WorldWideScience

Sample records for secured vo services

  1. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  2. Influence of Security Mechanisms on the Quality of Service of VoIP

    Science.gov (United States)

    Backs, Peter; Pohlmann, Norbert

    While Voice over IP (VoIP) is advancing rapidly in the telecommunications market, the interest to protect the data transmitted by this new service is also rising. However, in contrast to other internet services such as email or HTTP, VoIP is real-time media, and therefore must meet a special requirement referred to as Quality-of-Service to provide a comfortable flow of speech. Speech quality is worsened when transmitted over the network due to delays in transmission or loss of packets. Often, voice quality is at a level that even prevents comprehensive dialog. Therefore, an administrator who is to setup a VoIP infrastructure might consider avoiding additional decreases in voice quality resulting from security mechanisms, and might leave internet telephony unprotected as a result. The inspiration for this paper is to illustrate that security mechanisms have negligible impact on speech quality and should in fact be encouraged.

  3. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  4. Security and VO management capabilities in a large-scale Grid operating system

    OpenAIRE

    Aziz, Benjamin; Sporea, Ioana

    2014-01-01

    This paper presents a number of security and VO management capabilities in a large-scale distributed Grid operating system. The capabilities formed the basis of the design and implementation of a number of security and VO management services in the system. The main aim of the paper is to provide some idea of the various functionality cases that need to be considered when designing similar large-scale systems in the future.

  5. Using VO Concept for Managing Dynamic Security Associations

    NARCIS (Netherlands)

    Demchenko, Y.; Gommans, L.; de Laat, C.T.A.M.

    2006-01-01

    This research paper presents results of the analysis how the Virtual Organisation (VO) concept can be used for managing dynamic security associations in collaborative applications and for complex resource provisioning. The paper provides an overview of the current practice in VO management at the

  6. Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2011-01-01

    Full Text Available SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors. The article describes a system that was developed on VSB-TU Ostrava as a testing tool to verify if the target VoIP PBX is adequately secured and protected against any real threats. The system tests the SIP element for several usually occurring attacks and it compiles evaluation of its overall security on the basis of successfully or unsuccessfully penetrations. The article describes the applications and algorithms that are used by system and the conclusion consists recommendations and guidelines to ensure effective protection against VoIP PBX threats. The system is designed as an open-source web application, thus allowing independent access and is fully extensible to other test modules.

  7. On the Cryptographic Features of a VoIP Service

    Directory of Open Access Journals (Sweden)

    Dimitrios Alvanos

    2018-01-01

    Full Text Available Security issues of typical Voice over Internet Protocol (VoIP applications are studied in this paper; in particular, the open source Linphone application is being used as a case study. An experimental analysis indicates that protecting signalling data with the TLS protocol, which unfortunately is not always the default option, is needed to alleviate several security concerns. Moreover, towards improving security, it is shown that a VoIP application may operate over a virtual private network without significantly degrading the overall performance. The conclusions of this study provide useful insights to the usage of any VoIP application.

  8. Current Status of VO Compliant Data Service in Japanese Virtual Observatory

    Science.gov (United States)

    Shirasaki, Y.; Komiya, Y.; Ohishi, M.; Mizumoto, Y.; Ishihara, Y.; Tsutsumi, J.; Hiyama, T.; Nakamoto, H.; Sakamoto, M.

    2012-09-01

    In these years, standards to build a Virtual Observatory (VO) data service have been established with the efforts in the International Virtual Observatory Alliance (IVOA). We applied these newly established standards (SSAP, TAP) to our VO service toolkit which was developed to implement earlier VO standards SIAP and (deprecated) SkyNode. The toolkit can be easily installed and provides a GUI interface to construct and manage VO service. In this paper, we describes the architecture of our toolkit and how it is used to start hosting VO service.

  9. Biobjective VoIP Service Management in Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    Jorge M. Cortés-Mendoza

    2016-01-01

    Full Text Available Voice over Internet Protocol (VoIP allows communication of voice and/or data over the internet in less expensive and reliable manner than traditional ISDN systems. This solution typically allows flexible interconnection between organization and companies on any domains. Cloud VoIP solutions can offer even cheaper and scalable service when virtualized telephone infrastructure is used in the most efficient way. Scheduling and load balancing algorithms are fundamental parts of this approach. Unfortunately, VoIP scheduling techniques do not take into account uncertainty in dynamic and unpredictable cloud environments. In this paper, we formulate the problem of scheduling of VoIP services in distributed cloud environments and propose a new model for biobjective optimization. We consider the special case of the on-line nonclairvoyant dynamic bin-packing problem and discuss solutions for provider cost and quality of service optimization. We propose twenty call allocation strategies and evaluate their performance by comprehensive simulation analysis on real workload considering six months of the MIXvoip company service.

  10. Modular VO oriented Java EE service deployer

    Science.gov (United States)

    Molinaro, Marco; Cepparo, Francesco; De Marco, Marco; Knapic, Cristina; Apollo, Pietro; Smareglia, Riccardo

    2014-07-01

    The International Virtual Observatory Alliance (IVOA) has produced many standards and recommendations whose aim is to generate an architecture that starts from astrophysical resources, in a general sense, and ends up in deployed consumable services (that are themselves astrophysical resources). Focusing on the Data Access Layer (DAL) system architecture, that these standards define, in the last years a web based application has been developed and maintained at INAF-OATs IA2 (Italian National institute for Astrophysics - Astronomical Observatory of Trieste, Italian center of Astronomical Archives) to try to deploy and manage multiple VO (Virtual Observatory) services in a uniform way: VO-Dance. However a set of criticalities have arisen since when the VO-Dance idea has been produced, plus some major changes underwent and are undergoing at the IVOA DAL layer (and related standards): this urged IA2 to identify a new solution for its own service layer. Keeping on the basic ideas from VO-Dance (simple service configuration, service instantiation at call time and modularity) while switching to different software technologies (e.g. dismissing Java Reflection in favour of Enterprise Java Bean, EJB, based solution), the new solution has been sketched out and tested for feasibility. Here we present the results originating from this test study. The main constraints for this new project come from various fields. A better homogenized solution rising from IVOA DAL standards: for example the new DALI (Data Access Layer Interface) specification that acts as a common interface system for previous and oncoming access protocols. The need for a modular system where each component is based upon a single VO specification allowing services to rely on common capabilities instead of homogenizing them inside service components directly. The search for a scalable system that takes advantage from distributed systems. The constraints find answer in the adopted solutions hereafter sketched. The

  11. VoIP and PBX security and forensics a practical approach

    CERN Document Server

    Androulidakis, Iosif I

    2016-01-01

    This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems. The new edition includes a major update and extension to the VoIP sections in addition to updates to forensics.

  12. WiMAX security and quality of service an end-to-end perspective

    CERN Document Server

    Tang, Seok-Yee; Sharif, Hamid

    2010-01-01

    WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements.

  13. Chapter 11: Web-based Tools - VO Region Inventory Service

    Science.gov (United States)

    Good, J. C.

    As the size and number of datasets available through the VO grows, it becomes increasingly critical to have services that aid in locating and characterizing data pertinent to a particular scientific problem. At the same time, this same increase makes that goal more and more difficult to achieve. With a small number of datasets, it is feasible to simply retrieve the data itself (as the NVO DataScope service does). At intermediate scales, "count" DBMS searches (searches of the actual datasets which return record counts rather than full data subsets) sent to each data provider will work. However, neither of these approaches scale as the number of datasets expands into the hundreds or thousands. Dealing with the same problem internally, IRSA developed a compact and extremely fast scheme for determining source counts for positional catalogs (and in some cases image metadata) over arbitrarily large regions for multiple catalogs in a fraction of a second. To show applicability to the VO in general, this service has been extended with indices for all 4000+ catalogs in CDS Vizier (essentially all published catalogs and source tables). In this chapter, we will briefly describe the architecture of this service, and then describe how this can be used in a distributed system to retrieve rapid inventories of all VO holdings in a way that places an insignificant load on any data supplier. Further, we show and this tool can be used in conjunction with VO Registries and catalog services to zero in on those datasets that are appropriate to the user's needs. The initial implementation of this service consolidates custom binary index file structures (external to any DBMS and therefore portable) at a single site to minimize search times and implements the search interface as a simple CGI program. However, the architecture is amenable to distribution. The next phase of development will focus on metadata harvesting from data archives through a standard program interface and distribution

  14. VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance

    Directory of Open Access Journals (Sweden)

    Valerie R. Watzlaf

    2012-06-01

    Full Text Available Consumer-based, free Voice and video over the Internet Protocol (VoIP software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant;  most did not.  While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes.  Recommendations are provided for VoIP companies, providers, and users. 

  15. An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink

    Directory of Open Access Journals (Sweden)

    Kim Yong-Seok

    2008-01-01

    Full Text Available An efficient scheduling scheme is proposed to increase the available capacity of VoIP services over evolved UTRA uplink. On top of the advantages of persistent scheduling, the proposed scheme adaptively share the resources of two VoIP users to get early-termination gain of dynamic scheduler. Through system-level simulations, the performance of the proposed algorithm is evaluated in terms of the capacity enhancement of VoIP services. Comparisons with the original persistent scheduling and the HSUPA scheduler reveal that the proposed scheme increases the capacity of VoIP services up to 20%.

  16. Implementation of Cloud Computing into VoIP

    Directory of Open Access Journals (Sweden)

    Floriana GEREA

    2012-08-01

    Full Text Available This article defines Cloud Computing and highlights key concepts, the benefits of using virtualization, its weaknesses and ways of combining it with classical VoIP technologies applied to large scale businesses. The analysis takes into consideration management strategies and resources for better customer orientation and risk management all for sustaining the Service Level Agreement (SLA. An important issue in cloud computing can be security and for this reason there are several security solution presented.

  17. Optimization of mobile IPv6-based handovers to support VoIP services in wireless heterogeneous networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    2007-01-01

    The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers. The durat......The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers...... at layer 3. Using analytical models, the authors evaluate MIPv4, MIPv6, fast MIPv6 (FMIPv6), and hierarchical MIPv6 (HMIPv6) and compare their performances in terms of handover delay for VoIP services. To optimize the handover delay, the authors propose to use the adaptive retransmission timer described...

