived from the imager projections at various gantry angles and compared with the measured tumour positions. Our results show that, due to the three dimensionality and irregular trajectory characteristics of tumour motion, on a fraction-to-fraction basis, a 'monoscopic' system (single source/imager) is inadequate for

  7. Security-aware design for cyber-physical systems a platform-based approach

    CERN Document Server

    Lin, Chung-Wei

    2017-01-01

    Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science. .

  8. Sandia's experience in designing and implementing integrated high security physical protection systems

    International Nuclear Information System (INIS)

    Caskey, D.L.

    1986-01-01

    As DOE's lead laboratory for physical security, Sandia National Laboratories has had a major physical security program for over ten years. Activities have ranged from component development and evaluation, to full scale system design and implementation. This paper presents some of the lessons learned in designing and implementing state-of-the-art high security physical protection systems for a number of government facilities. A generic system design is discussed for illustration purposes. Sandia efforts to transfer technology to industry are described

  9. 78 FR 9751 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Designation of...

    Science.gov (United States)

    2013-02-11

    ... COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Designation of... Purpose of Calculating Its Clearing Fund Under Procedure XV of Its Rules & Procedures February 5, 2013. On December 17, 2012, the National Securities Clearing Corporation (``NSCC'') filed with the Securities and...

  10. Design and Evaluation of a Secure Virtual Power Plant.

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Tillay [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    For three years, Sandia National Laboratories, Georgia Institute of Technology, and University of Illinois at Urbana-Champaign investigated a smart grid vision in which renewable-centric Virtual Power Plants (VPPs) provided ancillary services with interoperable distributed energy resources (DER). This team researched, designed, built, and evaluated real-time VPP designs incorporating DER forecasting, stochastic optimization, controls, and cyber security to construct a system capable of delivering reliable ancillary services, which have been traditionally provided by large power plants or other dedicated equipment. VPPs have become possible through an evolving landscape of state and national interconnection standards, which now require DER to include grid-support functionality and communications capabilities. This makes it possible for third party aggregators to provide a range of critical grid services such as voltage regulation, frequency regulation, and contingency reserves to grid operators. This paradigm (a) enables renewable energy, demand response, and energy storage to participate in grid operations and provide grid services, (b) improves grid reliability by providing additional operating reserves for utilities, independent system operators (ISOs), and regional transmission organization (RTOs), and (c) removes renewable energy high-penetration barriers by providing services with photovoltaics and wind resources that traditionally were the jobs of thermal generators. Therefore, it is believed VPP deployment will have far-reaching positive consequences for grid operations and may provide a robust pathway to high penetrations of renewables on US power systems. In this report, we design VPPs to provide a range of grid-support services and demonstrate one VPP which simultaneously provides bulk-system energy and ancillary reserves.

  11. An efficient iris segmentation approach

    Science.gov (United States)

    Gomai, Abdu; El-Zaart, A.; Mathkour, H.

    2011-10-01

    Iris recognition system became a reliable system for authentication and verification tasks. It consists of five stages: image acquisition, iris segmentation, iris normalization, feature encoding, and feature matching. Iris segmentation stage is one of the most important stages. It plays an essential role to locate the iris efficiently and accurately. In this paper, we present a new approach for iris segmentation using image processing technique. This approach is composed of four main parts. (1) Eliminating reflections of light on the eye image based on inverting the color of the grayscale image, filling holes in the intensity image, and inverting the color of the intensity image to get the original grayscale image without any reflections. (2) Pupil boundary detection based on dividing an eye image to nine sub-images and finding the minimum value of the mean intensity for each sub-image to get a suitable threshold value of pupil. (3) Enhancing the contrast of outer iris boundary using exponential operator to have sharp variation. (4) Outer iris boundary localization based on applying a gray threshold and morphological operations on the rectangular part of an eye image including the pupil and the outer boundaries of iris to find the small radius of outer iris boundary from the center of pupil. The proposed approach has been tested on CASIA v1.0 iris image database and other collected iris image database. The experimental results show that the approach is able to detect pupil and outer iris boundary with high accuracy results approximately 100% and reduce time consuming.

  12. Re-designing the PhEDEx Security Model

    Energy Technology Data Exchange (ETDEWEB)

    Huang, C.-H. [Fermilab; Wildish, T. [Princeton U.; Zhang, X. [Beijing, Inst. High Energy Phys.

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  13. Towards robust experimental design for user studies in security and privacy

    OpenAIRE

    Krol, K.; Spring, J. M.; Parkin, S.; Sasse, M. A.

    2016-01-01

    Background: Human beings are an integral part of computer security, whether we actively participate or simply build the systems. Despite this importance, understanding users and their interaction with security is a blind spot for most security practitioners and designers. / Aim: Define principles for conducting experiments into usable security and privacy, to improve study robustness and usefulness. / Data: The authors’ experiences conducting several research projects com...

  14. Design of the national health security preparedness index.

    Science.gov (United States)

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  15. 17 CFR 242.600 - NMS security designation and definitions.

    Science.gov (United States)

    2010-04-01

    ... (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES... a market value of at least $50,000 for an NMS security that is an option contract and a market value... single price set by the system (by algorithm or by any derivative pricing mechanism) and does not allow...

  16. Integrated risk information system (IRIS)

    Energy Technology Data Exchange (ETDEWEB)

    Tuxen, L. [Environmental Protection Agency, Washington, DC (United States)

    1990-12-31

    The Integrated Risk Information System (IRIS) is an electronic information system developed by the US Environmental Protection Agency (EPA) containing information related to health risk assessment. IRIS is the Agency`s primary vehicle for communication of chronic health hazard information that represents Agency consensus following comprehensive review by intra-Agency work groups. The original purpose for developing IRIS was to provide guidance to EPA personnel in making risk management decisions. This original purpose for developing IRIS was to guidance to EPA personnel in making risk management decisions. This role has expanded and evolved with wider access and use of the system. IRIS contains chemical-specific information in summary format for approximately 500 chemicals. IRIS is available to the general public on the National Library of Medicine`s Toxicology Data Network (TOXNET) and on diskettes through the National Technical Information Service (NTIS).

  17. Cold Vacuum Dryer (CVD) Facility Security System Design Description. System 54

    International Nuclear Information System (INIS)

    WHITEHURST, R.

    2000-01-01

    This system design description (SDD) addresses the Cold Vacuum Drying (CVD) Facility security system. The system's primary purpose is to provide reasonable assurance that breaches of security boundaries are detected and assessment information is provided to protective force personnel. In addition, the system is utilized by Operations to support reduced personnel radiation goals and to provide reasonable assurance that only authorized personnel are allowed to enter designated security areas

  18. Design of a Secure RFID Authentication Scheme Preceding Market Transactions

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2011-01-01

    Full Text Available In recent years, as RFID reader equipment is ever more widely deployed in handled devices, the importance of security problems among RFID reader, tags and server have obviously gained increased attention. However, there are still many security issues preceding transactions; these issues are well worth discussing. In this paper, we propose a novel authentication scheme, conforming EPC C1G2 standards, at a low implementation cost for market application. In order to achieve mutual authentication, the proposed scheme integrates fingerprint biometrics, related cryptology and a hash function mechanism to ensure the security of the transmitted messages. The proposed scheme also can resist known attacks.

  19. Design Considerations for a Cognitive Radio Trust and Security Framework

    DEFF Research Database (Denmark)

    Mihovska, Albena D.; Prasad, Ramjee; Tragos, Elias Z.

    2012-01-01

    towards pushing further the attainable spectral efficiency gains. Taking a step back, our work looks into the critical challenges with respect to reliability, robustness and security, which hinder operators from investing in this new technology. We propose a new conceptual framework for trust and security...... to be integrated with the performance architecture and protocols for CR networks (CRNs). Our target is increasing trustworthiness from users and operators perspective in support of their successful deployment....

  20. Economic assessment of the IRIS reactor for deployment in Brazil using INPRO methodology

    International Nuclear Information System (INIS)

    Goncalves Filho, Orlando Joao Agostinho

    2009-01-01

    This paper presents the main results of the evaluation of the economic competitiveness of the International Reactor Innovative and Secure (IRIS) for deployment in Brazil using the assessment methodology developed under the International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO), co-ordinated by the International Atomic Energy Agency (IAEA). INPRO was initiated in 2001 and has the main objective of helping to ensure that nuclear energy will be available to contribute in a sustainable manner to the energy needs of the 21st century. Among its missions are the development of a methodology to assess innovative nuclear energy systems (INS) on a global, regional and national basis, and to facilitate the co-operation among IAEA Member States for planning the development and deployment of INS. Brazil joined INPRO since its beginning and in 2005 submitted a proposal for the screening assessment of two small-sized integral-type PWR reactors as alternative components of an INS completed with a conventional open nuclear fuel cycle based on enriched uranium. This paper outlines the rationale and the main results of the economic assessment of the IRIS-based INS completed in August 2008. The study concluded that IRIS reference design satisfies most of INPRO criteria in the area of economics. (author)

  1. Design of security scheme of the radiotherapy planning administration system based on the hospital information system

    International Nuclear Information System (INIS)

    Zhuang Yongzhi; Zhao Jinzao

    2010-01-01

    Objective: To design a security scheme of radiotherapy planning administration system. Methods: Power Builder 9i language was used to program the system through the model of client-server machine. Oracle 9i was used as the database server. Results In this system, user registration management, user login management, application-level functions of control, database access control, and audit trail were designed to provide system security. Conclusions: As a prototype for the security analysis and protection of this scheme provides security of the system, application system, important data and message, which ensures the system work normally. (authors)

  2. Design and Implementation of GSM Based Automated Home Security System

    Directory of Open Access Journals (Sweden)

    Love Aggarwal

    2014-05-01

    Full Text Available The Automated Home Security System aims at building a security system for common households using GSM modem, sensors and microcontroller. Since many years, impeccable security system has been the prime need of every man who owns a house. The increasing crime rate has further pressed the need for it. Our system is an initiative in this direction. The system provides security function by monitoring the surroundings at home for intruders, fire, gas leakages etc. using sensors and issue alerts to the owners and local authorities by using GSM via SMS. It provides the automation function as it can control (On/Off the various home appliances while the owners are away via SMS. Thus the Automated Home Security System is self-sufficient and can be relied upon undoubtedly. Also, it is capable of establishing two way communication with its owner so that he/she can keep a watch on his/her home via sensor information or live video streaming. A camera can be installed for continuous monitoring of the system and its surroundings. The system consists of two main parts: hardware and software. Hardware consists of Microcontroller, Sensors, Buzzer and GSM modem while software is implemented by tools using Embedded ‘C’.

  3. Kajian Tekno-ekonomi Reaktor Inovatif Iris-350

    OpenAIRE

    Lumbanraja, Sahala Maruli; Rijanti, Arum Puni; Bastori, Imam

    2005-01-01

    THE TECHNO-ECONOMIC STUDY OF INNOVATIVE REACTOR IRIS-350. Disturbance of security of electricity supply in Indonesia, especially in Jawa-Madura-Bali grid system should be addressed wisely. The disturbance in electricity supply maybe resulted from the rise of hydrocarbon fuel prices as well as only a few of power plants in operation. This problem may impose negative effect to the national socio economic system. NPP may become one of viable options to support the security of electricity supply,...

  4. First defense. Using design elements to strengthen security efforts.

    Science.gov (United States)

    Hodgson, Karyn

    2003-03-01

    Security is on every health care facility's agenda these days. They wonder what they can or should do to prepare for terrorist attacks, while facing the same security concerns they always have in the emergency room, maternity ward and pharmacies. While there is no shortage of suggested "solutions" out there, facilities first need to take a step back and assess what their needs are. And while some existing facilities are too often stuck with "reactionary" security--adding metal detectors to an ER after a shooting, or putting cameras on a storage area that has experienced thefts, for example--those hospitals undergoing new construction may now have a golden opportunity to be more proactive.

  5. Used fuel extended storage security and safeguards by design roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Durbin, Samuel G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lindgren, Eric Richard [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Robert [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Ketusky, Edward [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); England, Jeffrey [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Scherer, Carolynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Sprinkle, James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Miller, Michael. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rauch, Eric [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Scaglione, John [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Dunn, T. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-05-01

    In the United States, spent nuclear fuel (SNF) is safely and securely stored in spent fuel pools and dry storage casks. The available capacity in spent fuel pools across the nuclear fleet has nearly reached a steady state value. The excess SNF continues to be loaded in dry storage casks. Fuel is expected to remain in dry storage for periods beyond the initial dry cask certification period of 20 years. Recent licensing renewals have approved an additional 40 years. This report identifies the current requirements and evaluation techniques associated with the safeguards and security of SNF dry cask storage. A set of knowledge gaps is identified in the current approaches. Finally, this roadmap identifies known knowledge gaps and provides a research path to deliver the tools and models needed to close the gaps and allow the optimization of the security and safeguards approaches for an interim spent fuel facility over the lifetime of the storage site.

  6. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2015-07-01

    Full Text Available Information technology (IT security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.

  7. Does iris change over time?

    Directory of Open Access Journals (Sweden)

    Hunny Mehrotra

    Full Text Available Iris as a biometric identifier is assumed to be stable over a period of time. However, some researchers have observed that for long time lapse, the genuine match score distribution shifts towards the impostor score distribution and the performance of iris recognition reduces. The main purpose of this study is to determine if the shift in genuine scores can be attributed to aging or not. The experiments are performed on the two publicly available iris aging databases namely, ND-Iris-Template-Aging-2008-2010 and ND-TimeLapseIris-2012 using a commercial matcher, VeriEye. While existing results are correct about increase in false rejection over time, we observe that it is primarily due to the presence of other covariates such as blur, noise, occlusion, and pupil dilation. This claim is substantiated with quality score comparison of the gallery and probe pairs.

  8. Does iris change over time?

    Science.gov (United States)

    Mehrotra, Hunny; Vatsa, Mayank; Singh, Richa; Majhi, Banshidhar

    2013-01-01

    Iris as a biometric identifier is assumed to be stable over a period of time. However, some researchers have observed that for long time lapse, the genuine match score distribution shifts towards the impostor score distribution and the performance of iris recognition reduces. The main purpose of this study is to determine if the shift in genuine scores can be attributed to aging or not. The experiments are performed on the two publicly available iris aging databases namely, ND-Iris-Template-Aging-2008-2010 and ND-TimeLapseIris-2012 using a commercial matcher, VeriEye. While existing results are correct about increase in false rejection over time, we observe that it is primarily due to the presence of other covariates such as blur, noise, occlusion, and pupil dilation. This claim is substantiated with quality score comparison of the gallery and probe pairs.

  9. Improvement of Varioptic's liquid lens based on electrowetting: how to obtain a short response time and its application in the design of a high resolution iris biometric system

    Science.gov (United States)

    Burger, Benjamin; Meimon, Serge C.; Petit, Cyril; Nguyen, Minh Chau

    2015-02-01

    This communication presents the results obtained for decreasing the response time of electrowetting-based real time focus correctors (liquid lenses). In order to provide a compact iris biometric system demonstrator, we have achieved a response time at 90% of 7.5 ms for a change in focalization from 0 diopter to 10 diopter with a liquid lens having an aperture of 1.9 mm. We have used a hydrodynamic fluid reorganization model to predict the features of these fast liquid lenses and evaluated the sensivity of the response time to the different conception parameters.

  10. Safeguards and Security by Design (SSBD) for Small Modular Reactors (SMRs) through a Common Global Approach

    Energy Technology Data Exchange (ETDEWEB)

    Badwan, Faris M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Demuth, Scott Francis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Miller, Michael Conrad [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Pshakin, Gennady [Obninsk Institute of Physics and Power Engineering (Russian Federation)

    2015-02-23

    Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fully integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may

  11. Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Wang, Jiong; Zhang, Hua

    2017-09-01

    In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social production and life. In this context, in order to further to enhance the stability of wireless network data transmission and security enhancements, the staff need to focus on routing security and carry out related work. Based on this, this paper analyzes the design of wireless sensor based on secure routing protocol.

  12. An aspect-oriented methodology for designing secure applications

    NARCIS (Netherlands)

    Georg, Geri; Ray, Indrakshi; Anastasakis, Kyriakos; Bordbar, Behzad; Toahchoodee, Manachai; Houmb, S.H.

    We propose a methodology, based on aspect-oriented modeling (AOM), for incorporating security mechanisms in an application. The functionality of the application is described using the primary model and the attacks are specified using aspects. The attack aspect is composed with the primary model to

  13. The techno-economic study of innovative reactor IRIS-350

    International Nuclear Information System (INIS)

    Sahala M-Lumbanraja; Rr-Arum P-Rijanti; Imam Bustori

    2005-01-01

    Disturbance of security of electricity supply in Indonesia, especially In Jawa-Madura-Bali grid system should be addressed wisely. The disturbance in electricity supply may be resulted from the rise of hydrocarbon fuel prices as well as only a few of power plants in operation. This problem may impose negative effect to the national socioeconomic system. NPP maybe come one of viable options to support the security of electricity supply, and therefore. Some studies regarding the feasibility of NPP operation in Indonesia should be done. This study on techno-economic of an Innovative reactor IRIS-350 is aimed to access technical and economical aspects of the reactor. IRIS-350(International Reactor Innovative and Secure)Is an advanced light water cooled modular reactor being developed by an International consortium led by Westinghouse. This reactor is based on simplified operation & maintenance, enhanced safety, easy to Inspect, short construction time, small Investment cost, competitive generating cost, and easily suited to the Infrastructures. IRIS main characteristic is integral reactor concept, being all the major reactor coolant system components located Inside the pressure vessel. IRIS-350 reactor is very interesting if operated in Indonesia because investment cost less than the large NPP type, but the national participation is very small. (author)

  14. 77 FR 31869 - Iris Lacustris (Dwarf Lake Iris); Draft Recovery Plan for Review and Comment

    Science.gov (United States)

    2012-05-30

    ...-FF03E00000] Iris Lacustris (Dwarf Lake Iris); Draft Recovery Plan for Review and Comment AGENCY: Fish and... lacustris (dwarf lake iris), a species that is federally listed as threatened under the Endangered Species... the course of implementing approved recovery plans. Dwarf Lake Iris The dwarf lake iris was listed as...

  15. Design optimization for security-and safety-critical distributed real-time applications

    DEFF Research Database (Denmark)

    Jiang, Wei; Pop, Paul; Jiang, Ke

    2016-01-01

    In this paper, we are interested in the design of real-time applications with security, safety, timing, and energy requirements. The applications are scheduled with cyclic scheduling, and are mapped on distributed heterogeneous architectures. Cryptographic services are deployed to satisfy security...... security measures for messages, the voltage and frequency levels for tasks, and the schedule tables such that the security and reliability requirements are satisfied, the application is schedulable, and the energy consumption is minimized. We propose a Tabu Search based metaheuristic to solve this problem....... Extensive experiments and a real-life application are conducted to evaluate the proposed techniques....

  16. Iris recognition via plenoptic imaging

    Energy Technology Data Exchange (ETDEWEB)

    Santos-Villalobos, Hector J.; Boehnen, Chris Bensing; Bolme, David S.

    2017-11-07

    Iris recognition can be accomplished for a wide variety of eye images by using plenoptic imaging. Using plenoptic technology, it is possible to correct focus after image acquisition. One example technology reconstructs images having different focus depths and stitches them together, resulting in a fully focused image, even in an off-angle gaze scenario. Another example technology determines three-dimensional data for an eye and incorporates it into an eye model used for iris recognition processing. Another example technology detects contact lenses. Application of the technologies can result in improved iris recognition under a wide variety of scenarios.

  17. [Principles and methodology for ecological rehabilitation and security pattern design in key project construction].

    Science.gov (United States)

    Chen, Li-Ding; Lu, Yi-He; Tian, Hui-Ying; Shi, Qian

    2007-03-01

    Global ecological security becomes increasingly important with the intensive human activities. The function of ecological security is influenced by human activities, and in return, the efficiency of human activities will also be affected by the patterns of regional ecological security. Since the 1990s, China has initiated the construction of key projects "Yangtze Three Gorges Dam", "Qinghai-Tibet Railway", "West-to-East Gas Pipeline", "West-to-East Electricity Transmission" and "South-to-North Water Transfer" , etc. The interaction between these projects and regional ecological security has particularly attracted the attention of Chinese government. It is not only important for the regional environmental protection, but also of significance for the smoothly implementation of various projects aimed to develop an ecological rehabilitation system and to design a regional ecological security pattern. This paper made a systematic analysis on the types and characteristics of key project construction and their effects on the environment, and on the basis of this, brought forward the basic principles and methodology for ecological rehabilitation and security pattern design in this construction. It was considered that the following issues should be addressed in the implementation of a key project: 1) analysis and evaluation of current regional ecological environment, 2) evaluation of anthropogenic disturbances and their ecological risk, 3) regional ecological rehabilitation and security pattern design, 4) scenario analysis of environmental benefits of regional ecological security pattern, 5) re-optimization of regional ecological system framework, and 6) establishment of regional ecosystem management plan.

  18. Efficient iris texture analysis method based on Gabor ordinal measures

    Science.gov (United States)

    Tajouri, Imen; Aydi, Walid; Ghorbel, Ahmed; Masmoudi, Nouri

    2017-07-01

    With the remarkably increasing interest directed to the security dimension, the iris recognition process is considered to stand as one of the most versatile technique critically useful for the biometric identification and authentication process. This is mainly due to every individual's unique iris texture. A modestly conceived efficient approach relevant to the feature extraction process is proposed. In the first place, iris zigzag "collarette" is extracted from the rest of the image by means of the circular Hough transform, as it includes the most significant regions lying in the iris texture. In the second place, the linear Hough transform is used for the eyelids' detection purpose while the median filter is applied for the eyelashes' removal. Then, a special technique combining the richness of Gabor features and the compactness of ordinal measures is implemented for the feature extraction process, so that a discriminative feature representation for every individual can be achieved. Subsequently, the modified Hamming distance is used for the matching process. Indeed, the advanced procedure turns out to be reliable, as compared to some of the state-of-the-art approaches, with a recognition rate of 99.98%, 98.12%, and 95.02% on CASIAV1.0, CASIAV3.0, and IIT Delhi V1 iris databases, respectively.

  19. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  20. Shape adaptive, robust iris feature extraction from noisy iris images.

    Science.gov (United States)

    Ghodrati, Hamed; Dehghani, Mohammad Javad; Danyali, Habibolah

    2013-10-01

    In the current iris recognition systems, noise removing step is only used to detect noisy parts of the iris region and features extracted from there will be excluded in matching step. Whereas depending on the filter structure used in feature extraction, the noisy parts may influence relevant features. To the best of our knowledge, the effect of noise factors on feature extraction has not been considered in the previous works. This paper investigates the effect of shape adaptive wavelet transform and shape adaptive Gabor-wavelet for feature extraction on the iris recognition performance. In addition, an effective noise-removing approach is proposed in this paper. The contribution is to detect eyelashes and reflections by calculating appropriate thresholds by a procedure called statistical decision making. The eyelids are segmented by parabolic Hough transform in normalized iris image to decrease computational burden through omitting rotation term. The iris is localized by an accurate and fast algorithm based on coarse-to-fine strategy. The principle of mask code generation is to assign the noisy bits in an iris code in order to exclude them in matching step is presented in details. An experimental result shows that by using the shape adaptive Gabor-wavelet technique there is an improvement on the accuracy of recognition rate.

  1. Select Generic Dry-Storage Pilot Plant Design for Safeguards and Security by Design (SSBD) per Used Fuel Campaign

    Energy Technology Data Exchange (ETDEWEB)

    Demuth, Scott Francis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Sprinkle, James K. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-26

    As preparation to the year-end deliverable (Provide SSBD Best Practices for Generic Dry-Storage Pilot Scale Plant) for the Work Package (FT-15LA040501–Safeguards and Security by Design for Extended Dry Storage), the initial step was to select a generic dry-storage pilot plant design for SSBD. To be consistent with other DOE-NE Fuel Cycle Research and Development (FCR&D) activities, the Used Fuel Campaign was engaged for the selection of a design for this deliverable. For the work Package FT-15LA040501–“Safeguards and Security by Design for Extended Dry Storage”, SSBD will be initiated for the Generic Dry-Storage Pilot Scale Plant described by the layout of Reference 2. SSBD will consider aspects of the design that are impacted by domestic material control and accounting (MC&A), domestic security, and international safeguards.

  2. Academy Distance Learning Tools (IRIS) -

    Data.gov (United States)

    Department of Transportation — IRIS is a suite of front-end web applications utilizing a centralized back-end Oracle database. The system fully supports the FAA Academy's Distance Learning Program...

  3. Integrated Risk Information System (IRIS)

    Data.gov (United States)

    U.S. Environmental Protection Agency — EPA?s Integrated Risk Information System (IRIS) is a compilation of electronic reports on specific substances found in the environment and their potential to cause...

  4. Design of a Secure System Considering Quality of Service

    Directory of Open Access Journals (Sweden)

    Seondong Heo

    2014-11-01

    Full Text Available Improvements in networking technologies have provided users with useful information services. Such information services may bring convenience and efficiency, but might be accompanied by vulnerabilities to a variety of attacks. Therefore, a variety of research to enhance the security of the systems and get the services at the same time has been carried out. Especially, research on intrusion-tolerant systems (ITSs has been conducted in order to survive against every intrusion, rather than to detect and prevent them. In this paper, an ITS based on effective resource conversion (ERC is presented to achieve the goal of intrusion-tolerance. Instead of using the fixed number of virtual machines (VMs to process requests and recover as in conventional approaches, the ITS based on ERC can transform the assigned resources depending on the system status. This scheme is proved to maintain a certain level of quality of service (QoS and quality of security service (QoSS in threatening environments. The performance of ERC is compared with previous studies on ITS by CSIM 20, and it is verified that the proposed scheme is more effective in retaining a specific level of QoS and QoSS.

  5. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    Science.gov (United States)

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  6. Selection of security system design via games of imperfect information and multi-objective genetic algorithm

    International Nuclear Information System (INIS)

    Lins, Isis Didier; Rêgo, Leandro Chaves; Moura, Márcio das Chagas

    2013-01-01

    This work analyzes the strategic interaction between a defender and an intelligent attacker by means of a game and reliability framework involving a multi-objective approach and imperfect information so as to support decision-makers in choosing efficiently designed security systems. A multi-objective genetic algorithm is used to determine the optimal security system's configurations representing the tradeoff between the probability of a successful defense and the acquisition and operational costs. Games with imperfect information are considered, in which the attacker has limited knowledge about the actual security system. The types of security alternatives are readily observable, but the number of redundancies actually implemented in each security subsystem is not known. The proposed methodology is applied to an illustrative example considering power transmission lines in the Northeast of Brazil, which are often targets for attackers who aims at selling the aluminum conductors. The empirical results show that the framework succeeds in handling this sort of strategic interaction. -- Highlights: ► Security components must have feasible costs and must be reliable. ► The optimal design of security systems considers a multi-objective approach. ► Games of imperfect information enable the choice of non-dominated configurations. ► MOGA, reliability and games support the entire defender's decision process. ► The selection of effective security systems may discourage attacker's actions

  7. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

    Science.gov (United States)

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-06

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  8. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-01-01

    Full Text Available Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3 design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  9. Security

    OpenAIRE

    Leander, Anna

    2009-01-01

    This paper argues that security belongs to a specific category of commodities: “contested commodities” around which there is an ongoing and unsettled symbolic struggle over whether or not they can and should be though of as commodities (section 1). The contested nature of commodification has implications for how markets function; market practices tend to be defined and organized in ways that minimize their contentiousness and obfuscate their expansion. The paper looks at the implications of t...

  10. ANTIMICROBIAL ACTIVITY OF EXTRACTS OF IRIS HUNGARICA AND IRIS SIBIRICA

    Directory of Open Access Journals (Sweden)

    Kovalev V. M.

    2017-06-01

    Full Text Available Introduction. Referring to the latest data, infectious diseases command a large part of among the total number of pathologies in the world and are an important problem in medicine. The leading role in prevention and treatment of diseases of microbial origin belongs to antibacterial chemotherapeutic agents. Advantages of antibiotics of synthetic origin are the high activity compared to phytogenic drugs. But it is known that microorganisms can release the resistance to synthetic antibiotics, so the use of drugs based on the plant materials is appropriate: phytogenic drugs more rarely induce the formation of resistance of the strains of microorganisms, they have a gentle action, can be used for a long-term, have the low cost. Therefore, it is appropriate to examine the drug plants with the aim of determination their antibacterial activity.Iris hungarica Waldst et Kit. and Iris sibirica L. are the representatives of the family Iridaceae, genus Iris and they have a wide spectrum of the pharmacological activity. Biologically active substances that were recovered from plants of the genus Iris (tectoridin, iristectorigenin B, nigracin, kaempferol, quercetin, etc. exhibited an antitumor, antimicrobial, estrogenic, insecticidal, antiplasmatic, anticholinesterase action, they were the inhibitors of enzymes and exhibited the immunomodulatory properties, which made these plants perspective for the research study. Raw materials Irises are constituent components of more than 9 medicines. Materials and Methods. The objects of the study were the leaves and rhizomes of Iris hungarica and Iris sibirica that were prepared during the growing season in 2014 in the M.M. Gryshko National botanical garden (Kiev, Ukraine. The dry and lipophilic extracts from the leaves and rhizomes of Irises were used to establish the antimicrobial activity. For the study of extracts antimicrobial activity was used agar well diffusion method. According to the WHO recommendations the

  11. On the Design of Forgiving Biometric Security Systems

    Science.gov (United States)

    Phan, Raphael C.-W.; Whitley, John N.; Parish, David J.

    This work aims to highlight the fundamental issue surrounding biometric security systems: it’s all very nice until a biometric is forged, but what do we do after that? Granted, biometric systems are by physical nature supposedly much harder to forge than other factors of authentication since biometrics on a human body are by right unique to the particular human person. Yet it is also due to this physical nature that makes it much more catastrophic when a forgery does occur, because it implies that this uniqueness has been forged as well, threatening the human individuality; and since crime has by convention relied on identifying suspects by biometric characteristics, loss of this biometric uniqueness has devastating consequences on the freedom and basic human rights of the victimized individual. This uniqueness forgery implication also raises the motivation on the adversary to forge since a successful forgery leads to much more impersonation situations when biometric systems are used i.e. physical presence at crime scenes, identification and access to security systems and premises, access to financial accounts and hence the ability to use the victim’s finances. Depending on the gains, a desperate highly motivated adversary may even resort to directly obtaining the victim’s biometric parts by force e.g. severing the parts from the victim’s body; this poses a risk and threat not just to the individual’s uniqueness claim but also to personal safety and well being. One may then wonder if it is worth putting one’s assets, property and safety into the hands of biometrics based systems when the consequences of biometric forgery far outweigh the consequences of system compromises when no biometrics are used.

  12. Design concept of CSRAS (Cyber Security Risk Analysis and Assessment System) for digital I and C systems

    International Nuclear Information System (INIS)

    Song, J. G.; Lee, J. W.; Lee, D. Y.; Lee, C. K.

    2012-01-01

    The instrumentation and control (I and C) systems in nuclear power plants (NPPs) have been digitalized recently. Hence, cyber security becomes an important feature to be incorporated into the I and C systems. The Regulatory Guide 5.71 published by U.C NRC in 2010 presents a comprehensive set of security controls for the cyber security of I and C systems in NPPs. However, the application of security controls specified in the RG 5.71 in a specific I and C system still requires many analysis efforts based on the understanding of the security controls, since the guideline does not provide the details to system designers or developers regarding what, where, and how to apply the security controls. To apply security controls to I and C systems, cyber security requirements should be identified based on the cyber security policy and program, then the design and implementation of security controls should be performed along with the I and C system development life cycle. It can be assumed that cyber security requirements are identified during the system design(SD) phase and the design and implementation of security controls is performed during the component design(CD) phase. When identifying security requirements and performing the design and implementation of security controls, cyber security risk assessments should be processed with the understanding of the characteristics of target systems. In this study, the Cyber Security Risk Analysis and Assessment System (CSRAS) has been developed as a tool for analyzing security requirements and technical security controls considering based on a general cyber security risk assessment procedure with the consideration of the characteristics of I and C systems and the development phases

  13. Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform

    Directory of Open Access Journals (Sweden)

    Jinyu Lu

    2014-01-01

    Full Text Available A novel iris biometric watermarking scheme is proposed focusing on iris recognition instead of the traditional watermark for increasing the security of the digital products. The preprocess of iris image is to be done firstly, which generates the iris biometric template from person's eye images. And then the templates are to be on discrete cosine transform; the value of the discrete cosine is encoded to BCH error control coding. The host image is divided into four areas equally correspondingly. The BCH codes are embedded in the singular values of each host image's coefficients which are obtained through discrete cosine transform (DCT. Numerical results reveal that proposed method can extract the watermark effectively and illustrate its security and robustness.

  14. Conceptual Design Approach to Implementing Hardware-based Security Controls in Data Communication Systems

    International Nuclear Information System (INIS)

    Ibrahim, Ahmad Salah; Jung, Jaecheon

    2016-01-01

    In the Korean Advanced Power Reactor (APR1400), safety control systems network is electrically isolated and physically separated from non-safety systems data network. Unidirectional gateways, include data diode fiber-optic cabling and computer-based servers, transmit the plant safety critical parameters to the main control room (MCR) for control and monitoring processes. The data transmission is only one-way from safety to non-safety. Reverse communication is blocked so that safety systems network is protected from potential cyberattacks or intrusions from non-safety side. Most of commercials off-the-shelf (COTS) security devices are software-based solutions that require operating systems and processors to perform its functions. Field Programmable Gate Arrays (FPGAs) offer digital hardware solutions to implement security controls such as data packet filtering and deep data packet inspection. This paper presents a conceptual design to implement hardware-based network security controls for maintaining the availability of gateway servers. A conceptual design of hardware-based network security controls was discussed in this paper. The proposed design is aiming at utilizing the hardware-based capabilities of FPGAs together with filtering and DPI functions of COTS software-based firewalls and intrusion detection and prevention systems (IDPS). The proposed design implemented a network security perimeter between the DCN-I zone and gateway servers zone. Security control functions are to protect the gateway servers from potential DoS attacks that could affect the data availability and integrity

  15. Conceptual Design Approach to Implementing Hardware-based Security Controls in Data Communication Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, Ahmad Salah; Jung, Jaecheon [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2016-10-15

    In the Korean Advanced Power Reactor (APR1400), safety control systems network is electrically isolated and physically separated from non-safety systems data network. Unidirectional gateways, include data diode fiber-optic cabling and computer-based servers, transmit the plant safety critical parameters to the main control room (MCR) for control and monitoring processes. The data transmission is only one-way from safety to non-safety. Reverse communication is blocked so that safety systems network is protected from potential cyberattacks or intrusions from non-safety side. Most of commercials off-the-shelf (COTS) security devices are software-based solutions that require operating systems and processors to perform its functions. Field Programmable Gate Arrays (FPGAs) offer digital hardware solutions to implement security controls such as data packet filtering and deep data packet inspection. This paper presents a conceptual design to implement hardware-based network security controls for maintaining the availability of gateway servers. A conceptual design of hardware-based network security controls was discussed in this paper. The proposed design is aiming at utilizing the hardware-based capabilities of FPGAs together with filtering and DPI functions of COTS software-based firewalls and intrusion detection and prevention systems (IDPS). The proposed design implemented a network security perimeter between the DCN-I zone and gateway servers zone. Security control functions are to protect the gateway servers from potential DoS attacks that could affect the data availability and integrity.

  16. System and prospect assesment of the small innovative reactor IRIS-50

    International Nuclear Information System (INIS)

    Lumbanraja, Sahala M.; Wibowo

    2002-01-01

    System and prospect of the small innovative reactor IRIS-50 in Indonesia have been studied. IRIS-50 (International Reactor Innovative and Secure) is an advanced light water cooled modular reactor being developed by an international consortium led by Westinghouse. This reactor is specifically developed to match market demands, or to developing country. This reactor is based on simplified operation and maintenance, enhanced and safety, easy to inspect, short construction time, small investment cost, competitive generating cost, and easily suited to the infrastructures. IRIS main characteristic is integral reactor concept, being all the major reactor coolant system components located inside the pressure vessel

  17. Crime prevention in terms of designing public space and the role of private security

    Directory of Open Access Journals (Sweden)

    Stajić Ljubomir S.

    2015-01-01

    Full Text Available Concern about the security of public spaces has become increasingly important in the last thirty years, both in the public service (police and in private security which is responsible for protection of individual private facilities. It has been concluded that the study of public space design in terms of security is as important as the study of social and other factors of criminal behavior. Modern architectural solutions must take into account a design of space and facilities that prevents and obstructs the exercise of criminal actions to a maximum. Security design should make crime dangerous, less desirable and less justified, i.e. it should change the perception that potential criminals have of the risks of criminal behavior in terms of greater opportunities for its detection and arrest. The paper presents the criteria which should be followed when designing a public space, its effect on the behavior of criminals and notes on how badly designed public space reduces the effects of formal oversight by private security guards and the police. Most of the work is related to the case study of Block 21 in New Belgrade as a typical representative of the public space that has undergone numerous transformations over the past 50 years. There are very important indicators of how design changes of the area affected the state of crime.

  18. Designing Security-Hardened Microkernels For Field Devices

    Science.gov (United States)

    Hieb, Jeffrey; Graham, James

    Distributed control systems (DCSs) play an essential role in the operation of critical infrastructures. Perimeter field devices are important DCS components that measure physical process parameters and perform control actions. Modern field devices are vulnerable to cyber attacks due to their increased adoption of commodity technologies and that fact that control networks are no longer isolated. This paper describes an approach for creating security-hardened field devices using operating system microkernels that isolate vital field device operations from untrusted network-accessible applications. The approach, which is influenced by the MILS and Nizza architectures, is implemented in a prototype field device. Whereas, previous microkernel-based implementations have been plagued by poor inter-process communication (IPC) performance, the prototype exhibits an average IPC overhead for protected device calls of 64.59 μs. The overall performance of field devices is influenced by several factors; nevertheless, the observed IPC overhead is low enough to encourage the continued development of the prototype.