  18. Chapter 18: Web-based Tools - NED VO Services

    Science.gov (United States)

    Mazzarella, J. M.; NED Team

    The NASA/IPAC Extragalactic Database (NED) is a thematic, web-based research facility in widespread use by scientists, educators, space missions, and observatory operations for observation planning, data analysis, discovery, and publication of research about objects beyond our Milky Way galaxy. NED is a portal into a systematic fusion of data from hundreds of sky surveys and tens of thousands of research publications. The contents and services span the entire electromagnetic spectrum from gamma rays through radio frequencies, and are continuously updated to reflect the current literature and releases of large-scale sky survey catalogs. NED has been on the Internet since 1990, growing in content, automation and services with the evolution of information technology. NED is the world's largest database of crossidentified extragalactic objects. As of December 2006, the system contains approximately 10 million objects and 15 million multi-wavelength cross-IDs. Over 4 thousand catalogs and published lists covering the entire electromagnetic spectrum have had their objects cross-identified or associated, with fundamental data parameters federated for convenient queries and retrieval. This chapter describes the interoperability of NED services with other components of the Virtual Observatory (VO). Section 1 is a brief overview of the primary NED web services. Section 2 provides a tutorial for using NED services currently available through the NVO Registry. The "name resolver" provides VO portals and related internet services with celestial coordinates for objects specified by catalog identifier (name); any alias can be queried because this service is based on the source cross-IDs established by NED. All major services have been updated to provide output in VOTable (XML) format that can be accessed directly from the NED web interface or using the NVO registry. These include access to images via SIAP, Cone- Search queries, and services providing fundamental, multi

  19. Integrating existing software toolkits into VO system

    Science.gov (United States)

    Cui, Chenzhou; Zhao, Yong-Heng; Wang, Xiaoqian; Sang, Jian; Luo, Ze

    2004-09-01

    Virtual Observatory (VO) is a collection of interoperating data archives and software tools. Taking advantages of the latest information technologies, it aims to provide a data-intensively online research environment for astronomers all around the world. A large number of high-qualified astronomical software packages and libraries are powerful and easy of use, and have been widely used by astronomers for many years. Integrating those toolkits into the VO system is a necessary and important task for the VO developers. VO architecture greatly depends on Grid and Web services, consequently the general VO integration route is "Java Ready - Grid Ready - VO Ready". In the paper, we discuss the importance of VO integration for existing toolkits and discuss the possible solutions. We introduce two efforts in the field from China-VO project, "gImageMagick" and "Galactic abundance gradients statistical research under grid environment". We also discuss what additional work should be done to convert Grid service to VO service.

  20. Extraction of Electronic Evidence from VoIP: Forensic Analysis of A Virtual Hard Disk Vs RAM

    Directory of Open Access Journals (Sweden)

    david irwin

    2011-03-01

    Full Text Available The popularity of Voice over the Internet Protocol (VoIP is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global telephony service, in which it is difficult to verify the user’s identification. The security of placing such calls may also be appealing to criminals, as many implementations use strong encryption to secure both the voice payload as well as to control messages making monitoring such VoIP calls difficult since conventional methods such as wire-tapping is not applicable to VoIP calls. Therefore, other methods of recovering electronic evidence and information from VoIP are required.  This research looks at what protocol evidence remains after a VoIP call has taken place examining both a virtual hard disk and the Random Access Memory (RAM. This paper proposes a set of identifiable credentials based on packet header information contained within the VoIP protocol stack. A series of controlled tests were undertaken whereby these credentials were forensically searched for on a virtual machine which was used to make the VoIP call. This experiment was then repeated by a search for the same protocol credentials within the RAM.

  1. Performance of VoIP on HSDPA

    DEFF Research Database (Denmark)

    Wang, Bang; Pedersen, Klaus I.; Kolding, Troels E.

    2005-01-01

    This paper provides packet scheduler design and performance simulations for running VoIP services over high-speed downlink packet access (HSDPA) in WCDMA. The main challenge of supporting VoIP service on HSDPA is the tight delay requirement combined with the small VoIP packet size. A packet...... scheduler design incorporating VoIP packet aggregation and user multiplexing is proposed and the VoIP capacity is studied for a macro-cellular environment. Results are obtained for different delay budgets and packet scheduling settings, using either blind round robin or a slightly modified version...... of proportional fair scheduling. For proportional fair scheduling with code-multiplexing of 4-users, the downlink VoIP cell capacity on HSDPA is found to be in the range 72-104 users depending on whether the delay budget for the Node-B scheduling and user reception equals 80 ms or 150 ms, respectively....

  2. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  3. SOAP based web services and their future role in VO projects

    Science.gov (United States)

    Topf, F.; Jacquey, C.; Génot, V.; Cecconi, B.; André, N.; Zhang, T. L.; Kallio, E.; Lammer, H.; Facsko, G.; Stöckler, R.; Khodachenko, M.

    2011-10-01

    Modern state-of-the-art web services are from crucial importance for the interoperability of different VO tools existing in the planetary community. SOAP based web services assure the interconnectability between different data sources and tools by providing a common protocol for communication. This paper will point out a best practice approach with the Automated Multi-Dataset Analysis Tool (AMDA) developed by CDPP, Toulouse and the provision of VEX/MAG data from a remote database located at IWF, Graz. Furthermore a new FP7 project IMPEx will be introduced with a potential usage example of AMDA web services in conjunction with simulation models.

  4. VO-Dance an IVOA tools to easy publish data into VO and it's extension on planetology request

    Science.gov (United States)

    Smareglia, R.; Capria, M. T.; Molinaro, M.

    2012-09-01

    Data publishing through the self standing portals can be joined to VO resource publishing, i.e. astronomical resources deployed through VO compliant services. Since the IVOA (International Virtual Observatory Alliance) provides many protocols and standards for the various data flavors (images, spectra, catalogues … ), and since the data center has as a goal to grow up in number of hosted archives and services providing, the idea arose to find a way to easily deploy and maintain VO resources. VO-Dance is a java web application developed at IA2 that addresses this idea creating, in a dynamical way, VO resources out of database tables or views. It is structured to be potentially DBMS and platform independent and consists of 3 main tokens, an internal DB to store resources description and model metadata information, a restful web application to deploy the resources to the VO community. It's extension to planetology request is under study to best effort INAF software development and archive efficiency.

  5. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  6. Secure Sessions for Web Services

    NARCIS (Netherlands)

    Reiter, M.; Bhargavan, K.; Corin, R.J.; Fournet, C.; Gordon, A.D.

    2007-01-01

    We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-Security independently for each message is

  7. The metropolitan VoD system based on ethernet/SCM PON

    Science.gov (United States)

    Ji, Wei; Yang, Hongliang; Feng, Dejun; Liu, Yang; Sun, Jande

    2008-11-01

    VoD is a very attractive service which used for entertainment, education and other purposes. In this paper, we present an evolution method that integrates the EPON and SCM-PON by WDM technology to provide high dedicated bandwidth for the metropolitan VoD services. Using DVB, IPTV protocol, unicasting and broadcasting method to maximize the system throughput and by numerical analysis, the hybrid PON system can implement the metropolitan VoD services.

  8. Metric-Aware Secure Service Orchestration

    Directory of Open Access Journals (Sweden)

    Gabriele Costa

    2012-12-01

    Full Text Available Secure orchestration is an important concern in the internet of service. Next to providing the required functionality the composite services must also provide a reasonable level of security in order to protect sensitive data. Thus, the orchestrator has a need to check whether the complex service is able to satisfy certain properties. Some properties are expressed with metrics for precise definition of requirements. Thus, the problem is to analyse the values of metrics for a complex business process. In this paper we extend our previous work on analysis of secure orchestration with quantifiable properties. We show how to define, verify and enforce quantitative security requirements in one framework with other security properties. The proposed approach should help to select the most suitable service architecture and guarantee fulfilment of the declared security requirements.

  9. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II.

    Science.gov (United States)

    Watzlaf, Valerie J M; Moeini, Sohrab; Matusow, Laura; Firouzan, Patti

    2011-01-01

    In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR.

  10. Security for service oriented architectures

    CERN Document Server

    Williams, Walter

    2014-01-01

    Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, includ

  11. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  12. VoIP interconnection ; between Internet, Cable, Mobile and Fixed Worlds

    NARCIS (Netherlands)

    Deventer, M.O. van; Keesmaat, I.

    2005-01-01

    Four worlds on their own that hardly interconnect; All use SIP, but differently - Internet world - Mobile world - Cable world - Fixed world - At most, only basic voice service will interoperate between those worlds In recent years, VoIP/multimedia services (VoIP: Voice over Internet Protocol) have

  13. SecMon: End-to-End Quality and Security Monitoring System

    OpenAIRE

    Ciszkowski, Tomasz; Eliasson, Charlott; Fiedler, Markus; Kotulski, Zbigniew; Lupu, Radu; Mazurczyk, Wojciech

    2008-01-01

    The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however, these features are usually optional and supported by limited number of implementations. As a result, the lack of mandatory and widely applicable Q...

  14. Web Services Security - Implementation and Evaluation Issues

    Science.gov (United States)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  15. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  16. The VO-Dance web application at the IA2 data center

    Science.gov (United States)

    Molinaro, Marco; Knapic, Cristina; Smareglia, Riccardo

    2012-09-01

    Italian center for Astronomical Archives (IA2, http://ia2.oats.inaf.it) is a national infrastructure project of the Italian National Institute for Astrophysics (Istituto Nazionale di AstroFisica, INAF) that provides services for the astronomical community. Besides data hosting for the Large Binocular Telescope (LBT) Corporation, the Galileo National Telescope (Telescopio Nazionale Galileo, TNG) Consortium and other telescopes and instruments, IA2 offers proprietary and public data access through user portals (both developed and mirrored) and deploys resources complying the Virtual Observatory (VO) standards. Archiving systems and web interfaces are developed to be extremely flexible about adding new instruments from other telescopes. VO resources publishing, along with data access portals, implements the International Virtual Observatory Alliance (IVOA) protocols providing astronomers with new ways of analyzing data. Given the large variety of data flavours and IVOA standards, the need for tools to easily accomplish data ingestion and data publishing arises. This paper describes the VO-Dance tool, that IA2 started developing to address VO resources publishing in a dynamical way from already existent database tables or views. The tool consists in a Java web application, potentially DBMS and platform independent, that stores internally the services' metadata and information, exposes restful endpoints to accept VO queries for these services and dynamically translates calls to these endpoints to SQL queries coherent with the published table or view. In response to the call VO-Dance translates back the database answer in a VO compliant way.

  17. VoIP Quality Measurements in a Multilevel Secure (MLS) Environment

    National Research Council Canada - National Science Library

    Adams, Jr, Coy M

    2008-01-01

    Voice over Internet Protocol (VoIP) is growing in popularity in the civilian and military communities due to its low cost and the management advantages it offers over traditional Public Switched Telephone Networks (PSTN) phone systems...

  18. VO for Education: Archive Prototype

    Science.gov (United States)

    Ramella, M.; Iafrate, G.; De Marco, M.; Molinaro, M.; Knapic, C.; Smareglia, R.; Cepparo, F.

    2014-05-01

    The number of remote control telescopes dedicated to education is increasing in many countries, leading to correspondingly larger and larger amount of stored educational data that are usually available only to local observers. Here we present the project for a new infrastructure that will allow teachers using educational telescopes to archive their data and easily publish them within the Virtual Observatory (VO) avoiding the complexity of professional tools. Students and teachers anywhere will be able to access these data with obvious benefits for the realization of grander scale collaborative projects. Educational VO data will also be an important resource for teachers not having direct access to any educational telescopes. We will use the educational telescope at our observatory in Trieste as a prototype for the future VO educational data archive resource. The publishing infrastructure will include: user authentication, content and curation validation, data validation and ingestion, VO compliant resource generation. All of these parts will be performed by means of server side applications accessible through a web graphical user interface (web GUI). Apart from user registration, that will be validated by a natural person responsible for the archive (after having verified the reliability of the user and inspected one or more test files), all the subsequent steps will be automated. This means that at the very first data submission through the webGUI, a complete resource including archive and published VO service will be generated, ready to be registered to the VO. The efforts required to the registered user will consist only in describing herself/himself at registration step and submitting the data she/he selects for publishing after each observation sessions. The infrastructure will be file format independent and the underlying data model will use a minimal set of standard VO keywords, some of which will be specific for outreach and education, possibly including VO

  19. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment

    Science.gov (United States)

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun

    2015-01-01

    Objectives Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. Methods This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. Results The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. Conclusions The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical

  20. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment.

    Science.gov (United States)

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun; Cha, Hyo Soung

    2015-10-01

    Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.

  1. Implementasi Protokol Keamanan TLS pada Aplikasi Layanan Komunikasi Suara Melalui Jaringan TCP/IP (VoIP)

    OpenAIRE

    Hariady, Ricky

    2011-01-01

    Saat ini layanan komunikasi suara melalui jaringan TCP/IP atau yang lebih dikenal dengan VoIP (Voice over IP) telah semakin banyak digunakan, namun teknologi VoIP yang ada saat ini masih rentan terhadap penyadapan ataupun pencurian data. Sementara protokol kriptografi TLS (Transport Layer Security) telah teruji dan banyak digunakan untuk mengamankan komunikasi melalui internet seperti pada layanan email dan web. Dengan mengimplementasikan protokol TLS pada sebuah aplikasi Vo...

  2. Feasibility Study of VoIP Integration into the MYSEA Environment

    National Research Council Canada - National Science Library

    Tse, Lily

    2005-01-01

    .... VoIP is widely implemented with H.323 and Session Initiation Protocol (SIP) standards. However, both protocols are poorly designed for networks with common security solutions such as firewalls and Network Address Translation...

  3. Facile Synthesis of Highly Water-Soluble Lanthanide-Doped t-LaVO4 NPs for Antifake Ink and Latent Fingermark Detection

    KAUST Repository

    Chen, Cailing

    2017-11-08

    In the information age, it is important to protect the security and integrity of the information. As a result, the fluorescent ink as an antifake technology and the fingermark as an information carrier have aroused great interest. In this work, highly water-soluble lanthanide (Ln3+ )-doped tetragonal phase (t-) LaVO4 nanoparticles (NPs) are successfully obtained via a simple, fast, and green microwave-assisted hydrothermal method. The average size of t-LaVO4 NPs is about 43 nm. The aqueous solutions of Ln3+ -doped t-LaVO4 exhibit excellent fluorescence properties under ultraviolet light (UV) excitation (t-LaVO4 :10%Eu is bright red and t-LaVO4 :0.5%Dy is close to white). Some superb antifake fluorescent patterns are printed using Ln3+ -doped t-LaVO4 aqueous solution as ink, which indicates the as-prepared Ln3+ -doped t-LaVO4 NPs as fluorescent ink can meet the various antifake requirements. Notably, the designed convenient antifake fluorescent codes with improved security could be directly scanned and decoded by a smart phone. What\\'s more, the as-prepared NPs can be used for the development of latent fingermark on various substrates and the second-level detail information can be clearly obtained from the magnification of a fingermark. These results indicate that the as-prepared Ln3+ -doped t-LaVO4 fluorescent NPs have great potential in security application.

  4. Facile Synthesis of Highly Water-Soluble Lanthanide-Doped t-LaVO4 NPs for Antifake Ink and Latent Fingermark Detection

    KAUST Repository

    Chen, Cailing; Yu, Ying; Li, Chunguang; Liu, Dan; Huang, He; Liang, Chen; Lou, Yue; Han, Yu; Shi, Zhan; Feng, Shouhua

    2017-01-01

    In the information age, it is important to protect the security and integrity of the information. As a result, the fluorescent ink as an antifake technology and the fingermark as an information carrier have aroused great interest. In this work, highly water-soluble lanthanide (Ln3+ )-doped tetragonal phase (t-) LaVO4 nanoparticles (NPs) are successfully obtained via a simple, fast, and green microwave-assisted hydrothermal method. The average size of t-LaVO4 NPs is about 43 nm. The aqueous solutions of Ln3+ -doped t-LaVO4 exhibit excellent fluorescence properties under ultraviolet light (UV) excitation (t-LaVO4 :10%Eu is bright red and t-LaVO4 :0.5%Dy is close to white). Some superb antifake fluorescent patterns are printed using Ln3+ -doped t-LaVO4 aqueous solution as ink, which indicates the as-prepared Ln3+ -doped t-LaVO4 NPs as fluorescent ink can meet the various antifake requirements. Notably, the designed convenient antifake fluorescent codes with improved security could be directly scanned and decoded by a smart phone. What's more, the as-prepared NPs can be used for the development of latent fingermark on various substrates and the second-level detail information can be clearly obtained from the magnification of a fingermark. These results indicate that the as-prepared Ln3+ -doped t-LaVO4 fluorescent NPs have great potential in security application.

  5. Context aware adaptive security service model

    Science.gov (United States)

    Tunia, Marcin A.

    2015-09-01

    Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.

  6. On-line Monitoring of VoIP Quality Using IPFIX

    Directory of Open Access Journals (Sweden)

    Petr Matousek

    2014-01-01

    Full Text Available The main goal of VoIP services is to provide a reliable and high-quality voice transmission over packet networks. In order to prove the quality of VoIP transmission, several approaches were designed. In our approach, we are concerned about on-line monitoring of RTP and RTCP traffic. Based on these data, we are able to compute main VoIP quality metrics including jitter, delay, packet loss, and finally R-factor and MOS values. This technique of VoIP quality measuring can be directly incorporated into IPFIX monitoring framework where an IPFIX probe analyses RTP/RTCP packets, computes VoIP quality metrics, and adds these metrics into extended IPFIX flow records. Then, these extended data are stored in a central IPFIX monitoring system called collector where can be used for monitoring purposes. This paper presents a functional implementation of IPFIX plugin for VoIP quality measurement and compares the results with results obtained by other tools.

  7. Measuring relational security in forensic mental health services.

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  8. Measuring relational security in forensic mental health services

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  9. VO2(B conversion to VO2(A and VO2(M and their oxidation resistance and optical switching properties

    Directory of Open Access Journals (Sweden)

    Zhang Yifu

    2016-03-01

    Full Text Available Vanadium dioxide VO2 has been paid in recent years increasing attention because of its various applications, however, its oxidation resistance properties in air atmosphere have rarely been reported. Herein, VO2(B nanobelts were transformed into VO2(A and VO2(M nanobelts by hydrothermal route and calcination treatment, respectively. Then, we comparatively studied the oxidation resistance properties of VO2(B, VO2(A and VO2(M nanobelts in air atmosphere by thermo-gravimetric analysis and differential thermal analysis (TGA/DTA. It was found that the nanobelts had good thermal stability and oxidation resistance below 341 °C, 408 °C and 465 °C in air, respectively, indicating that they were stable in air at room temperature. The fierce oxidation of the nanobelts occurred at 426, 507 and 645 °C, respectively. The results showed that the VO2(M nanobelts had the best thermal stability and oxidation resistance among the others. Furthermore, the phase transition temperatures and optical switching properties of VO2(A and VO2(M were studied by differential scanning calorimetry (DSC and variable temperature infrared spectra. It was found that the VO2(A and VO2(M nanobelts had outstanding thermochromic character and optical switching properties.

  10. Planning Security Services for IT Systems

    OpenAIRE

    Henderson, Marie; Page, Howard Philip

    2014-01-01

    Often the hardest job is to get business representatives to look at security as something that makes managing their risks and achieving their objectives easier, with security compliance as just part of that journey. This paper addresses that by making planning for security services a 'business tool'.

  11. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  12. VoIP Speech Encryption System Using Stream Cipher with Chaotic ...

    African Journals Online (AJOL)

    pc

    2018-03-22

    Mar 22, 2018 ... The technologies of Internet doesn't give any security mechanism and there is ... VoIP system, both digital (e.g., PC, PDA) and analog (e.g., telephone) devices ... the protection to speech through traditional encryption schemes ...

  13. Using VoIP to compete.

    Science.gov (United States)

    Werbach, Kevin

    2005-09-01

    Internet telephony, or VoIP, is rapidly replacing the conventional kind. This year, for the first time, U.S. companies bought more new Internet-phone connections than standard lines. The major driver behind this change is cost. But VoIP isn't just a new technology for making old-fashioned calls cheaper, says consultant Kevin Werbach. It is fundamentally changing how companies use voice communications. What makes VoIP so powerful is that it turns voice into digital data packets that can be stored, copied, combined with other data, and distributed to virtually any device that connects to the Internet. And it makes it simple to provide all the functionality of a corporate phone-call features, directories, security-to anyone anywhere there's broadband access. That fosters new kinds of businesses such as virtual call centers, where widely dispersed agents work at all hours from their homes. The most successful early adopters, says Werbach, will focus more on achieving business objectives than on saving money. They will also consider how to push VoIP capabilities out to the extended organization, making use of everyone as a resource. Deployment may be incremental, but companies should be thinking about where VoIP could take them. Executives should ask what they could do if, on demand, they could bring all their employees, customers, suppliers, and partners together in a virtual room, with shared access to every modern communications and computing channel. They should take a fresh look at their business processes to find points at which richer and more customizable communications could eliminate bottlenecks and enhance quality. The important dividing line won't be between those who deploy Vol P and those who don't, or even between early adopters and laggards. It will be between those who see Vol P as just a new way to do the same old things and those who use itto rethink their entire businesses.

  14. An Efficient Back-off Mechanism for Simulation Study of VoWLAN Capacity Improvement using OPNET

    OpenAIRE

    Ahmed M. ABDEL NABI; Mohamed R. M. RIZK; Mohamed. S. IBRAHIM; Emad Eldin A. MAZIED

    2014-01-01

    Integration of delivering VoIP services over WLAN access networks (VoWLAN) increased the demand to support multiple of active simultaneous calls. Thus improving VoWLAN capacity has been addressed. The researchers are continuously contributing in improving VoWLAN capacity, (i.e. increasing the number of VoIP simultaneous calls), for various WLAN architectures. Although a lot of modifications have been developed for IEEE 802.11 standards toward improving its performance with real-time applicati...