  19. Iris color and visual functions.

    Science.gov (United States)

    Nischler, Christian; Michael, Ralph; Wintersteller, Christine; Marvan, Patrick; van Rijn, Laurentius J; Coppens, Joris E; van den Berg, Thomas J T P; Emesz, Martin; Grabner, Günther

    2013-01-01

    The aim of this study was to evaluate if iris color is associated with differences in visual functions such as intraocular straylight (IOSL), contrast sensitivity (CS), or best-corrected visual acuity (BCVA). In this retrospective cohort study, which is a subgroup analysis of a large prospective trial about visual impairments in European car drivers, we included 853 persons between 20 and 80 years of age and without a history of ocular surgery or any eye disease including cataract. Subjects participated in an ophthalmological examination, grading of lens opacity, and the measurement of visual functions such as IOSL, CS, and BCVA. Dependent on iris color, participants were divided into four groups: light-blue, blue-grey, green-hazel, and brown. Independent of age, IOSL was significantly (all p values colored iris (1.14 log(IOSL) [95 % CI: 1.11-1.17]) compared to participants with blue-grey (1.07 log(IOSL) [95 % CI: 1.05-1.09]), green-hazel (1.06 log(IOSL) [95 % CI: 1.04-1.08]) or brown (1.06 log(IOSL) [95 % CI: 1.04-1.08]) iris color. CS was also lower in participants with light-blue pigmented irises (1.60 log(CS) [95 % CI: 1.58-1.62]) than in the other groups, but statistically significant (p = 0.013, Fisher's LSD test) only compared to brown iris color. For BCVA we could not found any difference between the four groups. We could show in this study that iris color has a significant impact on IOSL and to a lower degree on CS, but not on BCVA. Persons with light-blue iris color who showed significantly higher IOSL values therefore may experience disability glare in daily situations such as driving at night more often than others.

  20. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings

    Directory of Open Access Journals (Sweden)

    SK Hafizul Islam

    2014-01-01

    Full Text Available The proxy signature, a variant of the ordinary digital signature, has been an active research topic in recent years; it has many useful applications, including distributed systems and grid computing. Although many identity-based proxy signature schemes have been proposed in the literature, only a few proposals for identity-based strong designated verifier proxy signature (ID-SDVPS schemes are available. However, it has been found that most of the ID-SDVPS schemes that have been proposed to date are not efficient in terms of computation and security, and a computationally efficient and secured ID-SDVPS scheme using elliptic curve bilinear pairing has been proposed in this paper. The security of the scheme is mainly based on the hardness assumption of CDH and GBDH problems in the random oracle model, which is existentially unforgeable against different types of adversaries. Furthermore, the security of our scheme is simulated in the AVISPA (Automated Validation of Internet Security Protocols and Applications software, a widely used automated internet protocol validation tool, and the simulation results confirm strong security against both active and passive attacks. In addition, because of a high processing capability and supporting additional security features, the scheme is suitable for the environments in which less computational cost with strong security is required.

  1. Designing, Capturing and Validating History-Sensitive Security Policies for Distributed Systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We consider the use of Aspect-oriented techniques as a flexible way to deal with security policies in distributed systems. We follow the approach of attaching security policies to the relevant locations that must be governed by them, and then combining them at runtime according to the interactions...... policies in a distributed system, either with or without exploring the entire state space....... has the capability of combining both history-sensitive and future-sensitive policies, providing even more flexibility and power. Moreover, we propose a global Logic for reasoning about the systems designed with this language. We show how the Logic can be used to validate the combination of security...

  2. Semantically Aware Foundation Environment (SAFE) for Clean-Slate Design of Resilient, Adaptive Secure Hosts (CRASH)

    Science.gov (United States)

    2016-02-01

    SUBJECT TERMS secure computing, non- interference , memory-safety, co-design 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT: SAR 18...perimeter protection, patch, and pray” is not aligned with the threat. Programmers will not bail us out of this situation (by writing defect free code... interference property of a subset of the application programming language. Much work remains to be done and these areas will be discussed in the

  3. A CAREM reactor's design evaluation from the nuclear security point of view

    International Nuclear Information System (INIS)

    Kay, J.M.; Felizia, E.R.; Navarro, N.R.; Caruso, G.J.

    1990-01-01

    The main objective of this work is to define the adequate rules for CAREM reactor security systems design and processes which aim to assure verification of the CALIN regulations 'Radiological Criteria' in relation to accidents concerning CAREM reactor design. (Author) [es

  4. 62129 - HyspIRI and ECOSTRESS

    Science.gov (United States)

    Hook, S. J.; Fisher, J. B.; Hulley, G. C.; Anderson, M. C.; French, A. N.; Hain, C.; Allen, R. G.

    2015-12-01

    In 2007 the National Research Council (NRC) released the results from the first Earth Science Decadal Survey (DS) in a report titled Earth Science and Applications from Space: National Imperatives for the next Decade and Beyond [NRC 2007]. The purpose of DS study was to provide NASA with a mission roadmap for the subsequent 10 years together with the high priority science and societal questions that needed to be addressed. One of the missions recommended was The Hyperspectral and Infrared Imager (HyspIRI). The HyspIRI mission includes a visible-shortwave infrared (VSWIR) imaging spectrometer and a multispectral thermal infrared (TIR) scanner together with an onboard data processing/downlink system referred to as the Intelligent Payload Module (IPM). The TIR instrument will acquire data in 8 discrete spectral bands between 4 and 12 μm for each pixel, have a revisit of 5 days and a spatial resolution of 60 m. Both instruments will provide global observations over the land surface and surrounding shallow waters. Over the deeper oceans the data will be resampled to 1 km spatial resolution. The HyspIRI-TIR instrument is a multispectral TIR scanner with 8 spectral bands. Seven of the eight bands are between 7.5 and 12 um and the remaining band is at 4 μm and designed specifically for the detection of hot targets. As part of the TIR risk reduction studies the NASA Earth Science Technology Office (ESTO) supported the development of the Prototype HyspIRI Thermal Infrared Radiometer (PHyTIR) for engineering risk reduction. The PHyTIR instrument was developed to demonstrate that the HyspIRI-TIR hardware would perform correctly in a space environment. PHyTIR was a space-flight ready laboratory engineering model. In 2014 PHyTIR was selected for deployment to the International Space Station (ISS) as part of the ECOsystem Spaceborne Thermal Radiometer Experiment on the Space Station (ECOSTRESS) mission. ECOSTRESS will use 6 of the 8 available bands from PHyTIR. It will have a

  5. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design

    NARCIS (Netherlands)

    Selimis, G.; Huang, L.; Massé, F.; Tsekoura, I.; Ashouei, M.; Catthoor, F.; Huisken, J.; Stuyt, J.; Dolmans, G.; Penders, J.; Groot, H. de

    2011-01-01

    In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating

  6. Iris Template Protection Based on Local Ranking

    Directory of Open Access Journals (Sweden)

    Dongdong Zhao

    2018-01-01

    Full Text Available Biometrics have been widely studied in recent years, and they are increasingly employed in real-world applications. Meanwhile, a number of potential threats to the privacy of biometric data arise. Iris template protection demands that the privacy of iris data should be protected when performing iris recognition. According to the international standard ISO/IEC 24745, iris template protection should satisfy the irreversibility, revocability, and unlinkability. However, existing works about iris template protection demonstrate that it is difficult to satisfy the three privacy requirements simultaneously while supporting effective iris recognition. In this paper, we propose an iris template protection method based on local ranking. Specifically, the iris data are first XORed (Exclusive OR operation with an application-specific string; next, we divide the results into blocks and then partition the blocks into groups. The blocks in each group are ranked according to their decimal values, and original blocks are transformed to their rank values for storage. We also extend the basic method to support the shifting strategy and masking strategy, which are two important strategies for iris recognition. We demonstrate that the proposed method satisfies the irreversibility, revocability, and unlinkability. Experimental results on typical iris datasets (i.e., CASIA-IrisV3-Interval, CASIA-IrisV4-Lamp, UBIRIS-V1-S1, and MMU-V1 show that the proposed method could maintain the recognition performance while protecting the privacy of iris data.

  7. Reliability of iris recognition as a means of identity verification and future impact on transportation worker identification credential

    OpenAIRE

    McLaren, Simon R.

    2008-01-01

    The Department of Homeland Security is deploying the Transportation Worker Identification Credential (TWIC) to U.S. ports to help ensure only authorized individuals having undergone background checks have access to secure areas. Congress mandated the TWIC have a biometric authenticator; DHS chose fingerprints. This thesis argues iris scanning is a better choice because of the nature of the maritime environment and because iris scanning is a more accurate biometric. This thesis also argues th...

  8. Design and visualization of synthetic holograms for security applications

    International Nuclear Information System (INIS)

    Škeren, M; Nývlt, M; Svoboda, J

    2013-01-01

    In this paper we present a software for the design and visualization of holographic elements containing full scale of visual effects. It enables to simulate an observation of the holographic elements under general conditions including different light sources with various spectral and coherence properties and various geometries of reconstruction. Furthermore, recent technologies offer interesting possibilities for the 3D visualization such as the 3D techniques based on shutter or polarization glasses, anaglyphs, etc. The presented software is compatible with the mentioned techniques and enables an application of the 3D hardware tools for visualization. The software package can be used not only for visualization of the existing designs, but also for a fine tuning of the spatial, kinetic, and color properties of the hologram. Moreover, the holograms containing all types of the 3D effects, general color mixing, kinetic behavior, diffractive cryptograms, etc. can be translated using the software directly to a high resolution micro-structure.

  9. SCAN secure processor and its biometric capabilities

    Science.gov (United States)

    Kannavara, Raghudeep; Mertoguno, Sukarno; Bourbakis, Nikolaos

    2011-04-01

    This paper presents the design of the SCAN secure processor and its extended instruction set to enable secure biometric authentication. The SCAN secure processor is a modified SparcV8 processor architecture with a new instruction set to handle voice, iris, and fingerprint-based biometric authentication. The algorithms for processing biometric data are based on the local global graph methodology. The biometric modules are synthesized in reconfigurable logic and the results of the field-programmable gate array (FPGA) synthesis are presented. We propose to implement the above-mentioned modules in an off-chip FPGA co-processor. Further, the SCAN-secure processor will offer a SCAN-based encryption and decryption of 32 bit instructions and data.

  10. Integration of the security systems in the architectural design of nuclear and important buildings in Egypt

    International Nuclear Information System (INIS)

    Algohary, S.

    2007-01-01

    The new and emerging threats to buildings and infrastructure which are faced by todays engineering design and facility management community in Egypt demand new approaches and solutions that are innovative and increasingly based on risk management principles. In the wake of the damage of Taba hotel in south Sinai (2004) and Sharm El-Sheik hotels in Egypt (July, 2005), there was a growing awareness of public vulnerability to terrorist attacks. This awareness leads to increase the expectations form and responsibilities of the architects, engineers and construction professionals This study reviews and assesses different types of threats to nuclear and important buildings. It identifies also the architectural design, vulnerability and risk management that can enhance security. It also introduces a new approach for integration of architectural design and security in nuclear and important buildings in Egypt. The results shows that escalating threats and risks to important buildings and infrastructures change the role of planners, architects, engineers and builders by increasing the focus on the importance of applying viable security principles to the building designs. Architects in Egypt can assume an important role in improving the life-safety features of important buildings by increasing and integrating new security principles and approaches to improve the security and performance of the buildings against man made disasters

  11. IRIS Toxicological Review of Acrolein (2003 Final)

    Science.gov (United States)

    EPA announced the release of the final report, Toxicological Review of Acrolein: in support of the Integrated Risk Information System (IRIS). The updated Summary for Acrolein and accompanying toxicological review have been added to the IRIS Database.

  12. Quality assessment for online iris images

    CSIR Research Space (South Africa)

    Makinana, S

    2015-01-01

    Full Text Available Iris recognition systems have attracted much attention for their uniqueness, stability and reliability. However, performance of this system depends on quality of iris image. Therefore there is a need to select good quality images before features can...

  13. Eyelid Localization for Iris Identification

    Directory of Open Access Journals (Sweden)

    T. Ea

    2008-12-01

    Full Text Available This article presents a new eyelid localization algorithm based on a parabolic curve fitting. To deal with eyelashes, low contrast or false detection due to iris texture, we propose a two steps algorithm. First, possible edge candidates are selected by applying edge detection on a restricted area inside the iris. Then, a gradient maximization is applied along every parabola, on a larger area, to refine parameters and select the best one. Experiments have been conducted on a database of 151 iris that have been manually segmented. The performance evaluation is carried out by comparing the segmented images obtained by the proposed method with the manual segmentation. The results are satisfactory in more than 90% of the cases.

  14. Automatic quantification of iris color

    DEFF Research Database (Denmark)

    Christoffersen, S.; Harder, Stine; Andersen, J. D.

    2012-01-01

    An automatic algorithm to quantify the eye colour and structural information from standard hi-resolution photos of the human iris has been developed. Initially, the major structures in the eye region are identified including the pupil, iris, sclera, and eyelashes. Based on this segmentation, the ...... is completely data driven and it can divide a group of eye images into classes based on structure, colour or a combination of the two. The methods have been tested on a large set of photos with promising results....... regions. The result is a blue-brown ratio for each eye. Furthermore, an image clustering approach has been used with promising results. The approach is based on using a sparse dictionary of feature vectors learned from a training set of iris regions. The feature vectors contain both local structural...

  15. Influenza and respiratory syncytial virus in infants study (IRIS) of hospitalized and non-ill infants aged <1 year in four countries: study design and methods.

    Science.gov (United States)

    Thompson, Mark G; Hunt, Danielle R; Arbaji, Ali K; Simaku, Artan; Tallo, Veronica L; Biggs, Holly M; Kulb, Carolyn; Gordon, Aubree; Khader, Ilham Abu; Bino, Silvia; Lucero, Marilla G; Azziz-Baumgartner, Eduardo; Shifflett, Pat; Sanchez, Felix; Marar, Basima I; Bakalli, Ilirjana; Simões, Eric A F; Levine, Min Z; Meece, Jennifer K; Balmaseda, Angel; Al-Sanouri, Tareq M; Dhimolea, Majlinda; de Jesus, Joanne N; Thornburg, Natalie J; Gerber, Susan I; Gresh, Lionel

    2017-03-22

    This multi-country prospective study of infants aged respiratory syncytial virus (RSV) infections associated with hospitalizations, to describe clinical features and antibody response to infection, and to examine predictors of very severe disease requiring intensive care. We are enrolling a hospital-based cohort and a sample of non-ill infants in four countries (Albania, Jordan, Nicaragua, and the Philippines) using a common protocol. We are currently starting year 2 of a 2- to 3-year study and will enroll approximately 3,000 infants hospitalized for any acute illness (respiratory or non-respiratory) during periods of local influenza and/or RSV circulation. After informed consent and within 24 h of admission, we collect blood and respiratory specimens and conduct an interview to assess socio-demographic characteristics, medical history, and symptoms of acute illness (onset ≤10 days). Vital signs, interventions, and medications are documented daily through medical record abstraction. A follow-up health assessment and collection of convalescent blood occurs 3-5 weeks after enrollment. Influenza and RSV infection is confirmed by singleplex real time reverse transcriptase polymerase chain reaction (rRT-PCR) assays. Serologic conversion will be assessed comparing acute and convalescent sera using hemagglutination inhibition assay for influenza antibodies and enzyme-linked immunosorbent assay (ELISA) for RSV. Concurrent with hospital-based enrollment, respiratory specimens are also being collected (and tested by rRT-PCR) from approximately 1,400 non-ill infants aged <1 year during routine medical or preventive care. The Influenza and RSV in Infants Study (IRIS) promises to expand our knowledge of the frequency, clinical features, and antibody profiles of serious influenza and RSV disease among infants aged <1 year, quantify the proportion of infections that may be missed by traditional surveillance, and inform decisions about the potential value of existing and new

  16. Integration of holography into the design of bank notes and security documents

    Science.gov (United States)

    Dunn, Paul

    2000-10-01

    The use of holograms and other diffractive optically variable devices have been used successfully in the fight against counterfeiting of security documents for several years. More recently they have become globally accepted as a key security feature on banknotes as reflected in their prime use on the Euronotes to be issues in 2002. The success of the design and origination of these images depends upon their strong visual appeal, their overt and covert content and the ability to offer unique features that provides an extremely difficult barrier for the would be counterfeiter to overcome. The basic design principles both for banknote and general security print application are discussed in this review document. TO be effective as a security device the image must be fit for the purpose. This means that the image must contain the level of overt and covert features that are easy to recognize, containing high level security features and form part of an educational program aimed at the product user and specifically trained security personnel. More specifically it must meet a clearly defined performance criteria.

  17. Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots

    Science.gov (United States)

    Fruth, Jana; Kraetzer, Christian; Dittmann, Jana

    2011-01-01

    In this document a multi-media security warning design approach for automated production scenarios with industrial robots is introduced. This first approach is based on and adapts design principles of common security programs and a German VDI standard for safety warnings design. We focus on direct human-to-robot interaction scenarios, e.g. the online-programming of industrial robots, because of their potential indirect safety impacts, which could be caused by malicious codes infection of a robots control computer. We designed ten different multi-media security warnings, composed of visual and acoustical information. Visual information of warnings is transported via a traffic light metaphor (symbolizing three different threat levels), different warn icons (symbolizing properties of malicious codes) and instructions icons to programmers or operators and additional textual information. With an acknowledgment button in the middle of the warning, the programmer's confirmation of the reception of the warning is verified. Additionally, three different acoustical signals also indicate the threat level of the warning. Furthermore, an evaluation is presented, which uses concepts known from usability testing (method of loud thinking, questionnaire, time measurement). The aim is to evaluate general design criteria of our developed security warnings and tendency of user perception for further advancement of our warnings design.

  18. [Use of computer technologies for studying the morphological characteristics of the iris color in anthropology].

    Science.gov (United States)

    Dorofeeva, A A; Khrustalev, A V; Krylov, Iu V; Bocharov, D A; Negasheva, M A

    2010-01-01

    Digital images of the iris were received for study peculiarities of the iris color during the anthropological examination of 578 students aged 16-24 years. Simultaneously with the registration of the digital images, the visual assessment of the eye color was carried out using the traditional scale of Bunak, based on 12 ocular prostheses. Original software for automatic determination of the iris color based on 12 classes scale of Bunak was designed, and computer version of that scale was developed. The software proposed allows to conduct the determination of the iris color with high validity based on numerical evaluation; its application may reduce the bias due to subjective assessment and methodological divergences of the different researchers. The software designed for automatic determination of the iris color may help develop both theoretical and applied anthropology, it may be used in forensic and emergency medicine, sports medicine, medico-genetic counseling and professional selection.

  19. Security challenges in designing I and C systems for nuclear power plant

    International Nuclear Information System (INIS)

    Behera, Rajendra Prasad; Jayanthi, T.; Madhusoodanan, K.; Satya Murty, S.A.V.

    2016-01-01

    Geographically distributed instrumentation and control (I and C) systems in any nuclear power plant (NPP) facilitate the operator with remote access to real-time data and issue supervisory command to remote control devices deployed in the field. The increased connectivity to plant communication network has exposed I and C systems to security vulnerabilities both in terms of physical and logical access. For example, denial-of service and fault induction attack can disrupt the operation of I and C systems by delaying or blocking the flow of data through plant communication network. The design process of I and C system is quite challenging since an engineer has to consider both safety and security features implemented in hardware and software components of the system. This paper analyzes attack taxonomy based on available data and presents Security Tree Analysis (STA) technique towards building safe and secures I and C systems for Nuclear Power Plant. (author)

  20. Report printer (COBOL IRIS 50)

    International Nuclear Information System (INIS)

    Paul, Daniele

    1973-10-01

    The research thesis reports a detailed study of the Report Writer of the COBOL language in order to integrate it into the IRIS 50 COBOL compiler. In order to use existing compiler processing, the author developed a simulation of the Report Writer by using Cobol statements generated in the declarative part of the Division procedure. After a brief presentation of the IRIS 50 computer, the author presents the general plan of the compiler with modifications and adjunctions exclusively due to the Report Writer. The next part addresses the practical implementation and the problems met and solved during this implementation

  1. CFD modeling of the IRIS pressurizer dynamic

    Energy Technology Data Exchange (ETDEWEB)

    Sanz, Ronny R.; Montesinos, Maria E.; Garcia, Carlos; Bueno, Elizabeth D.; Mazaira, Leorlen R., E-mail: rsanz@instec.cu, E-mail: mmontesi@instec.cu, E-mail: cgh@instec.cu, E-mail: leored1984@gmail.com [Instituto Superior de Tecnologias y Ciencias Aplicadas (InSTEC), La Habana (Cuba); Bezerra, Jair L.; Lira, Carlos A.B. Oliveira, E-mail: jair.lima@ufpe.br, E-mail: cabol@ufpe.br [Universida Federal de Pernambuco (UFPE), Recife, PE (Brazil). Dept. de Energia Nuclear

    2015-07-01

    Integral layout of nuclear reactor IRIS makes possible the elimination of the spray system, which is usually used to mitigate in-surge transient and also help to Boron homogenization. The study of transients with deficiencies in the Boron homogenization in this technology is very important, because they can cause disturbances in the reactor power and insert a strong reactivity in the core. The detailed knowledge of the behavior of multiphase multicomponent flows is challenging due to the complex phenomena and interactions at the interface. In this context, the CFD modeling is employed in the design of equipment in the nuclear industry as it allows predicting accidents or predicting their performance in dissimilar applications. The aim of the present research is to model the IRIS pressurizer's dynamic using the commercial CFD code CFX. A symmetric tri dimensional model equivalent to 1/8 of the total geometry was adopted to reduce mesh size and minimize processing time. The model considers the coexistence of four phases and also takes into account the heat losses. The relationships for interfacial mass, energy, and momentum transport are programmed and incorporated into CFX. Moreover, two subdomains and several additional variables are defined to monitoring the boron dilution sequences and condensation-evaporation rates in different control volumes. For transient states a non - equilibrium stratification in the pressurizer is considered. This paper discusses the model developed and the behavior of the system for representative transients sequences. The results of analyzed transients of IRIS can be applied to the design of pressurizer internal structures and components. (author)

  2. Proceedings of the IRI Task Force Activity 2001

    International Nuclear Information System (INIS)

    Radicella, S.M.

    2002-08-01

    This ICTP Internal Report contains the list of papers presented, activity report and the write up of a number of presentations delivered during the International Reference Ionosphere (IRI) Task Force Activity 2001 which took place at the Abdus Salam ICTP during May 2001, particularly centred in the week from 21-25 May. The 2001 Task Force Activity is the eighth successful encounter of specialists organized by the URSI-Cospar IRI Working Group and the Aeronomy and Radiopropagation Laboratory of the Abdus Salam International Centre for Theoretical Physics of Trieste, Italy. This project continues the IRI Task Force Activities at the Abdus Salam International Centre for Theoretical Physics (ICTP) in Trieste, Italy. The primary focus of this activity was the development of a specification model for ionospheric variability. Such a model is high on the wish list of users of ionospheric models. Climatological models like IRI provide monthly mean values of ionospheric parameters. Understandably a satellite designer or operator needs to know not only the monthly average conditions but also the expected deviations from these mean values. The main discussions and presentations took place during the week 21-25 May. The format was similar to last year's activity with presentations and round-table discussions in the morning and follow-on work in small subgroups in front of computer terminals in the afternoon. This Proceedings contains also four papers of the previous IRI Task Force Activity which were omitted

  3. Light stimulation of iris tyrosinase in vivo

    International Nuclear Information System (INIS)

    Dryja, T.P.; Kimball, G.P.; Albert, D.M.

    1980-01-01

    This paper presents evidence that light stimulates tyrosinase activity in iris melanocytes in rabbits. Levels of iris tyrosinase were found to be greater in eyes of rabbits exposed to light for 6 weeks than in eyes of rabbits maintained in darkness. Despite increasing tyrosinase levels, exposure to light produced no clinically observable change in iris color

  4. What Genes Tell about Iris Appearance

    DEFF Research Database (Denmark)

    Harder, Stine; Christoffersen, Susanne R.; Johansen, Peter

    2012-01-01

    Predicting phenotypes based on genotypes is generally hard, but has shown good results for prediction of iris color. We propose to correlate the appearance of iris with DNA. Six single-nucleotide polymorphisms (SNPs) have previously been shown to correlate with human iris color, and we demonstrat...

  5. Design and Implementation of Wiki Services in a Multilevel Secure Environment

    National Research Council Canada - National Science Library

    Ong, Kar L

    2007-01-01

    The Monterey Security Architecture (MYSEA) provides a distributed multilevel secure networking environment where authenticated users can securely access data and services at different security classification levels...

  6. Design and implementation of modular home security system with short messaging system

    Directory of Open Access Journals (Sweden)

    Budijono Santoso

    2014-03-01

    Full Text Available Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile mobile device using SMS (Short Messaging System and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.

  7. Design and implementation of modular home security system with short messaging system

    Science.gov (United States)

    Budijono, Santoso; Andrianto, Jeffri; Axis Novradin Noor, Muhammad

    2014-03-01

    Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile) mobile device using SMS (Short Messaging System) and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red) motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.

  8. Feasibility study neutron diffraction at IRI

    Energy Technology Data Exchange (ETDEWEB)

    Haan, V.O. de

    1995-06-01

    Although neutron diffraction is a basic and relatively simple technique and should be available at a neutron source, it is not possible to perform neutron diffraction measurements at IRI at this moment. Until recently a neutron diffractometer with a relatively small flux at the sample position and a relaxed resolution (designed for liquid diffraction) was operated at IRI. Due to the modest neutron source intensity and the relatively old design (flat monochromator and single detector) this diffractometer was outdated. However, at a contemporary reactor source an instrument to perform neutron diffraction experiments cannot be missed. This study shows that thanks to recent developments in neutron diffraction optics it is possible to increase the flux, to enhance the resolution and to get a better flexibility. If also the number of detectors is increased or a position-sensitive detector is used to performance can be increased at least a thousand fold. A preliminary design is given to indicate how this gain can be realized. (orig.).

  9. Design of 95 GHz, 2 MW Gyrotron for Communication and Security Applications

    Science.gov (United States)

    Kumar, Nitin; Singh, Udaybir; Singh, T. P.; Sinha, A. K.

    2011-02-01

    The design and the numerical simulation of the 95 GHz, 2 MW gyrotron for various kinds of communication, sensing and security applications is presented. The gyrotron is designed for the TE24,8 operating mode. Various in-house developed and commercially available computer codes are used for the design purpose. A 4.25 MW electron gun is designed for the 2 MW of output power. The mode selection, cold cavity and the beam-wave interaction analysis are discussed for the design of weakly tapered open resonator type of interaction cavity. The parametric analysis of the interaction cavity and the electron gun is also presented.

  10. Dynamic Features for Iris Recognition.

    Science.gov (United States)

    da Costa, R M; Gonzaga, A

    2012-08-01

    The human eye is sensitive to visible light. Increasing illumination on the eye causes the pupil of the eye to contract, while decreasing illumination causes the pupil to dilate. Visible light causes specular reflections inside the iris ring. On the other hand, the human retina is less sensitive to near infra-red (NIR) radiation in the wavelength range from 800 nm to 1400 nm, but iris detail can still be imaged with NIR illumination. In order to measure the dynamic movement of the human pupil and iris while keeping the light-induced reflexes from affecting the quality of the digitalized image, this paper describes a device based on the consensual reflex. This biological phenomenon contracts and dilates the two pupils synchronously when illuminating one of the eyes by visible light. In this paper, we propose to capture images of the pupil of one eye using NIR illumination while illuminating the other eye using a visible-light pulse. This new approach extracts iris features called "dynamic features (DFs)." This innovative methodology proposes the extraction of information about the way the human eye reacts to light, and to use such information for biometric recognition purposes. The results demonstrate that these features are discriminating features, and, even using the Euclidean distance measure, an average accuracy of recognition of 99.1% was obtained. The proposed methodology has the potential to be "fraud-proof," because these DFs can only be extracted from living irises.

  11. Privacy Preserving Iris Based Biometric Identity Verification

    Directory of Open Access Journals (Sweden)

    Przemyslaw Strzelczyk

    2011-08-01

    Full Text Available Iris biometrics is considered one of the most accurate and robust methods of identity verification. Individually unique iris features can be presented in a compact binary form easily compared with reference template to confirm identity. However, when templates or features are disclosed, iris biometrics is no longer suitable for verification. Therefore, there is a need to perform iris feature matching without revealing the features itself and reference template. The paper proposes an extension of the standard iris-based verification protocol that introduces features and a template locking mechanism, which guarantees that no sensitive information is exposed.Article in English

  12. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication

    Science.gov (United States)

    Murdoch, Steven J.; Anderson, Ross

    Banks worldwide are starting to authenticate online card transactions using the '3-D Secure' protocol, which is branded as Verified by Visa and MasterCard SecureCode. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards for cardholder-present payments in Europe and elsewhere. 3-D Secure has so far escaped academic scrutiny; yet it might be a textbook example of how not to design an authentication protocol. It ignores good design principles and has significant vulnerabilities, some of which are already being exploited. Also, it provides a fascinating lesson in security economics. While other single sign-on schemes such as OpenID, InfoCard and Liberty came up with decent technology they got the economics wrong, and their schemes have not been adopted. 3-D Secure has lousy technology, but got the economics right (at least for banks and merchants); it now boasts hundreds of millions of accounts. We suggest a path towards more robust authentication that is technologically sound and where the economics would work for banks, merchants and customers - given a gentle regulatory nudge.

  13. A systematic approach for analysis and design of secure health information systems.

    Science.gov (United States)

    Blobel, B; Roger-France, F

    2001-06-01

    A toolset using object-oriented techniques including the nowadays popular unified modelling language (UML) approach has been developed to facilitate the different users' views for security analysis and design of health care information systems. Paradigm and concepts used are based on the component architecture of information systems and on a general layered security model. The toolset was developed in 1996/1997 within the ISHTAR project funded by the European Commission as well as through international standardisation activities. Analysing and systematising real health care scenarios, only six and nine use case types could be found in the health and the security-related view, respectively. By combining these use case types, the analysis and design of any thinkable system architecture can be simplified significantly. Based on generic schemes, the environment needed for both communication and application security can be established by appropriate sets of security services and mechanisms. Because of the importance and the basic character of electronic health care record (EHCR) systems, the understanding of the approach is facilitated by (incomplete) examples for this application.

  14. Optical quality and vision with iris-coloring soft contact lenses.

    Science.gov (United States)

    Ortiz, Carolina; Jiménez, Raimundo

    2014-05-01

    To study the influence of iris-coloring soft contact lenses, designed for changing apparent iris color, on optical quality and vision. Eighty subjects were included in this study. All participants were classified as emmetropic, with monocular best-corrected visual acuity of 20/20 or better. For 40 subjects, we measured the optical quality (aberrations, the Strehl ratio, and the objective scattering index) and visual performance before and after wearing the cosmetic soft contact lenses. We also measured the optical quality and visual performance for the other 40 subjects but with a different kind of lens (fantasy soft contact lenses). Iris-coloring soft contact lenses significantly increased coma-like and total higher-order aberrations and objective scattering index (p Iris-coloring soft contact lenses deteriorate the optical quality and worsen the contrast sensitivity function. Iris-coloring soft contact lens wearers should be informed about the effects on optical quality and visual function.

  15. Reducing Error Rates for Iris Image using higher Contrast in Normalization process

    Science.gov (United States)

    Aminu Ghali, Abdulrahman; Jamel, Sapiee; Abubakar Pindar, Zahraddeen; Hasssan Disina, Abdulkadir; Mat Daris, Mustafa

    2017-08-01

    Iris recognition system is the most secured, and faster means of identification and authentication. However, iris recognition system suffers a setback from blurring, low contrast and illumination due to low quality image which compromises the accuracy of the system. The acceptance or rejection rates of verified user depend solely on the quality of the image. In many cases, iris recognition system with low image contrast could falsely accept or reject user. Therefore this paper adopts Histogram Equalization Technique to address the problem of False Rejection Rate (FRR) and False Acceptance Rate (FAR) by enhancing the contrast of the iris image. A histogram equalization technique enhances the image quality and neutralizes the low contrast of the image at normalization stage. The experimental result shows that Histogram Equalization Technique has reduced FRR and FAR compared to the existing techniques.

  16. Safeguards and security by design support for the next generation nuclear plant project - Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Bjornard, T.; Casey Durst, P.

    2013-01-01

    The Next Generation Nuclear Plant (NGNP) project was authorized by the United States Energy Policy Act of 2005 with the principal objective of designing, licensing, and building a Generation IV nuclear plant capable of producing both high-temperature process heat and electricity. The two candidate NGNP reactor concepts are pebble- and prismatic-fueled high-temperature gas reactors that will be licensed by the U.S. Nuclear Regulatory Commission (NRC). The conceptual design phase of the project was completed in December 2010. This paper summarizes support provided to the NGNP project to facilitate consideration of international safeguards during the design phase, or safeguards by design (SBD). Additional support was provided for domestic safeguards (material control and accounting) and physical protection, or safeguards and security by design (2SBD). The main focus of this paper is on SBD and international safeguards. Included is an overview of the international safeguards guidance contained in guidance reports for SBD. These reports contain guidance and suggestions intended to be useful to the industry design teams, but they do not contain ready-made solutions. Early and frequent interaction of design stakeholders with the International Atomic Energy Agency and the NRC are essential to a successful endeavor. The paper is followed by the slides of the presentation. (author)

  17. Fuel burnup analysis for IRIS reactor using MCNPX and WIMS-D5 codes

    Science.gov (United States)

    Amin, E. A.; Bashter, I. I.; Hassan, Nabil M.; Mustafa, S. S.

    2017-02-01

    International Reactor Innovative and Secure (IRIS) reactor is a compact power reactor designed with especial features. It contains Integral Fuel Burnable Absorber (IFBA). The core is heterogeneous both axially and radially. This work provides the full core burn up analysis for IRIS reactor using MCNPX and WIMDS-D5 codes. Criticality calculations, radial and axial power distributions and nuclear peaking factor at the different stages of burnup were studied. Effective multiplication factor values for the core were estimated by coupling MCNPX code with WIMS-D5 code and compared with SAS2H/KENO-V code values at different stages of burnup. The two calculation codes show good agreement and correlation. The values of radial and axial powers for the full core were also compared with published results given by SAS2H/KENO-V code (at the beginning and end of reactor operation). The behavior of both radial and axial power distribution is quiet similar to the other data published by SAS2H/KENO-V code. The peaking factor values estimated in the present work are close to its values calculated by SAS2H/KENO-V code.

  18. Gaze estimation for off-angle iris recognition based on the biometric eye model

    Science.gov (United States)

    Karakaya, Mahmut; Barstow, Del; Santos-Villalobos, Hector; Thompson, Joseph; Bolme, David; Boehnen, Christopher

    2013-05-01

    Iris recognition is among the highest accuracy biometrics. However, its accuracy relies on controlled high quality capture data and is negatively affected by several factors such as angle, occlusion, and dilation. Non-ideal iris recognition is a new research focus in biometrics. In this paper, we present a gaze estimation method designed for use in an off-angle iris recognition framework based on the ORNL biometric eye model. Gaze estimation is an important prerequisite step to correct an off-angle iris images. To achieve the accurate frontal reconstruction of an off-angle iris image, we first need to estimate the eye gaze direction from elliptical features of an iris image. Typically additional information such as well-controlled light sources, head mounted equipment, and multiple cameras are not available. Our approach utilizes only the iris and pupil boundary segmentation allowing it to be applicable to all iris capture hardware. We compare the boundaries with a look-up-table generated by using our biologically inspired biometric eye model and find the closest feature point in the look-up-table to estimate the gaze. Based on the results from real images, the proposed method shows effectiveness in gaze estimation accuracy for our biometric eye model with an average error of approximately 3.5 degrees over a 50 degree range.

  19. Gaze Estimation for Off-Angle Iris Recognition Based on the Biometric Eye Model

    Energy Technology Data Exchange (ETDEWEB)

    Karakaya, Mahmut [ORNL; Barstow, Del R [ORNL; Santos-Villalobos, Hector J [ORNL; Thompson, Joseph W [ORNL; Bolme, David S [ORNL; Boehnen, Chris Bensing [ORNL

    2013-01-01

    Iris recognition is among the highest accuracy biometrics. However, its accuracy relies on controlled high quality capture data and is negatively affected by several factors such as angle, occlusion, and dilation. Non-ideal iris recognition is a new research focus in biometrics. In this paper, we present a gaze estimation method designed for use in an off-angle iris recognition framework based on the ANONYMIZED biometric eye model. Gaze estimation is an important prerequisite step to correct an off-angle iris images. To achieve the accurate frontal reconstruction of an off-angle iris image, we first need to estimate the eye gaze direction from elliptical features of an iris image. Typically additional information such as well-controlled light sources, head mounted equipment, and multiple cameras are not available. Our approach utilizes only the iris and pupil boundary segmentation allowing it to be applicable to all iris capture hardware. We compare the boundaries with a look-up-table generated by using our biologically inspired biometric eye model and find the closest feature point in the look-up-table to estimate the gaze. Based on the results from real images, the proposed method shows effectiveness in gaze estimation accuracy for our biometric eye model with an average error of approximately 3.5 degrees over a 50 degree range.