  15. Business Collaborations in Grids: The BREIN Architectural Principals and VO Model

    Science.gov (United States)

    Taylor, Steve; Surridge, Mike; Laria, Giuseppe; Ritrovato, Pierluigi; Schubert, Lutz

    We describe the business-oriented architectural principles of the EC FP7 project “BREIN” for service-based computing. The architecture is founded on principles of how real businesses interact to mutual benefit, and we show how these can be applied to SOA and Grid computing. We present building blocks that can be composed in many ways to produce different value systems and supply chains for the provision of computing services over the Internet. We also introduce the complementary BREIN VO concept, which is centric to, and managed by, a main contractor who bears the responsibility for the whole VO. The BREIN VO has an execution lifecycle for the creation and operation of the VO, and we have related this to an application-focused workflow involving steps that provide real end-user value. We show how this can be applied to an engineering simulation application and how the workflow can be adapted should the need arise.

  16. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  17. Security in Service Level Agreements for Cloud Computing

    OpenAIRE

    Bernsmed, Karin; JAATUN, Martin Gilje; Undheim, Astrid

    2011-01-01

    The Cloud computing paradigm promises reliable services, accessible from anywhere in the world, in an on-demand manner. Insufficient security has been identified as a major obstacle to adopting Cloud services. To deal with the risks associated with outsourcing data and applications to the Cloud, new methods for security assurance are urgently needed. This paper presents a framework for security in Service Level Agreements for Cloud computing. The purpose is twofold; to help potential Cloud cu...

  18. Cyber security for greater service reliability

    Energy Technology Data Exchange (ETDEWEB)

    Vickery, P. [N-Dimension Solutions Inc., Richmond Hill, ON (Canada)

    2008-05-15

    Service reliability in the electricity transmission and distribution (T and D) industry is being challenged by increased equipment failures, harsher climatic conditions, and computer hackers who aim to disrupt services by gaining access to transmission and distribution resources. This article discussed methods of ensuring the cyber-security of T and D operators. Weak points in the T and D industry include remote terminal units; intelligent electronic devices; distributed control systems; programmable logic controllers; and various intelligent field devices. An increasing number of interconnection points exist between an operator's service control system and external systems. The North American Electric Reliability Council (NERC) standards specify that cyber security strategies should ensure that all cyber assets are protected, and that access points must be monitored to detect intrusion attempts. The introduction of new advanced metering initiatives must also be considered. Comprehensive monitoring systems should be available to support compliance with cyber security standards. It was concluded that senior management should commit to a periodic cyber security re-assessment program in order to keep up-to-date.

  19. A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP

    OpenAIRE

    Zhang, Liping; Tang, Shanyu; Zhu, Shaohui

    2016-01-01

    Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is sought to enhance the security of SIP. Several attempts have been made to address the tradeoff problem between security and efficiency, but designing a successful authenticated key agreement protocol for SIP is still a challenging task from t...

  20. Innovative Secure Mobile Banking Services

    Directory of Open Access Journals (Sweden)

    Mousa T AL-Akhras

    2011-01-01

    Full Text Available Due to the widespread use of computer technologies in almost all aspects of life, organisations that are connected to the Internet started extending their services to their customers to include new applications and services that satisfy their customers’ desires to make better businesses. One of these emerging applications is mobile banking. The term mobile banking (or m-banking describes the banking services that the user can perform via a mobile device ubiquitously at anytime and from anywhere. In order for users to access their accounts, they need a mobile device and network connectivity. Therefore, sitting in front of a computer is not a requirement anymore; accessing accounts can occur while users are waiting their turn at the dentist clinic or relaxing at the beach! This paper explores the opportunities of using mobile technology in the electronic banking (e-banking sector to enhance existing banking services by moving toward m-banking using mobile devices and wireless media that can provide opportunities for ubiquitous access to the banking services as mobile technologies can be used at anytime and from anywhere. The technical problems encountered while using the mobile devices presents some technical difficulties and challenges for the m-banking. In this paper we introduce a mobile system that demonstrates the flexibility gained out of this technology and covers the major aspects of such kind of applications. The proposed system covers two parts: the customer services (user interface and the security aspects. In the user interface part, banking facility is provided to the user through the mobile device to implement banking transactions. The model provides customers with the services: billing payments, transferring of funds, viewing of customer’s accounts and transactions, allowing the user to change his/her password and request a cheque book. The application takes into consideration security aspects, it satisfies the following

  1. A survey of Attacks on VoIP networks and Countermeasures

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2015-06-01

    Jun 1, 2015 ... integrity and availability of the services rendered on VoIP networks. In this paper, the various ... described in [2] and [5], denial of service in [1], eavesdropping ..... distributed denial of service (DDoS) [9],. [2]. •. Session initiation ...

  2. 49 CFR 1510.11 - Handling of security service fees.

    Science.gov (United States)

    2010-10-01

    ... air carrier holds neither legal nor equitable interest in the security service fees except for the... 49 Transportation 9 2010-10-01 2010-10-01 false Handling of security service fees. 1510.11 Section 1510.11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...

  3. Social Security Number Verification Service (SSNVS)

    Data.gov (United States)

    Social Security Administration — SSNVS is a service offered by SSA's Business Services Online (BSO). It is used by employers and certain third-party submitters to verify the accuracy of the names...

  4. Integrating the IA2 Astronomical Archive in the VO: The VO-Dance Engine

    Science.gov (United States)

    Molinaro, M.; Laurino, O.; Smareglia, R.

    2012-09-01

    Virtual Observatory (VO) protocols and standards are getting mature and the astronomical community asks for astrophysical data to be easily reachable. This means data centers have to intensify their efforts to provide the data they manage not only through proprietary portals and services but also through interoperable resources developed on the basis of the IVOA (International Virtual Observatory Alliance) recommendations. Here we present the work and ideas developed at the IA2 (Italian Astronomical Archive) data center hosted by the INAF-OATs (Italian Institute for Astrophysics - Trieste Astronomical Observatory) to reach this goal. The core point is the development of an application that from existing DB and archive structures can translate their content to VO compliant resources: VO-Dance (written in Java). This application, in turn, relies on a database (potentially DBMS independent) to store the translation layer information of each resource and auxiliary content (UCDs, field names, authorizations, policies, etc.). The last token is an administrative interface (currently developed using the Django python framework) to allow the data center administrators to set up and maintain resources. This deployment, platform independent, with database and administrative interface highly customizable, means the package, when stable and easily distributable, can be also used by single astronomers or groups to set up their own resources from their public datasets.

  5. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@visite.es [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Barbato, P. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Taliercio, C. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy)

    2011-10-15

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  6. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    International Nuclear Information System (INIS)

    Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.

    2011-01-01

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  7. Secure Service Discovery in Home Networks

    NARCIS (Netherlands)

    Scholten, Johan; van Dijk, H.W.; De Cock, Danny; Preneel, Bart; Kung, Antonio; d'Hooge, Michel

    2006-01-01

    This paper presents an architecture for secure service discovery for use in home networks. We give an overview and rationale of a cluster-based home network architecture that bridges different, often vendor specific, network technologies. We show how it integrates security, communication, and

  8. Optimal Service Distribution in WSN Service System Subject to Data Security Constraints

    Science.gov (United States)

    Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong

    2014-01-01

    Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346

  9. SecSLA: A Proactive and Secure Service Level Agreement Framework for Cloud Services

    OpenAIRE

    Fahad F. Alruwaili; T. Aaron Gulliver

    2014-01-01

    Cloud customers migrate to cloud services to reduce the operational costs of information technology (IT) and increase organization efficiency. However, ensuring cloud security is very challenging. As a consequence, cloud service providers find it difficult to persuade customers to acquire their services due to security concerns. In terms of outsourcing applications, software, and/or infrastructure services to the cloud, customers are concerned about the availability, integrity, privacy...

  10. Security infrastructure for on-demand provisioned Cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Wlodarczyk, T.W.; Rong, C.; Ziegler, W.

    2011-01-01

    Providing consistent security services in on-demand provisioned Cloud infrastructure services is of primary importance due to multi-tenant and potentially multi-provider nature of Clouds Infrastructure as a Service (IaaS) environment. Cloud security infrastructure should address two aspects of the

  11. Selective formation of VO2(A) or VO2(R) polymorph by controlling the hydrothermal pressure

    International Nuclear Information System (INIS)

    Ji Shidong; Zhang Feng; Jin Ping

    2011-01-01

    Missing VO 2 (A) usually occurs during the preparation of VO 2 polymorphs. This leads to an ambiguous understanding of the transformation between VO 2 polymorphs. The calculation of the ground state energies for different VO 2 polymorphs indicated that there is only a small energy gap between VO 2 (A) and VO 2 (R), which destined that the transformation from VO 2 (A) to VO 2 (R) should be pressure sensitive. This hypothesis was verified during the synthesizing of VO 2 polymorphs by reducing V 2 O 5 with oxalic acid through hydrothermal treatment process. Selective formation of pure phase VO 2 (A) or VO 2 (R) was achieved by controlling the hydrothermal pressure through varying the filling ratio at 270 deg. C. It was found that a filling ratio over 0.5 favors the formation of pure VO 2 (R) while a reduced filling ratio to 0.4 or lower results in the formation of VO 2 (A). Based on our experiments, VO 2 (B) nanobelts were always first formed and then it transformed to VO 2 (A) by assembling process at increased temperature or extended reaction time. Under further higher pressure, the VO 2 (A) transformed spontaneously to VO 2 (R) initialized from the volume shrinkage due to the formation of denser VO 2 (R). - Graphical abstract: Selective formation of VO 2 (A) or VO 2 (R) could be achieved by controlling the system pressure through varying the filling ratio during hydrothermal treatment. Highlights: → Selective formation of VO 2 polymorphs by controlling hydrothermal pressure. → Ground state energy characteristics were revealed for the first time. → Phase transformation mechanism was clearly elucidated.

  12. VO-KOREL: A Fourier Disentangling Service of the Virtual Observatory

    Science.gov (United States)

    Škoda, Petr; Hadrava, Petr; Fuchs, Jan

    2012-04-01

    VO-KOREL is a web service exploiting the technology of the Virtual Observatory for providing astronomers with the intuitive graphical front-end and distributed computing back-end running the most recent version of the Fourier disentangling code KOREL. The system integrates the ideas of the e-shop basket, conserving the privacy of every user by transfer encryption and access authentication, with features of laboratory notebook, allowing the easy housekeeping of both input parameters and final results, as well as it explores a newly emerging technology of cloud computing. While the web-based front-end allows the user to submit data and parameter files, edit parameters, manage a job list, resubmit or cancel running jobs and mainly watching the text and graphical results of a disentangling process, the main part of the back-end is a simple job queue submission system executing in parallel multiple instances of the FORTRAN code KOREL. This may be easily extended for GRID-based deployment on massively parallel computing clusters. The short introduction into underlying technologies is given, briefly mentioning advantages as well as bottlenecks of the design used.

  13. Strategic Management for IT Services on Outsourcing Security Company

    Directory of Open Access Journals (Sweden)

    Lydia Wijaya

    2018-04-01

    Full Text Available Information Technology (IT is used by many organizations to enhance competitive advantage, but many outsource security firms have not used IT in their business processes. In this research, we will design Strategic Management for IT Services for outsourcing security company. We use an outsourcing security company as a case study of IT Strategy Management for IT Services development. The purpose of this study is to create an IT services strategy for security outsourcing companies. The framework used is the ITIL (Information Technology Infrastructure Library framework service strategy in strategy management for IT services process. There are several steps taken in the making of the strategy: (a Strategic assessment stage to analyzed internal and external factors of the company. (b Strategy generation by creating the strategic plan. (c Strategy execution to determine the tactical plan. And (d strategy measurement and evaluation. This study produced the proposed IT service system that suits the needs of the company in the form of strategic, tactical plans and strategy measurement. This result can be used as the foundations of IT service development in outsourcing security company. In the process of this study, we work closely with stakeholders; every work product has been verified and validated by stakeholders.

  14. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    Science.gov (United States)

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  15. Voice Over Internet Protocol (VoIP) in a Control Center Environment

    Science.gov (United States)

    Pirani, Joseph; Calvelage, Steven

    2010-01-01

    The technology of transmitting voice over data networks has been available for over 10 years. Mass market VoIP services for consumers to make and receive standard telephone calls over broadband Internet networks have grown in the last 5 years. While operational costs are less with VoIP implementations as opposed to time division multiplexing (TDM) based voice switches, is it still advantageous to convert a mission control center s voice system to this newer technology? Marshall Space Flight Center (MSFC) Huntsville Operations Support Center (HOSC) has converted its mission voice services to a commercial product that utilizes VoIP technology. Results from this testing, design, and installation have shown unique considerations that must be addressed before user operations. There are many factors to consider for a control center voice design. Technology advantages and disadvantages were investigated as they refer to cost. There were integration concerns which could lead to complex failure scenarios but simpler integration for the mission infrastructure. MSFC HOSC will benefit from this voice conversion with less product replacement cost, less operations cost and a more integrated mission services environment.

  16. Secure Data Service Outsourcing with Untrusted Cloud

    OpenAIRE

    Xiong, Huijun

    2013-01-01

    Outsourcing data services to the cloud is a nature fit for cloud usage. However, increasing security and privacy concerns from both enterprises and individuals on their outsourced data inhibit this trend. In this dissertation, we introduce service-centric solutions to address two types of security threats existing in the current cloud environments: semi-honest cloud providers and malicious cloud customers. Our solution aims not only to provide confidentiality and access controllability of out...

  17. Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home

    NARCIS (Netherlands)

    Wolthuis, R.; Broenink, E.G.; Fransen, F.; Schultz, S.; Vries, A. de

    2010-01-01

    This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more

  18. Design and implementation of a system to interconnect VoIP services and CERN’s telephony networks

    CERN Document Server

    Pohančeník, Martin; Segeč, Pavel

    The purpose of this diploma thesis was to design and implement a system that would provide an interface of CERN’s telephony network for Voice over IP services (SIP-based services specifically). This system thus serves as an entry point for calls originating from outside of CERN’s telephony network and enables users of these services to call CERN’s fixed and mobile phone numbers. The theoretical part of the thesis talks in detail about the project specification and describes the goals that were trying to be achieved. It also describes the topic of VoIP telephony and current trends, alongside with analysis of the current telephone network of CERN. The practical part is targeted to explain the design of the solution and deployment of the system at CERN. The final part of the thesis shows testing scenarios and results and states several extension capabilities.

  19. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  20. Mobile P2P Web Services Using SIP

    Directory of Open Access Journals (Sweden)

    Guido Gehlen

    2007-01-01

    Full Text Available Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P services which are originally offered by network providers, like telephony and messaging, are provided through VoIP and Instant Messaging (IM by Internet service providers, too. The IP Multimedia Subsystem (IMS is the answer of the telecommunication industry to this trend and aims at providing Internet P2P and multimedia services controlled by the network operators. The IMS provides mobility and session management as well as message routing, security, and billing.

  1. Considerations on VoIP Throughput in 802.11 Networks

    Directory of Open Access Journals (Sweden)

    POTORAC, A. D.

    2009-10-01

    Full Text Available Voice data packets have to arrive at the destination in time, with a defined cadence and with low and constant delay in order to allow the real time voice reconstruction. From this point of view, transmitting voice over IP networks is the most sensitive category of applications, especially when wireless medium is involved. The paper discusses the possibilities of transmitting the maximum number of simultaneous voice streams over 802.11 wireless networks considering the main factors which impact with VoIP throughput, in a basic scenario. Starting from a proposed communication model, the number of simultaneous possible VoIP sessions is calculated, taking into consideration the contribution of the protocol overheads, the security overheads, the PHY level timings and the CODEC proprieties. Numerical results are generated and compared.

  2. Microstructure and thermochromic properties of VO{sub X}-WO{sub X}-VO{sub X} ceramic thin films

    Energy Technology Data Exchange (ETDEWEB)

    Khamseh, S.; Ghahari, M. [Institute for Color Science and Technology, Department of Nanomaterial and Nanocoatings, Tehran (Iran, Islamic Republic of); Araghi, H. [Islamic Azad University, Department of Materials Engineering, Science and Research Branch, Tehran (Iran, Islamic Republic of); Faghihi Sani, M.A. [Sharif University of Technology, Department of Materials Science and Engineering, Tehran (Iran, Islamic Republic of)

    2016-03-15

    W-doped VO{sub 2} films have been synthesized via oxygen annealing of V-W-V (vanadium-tungsten-vanadium) multilayered films. The effects of middle layer's thickness of V-W-V multilayered film on structure and properties of VO{sub X}-WO{sub X}-VO{sub X} ceramic thin films were investigated. The as-deposited V-W-V multilayered film showed amorphous-like structure when mixed structure of VO{sub 2} (M) and VO{sub 2} (B) was formed in VO{sub X}-WO{sub X}-VO{sub X} ceramic thin films. Tungsten content of VO{sub X}-WO{sub X}-VO{sub X} ceramic thin films increased with increasing middle layer's thickness. With increasing middle layer's thickness, room temperature square resistance (R{sub sq}) of VO{sub X}-WO{sub X}-VO{sub X} ceramic thin films increased from 65 to 86 kΩ/sq. The VO{sub X}-WO{sub X}-VO{sub X} ceramic thin film with the thinnest middle layer showed significant SMT (semiconductor-metal transition) when SMT became negligible on increasing middle layer's thickness. (orig.)

  3. Web-Services Development in Secure Way for Highload Systems

    Directory of Open Access Journals (Sweden)

    V. M. Nichiporchouk

    2011-12-01

    Full Text Available This paper describes approach to design of web-services in secure, high load and fault tolerant implementation for mass message processing. The multicomponent architecture of web-service with possibility for high security zone is provided as well as scalability evaluation of the architecture.

  4. Security Issues for Intelligence Information System based on Service-Oriented Architecture

    OpenAIRE

    Ackoski, Jugoslav; Trajkovik, Vladimir; Davcev, Danco

    2011-01-01

    Security is important requirement for service-oriented architecture (SOA), because SOA considers widespread services on different location and diverse operational platforms. Main challenge for SOA Security still drifts around “clouds” and that is insufficient frameworks for security models based on consistent and convenient methods. Contemporary security architectures and security protocols are in the phase of developing. SOA based systems are characterized with differences ...

  5. Innovation in small and mediumsized firms in the security service industry

    DEFF Research Database (Denmark)

    Langergaard, Luise Li; Møller, Jørn Kjølseth; Hansen, Anne Vorre

    2014-01-01

    This article is a study of innovation in the security sector based on an analysis of three Danish security companies. It uncovers the logics and dynamics of innovation in the security business, which is part of the operational service sector. Operational service companies are forced to choose...... activities. In order to overcome this general ‘service squeeze’ and break with a mature market, security companies use different strategies for innovation. These strategies depend on the ability of the individual security companies to activate the innovative resources among employees in order to move...... the business activities further up in the market hierarchy of security services by offering more complex and knowledge-intensive solutions to the customers, thereby reducing price competition and increasing the profits of the business activity in the same way as known from other industries...

  6. Increasing supported VoIP flows in WMNs through link-based aggregation

    CSIR Research Space (South Africa)

    Olwal, T

    2008-10-01

    Full Text Available As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to remote and over populated areas that currently are not or are only partially reached by available Public Switched Telephone Network (PSTN...

  7. Evaluation of VoIP QoS Performance in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Mohammad Tariq Meeran

    2017-07-01

    Full Text Available The main focus of this research article is the evaluation of selected voice over Internet protocol (VoIP solutions in wireless mesh network (WMN scenarios. While WMNs have self-healing, self-forming, and dynamic topology features, they still pose challenges for the implementation of multimedia applications such as voice in various scenarios. Therefore, various solutions to make WMN more suitable for VoIP application have been proposed in the scientific literature. In this work, we have extensively explored a set of applicable scenarios by conducting experiments by means of a network simulator. The following scenarios were selected as the most representatives for performance evaluation: first responders, flooded village, remote village, and platoon deployment. Each selected scenario has been studied under six sub-scenarios corresponding to various combinations of the IEEE 802.11g, 802.11n, 802.11s, and 802.11e standards; the G.711 and G.729 codecs; and the ad hoc on demand distance vector (AODV and hybrid wireless mesh protocol (HWMP routing protocols. The results in terms of quality of service (measured with the mean opinion score rating scale, supported by the analysis of delay, jitter and packet loss, show that 802.11g integration with both VoIP codecs and AODV routing protocol results in better VoIP performance as compared to most other scenarios. In case of 802.11g integration with 802.11s, VoIP performance decreases as compared to the other sub-scenarios without 802.11s. The results also show that 802.11n integration with 802.11e decreases VoIP performance in larger deployments. We conclude the paper with some recommendations in terms of combinations of those standards and protocols with a view to achieve a higher quality of service for the given scenarios.

  8. 39 CFR 761.8 - Servicing book-entry Postal Service securities; payment of interest, payment at maturity or upon...

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Servicing book-entry Postal Service securities... POSTAL SERVICE POSTAL SERVICE DEBT OBLIGATIONS; DISBURSEMENT POSTAL MONEY ORDERS BOOK-ENTRY PROCEDURES § 761.8 Servicing book-entry Postal Service securities; payment of interest, payment at maturity or upon...

  9. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.

    Science.gov (United States)

    Wu, Jun; Su, Zhou; Wang, Shen; Li, Jianhua

    2017-07-30

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on "friend" relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  10. Security solution against denial of service attacks in BESIP system

    Science.gov (United States)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  11. WPSS: Watching people security services

    NARCIS (Netherlands)

    Bouma, H.; Baan, J.; Borsboom, S.; Zon, K. van; Luo, X.; Loke, B.; Stoeller, B.; Kuilenburg, H. van; Dijk, J.