  20. Implantable electronics: emerging design issues and an ultra light-weight security solution.

    Science.gov (United States)

    Narasimhan, Seetharam; Wang, Xinmu; Bhunia, Swarup

    2010-01-01

    Implantable systems that monitor biological signals require increasingly complex digital signal processing (DSP) electronics for real-time in-situ analysis and compression of the recorded signals. While it is well-known that such signal processing hardware needs to be implemented under tight area and power constraints, new design requirements emerge with their increasing complexity. Use of nanoscale technology shows tremendous benefits in implementing these advanced circuits due to dramatic improvement in integration density and power dissipation per operation. However, it also brings in new challenges such as reliability and large idle power (due to higher leakage current). Besides, programmability of the device as well as security of the recorded information are rapidly becoming major design considerations of such systems. In this paper, we analyze the emerging issues associated with the design of the DSP unit in an implantable system. Next, we propose a novel ultra light-weight solution to address the information security issue. Unlike the conventional information security approaches like data encryption, which come at large area and power overhead and hence are not amenable for resource-constrained implantable systems, we propose a multilevel key-based scrambling algorithm, which exploits the nature of the biological signal to effectively obfuscate it. Analysis of the proposed algorithm in the context of neural signal processing and its hardware implementation shows that we can achieve high level of security with ∼ 13X lower power and ∼ 5X lower area overhead than conventional cryptographic solutions.

  1. MEMS DM development at Iris AO, Inc.

    Science.gov (United States)

    Helmbrecht, Michael A.; He, Min; Kempf, Carl J.; Besse, Marc

    2011-03-01

    Iris AO is actively developing piston-tip-tilt (PTT) segmented MEMS deformable mirrors (DM) and adaptive optics (AO) controllers for these DMs. This paper discusses ongoing research at Iris AO that has advanced the state-of-the-art of these devices and systems over the past year. Improvements made to open-loop operation and mirror fabrication enables mirrors to open-loop flatten to 4 nm rms. Additional testing of an anti snap-in technology was conducted and demonstrates that the technology can withstand 100 million snap-in events without failure. Deformable mirrors with dielectric coatings are shown that are capable of handling 630 W/cm2 of incident laser power. Over a localized region on the segment, the dielectric coatings can withstand 100kW/cm2 incident laser power for 30 minutes. Results from the first-ever batch of PTT489 DMs that were shipped to pilot customers are reported. Optimizations made to the open-loop PTT controller are shown to have latencies of 157.5 μs and synchronous array update rates of nearly 6.5 kHz. Finally, plans for the design and fabrication of the next-generation PTT939 DM are presented.

  2. 33 CFR 165.1405 - Regulated Navigation Areas and Security Zones; Designated Escorted Vessels-Philippine Sea and...

    Science.gov (United States)

    2010-07-01

    ... Security Zones; Designated Escorted Vessels-Philippine Sea and Apra Harbor, Guam (including Cabras Island... Areas and Security Zones; Designated Escorted Vessels-Philippine Sea and Apra Harbor, Guam (including... point of origin. (2) Apra Harbor, Guam—All waters from surface to bottom of Apra Harbor, Guam, shoreward...

  3. Developmental validation of the IrisPlex system: determination of blue and brown iris colour for forensic intelligence.

    Science.gov (United States)

    Walsh, Susan; Lindenbergh, Alexander; Zuniga, Sofia B; Sijen, Titia; de Knijff, Peter; Kayser, Manfred; Ballantyne, Kaye N

    2011-11-01

    The IrisPlex system consists of a highly sensitive multiplex genotyping assay together with a statistical prediction model, providing users with the ability to predict blue and brown human eye colour from DNA samples with over 90% precision. This 'DNA intelligence' system is expected to aid police investigations by providing phenotypic information on unknown individuals when conventional DNA profiling is not informative. Falling within the new area of forensic DNA phenotyping, this paper describes the developmental validation of the IrisPlex assay following the Scientific Working Group on DNA Analysis Methods (SWGDAM) guidelines for the application of DNA-based eye colour prediction to forensic casework. The IrisPlex assay produces complete SNP genotypes with only 31pg of DNA, approximately six human diploid cell equivalents, and is therefore more sensitive than commercial STR kits currently used in forensics. Species testing revealed human and primate specificity for a complete SNP profile. The assay is capable of producing accurate results from simulated casework samples such as blood, semen, saliva, hair, and trace DNA samples, including extremely low quantity samples. Due to its design, it can also produce full profiles with highly degraded samples often found in forensic casework. Concordance testing between three independent laboratories displayed reproducible results of consistent levels on varying types of simulated casework samples. With such high levels of sensitivity, specificity, consistency and reliability, this genotyping assay, as a core part of the IrisPlex system, operates in accordance with SWGDAM guidelines. Furthermore, as we demonstrated previously, the IrisPlex eye colour prediction system provides reliable results without the need for knowledge on the bio-geographic ancestry of the sample donor. Hence, the IrisPlex system, with its model-based prediction probability estimation of blue and brown human eye colour, represents a useful tool for

  4. The best bits in an iris code.

    Science.gov (United States)

    Hollingsworth, Karen P; Bowyer, Kevin W; Flynn, Patrick J

    2009-06-01

    Iris biometric systems apply filters to iris images to extract information about iris texture. Daugman's approach maps the filter output to a binary iris code. The fractional Hamming distance between two iris codes is computed and decisions about the identity of a person are based on the computed distance. The fractional Hamming distance weights all bits in an iris code equally. However, not all the bits in an iris code are equally useful. Our research is the first to present experiments documenting that some bits are more consistent than others. Different regions of the iris are compared to evaluate their relative consistency, and contrary to some previous research, we find that the middle bands of the iris are more consistent than the inner bands. The inconsistent-bit phenomenon is evident across genders and different filter types. Possible causes of inconsistencies, such as segmentation, alignment issues, and different filters are investigated. The inconsistencies are largely due to the coarse quantization of the phase response. Masking iris code bits corresponding to complex filter responses near the axes of the complex plane improves the separation between the match and nonmatch Hamming distance distributions.

  5. Self-adaptive iris image acquisition system

    Science.gov (United States)

    Dong, Wenbo; Sun, Zhenan; Tan, Tieniu; Qiu, Xianchao

    2008-03-01

    Iris image acquisition is the fundamental step of the iris recognition, but capturing high-resolution iris images in real-time is very difficult. The most common systems have small capture volume and demand users to fully cooperate with machines, which has become the bottleneck of iris recognition's application. In this paper, we aim at building an active iris image acquiring system which is self-adaptive to users. Two low resolution cameras are co-located in a pan-tilt-unit (PTU), for face and iris image acquisition respectively. Once the face camera detects face region in real-time video, the system controls the PTU to move towards the eye region and automatically zooms, until the iris camera captures an clear iris image for recognition. Compared with other similar works, our contribution is that we use low-resolution cameras, which can transmit image data much faster and are much cheaper than the high-resolution cameras. In the system, we use Haar-like cascaded feature to detect faces and eyes, linear transformation to predict the iris camera's position, and simple heuristic PTU control method to track eyes. A prototype device has been established, and experiments show that our system can automatically capture high-quality iris image in the range of 0.6m×0.4m×0.4m in average 3 to 5 seconds.

  6. Exploring Operational Safeguards, Safety, and Security by Design to Address Real Time Threats in Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Schanfein, Mark J.; Mladineo, Stephen V.

    2015-07-07

    Over the last few years, significant attention has been paid to both encourage application and provide domestic and international guidance for designing in safeguards and security in new facilities.1,2,3 However, once a facility is operational, safeguards, security, and safety often operate as separate entities that support facility operations. This separation is potentially a serious weakness should insider or outsider threats become a reality.Situations may arise where safeguards detects a possible loss of material in a facility. Will they notify security so they can, for example, check perimeter doors for tampering? Not doing so might give the advantage to an insider who has already, or is about to, move nuclear material outside the facility building. If outsiders break into a facility, the availability of any information to coordinate the facility’s response through segregated alarm stations or a failure to include all available radiation sensors, such as safety’s criticality monitors can give the advantage to the adversary who might know to disable camera systems, but would most likely be unaware of other highly relevant sensors in a nuclear facility.This paper will briefly explore operational safeguards, safety, and security by design (3S) at a high level for domestic and State facilities, identify possible weaknesses, and propose future administrative and technical methods, to strengthen the facility system’s response to threats.

  7. KNOWLEDGE REPRESENTATION OF SECURITY DESIGN PATTERN LANDSCAPE USING FORMAL CONCEPT ANALYSIS

    Directory of Open Access Journals (Sweden)

    POONAM S. PONDE

    2017-09-01

    Full Text Available Security design patterns are proven solutions to recurring security problems. They are classified into various categories, each containing a set of attributes. However, the large number of patterns and classification schemes makes it difficult to choose a pattern for a given security problem. To apply patterns effectively, there must be a systematic method of organizing the patterns, so that it is possible to look up a design pattern unambiguously according to its purpose. While a lot of research focuses on developing new patterns and classifications, these issues have not been adequately addressed. In this paper, we present a novel approach of applying Formal Concept Analysis (FCA on a chosen set of patterns classified according to a common set of attributes. The resulting concept lattice can be used for mining knowledge from the concepts, identifying pattern groups, and their relationships with the goal of applying appropriate patterns to security requirements. We propose the use of FCA over conventional data analysis methods for the simplicity of data preparation, the discovery of hidden knowledge, and cluster interpretation, with a visual representation of the pattern domain.

  8. Three tenets for secure cyber-physical system design and assessment

    Science.gov (United States)

    Hughes, Jeff; Cybenko, George

    2014-06-01

    This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.

  9. TRISH: the Toronto-IRIS Stereo Head

    Science.gov (United States)

    Jenkin, Michael R. M.; Milios, Evangelos E.; Tsotsos, John K.

    1992-03-01

    This paper introduces and motivates the design of a controllable stereo vision head. The Toronto IRIS stereo head (TRISH) is a binocular camera mount consisting of two AGC, fixed focal length color cameras forming a verging stereo pair. TRISH is capable of version (rotation of the eyes about the vertical axis so as to maintain a constant disparity), vergence (rotation of the eyes about the vertical axis so as to change the disparity), pan (rotation of the entire head about the vertical axis), and tilt (rotation of the eyes about the horizontal axis). One novel characteristic of the design is that the two cameras can rotate about their own optical axes (torsion). Torsion movement makes it possible to minimize the vertical component of the two-dimensional search which is associated with stereo processing in verging stereo systems.

  10. Threat detection: a framework for security architects and designers of metropolitan rail systems

    Directory of Open Access Journals (Sweden)

    Hervé Borrion

    2014-01-01

    Full Text Available Metro rail systems (MRS currently face a serious threat from terrorist attacks – especially through use of explosives. The threat comes at a time when scores of new MRS are under construction or at the planning stage in cities across the world. Designers of these systems need to consider ways to detect explosives without an adverse impact upon passenger comfort and profitability. This paper presents a framework for designers to identify security functions in MRS, understand current methods of threat detection used in MRS and recognise their relationship with other operational requirements. Application of this framework at the planning stage can assist in designing systems where terrorist threats can be better addressed with reduced impact on passenger experience and MRS operations. The application of a framework of analysis inspired by Ekblom’s work to nine functioning MRS yields a concise representation of the major design issues architects and security specialists have to consider for effective integration of security systems in stations.

  11. Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Long, J.D.

    2013-01-01

    The IAEA has described the Safeguards by Design (SBD) concept as an approach in which international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning. Often, international safeguards features are added following completion of the facility design. Earlier consideration of safeguards features has the potential to reduce the need for costly re-designs or retrofits of the facility and can result in a more efficient and effective safeguards design. The U.S. Department of Energy's National Nuclear Security Administration (NNSA) initiated a project in 2008 through its Next Generation Safeguards Initiative (NGSI) to establish a global norm for the use of SBD. The NGSI SBD program is evolving in parallel with a similar effort at the IAEA, while taking into account the IAEA's SBD achievements and future plans. The NGSI program includes DOE laboratory studies, international workshops, engagement with industry and the IAEA, and setting an example through its planned use in new nuclear facilities in the United States. Consistent with this effort, the NGSI program has sponsored 'Lessons Learned' studies and the preparation of facility-specific SBD Guidance documents. The NGSI program also takes into account successes that the NNSA has had with implementing safeguards early into facility designs within the U.S. The purpose of this paper is the presentation of the most recent developments in SBD under NGSI within the U.S. as well as the presentation of 'Lessons Learned' integrating safeguards into new nuclear facility designs of the U.S. Nuclear Security Enterprise (NSE), namely the Uranium Processing Facility (UPF) project at the Y-12 National Security Complex in Oak Ridge, Tennessee and to discuss its relevance to international safeguards. The paper is followed by the slides of the presentation. (author)

  12. [A woman with iris heterochromia].

    Science.gov (United States)

    Birker, I L; Boons, L S T M; Luyten, G P M

    2016-01-01

    A 20-year-old woman with congenital iris heterochromia presented with loss of vision of her right eye. We made de diagnosis of a large 'uvea melanoma' and enucleated the eye. Pathological examination showed an underlying oculodermal melanocytosis (ODM). The life-time risk of uveal melanoma in the general population is 0.7:100,000, but 1:400 in patients with ODM. Therefore, annual fundoscopy is recommended in these patients.

  13. DCT-based iris recognition.

    Science.gov (United States)

    Monro, Donald M; Rakshit, Soumyadip; Zhang, Dexin

    2007-04-01

    This paper presents a novel iris coding method based on differences of discrete cosine transform (DCT) coefficients of overlapped angular patches from normalized iris images. The feature extraction capabilities of the DCT are optimized on the two largest publicly available iris image data sets, 2,156 images of 308 eyes from the CASIA database and 2,955 images of 150 eyes from the Bath database. On this data, we achieve 100 percent Correct Recognition Rate (CRR) and perfect Receiver-Operating Characteristic (ROC) Curves with no registered false accepts or rejects. Individual feature bit and patch position parameters are optimized for matching through a product-of-sum approach to Hamming distance calculation. For verification, a variable threshold is applied to the distance metric and the False Acceptance Rate (FAR) and False Rejection Rate (FRR) are recorded. A new worst-case metric is proposed for predicting practical system performance in the absence of matching failures, and the worst case theoretical Equal Error Rate (EER) is predicted to be as low as 2.59 x 10(-4) on the available data sets.

  14. Lentes plegables suturadas a iris

    Directory of Open Access Journals (Sweden)

    Dunia Cruz Izquierdo

    Full Text Available Para la corrección quirúrgica de la afaquia existen en la actualidad varias técnicas quirúrgicas que permiten fijar los lentes intraoculares plegables o rígidos en cámara posterior suturados al iris o al sulcus ciliar. En estas circunstancias el cirujano determinará cuándo, dónde y el tipo de lente mejor a implantar. Se presenta un paciente con una afaquia traumática del ojo izquierdo, con agudeza visual sin corrección de movimiento de mano a 1 m. Se le realizó implante secundario de lente intraocular plegable de cámara posterior suturada al iris. En el examen biomicroscópico en lámpara de hendidura del ojo izquierdo se observó midriasis media paralítica, refracción dinámica de +11,00 (0,6 y tensión ocular normal. Se le realizó examen por bimicroscopía indirecta sin alteración. Al mes de operado la agudeza visual mejor corregida alcanzó la unidad de visión. Las complicaciones presentadas fueron ovalización de la pupila y depósitos de pigmentos de iris en el lente intraocular.

  15. Secure communication interface design for IoT applications, using the GSM network

    OpenAIRE

    Wightwick, Andrew; Halak, Basel

    2016-01-01

    In this work, a secure short messaging service (SMS)-based communication interface is designed. The interface has applications in the internet of things (IoT) such as machine to machine (M2M) communications, and human-operated remote system management. The case study of waking a personal computer remotely is considered, and a complete proof-of-conceptis implemented for this purpose, using a field-programmable gate array (FPGA)-based receiving device and an Androidbased transmitting device. On...

  16. Monte Carlo modeling of eye iris color

    Science.gov (United States)

    Koblova, Ekaterina V.; Bashkatov, Alexey N.; Dolotov, Leonid E.; Sinichkin, Yuri P.; Kamenskikh, Tatyana G.; Genina, Elina A.; Tuchin, Valery V.

    2007-05-01

    Based on the presented two-layer eye iris model, the iris diffuse reflectance has been calculated by Monte Carlo technique in the spectral range 400-800 nm. The diffuse reflectance spectra have been recalculated in L*a*b* color coordinate system. Obtained results demonstrated that the iris color coordinates (hue and chroma) can be used for estimation of melanin content in the range of small melanin concentrations, i.e. for estimation of melanin content in blue and green eyes.

  17. Iris identification system based on Fourier coefficients and singular value decomposition

    Science.gov (United States)

    Somnugpong, Sawet; Phimoltares, Suphakant; Maneeroj, Saranya

    2011-12-01

    Nowadays, both personal identification and classification are very important. In order to identify the person for some security applications, physical or behavior-based characteristics of individuals with high uniqueness might be analyzed. Biometric becomes the mostly used in personal identification purpose. There are many types of biometric information currently used. In this work, iris, one kind of personal characteristics is considered because of its uniqueness and collectable. Recently, the problem of various iris recognition systems is the limitation of space to store the data in a variety of environments. This work proposes the iris recognition system with small-size of feature vector causing a reduction in space complexity term. For this experiment, each iris is presented in terms of frequency domain, and based on neural network classification model. First, Fast Fourier Transform (FFT) is used to compute the Discrete Fourier Coefficients of iris data in frequency domain. Once the iris data was transformed into frequency-domain matrix, Singular Value Decomposition (SVD) is used to reduce a size of the complex matrix to single vector. All of these vectors would be input for neural networks for the classification step. With this approach, the merit of our technique is that size of feature vector is smaller than that of other techniques with the acceptable level of accuracy when compared with other existing techniques.

  18. Iris Recognition: The Consequences of Image Compression

    Directory of Open Access Journals (Sweden)

    Bishop DanielA

    2010-01-01

    Full Text Available Iris recognition for human identification is one of the most accurate biometrics, and its employment is expanding globally. The use of portable iris systems, particularly in law enforcement applications, is growing. In many of these applications, the portable device may be required to transmit an iris image or template over a narrow-bandwidth communication channel. Typically, a full resolution image (e.g., VGA is desired to ensure sufficient pixels across the iris to be confident of accurate recognition results. To minimize the time to transmit a large amount of data over a narrow-bandwidth communication channel, image compression can be used to reduce the file size of the iris image. In other applications, such as the Registered Traveler program, an entire iris image is stored on a smart card, but only 4 kB is allowed for the iris image. For this type of application, image compression is also the solution. This paper investigates the effects of image compression on recognition system performance using a commercial version of the Daugman iris2pi algorithm along with JPEG-2000 compression, and links these to image quality. Using the ICE 2005 iris database, we find that even in the face of significant compression, recognition performance is minimally affected.

  19. Exploring the feasibility of iris recognition for visible spectrum iris images obtained using smartphone camera

    Science.gov (United States)

    Trokielewicz, Mateusz; Bartuzi, Ewelina; Michowska, Katarzyna; Andrzejewska, Antonina; Selegrat, Monika

    2015-09-01

    In the age of modern, hyperconnected society that increasingly relies on mobile devices and solutions, implementing a reliable and accurate biometric system employing iris recognition presents new challenges. Typical biometric systems employing iris analysis require expensive and complicated hardware. We therefore explore an alternative way using visible spectrum iris imaging. This paper aims at answering several questions related to applying iris biometrics for images obtained in the visible spectrum using smartphone camera. Can irides be successfully and effortlessly imaged using a smartphone's built-in camera? Can existing iris recognition methods perform well when presented with such images? The main advantage of using near-infrared (NIR) illumination in dedicated iris recognition cameras is good performance almost independent of the iris color and pigmentation. Are the images obtained from smartphone's camera of sufficient quality even for the dark irides? We present experiments incorporating simple image preprocessing to find the best visibility of iris texture, followed by a performance study to assess whether iris recognition methods originally aimed at NIR iris images perform well with visible light images. To our best knowledge this is the first comprehensive analysis of iris recognition performance using a database of high-quality images collected in visible light using the smartphones flashlight together with the application of commercial off-the-shelf (COTS) iris recognition methods.

  20. Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

    Directory of Open Access Journals (Sweden)

    Khaing Mar Htwe

    2015-07-01

    Full Text Available Abstract The main goal of this system is to design a locker security system using RFID and Fingerprint. In this system only authenticated person can open the door. A security system is implemented containing door locking system using passive type of RFID which can activate authenticate and validate the user and unlock the door in real time for secure access. The advantage of using passive RFID is that it functions without a battery and passive tags are lighter and are less expensive than the active tags. This system consists of fingerprint reader microcontroller RFID reader and PC. The RFID reader reads the id number from passive. The fingerprint sensor will check incoming image with enrolled data and it will send confirming signal for C program. If both RFID check and fingerprint image confirmation are matched the microcontroller will drive door motor according to sensors at door edges. This system is more secure than other systems because two codes protection method used.

  1. An Individualized Representational Intervention to Improve Symptom Management (IRIS) in Older Breast Cancer Survivors: Three Pilot Studies

    Science.gov (United States)

    Heidrich, Susan M.; Brown, Roger L.; Egan, Judith J.; Perez, Oscar A.; Phelan, Cynthia H.; Yeom, Hyune; Ward, Sandra E.

    2009-01-01

    Purpose/Objectives To test the feasibility and acceptability of an individualized representational intervention to improve symptom management (IRIS) in older breast cancer survivors and test the short-term effects of an IRIS on symptom distress. Design Two small randomized clinical trials and one pre-experimental study. Setting Oncology clinic and community. Sample 41 women with breast cancer (aged 65 years and older) in pilot study 1, 20 in pilot study 2, and 21 in pilot study 3. Methods In pilot study 1, women were randomized to the IRIS or usual care control. In pilot study 2, women were randomized to the IRIS or delayed IRIS (wait list) control. In pilot study 3, all women received the IRIS by telephone. Measures were collected at baseline, postintervention, and follow-up (up to four months). Main Research Variables Feasibility, acceptability, symptom distress, symptom management behaviors, symptom management barriers, and quality of life. Findings Across three pilot studies, 76% of eligible women participated, 95% completed the study, 88% reported the study was helpful, and 91% were satisfied with the study. Some measures of symptom distress decreased significantly after the IRIS, but quality of life was stable. Women in the IRIS group changed their symptom management behaviors more than controls. Conclusions Preliminary evidence supports the need for and feasibility of an IRIS. Implications for Nursing Nurses may help older breast cancer survivors manage their numerous chronic symptoms more effectively by assessing women’s beliefs about their symptoms and their current symptom management strategies. PMID:19403441

  2. Adapting Rational Unified Process (RUP) approach in designing a secure e-Tendering model

    Science.gov (United States)

    Mohd, Haslina; Robie, Muhammad Afdhal Muhammad; Baharom, Fauziah; Darus, Norida Muhd; Saip, Mohamed Ali; Yasin, Azman

    2016-08-01

    e-Tendering is an electronic processing of the tender document via internet and allow tenderer to publish, communicate, access, receive and submit all tender related information and documentation via internet. This study aims to design the e-Tendering system using Rational Unified Process approach. RUP provides a disciplined approach on how to assign tasks and responsibilities within the software development process. RUP has four phases that can assist researchers to adjust the requirements of various projects with different scope, problem and the size of projects. RUP is characterized as a use case driven, architecture centered, iterative and incremental process model. However the scope of this study only focusing on Inception and Elaboration phases as step to develop the model and perform only three of nine workflows (business modeling, requirements, analysis and design). RUP has a strong focus on documents and the activities in the inception and elaboration phases mainly concern the creation of diagrams and writing of textual descriptions. The UML notation and the software program, Star UML are used to support the design of e-Tendering. The e-Tendering design based on the RUP approach can contribute to e-Tendering developers and researchers in e-Tendering domain. In addition, this study also shows that the RUP is one of the best system development methodology that can be used as one of the research methodology in Software Engineering domain related to secured design of any observed application. This methodology has been tested in various studies in certain domains, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth. As a conclusion, these studies showed that the RUP one of a good research methodology that can be adapted in any Software Engineering (SE) research domain that required a few artifacts to be generated such as use case modeling, misuse case modeling, activity

  3. Iris color: validation of a new classification and distribution in a Spanish population-based sample.

    Science.gov (United States)

    Muiños Díaz, Yerena; Saornil, Maria A; Almaraz, Ana; Muñoz-Moreno, Mari F; García, Ciro; Sanz, Ruperto

    2009-01-01

    To design and validate a standard, simple, and reliable iris color classification and to study its distribution in a Spanish population. Iris color has a geographic distribution and has been correlated with different ocular diseases. However, there is no standard and validated iris color classification allowing comparison among different studies. Classification was made in three grades (blue-gray, hazel-green, brown) and was validated by 3 independent readers. Initially, a preliminary study was made in 50 iris photographs to detect technical hitches. Afterwards, based on this procedure, 221 iris photographs were graded. Measures of interobserver reliability were 0.786 by kappa index with an agreement of 89.6%.Iris color distribution in the Spanish cohort was blue-grey 16.29%, hazel-green 55.2%, and brown 28.5%. This classification is simple, reliable, and easy to use in clinical research and by ophthalmologists or generalists in practice. The Spanish cohort from this study shows a different iris color distribution from those previously published in other countries.

  4. Nuclear power desalinating complex with IRIS reactor plant and Russian distillation desalinating unit

    International Nuclear Information System (INIS)

    Kostin, V. I.; Panov, Yu.K.; Polunichev, V. I.; Fateev, S. A.; Gureeva, L. V.

    2004-01-01

    This paper has been prepared as a result of Russian activities on the development of nuclear power desalinating complex (NPDC) with the IRIS reactor plant (RP). The purpose of the activities was to develop the conceptual design of power desalinating complex (PDC) and to evaluate technical and economical indices, commercial attractiveness and economical efficiency of PDC based on an IRIS RP with distillation desalinating plants. The paper presents the main results of studies as applied to dual-purpose PDC based on IRIS RP with different types of desalinating plants, namely: characteristics of nuclear power desalinating complex based on IRIS reactor plant using Russian distillation desalinating technologies; prospective options of interface circuits of the IRIS RP with desalinating plants; evaluations of NPDC with IRIS RP output based on selected desalinating technologies for water and electric power supplied to the grid; cost of water generated by NPDC for selected interface circuits made by the IAEA DEEP code as well as by the Russian TEO-INVEST code; cost evaluation results for desalinated water of PDC operating on fossil fuel and conditions for competitiveness of the nuclear PDC based on IRIS RP compared with analog desalinating complexes operating on fossil fuel.(author)

  5. Use of risk assessment methods for security design and analysis of nuclear and radioactive facilities

    International Nuclear Information System (INIS)

    Vasconcelos, Vanderley de; Andrade, Marcos C.; Jordao, Elizabete

    2011-01-01

    The objective of this work is to evaluate the applicability of risk assessment methods for analyzing the physical protection of nuclear and radioactive facilities. One of the important processes for physical protection in nuclear and radioactive facilities is the identifying of areas containing nuclear materials, structures, systems or components to be protected from sabotage, which could directly or indirectly lead to unacceptable radiological consequences. A survey of the international guidelines and recommendations about vital area identification, design basis threat (DBT), and the security of nuclear and radioactive facilities was carried out. The traditional methods used for quantitative risk assessment, like FMEA (Failure Mode and Effect Analysis), Event and Decision Trees, Fault and Success Trees, Vulnerability Assessment, Monte Carlo Simulation, Probabilistic Safety Assessment, Scenario Analysis, and Game Theory, among others, are highlighted. The applicability of such techniques to security issues, their pros and cons, the general resources needed to implement them, as data or support software, are analyzed. Finally, an approach to security design and analysis, beginning with a qualitative and preliminary examination to determine the range of possible scenarios, outcomes, and the systems to be included in the analyses, and proceeding to a progressively use of more quantitative techniques is presented. (author)

  6. Design and Realization of a New Signal Security System for Multimedia Data Transmission

    Directory of Open Access Journals (Sweden)

    Hun-Chen Chen

    2003-12-01

    Full Text Available We propose a new signal security system and its VLSI architecture for real-time multimedia data transmission applications. We first define two bit-circulation functions for one-dimensional binary array transformation. Then, we exploit a chaotic system in generating a binary sequence to control the bit-circulation functions defined for performing the successive transformation on the input data. Each eight 8-bit data elements is regarded as a set and is fed into an 8×8 binary matrix being transformed on each row and each column of the matrix by these two bit-circulation functions such that the signal can be transformed into completely disordered data. The features of the proposed design include low computational complexity, regular operations suitable for low-cost VLSI implementation, high data security, and high feasibility for easy integration with commercial multimedia storage and transmission applications. We have performed Matlab simulation to verify the functional correctness of the proposed system. In implementing the system, a low-cost VLSI architecture has been designed, verified, and physically realized based on a 0.35 μm CMOS technology. The implementation results show that the proposed signal security system can achieve 117 Mbytes/s data throughput rate that is fast enough for real-time data protection in multimedia transmission applications.

  7. Framework for Integrating Safety, Operations, Security, and Safeguards in the Design and Operation of Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Darby, John L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Horak, Karl Emanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); LaChance, Jeffrey L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Tolk, Keith Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whitehead, Donnie Wayne [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2007-10-01

    The US is currently on the brink of a nuclear renaissance that will result in near-term construction of new nuclear power plants. In addition, the Department of Energy’s (DOE) ambitious new Global Nuclear Energy Partnership (GNEP) program includes facilities for reprocessing spent nuclear fuel and reactors for transmuting safeguards material. The use of nuclear power and material has inherent safety, security, and safeguards (SSS) concerns that can impact the operation of the facilities. Recent concern over terrorist attacks and nuclear proliferation led to an increased emphasis on security and safeguard issues as well as the more traditional safety emphasis. To meet both domestic and international requirements, nuclear facilities include specific SSS measures that are identified and evaluated through the use of detailed analysis techniques. In the past, these individual assessments have not been integrated, which led to inefficient and costly design and operational requirements. This report provides a framework for a new paradigm where safety, operations, security, and safeguards (SOSS) are integrated into the design and operation of a new facility to decrease cost and increase effectiveness. Although the focus of this framework is on new nuclear facilities, most of the concepts could be applied to any new, high-risk facility.

  8. Integrating Safety, Operations, Security, and Safeguards (ISOSS) into the design of small modular reactors : a handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Middleton, Bobby D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mendez, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-10-01

    The existing regulatory environment for nuclear reactors impacts both the facility design and the cost of operations once the facility is built. Delaying the consideration of regulatory requirements until late in the facility design - or worse, until after construction has begun - can result in costly retrofitting as well as increased operational costs to fulfill safety, security, safeguards, and emergency readiness requirements. Considering the scale and scope, as well as the latest design trends in the next generation of nuclear facilities, there is an opportunity to evaluate the regulatory requirements and optimize the design process for Small Modular Reactors (SMRs), as compared to current Light Water Reactors (LWRs). To this end, Sandia has embarked on an initiative to evaluate the interactions of regulations and operations as an approach to optimizing the design of SMR facilities, supporting operational efficiencies, as well as regulatory requirements. The early stages of this initiative consider two focus areas. The first focus area, reported by LaChance, et al. (2007), identifies the regulatory requirements established for the current fleet of LWR facilities regarding Safety, Security, Operations, Safeguards, and Emergency Planning, and evaluates the technical bases for these requirements. The second focus area, developed in this report, documents the foundations for an innovative approach that supports a design framework for SMR facilities that incorporates the regulatory environment, as well as the continued operation of the facility, into the early design stages, eliminating the need for costly retrofitting and additional operating personnel to fulfill regulatory requirements. The work considers a technique known as Integrated Safety, Operations, Security and Safeguards (ISOSS) (Darby, et al., 2007). In coordination with the best practices of industrial operations, the goal of this effort is to develop a design framework that outlines how ISOSS

  9. Design and implementation of a secure wireless mote-based medical sensor network.

    Science.gov (United States)

    Malasri, Kriangsiri; Wang, Lan

    2009-01-01

    A medical sensor network can wirelessly monitor vital signs of humans, making it useful for long-term health care without sacrificing patient comfort and mobility. For such a network to be viable, its design must protect data privacy and authenticity given that medical data are highly sensitive. We identify the unique security challenges of such a sensor network and propose a set of resource-efficient mechanisms to address these challenges. Our solution includes (1) a novel two-tier scheme for verifying the authenticity of patient data, (2) a secure key agreement protocol to set up shared keys between sensor nodes and base stations, and (3) symmetric encryption/decryption for protecting data confidentiality and integrity. We have implemented the proposed mechanisms on a wireless mote platform, and our results confirm their feasibility.

  10. Design and Implementation of a SecureWireless Mote-Based Medical Sensor Network

    Directory of Open Access Journals (Sweden)

    Lan Wang

    2009-08-01

    Full Text Available A medical sensor network can wirelessly monitor vital signs of humans, making it useful for long-term health care without sacrificing patient comfort and mobility. For such a network to be viable, its design must protect data privacy and authenticity given that medical data are highly sensitive. We identify the unique security challenges of such a sensor network and propose a set of resource-efficient mechanisms to address these challenges. Our solution includes (1 a novel two-tier scheme for verifying the authenticity of patient data, (2 a secure key agreement protocol to set up shared keys between sensor nodes and base stations, and (3 symmetric encryption/decryption for protecting data confidentiality and integrity. We have implemented the proposed mechanisms on a wireless mote platform, and our results confirm their feasibility.

  11. Designing a Secure Storage Repository for Sharing Scientific Datasets using Public Clouds

    Energy Technology Data Exchange (ETDEWEB)

    Kumbhare, Alok; Simmhan, Yogesh; Prasanna, Viktor

    2011-11-14

    As Cloud platforms gain increasing traction among scientific and business communities for outsourcing storage, computing and content delivery, there is also growing concern about the associated loss of control over private data hosted in the Cloud. In this paper, we present an architecture for a secure data repository service designed on top of a public Cloud infrastructure to support multi-disciplinary scientific communities dealing with personal and human subject data, motivated by the smart power grid domain. Our repository model allows users to securely store and share their data in the Cloud without revealing the plain text to unauthorized users, the Cloud storage provider or the repository itself. The system masks file names, user permissions and access patterns while providing auditing capabilities with provable data updates.

  12. The Design and Implementation of an Automated Security Compliance Toolkit: A Pedagogical Exercise

    Directory of Open Access Journals (Sweden)

    Guillermo Francia III

    2007-12-01

    Full Text Available The demand, through government regulations, for the preservation of the security, integrity, and privacy of corporate and customer information is increasing at an unprecedented pace. Government and private entities struggle to comply with these regulations through various means—both automated and manual controls. This paper presents an automated security compliance toolkit that is designed and developed using mostly open source tools to demonstrate that 1 meeting regulatory compliance does not need to be a very expensive proposition and 2 an undertaking of this magnitude could be served as a pedagogical exercise for students in the areas of collaboration, project management, software engineering, information assurance, and regulatory compliance.

  13. Adaptive fuzzy observer based synchronization design and secure communications of chaotic systems

    International Nuclear Information System (INIS)

    Hyun, Chang-Ho; Kim, Jae-Hun; Kim, Euntai; Park, Mignon

    2006-01-01

    This paper proposes a synchronization design scheme based on an alternative indirect adaptive fuzzy observer and its application to secure communication of chaotic systems. It is assumed that their states are unmeasurable and their parameters are unknown. Chaotic systems and the structure of the fuzzy observer are represented by the Takagi-Sugeno fuzzy model. Using Lyapunov stability theory, an adaptive law is derived to estimate the unknown parameters and the stability of the proposed system is guaranteed. Through this process, the asymptotic synchronization of chaotic systems is achieved. The proposed observer is applied to secure communications of chaotic systems and some numerical simulation results show the validity of theoretical derivations and the performance of the proposed observer

  14. Teaching Case: IS Security Requirements Identification from Conceptual Models in Systems Analysis and Design: The Fun & Fitness, Inc. Case

    Science.gov (United States)

    Spears, Janine L.; Parrish, James L., Jr.

    2013-01-01

    This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…

  15. 17 CFR 240.3a12-8 - Exemption for designated foreign government securities for purposes of futures trading.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption for designated foreign government securities for purposes of futures trading. 240.3a12-8 Section 240.3a12-8 Commodity and... trading. (a) When used in this Rule, the following terms shall have the meaning indicated: (1) The term...

  16. The IRIS Federator: Accessing Seismological Data Across Data Centers

    Science.gov (United States)

    Trabant, C. M.; Van Fossen, M.; Ahern, T. K.; Weekly, R. T.

    2015-12-01

    In 2013 the International Federation of Digital Seismograph Networks (FDSN) approved a specification for web service interfaces for accessing seismological station metadata, time series and event parameters. Since then, a number of seismological data centers have implemented FDSN service interfaces, with more implementations in development. We have developed a new system called the IRIS Federator which leverages this standardization and provides the scientific community with a service for easy discovery and access of seismological data across FDSN data centers. These centers are located throughout the world and this work represents one model of a system for data collection across geographic and political boundaries.The main components of the IRIS Federator are a catalog of time series metadata holdings at each data center and a web service interface for searching the catalog. The service interface is designed to support client­-side federated data access, a model in which the client (software run by the user) queries the catalog and then collects the data from each identified center. By default the results are returned in a format suitable for direct submission to those web services, but could also be formatted in a simple text format for general data discovery purposes. The interface will remove any duplication of time series channels between data centers according to a set of business rules by default, however a user may request results with all duplicate time series entries included. We will demonstrate how client­-side federation is being incorporated into some of the DMC's data access tools. We anticipate further enhancement of the IRIS Federator to improve data discovery in various scenarios and to improve usefulness to communities beyond seismology.Data centers with FDSN web services: http://www.fdsn.org/webservices/The IRIS Federator query interface: http://service.iris.edu/irisws/fedcatalog/1/

  17. Risk-informed approach for safety, safeguards, and security (3S) by design

    International Nuclear Information System (INIS)

    Suzuki, Mitsutoshi; Burr, Tom; Howell, John

    2011-01-01

    Over several decades the nuclear energy society worldwide has developed safety assessment methodology based on probabilistic risk analysis for incorporating its benefit into design and accident prevention for nuclear reactors. Although safeguards and security communities have different histories and technical aspects compared to safety, risk assessment as a supplement to their current requirements could be developed to promote synergism between Safety, Safeguards, and Security (3S) and to install effective countermeasures in the design of complex nuclear fuel cycle facilities. Since the 3S initiative was raised by G8 countries at Hokkaido Toyako-Summit in 2008, one approach to developing synergism in a 3S By Design (3SBD) process has been the application of risk-oriented assessment methodology. In the existing regulations of safeguards and security, a risk notion has already been considered for inherent threat and hazard recognition. To integrate existing metrics into a risk-oriented approach, several mathematical methods have already been surveyed, with attention to the scarcity of intentional acts in the case of safeguards and the sparseness of actual event data. A two-dimensional probability distribution composed of measurement error and incidence probabilities has been proposed to formalize inherent difficulties in the International Atomic Energy Agency (IAEA) safeguards criteria. In particular, the incidence probability that is difficult to estimate has been explained using a Markov model and game theory. In this work, a feasibility study of 3SBD is performed for an aqueous reprocessing process, and synergetic countermeasures are presented for preliminary demonstration of 3SBD. Although differences and conflicts between individual 'S' communities exist, the integrated approach would be valuable for optimization and balance between the 3S design features as well as for effective and efficient implementation under existing regulation frameworks. In addition

  18. Iris texture traits show associations with iris color and genomic ancestry.

    Science.gov (United States)

    Quillen, Ellen E; Guiltinan, Jenna S; Beleza, Sandra; Rocha, Jorge; Pereira, Rinaldo W; Shriver, Mark D

    2011-01-01

    This study seeks to identify associations among genomic biogeographic ancestry (BGA), quantitative iris color, and iris texture traits contributing to population-level variation in these phenotypes. DNA and iris photographs were collected from 300 individuals across three variably admixed populations (Portugal, Brazil, and Cape Verde). Two raters scored the photos for pigmentation spots, Fuchs' crypts, contraction furrows, and Wolflinn nodes. Iris color was quantified from RGB values. Maximum likelihood estimates of individual BGA were calculated from 176 ancestry informative markers. Pigmentation spots, Fuchs' crypts, contraction furrows, and iris color show significant positive correlation with increasing European BGA. Only contraction furrows are correlated with iris color. The relationship between BGA and iris texture illustrates a genetic contribution to this population-level variation. Copyright © 2011 Wiley-Liss, Inc.

  19. Feature Vector Construction Method for IRIS Recognition

    Science.gov (United States)

    Odinokikh, G.; Fartukov, A.; Korobkin, M.; Yoo, J.

    2017-05-01

    One of the basic stages of iris recognition pipeline is iris feature vector construction procedure. The procedure represents the extraction of iris texture information relevant to its subsequent comparison. Thorough investigation of feature vectors obtained from iris showed that not all the vector elements are equally relevant. There are two characteristics which determine the vector element utility: fragility and discriminability. Conventional iris feature extraction methods consider the concept of fragility as the feature vector instability without respect to the nature of such instability appearance. This work separates sources of the instability into natural and encodinginduced which helps deeply investigate each source of instability independently. According to the separation concept, a novel approach of iris feature vector construction is proposed. The approach consists of two steps: iris feature extraction using Gabor filtering with optimal parameters and quantization with separated preliminary optimized fragility thresholds. The proposed method has been tested on two different datasets of iris images captured under changing environmental conditions. The testing results show that the proposed method surpasses all the methods considered as a prior art by recognition accuracy on both datasets.

  20. Fuel management options to extend the IRIS reactor cycle

    International Nuclear Information System (INIS)

    Petrovic, B.; Franceschini, F.

    2004-01-01

    To optimize plant operation, reduce scheduled maintenance outage, and increase capacity factor, IRIS is designed to enable extended cycles of up to four years. However, due to the enrichment licensing limitation (less than 5% enriched uranium oxide) there is a tradeoff between the achievable cycle length and fuel utilization, i.e., the average fuel discharge burnup. The longest individual cycle may be achieved with the single-batch straight burn, but at the expense of a lower burnup. Considering the IRIS basic performance requirements, a cycle length in the range of three to four years is deemed desirable. This paper examines different fuel management options, i.e., the influence of the required cycle length on the corresponding reloading strategy, including a two-batch and a three-batch reloading. A reference two-batch core design has been developed for the first cycle, as well as for the transition cycles leading to equilibrium. Main core performance parameters are evaluated. This core design provides the framework for the safety analyses needed to prepare the IRIS safety evaluations. Alternate designs are also considered.(author)

  1. Enhanced iris recognition method based on multi-unit iris images

    Science.gov (United States)

    Shin, Kwang Yong; Kim, Yeong Gon; Park, Kang Ryoung

    2013-04-01

    For the purpose of biometric person identification, iris recognition uses the unique characteristics of the patterns of the iris; that is, the eye region between the pupil and the sclera. When obtaining an iris image, the iris's image is frequently rotated because of the user's head roll toward the left or right shoulder. As the rotation of the iris image leads to circular shifting of the iris features, the accuracy of iris recognition is degraded. To solve this problem, conventional iris recognition methods use shifting of the iris feature codes to perform the matching. However, this increases the computational complexity and level of false acceptance error. To solve these problems, we propose a novel iris recognition method based on multi-unit iris images. Our method is novel in the following five ways compared with previous methods. First, to detect both eyes, we use Adaboost and a rapid eye detector (RED) based on the iris shape feature and integral imaging. Both eyes are detected using RED in the approximate candidate region that consists of the binocular region, which is determined by the Adaboost detector. Second, we classify the detected eyes into the left and right eyes, because the iris patterns in the left and right eyes in the same person are different, and they are therefore considered as different classes. We can improve the accuracy of iris recognition using this pre-classification of the left and right eyes. Third, by measuring the angle of head roll using the two center positions of the left and right pupils, detected by two circular edge detectors, we obtain the information of the iris rotation angle. Fourth, in order to reduce the error and processing time of iris recognition, adaptive bit-shifting based on the measured iris rotation angle is used in feature matching. Fifth, the recognition accuracy is enhanced by the score fusion of the left and right irises. Experimental results on the iris open database of low-resolution images showed that the

  2. An indexing method for color iris images

    Science.gov (United States)

    Crihalmeanu, Simona G.; Ross, Arun A.

    2015-05-01

    In this work, we study the possibility of indexing color iris images. In the proposed approach, a clustering scheme on a training set of iris images is used to determine cluster centroids that capture the variations in chromaticity of the iris texture. An input iris image is indexed by comparing its pixels against these centroids and determining the dominant clusters - i.e., those clusters to which the majority of its pixels are assigned to. The cluster indices serve as an index code for the input iris image and are used during the search process, when an input probe has to be compared with a gallery of irides. Experiments using multiple color spaces convey the efficacy of the scheme on good quality images, with hit rates closes to 100% being achieved at low penetration rates.

  3. IRIS Toxicological Review of Tetrahydrofuran (THF) (External ...

    Science.gov (United States)

    EPA is conducting a peer review and public comment of the scientific basis supporting the human health hazard and dose-response assessment of tetrahydrofuran (THF) that when finalized will appear on the Integrated Risk Information System (IRIS) database. EPA is undertaking an Integrated Risk Information System (IRIS) health assessment for tetrahydrofuran. IRIS is an EPA database containing Agency scientific positions on potential adverse human health effects that may result from chronic (or lifetime) exposure to chemicals in the environment. IRIS contains chemical-specific summaries of qualitative and quantitative health information in support of two steps of the risk assessment paradigm, i.e., hazard identification and dose-response evaluation. IRIS assessments are used in combination with specific situational exposure assessment information to evaluate potential public health risk associated with environmental contaminants.

  4. Efficient Iris Localization via Optimization Model

    Directory of Open Access Journals (Sweden)

    Qi Wang

    2017-01-01

    Full Text Available Iris localization is one of the most important processes in iris recognition. Because of different kinds of noises in iris image, the localization result may be wrong. Besides this, localization process is time-consuming. To solve these problems, this paper develops an efficient iris localization algorithm via optimization model. Firstly, the localization problem is modeled by an optimization model. Then SIFT feature is selected to represent the characteristic information of iris outer boundary and eyelid for localization. And SDM (Supervised Descent Method algorithm is employed to solve the final points of outer boundary and eyelids. Finally, IRLS (Iterative Reweighted Least-Square is used to obtain the parameters of outer boundary and upper and lower eyelids. Experimental result indicates that the proposed algorithm is efficient and effective.

  5. An Accurate and Efficient User Authentication Mechanism on Smart Glasses Based on Iris Recognition

    Directory of Open Access Journals (Sweden)

    Yung-Hui Li

    2017-01-01

    Full Text Available In modern society, mobile devices (such as smart phones and wearable devices have become indispensable to almost everyone, and people store personal data in devices. Therefore, how to implement user authentication mechanism for private data protection on mobile devices is a very important issue. In this paper, an intelligent iris recognition mechanism is designed to solve the problem of user authentication in wearable smart glasses. Our contributions include hardware and software. On the hardware side, we design a set of internal infrared camera modules, including well-designed infrared light source and lens module, which is able to take clear iris images within 2~5 cm. On the software side, we propose an innovative iris segmentation algorithm which is both efficient and accurate to be used on smart glasses device. Another improvement to the traditional iris recognition is that we propose an intelligent Hamming distance (HD threshold adaptation method which dynamically fine-tunes the HD threshold used for verification according to empirical data collected. Our final system can perform iris recognition with 66 frames per second on a smart glasses platform with 100% accuracy. As far as we know, this system is the world’s first application of iris recognition on smart glasses.

  6. Application of Framework for Integrating Safety, Security and Safeguards (3Ss) into the Design Of Used Nuclear Fuel Storage Facility

    Energy Technology Data Exchange (ETDEWEB)

    Badwan, Faris M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Demuth, Scott F [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-06

    Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is a fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design of the

  7. Security controls in an integrated Biobank to protect privacy in data sharing: rationale and study design.

    Science.gov (United States)

    Takai-Igarashi, Takako; Kinoshita, Kengo; Nagasaki, Masao; Ogishima, Soichi; Nakamura, Naoki; Nagase, Sachiko; Nagaie, Satoshi; Saito, Tomo; Nagami, Fuji; Minegishi, Naoko; Suzuki, Yoichi; Suzuki, Kichiya; Hashizume, Hiroaki; Kuriyama, Shinichi; Hozawa, Atsushi; Yaegashi, Nobuo; Kure, Shigeo; Tamiya, Gen; Kawaguchi, Yoshio; Tanaka, Hiroshi; Yamamoto, Masayuki

    2017-07-06

    With the goal of realizing genome-based personalized healthcare, we have developed a biobank that integrates personal health, genome, and omics data along with biospecimens donated by volunteers of 150,000. Such a large-scale of data integration involves obvious risks of privacy violation. The research use of personal genome and health information is a topic of global discussion with regard to the protection of privacy while promoting scientific advancement. The present paper reports on our plans, current attempts, and accomplishments in addressing security problems involved in data sharing to ensure donor privacy while promoting scientific advancement. Biospecimens and data have been collected in prospective cohort studies with the comprehensive agreement. The sample size of 150,000 participants was required for multiple researches including genome-wide screening of gene by environment interactions, haplotype phasing, and parametric linkage analysis. We established the T ohoku M edical M egabank (TMM) data sharing policy: a privacy protection rule that requires physical, personnel, and technological safeguards against privacy violation regarding the use and sharing of data. The proposed policy refers to that of NCBI and that of the Sanger Institute. The proposed policy classifies shared data according to the strength of re-identification risks. Local committees organized by TMM evaluate re-identification risk and assign a security category to a dataset. Every dataset is stored in an assigned segment of a supercomputer in accordance with its security category. A security manager should be designated to handle all security problems at individual data use locations. The proposed policy requires closed networks and IP-VPN remote connections. The mission of the biobank is to distribute biological resources most productively. This mission motivated us to collect biospecimens and health data and simultaneously analyze genome/omics data in-house. The biobank also has the

  8. A Complex Systems Approach to the Design and Evaluation of Holistic Security Ecosystems

    Science.gov (United States)

    Ulieru, Mihaela

    A conceptual model for the design and evaluation of Holistic Security Ecosystems is introduced together with a proof of concept test bed for exploring the social, cognitive, geographic and informational dynamics in the emergence of such large scale interdependent meta-organizations. The model is based on recent developments of the holonic paradigm of cross-organizational workflow coordination and decision making. Focused on the dynamic, on-the-fly creation of targeted, short-lived meta-organizations that work towards achieving a common goal (crisis resolution) the model guarantees optimal coordination and decision making at various levels of resolution across the holarchic levels of the organization.

  9. The Design Process of Physical Security as Applied to a U.S. Border Point of Entry

    Energy Technology Data Exchange (ETDEWEB)

    Wagner, G.G.

    1998-10-26

    This paper describes the design process of physical security as applied to a U.S. Border Port of Entry (PoE). Included in this paper are descriptions of the elements that compose U.S. border security. The physical security design will describe the various elements that make up the process as well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry and exit of illegal contraband will be emphasized.

  10. IRIS

    African Journals Online (AJOL)

    Esem

    detected HIV DNA on polymerase chain reaction. (PCR). Anti-Retroviral Therapy (ART): Infants initiated on. ART on the ward or follow up clinics are reviewed fortnightly in the first month in out-patient clinic run by the unit. Those infants who were found to have. BGC reactivation which was defined as swelling or ulceration at ...

  11. Relationship of the Van Herick Grading System with Peripheral Iris Configuration and Level of Iris Insertion.

    Science.gov (United States)

    Khan, Faisal Aziz; Niazi, Shafaq Pervez Khan; Khan, Assad Zaman

    2017-09-01

    To determine the relationship of the van Herick angle grading system with the level of iris insertion and peripheral iris configuration. Observational study. Eye department, Combined Military Hospital, Malir Cantt., Karachi, from May to October 2015. Sixty-five eyes of 65 patients were recruited. Anterior chamber depth at the temporal limbus was measured as a fraction of corneal section thickness using van Herick technique and graded on the standard 4-point scale of the van Herick grading system. Gonioscopy of the temporal quadrant was performed with a Posner 4 mirror goniolens and both the true level of iris insertion and peripheral iris configuration were recorded on a 4-point scale so as to equate with the van Herick 4-point grading system. Spearman's rho test was applied to determine the relationship of the van Herick grading system with level of iris root insertion and peripheral iris configuration. Amoderate positive correlation between van Herick grade and peripheral iris configuration was found which was statistically significant (rs=0.42, p < 0.001). Astatistically significant and moderate positive correlation was also detected between van Herick grade and the level of iris insertion (rs=0.45, p < 0.001). The van Herick grade has a moderately positive relationship with the peripheral iris configuration and true level of iris insertion.

  12. Conceptual design of technical security systems for Russian nuclear facilities physical protection

    International Nuclear Information System (INIS)

    Izmailov, A.V.

    1995-01-01

    Conceptual design of technical security systems (TSS) used in the early stages of physical protection systems (PPS) design for Russia nuclear facilities is discussed. The importance of work carried out in the early stages was noted since the main design solutions are being made within this period (i.e. selection of a structure of TSS and its components). The methods of analysis and synthesis of TSS developed by ''Eleron'' (MINATOM of Russia) which take into account the specific conditions of Russian nuclear facilities and a scope of equipment available are described in the review. TSS effectiveness assessment is based on a probability theory and a simulation. The design procedure provides for a purposeful choice of TSS competitive options including a ''cost-benefit'' criterion and taking into account a prechosen list of design basis threats to be used for a particular facility. The attention is paid to a practical aspect of the methods application as well as to the bilateral Russian-American scientific and technical co-operation in the PPS design field

  13. The Design Process of Physical Security as Applied to a U.S. Border Port of Entry

    Energy Technology Data Exchange (ETDEWEB)

    Wagner, G.G.

    1999-02-22

    This paper details the application of a standard physical security system design process to a US Border Port of Entry (PoE) for vehicle entry/exit. The physical security design methodology is described as well as the physical security similarities to facilities currently at a US Border PoE for vehicles. The physical security design process description includes the various elements that make up the methodologies well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry/exit of illegal contraband and personnel are described. The potential to enhance the functions of drug/contraband detection in the Pre-Primary Inspection area through the application of emerging technologies are also addressed.

  14. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  15. Designing and constructing/installing technical security countermeasures (TSCM) into supersensitive facilities

    International Nuclear Information System (INIS)

    Davis, D.L.

    1988-01-01

    The design and construction of supersensitive facilities and the installation of systems secure from technical surveillance and sabotage penetration involve ''TSCM'' in the broad sense of technical ''security'' countermeasures. When the technical threat was at a lower level of intensity and sophistication, it was common practice to defer TSCM to the future facility occupant. However, the New Moscow Embassy experience has proven this course of action subject to peril. Although primary concern with the embassy was audio surveillance, elsewhere there are other threats of equal or greater concern, e.g., technical implants may be used to monitor readiness status or interfere with the operation of C3I and weapons systems. Present and future technical penetration threats stretch the imagination. The Soviets have committed substantial hard scientific resources to a broad range of technical intelligence, even including applications or parapsychology. Countering these threats involves continuous TSCM precautions from initial planning to completion. Designs and construction/installation techniques must facilitate technical inspections and preclude the broadest range of known and suspected technical penetration efforts

  16. Designing and constructing/installing technical security countermeasures (TSCM) into supersensitive facilities

    Energy Technology Data Exchange (ETDEWEB)

    Davis, D.L.

    1988-01-01

    The design and construction of supersensitive facilities and the installation of systems secure from technical surveillance and sabotage penetration involve ''TSCM'' in the broad sense of technical ''security'' countermeasures. When the technical threat was at a lower level of intensity and sophistication, it was common practice to defer TSCM to the future facility occupant. However, the New Moscow Embassy experience has proven this course of action subject to peril. Although primary concern with the embassy was audio surveillance, elsewhere there are other threats of equal or greater concern, e.g., technical implants may be used to monitor readiness status or interfere with the operation of C3I and weapons systems. Present and future technical penetration threats stretch the imagination. The Soviets have committed substantial hard scientific resources to a broad range of technical intelligence, even including applications or parapsychology. Countering these threats involves continuous TSCM precautions from initial planning to completion. Designs and construction/installation techniques must facilitate technical inspections and preclude the broadest range of known and suspected technical penetration efforts.

  17. Iris pigment epithelial cysts in a newborn

    Directory of Open Access Journals (Sweden)

    Zargar, Shabnam

    2016-04-01

    Full Text Available Purpose: We report a case of iris pigment epithelial cysts in a newborn and discuss the importance of an accurate diagnosis for prevention of amblyopia.Methods: We describe a case of an abnormal red reflex seen on a newborn exam.Results: A full-term female born via normal spontaneous vaginal delivery without any complications was seen in the newborn nursery. She was noted to have an abnormal eye exam. Pupils were large with circular dark excrescences of the iris pigment epithelium. She was referred to a pediatric ophthalmologist where she was noted to fixate and follow faces. No afferent pupillary defect was seen. OD red reflex was normal whereas OS red reflex was blocked mostly by dark excrescences. A 2– dark brown lesion was seen in the OD iris and a 3–5 mm dark brown lesion was seen in the OS iris, consistent with a pupillary iris pigment epithelial cyst. Central visual axis was clear OU. Glaucoma was not present and patching was not performed. Observations and clinical photographs were recommended with follow-up in three months.Conclusion: Iris pigment epithelial cysts are uncommonly seen in children. The primary care provider first seeing a newborn must be aware of lesions obscuring a red reflex with appropriate follow-up. Follow-up in three months with IOP measurements is recommended. Iris pigment epithelial cysts in children may be a cause of amblyopia, thus prompt evaluation is important for prognostic purposes and the prevention of amblyopia.

  18. IRIS Toxicological Review of Thallium and Compounds ...

    Science.gov (United States)

    Thallium compounds are used in the semiconductor industry, the manufacture of optic lenses and low-melting glass, low-temperature thermometers, alloys, electronic devices, mercury lamps, fireworks, and imitation germs, and clinically as an imaging agent in the diagnosis of certain tumors. EPA's assessment of noncancer health effects and carcinogenic potential of thallium compounds was last prepared and added to the IRIS database between 1988 and 1990. The IRIS program is preparing an assessment that will incorporate current health effects information available for thallium and compounds, and current risk assessment methods. The IRIS assessment for thallium compounds will consist of a Toxicological Review and IRIS Summary. The Toxicological Review is a critical review of the physiochemical and toxicokinetic properties of a chemical, and its toxicity in humans and experimental systems. The assessment will present reference values for the noncancer effects of thallium compounds (RfD and Rfc), and a cancer assessment. The Toxicological Review and IRIS Summary have been subject to Agency review, Interagency review, and external scientific peer review. The final product will reflect the Agency opinion on the overall toxicity of thallium and compounds. EPA is undertaking an Integrated Risk Information System (IRIS) health assessment for thallium and compounds. IRIS is an EPA database containing Agency scientific positions on potential adverse human health effec

  19. Off-Angle Iris Correction Methods

    Energy Technology Data Exchange (ETDEWEB)

    Santos-Villalobos, Hector J [ORNL; Thompson, Joseph T [ORNL; Karakaya, Mahmut [ORNL; Boehnen, Chris Bensing [ORNL

    2016-01-01

    In many real world iris recognition systems obtaining consistent frontal images is problematic do to inexperienced or uncooperative users, untrained operators, or distracting environments. As a result many collected images are unusable by modern iris matchers. In this chapter we present four methods for correcting off-angle iris images to appear frontal which makes them compatible with existing iris matchers. The methods include an affine correction, a retraced model of the human eye, measured displacements, and a genetic algorithm optimized correction. The affine correction represents a simple way to create an iris image that appears frontal but it does not account for refractive distortions of the cornea. The other method account for refraction. The retraced model simulates the optical properties of the cornea. The other two methods are data driven. The first uses optical flow to measure the displacements of the iris texture when compared to frontal images of the same subject. The second uses a genetic algorithm to learn a mapping that optimizes the Hamming Distance scores between off-angle and frontal images. In this paper we hypothesize that the biological model presented in our earlier work does not adequately account for all variations in eye anatomy and therefore the two data-driven approaches should yield better performance. Results are presented using the commercial VeriEye matcher that show that the genetic algorithm method clearly improves over prior work and makes iris recognition possible up to 50 degrees off-angle.

  20. Role of Arbuscular Mycorrhizal Fungi on Iris

    Directory of Open Access Journals (Sweden)

    CHEN Yuan

    2014-06-01

    Full Text Available For efficiency using the amphibious plant iris to restore polluted water, the promoting effect of different arbuscular mycorrhiza fungi(AMFon iris was investigated, by monitoring the plant growth index, the physicochemical properties of the soil and the plant photosynthesis indexes. The result showed that the promoting effects of the AMF on the aboveground part and the underground part of the iris were based on different mechanism. For the underground part of the iris, the AMF stimulated its growth through the nutrient enrichment which was performed by the enormous hypha network. The nitrogen absorbing rate of the G. mosseae and the G. intraradices infected iris increased about 71.75% and 42.55%, and the phosphorous absorbing rate increased 8.36% and 9.5% separately. For the aboveground part of the iris, the AMF strengthened the conductance of the leaves’ stomas to control the balance between the net photosynthesis rate and the transpiration rate, so that the utilization rate of water resources was optimized, the metabolic rate was accelerated and the growth of the plant was promoted eventually. In this study, the promoting effect of the G. mosseae on the photosynthesis rate of the iris was significantly better than that of the G. intraradices(P<0.05.

  1. Proposed New Accelerator Design for Homeland Security X-Ray Applications

    Energy Technology Data Exchange (ETDEWEB)

    Clayton, James [Varian Medical Systems, Inc., Palo Alto, CA 94304 (United States). Imaging Lab.; Shedlock, Daniel [Varian Medical Systems, Inc., Palo Alto, CA 94304 (United States). Imaging Lab.; Langeveld, Willem G.J. [Rapiscan Laboratories, Inc., Sunnyvale, CA 94085 (United States); Bharadwaj, Vinod [SLAC National Accelerator Lab., Menlo Park, CA (United States); Nosochkov, Yuri [SLAC National Accelerator Lab., Menlo Park, CA (United States)

    2015-08-07

    In the security and inspection market, there is a push towards highly mobile, reduced-dose active interrogation scanning and imaging systems to allow operation in urban environments. To achieve these goals, the accelerator system design needs to be smaller than existing systems. A smaller radiation exclusion zone may be accomplished through better beam collimation and an integrated, x-ray-source/detector-array assembly to allow feedback and control of an intensity-modulated x-ray source. A shaped low-Z target in the x-ray source can be used to generate a more forward peaked x-ray beam. Electron-beam steering can then be applied to direct the forward-peaked x rays toward areas in the cargo with high attenuation. This paper presents an exploratory study to identify components and upgrades that would be required to meet the desired specifications, as well as the best technical approach to design and build a prototype.

  2. A cyber security risk assessment for the design of I and C system in nuclear power plants

    International Nuclear Information System (INIS)

    Song, Jae Gu; Lee, Jung Woon; Lee, Cheal Kwon; Kwon, Kee Choon; Lee, Dong Young

    2012-01-01

    The applications of computers and communication system and network technologies in nuclear power plants have expanded recently. This application of digital technologies to the instrumentation and control systems of nuclear power plants brings with it the cyber security concerns similar to other critical infrastructures. Cyber security risk assessments for digital instrumentation and control systems have become more crucial in the development of new systems and in the operation of existing systems. Although the instrumentation and control systems of nuclear power plants are similar to industrial control systems, the former have specifications that differ from the latter in terms of architecture and function, in order to satisfy nuclear safety requirements, which need different methods for the application of cyber security risk assessment. In this paper, the characteristics of nuclear power plant instrumentation and control systems are described, and the considerations needed when conducting cyber security risk assessments in accordance with the life cycle process of instrumentation and control systems are discussed. For cyber security risk assessments of instrumentation and control systems, the activities and considerations necessary for assessments during the system design phase or component design and equipment supply phase are presented in the following 6 steps: 1) System Identification and Cyber Security Modeling, 2) Asset and Impact Analysis, 3) Threat Analysis, 4) Vulnerability Analysis, 5) Security Control Design, and 6) Penetration test. The results from an application of the method to a digital reactor protection system are described.

  3. Iris Recognition Method Based on Natural Open Eyes | Latha ...

    African Journals Online (AJOL)

    ... makes codes to feature points and figures the iris pattern by iris codes. Finally, sorts the different iris patterns by auto accommodated pattern matching method and gives the recognition results. Many experiments show the recognition rates of this method can reach 99.687% that can meet the demand of iris recognition.

  4. Information Security Awareness On-Line Materials Design with Knowledge Maps

    Science.gov (United States)

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  5. Sustainable Queuing-Network Design for Airport Security Based on the Monte Carlo Method

    Directory of Open Access Journals (Sweden)

    Xiangqian Xu

    2018-01-01

    Full Text Available The design of airport queuing networks is a significant research field currently for researchers. Many factors must to be considered in order to achieve the optimized strategies, including the passenger flow volume, boarding time, and boarding order of passengers. Optimizing these factors lead to the sustainable development of the queuing network, which currently faces a few difficulties. In particular, the high variance in checkpoint lines can be extremely costly to passengers as they arrive unduly early or possibly miss their scheduled flights. In this article, the Monte Carlo method is used to design the queuing network so as to achieve sustainable development. Thereafter, a network diagram is used to determine the critical working point, and design a structurally and functionally sustainable network. Finally, a case study for a sustainable queuing-network design in the airport is conducted to verify the efficiency of the proposed model. Specifically, three sustainable queuing-network design solutions are proposed, all of which not only maintain the same standards of security, but also increase checkpoint throughput and reduce passenger waiting time variance.

  6. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks.

    Science.gov (United States)

    Peter, Steffen; Reddy, Bhanu Pratap; Momtaz, Farshad; Givargis, Tony

    2016-04-22

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system.

  7. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks

    Directory of Open Access Journals (Sweden)

    Steffen Peter

    2016-04-01

    Full Text Available Body area sensor networks (BANs utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system.

  8. 360-Degree Iris Burns Following Conductive Keratoplasty.

    Science.gov (United States)

    Çakir, Hanefi; Genç, Selim; Güler, Emre

    2016-11-01

    The authors report a case with multiple iris burns after conductive keratoplasty to correct hyperopia. Case report. A 52-year-old woman with hyperopia had a previous conductive keratoplasty procedure and underwent a conductive keratoplasty re-treatment 6 months later. Postoperatively, she presented with 360-degree iris burns in both eyes that were correlated with the corneal conductive keratoplasty scars. In addition, specular microscopy revealed decreased endothelial cell density for both eyes. This is the first reported case of iris burns associated with conductive keratoplasty. [J Refract Surg. 2016;32(11):776-778.]. Copyright 2016, SLACK Incorporated.

  9. Fusion of hand vein, iris and fingerprint for person identity verification based on Bayesian theory

    Science.gov (United States)

    Li, Xiuyan; Liu, Tiegen; Deng, Shichao; Wang, Yunxin

    2009-11-01

    Biometric identification is an important guarantee for social security. In recent years, as the development of social and economic, the more accuracy and safety of identification are required. The person identity verification systems that use a single biometric appear inherent limitations in accuracy, user acceptance, universality. Limitations of unimodal biometric systems can be overcome by using multimodal biometric systems, which combines the conclusions made by a number of unrelated biometrics indicators. Aiming at the limitations of unimodal biometric identification, a recognition algorithm for multimodal biometric fusion based on hand vein, iris and fingerprint was proposed. To verify person identity, the hand vein images, iris images and fingerprint images were preprocessed firstly. The region of interest (ROI) of hand vein image was obtained and filtered to reduce image noises. The multiresolution analysis theory was utilized to extract the texture information of hand vein. The iris image was preprocessed through iris localization, eyelid detection, image normalization and image enhancement, and then the feature code of iris was extracted from the detail images obtained using wavelet transform. The texture feature information represented fingerprint pattern was extracted after filtering and image enhancement. The Bayesian theorem was employed to realize the fusion at the matching score level and the fusion recognition result was finally obtained. The experimental results were presented, which showed that the recognition performance of the proposed fusion method was obviously higher than that of single biometric recognition algorithm. It had verified the efficiency of the proposed method for biometrics.

  10. Artificial neural network used in the study of sensitivities in IRIS reactor pressurizer

    International Nuclear Information System (INIS)

    Costa, Samuel Pimentel; Lira, Carlos Alberto Brayner de Oliveira; Lima, Fernando Roberto de Andrade; Lapa, Celso Marcelo Franklin

    2011-01-01

    In general, the technique of sensibility analysis studies the behavior of the ratio between the variation of output results and the variation of input parameters. This study performed in the reactor pressurizer, which is a component responsible for control of the pressure inside the vessel, has fundamental importance in designing the security of any concept of advanced reactor. Above all, for its feature of passive action of the pressurizer (there is no spray), this analysis becomes a necessary step for safety and performance of the plant. The direct method through code MODPRESS, which represents the pressurizer model of the International Reactor Innovative and Secure (IRIS), has required large computational effort. Unlike this method, Artificial Neural Networks (ANN), beyond faster, do not require a typical linear behavior of the system. Moreover, they can also use experimental data for their training and learning. If the ANN are satisfactory in this theoretical case may be used for future mapping and forecasting of the behavior of various phenomena in both plant operation and small-scale experiment to be installed in CRCN-NE. Based on the results obtained in this study, one can conclude that the artificial neural networks are presented as an alternative to MODPRESS code, as well as a great tool to calculate the sensitivity coefficient. (author)

  11. Deep Learning-Based Iris Segmentation for Iris Recognition in Visible Light Environment

    Directory of Open Access Journals (Sweden)

    Muhammad Arsalan

    2017-11-01

    Full Text Available Existing iris recognition systems are heavily dependent on specific conditions, such as the distance of image acquisition and the stop-and-stare environment, which require significant user cooperation. In environments where user cooperation is not guaranteed, prevailing segmentation schemes of the iris region are confronted with many problems, such as heavy occlusion of eyelashes, invalid off-axis rotations, motion blurs, and non-regular reflections in the eye area. In addition, iris recognition based on visible light environment has been investigated to avoid the use of additional near-infrared (NIR light camera and NIR illuminator, which increased the difficulty of segmenting the iris region accurately owing to the environmental noise of visible light. To address these issues; this study proposes a two-stage iris segmentation scheme based on convolutional neural network (CNN; which is capable of accurate iris segmentation in severely noisy environments of iris recognition by visible light camera sensor. In the experiment; the noisy iris challenge evaluation part-II (NICE-II training database (selected from the UBIRIS.v2 database and mobile iris challenge evaluation (MICHE dataset were used. Experimental results showed that our method outperformed the existing segmentation methods.

  12. The Priority of Road Rehabilitation in Karanganyar Regency Using IRI Estimation from Roadroid

    Science.gov (United States)

    Achmadi, F.; Suprapto, M.; Setyawan, A.

    2017-02-01

    The IRI (International Roughness Index) is a road roughness index commonly obtained from measured longitudinal road profiles. This is one of the functional performance a surface of road pavement. Therefore, needs to be done evaluation and monitoring periodically to getting priority of road rehabilitation right on target. The IRI standard has commonly been used worldwide for evaluating road system. The Roadroid is an application to measure road quality with a website to view road quality. It is designed for Android smartphones, so we can easily measure and monitor the road and also use the camera for GPS-tagged photo. By using the built-in vibration sensor in smartphones, it is possible to collect IRI value which can be an indicator road conditions. This study attempts to explain the priority of road rehabilitation in Karanganyar Regency. The location of the study focused on a collector street (primary, secondary and locally road). The result of IRI estimation will be combined with other aspects that influences; land use, policy, the connectivity of road and traffic average daily. Based on IRI estimation using Roadroid, the road conditions in Karanganyar Regency can be described 59,60% were good (IRI12).

  13. Secured Hash Based Burst Header Authentication Design for Optical Burst Switched Networks

    Science.gov (United States)

    Balamurugan, A. M.; Sivasubramanian, A.; Parvathavarthini, B.

    2017-12-01

    The optical burst switching (OBS) is a promising technology that could meet the fast growing network demand. They are featured with the ability to meet the bandwidth requirement of applications that demand intensive bandwidth. OBS proves to be a satisfactory technology to tackle the huge bandwidth constraints, but suffers from security vulnerabilities. The objective of this proposed work is to design a faster and efficient burst header authentication algorithm for core nodes. There are two important key features in this work, viz., header encryption and authentication. Since the burst header is an important in optical burst switched network, it has to be encrypted; otherwise it is be prone to attack. The proposed MD5&RC4-4S based burst header authentication algorithm runs 20.75 ns faster than the conventional algorithms. The modification suggested in the proposed RC4-4S algorithm gives a better security and solves the correlation problems between the publicly known outputs during key generation phase. The modified MD5 recommended in this work provides 7.81 % better avalanche effect than the conventional algorithm. The device utilization result also shows the suitability of the proposed algorithm for header authentication in real time applications.

  14. Design and development of a secure DICOM-Network Attached Server.

    Science.gov (United States)

    Tachibana, Hidenobu; Omatsu, Masahiko; Higuchi, Ko; Umeda, Tokuo

    2006-03-01

    It is not easy to connect a web-based server with an existing DICOM server, and using a web-based server on the INTERNET has risks. In this study, we designed and developed the secure DICOM-Network Attached Server (DICOM-NAS) through which the DICOM server in a hospital-Local Area Network (LAN) was connected to the INTERNET. After receiving a Client's image export request, the DICOM-NAS sent it to the DICOM server with DICOM protocol. The server then provided DICOM images to the DICOM-NAS, which transferred them to the Client using HTTP. The DICOM-NAS plays an important role between DICOM protocol and HTTP, and only temporarily stores the requested images. The DICOM server keeps all of the original DICOM images. When unwanted outsiders attempt to get into the DICOM-NAS, they cannot access any medical images because these images are not stored in the DICOM-NAS. Therefore, the DICOM-NAS does not require large storage, but can greatly improve information security.

  15. [Design and development of a secure DICOM-Network Attached Server].

    Science.gov (United States)

    Tachibana, Hidenobu; Omatsu, Masahiko; Higuchi, Ko; Umeda, Tokuo

    2006-04-20

    It is not easy to connect a Web-based server with an existing DICOM server, and using a Web-based server on the Internet has risks. In this study, we designed and developed a secure DICOM-Network Attached Server (DICOM-NAS) through which the DICOM server in a hospital LAN was connected to the Internet. After receiving a client's image export request, the DICOM-NAS sent it to the DICOM server using the DICOM protocol. The server then provided DICOM images to the DICOM-NAS, which transferred them to the client, using HTTP. The DICOM-NAS plays an important role between the DICOM protocol and HTTP, and stores the requested images only temporarily. The DICOM server keeps all of the original DICOM images. If an unauthorized user attempts to access the DICOM-NAS, medical images cannot be accessed because images are not stored in the DICOM-NAS. Furthermore, the DICOM-NAS has features related to reporting and MPR. Therefore, the DICOM-NAS does not require a large storage capacity, but can greatly improve information security.

  16. Design of parallel dual-energy X-ray beam and its performance for security radiography

    International Nuclear Information System (INIS)

    Kim, Kwang Hyun; Myoung, Sung Min; Chung, Yong Hyun

    2011-01-01

    A new concept of dual-energy X-ray beam generation and acquisition of dual-energy security radiography is proposed. Erbium (Er) and rhodium (Rh) with a copper filter were positioned in front of X-ray tube to generate low- and high-energy X-ray spectra. Low- and high-energy X-rays were guided to separately enter into two parallel detectors. Monte Carlo code of MCNPX was used to derive an optimum thickness of each filter for improved dual X-ray image quality. It was desired to provide separation ability between organic and inorganic matters for the condition of 140 kVp/0.8 mA as used in the security application. Acquired dual-energy X-ray beams were evaluated by the dual-energy Z-map yielding enhanced performance compared with a commercial dual-energy detector. A collimator for the parallel dual-energy X-ray beam was designed to minimize X-ray beam interference between low- and high-energy parallel beams for 500 mm source-to-detector distance.