    2013-01-01

    To improve security, the number of surveillance cameras is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams are observed. Intelligent software services can help to find people quickly, evaluate their behavior and show the most

  12. Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity

    Directory of Open Access Journals (Sweden)

    Craig Valli

    2010-06-01

    Full Text Available 30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP systems to enumerate and potentially attack and compromise a wide range of vulnerable systems. This paper is an outline of preliminary research into malfeasant VoIP activity on the Internet.

  13. RESTful Java web services security

    CERN Document Server

    Enríquez, René

    2014-01-01

    A sequential and easy-to-follow guide which allows you to understand the concepts related to securing web apps/services quickly and efficiently, since each topic is explained and described with the help of an example and in a step-by-step manner, helping you to easily implement the examples in your own projects. This book is intended for web application developers who use RESTful web services to power their websites. Prior knowledge of RESTful is not mandatory, but would be advisable.

  14. Ecosystem services for energy security

    Energy Technology Data Exchange (ETDEWEB)

    Athanas, Andrea; McCormick, Nadine

    2010-09-15

    The world is at an energy crossroads. The changes underway will have implications for ecosystems and livelihoods. Energy security is the reliable supply of affordable energy, of which there are two dimensions; reliability and resilience. Changes in ecosystem services linked to degradation and climate change have the potential to impact both on the reliabiity of energy systems and on their resiliance. Investing in ecosystems can help safeguard energy systems, and mitigate unforeseen risks to energy security. The energy and conservation community should come together to build reliable and resilliant energy systems in ways which recognise and value supporting ecosystems.

  15. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    Directory of Open Access Journals (Sweden)

    Jun Wu

    2017-07-01

    Full Text Available Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  16. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    Science.gov (United States)

    Wu, Jun; Su, Zhou; Li, Jianhua

    2017-01-01

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems. PMID:28758943

  17. Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services

    OpenAIRE

    Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje

    2015-01-01

    - This document contains a checklist that can be used to develop or evaluate security and privacy requirements for Cloud computing services. The content has been gathered from established industry standards and best practices, supplemented with requirements from European data protection legislation, and taking into account security issues identified in recent research on Cloud security. The document is intended to be used by potential cloud customers that need to assess the security of a c...

  18. Impact of VoIP and QoS on Open and Distance Learning

    Directory of Open Access Journals (Sweden)

    Sanjay JASOLA

    2006-07-01

    Full Text Available Voice over Internet Protocol (VoIP is becoming a reality in many organizations. The potential for mobility in voice over wi-fi networks will derive demand for the technology. Wireless VoIP is poised to rival VoIP as an alternative telephony tool. Internet has been used to transport data in the form of packet. In the past, Internet did not support any kind of sophisticated quality of service (QoS mechanism. Although the type of service (TOS field in the Internet protocol (IP header has been existing and has been allowing the differentiated treatment of packets, it was never really used on a large scale. The voice is sensitive to delay and jitter so bandwidth must be guaranteed while transporting it. With the extensive use of Internet for carrying voice, there is a need to add QoS functionality in it. QoS with reference to VoIP has been discussed in the paper. Limited bandwidth and network latency are the issues which need to be considered while using wireless LAN for packetized voice data. Efforts of standards like 802.11e which will take care of these issues, have also been explored. The impact of these technologies on distance education has also been explored in the paper.

  19. Visible light driven photocatalysis and antibacterial activity of AgVO3 and Ag/AgVO3 nanowires

    International Nuclear Information System (INIS)

    Singh, Anamika; Dutta, Dimple P.; Ballal, A.; Tyagi, A.K.; Fulekar, M.H.

    2014-01-01

    Graphical abstract: - Highlights: • Ag/AgVO 3 and pure AgVO 3 nanowires synthesized by sonochemical process. • Characterization done using XRD, SEM, TEM, EDX and BET analysis. • Visible light degradation of RhB by Ag/AgVO 3 within 45 min. • Antibacterial activity of Ag/AgVO 3 demonstrated. - Abstract: Ag/AgVO 3 nanowires and AgVO 3 nanorods were synthesized in aqueous media via a facile sonochemical route. The as-synthesized products were characterized by X-ray diffraction, Brunauer–Emmett–Teller surface area analysis, scanning electron microscopy together with an energy dispersion X-ray spectrum analysis, transmission electron microscopy and UV–vis diffuse reflectance spectroscopy. The results revealed that inert atmosphere promotes the formation of Ag/AgVO 3 nanowires. The photocatalytic studies revealed that the Ag/AgVO 3 nanowires exhibited complete photocatalytic degradation of Rhodamine B within 45 min under visible light irradiation. The antibacterial activity of Ag/AgVO 3 nanowires was tested against Escherechia coli and Bacillus subtilis. The minimum growth inhibitory concentration value was found to be 50 and 10 folds lower than for the antibiotic ciprofloxacin for E. coli and B. subtilis, respectively. The antibacterial properties of the β-AgVO 3 nanorods prove that in case of the Ag dispersed Ag/AgVO 3 nanowires, the enhanced antibacterial action is also due to contribution from the AgVO 3 support

  20. Single crystal structures of the new vanadates CuMgVO{sub 4} and AgMgVO{sub 4}

    Energy Technology Data Exchange (ETDEWEB)

    Ben Yahia, Hamdi, E-mail: Hyahia@qf.org.qa [Research Institute of Electrochemical Energy, National Institute of Advanced Industrial Science and Technology (AIST), 1-8-31 Midorigaoka, Ikeda, Osaka 563-8577 (Japan); Qatar Environment and Energy Research Institute, Hamad Bin Khalifa University, Qatar Foundation, PO Box 5825, Doha (Qatar); Shikano, Masahiro, E-mail: shikano.masahiro@aist.go.jp [Research Institute of Electrochemical Energy, National Institute of Advanced Industrial Science and Technology (AIST), 1-8-31 Midorigaoka, Ikeda, Osaka 563-8577 (Japan); Essehli, Rachid; Belharouak, Ilias [Qatar Environment and Energy Research Institute, Hamad Bin Khalifa University, Qatar Foundation, PO Box 5825, Doha (Qatar)

    2016-08-01

    The new compounds CuMgVO{sub 4} and AgMgVO{sub 4} have been synthesized by a solid state reaction route. Their crystal structures were determined from single-crystal X-ray diffraction data. CuMgVO{sub 4} crystallizes with Na{sub 2}CrO{sub 4}-type structure with space group Cmcm, a = 5.6932 (10), b = 8.7055 (15), c = 6.2789 (10) Å, V = 311.20 (9) Å{sup 3}, and Z = 4, whereas AgMgVO{sub 4} crystallizes in the maricite-type structure with space group Pnma, a = 9.4286 (14), b = 6.7465 (10), c = 5.3360 (8) Å, V = 339.42 (9) Å{sup 3}, and Z = 4. Both structures of CuMgVO{sub 4}, and AgMgVO{sub 4} contain MgO{sub 4} chains made up of edge-sharing MgO{sub 6} octahedra. In CuMgVO{sub 4} the MgO{sub 4} chains are interconnected through CuVO{sub 4} double chains made up of VO{sub 4} and CuO{sub 4} tetrahedra sharing corners and edges, however in AgMgVO{sub 4} the chains are interlinked by the VO{sub 4} and AgO{sub 4} tetrahedra sharing only corners. - Highlights: • We have been able to grow CuMgVO{sub 4} and AgMgVO{sub 4} single crystals. • We solved their crystal structures using single crystal data. • We compared the crystal structures of CuMgVO{sub 4} and AgMgVO{sub 4}.

  1. Design and Implementation of Wiki Services in a Multilevel Secure Environment

    National Research Council Canada - National Science Library

    Ong, Kar L

    2007-01-01

    The Monterey Security Architecture (MYSEA) provides a distributed multilevel secure networking environment where authenticated users can securely access data and services at different security classification levels...

  2. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

    Science.gov (United States)

    Watzlaf, Valerie J.M.; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR. PMID:25945172

  3. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance.

    Science.gov (United States)

    Watzlaf, Valerie J M; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.

  4. Security management of next generation telecommunications networks and services

    CERN Document Server

    Jacobs, Stuart

    2014-01-01

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to enc

  5. Gevaar VoIP voor telecomsector overdreven

    NARCIS (Netherlands)

    Deventer, M.O. van; Wegberg, M. van

    2004-01-01

    Het is een hype Voice-over-IP (VoIP) voor te stellen als een ontwrichtende technologie die de telecomindustrie ingrijpend zal veranderen. Maar hoe ontwrichtend is VoIP eigenlijk? Oskar van Deventer en Marc van Wegberg analyseren drie vormen van VoIP en laten zien dat alleen ‘VoIP-chat’ potentieel

  6. FlySec: a risk-based airport security management system based on security as a service concept

    Science.gov (United States)

    Kyriazanos, Dimitris M.; Segou, Olga E.; Zalonis, Andreas; Thomopoulos, Stelios C. A.

    2016-05-01

    Complementing the ACI/IATA efforts, the FLYSEC European H2020 Research and Innovation project (http://www.fly-sec.eu/) aims to develop and demonstrate an innovative, integrated and end-to-end airport security process for passengers, enabling a guided and streamlined procedure from the landside to airside and into the boarding gates, and offering for an operationally validated innovative concept for end-to-end aviation security. FLYSEC ambition turns through a well-structured work plan into: (i) innovative processes facilitating risk-based screening; (ii) deployment and integration of new technologies and repurposing existing solutions towards a risk-based Security paradigm shift; (iii) improvement of passenger facilitation and customer service, bringing security as a real service in the airport of tomorrow;(iv) achievement of measurable throughput improvement and a whole new level of Quality of Service; and (v) validation of the results through advanced "in-vitro" simulation and "in-vivo" pilots. On the technical side, FLYSEC achieves its ambitious goals by integrating new technologies on video surveillance, intelligent remote image processing and biometrics combined with big data analysis, open-source intelligence and crowdsourcing. Repurposing existing technologies is also in the FLYSEC objectives, such as mobile application technologies for improved passenger experience and positive boarding applications (i.e. services to facilitate boarding and landside/airside way finding) as well as RFID for carry-on luggage tracking and quick unattended luggage handling. In this paper, the authors will describe the risk based airport security management system which powers FLYSEC intelligence and serves as the backend on top of which FLYSEC's front end technologies reside for security services management, behaviour and risk analysis.

  7. Privacy-preserving security solution for cloud services

    OpenAIRE

    L. Malina; J. Hajny; P. Dzurenda; V. Zeman

    2015-01-01

    We propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient non-bilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven without revealing users' identity, and users can use cloud services without any threat of profiling their...

  8. Facile synthesis and high activity of novel BiVO{sub 4}/FeVO{sub 4} heterojunction photocatalyst for degradation of metronidazole

    Energy Technology Data Exchange (ETDEWEB)

    Li, Jinhai [State Key Laboratory of Pollution Control and Resource Reuse, School of the Environment, Nanjing University, Nanjing 210023 (China); School of Chemical Engineering, Guizhou University of Engineering Science, Bijie 551700 (China); Zhao, Wei; Guo, Yang; Wei, Zhongbo; Han, Mengshu [State Key Laboratory of Pollution Control and Resource Reuse, School of the Environment, Nanjing University, Nanjing 210023 (China); He, Huan [State Key Laboratory of Pollution Control and Resource Reuse, School of the Environment, Nanjing University, Nanjing 210023 (China); School of Public Health, University of Illinois at Chicago, Chicago, IL 60631 (United States); Yang, Shaogui [State Key Laboratory of Pollution Control and Resource Reuse, School of the Environment, Nanjing University, Nanjing 210023 (China); Department of Plant, Soil and Microbial Sciences, Michigan State University, East Lansing, Michigan 48824 (United States); Sun, Cheng, E-mail: envidean@nju.edu.cn [State Key Laboratory of Pollution Control and Resource Reuse, School of the Environment, Nanjing University, Nanjing 210023 (China)

    2015-10-01

    Graphical abstract: - Highlights: • BiVO{sub 4}/FeVO{sub 4} was synthesized by a facile one-step hydrothermal method. • BiVO{sub 4}/FeVO{sub 4} displays superior photocatalytic activity. • The photocatalytic mechanism were discussed in detail. - Abstract: The novel BiVO{sub 4}/FeVO{sub 4} heterojunction photocatalyst was successfully synthesized by a facile hydrothermal method firstly. The physical and chemical properties of as-prepared samples were characterized based upon XRD, XPS, BET, SEM, EDS, TEM, UV–vis DRS and fluorescence spectrum techniques. The TEM images showed a clear interface between BiVO{sub 4} and FeVO{sub 4}, indicating that a heterojunction between BiVO{sub 4} and FeVO{sub 4} was formed during the hydrothermal reaction. In addition, the photodegradation activity of metronidazole (MNZ) was used as a measurement for photocatalytic performance of BiVO{sub 4}, FeVO{sub 4} and BiVO{sub 4}/FeVO{sub 4} heterojunction photocatalyst. It indicated that under visible light irradiation the photocatalytic activity of BiVO{sub 4}/FeVO{sub 4} heterojunction photocatalyst was very effective, and moreover, much higher than the single BiVO{sub 4} or single FeVO{sub 4}. The possible photocatalytic mechanism has been discussed on the basis of the theoretical calculation of the electronic structure, and the experimental results.

  9. Instant SQL Server Analysis Services 2012 Cube Security

    CERN Document Server

    Jayanty, Satya SK

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Instant Microsoft SQL Server Analysis Services 2012 Cube Security is a practical, hands-on guide that provides a number of clear, step-by-step exercises for getting started with cube security.This book is aimed at Database Administrators, Data Architects, and Systems Administrators who are managing the SQL Server data platform. It is also beneficial for analysis services developers who already have some experience with the technology, but who want to go into more detail on advanced

  10. Security threats and their mitigation in infrastructure as a service

    Directory of Open Access Journals (Sweden)

    Bineet Kumar Joshi

    2016-09-01

    Full Text Available Cloud computing is a hot technology in the market. It permits user to use all IT resources as computing services on the basis of pay per use manner and access the applications remotely. Infrastructure as a service (IaaS is the basic requirement for all delivery models. Infrastructure as a service delivers all possible it resources (Network Components, Operating System, etc. as a service to users. From both users and providers point of view: integrity, privacy and other security issues in IaaS are the important concern. In this paper we studied in detail about the different types of security related issues in IaaS layer and methods to resolve them to maximize the performance and to maintain the highest level of security in IaaS.

  11. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    Science.gov (United States)

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  12. Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET [Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ryan Ari Setyawan

    2015-06-01

    Full Text Available Penelitian ini bertujuan menganalisis kinerja aplikasi  VoIP call android di jaringan MANET (mobile ad hoc network.  Hasil pengujian menunjukan bahwa aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2% sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. *****This study aims to analyze the performance of VOIP call android application in the MANET (mobile ad hoc network. The results showed that VoIP applications could be implemented in MANET network. The highest  delay is produced in indoor testing  with distance of 11-15 meters,  which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%. The jitter is between 0.01 to 0.06 seconds, while the standard set by CISCO is ≤ 30 ms or 0.03 seconds. Throughput generated in the testing process is between 161 kbps-481 kbps.

  13. Time limit and VO2 slow component at intensities corresponding to VO2max in swimmers.

    Science.gov (United States)

    Fernandes, R J; Cardoso, C S; Soares, S M; Ascensão, A; Colaço, P J; Vilas-Boas, J P

    2003-11-01

    The purpose of this study was to measure, in swimming pool conditions and with high level swimmers, the time to exhaustion at the minimum velocity that elicits maximal oxygen consumption (TLim at vVO(2)max), and the corresponding VO(2) slow component (O(2)SC). The vVO(2)max was determined through an intermittent incremental test (n = 15). Forty-eight hours later, TLim was assessed using an all-out swim at vVO(2)max until exhaustion. VO(2) was measured through direct oximetry and the swimming velocity was controlled using a visual light-pacer. Blood lactate concentrations and heart rate values were also measured. Mean VO(2)max for the incremental test was 5.09 +/- 0.53 l/min and the corresponding vVO(2)max was 1.46 +/- 0.06 m/s. Mean TLim value was 260.20 +/- 60.73 s and it was inversely correlated with the velocity of anaerobic threshold (r = -0.54, p energy cost of the respiratory muscles (r = 0.51), for p swimming pool, in high level swimmers performing at vVO(2)max, and that higher TLim seems to correspond to higher expected O(2)SC amplitude. These findings seem to bring new data with application in middle distance swimming.

  14. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

    Directory of Open Access Journals (Sweden)

    Valerie J.M. Watzlaf

    2010-10-01

    Full Text Available Voice over the Internet Protocol (VoIP systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR therapy that can provide voice and video teleconferencing between patients and therapists.  Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care, and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.   

  15. VCC-SSF: Service-Oriented Security Framework for Vehicular Cloud Computing

    Directory of Open Access Journals (Sweden)

    Won Min Kang

    2015-02-01

    Full Text Available Recently, as vehicle computing technology has advanced, the paradigm of the vehicle has changed from a simple means of transportation to a smart vehicle for safety and convenience. In addition, the previous functions of the Intelligent Transportation System (ITS such as traffic accident prevention and providing traffic volume information have been combined with cloud computing. ITS services provide user-oriented broad services in the Vehicular Cloud Computing (VCC environment through efficient traffic management, traffic accident prevention, and convenience services. However, existing vehicle services focus on providing services using sensing information inside the vehicle and the system to provide the service through an interface with the external infrastructure is insufficient. In addition, because wireless networks are used in VCC environments, there is a risk of important information leakage from sensors inside the vehicle, such as driver personal identification and payment information at the time of goods purchase. We propose the VCC Service-oriented Security Framework (VCC-SSF to address the limitations and security threats of VCC-based services. The proposed framework considers security for convenient and efficient services of VCC and includes new user-oriented payment management and active accident management services. Furthermore, it provides authentication, encryption, access control, confidentiality, integrity, and privacy protection for user personal information and information inside the vehicle.

  16. Security risks in IP telephony

    OpenAIRE

    Řezáč, Filip; Vozňák, Miroslav

    2010-01-01

    This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT) as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against...

  17. Outsourcing as a Mean of Service for Security Provision

    Directory of Open Access Journals (Sweden)

    D.I. Persanov

    2012-03-01

    Full Text Available The article highlights the implementation of outsourcing as a mean of service for security provision. Analysis is performed to describe the current issues affecting the management decision in favor of outsourcing. Investigation covers the processes of physical, information and economical security. The main recommendations to use outsourcing for security provision are described in the conclusion.

  18. Lattice relaxation and ferromagnetic character of (LaVO3)m/SrVO3 superlattices

    KAUST Repository

    Schuster, Cosima B.

    2013-08-01

    The experimental observation that vanadate superlattices (LaVO 3)m/SrVO3 show ferromagnetism up to room temperature (Lüders U. et al., Phys. Rev. B, 80 (2009) 241102(R)) is investigated by means of density functional theory, and the band structure for m = 5 and 6 is calculated. A buckling of the interface VO2 layers is found in both cases, but subtle differences in bond length lead to very different properties for even and odd values of m: in the even case, the two interface VO2 layers effectively decouple from the adjacent LaO layers due to a strong bond length enhancement. This results into a local inversion of the orbital occupancy and to the confinement of the charge carriers. In the odd case, the amplitude of the bond length variation is smaller, so that the charge carriers spill into the deeper-lying VO2 layers, and spin-polarised interfaces are obtained. © Copyright EPLA, 2013.

  19. Ab Initio Metadynamics Study of the VO2+/VO2+ Redox Reaction Mechanism at the Graphite Edge/Water Interface.

    Science.gov (United States)

    Jiang, Zhen; Klyukin, Konstantin; Alexandrov, Vitaly

    2018-06-08

    Redox flow batteries (RFBs) are promising electrochemical energy storage systems, for which development is impeded by a poor understanding of redox reactions occurring at electrode/electrolyte interfaces. Even for the conventional all-vanadium RFB chemistry employing V 2+ /V 3+ and VO 2 + /VO 2+ couples, there is still no consensus about the reaction mechanism, electrode active sites, and rate-determining step. Herein, we perform Car-Parrinello molecular dynamics-based metadynamics simulations to unravel the mechanism of the VO 2 + /VO 2+ redox reaction in water at the oxygen-functionalized graphite (112̅0) edge surface serving as a representative carbon-based electrode. Our results suggest that during the battery discharge aqueous VO 2 + /VO 2+ species adsorb at the surface C-O groups as inner-sphere complexes, exhibiting faster adsorption/desorption kinetics than V 2+ /V 3+ , at least at low vanadium concentrations considered in our study. We find that this is because (i) VO 2 + /VO 2+ conversion does not involve the slow transfer of an oxygen atom, (ii) protonation of VO 2 + is spontaneous and coupled to interfacial electron transfer in acidic conditions to enable VO 2+ formation, and (iii) V 3+ found to be strongly bound to oxygen groups of the graphite surface features unfavorable desorption kinetics. In contrast, the reverse process taking place upon charging is expected to be more sluggish for the VO 2 + /VO 2+ redox couple because of both unfavorable deprotonation of the VO 2+ water ligands and adsorption/desorption kinetics.

  20. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  1. Secure Electronic Cards in Public Services

    Directory of Open Access Journals (Sweden)

    Cristian TOMA

    2008-01-01

    Full Text Available The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient’s medical history and payment for private medical services. The security issue is a very important one as the patient’s history is confidential and the payment has to be safe.