  17. AES Cardless Automatic Teller Machine (ATM) Biometric Security System Design Using FPGA Implementation

    Science.gov (United States)

    Ahmad, Nabihah; Rifen, A. Aminurdin M.; Helmy Abd Wahab, Mohd

    2016-11-01

    Automated Teller Machine (ATM) is an electronic banking outlet that allows bank customers to complete a banking transactions without the aid of any bank official or teller. Several problems are associated with the use of ATM card such card cloning, card damaging, card expiring, cast skimming, cost of issuance and maintenance and accessing customer account by third parties. The aim of this project is to give a freedom to the user by changing the card to biometric security system to access the bank account using Advanced Encryption Standard (AES) algorithm. The project is implemented using Field Programmable Gate Array (FPGA) DE2-115 board with Cyclone IV device, fingerprint scanner, and Multi-Touch Liquid Crystal Display (LCD) Second Edition (MTL2) using Very High Speed Integrated Circuit Hardware (VHSIC) Description Language (VHDL). This project used 128-bits AES for recommend the device with the throughput around 19.016Gbps and utilized around 520 slices. This design offers a secure banking transaction with a low rea and high performance and very suited for restricted space environments for small amounts of RAM or ROM where either encryption or decryption is performed.

  18. [Color and form changes in the iris].

    Science.gov (United States)

    Wollensak, J

    1999-05-01

    The high variability of iris structures can be used for diagnostic purposes. An overview of the numerous changes visible at the slit lamp and possible diagnosis. Short description of possible irispathology with hints on pathology and treatment.

  19. Comparative consideration and design of a security depot for high radioactive glass-enclosed materials

    International Nuclear Information System (INIS)

    Jaroni, U.

    1985-01-01

    From the beginning of 1990 the COGEMA shall supply glass-enclosed high radioactive waste of the reprocessing of German fuel elements back to the Federal Republic of Germany. As to this time the final waste storage in the salt stock of Gorleben will not be available the glass cannisters have to be deposited above ground. First a comparison is made out of a number of proposed storage concepts for the deposition of HAW-glass blocks. The safety technical behaviour of the facility is considered. On the basis of the gained results a new facility design is presented, which can take 450 glass cannisters in a discoid built up cast-steel vessel and makes possible the utilization of the resulting radioactive heat of dissociation. During the development of this concept besides a compact, reasonable method of building and the thermodynamic behaviour of the storage the aspect of high security against release of radioactive materials was emphasized. (orig.) [de

  20. NASA 2008 HyspIRI whitepaper and workshop report

    Science.gov (United States)

    ,; Mars, John

    2009-01-01

    From October 21-23, 2008, NASA held a three-day workshop to consider the Hyperspectral Infrared Imager (HyspIRI) mission recommended for implementation by the 2007 report from the U.S. National Research Council Earth Science and Applications from Space: National Imperatives for the Next Decade and Beyond, also known as the Earth Science Decadal Survey. The open workshop provided a forum to present the initial observational requirements for the mission and assess its anticipated impact on scientific and operational applications as well as obtain feedback from the broader scientific community on the mission concept. The workshop participants concluded the HyspIRI mission would provide a significant new capability to study ecosystems and natural hazards at spatial scales relevant to human resource use. In addition, participants confirmed that the proposed instrument designs could meet the measurement requirements and be implemented through the use of current technology. The workshop participants, like the Decadal Survey itself, strongly endorsed the need for the HyspIRI mission and felt the mission, as defined, would accomplish the intended science.

  1. Application of the Quality Functional Deployment Method in Mobility Aid Securement System Design

    Science.gov (United States)

    1992-12-01

    The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...

  2. Advanced User Interface Design and Advanced Internetting for Tactical Security Systems

    National Research Council Canada - National Science Library

    Murray, S

    1998-01-01

    ...), at the request of the U.S. Army Product Manager - Physical Security Equipment, initiated two exploratory development projects at SPAWAR Systems Center, San Diego, to develop an Advanced User Interface for Tactical Security (AITS...

  3. Multi-image encryption based on synchronization of chaotic lasers and iris authentication

    Science.gov (United States)

    Banerjee, Santo; Mukhopadhyay, Sumona; Rondoni, Lamberto

    2012-07-01

    A new technique of transmitting encrypted combinations of gray scaled and chromatic images using chaotic lasers derived from Maxwell-Bloch's equations has been proposed. This novel scheme utilizes the general method of solution of a set of linear equations to transmit similar sized heterogeneous images which are a combination of monochrome and chromatic images. The chaos encrypted gray scaled images are concatenated along the three color planes resulting in color images. These are then transmitted over a secure channel along with a cover image which is an iris scan. The entire cryptology is augmented with an iris-based authentication scheme. The secret messages are retrieved once the authentication is successful. The objective of our work is briefly outlined as (a) the biometric information is the iris which is encrypted before transmission, (b) the iris is used for personal identification and verifying for message integrity, (c) the information is transmitted securely which are colored images resulting from a combination of gray images, (d) each of the images transmitted are encrypted through chaos based cryptography, (e) these encrypted multiple images are then coupled with the iris through linear combination of images before being communicated over the network. The several layers of encryption together with the ergodicity and randomness of chaos render enough confusion and diffusion properties which guarantee a fool-proof approach in achieving secure communication as demonstrated by exhaustive statistical methods. The result is vital from the perspective of opening a fundamental new dimension in multiplexing and simultaneous transmission of several monochromatic and chromatic images along with biometry based authentication and cryptography.

  4. Assessment of iris surface features and their relationship with iris thickness in Asian eyes.

    Science.gov (United States)

    Sidhartha, Elizabeth; Gupta, Preeti; Liao, Jiemin; Tham, Yih-Chung; Cheung, Carol Y; He, Mingguang; Wong, Tien Y; Aung, Tin; Cheng, Ching-Yu

    2014-05-01

    To assess iris surface features in Asian eyes and examine their associations with iris thickness measured by anterior segment optical coherence tomography (AS OCT). Cross-sectional study. We recruited 250 subjects from the Singapore Malay Eye Study. We obtained standardized slit-lamp photographs and developed a grading system assessing iris crypts (by number and size), furrows (by number and circumferential extent), and color (higher grade denoting darker iris). Vertical and horizontal cross-sections of the anterior chamber were imaged using AS OCT. Intragrader and intergrader agreements in the grading of iris surface were assessed by weighted κ (κ(w)) statistic. Associations of the average iris thickness with the grade of iris features were assessed using linear regression analysis. Frequency and size of iris crypts, furrows, and color; iris thickness at 750 μm (IT750) and 2000 μm (IT2000) from the scleral spur; and maximum iris thickness (ITM) averaged from the 4 quarters. Three hundred sixty-four eyes had complete and gradable data for crypts and color; 330 eyes were graded for furrows. The grading scheme showed good intragrader (crypt κ(w) = 0.919, furrow κ(w) =0.901, color κ(w) = 0.925) and intergrader (crypt κ(w) = 0.775, furrow κ(w) = 0.836, color κ(w) = 0.718) agreements. Higher crypt grade was associated independently with thinner IT750 (β [change in iris thickness per grade higher] = -0.007; P = 0.029), IT2000 (β = -0.018; P iris was also associated with thicker IT750 (β = 0.014; P = 0.001). Iris surface features, assessed and measured from slit-lamp photographs, correlate well with iris thickness. Irises with more crypts are thinner; irises with more extensive furrows and darker color are thicker peripherally. These findings may provide another means to assess angle closure risk based on iris features. Copyright © 2014 American Academy of Ophthalmology. Published by Elsevier Inc. All rights reserved.

  5. Design and Analysis of a Secure Three Factor User Authentication Scheme Using Biometric and Smart Card

    OpenAIRE

    Mustafa, Hossen Asiful; Kafi, Hasan Muhammad

    2017-01-01

    Password security can no longer provide enough security in the area of remote user authentication. Considering this security drawback, researchers are trying to find solution with multifactor remote user authentication system. Recently, three factor remote user authentication using biometric and smart card has drawn a considerable attention of the researchers. However, most of the current proposed schemes have security flaws. They are vulnerable to attacks like user impersonation attack, serv...

  6. Exploiting the User: Adapting Personas for Use in Security Visualization Design

    Energy Technology Data Exchange (ETDEWEB)

    Stoll, Jennifer C.; McColgin, David W.; Gregory, Michelle L.; Crow, Vernon L.; Edwards, Keith

    2007-10-29

    It has long been noted that visual representations of complex information can facilitate rapid understanding of data {citation], even with respect to ComSec applications {citation]. Recognizing that visualizations can increase usability in ComSec applications, [Zurko, Sasse] have argued that there is a need to create more usable security visualizations. (VisSec) However, usability of applications generally fall into the domain of Human Computer Interaction (HCI), which generally relies on heavy-weight user-centered design (UCD) processes. For example, the UCD process can involve many prototype iterations, or an ethnographic field study that can take months to complete. The problem is that VisSec projects generally do not have the resources to perform ethnographic field studies, or to employ complex UCD methods. They often are running on tight deadlines and budgets that can not afford standard UCD methods. In order to help resolve the conflict of needing more usable designs in ComSec, but not having the resources to employ complex UCD methods, in this paper we offer a stripped-down lighter weight version of a UCD process which can help with capturing user requirements. The approach we use is personas which a user requirements capturing method arising out of the Participatory Design philosophy [Grudin02].

  7. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  8. DESIGN BASIS ACCIDENT ANALYSIS OF A SMALL MODULAR REACTOR

    OpenAIRE

    Aydogan, Fatih

    2017-01-01

    The International Reactor Innovative and Secure (IRIS) is an integrated small modular reactor (SMR) designed byWestinghouse Electric Company and a consortium of organizations. It has a thermal electric power rating of 1000MWth and an electric power rating of 335 MWe. Being an SMR that features a derivative pressurized water reactordesign, it contains the core, upper plenum, lower plenum, pressurizer, reactor coolant pumps, and steam generatorsin a single reactor vessel. An important feature o...

  9. Sequences associated with human iris pigmentation.

    Science.gov (United States)

    Frudakis, Tony; Thomas, Matthew; Gaskin, Zach; Venkateswarlu, K; Chandra, K Suresh; Ginjupalli, Siva; Gunturi, Sitaram; Natrajan, Sivamani; Ponnuswamy, Viswanathan K; Ponnuswamy, K N

    2003-12-01

    To determine whether and how common polymorphisms are associated with natural distributions of iris colors, we surveyed 851 individuals of mainly European descent at 335 SNP loci in 13 pigmentation genes and 419 other SNPs distributed throughout the genome and known or thought to be informative for certain elements of population structure. We identified numerous SNPs, haplotypes, and diplotypes (diploid pairs of haplotypes) within the OCA2, MYO5A, TYRP1, AIM, DCT, and TYR genes and the CYP1A2-15q22-ter, CYP1B1-2p21, CYP2C8-10q23, CYP2C9-10q24, and MAOA-Xp11.4 regions as significantly associated with iris colors. Half of the associated SNPs were located on chromosome 15, which corresponds with results that others have previously obtained from linkage analysis. We identified 5 additional genes (ASIP, MC1R, POMC, and SILV) and one additional region (GSTT2-22q11.23) with haplotype and/or diplotypes, but not individual SNP alleles associated with iris colors. For most of the genes, multilocus gene-wise genotype sequences were more strongly associated with iris colors than were haplotypes or SNP alleles. Diplotypes for these genes explain 15% of iris color variation. Apart from representing the first comprehensive candidate gene study for variable iris pigmentation and constituting a first step toward developing a classification model for the inference of iris color from DNA, our results suggest that cryptic population structure might serve as a leverage tool for complex trait gene mapping if genomes are screened with the appropriate ancestry informative markers.

  10. Mixed coherent states in coupled chaotic systems: Design of secure wireless communication

    Science.gov (United States)

    Vigneshwaran, M.; Dana, S. K.; Padmanaban, E.

    2016-12-01

    A general coupling design is proposed to realize a mixed coherent (MC) state: coexistence of complete synchronization, antisynchronization, and amplitude death in different pairs of similar state variables of the coupled chaotic system. The stability of coupled system is ensured by the Lyapunov function and a scaling of each variable is also separately taken care of. When heterogeneity as a parameter mismatch is introduced in the coupled system, the coupling function facilitates to retain its coherence and displays the global stability with renewed scaling factor. Robust synchronization features facilitated by a MC state enable to design a dual modulation scheme: binary phase shift key (BPSK) and parameter mismatch shift key (PMSK), for secure data transmission. Two classes of decoders (coherent and noncoherent) are discussed, the noncoherent decoder shows better performance over the coherent decoder, mostly a noncoherent demodulator is preferred in biological implant applications. Both the modulation schemes are demonstrated numerically by using the Lorenz oscillator and the BPSK scheme is demonstrated experimentally using radio signals.

  11. Biometric iris image acquisition system with wavefront coding technology

    Science.gov (United States)

    Hsieh, Sheng-Hsun; Yang, Hsi-Wen; Huang, Shao-Hung; Li, Yung-Hui; Tien, Chung-Hao

    2013-09-01

    Biometric signatures for identity recognition have been practiced for centuries. Basically, the personal attributes used for a biometric identification system can be classified into two areas: one is based on physiological attributes, such as DNA, facial features, retinal vasculature, fingerprint, hand geometry, iris texture and so on; the other scenario is dependent on the individual behavioral attributes, such as signature, keystroke, voice and gait style. Among these features, iris recognition is one of the most attractive approaches due to its nature of randomness, texture stability over a life time, high entropy density and non-invasive acquisition. While the performance of iris recognition on high quality image is well investigated, not too many studies addressed that how iris recognition performs subject to non-ideal image data, especially when the data is acquired in challenging conditions, such as long working distance, dynamical movement of subjects, uncontrolled illumination conditions and so on. There are three main contributions in this paper. Firstly, the optical system parameters, such as magnification and field of view, was optimally designed through the first-order optics. Secondly, the irradiance constraints was derived by optical conservation theorem. Through the relationship between the subject and the detector, we could estimate the limitation of working distance when the camera lens and CCD sensor were known. The working distance is set to 3m in our system with pupil diameter 86mm and CCD irradiance 0.3mW/cm2. Finally, We employed a hybrid scheme combining eye tracking with pan and tilt system, wavefront coding technology, filter optimization and post signal recognition to implement a robust iris recognition system in dynamic operation. The blurred image was restored to ensure recognition accuracy over 3m working distance with 400mm focal length and aperture F/6.3 optics. The simulation result as well as experiment validates the proposed code

  12. Proton beam radiotherapy of iris melanoma

    International Nuclear Information System (INIS)

    Damato, Bertil; Kacperek, Andrzej; Chopra, Mona; Sheen, Martin A.; Campbell, Ian R.; Errington, R. Douglas

    2005-01-01

    Purpose: To report on outcomes after proton beam radiotherapy of iris melanoma. Methods and Materials: Between 1993 and 2004, 88 patients with iris melanoma received proton beam radiotherapy, with 53.1 Gy in 4 fractions. Results: The patients had a mean age of 52 years and a median follow-up of 2.7 years. The tumors had a median diameter of 4.3 mm, involving more than 2 clock hours of iris in 32% of patients and more than 2 hours of angle in 27%. The ciliary body was involved in 20%. Cataract was present in 13 patients before treatment and subsequently developed in another 18. Cataract had a 4-year rate of 63% and by Cox analysis was related to age (p = 0.05), initial visual loss (p < 0.0001), iris involvement (p < 0.0001), and tumor thickness (p < 0.0001). Glaucoma was present before treatment in 13 patients and developed after treatment in another 3. Three eyes were enucleated, all because of recurrence, which had an actuarial 4-year rate of 3.3% (95% CI 0-8.0%). Conclusions: Proton beam radiotherapy of iris melanoma is well tolerated, the main problems being radiation-cataract, which was treatable, and preexisting glaucoma, which in several patients was difficult to control

  13. PERSISTENT PUPILLARY MEMBRANE OR ACCESSORY IRIS MEMBRANE?.

    Science.gov (United States)

    Gavriş, Monica; Horge, Ioan; Avram, Elena; Belicioiu, Roxana; Olteanu, Ioana Alexandra; Kedves, Hanga

    2015-01-01

    Frequently, in literature and curent practice, accessory iris membrane (AIM) and persistant pupillary membrane (PPM) are confused. Both AIM and PPM are congenital iris anomalies in which fine or thick iris strands arrise form the collarette and obscure the pupil. AIM, which is also called iris duplication, closely resembles the normal iris tissue in color and thickness and presents a virtual second pseudopupil aperture in the centre while PPM even in its extreme forms presents as a translucent or opaque membranous structure that extends across the pupil and has no pseudopupil. Mydriatiscs, laser treatment or surgery is used to clear the visual axis and optimize visual development. Surgical intervention is reserved for large, dense AIMs and PPMs. Our patient, a 29 year old male, has come with bilateral dense AIM, bilateral compound hyperopic astigmatism, BCVA OD = 0.6, BCVA OS = 0.4, IOP OU = 17 mmHg. To improve the visual acuity of the patient we decided to do a bilateral membranectomy, restoring in this way transparency of the visual axis. After surgery, the visual acuity improved to BCVA OD= 0.8, BCVA OS=0.8.

  14. IRIS Toxicological Review of Ammonia (Revised External ...

    Science.gov (United States)

    In August 2013, EPA submitted a revised draft IRIS assessment of ammonia to the agency's Science Advisory Board (SAB) and posted this draft on the IRIS website. EPA had previously released a draft of the assessment for public comment, held a public meeting about the draft, and then revised it based on the comments received. The SAB CAAC-Ammonia panel will review this draft assessment. Details about the meeting dates, times, and location are available via the Federal Register Notice posted on March 25, 2014. The SAB provided information on how the public can participate in the external peer review meetings, as well as instructions about how to provide comments to the SAB in the notice. Additional information on the SAB review of ammonia is on the SAB website. Report Information: The Toxicological Review of Ammonia was originally released for a 60-day public comment period on June 8, 2012. [Federal Register Notice Jun 8, 2012] EPA revised the toxicological review in response to the public comments received. EPA has released the revised external review draft ammonia assessment and the SAB CAAC is conducting a peer review of the scientific basis supporting the assessment that will appear in the Integrated Risk Information System (IRIS) database. Information regarding the peer review can be found at the SAB review of ammonia website. EPA is undertaking an Integrated Risk Information System (IRIS) health assessment for ammonia. IRIS is an EPA database cont

  15. ORNL Biometric Eye Model for Iris Recognition

    Energy Technology Data Exchange (ETDEWEB)

    Santos-Villalobos, Hector J [ORNL; Barstow, Del R [ORNL; Karakaya, Mahmut [ORNL; Chaum, Edward [University of Tennessee, Knoxville (UTK); Boehnen, Chris Bensing [ORNL

    2012-01-01

    Iris recognition has been proven to be an accurate and reliable biometric. However, the recognition of non-ideal iris images such as off angle images is still an unsolved problem. We propose a new biometric targeted eye model and a method to reconstruct the off-axis eye to its frontal view allowing for recognition using existing methods and algorithms. This allows for existing enterprise level algorithms and approaches to be largely unmodified by using our work as a pre-processor to improve performance. In addition, we describe the `Limbus effect' and its importance for an accurate segmentation of off-axis irides. Our method uses an anatomically accurate human eye model and ray-tracing techniques to compute a transformation function, which reconstructs the iris to its frontal, non-refracted state. Then, the same eye model is used to render a frontal view of the reconstructed iris. The proposed method is fully described and results from synthetic data are shown to establish an upper limit on performance improvement and establish the importance of the proposed approach over traditional linear elliptical unwrapping methods. Our results with synthetic data demonstrate the ability to perform an accurate iris recognition with an image taken as much as 70 degrees off-axis.

  16. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  17. Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation

    Directory of Open Access Journals (Sweden)

    Hongsong Chen

    2015-01-01

    Full Text Available Human health information from healthcare system can provide important diagnosis data and reference to doctors. However, continuous monitoring and security storage of human health data are challenging personal privacy and big data storage. To build secure and efficient healthcare application, Hadoop-based healthcare security communication system is proposed. In wireless biosensor network, authentication and key transfer should be lightweight. An ECC (Elliptic Curve Cryptography based lightweight digital signature and key transmission method are proposed to provide wireless secure communication in healthcare information system. Sunspot wireless sensor nodes are used to build healthcare secure communication network; wireless nodes and base station are assigned different tasks to achieve secure communication goal in healthcare information system. Mysql database is used to store Sunspot security entity table and measure entity table. Hadoop is used to backup and audit the Sunspot security entity table. Sqoop tool is used to import/export data between Mysql database and HDFS (Hadoop distributed file system. Ganglia is used to monitor and measure the performance of Hadoop cluster. Simulation results show that the Hadoop-based healthcare architecture and wireless security communication method are highly effective to build a wireless healthcare information system.

  18. Association Between Baseline Iris Thickness and Prophylactic Laser Peripheral Iridotomy Outcomes in Primary Angle Closure Suspects

    Science.gov (United States)

    Lee, Roland Y.; Kasuga, Toshimitsu; Cui, Qi N.; Porco, Travis C.; Huang, Guofu; He, Mingguang; Lin, Shan C.

    2014-01-01

    Objective To evaluate the association between baseline measurements of iris thickness at three positions and change in anterior segment biometric parameters after prophylactic laser peripheral iridotomy (LPI). Design Prospective clinical cohort study. Participants Fifty-two eyes of 52 nonglaucomatous subjects with anatomically narrow angles. Methods Anterior segment optical coherence tomography images captured before and after LPI were analyzed using customized software, the Zhongshan Angle Assessment Program. Differences in preoperative and postoperative measurements for anterior segment biometric parameters were compared by paired Student’s t-tests. Multivariate linear regression models, adjusted for age, sex, ethnicity, and preoperative pupil diameter, were used to examine the association between the baseline measurements of iris thickness at three positions and the change in anterior segment biometric parameters after LPI. Main Outcome Measures Baseline iris thickness measured at 750μm (IT750) and 2000μm (IT2000) from the scleral spur and maximal iris thickness (ITM). Changes in iris curvature (ICURV) and trabecular–iris space area at 500μm (TISA500) and 750μm (TISA750) from the scleral spur after LPI. Results ICURV significantly decreased, while TISA500 and TISA750 significantly increased following LPI (all Piris thickness are associated with greater decrease in ICURV and increases in TISA500 and TISA750 after LPI. This suggests that eyes with thinner irides undergoing LPI were more likely to exhibit greater magnitude of change in terms of flattening of the iris convexity (i.e., ICURV) and widening of the anterior chamber angle (i.e., TISA500 and TISA750). PMID:24534754

  19. Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture.

    Science.gov (United States)

    Mat Kiah, M L; Al-Bakri, S H; Zaidan, A A; Zaidan, B B; Hussain, Muzammil

    2014-10-01

    One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.

  20. IRIS Toxicological Review of Biphenyl (External Review Draft) ...

    Science.gov (United States)

    EPA is conducting a peer review of the scientific basis supporting the human health hazard and dose-response assessment of biphenyl that will appear in the Integrated Risk Information System (IRIS) database. EPA is undertaking a new health assessment for biphenyl for the Integrated Risk Information System (IRIS). The outcome of this project will be a Toxicological Review and IRIS and IRIS Summary of biohenyl that will be entered on the IRIS database. IRIS is an EPA database containing Agency scientific positions on potential adverse human health effects that may result from chronic (or lifetime) exposure to chemicals in the environment. IRIS contains chemical-specific summaries of qualitative and quantitative health information to evaluate potential public health risks associated with exposure assessment information to evaluate potential public health risks associated with environmental contaminants. The IRIS database is relied on for the development of risk assessments sites-specific environmental decisions, and rule making.

  1. Changes of the eye optics after iris constriction

    Directory of Open Access Journals (Sweden)

    Robert Montés-Micó

    2010-10-01

    Conclusion: Iris constriction slightly modifies the optics of the eye. The small hyperopic shift of the best image plane after iris constriction may be explained by a change in the lens shape and/or position.

  2. A fourier transform quality measure for iris images

    CSIR Research Space (South Africa)

    Makinana, S

    2014-08-01

    Full Text Available to ensure that good quality images are selected for feature extraction, in order to improve iris recognition system. In addition, this research proposes a measure of iris image quality using a Fourier Transform. The experimental results demonstrate...

  3. Correlation of iris biometrics and DNA

    DEFF Research Database (Denmark)

    Harder, Stine; Clemmensen, Line Katrine Harder; Dahl, Anders Bjorholm

    2013-01-01

    The presented work concerns prediction of complex human phenotypes from genotypes. We were interested in correlating iris color and texture with DNA. Our data consist of 212 eye images along with DNA: 32 single-nucleotide polymorphisms (SNPs). We used two types of biometrics to describe the eye...... images: One for iris color and one for iris texture. Both biometrics were high dimensional and a sparse principle component analysis (SPCA) reduced the dimensions and resulted in a representation of data with good interpretability. The correlations between the sparse principal components (SPCs......) and the 32 SNPs were found using a canonical correlation analysis (CCA). The result was a single significant canonical correlation (CC) for both biometrics. Each CC comprised two correlated canonical variables, consisting of a linear combination of SPCs and a linear combination of SNPs, respectively...

  4. Internet Renewable energy Information System (IRIS)

    DEFF Research Database (Denmark)

    Bäurle, Britta; Nielsen, Vilhjalmur; Ménard, Lionel

    1999-01-01

    Even though the Internet is now a widely accessible data source, the unorganised flood of information makes a specific request e.g. for renewable energy products inefficient. In addition, existing databases on renewable energies are often old and incomplete. The objective of IRIS has been...... to organise and retrieve renewable energy product information on the Internet instead of collecting it manually. Updating coincides with the self interestself-interest of manufacturers to present their latest renewable energy products on their own HTML documents. IRIS is based on a set of powerful tools...... and intends to find, extract, collect and index HTML documents with standardised META tags that are widely spread across web servers on the Internet. This paper presents the structure of IRIS, the software tools, and gives one example of how to categorise and prepare web-sites with product information...

  5. Dynamical Analysis, Synchronization, Circuit Design, and Secure Communication of a Novel Hyperchaotic System

    Directory of Open Access Journals (Sweden)

    Li Xiong

    2017-01-01

    Full Text Available This paper is devoted to introduce a novel fourth-order hyperchaotic system. The hyperchaotic system is constructed by adding a linear feedback control level based on a modified Lorenz-like chaotic circuit with reduced number of amplifiers. The local dynamical entities, such as the basic dynamical behavior, the divergence, the eigenvalue, and the Lyapunov exponents of the new hyperchaotic system, are all investigated analytically and numerically. Then, an active control method is derived to achieve global chaotic synchronization of the novel hyperchaotic system through making the synchronization error system asymptotically stable at the origin based on Lyapunov stability theory. Next, the proposed novel hyperchaotic system is applied to construct another new hyperchaotic system with circuit deformation and design a new hyperchaotic secure communication circuit. Furthermore, the implementation of two novel electronic circuits of the proposed hyperchaotic systems is presented, examined, and realized using physical components. A good qualitative agreement is shown between the simulations and the experimental results around 500 kHz and below 1 MHz.

  6. Design of a sensor network system with a self-maintenance function for homeland security applications

    International Nuclear Information System (INIS)

    Fujiwara, Takeshi; Takahashi, Hiroyuki; Iyomoto, Naoko

    2008-01-01

    In this study, we develop a new concept of a robust wireless sensor network for homeland security applications. The sensor system consists of intelligent radiation sensors that can communicate each other through the wireless network. This structure can cover a wide area with a flexible geometry which is suitable for detecting a moving object with a detectable radiation source. Also, it has a tolerance against both the partial node's failure and packet errors; realized by a Self-Maintenance function. The Self-maintenance function is a function that enables an artifact to find, diagnosis and fix the trouble automatically and maintain itself. So far some approaches have been tried to realize robust monitoring system by applying the idea of multiplex system, based on ''2 out of 3'', but this requires a large amount of the hardware and is not suitable for sensor network systems. We designed a sensor network system with Self-Maintenance function based on qualitative reasoning technique for robust wireless sensor network system, and an instrument network based on ZigBee has been set up for investigations. CsI(Tl) gamma-ray detectors are used as sensors. The network system picks up correlation signals from sensors even some of sensors send false signals, which can be used as a reliable detection system for practical use. (author)

  7. Common Criteria Related Security Design Patterns for Intelligent Sensors—Knowledge Engineering-Based Implementation

    Directory of Open Access Journals (Sweden)

    Andrzej Bialas

    2011-08-01

    Full Text Available Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408 can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains.

  8. Design and Research of a New secure Authentication Protocol in GSM networks

    Directory of Open Access Journals (Sweden)

    Qi Ai-qin

    2016-01-01

    Full Text Available As the first line of defense in the security application system, Authentication is an important security service. Its typical scheme is challenge/response mechanism and this scheme which is simple-structured and easy to realize has been used worldwide. But these protocols have many following problems In the GSM networks such as the leakage of user indentity privacy, no security protection between home registers and foreign registers and the vicious intruders’ information stealing and so on. This paper presents an authentication protocol in GSM networks based on maths operation and modular square root technique . The analysis of the security and performance has also been done. The results show that it is more robust and secure compared to the previous agreements.

  9. Iris Heterochromia and Unilateral Eyelash Hypertrichosis

    OpenAIRE

    Rao, Rajesh C.; Ballard, Tiffany N.S.; Chen, Teresa C.

    2015-01-01

    An 87-year-old female with a history of open-angle glaucoma presented with longer, thicker eyelashes on the right side compared to the left. Her irides were also different colors, as the right iris was brown and the left was hazel (green-brown). The patient had noticed a gradual darkening of her right iris and lengthening of her eyelashes over the last year, but denied visual changes or foreign-body sensation. Past medical history included a remote history of breast cancer treated by lumpecto...

  10. IRIS Toxicological Review of Carbon Tetrachloride (External ...

    Science.gov (United States)

    EPA conducted a peer review of the scientific basis supporting the human health hazard and dose-response assessment of carbon tetrachloride that will appear on the Integrated Risk Information System (IRIS) database. Peer review is meant to ensure that science is used credibly and appropriately in derivation of the dose-response assessments and toxicological characterization. EPA is conducting a peer review of the scientific basis supporting the human health hazard and dose-response assessment of carbon tetrachloride that will appear on the Integrated Risk Information System (IRIS) database.

  11. IRIS Toxicological Review of Trimethylbenzenes (External ...

    Science.gov (United States)

    EPA is conducting a peer review of the scientific basis supporting the human health hazard and dose-response assessment of trimethylbenzenes that will appear in the Integrated Risk Information System (IRIS) database. EPA is reassessing its IRIS toxicological review of Trimethylbenzenes (1,2,3-;1,2,4-;1,3,5-). This trimethylbenzene reassessment consists of an oral reference dose (RfD), an inhalation reference concentration (RfC), an inhalation unit risk (IUR) and a cancer weight of evidence descriptor. This is the first assessment developing an RfC or IUR for this compound. This assessment is intended to provide human health data to support agency regulatory decisions.

  12. A modified COMS plaque for iris melanoma

    Directory of Open Access Journals (Sweden)

    Daniel J. Scanderbeg

    2011-09-01

    Full Text Available Melanoma of the iris is a rare condition compared to posterior ocular tumors and in this case report we presenta 51-year-old female patient with diffuse iris melanoma. Traditional COMS (Collaborative Ocular Melanoma Studyplaques are used at our institution for radiation therapy, so a novel modification of the traditional plaque was requiredto allow better conformance with placement on the cornea. The usual silastic insert was machined to dimensions incompliance with the cornea, placed without incident, and treatment delivered with excellent patient tolerance of themodified plaque.

  13. [Iris heterochromia in acquired Horner's syndrome].

    Science.gov (United States)

    Beynat, J; Soichot, P; Bidot, S; Dugas, B; Creuzot-Garcher, C; Bron, A

    2007-09-01

    Horner's syndrome (HS) is related to an interruption of the oculosympathetic nerve pathway. The classic clinical findings associated with this condition are ptosis, miosis, and enophthalmos. Heterochromia is typically described in congenital HS, but it is an uncommon finding in acquired HS. We report a case of post-traumatic HS associated with heterochromia. A literature review indicates that this type of heterochromia may be related to a reduction in the number of iris melanocytes. This mechanism may be the same in the physiological iris color modifications in adulthood.

  14. Comparison of features response in texture-based iris segmentation

    CSIR Research Space (South Africa)

    Bachoo, A

    2009-03-01

    Full Text Available and eyelashes that corrupt the iris region of interest. An accurate segmentation algorithm must localize and remove these noise components. Texture features are considered in this paper for describing iris and non-iris regions. These regions are classified using...

  15. VASIR: An Open-Source Research Platform for Advanced Iris Recognition Technologies.

    Science.gov (United States)

    Lee, Yooyoung; Micheals, Ross J; Filliben, James J; Phillips, P Jonathon

    2013-01-01

    The performance of iris recognition systems is frequently affected by input image quality, which in turn is vulnerable to less-than-optimal conditions due to illuminations, environments, and subject characteristics (e.g., distance, movement, face/body visibility, blinking, etc.). VASIR (Video-based Automatic System for Iris Recognition) is a state-of-the-art NIST-developed iris recognition software platform designed to systematically address these vulnerabilities. We developed VASIR as a research tool that will not only provide a reference (to assess the relative performance of alternative algorithms) for the biometrics community, but will also advance (via this new emerging iris recognition paradigm) NIST's measurement mission. VASIR is designed to accommodate both ideal (e.g., classical still images) and less-than-ideal images (e.g., face-visible videos). VASIR has three primary modules: 1) Image Acquisition 2) Video Processing, and 3) Iris Recognition. Each module consists of several sub-components that have been optimized by use of rigorous orthogonal experiment design and analysis techniques. We evaluated VASIR performance using the MBGC (Multiple Biometric Grand Challenge) NIR (Near-Infrared) face-visible video dataset and the ICE (Iris Challenge Evaluation) 2005 still-based dataset. The results showed that even though VASIR was primarily developed and optimized for the less-constrained video case, it still achieved high verification rates for the traditional still-image case. For this reason, VASIR may be used as an effective baseline for the biometrics community to evaluate their algorithm performance, and thus serves as a valuable research platform.

  16. On the vulnerability of iris-based systems to a software attack based on a genetic algorithm

    OpenAIRE

    Gómez-Barrero, Marta; Galbally Herrero, Javier; Tomé González, Pedro; Fiérrez, Julián

    2012-01-01

    The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-642-33275-3_14 Proceedings of 17th Iberoamerican Congress, CIARP 2012, Buenos Aires, Argentina The vulnerabilities of a standard iris verification system to a novel indirect attack based on a binary genetic algorithm are studied. The experiments are carried out on the iris subcorpus of the publicly available BioSecure DB. The attack has shown a remarkable performance, thus proving the lack of robustness o...

  17. Developing virtual REU cohorts: Reflections from the IRIS Undergraduate Internship Program

    Science.gov (United States)

    Hubenthal, M.; Taber, J.; Aster, R.; Frassetto, A.

    2007-12-01

    Beginning in 2006, the IRIS Education and Outreach program received funding from the National Science Foundation (EAR-0453427) to explore a novel approach to the traditional Research Experience for Undergraduates (REU) model. This model blends the spirit of an REU program, which traditionally hosts participants in one location with successful prior IRIS experience hosting students at widely separated institutions to participate in summer research. A unique feature the IRIS Undergraduate Internship Program is that throughout the summer, interns form and sustain a virtual community, offering assistance, sharing ideas, asking questions, and relaying life experiences while conducting their research at diverse institutions. Key to IRIS's REU model is a combination of: one-on-one mentoring by researchers at IRIS institutions across the US, developing a strong unity among interns through both face-to-face and on-line interactions, participation of an IRIS REU alumni mentor to provide both group and intern-specific guidance developing interns' abilities to self-evaluate and work independently, through carefully designed web-based tools, and increasing interns' awareness of the IRIS and broader Earth Science community; demonstrating the role they will play in this larger community. Virtual interaction is facilitated by 1) bringing students together for face-to-face contact, through a week long orientation held annually at the IRIS PASSCAL Instrument Center on the campus of the New Mexico Institute of Mining and Technology, and 2) the community enabling web infrastructure at http://www.iris.edu/internship/. During the orientation students engage in classes in geophysics basics, career preparation, as well as training to communicate virtually. Our experiences and evaluations from the 2006 and 2007 field seasons have:shown the increasing demand for electronic advertising of REU programs, provided support for several assumptions of the model including the key role of both the

  18. Common Criteria Related Security Design Patterns—Validation on the Intelligent Sensor Example Designed for Mine Environment

    Directory of Open Access Journals (Sweden)

    Andrzej Bialas

    2010-04-01

    Full Text Available The paper discusses the security issues of intelligent sensors that are able to measure and process data and communicate with other information technology (IT devices or systems. Such sensors are often used in high risk applications. To improve their robustness, the sensor systems should be developed in a restricted way to provide them with assurance. One of assurance creation methodologies is Common Criteria (ISO/IEC 15408, used for IT products and systems. The contribution of the paper is a Common Criteria compliant and pattern-based method for the intelligent sensors security development. The paper concisely presents this method and its evaluation for the sensor detecting methane in a mine, focusing on the security problem of the intelligent sensor definition and solution. The aim of the validation is to evaluate and improve the introduced method.

  19. Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E-Banking System

    OpenAIRE

    Ibidapo; Akinyemi, O.; Omogbadegun, Zaccheous O.; Oyelami, Olufemi M.

    2011-01-01

    Security measures at banks can play a critical, contributory role in preventing attacks on customers. These measures are of paramount importance when considering vulnerabilities and causation in civil litigation. Banks must meet certain standards in order to ensure a safe and secure banking environment for their customers. This paper focuses on vulnerabilities and the increasing wave of criminal activities occurring at Automated Teller Machines (ATMs) where quick cash is the prime target for ...

  20. DESIGN AND RESEARCH OF MATHEMATICAL MODEL FOR INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK

    OpenAIRE

    Корнієнко, Б.Я.; кафедра комп`ютеризованих систем захисту інформації, Національний авіаційний університет; Галата, Л.П.; кафедра комп`ютеризованих систем захисту інформації, Національний авіаційний університет

    2017-01-01

    This article presents simulation modeling process as the way to study the behavior of the Information Security system. Graphical Network Simulator is used for modeling such system and Kali Linux is used for penetration testing and security audit. The main approaches to simulation of computer networks are considered. The functional capabilities of the GNS3 package are explored. When building an imitation model, the main components of information protection were used. The Kali Linux package imp...

  1. ESAODV: IMPLEMENTATION AND DESIGN OF SECURE AND EFFICIENT AODV FOR WSN

    OpenAIRE

    Mr. Ojashvi Shivwanshi; Mr. Rahul Patel; Miss Preetika Saxena

    2016-01-01

    A number of different network technologies are now in these days developed using the ad hoc configuration of networks. Among the wireless sensor network is one of most frequently used network technology for application developments. On the other hand the network devices are suffers from the various security and performance issues due to their ad hoc configurations. Therefore the solution for performance improvement and security concerns are required to investigate. In this presented work both...

  2. The IRIS Mission: A Colorful EPO Program

    Science.gov (United States)

    Scherrer, Deborah K.

    2012-05-01

    We will overview NASA’s IRIS mission EPO program, which includes a nationwide spectroscopy contest, K-12 resources, a summer program for undergraduates, informal outreach elements, and a dynamic social media program based on the highly successful Camilla/Little SDO program for NASA’s SDO mission.

  3. Statistical feature extraction based iris recognition system

    Indian Academy of Sciences (India)

    Performance of the proposed iris recognition system (IRS) has been measured by recording false acceptance rate (FAR) and false rejection rate (FRR) at differentthresholds in the distance metric. System performance has been evaluated by computing statistical features along two directions, namely, radial direction of ...

  4. IRIS Toxicological Review of Chloroprene (External Review ...

    Science.gov (United States)

    EPA is conducting a peer review of the scientific basis supporting the human health hazard and dose-response assessment of chloroprene that will appear on the Integrated Risk Information System (IRIS) database. Chloroprene (CASRN 126-99-8) or 2-chloro-1,3-butadiene is a volatile liquid monomer used exclusively in the manufacture of polychloroprene (neoprene) elastomer.

  5. Iris recognition using the JAVAVis Library

    Directory of Open Access Journals (Sweden)

    L.Martin García

    2008-12-01

    Full Text Available This project has been created to develop a biometric identification system through a man’s iris using a computer to perform the processing of the pictures. To develop this application, and to differentiate the project from others who have already implemented, we have used the image processing library JAVAVis and JAVA as a programming language.

  6. The Road to IRIS data products

    Science.gov (United States)

    Hurlburt, N. E.; Title, A. M.; De Pontieu, B.; Lemen, J. R.; Wuelser, J.; Tarbell, T. D.; Wolfson, C. J.; Schrijver, C. J.; Golub, L.; DeLuca, E. E.; Kankelborg, C. C.; Hansteen, V. H.; Carlsson, M.; Bush, R. I.

    2013-12-01

    The Interface Region Imaging Spectrograph generates a complex set of data products that the IRIS team has strived to deliver to the community in forms that are easy to find and use. We review the results of these efforts and invite the community to explore the data and tools. All standard IRIS data products are based on calibrated images are corrected for a variety of instrumental effects. The resulting products are incorporated into the Heliophysics Event Knowledgebase (HEK) as annotated data sets accessible through the HEK Coverage Registry (HCR). Annotations include descriptions of the data products themselves (pointing, field of view, cadence...) as well as references to coordinated observations from the Hinode mission and other observatories, and to solar events identified in the HEK Event Registry (HER). IRIS data products are available at the LMSAL and Stanford (JSOC) data centers in Palo Alto and the Hinode Data Center in Oslo. Portals that can help users to select data products include the LMSAL iSolsearch, the Virtual Solar Observatory and Helioviewer. Supporting analysis software is available in the IRIS branch of SolarSoft.

  7. Disseminated Penicillium marneffei infection with IRIS

    Directory of Open Access Journals (Sweden)

    Xinchao Liu

    2015-01-01

    Full Text Available Penicillium marneffei infection is an endemic opportunistic infection for AIDS patients that can be found in south Asia. Fever and typical skin lesions are the most commonly seen symptoms. Our case describes an AIDS patient with Immune Reconstitution Inflammatory Syndrome (IRIS presented with liver masses and skin lesions whose blood, bone marrow and ascites culture were all identified with P. marneffei.

  8. Statistical feature extraction based iris recognition system

    Indian Academy of Sciences (India)

    Atul Bansal

    Abstract. Iris recognition systems have been proposed by numerous researchers using different feature extraction techniques for accurate and reliable biometric authentication. In this paper, a statistical feature extraction technique based on correlation between adjacent pixels has been proposed and implemented. Ham-.

  9. IRIS Public Science Meeting (June 2016)

    Science.gov (United States)

    This June 2016 public meeting is made available to solicit comments on the public comment draft of the IRIS Assessment of tert-Butanol. The draft document was re-opened in the docket for a 60-day public comment period closing on July 16, 2016.

  10. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.

    Science.gov (United States)

    Das, Ashok Kumar; Wazid, Mohammad; Kumar, Neeraj; Khan, Muhammad Khurram; Choo, Kim-Kwang Raymond; Park, YoungHo

    2017-09-18

    Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly-accepted Real-Or-Random model, as well as using the popular formal security verification tool, known as the Automated Validation of Internet Security Protocols and Applications (AVISPA). Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.

  11. Bilateral acute depigmentation of the iris: a case report.

    Science.gov (United States)

    Fachin, Débora Raquel Rigon Narciso; Prestes, Maria Fernanda de Paula; Cariello, Angelino Julio; Nóbrega, Mário Junqueira

    2016-04-01

    Bilateral acute depigmentation of the iris (BADI) is a new clinical entity of unknown etiology and is characterized by bilateral, symmetrical, and simultaneous depigmentation of the iris with focal or diffuse stromal atrophy; this condition generally has a good prognosis. We present a case of a 26-year-old woman who noted a spontaneous change in the iris color in both eyes in the last 2 months. The ophthalmological findings were atrophy of the iris stroma and pigmentation of the trabecular meshwork, without affecting the pigmented epithelium of the iris. Her intraocular pressure was normal and the visual acuity was 20/20 in both eyes.

  12. [Intraoperative floppy iris syndrome--a prospective study].

    Science.gov (United States)

    Nicula, Cristina; Nicula, D; Popescu, Raluca

    2013-01-01

    is to evaluate the incidence and typical signs of floppy iris syndrome intraoperatory revealed in patients diagnosed with cataracts. We studied a total of 15 eyes diagnosed with cataracts, belonging to 14 patients who had been treated chronically with Tamsulosin for benign prostatic hyperplasia. In 80% of cases we have seen a preoperative semimidriasis which required iris hooks in 5 eyeballs. On 1 eye preoperative semimidriasis was sufficient for capsulorhexis, but later pupil became miotic, requiring iris hooks. On 4 eye flaccid iris was noticed, that prolabated in corneal incision. floppy iris syndrome occurs in patients treated with Tamsulosin for benign prostatic hyperplasia, generating a series of difficulties during cataract surgery.

  13. Acute endothelial failure after cosmetic iris implants (NewIris®

    Directory of Open Access Journals (Sweden)

    Garcia-Pous M

    2011-05-01

    Full Text Available Maria Garcia-Pous1, Patricia Udaondo2, Salvador Garcia-Delpech2, David Salom1, Manuel Díaz-Llopis21Faculty of Medicine, University of Valencia, Valencia, Spain; 2Ophthalmology Department, Hospital Universitario La Fe, Valencia, SpainAbstract: We report a case of an acute endothelial failure after the implantation of a new cosmetic, colored, artificial iris diaphragm implant called NewIris®. A 21-year-old woman came to us complaining of progressive loss of vision and pain after NewIris lenses had been implanted. Decreased visual acuity, corneal edema, and increased intraocular pressure in both eyes appeared only 3 weeks after the surgery. The lenses were removed as soon as possible but had already severely affected the endothelial cell count. NewIris implants are an alternative to cosmetic contact lenses, but they are not as safe as other phakic anterior chamber intraocular lenses, nor are they a good option for the patient.Keywords: NewIris, endothelial failure, cosmetic iris implants

  14. Combining GPS measurements and IRI model predictions

    International Nuclear Information System (INIS)

    Hernandez-Pajares, M.; Juan, J.M.; Sanz, J.; Bilitza, D.

    2002-01-01

    The free electrons distributed in the ionosphere (between one hundred and thousands of km in height) produce a frequency-dependent effect on Global Positioning System (GPS) signals: a delay in the pseudo-orange and an advance in the carrier phase. These effects are proportional to the columnar electron density between the satellite and receiver, i.e. the integrated electron density along the ray path. Global ionospheric TEC (total electron content) maps can be obtained with GPS data from a network of ground IGS (international GPS service) reference stations with an accuracy of few TEC units. The comparison with the TOPEX TEC, mainly measured over the oceans far from the IGS stations, shows a mean bias and standard deviation of about 2 and 5 TECUs respectively. The discrepancies between the STEC predictions and the observed values show an RMS typically below 5 TECUs (which also includes the alignment code noise). he existence of a growing database 2-hourly global TEC maps and with resolution of 5x2.5 degrees in longitude and latitude can be used to improve the IRI prediction capability of the TEC. When the IRI predictions and the GPS estimations are compared for a three month period around the Solar Maximum, they are in good agreement for middle latitudes. An over-determination of IRI TEC has been found at the extreme latitudes, the IRI predictions being, typically two times higher than the GPS estimations. Finally, local fits of the IRI model can be done by tuning the SSN from STEC GPS observations

  15. Checking the new IRI model The bottomside B parameters

    CERN Document Server

    Mosert, M; Ezquer, R; Lazo, B; Miro, G

    2002-01-01

    Electron density profiles obtained at Pruhonice (50.0, 15.0), El Arenosillo (37.1, 353.2) and Havana (23, 278) were used to check the bottom-side B parameters BO (thickness parameter) and B1 (shape parameter) predicted by the new IRI - 2000 version. The electron density profiles were derived from ionograms using the ARP technique. The data base includes daytime and nighttime ionograms recorded under different seasonal and solar activity conditions. Comparisons with IRI predictions were also done. The analysis shows that: a) The parameter B1 given by IRI 2000 reproduces better the observed ARP values than the IRI-90 version and b) The observed BO values are in general well reproduced by both IRI versions: IRI-90 and IRI-2000.

  16. Iris Segmentation and Normalization Algorithm Based on Zigzag Collarette

    Science.gov (United States)

    Rizky Faundra, M.; Ratna Sulistyaningrum, Dwi

    2017-01-01

    In this paper, we proposed iris segmentation and normalization algorithm based on the zigzag collarette. First of all, iris images are processed by using Canny Edge Detection to detect pupil edge, then finding the center and the radius of the pupil with the Hough Transform Circle. Next, isolate important part in iris based zigzag collarette area. Finally, Daugman Rubber Sheet Model applied to get the fixed dimensions or normalization iris by transforming cartesian into polar format and thresholding technique to remove eyelid and eyelash. This experiment will be conducted with a grayscale eye image data taken from a database of iris-Chinese Academy of Sciences Institute of Automation (CASIA). Data iris taken is the data reliable and widely used to study the iris biometrics. The result show that specific threshold level is 0.3 have better accuracy than other, so the present algorithm can be used to segmentation and normalization zigzag collarette with accuracy is 98.88%

  17. DESIGN MODELING OF A UNIVERSITY’S COMPREHENSIVE-INTEGRATED SECURITY SYSTEM

    Directory of Open Access Journals (Sweden)

    Marina V. Dulyasova

    2017-03-01

    Full Text Available Introduction: the safety of higher education institutions is considered to be of great importance nowadays. Security challenges need to be addressed through a comprehensive and integrative approach. This approach provides neutralisation of various threats systemically, risk prevention, minimisation of the tangible and moral harm. The project concept of “safe university” is proposed and substantiated for the above-mentioned purposes. Materials and Methods: the authors used a special literature survey on the issue, which is divided into three main groups of publications, where the complex security of educational institutions is considered in the context of the general theory of security, in the educational-methodical plan and within the framework of sociological, psychological and pedagogical approaches. The legislative and regulatory sources also indicated, legislative and regulatory legal acts reviews, “Safe City” concept, National standard “Information security technologies: complex and integrated ones. Standard requirements to architecture and technologies of intellectual systems of monitoring for safety of the companies and the territories” (State standard specification P 56875-2016, documents of higher education institutions, media reports. The analysis and generalisation of information was coupled with project modeling of the new comprehensive system of higher education institution security. Results: the authors introduce the concept, architecture and model of the comprehensive integrated higher education institution security, monitoring based on measures and indicators pertaining to implementation of standard requirements and level of satisfaction with safety, evaluation of the taken measures in terms of efficiency. Discussion and Conclusions: the main contours of the model for comprehensive integrated security system in a higher education institution and algorithm of interaction between the subjects are determined. These

  18. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  19. Safeguarding the User - Developing a Multimodal Design for Surveying and Raising Internet Safety and Security Awareness

    DEFF Research Database (Denmark)

    Gjedde, Lisa; Sharp, Robin; Andersen, Preben

    2009-01-01

    Internet safety and security for the user is an issue of great importance for the successful implementation of ICT, but since it is a complex field, with a specialist vocabulary that cannot immediately be understood by the common user, it is difficult to survey the field. The user may...... not understand the questions that are being asked, since the issues are often technical and outside the users’ domain. It is therefore pertinent to develop new ways of researching the users’ awareness of ICT safety and security issues that do not depend solely on the verbal mode of communication. This paper...

  20. Transient classification for the IRIS reactor using self-organized maps built in free platform

    International Nuclear Information System (INIS)

    Doraskevicius Junior, Waldemar

    2005-01-01

    Kohonen's Self Organized Maps (SOM) were tested with data from several operational conditions of the nuclear reactor IRIS (International Reactor Innovative and Secure) to develop an effective tool in the classification and transient identification in nuclear reactors. The data were derived from 56 simulations of the operation of IRIS, from steady-state conditions to accidents. The digital system built for the tests was based on the JAVA platform for the portability and scalability, and for being one of the free development platforms. Satisfactory results of operation classification were obtained with reasonable processing time in personal computers; about two to five minutes were spent for ordination and convergence of the learning on the data base. The methodology of this work was extended to the supervision of logistics of natural gas for Brazilian pipelines, showing satisfactory results for the classification of deliveries for simultaneous measurement in several points. (author)

  1. Computer Models for IRIS Control System Transient Analysis

    International Nuclear Information System (INIS)

    Gary D Storrick; Bojan Petrovic; Luca Oriani

    2007-01-01

    This report presents results of the Westinghouse work performed under Task 3 of this Financial Assistance Award and it satisfies a Level 2 Milestone for the project. Task 3 of the collaborative effort between ORNL, Brazil and Westinghouse for the International Nuclear Energy Research Initiative entitled 'Development of Advanced Instrumentation and Control for an Integrated Primary System Reactor' focuses on developing computer models for transient analysis. This report summarizes the work performed under Task 3 on developing control system models. The present state of the IRIS plant design--such as the lack of a detailed secondary system or I and C system designs--makes finalizing models impossible at this time. However, this did not prevent making considerable progress. Westinghouse has several working models in use to further the IRIS design. We expect to continue modifying the models to incorporate the latest design information until the final IRIS unit becomes operational. Section 1.2 outlines the scope of this report. Section 2 describes the approaches we are using for non-safety transient models. It describes the need for non-safety transient analysis and the model characteristics needed to support those analyses. Section 3 presents the RELAP5 model. This is the highest-fidelity model used for benchmark evaluations. However, it is prohibitively slow for routine evaluations and additional lower-fidelity models have been developed. Section 4 discusses the current Matlab/Simulink model. This is a low-fidelity, high-speed model used to quickly evaluate and compare competing control and protection concepts. Section 5 describes the Modelica models developed by POLIMI and Westinghouse. The object-oriented Modelica language provides convenient mechanisms for developing models at several levels of detail. We have used this to develop a high-fidelity model for detailed analyses and a faster-running simplified model to help speed the I and C development process. Section

  2. Detection method of malignant tumors in DR images -Iris Filter-

    International Nuclear Information System (INIS)

    Matsumoto, Kazuo; Jin, Hua-Rong; Kobatake, Hidefumi

    1992-01-01

    This paper presents a study on detecting malignant tumors in DR (digital radiography) images. Tumors can be recognized as lower density areas than their neighborhood in DR image and contrast enhancement method such as difference filters have been widely used to detect them. This paper presents a new filter named Iris Filter to detect tumors. It evaluates distribution pattern of gradient vectors in a relatively wide neighborhood area. It is designed so that its output does not depend on the contrast substantially. The proposed filter is robust against disturbances of long and slender patterns such as blood vessels and/or rib edges. The region of support of the proposed filter is adapted optimally to the local pattern of the processed image. The name 'iris' filter originates from this adaptivity. Experiments to test the performance of the proposed filter have been performed. Chest X-ray images and mammograms were used whether the proposed filter is effective to detect lung cancer and breast cancer. Experimental results show that the proposed filter is very effective in detecting tumors with weak contrast. (author)

  3. Optical Coherence Tomography Angiography Characteristics of Iris Melanocytic Tumors.

    Science.gov (United States)

    Skalet, Alison H; Li, Yan; Lu, Chen D; Jia, Yali; Lee, ByungKun; Husvogt, Lennart; Maier, Andreas; Fujimoto, James G; Thomas, Charles R; Huang, David

    2017-02-01

    To evaluate tumor vasculature with optical coherence tomography angiography (OCTA) in malignant iris melanomas and benign iris lesions. Cross-sectional observational clinical study. Patients with iris lesions and healthy volunteers. Eyes were imaged using OCTA systems operating at 1050- and 840-nm wavelengths. Three-dimensional OCTA scans were acquired. Iris melanoma patients treated with radiation therapy were imaged again after I-125 plaque brachytherapy at 6 and 18 months. OCT and OCTA images, qualitative evaluation of iris and tumor vasculature, and quantitative vessel density. One eye each of 8 normal volunteers and 9 patients with iris melanomas or benign iris lesions, including freckles, nevi, and an iris pigment epithelial (IPE) cyst, were imaged. The normal iris has radially oriented vessels within the stroma on OCTA. Penetration of flow signal in normal iris depended on iris color, with best penetration seen in light to moderately pigmented irides. Iris melanomas demonstrated tortuous and disorganized intratumoral vasculature. In 2 eyes with nevi there was no increased vascularity; in another, fine vascular loops were noted near an area of ectropion uveae. Iris freckles and the IPE cyst did not have intrinsic vascularity. The vessel density was significantly higher within iris melanomas (34.5%±9.8%, P iris nevi (8.0%±1.4%) or normal irides (8.0%±1.2%). Tumor regression after radiation therapy for melanomas was associated with decreased vessel density. OCTA at 1050 nm provided better visualization of tumor vasculature and penetration through thicker tumors than at 840 nm. But in very thick tumors and highly pigmented lesions even 1050-nm OCTA could not visualize their full thickness. Interpretable OCTA images were obtained in 82% of participants in whom imaging was attempted. This is the first demonstration of OCTA in iris tumors. OCTA may provide a dye-free, no-injection, cost-effective method for monitoring a variety of tumors, including iris

  4. The Design of NetSecLab: A Small Competition-Based Network Security Lab

    Science.gov (United States)

    Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A.

    2011-01-01

    This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…

  5. A design pattern for event-based processing of security-enriched SOAP messages

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko; Lo Iacono, Luigi

    2010-01-01

    For Web Services in Cloud Computing contexts, the efficient processing of XML documents is a major topic of interest. Especially for WS-Security-enriched messages, processing performance nowadays tends to become a major issue. Streaming XML processing approaches lead to valuable optimization due...

  6. 77 FR 58432 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Designation of...

    Science.gov (United States)

    2012-09-20

    ... from the Exchange.\\11\\ \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. \\3\\ See Securities Exchange Act... J. Simon, Secretary and General Counsel, ISE, dated May 4, 2012. \\7\\ See letters to Elizabeth M... June 19, 2012. \\8\\ See letter to Elizabeth M. Murphy, Secretary, Commission, from Michael J. Simon...

  7. 76 FR 23830 - Removing Designated Countries From the National Security Entry-Exit Registration System (NSEERS)

    Science.gov (United States)

    2011-04-28

    ... Emirates, and Yemen. Over the past six years, the Department of Homeland Security (DHS) has implemented..., Somalia, Sudan, Syria, Tunisia, United Arab Emirates, and Yemen. See, e.g., 67 FR 67766 (Nov. 6, 2002); 67... threat posed to the United States by international terrorism. Based on global and individualized...

  8. The design of dependable flexible multi-sensory System-on-Chips for security applications

    NARCIS (Netherlands)

    Kerkhoff, Hans G.; Zhao, Yong

    2012-01-01

    a new approach towards highly reconfigurable SoCs for data-streaming multi-sensory systems is presented. As the applications are in the security arena, a very high degree of dependability should be guaranteed. For this purpose, extensive use is made of many-core processor architectures and

  9. Iris Recognition Using Feature Extraction of Box Counting Fractal Dimension

    Science.gov (United States)

    Khotimah, C.; Juniati, D.

    2018-01-01

    Biometrics is a science that is now growing rapidly. Iris recognition is a biometric modality which captures a photo of the eye pattern. The markings of the iris are distinctive that it has been proposed to use as a means of identification, instead of fingerprints. Iris recognition was chosen for identification in this research because every human has a special feature that each individual is different and the iris is protected by the cornea so that it will have a fixed shape. This iris recognition consists of three step: pre-processing of data, feature extraction, and feature matching. Hough transformation is used in the process of pre-processing to locate the iris area and Daugman’s rubber sheet model to normalize the iris data set into rectangular blocks. To find the characteristics of the iris, it was used box counting method to get the fractal dimension value of the iris. Tests carried out by used k-fold cross method with k = 5. In each test used 10 different grade K of K-Nearest Neighbor (KNN). The result of iris recognition was obtained with the best accuracy was 92,63 % for K = 3 value on K-Nearest Neighbor (KNN) method.

  10. Iris Freckles a Potential Biomarker for Chronic Sun Damage.

    Science.gov (United States)

    Schwab, Christoph; Mayer, Christoph; Zalaudek, Iris; Riedl, Regina; Richtig, Markus; Wackernagel, Werner; Hofmann-Wellenhof, Rainer; Richtig, Georg; Langmann, Gerald; Tarmann, Lisa; Wedrich, Andreas; Richtig, Erika

    2017-05-01

    To investigate the role of sunlight exposure in iris freckles formation. We prospectively examined volunteers attending a skin cancer screening program conducted by ophthalmologists and dermatologists. Frequency and topographical variability of iris freckles were noted and associated with behavioral and dermatologic characteristics indicating high sun exposure. Six hundred thirty-two participants (n = 360; 57% female) were examined. Mean age of all participants was 38.4 ± 18.4 years (range, 4-84 years). Of all individuals, 76.1% (n = 481) exhibited at least one iris freckle. Most freckles were observed in the inferior temporal quadrant. The presence of iris freckles was associated with higher age (participants with iris freckles: 41.8 ± 16.8 years versus participants without iris freckles: 27.6 ± 19.2 years), a high number of sunburns during lifetime (>10: 31% vs. 19%), sunlight-damaged skin (26% vs. 11%), presence of actinic lentigines (72% vs. 45%), and a high total nevus body count (>10; 78% vs. 67%). The association of iris freckles, behavioral factors, and dermatologic findings, as well as the topographical distribution, indicate that sunlight exposure may trigger the formation of iris freckles. The evaluation of iris freckles offers an easily accessible potential biomarker, which might be helpful in indicating sun damage on the skin associated with cutaneous malignancies. Furthermore, the evaluation of iris freckles could also be helpful in understanding the role of sunlight in several ophthalmologic diseases.

  11. Sequences associated with human iris pigmentation.

    OpenAIRE

    Frudakis, Tony; Thomas, Matthew; Gaskin, Zach; Venkateswarlu, K; Chandra, K Suresh; Ginjupalli, Siva; Gunturi, Sitaram; Natrajan, Sivamani; Ponnuswamy, Viswanathan K; Ponnuswamy, K N

    2003-01-01

    To determine whether and how common polymorphisms are associated with natural distributions of iris colors, we surveyed 851 individuals of mainly European descent at 335 SNP loci in 13 pigmentation genes and 419 other SNPs distributed throughout the genome and known or thought to be informative for certain elements of population structure. We identified numerous SNPs, haplotypes, and diplotypes (diploid pairs of haplotypes) within the OCA2, MYO5A, TYRP1, AIM, DCT, and TYR genes and the CYP1A2...

  12. IRIS Toxicological Review of Trichloroacetic Acid (TCA) ...

    Science.gov (United States)

    EPA is conducting a peer review and public comment of the scientific basis supporting the human health hazard and dose-response assessment of Trichloroacetic acid (TCA) that when finalized will appear on the Integrated Risk Information System (IRIS) database. The draft Toxicological Review of trichloroacetic acid provides scientific support and rationale for the hazard and dose-response assessment pertaining to chronic exposure to trichloroacetic acid.

  13. Unsupervised detection of non-iris occlusions

    Czech Academy of Sciences Publication Activity Database

    Haindl, Michal; Krupička, Mikuláš

    2015-01-01

    Roč. 57, č. 5 (2015), s. 60-65 ISSN 0167-8655 R&D Projects: GA ČR(CZ) GA14-10911S Institutional support: RVO:67985556 Keywords : Iris recognition * Color * Markov random field * Texture Subject RIV: BD - Theory of Information Impact factor: 1.586, year: 2015 http://library.utia.cas.cz/separaty/2015/RO/haindl-0444723.pdf

  14. Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Mina Malekzadeh

    2010-01-01

    Full Text Available In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks. A true understanding of these attacks provides better ability to defend the network against the attacks, thus eliminating potential threats from the wireless systems. This work presents a series of cyberwar laboratory exercises that are designed for IEEE 802.11 wireless networks security courses. The exercises expose different aspects of violations in security such as confidentiality, privacy, availability, and integrity. The types of attacks include traffic analysis, rogue access point, MAC filtering, replay, man-in-the-middle, and denial of service attacks. For each exercise, the materials are presented as open-source tools along with descriptions of the respective methods, procedures, and penetration techniques.

  15. Hyperspectral imaging of the human iris

    Science.gov (United States)

    Di Cecilia, Luca; Marazzi, Francesco; Rovati, Luigi

    2017-07-01

    We describe an optical system and a method for measuring the human iris spectral reflectance in vivo by hyperspectral imaging analysis. It is important to monitor age-related changes in the reflectance properties of the iris as they are a prognostic factor for several eye pathologies. In this paper, we report the outcomes of our most recent research, resulting from the improvement of our imaging system. In particular, a custom tunable light source was developed: the images are now acquired in the spectral range 440 - 900 nm. With this system, we are able to obtain a spectral resolution of 20nm, while each image of 2048 x 1536 pixels has a spatial resolution of 10.7 μm. The results suggest that the instrument could be exploited for measuring iris pigmentation changes over time. These measurements could provide new diagnostic capabilities in ophthalmology. Further studies are required to determine the measurements' repeatability and to develop a spectral library for results evaluation and to detect differences among subsequent screenings of the same subject.

  16. A standardized approach for iris color determination.

    Science.gov (United States)

    Niggemann, Birgit; Weinbauer, Gerhard; Vogel, Friedhelm; Korte, Rainhart

    2003-01-01

    Latanoprost, the phenyl-substituted prostaglandin F2alpha, has been found to be an effective agent for glaucoma therapy. This prostaglandin derivative exerts ocular hypotensive activity but is also associated with an untoward side effect, namely iris color changes. Latanoprost provoked iris color changes in cynomolgus monkeys and in multicenter clinical trials. Until now photographs were taken and compared with color plates to document these changes. The disadvantage of this method is obvious, i.e., the color luminance varies between measurements due to changes in the developer. Furthermore, subjective comparison of color changes relative to color plates rendered judgment subject to impression and opinion rather than to objective data. Therefore, a computerized method using a 3-CCD video camera attached to a slit lamp was developed. The signals were transferred to a computer and a single frame, which was "frozen" by means of a "grabber card." Camera and the computer had previously been calibrated and color plates were measured to check the standard conditions. They were evaluated by a software program displaying average color (as red, green, and blue values) of the selected area. This method provides a fast and accurate way to quantify color changes in the iris of both experimental animals and clinical trials.

  17. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  18. Infrasound product resources at the IRIS DMC

    Science.gov (United States)

    Bahavar, M.; Trabant, C.; Hutko, A. R.; Karstens, R.

    2012-12-01

    In 2011 infrasound sensors were installed at some existing USArray Transportable Array (TA) sites and became a standard component of all new sites. Currently there are over 400 sites with infrasound sensors with an average spacing of 70 kilometers. To promote and facilitate the use of these data the IRIS Data Management Center has developed two new data products: an infrasound reference event database and an infrasound signal detector. The TA Infrasound Reference Event Database (TAIRED) is a user-supported database that contains information on events of interest for which there are associated USArray microbarograph recordings. This database is initially populated with a few events from observations on the USArray infrasound data, event bulletins, news on explosions, meteorological events and rocket launches. As a user-supported resource, we ask users to submit events of interest to be included in the database or submit their alternate solutions to the existing events. The second data product is an infrasound signal detector that regularly scans the USArray broadband infrasound data (BDF channel sampled at 40 Hz) and produces detections that highlight time intervals containing potential signals of interest. The detection product includes two components, standard signal-to-noise ratio based detections and spectral power based detections. No attempt is made to categorize detections or associate them to events. These data products join the growing collection of products produced and managed at the IRIS DMC, for the complete list please visit http://www.iris.edu/dms/products/.

  19. Iris melanoma invading the camerular angle

    International Nuclear Information System (INIS)

    Verona Ugando, Leticia; Landrian Iglesias, Beatriz; Padierne Gonzalez, Naysa

    2011-01-01

    Uveal melanomas are the most frequent primary uveal tumors, having an incidence of 8/1 000 000 a year in Caucasian people. Specifically, iris Melanoma represents 5 to 7 % of the uveal malignant melanomas and they may be amelanic or pigmented, generally very vascularized. An eighteen years old male patient with a history of health problems was presented, who had been seen at the Ophthalmological Emergency Service because of eye pain and sudden visual reduction in his right eye. In the physical exam, a marked ocular hypertension was confirmed as well as a 2 mm hyphema and corneal edema. These conditions were overcome with treatment and afterwards, there was observed iris tumoration invading the iridocorneal angle. Some complementary studies were carried out to search further tumors at other levels and finally a fine needle aspiration biopsy was performed. The diagnosis was amelanic Iris Melanoma invading the ciliary body. The patient was referred for surgical treatment at the National Institute of Oncology and Radiology

  20. Design and Hardware Implementation of a New Chaotic Secure Communication Technique.

    Directory of Open Access Journals (Sweden)

    Li Xiong

    Full Text Available In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness.

  1. Design and Hardware Implementation of a New Chaotic Secure Communication Technique.

    Science.gov (United States)

    Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag

    2016-01-01

    In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness.

  2. Towards the cyber security paradigm of ehealth: Resilience and design aspects

    Science.gov (United States)

    Rajamäki, Jyri; Pirinen, Rauno

    2017-06-01

    Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.

  3. Designing a Secure Exam Management System (SEMS) for M-Learning Environments

    Science.gov (United States)

    Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc

    2016-01-01

    M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…

  4. A design of toxic gas detecting security robot car based on wireless path-patrol

    Directory of Open Access Journals (Sweden)

    Cheng Ho-Chih

    2017-01-01

    Full Text Available Because a toxic gas detecting/monitoring system in a chemical plant is not movable, a gas detecting/monitoring system will be passive and the detecting range will also be constrained. This invention is an active multi-functional wireless patrol car that can substitute for humans that inspect a plant's security. In addition, to widen the monitoring vision within the environment, two motors used to rotate a wireless IPCAM with two axes are presented. Also, to control the robot car's movement, two axis motors used to drive the wheel of the robot car are also installed. Additionally, a toxic gas detector is linked to the microcontroller of the patrol car. The detected concentration of the gas will be fed back to the server pc. To enhance the robot car's patrolling duration, a movable electrical power unit in conjunction with a wireless module is also used. Consequently, this paper introduces a wireless path-patrol and toxic gas detecting security robot car that can assure a plant's security and protect workers when toxic gases are emitted.

  5. Iris double recognition based on modified evolutionary neural network

    Science.gov (United States)

    Liu, Shuai; Liu, Yuan-Ning; Zhu, Xiao-Dong; Huo, Guang; Liu, Wen-Tao; Feng, Jia-Kai

    2017-11-01

    Aiming at multicategory iris recognition under illumination and noise interference, this paper proposes a method of iris double recognition based on a modified evolutionary neural network. An equalization histogram and Laplace of Gaussian operator are used to process the iris to suppress illumination and noise interference and Haar wavelet to convert the iris feature to binary feature encoding. Calculate the Hamming distance for the test iris and template iris , and compare with classification threshold, determine the type of iris. If the iris cannot be identified as a different type, there needs to be a secondary recognition. The connection weights in back-propagation (BP) neural network use modified evolutionary neural network to adaptively train. The modified neural network is composed of particle swarm optimization with mutation operator and BP neural network. According to different iris libraries in different circumstances of experimental results, under illumination and noise interference, the correct recognition rate of this algorithm is higher, the ROC curve is closer to the coordinate axis, the training and recognition time is shorter, and the stability and the robustness are better.

  6. Multispectral iris recognition based on group selection and game theory

    Science.gov (United States)

    Ahmad, Foysal; Roy, Kaushik

    2017-05-01

    A commercially available iris recognition system uses only a narrow band of the near infrared spectrum (700-900 nm) while iris images captured in the wide range of 405 nm to 1550 nm offer potential benefits to enhance recognition performance of an iris biometric system. The novelty of this research is that a group selection algorithm based on coalition game theory is explored to select the best patch subsets. In this algorithm, patches are divided into several groups based on their maximum contribution in different groups. Shapley values are used to evaluate the contribution of patches in different groups. Results show that this group selection based iris recognition

  7. New algorithm for iris recognition based on video sequences

    Science.gov (United States)

    Bourennane, Salah; Fossati, Caroline; Ketchantang, William

    2010-07-01

    Among existing biometrics, iris recognition systems are among the most accurate personal biometric identification systems. However, the acquisition of a workable iris image requires strict cooperation of the user; otherwise, the image will be rejected by a verification module because of its poor quality, inducing a high false reject rate (FRR). The FRR may also increase when iris localization fails or when the pupil is too dilated. To improve the existing methods, we propose to use video sequences acquired in real time by a camera. In order to keep the same computational load to identify the iris, we propose a new method to estimate the iris characteristics. First, we propose a new iris texture characterization based on Fourier-Mellin transform, which is less sensitive to pupil dilatations than previous methods. Then, we develop a new iris localization algorithm that is robust to variations of quality (partial occlusions due to eyelids and eyelashes, light reflects, etc.), and finally, we introduce a fast and new criterion of suitable image selection from an iris video sequence for an accurate recognition. The accuracy of each step of the algorithm in the whole proposed recognition process is tested and evaluated using our own iris video database and several public image databases, such as CASIA, UBIRIS, and BATH.

  8. Gabor Weber Local Descriptor for Bovine Iris Recognition

    Directory of Open Access Journals (Sweden)

    Shengnan Sun

    2013-01-01

    Full Text Available Iris recognition is a robust biometric technology. This paper proposes a novel local descriptor for bovine iris recognition, named Gabor Weber local descriptor (GWLD. We first compute the Gabor magnitude maps for the input bovine iris image, and then calculate the differential excitation and orientation for each pixel over each Gabor magnitude map. After that, we use these differential excitations and orientations to construct the GWLD histogram representation. Finally, histogram intersection is adopted to measure the similarity between different GWLD histograms. The experimental results on the SEU bovine iris database verify the representation power of our proposed local descriptor.

  9. A gallery approach for off-angle iris recognition

    Science.gov (United States)

    Karakaya, Mahmut; Yoldash, Rashiduddin; Boehnen, Christopher

    2015-05-01

    It has been proven that hamming distance score between frontal and off-angle iris images of same eye differs in iris recognition system. The distinction of hamming distance score is caused by many factors such as image acquisition angle, occlusion, pupil dilation, and limbus effect. In this paper, we first study the effect of the angle variations between iris plane and the image acquisition systems. We present how hamming distance changes for different off-angle iris images even if they are coming from the same iris. We observe that increment in acquisition angle of compared iris images causes the increment in hamming distance. Second, we propose a new technique in off-angle iris recognition system that includes creating a gallery of different off-angle iris images (such as, 0, 10, 20, 30, 40, and 50 degrees) and comparing each probe image with these gallery images. We will show the accuracy of the gallery approach for off-angle iris recognition.

  10. Horner's syndrome: an electron microscopic study of a human iris.

    Science.gov (United States)

    McCartney, A. C.; Riordan-Eva, P.; Howes, R. C.; Spalton, D. J.

    1992-01-01

    Electron microscopy was performed on the irides of a man with a history of a long standing Horner's syndrome which resulted in iris heterochromia. Comparison of his normal brown iris with the depigmented blue iris showed depletion of anterior border cells and absence of sympathetic nerve fibres. Stromal melanocyte numbers were also diminished but melanosome numbers within the residual cells were not significantly different. Postnatal maintenance of stromal and anterior border zone pigmentation, derived from the neural crest, would appear to be dependent on an intact sympathetic nerve supply in contrast to the iris pigment epithelium which remains normally unaffected in Horner's syndrome. Images PMID:1486079

  11. A Case of Iris Mammillation Associated with Nevus of Ota

    Directory of Open Access Journals (Sweden)

    Onur Polat

    2013-10-01

    Full Text Available Nevus of Ota is characterized by the presence of hyperpigmentation in the skin areas innervated by the first or the second branches of the trigeminal nerve. Women are affected three times as often as men. Although nevus of Ota is a congenital disorder, it can be seen in puberty or adulthood. Herein a case of nevus of Ota was reported accompanying iris heterochromia and rare iris mammillation. Because of the relationship between iris heterochromia and iris mammillation with glaucoma and especially uveal melanoma, all the patients with nevus of Ota should be monitored closely with regular ophthalmologic examination.