  2. A new data collaboration service based on cloud computing security

    Science.gov (United States)

    Ying, Ren; Li, Hua-Wei; Wang, Li na

    2017-09-01

    With the rapid development of cloud computing, the storage and usage of data have undergone revolutionary changes. Data owners can store data in the cloud. While bringing convenience, it also brings many new challenges to cloud data security. A key issue is how to support a secure data collaboration service that supports access and updates to cloud data. This paper proposes a secure, efficient and extensible data collaboration service, which prevents data leaks in cloud storage, supports one to many encryption mechanisms, and also enables cloud data writing and fine-grained access control.

  3. Dutch National Security Reform Under Review : Sufficient Checks and Balances in the Intelligence and Security Services Act 2017?

    NARCIS (Netherlands)

    Quirine Eijkman; Nico van Eijk; Robert van Schaik

    2018-01-01

    In May 2018, the new Dutch Intelligence and Security Services Act 2017 (Wet op de Inlichtingen- en veiligheidsdiensten, Wiv) will enter into force. It replaces the previous 2002 Act and incorporates many reforms to the information gathering powers of the two intelligence and security services as

  4. Visible light driven photocatalysis and antibacterial activity of AgVO{sub 3} and Ag/AgVO{sub 3} nanowires

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Anamika [Department of Life Sciences, University of Mumbai, Santacruz (E), Mumbai 400 098 (India); Dutta, Dimple P., E-mail: dimpled@barc.gov.in [Chemistry Division, Bhabha Atomic Research Centre, Mumbai 400 085 (India); Ballal, A. [Molecular Biology Division, Bhabha Atomic Research Centre, Mumbai 400 085 (India); Tyagi, A.K. [Chemistry Division, Bhabha Atomic Research Centre, Mumbai 400 085 (India); Fulekar, M.H. [School of Environment and Sustainable Development, Central University of Gujarat, Gandhinagar 382 030, Gujarat (India)

    2014-03-01

    Graphical abstract: - Highlights: • Ag/AgVO{sub 3} and pure AgVO{sub 3} nanowires synthesized by sonochemical process. • Characterization done using XRD, SEM, TEM, EDX and BET analysis. • Visible light degradation of RhB by Ag/AgVO{sub 3} within 45 min. • Antibacterial activity of Ag/AgVO{sub 3} demonstrated. - Abstract: Ag/AgVO{sub 3} nanowires and AgVO{sub 3} nanorods were synthesized in aqueous media via a facile sonochemical route. The as-synthesized products were characterized by X-ray diffraction, Brunauer–Emmett–Teller surface area analysis, scanning electron microscopy together with an energy dispersion X-ray spectrum analysis, transmission electron microscopy and UV–vis diffuse reflectance spectroscopy. The results revealed that inert atmosphere promotes the formation of Ag/AgVO{sub 3} nanowires. The photocatalytic studies revealed that the Ag/AgVO{sub 3} nanowires exhibited complete photocatalytic degradation of Rhodamine B within 45 min under visible light irradiation. The antibacterial activity of Ag/AgVO{sub 3} nanowires was tested against Escherechia coli and Bacillus subtilis. The minimum growth inhibitory concentration value was found to be 50 and 10 folds lower than for the antibiotic ciprofloxacin for E. coli and B. subtilis, respectively. The antibacterial properties of the β-AgVO{sub 3} nanorods prove that in case of the Ag dispersed Ag/AgVO{sub 3} nanowires, the enhanced antibacterial action is also due to contribution from the AgVO{sub 3} support.

  5. Extending Tactical Fleet Communications Through VoIP

    Science.gov (United States)

    2014-09-01

    corporate world , the military is leveraging VoIP communication solutions as well. Shore commands like Tactical Training Group Pacific use VoIP for...VoIP fuzzing (e.g., Asteroid , PROTOS, Sip-Proxy)  VoIP signaling manipulation (e.g., IAXAuthJack, IAXHangup, SIP-Kill)  VoIP media...as well, but instead of just matching the information to rules, it compares synchronization information between the protocols to determine if the

  6. Constructing RBAC based security model in u-healthcare service platform.

    Science.gov (United States)

    Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil

    2015-01-01

    In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices.

  7. Constructing RBAC Based Security Model in u-Healthcare Service Platform

    Science.gov (United States)

    Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil

    2015-01-01

    In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices. PMID:25695104

  8. Improving the electrocatalytic performance of carbon nanotubes for VO"2"+/VO_2"+ redox reaction by KOH activation

    International Nuclear Information System (INIS)

    Dai, Lei; Jiang, Yingqiao; Meng, Wei; Zhou, Huizhu; Wang, Ling; He, Zhangxing

    2017-01-01

    Highlights: • KOH-activated carbon nanotubes (CNTs) was investigated as superior catalyst for VO"2"+/VO_2"+ redox reaction for vanadium redox flow battery (VRFB) for the first time. • KOH activation for CNTs can result in the chemical etching of surface and improved wettability, accelerating the mass transfer of vanadium ions. • KOH activation can introduce many oxygen-containing groups as active sites on the surface of CNTs. • KOH-activated CNTs as positive catalyst could increase the comprehensive energy storage performance of VRFB. - Abstract: In this paper, carbon nanotubes (CNTs) was activated by KOH treatment at high temperature and investigated as catalyst for VO"2"+/VO_2"+ redox reaction for vanadium redox flow battery (VRFB). X-ray photoelectron spectroscopy results suggest that the oxygen-containing groups can be introduced on CNTs by KOH activation. The mass transfer of vanadium ions can be accelerated by chemical etching by KOH activation and improved wettability due to the introduction of hydrophilic groups. The electrochemical properties of VO"2"+/VO_2"+ redox reaction can be enhanced by introduced oxygen-containing groups as active sites. The sample treated at 900 °C with KOH/CNTs mass ratio of 3:1 (CNTs-3) exhibits the highest electrocatalytic activity for VO"2"+/VO_2"+ redox reaction. The cell using CNTs-3 as positive catalyst demonstrates the smallest electrochemical polarization, the highest capacity and efficiency among the samples. Using KOH-activated CNTs-3 can increase the average energy efficiency of the cell by 4.4%. This work suggests that KOH-activated CNTs is a low-cost, efficient and promising catalyst for VO"2"+/VO_2"+ redox reaction for VRFB system.

  9. Optimizing Low Speed VoIP Network for Rural Next Generation Network (R-NGN

    Directory of Open Access Journals (Sweden)

    Yoanes Bandung

    2007-11-01

    Full Text Available In this research, we propose an optimization method based-on E-Model for designing an efficient low speed VoIP network for Rural Next Generation Network (R-NGN. We are choosing 128 kbps and 256 kbps bandwidth as the typical community link to be used in the designing of R-NGN infrastructure. The method is based on selection of some VoIP network parameters such as voice coder, communication protocol, packet loss level, network utilization and resource allocation. We draw analytic approach for achieving rating value (R of E-model that represent level of quality of service. In this approach, we focus on delay and packet loss calculation to find the rating value. We state the rating value = 70 as minimum level of quality of service for each call, equivalent to 3.6 of Mean Opinion Score (MOS. In our experiments, either G.723.1 5.3 kbps or G.729 is chosen for maximizing the number of VoIP calls, it depends on link utilization and level of packet loss.

  10. VoIP over WLAN

    OpenAIRE

    Nikkari, Joni

    2007-01-01

    Tässä opinnäytetyössä tutkitaan VoIP over WLAN -tekniikan mahdollisuuksia nykyaikaisessa käyttöympäristössä, sekä yritysmaailman että kotikäyttäjän näkökulmasta. Toimiakseen VoWLAN tarvitsee kaksi eri tekniikkaa: langattoman lähiverkon sekä WLAN-puhelimen, joka perustuu VoIP-tekniikkaan.; WLAN:ssa tietoliikenne kulkee normaalin kaapeloinnin sijasta radiotaajuuksia käyttämällä. Standardina toimii IEEE 802.11, joka määrittelee WLAN-verkkojen toiminnan. Standardia on kehitetty jatkuvasti, ja si...

  11. A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers

    Directory of Open Access Journals (Sweden)

    Jamal Talbi

    2017-03-01

    Full Text Available Cloud computing is becoming a key factor in computer science and an important technology for many organizations to deliver different types of services. The companies which provide services to customers are called as cloud service providers. The cloud users (CUs increase and require secure, reliable and trustworthy cloud service providers (CSPs from the market. So, it’s a challenge for a new customer to choose the highly secure provider. This paper presents a cloud service brokering system in order to analyze and rank the secured cloud service provider among the available providers list. This model uses an autonomous and flexible agent in multi-agent system (MASs that have an intelligent behavior and suitable tools for helping the brokering system to assess the security risks for the group of cloud providers which make decision of the more secured provider and justify the business needs of users in terms of security and reliability.

  12. Multi-VO support in IHEP's distributed computing environment

    International Nuclear Information System (INIS)

    Yan, T; Suo, B; Zhao, X H; Zhang, X M; Ma, Z T; Yan, X F; Lin, T; Deng, Z Y; Li, W D; Belov, S; Pelevanyuk, I; Zhemchugov, A; Cai, H

    2015-01-01

    Inspired by the success of BESDIRAC, the distributed computing environment based on DIRAC for BESIII experiment, several other experiments operated by Institute of High Energy Physics (IHEP), such as Circular Electron Positron Collider (CEPC), Jiangmen Underground Neutrino Observatory (JUNO), Large High Altitude Air Shower Observatory (LHAASO) and Hard X-ray Modulation Telescope (HXMT) etc, are willing to use DIRAC to integrate the geographically distributed computing resources available by their collaborations. In order to minimize manpower and hardware cost, we extended the BESDIRAC platform to support multi-VO scenario, instead of setting up a self-contained distributed computing environment for each VO. This makes DIRAC as a service for the community of those experiments. To support multi-VO, the system architecture of BESDIRAC is adjusted for scalability. The VOMS and DIRAC servers are reconfigured to manage users and groups belong to several VOs. A lightweight storage resource manager StoRM is employed as the central SE to integrate local and grid data. A frontend system is designed for user's massive job splitting, submission and management, with plugins to support new VOs. A monitoring and accounting system is also considered to easy the system administration and VO related resources usage accounting. (paper)

  13. A novel inorganic precipitation-peptization method for VO2 sol and VO2 nanoparticles preparation: Synthesis, characterization and mechanism.

    Science.gov (United States)

    Li, Yao; Jiang, Peng; Xiang, Wei; Ran, Fanyong; Cao, Wenbin

    2016-01-15

    In this paper, a simple, safe and cost-saving precipitation-peptization method was proposed to prepare VO2 sol by using inorganic VOSO4-NH3⋅H2O-H2O2 reactants system in air under room temperature. In this process, VOSO4 was firstly precipitated to form VO(OH)2, then monometallic species of VO(O2)