  12. Retropupillary iris-claw intraocular lens for the surgical correction of aphakia in cases with microspherophakia

    Directory of Open Access Journals (Sweden)

    Sameh Mosaad Fouda

    2016-01-01

    Full Text Available Purpose: This study aimed to evaluate the safety and efficacy of retropupillary fixation of an iris-claw intraocular lens (IOL; Verisyse polymethyl methacrylate IOL, Abbott Medical Optics [AMO], Netherlands for the surgical correction of aphakia in microspherophakic eyes without sufficient capsular support. Design: This was a prospective, interventional, noncomparative case series. Methods: This interventional case series comprised 17 eyes of 9 microspherophakic patients. Retropupillary fixation of the Verisyse iris-claw IOL (AMO was performed in all cases. The surgical time was measured. Corrected distance visual acuity, astigmatism, intraocular pressure (IOP, tissue reaction, pigment dispersion, and stability of the IOL were studied 1 day, 3 days, 1 week, 2 weeks, 1 month, and 6 months postoperatively. Results: Eight patients had familial microspherophakia and one patient had Marfan's syndrome. Eighty-two percent of the cases achieved a visual acuity of 0.3 or better. There was no significant postoperative inflammatory reaction. Transient elevation of IOP was recorded in two cases in the 1st week only. One IOL developed disengagement of one of the haptics from the iris and was successfully re-engaged. All the other IOLs were well centered and stable. The mean surgical time was 18.0 ± 4.5 min. Conclusions: Retropupillary fixation of an iris-claw IOL is a safe and effective procedure that provides early visual recovery. It is also a time-saving method for correcting aphakia in microspherophakic eyes without sufficient capsular support.

  13. Retropupillary Fixation of Iris-Claw Intraocular Lens for Aphakic Eyes in Children

    Science.gov (United States)

    Brandner, Martina; Thaler-Saliba, Sarah; Plainer, Sophie; Vidic, Bertram; El-Shabrawi, Yosuf; Ardjomand, Navid

    2015-01-01

    Purpose To report outcome, complications and safety of retropupillary fixated iris-claw intraocular lenses in a pediatric population. Design Retrospective study. Patients and Methods Ten consecutive pediatric patients (15 eyes) underwent placement of retropupillary fixated iris-claw intraocular lenses between October 2007 and July 2013 at the Department of Ophthalmology, Medical University Graz and General Hospital Klagenfurt, Austria. Postoperative visual acuity and complications were analyzed. Results Median final best-corrected visual acuity improved by 0.12 logMAR from preoperative baseline. Mean postoperative spherical equivalent was -0.05 ± 1.76 D. No serious complications were observed intra- or postoperatively during the entire follow-up period of up to 40 months. One patient experienced a haptic disenclavation with IOL subluxation immediately after a car accident. Conclusion Our study demonstrates that iris-claw intraocular lens implantation behind the iris is safe in children with lack of capsular support and yields excellent visual outcome with low complication rate. PMID:26110864

  14. Promoting seismology education and research via the IRIS Education and Public Outreach Program

    Science.gov (United States)

    Taber, J. J.; Bravo, T. K.; Dorr, P. M.; Hubenthal, M.; Johnson, J. A.; McQuillan, P.; Sumy, D. F.; Welti, R.

    2015-12-01

    The Incorporated Research Institutions for Seismology's Education and Public Outreach (EPO) program is committed to advancing awareness and understanding of seismology and geophysics, while inspiring careers in the Earth sciences. To achieve this mission, IRIS EPO combines content and research expertise of consortium membership with educational and outreach expertise of IRIS staff to create a portfolio of programs, products, and services that target a range of audiences, including grades 6-12 students and teachers, undergraduate and graduate students, faculty, and the general public. IRIS also partners with UNAVCO and other organizations in support of EarthScope where the facilities are well-suited for sustained engagement of multiple audiences. Examples of research-related EPO products and services include the following resources. Tools developed in collaboration with IRIS Data Services provide public and educational access to data, and to a suite of data products. Teachers can stream seismic data from educational or research sensors into their classroom, and the Active Earth Monitor display, designed for visitor centers, universities and small museums, provides views of recent data along with animations that explain seismology concepts, and stories about recent research. Teachable Moment slide sets, created in collaboration with the University of Portland within 24 hours of major earthquakes, provide interpreted USGS tectonic maps and summaries, animations, visualizations, and other event-specific information so educators can explore newsworthy earthquakes with their students. Intro undergraduate classroom activities have been designed to introduce students to some grand challenges in seismological research, while our Research Experiences for Undergraduates program pairs students with seismology researchers throughout the Consortium and provides the opportunity for the students to present their research at a national meeting. EPO activities are evaluated via a

  15. RFID protocol design, optimization, and security for the Internet of Things

    CERN Document Server

    Liu, Alex X; Liu, Xiulong; Li, Keqiu

    2017-01-01

    This book covers the topic of RFID protocol design and optimization and the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them.

  16. Review Facility Design Drawings M3FT-16LA040105011 - Safeguards and Security by Design for Used Fuel Extended Storage: 1.02.04.01.05 FT – 16LA04010501

    Energy Technology Data Exchange (ETDEWEB)

    Scherer, Carolynn P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rauch, Eric Benton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-04-14

    This work package focuses on developing Best Practices for the design of security for, and domestic safeguarding (e.g. MC&A) of, a pilot-scale independent spent/used fuel storage facility consistent with conceptual design efforts in Nuclear Fuels Storage and Transportation (NFST) and Used Fuel Disposal (UFD) campaigns. This is a review of the basic design of the facility to determine a candidate list of accounting and control requirements that could be considered for safeguards and security purposes.

  17. Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-06-01

    Full Text Available At the center of core technologies for a future cyber world, such as Internet of Things (IoT or big data, is a context-rich system that offers services by using situational information. The field where context-rich systems were first introduced is near-field communication (NFC-based electronic payments. Near-field Communication (NFC integrated payment services collect the payment information of the credit card and the location information to generate patterns in the user’s consumption or movement through big data technology. Based on such pattern information, tailored services, such as advertisement, are offered to users. However, there is difficulty in controlling access to personal information, as there is a collaborative relationship focused on the trusted service manager (TSM that is close knit to shared personal information. Moreover, in the case of Hadoop, among the many big data analytical technologies, it offers access control functions, but not a way to authorize the processing of personal information, making it impossible to grant authority between service providers to process information. As such, this paper proposes a key generation and distribution method, as well as a secure communication protocol. The analysis has shown that the efficiency was greater for security and performance compared to relation works.

  18. Design and Numerical Simulation of Unidirectional Chaotic Synchronization and its Application in Secure Communication System

    Directory of Open Access Journals (Sweden)

    A. Sambas

    2013-09-01

    Full Text Available Chaotic systems are characterized by sensitive dependence on initial conditions, similar to random behavior, and continuous broad-band power spectrum. Chaos is a good potential to be used in secure communications system. In this paper, in order to show some interesting phenomena of three-order Jerk circuit with modulus nonlinearity, the chaotic behavior as a function of a variable control parameter, has been studied. The initial study in this paper is to analyze the phase portraits, the Poincaré maps, the bifurcation diagrams, while the analysis of the synchronization in the case of unidirectional coupling between two identical generated chaotic systems, has been presented. Moreover, some appropriate comparisons are made to contrast some of the existing results. Finally, the effectiveness of the unidirectional coupling scheme between two identical Jerk circuits in a secure communication system is presented in details. Integration of theoretical physics, the numerical simulation by using MATLAB 2010, as well as the implementation of circuit simulations by using MultiSIM 10.0 has been performed in this study

  19. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    Science.gov (United States)

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  20. A statistical investigation into the stability of iris recognition in diverse population sets

    Science.gov (United States)

    Howard, John J.; Etter, Delores M.

    2014-05-01

    Iris recognition is increasingly being deployed on population wide scales for important applications such as border security, social service administration, criminal identification and general population management. The error rates for this incredibly accurate form of biometric identification are established using well known, laboratory quality datasets. However, it is has long been acknowledged in biometric theory that not all individuals have the same likelihood of being correctly serviced by a biometric system. Typically, techniques for identifying clients that are likely to experience a false non-match or a false match error are carried out on a per-subject basis. This research makes the novel hypothesis that certain ethnical denominations are more or less likely to experience a biometric error. Through established statistical techniques, we demonstrate this hypothesis to be true and document the notable effect that the ethnicity of the client has on iris similarity scores. Understanding the expected impact of ethnical diversity on iris recognition accuracy is crucial to the future success of this technology as it is deployed in areas where the target population consists of clientele from a range of geographic backgrounds, such as border crossings and immigration check points.

  1. Effect of tamsulosin on iris vasculature and morphology.

    Science.gov (United States)

    Shtein, Roni M; Hussain, Munira T; Cooney, Theresa M; Elner, Victor M; Hood, Christopher T

    2014-05-01

    To determine whether preoperative iris vasculature and morphology are altered in patients who have taken tamsulosin (Flomax). Academic multispecialty practice. Case series. Patients with current or past tamsulosin use and age- and sex-matched control patients were included. Anterior segment optical coherence tomography (AS-OCT) and iris fluorescein angiography were performed to measure iris vasculature and thickness before cataract surgery. Data collected at surgery included pupil diameter, clinical signs of intraoperative floppy-iris syndrome, and surgical complications. Tamsulosin was currently used by 16 patients and in the past by 4 patients; the control group comprised 10 patients. Pharmacologically dilated pupil diameter was statistically significantly smaller preoperatively and immediately postoperatively in the tamsulosin group than in the control group (P=.009 and P=.003, respectively). There was a statistically significant decrease in pupil size intraoperatively in the tamsulosin group (P=.05) but not in the control group (P=.3). Iris-vasculature parameters, specifically time to first vessel fill and percentage of vessel fill on iris fluorescein angiography, were not significantly different between the 2 groups. The AS-OCT measurements of iris morphology were not statistically significantly different between the groups. No surgical complications occurred. No fluorescein dye leakage, staining, or other vascular anomalies were observed. Although there were differences in pupil measurements and intraoperative iris behavior between patients who had been on tamsulosin and control patients, there were no significant differences in iris vasculature on iris fluorescein angiography or in iris morphology on AS-OCT. Copyright © 2014 ASCRS and ESCRS. Published by Elsevier Inc. All rights reserved.

  2. Iris melanoma management with iodine-125 plaque radiotherapy in 144 patients: impact of melanoma-related glaucoma on outcomes.

    Science.gov (United States)

    Shields, Carol L; Shah, Sanket U; Bianciotto, Carlos G; Emrich, Jacqueline; Komarnicky, Lydia; Shields, Jerry A

    2013-01-01

    To evaluate the outcomes of iris melanoma managed with plaque radiotherapy on the basis of the initial presence or absence of glaucoma. Retrospective, comparative case series. A total of 144 patients. Custom-designed iodine-125 plaque radiotherapy delivering planned 8000 cGy to melanoma apex using transcorneal application. Tumor control and treatment-related complications. Of 144 patients with iris melanoma, glaucoma was present at the initial visit in 58 (40%). Causes of elevated intraocular pressure included angle infiltration by melanoma in 50 patients (86%), angle neovascularization in 4 patients (7%), and hyphema in 4 patients (7%). At presentation, the eyes displaying iris melanoma with glaucoma (vs. without glaucoma) were statistically more likely to display angle tumor (66% vs. 43%), with minimal thickness (1.9 vs. 2.9 mm), and melanoma seeding in iris stroma (7 vs. 3 clock hours) and angle (5 vs. 2 clock hours). Plaque radiotherapy was performed in all cases. Kaplan-Meier estimates at 7 years post-treatment revealed no statistical differences in outcomes of local recurrence (14% vs. 15%), enucleation (14% vs. 11%), or metastasis (2% vs. 0%) comparing eyes with and without glaucoma. Of the entire group, multivariate analysis for factors predictive of recurrence included partial (vs. complete) anterior segment irradiation and postradiotherapy glaucoma. Factors related to enucleation included diabetes mellitus, poor initial visual acuity, higher radiation dose to tumor apex, and tumor recurrence. There were no factors predictive of metastasis. Iodine-125 plaque radiotherapy provides adequate tumor control for iris melanoma with a low metastatic potential of 1% at 7 years. Iris melanoma with secondary glaucoma showed a statistically significant greater likelihood of flat tumor with iris and angle seeding and no difference in outcomes compared with eyes without glaucoma. The author(s) have no proprietary or commercial interest in any materials discussed in this

  3. Evaluation of Genetic Diversity of Iris Genotypes (Iris spp Using ISSR

    Directory of Open Access Journals (Sweden)

    seyedeh zeinab attari

    2017-02-01

    Full Text Available Introduction: Some of Iris species are growing in different parts of the Iran as wild species. Iris species have important medicinal and horticultural properties. Understanding of the genetic variation within and between populations is essential for the establishment of effective and efficient methods for conservation of the plants. Genetic variation studies are fundamental for the management and conservation of this species. The use of molecular markers is a powerful tool in the genetic study of populations. The use of DNA marker, such as AFLP, SSR, RAPD and ISSR represents an alternative method in detection of polymorphism. ISSRs are highly variable, require less investment in time, money and labor than other methods. ISSR can generate higher percentages of polymorphic loci than other PCR methods. These can serve as an efficient tool for phylogenetic studies. ISSRs had reported that used in studies of cultivated species to produce genetic linkage maps and to determine the relatedness of lines of agriculturally important species. ISSR analysis involves the PCR amplification of regions between adjacent, inversely oriented microsatellites, using a single simple sequence repeat (SSR motifs (dinucleotide, trinucleotide, tetranucleotide or penta nucleotides. Therefore, little is known about the genetic variability of the Iranian Iris ssp .The objectives of this study were to evaluate genetic diversity among genotypes using ISSR markers and the degree of polymorphism generated from ISSR technique as a pre-requisite for their applicability to population genetics studies in Iris ssp. Materials and Methods: To evaluate genetic variations in some wild Iris genotypes, Iris kopetdaghensis ،Iris songarica and Iris fosteriana were collected from some parts of Khorasan province. Genomic DNA was extracted from young leaves following the cetyltrimethylammonium bromide (CTAB procedure. Extracted DNA concentration was quantified by using the spectrophotometer

  4. Tools for Integrating Data Access from the IRIS DMC into Research Workflows

    Science.gov (United States)

    Reyes, C. G.; Suleiman, Y. Y.; Trabant, C.; Karstens, R.; Weertman, B. R.

    2012-12-01

    Web service interfaces at the IRIS Data Management Center (DMC) provide access to a vast archive of seismological and related geophysical data. These interfaces are designed to easily incorporate data access into data processing workflows. Examples of data that may be accessed include: time series data, related metadata, and earthquake information. The DMC has developed command line scripts, MATLAB® interfaces and a Java library to support a wide variety of data access needs. Users of these interfaces do not need to concern themselves with web service details, networking, or even (in most cases) data conversion. Fetch scripts allow access to the DMC archive and are a comfortable fit for command line users. These scripts are written in Perl and are well suited for automation and integration into existing workflows on most operating systems. For metdata and event information, the Fetch scripts even parse the returned data into simple text summaries. The IRIS Java Web Services Library (IRIS-WS Library) allows Java developers the ability to create programs that access the DMC archives seamlessly. By returning the data and information as native Java objects the Library insulates the developer from data formats, network programming and web service details. The MATLAB interfaces leverage this library to allow users access to the DMC archive directly from within MATLAB (r2009b or newer), returning data into variables for immediate use. Data users and research groups are developing other toolkits that use the DMC's web services. Notably, the ObsPy framework developed at LMU Munich is a Python Toolbox that allows seamless access to data and information via the DMC services. Another example is the MATLAB-based GISMO and Waveform Suite developments that can now access data via web services. In summary, there now exist a host of ways that researchers can bring IRIS DMC data directly into their workflows. MATLAB users can use irisFetch.m, command line users can use the various

  5. IRIS Toxicological Review of Bromobenzene (External Review ...

    Science.gov (United States)

    EPA has conducted a peer review of the scientific basis supporting the human health hazard and dose-response assessment of Bromobenzene that will appear on the Integrated Risk Information System (IRIS) database. Peer review is meant to ensure that science is used credibly and appropriately in derivation of the dose-response assessments and toxicological characterization. The draft Toxicological Review of Bromobenzene provides scientific support and rationale for the hazard and dose-response assessment pertaining to subchronic and chronic exposure to bromobenzene.

  6. IRIS Toxicological Review of Acrylamide (External Review ...

    Science.gov (United States)

    EPA has conducted a peer review by EPA’s Science Advisory Board (SAB) of the scientific basis supporting the human health hazard and dose-response assessment of acrylamide that once finalized will appear on the Integrated Risk Information System (IRIS) database. Peer review is meant to ensure that the science is used credibly and appropriately in derivation of the dose-response assessments and toxicological characterization. The draft Toxicological Review of Acrylamide provides scientific support and rationale for the hazard identification and dose-response assessment pertaining to a chronic exposure to acrylamide.

  7. On iris detection for mobile device applications

    Science.gov (United States)

    Mohamed, Magdi A.; Sarkis, Michel; Bi, Ning; Zhong, Xin; Qi, Yingyong

    2014-09-01

    A novel transform called Gradient Direction Transform for fast detection of naturally curved items in digital images is described in this article. This general purpose image transform is defined to suit platforms with limited memory and processing footprints by utilizing only additions and simple shift and bitwise operations. We present this unique algorithmic approach in application to real world problems of iris detection. The new approach is tested on a large data set and the experiments show promising and superior performance compared to existing techniques.

  8. Frontal view reconstruction for iris recognition

    Energy Technology Data Exchange (ETDEWEB)

    Santos-Villalobos, Hector J; Bolme, David S; Boehnen, Chris Bensing

    2015-02-17

    Iris recognition can be accomplished for a wide variety of eye images by correcting input images with an off-angle gaze. A variety of techniques, from limbus modeling, corneal refraction modeling, optical flows, and genetic algorithms can be used. A variety of techniques, including aspherical eye modeling, corneal refraction modeling, ray tracing, and the like can be employed. Precomputed transforms can enhance performance for use in commercial applications. With application of the technologies, images with significantly unfavorable gaze angles can be successfully recognized.

  9. Analysis of different containment models for IRIS small break LOCA, using GOTHIC and RELAP5 codes

    International Nuclear Information System (INIS)

    Papini, Davide; Grgic, Davor; Cammi, Antonio; Ricotti, Marco E.

    2011-01-01

    Advanced nuclear water reactors rely on containment behaviour in realization of some of their passive safety functions. Steam condensation on containment walls, where non-condensable gas effects are significant, is an important feature of the new passive containment concepts, like the AP600/1000 ones. In this work the international reactor innovative and secure (IRIS) was taken as reference, and the relevant condensation phenomena involved within its containment were investigated with different computational tools. In particular, IRIS containment response to a small break LOCA (SBLOCA) was calculated with GOTHIC and RELAP5 codes. A simplified model of IRIS containment drywell was implemented with RELAP5 according to a sliced approach, based on the two-pipe-with-junction concept, while it was addressed with GOTHIC using several modelling options, regarding both heat transfer correlations and volume and thermal structure nodalization. The influence on containment behaviour prediction was investigated in terms of drywell temperature and pressure response, heat transfer coefficient (HTC) and steam volume fraction distribution, and internal recirculating mass flow rate. The objective of the paper is to preliminarily compare the capability of the two codes in modelling of the same postulated accident, thus to check the results obtained with RELAP5, when applied in a situation not covered by its validation matrix (comprising SBLOCA and to some extent LBLOCA transients, but not explicitly the modelling of large dry containment volumes). The option to include or not droplets in fluid mass flow discharged to the containment was the most influencing parameter for GOTHIC simulations. Despite some drawbacks, due, e.g. to a marked overestimation of internal natural recirculation, RELAP5 confirmed its capability to satisfactorily model the basic processes in IRIS containment following SBLOCA.

  10. Designing ECG-based physical unclonable function for security of wearable devices.

    Science.gov (United States)

    Shihui Yin; Chisung Bae; Sang Joon Kim; Jae-Sun Seo

    2017-07-01

    As a plethora of wearable devices are being introduced, significant concerns exist on the privacy and security of personal data stored on these devices. Expanding on recent works of using electrocardiogram (ECG) as a modality for biometric authentication, in this work, we investigate the possibility of using personal ECG signals as the individually unique source for physical unclonable function (PUF), which eventually can be used as the key for encryption and decryption engines. We present new signal processing and machine learning algorithms that learn and extract maximally different ECG features for different individuals and minimally different ECG features for the same individual over time. Experimental results with a large 741-subject in-house ECG database show that the distributions of the intra-subject (same person) Hamming distance of extracted ECG features and the inter-subject Hamming distance have minimal overlap. 256-b random numbers generated from the ECG features of 648 (out of 741) subjects pass the NIST randomness tests.

  11. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  12. Design Basis Threat (DBT) Approach for the First NPP Security System in Indonesia

    International Nuclear Information System (INIS)

    Ign Djoko Irianto

    2004-01-01

    Design Basis Threat (DBT) is one of the main factors to be taken into account in the design of physical protection system of nuclear facility. In accordance with IAEA's recommendations outlined in INFCIRC/225/Rev.4 (Corrected), DBT is defined as: attributes and characteristics of potential insider and/or external adversaries, who might attempt unauthorized removal of nuclear material or sabotage against the nuclear facilities. There are three types of adversary that must be considered in DBT, such as adversary who comes from the outside (external adversary), adversary who comes from the inside (internal adversary), and adversary who comes from outside and colludes with insiders. Current situation in Indonesia, where many bomb attacks occurred, requires serious attention on DBT in the physical protection design of NPP which is to be built in Indonesia. This paper is intended to describe the methodology on how to create and implement a Design Basis Threat in the design process of NPP physical protection in Indonesia. (author)

  13. Real-time image-guided nasogastric feeding tube placement: A case series using Kangaroo with IRIS Technology in an ICU.

    Science.gov (United States)

    Mizzi, Anna; Cozzi, Silvano; Beretta, Luigi; Greco, Massimiliano; Braga, Marco

    2017-05-01

    Pulmonary misplacement during the blind insertion of enteral feeding tubes is frequent, particularly in ventilated and neurologically impaired patients. This is probably the first clinical study using the Kangaroo Feeding Tube with IRIS technology (IRIS) which incorporates a camera designed to provide anatomic landmark visualization during insertion. The study aim was to evaluate IRIS performance during bedside gastric placement. This is the first prospective study to collect data on the use of IRIS. Twenty consecutive unconscious patients requiring enteral nutrition were recruited at a single center. IRIS placement was considered complete when a clear image of the gastric mucosa appeared. Correct placement was confirmed using a contrast-enhanced abdominal X-ray. To evaluate the device performance over time, the camera was activated every other day up to 17 d postplacement. In 7 (35%) patients, the trachea was initially visualized, requiring a second placement attempt with the same tube. The IRIS camera allowed recognition of the gastric mucosa in 18 (90%) patients. The esophagogastric junction was identified in one patient, while in a second patient the quality of visualization was poor. Contrast-enhanced X-ray confirmed the gastric placement of IRIS in all patients. IRIS allowed identification of gastric mucosa in 14 (70%) patients 3 d after placement. Performance progressively declined with time (P = 0.006, chi-square for trend). IRIS placement could have spared X-ray confirmation in almost all patients and prevented misplacement into the airway in about one third. Visualization quality needs to be improved, particularly after the first week. Copyright © 2016 Elsevier Inc. All rights reserved.

  14. The gray iris syndrome. An iatrogenic form of pigmentary glaucoma.

    Science.gov (United States)

    Huber, C

    1984-03-01

    An excessive trauma of the iris at the time of lens implantation in the posterior chamber can lead to a change in color of a blue iris because of a diffuse pigmentary dispersion syndrome and possibly a pigmentary glaucoma. The clinical signs of the syndrome are illustrated and the possible causes and preventions of this surgical complication are discussed.

  15. IRIS Toxicological Review of 1,4-Dioxane (External Review ...

    Science.gov (United States)

    EPA is conducting a peer review and public comment of the scientific basis supporting the human health hazard and dose-response assessment of 1,4-dioxane that when finalized will appear on the Integrated Risk Information System (IRIS) database. IRIS Assessment

  16. Delay of Iris flower senescence by cytokinins and jasmonates

    NARCIS (Netherlands)

    Doorn, van W.G.; Celikel, F.G.; Pak, C.; Harkema, H.

    2013-01-01

    It is not known whether tepal senescence in Iris flowers is regulated by hormones. We applied hormones and hormone inhibitors to cut flowers and isolated tepals of Iris x hollandica cv. Blue Magic. Treatments with ethylene or ethylene antagonists indicated lack of ethylene involvement. Auxins or

  17. Opening of Iris flowers is regulated by endogenous auxins

    NARCIS (Netherlands)

    Doorn, van W.G.; Dole, I.; Celikel, F.G.; Harkema, H.

    2013-01-01

    Flower opening in Iris (Iris x hollandica) requires elongation of the pedicel and ovary. This moves the floral bud upwards, thereby allowing the tepals to move laterally. Flower opening is requires with elongation of the pedicel and ovary. In cv. Blue Magic, we investigated the possible role of

  18. An enhanced iris recognition and authentication system using ...

    African Journals Online (AJOL)

    Iris recognition and authentication has a major issue in its code generation and verification accuracy, in order to enhance the authentication process, a binary bit sequence of iris is generated, which contain several vital information that is used to calculate the Mean Energy and Maximum Energy that goes into the eye with an ...

  19. Fluorescence angiography of iris in malignant uveal melanoma

    International Nuclear Information System (INIS)

    Boguszakova, J.; Dubska, Z.

    1988-01-01

    Fluorescence angiography of the iris was performed in 12 eyes with malignant uveal melanoma. Tumors localized in front of the equator, without respect to their cellular types, caused secondary fluoroangiographic changes in the iris corresponding to the location of these tumors. The character and degree of changes corresponded to the mechanical effect of the malignant melanoma. (author). 8 figs., 3 tabs., 10 refs

  20. Grading of Iris Color with an Extended Photographic Reference Set

    Directory of Open Access Journals (Sweden)

    Luuk Franssen

    2008-01-01

    Conclusion: The new method is promising to be more accurate than existing iris color classification systems in clinical situations where objective colorimetry-based systems are not available. The method may be useful to assess iris translucency and fundus reflectance as sources of variation in retinal straylight.

  1. IRIS Toxicological Review of Methyl Ethyl Ketone (2003 Final)

    Science.gov (United States)

    EPA announced the release of the final report, Toxicological Review of Methyl Ethyl Ketone: in support of the Integrated Risk Information System (IRIS). The updated Summary for Methyl Ethyl Ketone and accompanying toxicological review have been added to the IRIS Database....

  2. Full core analysis of IRIS reactor by using MCNPX.

    Science.gov (United States)

    Amin, E A; Bashter, I I; Hassan, Nabil M; Mustafa, S S

    2016-07-01

    This paper describes neutronic analysis for fresh fuelled IRIS (International Reactor Innovative and Secure) reactor by MCNPX code. The analysis included criticality calculations, radial power and axial power distribution, nuclear peaking factor and axial offset percent at the beginning of fuel cycle. The effective multiplication factor obtained by MCNPX code is compared with previous calculations by HELIOS/NESTLE, CASMO/SIMULATE, modified CORD-2 nodal calculations and SAS2H/KENO-V code systems. It is found that k-eff value obtained by MCNPX is closer to CORD-2 value. The radial and axial powers are compared with other published results carried out using SAS2H/KENO-V code. Moreover, the WIMS-D5 code is used for studying the effect of enriched boron in form of ZrB2 on the effective multiplication factor (K-eff) of the fuel pin. In this part of calculation, K-eff is calculated at different concentrations of Boron-10 in mg/cm at different stages of burnup of unit cell. The results of this part are compared with published results performed by HELIOS code. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Laboratory evaluation of the IriScan prototype biometric identifier

    Energy Technology Data Exchange (ETDEWEB)

    Bouchier, F.; Ahrens, J.S.; Wells, G.

    1996-04-01

    One thing that all access control applications have in common is the need to identify those individuals authorized to gain access to an area. Traditionally, the identification is based on something that person possesses, such as a key or badge, or something they know, such as a PIN or password. Biometric identifiers make their decisions based on the physiological or behavioral characteristics of individuals. The potential of biometrics devices to positively identify individuals has made them attractive for use in access control and computer security applications. However, no systems perform perfectly, so it is important to understand what a biometric device`s performance is under real world conditions before deciding to implement one in an access control system. This paper will describe the evaluation of a prototype biometric identifier provided by IriScan Incorporated. This identifier was developed to recognize individual human beings based on the distinctive visual characteristics of the irises of their eyes. The main goal of the evaluation was to determine whether the system has potential as an access control device within the Department of Energy (DOE). The primary interest was an estimate of the accuracy of the system in terms of false accept and false reject rates. Data was also collected to estimate throughput time and user acceptability. The performance of the system during the test will be discussed. Lessons learned during the test which may aid in further testing and simplify implementation of a production system will also be discussed.

  4. IRIS/USGS Plans for Upgrading the Global Seismograph Network

    Science.gov (United States)

    Peterson, Jon; Hutt, Charles R.

    1989-01-01

    demonstrate, the IRIS broadband seismograph system combines the very latest data acquisition and computer technology to produce seismic data with unprecedented bandwidth and dynamic range. Moreover, the system has been designed so that the high-quality digital data are accessible for local display and analysis. The functional design of the new system, which uses off-the-shelf modules and a standard computer bus, will make it much easier than it has been in the past to modify and upgrade the data acquisition system as improvements in technology become available. With adequate support for the program, the new IRIS seismograph system need never become obsolete. We want you to be aware of our plans and the possibility that you may be asked to participate in this ,program. The schedule for upgrading WWSSN and GDSN stations depends on the level of funding earmarked for the program by our National Science Foundation. We hope to deploy at least ten new GSN data systems each year. If you have any questions concerning this program, please contact the Albuquerque Seismological Laboratory, U.S. Geological Survey, Albuquerque, New Mexico 87115-5000. This report was revised in February 1992 in order to update information concerning the current program and instrumentation. The amp in Figure 1 was revised in June 1993, April 1994, December 1994, and September 1996 to reflect updated siting information. In September 1996 a composite photo of standard and optional components of the IRIS-2 GSN system hardware was added as a separate page between Figures 9 and 10.

  5. IRIS Toxicological Review of Ammonia (External Review Draft ...

    Science.gov (United States)

    EPA is conducting a peer review of the scientific basis supporting the human health hazard and dose-response assessment of ammonia that will appear in the Integrated Risk Information System (IRIS) database. EPA is undertaking an Integrated Risk Information System (IRIS) health assessment for ammonia. IRIS is an EPA database containing Agency scientific positions on potential adverse human health effects that may result from chronic (or lifetime) exposure to chemicals in the environment. IRIS contains chemical-specific summaries of qualitative and quantitative health information in support of two steps of the risk assessment paradigm, i.e., hazard identification and dose-response evaluation. IRIS assessments are used in combination with specific situational exposure assessment information to evaluate potential public health risk associated with environmental contaminants.

  6. IRIS Toxicological Review of n-Butanol (External Review Draft ...

    Science.gov (United States)

    EPA is conducting a peer review of the scientific basis supporting the human health hazard and dose-response assessment of n-butanol that will appear in the Integrated Risk Information System (IRIS) database. EPA is undertaking an Integrated Risk Information System (IRIS) health assessment for n-butanol. IRIS is an EPA database containing Agency scientific positions on potential adverse human health effects that may result from chronic (or lifetime) exposure to chemicals in the environment. IRIS contains chemical-specific summaries of qualitative and quantitative health information in support of two steps of the risk assessment paradigm, i.e., hazard identification and dose-response evaluation. IRIS assessments are used in combination with specific situational exposure assessment information to evaluate potential public health risk associated with environmental contaminants.

  7. Multimodal Algorithm for Iris Recognition with Local Topological Descriptors

    Science.gov (United States)

    Campos, Sergio; Salas, Rodrigo; Allende, Hector; Castro, Carlos

    This work presents a new method for feature extraction of iris images to improve the identification process. The valuable information of the iris is intrinsically located in its natural texture, and preserving and extracting the most relevant features is of paramount importance. The technique consists in several steps from adquisition up to the person identification. Our contribution consists in a multimodal algorithm where a fragmentation of the normalized iris image is performed and, afterwards, regional statistical descriptors with Self-Organizing-Maps are extracted. By means of a biometric fusion of the resulting descriptors, the features of the iris are compared and classified. The results with the iris data set obtained from the Bath University repository show an excellent accuracy reaching up to 99.867%.

  8. A NEURAL NETWORK BASED IRIS RECOGNITION SYSTEM FOR PERSONAL IDENTIFICATION

    Directory of Open Access Journals (Sweden)

    Usham Dias

    2010-10-01

    Full Text Available This paper presents biometric personal identification based on iris recognition using artificial neural networks. Personal identification system consists of localization of the iris region, normalization, enhancement and then iris pattern recognition using neural network. In this paper, through results obtained, we have shown that a person’s left and right eye are unique. In this paper, we also show that the network is sensitive to the initial weights and that over-training gives bad results. We also propose a fast algorithm for the localization of the inner and outer boundaries of the iris region. Results of simulations illustrate the effectiveness of the neural system in personal identification. Finally a hardware iris recognition model is proposed and implementation aspects are discussed.

  9. Advanced Instrumentation and Control Methods for Small and Medium Reactors with IRIS Demonstration

    Energy Technology Data Exchange (ETDEWEB)

    J. Wesley Hines; Belle R. Upadhyaya; J. Michael Doster; Robert M. Edwards; Kenneth D. Lewis; Paul Turinsky; Jamie Coble

    2011-05-31

    Development and deployment of small-scale nuclear power reactors and their maintenance, monitoring, and control are part of the mission under the Small Modular Reactor (SMR) program. The objectives of this NERI-consortium research project are to investigate, develop, and validate advanced methods for sensing, controlling, monitoring, diagnosis, and prognosis of these reactors, and to demonstrate the methods with application to one of the proposed integral pressurized water reactors (IPWR). For this project, the IPWR design by Westinghouse, the International Reactor Secure and Innovative (IRIS), has been used to demonstrate the techniques developed under this project. The research focuses on three topical areas with the following objectives. Objective 1 - Develop and apply simulation capabilities and sensitivity/uncertainty analysis methods to address sensor deployment analysis and small grid stability issues. Objective 2 - Develop and test an autonomous and fault-tolerant control architecture and apply to the IRIS system and an experimental flow control loop, with extensions to multiple reactor modules, nuclear desalination, and optimal sensor placement strategy. Objective 3 - Develop and test an integrated monitoring, diagnosis, and prognosis system for SMRs using the IRIS as a test platform, and integrate process and equipment monitoring (PEM) and process and equipment prognostics (PEP) toolboxes. The research tasks are focused on meeting the unique needs of reactors that may be deployed to remote locations or to developing countries with limited support infrastructure. These applications will require smaller, robust reactor designs with advanced technologies for sensors, instrumentation, and control. An excellent overview of SMRs is described in an article by Ingersoll (2009). The article refers to these as deliberately small reactors. Most of these have modular characteristics, with multiple units deployed at the same plant site. Additionally, the topics focus

  10. Design and Characterization of a Secure Automatic Dependent Surveillance-Broadcast Prototype

    Science.gov (United States)

    2015-03-26

    during the thesis process. Thank you to Mr. Dave Prentice of AFRL for providing the Aeroflex IFR 6000 baseband signals, upon which many design decisions...1 1.1 Background and Motivation...5 II. Background

  11. Unlocking User-Centered Design Methods for Building Cyber Security Visualizations

    Science.gov (United States)

    2015-10-03

    3, 10, 24, 25, 30]. Personas are doc- uments meant to foster communication within a design team as archetypes of users, their behaviors, and their...to evaluation, these two user archetypes became the key motivation to justify and balance all our decisions as a design team. Outcomes We present the...domain-specific task for each archetypal user and visually illustrated the user’s cyber knowl- edge and situational awareness (SA) focus. We also

  12. Template characterization and correlation algorithm created from segmentation for the iris biometric authentication based on analysis of textures implemented on a FPGA

    International Nuclear Information System (INIS)

    Giacometto, F J; Vilardy, J M; Torres, C O; Mattos, L

    2011-01-01

    Among the most used biometric signals to set personal security permissions, taker increasingly importance biometric iris recognition based on their textures and images of blood vessels due to the rich in these two unique characteristics that are unique to each individual. This paper presents an implementation of an algorithm characterization and correlation of templates created for biometric authentication based on iris texture analysis programmed on a FPGA (Field Programmable Gate Array), authentication is based on processes like characterization methods based on frequency analysis of the sample, and frequency correlation to obtain the expected results of authentication.

  13. Design of a secure remote management module for a software-operated medical device.

    Science.gov (United States)

    Burnik, Urban; Dobravec, Štefan; Meža, Marko

    2017-12-09

    Software-based medical devices need to be maintained throughout their entire life cycle. The efficiency of after-sales maintenance can be improved by managing medical systems remotely. This paper presents how to design the remote access function extensions in order to prevent risks imposed by uncontrolled remote access. A thorough analysis of standards and legislation requirements regarding safe operation and risk management of medical devices is presented. Based on the formal requirements, a multi-layer machine design solution is proposed that eliminates remote connectivity risks by strict separation of regular device functionalities from remote management service, deploys encrypted communication links and uses digital signatures to prevent mishandling of software images. The proposed system may also be used as an efficient version update of the existing medical device designs.

  14. Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons

    Science.gov (United States)

    Zhang, Ke-Jia; Kwek, Leong-Chuan; Ma, Chun-Guang; Zhang, Long; Sun, Hong-Wei

    2018-02-01

    Quantum sealed-bid auction (QSA) has been widely studied in quantum cryptography. For a successful auction, post-confirmation is regarded as an important mechanism to make every bidder verify the identity of the winner after the auctioneer has announced the result. However, since the auctioneer may be dishonest and collude with malicious bidders in practice, some potential loopholes could exist. In this paper, we point out two types of collusion attacks for a particular post-confirmation technique with EPR pairs. And it is not difficult to see that there exists no unconditionally secure post-confirmation mechanism in the existing QSA model, if the dishonest participants have the ability to control multiparticle entanglement. In the view of this, we note that some secure implementation could exist if the participants are supposed to be semi-quantum, i.e., they can only control single photons. Finally, two potential methods to design post-confirmation mechanism are presented in this restricted scenario.

  15. The impact of work environment, individual characteristics, training design and motivation on training transfer to the work: the case of Saudi Arabian Public Security Organisation

    OpenAIRE

    Alnowaiser, A.

    2017-01-01

    The aim of this empirical study was to find out the impact of work environment, individual characteristics, training design and motivation on training transfer to the work in the context of public security. Methodology included a cross sectional questionnaire survey administered to a stratified convenience sample of 500 officers of Public Security Organisation in Saudi Arabia. The effective response rate was 70.2% (351 useable surveys returned out of 500 surveys administered). Data were analy...

  16. IRIS - A Community-Based Facility to Support Research in Seismology

    Science.gov (United States)

    Ingate, S.; Ahern, T.; Butler, R.; Fowler, J.; Simpson, D.; Taber, J.; van der Vink, G.

    2002-12-01

    The IRIS Consortium was established in 1984 in response to growing pressure from the research community for enhanced facilities in global and lithospheric seismology. At the same time, the National Science Foundation was encouraging improvements in technology and infrastructure that were sorely needed to ensure the future health of the nation's research endeavors. The governance of IRIS and growth of the facility programs have been guided by strong involvement of the research community. The IRIS management governance and structure serves as an interface between the scientific community, funding agencies, and the programs of IRIS. The structure is designed to focus scientific talent on common objectives, to encourage broad participation, and to efficiently manage its programs. IRIS is governed by a Board of Directors consisting of representatives from each of IRIS' 99 member institutions. Operational policies are set by an Executive Committee elected by the Board of Directors. The Executive Committee, in turn, appoints members to the Planning Committee, the Program Coordination Committee, and the four Standing Committees that provide oversight of the Global Seismographic Network (GSN), the Program of Array Seismic Studies of the Continental Lithosphere (PASSCAL), the Data Management System (DMS), and the Education and Outreach Program (E&O). In addition, special advisory committees and ad hoc working groups are convened for special tasks. Development of the IRIS programs has rested on strong core support from the Instrumentation and Facilities Program of the National Science Foundation's Earth Science Division, augmented with funding from the Department of Defense, Department of Energy, member universities, and private organizations. Close collaboration with the US Geological Survey and other national and foreign institutions has greatly extended the geographical coverage and strengthened the intellectual input that is essential to guiding the evolution of the IRIS

  17. Whole Building Design Objectives for Campus Safety and Security: A System Dynamics Approach

    Science.gov (United States)

    Oakes, Charles G.

    2010-01-01

    The May/June 2009 issue of "Facilities Manager" introduced APPA readers to the Whole Building Design Guide (WBDG)--today's most comprehensive Internet-based depository of resources contributing to a systems approach for everything of a building nature. The emphasis in that article was on Operations and Maintenance (O&M) issues and procedures. In…

  18. Design of High-Fidelity Testing Framework for Secure Electric Grid Control

    Energy Technology Data Exchange (ETDEWEB)

    Yoginath, Srikanth B [ORNL; Perumalla, Kalyan S [ORNL

    2014-01-01

    A solution methodology and implementation components are presented that can uncover unwanted, unintentional or unanticipated effects on electric grids from changes to actual electric grid control software. A new design is presented to leapfrog over the limitations of current modeling and testing techniques for cyber technologies in electric grids. We design a fully virtualized approach in which actual, unmodified operational software under test is enabled to interact with simulated surrogates of electric grids. It enables the software to influence the (simulated) grid operation and vice versa in a controlled, high fidelity environment. Challenges in achieving such capability include achieving low-overhead time control mechanisms in hypervisor schedulers, network capture and time-stamping, translation of network packets emanating from grid software into discrete events of virtual grid models, translation back from virtual sensors/actuators into data packets to control software, and transplanting the entire system onto an accurately and efficiently maintained virtual-time plane.

  19. Enhancement of Iris Recognition System Based on Phase Only Correlation

    Directory of Open Access Journals (Sweden)

    Nuriza Pramita

    2011-08-01

    Full Text Available Iris recognition system is one of biometric based recognition/identification systems. Numerous techniques have been implemented to achieve a good recognition rate, including the ones based on Phase Only Correlation (POC. Significant and higher correlation peaks suggest that the system recognizes iris images of the same subject (person, while lower and unsignificant peaks correspond to recognition of those of difference subjects. Current POC methods have not investigated minimum iris point that can be used to achieve higher correlation peaks. This paper proposed a method that used only one-fourth of full normalized iris size to achieve higher (or at least the same recognition rate. Simulation on CASIA version 1.0 iris image database showed that averaged recognition rate of the proposed method achieved 67%, higher than that of using one-half (56% and full (53% iris point. Furthermore, all (100% POC peak values of the proposed method was higher than that of the method with full iris points.

  20. A simple shape prior model for iris image segmentation

    Science.gov (United States)

    Bishop, Daniel A.; Yezzi, Anthony, Jr.

    2011-06-01

    In order to make biometric systems faster and more user-friendly, lower-quality images must be accepted. A major hurdle in this task is accurate segmentation of the boundaries of the iris in these images. Quite commonly, circle-fitting is used to approximate the boundaries of the inner (pupil) and outer (limbic) boundaries of the iris, but this assumption does not hold for off-axis or otherwise non-circular boundaries. In this paper we present a novel, foundational method for elliptical segmentation of off-axis iris images. This method uses active contours with constrained flow to achieve a simplified form of shape prior active contours. This is done by calculating a region-based contour evolution and projecting it upon a properly chosen set of vectors to confine it to a class of shapes. In this case, that class of shapes is ellipses. This serves to regularize the contour, simplifying the curve evolution and preventing the development of irregularities that present challenges in iris segmentation. The proposed method is tested using images from the UBIRIS v.1 and CASIA-IrisV3 image data sets, with both near-ideal and off-axis images. Additional testing has been performed using the WVU Off Axis/Angle Iris Dataset, Release 1. By avoiding many of the assumptions commonly used in iris segmentation methods, the proposed method is able to accurately fit elliptical boundaries to off-axis images.

  1. Iris morphologic changes related to alpha(1)-adrenergic receptor antagonists implications for intraoperative floppy iris syndrome.

    Science.gov (United States)

    Prata, Tiago Santos; Palmiero, Pat-Michael; Angelilli, Allison; Sbeity, Zaher; De Moraes, Carlos Gustavo V; Liebmann, Jeffrey M; Ritch, Robert

    2009-05-01

    To identify iris structural alterations associated with intraoperative floppy iris syndrome (IFIS) in patients using systemic alpha(1)-adrenergic receptor antagonists (alpha-1ARA). Cross-sectional study. Twenty-nine patients with current or past treatment with any systemic alpha-1ARA and 22 untreated controls. Consecutive eligible patients underwent slit-lamp-adapted optical coherence tomography in a masked fashion under standardized lighting conditions. Iris thickness at the dilator muscle region (DMR; measured at half of the distance between the scleral spur and the pupillary margin) and at the sphincter muscle region (SMR; 0.75 mm from the pupillary margin), the ratio between the DMR/SMR (to compensate for possible intersubject variability), and pupillary diameter. Most treated patients were on tamsulosin (27/29). Mean age was similar in study and control groups (70.6+/-7.6 vs 67.1+/-9.1 years; P = 0.061). Photopic pupil diameter was reduced in the study group (2.06+/-0.5 vs 2.5+/-0.6 mm; P = 0.001). The SMR was similar between groups (P = 0.53). Significantly lower values were found in treated subjects for the DMR and the DMR/SMR ratio (Pcolor were not significant in this model. Patients using systemic alpha-1ARA have significantly lower values of DMR thickness and DMR/SMR ratio and smaller pupil diameter when compared with age-matched controls. These differences seem to be related to the duration of drug exposure and provide evidence of structural alterations to the iris dilator muscle from this class of agents in IFIS. Proprietary or commercial disclosure may be found after the references.

  2. 78 FR 55290 - Approved Recovery Plan for the Dwarf Lake Iris

    Science.gov (United States)

    2013-09-10

    ...-FF03E00000] Approved Recovery Plan for the Dwarf Lake Iris AGENCY: Fish and Wildlife Service, Interior...), announce the availability of the approved recovery plan for the dwarf lake iris (Iris lacustris), a species... draft dwarf lake iris recovery plan to the public and solicited comments from May 30, 2012, through June...

  3. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  4. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Science.gov (United States)

    2010-04-01

    ... to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and... safeguarding of national security information received by the Commission from other agencies, to chair a... suggestions and complaints with respect to the Commission administration of its information security program...

  5. CFD Analysis of the mixing process in the downcomer of IRIS reactor

    International Nuclear Information System (INIS)

    Diaz Bueno, Elizabeth; Montesino Otero, Maria E.; Rives Sanz, Ronny; Garcia, Carlos

    2015-01-01

    The boron ( 10 B) is a strong absorber of thermal neutrons and diluted as boric acid in the coolant of the pressurized water reactor helps to control the excess reactivity in the core of these facilities. The study of transients with deficiencies in the boron homogenization is very important in this technology because it inserts a strong reactivity in the reactor core with consequent threat to society and nature. The aim of this study is to evaluate the thermal-hydraulics losses and their influence on the process of heterogeneous boron dilution during normal system operation by using CFX code. Profiles of pressure, velocity and temperature of the downcomer reactor IRIS are obtained. The model developed also allows studying an event of total loss of flow. The results are applicable to the design of internal components and structures of IRIS downcomer. (Author)

  6. Iris's Functional Description using Zernike polynomials

    International Nuclear Information System (INIS)

    Munnoz, D. P.; Silva Mata, F. J.; Talavera, I.; Hernandez, N.; Augier, A.

    2012-01-01

    The main goal of this work is the texture representation of the iris original image by means of functional data. The essence of the method consists in obtaining an adjusted vector of coefficients by means of a least square approximation starting from the representation of the original image by the expansion on the two-dimensional Zernike basis. This type of representation provides remarkable advantages regarding other representations e.g. the appreciable reduction of the dimension of the data, the simplification of the general process of the image and those characteristics of the functional data analysis. The carried out experiments demonstrate the feasibility of this approach and they allowed determining the optimal dimension of the coefficients vectors by means of the minimization of the residual errors. To corroborate the effectiveness of this representation, some experiments on identification were carried out on international databases whose initial results are annexed in the work. (Author)

  7. IRIS Toxicological Review of Vanadium Pentoxide (External ...

    Science.gov (United States)

    This vanadium pentoxide reassessment consists of an oral reference dose (RfD), an inhalation reference concentration (RfC), an inhalation unit risk (IUR) and a cancer weight of evidence descriptor. This is the first assessment developing an RfC or IUR for this compound. This assessment is intended to provide human health data to support agency regulatory decisions. EPA is reassessing its IRIS toxicological review of vanadium pentoxide (CASRN 1314-62-1). This vanadium pentoxide reassessment consists of an oral reference dose (RfD), an inhalation reference concentration (RfC), an inhalation unit risk (IUR) and a cancer weight of evidence descriptor. This is the first assessment developing an RfC or IUR for this compound. This assessment is intended to provide human health data to support agency regulatory decisions.

  8. Iris Data Classification Using Quantum Neural Networks

    International Nuclear Information System (INIS)

    Sahni, Vishal; Patvardhan, C.

    2006-01-01

    Quantum computing is a novel paradigm that promises to be the future of computing. The performance of quantum algorithms has proved to be stunning. ANN within the context of classical computation has been used for approximation and classification tasks with some success. This paper presents an idea of quantum neural networks along with the training algorithm and its convergence property. It synergizes the unique properties of quantum bits or qubits with the various techniques in vogue in neural networks. An example application of Fisher's Iris data set, a benchmark classification problem has also been presented. The results obtained amply demonstrate the classification capabilities of the quantum neuron and give an idea of their promising capabilities

  9. Secondary Metabolites Isolated from Iris germanica

    Directory of Open Access Journals (Sweden)

    Muhammad I. Choudhary

    2009-06-01

    Full Text Available Phytochemical investigations of methanol extract of rhizome of Iris germanica L. resulted in the isolation of one new compound, 6,6-ditetradecyl-6,7-dihydrooxepin-2(3H-one (1 and five known compounds, 1-(2-(6′-hydroxy-2′-methylcyclohex-1′-enyloxy-5-methoxyphenylethanone (2 4-hydroxy-3-methoxyacetophenone (3, irisolone (4 irisolidone (5 and 2-acetoxy-3,6-dimethoxy-1,4-benzoquinone (6 .The structures of the compounds were determined on the basis of spectroscopic techniques. The antifungal activity of different soluble portions was measured. The hexane soluble portion of the methanol extract showed significant antifungal activity where as the ethyl acetate and chloroform soluble portions showed moderate activity. The methanol extract showed no antifungal activity.

  10. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  11. Iris segmentation using an edge detector based on fuzzy sets theory and cellular learning automata.

    Science.gov (United States)

    Ghanizadeh, Afshin; Abarghouei, Amir Atapour; Sinaie, Saman; Saad, Puteh; Shamsuddin, Siti Mariyam

    2011-07-01

    Iris-based biometric systems identify individuals based on the characteristics of their iris, since they are proven to remain unique for a long time. An iris recognition system includes four phases, the most important of which is preprocessing in which the iris segmentation is performed. The accuracy of an iris biometric system critically depends on the segmentation system. In this paper, an iris segmentation system using edge detection techniques and Hough transforms is presented. The newly proposed edge detection system enhances the performance of the segmentation in a way that it performs much more efficiently than the other conventional iris segmentation methods.

  12. Methylene blue-related corneal edema and iris discoloration.

    Science.gov (United States)

    Timucin, Ozgur Bulent; Karadag, Mehmet Fatih; Aslanci, Mehmet Emin; Baykara, Mehmet

    2016-04-01

    We report the case of a 70-year-old female patient who developed corneal edema and iris discoloration following the inadvertent use of 1% methylene blue instead of 0.025% trypan blue to stain the anterior capsule during cataract phacoemulsification surgery. Copious irrigation was performed upon realization of incorrect dye use. Corneal edema and iris discoloration developed during the early postoperative period and persisted at 24-months follow-up. However, keratoplasty was not required. The intracameral use of 1% methylene blue has a cytotoxic effect on the corneal endothelium and iris epithelium. Copious irrigation for at least 30 min using an anterior chamber maintainer may improve outcomes.

  13. BRCA1-IRIS overexpression promotes formation of aggressive breast cancers.

    Directory of Open Access Journals (Sweden)

    Yoshiko Shimizu

    Full Text Available INTRODUCTION: Women with HER2(+ or triple negative/basal-like (TN/BL breast cancers succumb to their cancer rapidly due, in part to acquired Herceptin resistance and lack of TN/BL-targeted therapies. BRCA1-IRIS is a recently discovered, 1399 residue, BRCA1 locus alternative product, which while sharing 1365 residues with the full-length product of this tumor suppressor gene, BRCA1/p220, it has oncoprotein-like properties. Here, we examine whether BRCA1-IRIS is a valuable treatment target for HER2(+ and/or TN/BL tumors. METHODOLOGY/PRINCIPAL FINDINGS: Immunohistochemical staining of large cohort of human breast tumor samples using new monoclonal anti-BRCA1-IRIS antibody, followed by correlation of BRCA1-IRIS expression with that of AKT1, AKT2, p-AKT, survivin and BRCA1/p220, tumor status and age at diagnosis. Generation of subcutaneous tumors in SCID mice using human mammary epithelial (HME cells overexpressing TERT/LT/BRCA1-IRIS, followed by comparing AKT, survivin, and BRCA1/p220 expression, tumor status and aggressiveness in these tumors to that in tumors developed using TERT/LT/Ras(V12-overexpressing HME cells. Induction of primary and invasive rat mammary tumors using the carcinogen N-methyl-N-nitrosourea (NMU, followed by analysis of rat BRCA1-IRIS and ERα mRNA levels in these tumors. High BRCA1-IRIS expression was detected in the majority of human breast tumors analyzed, which was positively correlated with that of AKT1-, AKT2-, p-AKT-, survivin, but negatively with BRCA1/p220 expression. BRCA1-IRIS-positivity induced high-grade, early onset and metastatic HER2(+ or TN/BL tumors. TERT/LT/BRCA1-IRIS overexpressing HME cells formed invasive subcutaneous tumors that express high AKT1, AKT2, p-AKT and vimentin, but no CK19, p63 or BRCA1/p220. NMU-induced primary and invasive rat breast cancers expressed high levels of rat BRCA1-IRIS mRNA but low levels of rat ERα mRNA. CONCLUSION/SIGNIFICANCE: BRCA1-IRIS overexpression triggers aggressive

  14. Challenges at different stages of an iris based biometric system

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2012-04-01

    Full Text Available Iris recognition has been used for authentication for the past few years and is capable of positive/negative authenticationof an individual without any physical contact or intervention. This technique is being used mainly because of its uniqueness,stability, and reliability but still many challenges are being faced an the iris based recognition system. This paperpresents the difficulties faced in different modules, like the sensor module, preprocessing module, feature extraction module,and matching module of an iris biometric system.

  15. Trade off between variable and fixed size normalization in orthogonal polynomials based iris recognition system.

    Science.gov (United States)

    Krishnamoorthi, R; Anna Poorani, G

    2016-01-01

    Iris normalization is an important stage in any iris biometric, as it has a propensity to trim down the consequences of iris distortion. To indemnify the variation in size of the iris owing to the action of stretching or enlarging the pupil in iris acquisition process and camera to eyeball distance, two normalization schemes has been proposed in this work. In the first method, the iris region of interest is normalized by converting the iris into the variable size rectangular model in order to avoid the under samples near the limbus border. In the second method, the iris region of interest is normalized by converting the iris region into a fixed size rectangular model in order to avoid the dimensional discrepancies between the eye images. The performance of the proposed normalization methods is evaluated with orthogonal polynomials based iris recognition in terms of FAR, FRR, GAR, CRR and EER.

  16. Polychromatic immunophenotypic characterization of T cell profiles among HIV-infected patients experiencing immune reconstitution inflammatory syndrome (IRIS

    Directory of Open Access Journals (Sweden)

    Glencross Deborah K

    2009-07-01

    Full Text Available Abstract Objective To immunophenotype CD4+ and CD8+ T cell sub-populations in HIV-associated immune reconstitution inflammatory syndrome (IRIS. Design Nested case-control immunological study. Methods ART-naïve HIV-infected patients were prospectively observed for IRIS during the first 6 months of ART. Twenty-two IRIS cases and 22 ART-duration matched controls were sampled for T cell immunophenotyping. Results IRIS cases demonstrated significantly lower CD4 cell counts compared to controls (baseline: 79 versus 142, p = 0.02; enrollment: 183 versus 263, p = 0.05, respectively with no differences in HIV RNA levels. Within CD4+T cells, cases exhibited more of an effector memory phenotype compared to controls (40.8 versus 27.0%, p = 0.20, while controls trended towards a central memory phenotype (43.8 versus 30.8%, p = 0.07. Within CD8+ T cells, controls exhibited more central memory (13.9 versus 7.81%, p = 0.01, respectively and effector (13.2 versus 8.8%, p = 0.04, respectively phenotypes compared to cases, whereas cases demonstrated more terminal effectors than controls (28.8 versus 15.1%, p = 0.05. Cases demonstrated increased activation of CD8+ T cell effector memory, terminal effector, and effector subsets than controls (p = 0.04, 0.02, and 0.02, respectively. Conclusion CD4+ and CD8+ T cell subset maturational phenotypes were heterogeneous among IRIS cases and controls. However, IRIS cases demonstrated significant increases in activation of CD8+ T cell effector subpopulations.

  17. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  18. Design and performance of a clean and economic power supply targeting energy independence and operative security

    Energy Technology Data Exchange (ETDEWEB)

    Mushtaha, Mohammed

    2012-07-01

    Stand alone wind-diesel power systems address the major issues for the supply of remotely located consumers or the provision of enhanced energy independence. The specific configuration considered here comprises a prior wind turbine driven induction generator and a supplementary synchronous generator driven by a combustion engine, the latter caring for frequency control and reactive power balance. An accumulator-bank and a hydrogen storage path consisting of an electrolyzer and a hydrogen storage tank are added as short-term and long-term storage devices - respectively - in order to adjust volatile wind generation and varying load demand. The hydrogen re-conversion to electricity is achieved by design of the drive of the synchronous generator as a dual-fuel engine, fed with stored hydrogen primarily, and with diesel oil in case of the rare event of hydrogen storage emptiness. An elementary waste heat recovery from engine cooling water and from exhaust gases makes the system even more energy efficient and environment friendly. For proper sizing of the particular system components under minimization of the life cycle cost - which are composed of the initial installation cost, the replacement cost, the operation and maintenance cost as well as the remaining fuel cost - the meta-heuristic computational method of Particle Swarm Optimization (PSO) was applied. The crucial task of intelligently managing the energy storage strategy depending on their actual states of charge and the current excess power under a given load profile was solved by a fuzzy system and a subsequent time scheduler, the latter providing definite set-point steps for definite periods of time to the electrolyzer in order to achieve smooth and conservative operation. The concrete design and performance of the proposed system structure is shown with the two relevant application examples of independent electricity supply of the main hospital in Gaza-Strip, Palestine, and a remotely located dairy farm. For

  19. Design of a system for detecting and reporting security incidents and adverse events in thyroid and parathyroid surgery

    Directory of Open Access Journals (Sweden)

    José Luis PARDAL-REFOYO

    2016-03-01

    Full Text Available Introduction: Patient safety is defined as the reduction of risk of unnecessary harm associated with healthcare. Up to 9.3% of patients admitted into a hospital present some adverse event related to the assistance. This can cause damage to the patient, more instrumentation, increased morbidity, increased hospital stay and increased cost. To identify, record and analyze adverse events is necessary to have an incident reporting system. Objective: Developing a local system for reporting security incidents and adverse events in surgery of the thyroid gland. Method: A working group was formed with representatives from all units related to the process of thyroidectomy, checkpoints were established, checklists for each control point were designed, a strategic analysis of the group's activity was performed, a literature review was done in order to identify the major incident reporting systems, the items that the incident report form must have were identified and the form was designed. Results: The incident report form collects data on the patient, the communicator and the incident (type, cause, consequence, severity, frequency, risk matrix. It has a first paragraph with narrative sections and a second with drop-down lists. The form is accessible only to the working group for voluntary use. Conclusions: The purpose of the reporting system is learning and prevention.

  20. Developing an analytical model to increase urban security from the Secured perspective by Designing (SBD) Approach using fuzzy AHP method (case study: region 17 of Tehran)

    OpenAIRE

    H. Zabihi; T. Larimian; H. Poorani

    2013-01-01

    Extended abstract1-IntroductionSafety and security have been significant issues throughout history, from early prehistoric cave-dwelling societies to medieval and modern cities (P. Cozens, 2008). Crime is a part of our way of living. It is tied to the physical distribution of people and objects, to the routine activity patterns of daily life, and to the ways in which people perceive and use information about the environment (Brantingham & Brantingham, 1993). Statistics show that there is a me...

  1. Designing a holistic end-to-end intelligent network analysis and security platform

    Science.gov (United States)

    Alzahrani, M.

    2018-03-01

    Firewall protects a network from outside attacks, however, once an attack entering a network, it is difficult to detect. Recent significance accidents happened. i.e.: millions of Yahoo email account were stolen and crucial data from institutions are held for ransom. Within two year Yahoo’s system administrators were not aware that there are intruder inside the network. This happened due to the lack of intelligent tools to monitor user behaviour in internal network. This paper discusses a design of an intelligent anomaly/malware detection system with proper proactive actions. The aim is to equip the system administrator with a proper tool to battle the insider attackers. The proposed system adopts machine learning to analyse user’s behaviour through the runtime behaviour of each node in the network. The machine learning techniques include: deep learning, evolving machine learning perceptron, hybrid of Neural Network and Fuzzy, as well as predictive memory techniques. The proposed system is expanded to deal with larger network using agent techniques.

  2. performance-based approach to design and evaluation of nuclear security systems for Brazilian nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Tavares, Renato L. A.; Filho, Josélio S. M., E-mail: renato.tavares@cnen.gov.br, E-mail: joselio@cnen.gov.br [Comissão Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Diretoria de Radioproteção e Segurança Nuclear. Divisão de Normas e Segurança Física; Fontes, Gladson S.; Fiel, J.C.B., E-mail: gsfontes@hotmail.com, E-mail: fiel@ime.eb.br [Instituto Militar de Engenharia (SE-7/IME), Rio de Janeiro, RJ (Brazil). Seção de Engenharia Nuclear

    2017-07-01

    This study presents an application of a performance-based approach to definition of requirements, design and evaluation of physical protection systems for nuclear facilities. Such approach considers a probabilistic analysis of the threat, equipment, systems and response forces used to prevent, dissuade and detain malicious acts against the integrity of facilities and the nuclear materials inside them. Nowadays, in the context of Brazilian nuclear facilities licensing, a mostly prescriptive approach is adopted, which despite having advantages such as simplified inspections and homogeneous regulatory requisites amid different fuel cycle facility types, does not consider evolution, dynamism and capacities of external or internal threats to facilities and to Brazilian Nuclear Program itself, neither provides metrics to evaluate system performance facing such threats. In order to preserve actual plans and systems confidentiality, a facility hypothetical model is created, including a research reactor and a waste storage facility. It is expected that the methodology and results obtained in this study serve in the future as a basis to Brazilian nuclear operators, in elaboration process of their Physical Protection Plans, which must comply with future regulation CNEN-NN 2.01, a revision of CNEN-NE 2.01, once that regulation will include performance requisites. (author)

  3. Ethnicity distinctiveness through iris texture features using Gabor filters

    CSIR Research Space (South Africa)

    Mabuza-Hocquet, Gugulethu P

    2017-02-01

    Full Text Available and ethnicity. Researchers have reported that iris texture features contain information that is inclined to human genetics and is highly discriminative between different eyes of different ethnicities. This work applies image processing and machine learning...

  4. IRIS Toxicological Review of Trichloroacetic Acid (TCA) (External Review Draft)

    Science.gov (United States)

    EPA is conducting a peer review and public comment of the scientific basis supporting the human health hazard and dose-response assessment of Trichloroacetic acid (TCA) that when finalized will appear on the Integrated Risk Information System (IRIS) database.

  5. IRIS Toxicological Review of Trichloroacetic Acid (Tca) (Final Report)

    Science.gov (United States)

    EPA has finalized the Toxicological Review of Trichloroacetic Acid: in support of the Integrated Risk Information System (IRIS). Now final, this assessment may be used by EPA’s program and regional offices to inform decisions to protect human health.

  6. IRIS Toxicological Review of Benzo[a]pyrene (External ...

    Science.gov (United States)

    The IRIS Toxicological Review of Benzo[a]pyrene was released for external peer review in September 2014. The EPA’s Science Advisory Board’s (SAB) Chemical Assessment Advisory Committee (CAAC) conducted a peer review of the scientific basis supporting the benzo[a]pyrene assessment and released a final report of their review in April 2016. Information regarding the peer review can be found at the SAB's website. EPA is undertaking an update of the Integrated Risk Information System (IRIS) health assessment for benzo[a]pyrene (BaP). The outcome of this project is an updated Toxicological Review and IRIS Summary for BaP that will be entered into the IRIS database.

  7. ROG, the new neutron reflectometer at IRI, Delft

    Science.gov (United States)

    van Well, A. A.; de Haan, V.-O.; Fredrikze, H.

    1994-04-01

    A description is given of the neutron reflectometer ROG, recently installed at IRI. The neutron wavelength is determined by time of flight. Wavelengths from 0.08 to 0.8 nm can be used. First experimental results are presented.

  8. IRIS Toxicological Review of Formaldehyde (Inhalation) (External Review Draft 2010)

    Science.gov (United States)

    UPDATE EPA is currently revising its Integrated Risk Information System (IRIS) assessment of formaldehyde to address the 2011 NAS peer review recommendations. This assessment addresses both noncancer and cancer human health effects that are relevant to assessing ...

  9. IRIS Toxicological Review of Hexavalent Chromium (Peer Review Plan)

    Science.gov (United States)

    EPA is conducting a peer review of the scientific basis supporting the human health hazard and dose-response assessment of hexavalent chromium that will appear on the Integrated Risk Information System (IRIS) database.

  10. IRIS Toxicological Review of Methanol (Noncancer) (Final Report)

    Science.gov (United States)

    EPA conducted a peer review and public comment of the scientific basis supporting the human health hazard and dose-response assessment of Methanol (noncancer) , this is finalized and posted on the IRIS Web site.

  11. Peer Review Comments on the IRIS Assessment of Benzene

    Science.gov (United States)

    Attachment to IRIS file for benzene, January 19, 2000, RESPONSE TO THE PEER REVIEW COMMENTS, II. Extrapolation of the Benzene Inhalation Unit Risk Estimate to the Oral Route of Exposure (EPA/NCEA-W-0517, July 1999)

  12. A bibliography of IRIS-related publications, 2000-2011

    Science.gov (United States)

    Muco, B.

    2012-12-01

    Citations and acknowledgements in scientific journals can be an indicator of the role an organization has on the research of that field. Since its formation and incorporation in May 1984, the IRIS Consortium (Incorporated Research Institutions for Seismology) is mentioned more and more as a valuable source of data, instruments and programs in the literature of earth sciences. As a large organization with more than 100 member domestic institutes and about 40 international affiliates, obviously IRIS has a direct impact on the earth sciences through all its programs, projects, workshops, symposia, and news¬letters and as a lively forum for exchanging ideas. In order to maintain support from National Science Foundation (NSF) and the research community, it is important to document the continued use of IRIS facilities in basic research programs. IRIS maintains a database of articles that are based on the use of IRIS facilities or which reference use of IRIS data and resources. Articles in this database have been either been provided to IRIS by the authors or selected through an annual search of a number of prominent journals. A text version of the full bibliographic database is available on the IRIS website and a version in EndNote format is also provided. To provide a more complete bibliography and a consistent evaluation of temporal tends in publications, a special annual search began in 2000 which focused on a subset of key seismology and Earth science journals: Bulletin of Seismological Society of America, Journal of Geophysical Research, Seismological Research Letters, Geophysical Research Letters, Earth and Planetary Science Letters, Physics of the Earth and Planetary Interiors, Tectonophysics, Geophysical Journal International, Nature, Science, Geology and EOS. Using different search engines as Scirus, ScienceDirect, GeoRef, OCLC First Search, EASI Search, NASA Abstract Service etc. for online journals and publishers' databases, we searched for key words (IRIS

  13. Dynamic modeling of primary and secondary systems of IRIS reactor for transient analysis using SIMULINK

    International Nuclear Information System (INIS)

    Magalhaes, Mardson Alencar de Sa; Lira, Carlos Alberto Brayner de Oliveira; Silva, Mario Augusto Bezerra da

    2011-01-01

    The IRIS project has significantly advanced in the last few years in response to a demand for a new generation reactor, that could fulfill the essential requirements for a future nuclear power plant: better economics, safety-by-design, low proliferation risk and environmental sustainability. IRIS reactor is a integral type PWR in which all primary components are arranged inside the pressure vessel. This configuration involves important changes in relation to a conventional PWR. These changes require several studies to comply with the safe operational limits for the reactor. In this paper, a study has been conducted to develop a dynamic model (named MODIRIS) for transient analysis, implemented in the MATLAB'S software SIMULINK, allowing the analysis of IRIS behavior by considering the neutron point kinetics for power production. The methodology is based on generating a set of differential equations of neutronic and thermal-hydraulic balances which describes the dynamics of the primary circuit, as well as a set of differential equations describing the dynamics of secondary circuit. The equations and initialization parameters at full power were into the SIMULINK and the code was validated by the confrontation with RELAP simulations for a transient of feedwater reduction in the steam generators. (author)

  14. A multi-approach feature extractions for iris recognition

    Science.gov (United States)

    Sanpachai, H.; Settapong, M.

    2014-04-01

    Biometrics is a promising technique that is used to identify individual traits and characteristics. Iris recognition is one of the most reliable biometric methods. As iris texture and color is fully developed within a year of birth, it remains unchanged throughout a person's life. Contrary to fingerprint, which can be altered due to several aspects including accidental damage, dry or oily skin and dust. Although iris recognition has been studied for more than a decade, there are limited commercial products available due to its arduous requirement such as camera resolution, hardware size, expensive equipment and computational complexity. However, at the present time, technology has overcome these obstacles. Iris recognition can be done through several sequential steps which include pre-processing, features extractions, post-processing, and matching stage. In this paper, we adopted the directional high-low pass filter for feature extraction. A box-counting fractal dimension and Iris code have been proposed as feature representations. Our approach has been tested on CASIA Iris Image database and the results are considered successful.

  15. High Speed Iris Detection Method for Man-Machine Interface

    Science.gov (United States)

    Kashima, Hideki; Hongo, Hitoshi; Kato, Kunihito; Yamamoto, Kazuhiko

    We propose a high speed iris detection method for man-machine interface. In order to communicate between humans and computers comfortably, it is required that high speed processing and adapting the changes of the face direction and the individual variation of the face. Our iris detection method consists of a face detection function, a facial parts extraction function and an iris detection function. The face detection function adapts to individual variation or a light condition by using standard skin color method which decides the standard skin color by a color histogram every frame. The facial parts extraction function adapts to changes of face direction and the individual variation in order to by using the hybrid template matching which consists the four directional features field and the color different features. The iris detection function performs high speed and stable detection by segmentation of iris region using color information and the Hough transform. We conducted the comparison experiment with our past method which uses the least approximation method. By this result, processing time of our method realized equivalent to our past method. In addition, accuracy rate of iris detection with our method improved.

  16. Multilocus OCA2 genotypes specify human iris colors.

    Science.gov (United States)

    Frudakis, Tony; Terravainen, Timothy; Thomas, Matthew

    2007-11-01

    Human iris color is a quantitative, multifactorial phenotype that exhibits quasi-Mendelian inheritance. Recent studies have shown that OCA2 polymorphism underlies most of the natural variability in human iris pigmentation but to date, only a few associated polymorphisms in this gene have been described. Herein, we describe an iris color score (C) for quantifying iris melanin content in-silico and undertake a more detailed survey of the OCA2 locus (n = 271 SNPs). In 1,317 subjects, we confirmed six previously described associations and identified another 27 strongly associated with C that were not explained by continental population stratification (OR 1.5-17.9, P = 0.03 to iris color, we selected sets of SNPs by parsing P values among possible combinations and identified four discontinuous and non-overlapping sets across the LD blocks (p-Selected SNP sets). In a second, partially overlapping sample of 1,072, samples with matching diplotypes comprised of these p-Selected OCA2 SNPs exhibited a rate of C concordance of 96.3% (n = 82), which was significantly greater than that obtained from randomly selected samples (62.6%, n = 246, Piris color gene and suggest that using an empirical database-driven system, genotypes from a modest number of SNPs within this gene can be used to accurately predict iris melanin content from DNA.

  17. SINGLE FRAME SUPER RESOLUTION OF NONCOOPERATIVE IRIS IMAGES

    Directory of Open Access Journals (Sweden)

    Anand Deshpande

    2016-11-01

    Full Text Available Image super-resolution, a process to enhance image resolution, has important applications in biometrics, satellite imaging, high definition television, medical imaging, etc. The long range captured iris identification systems often suffer from low resolution and meager focus of the captured iris images. These degrade the iris recognition performance. This paper proposes enhanced iterated back projection (EIBP method to super resolute the long range captured iris polar images. The performance of proposed method is tested and analyzed on CASIA long range iris database by comparing peak signal to noise ratio (PSNR and structural similarity index (SSIM with state-of-the-art super resolution (SR algorithms. It is further analyzed by increasing the up-sampling factor. Performance analysis shows that the proposed method is superior to state-of-the-art algorithms, the peak signal-to-noise ratio improved about 0.1-1.5 dB. The results demonstrate that the proposed method is well suited to super resolve the iris polar images captured at a long distance

  18. Cosmetic Detection Framework for Face and Iris Biometrics

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2018-04-01

    Full Text Available Cosmetics pose challenges to the recognition performance of face and iris biometric systems due to its ability to alter natural facial and iris patterns. Facial makeup and iris contact lens are considered to be commonly applied cosmetics for the face and iris in this study. The present work aims to present a novel solution for the detection of cosmetics in both face and iris biometrics by the fusion of texture, shape and color descriptors of images. The proposed cosmetic detection scheme combines the microtexton information from the local primitives of texture descriptors with the color spaces achieved from overlapped blocks in order to achieve better detection of spots, flat areas, edges, edge ends, curves, appearance and colors. The proposed cosmetic detection scheme was applied to the YMU YouTube makeup database (YMD facial makeup database and IIIT-Delhi Contact Lens iris database. The results demonstrate that the proposed cosmetic detection scheme is significantly improved compared to the other schemes implemented in this study.

  19. The Design and Implementation of a Low Cost and High Security Smart Home System Based on Wi-Fi and SSL Technologies

    Science.gov (United States)

    Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming

    2017-02-01

    With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.

  20. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview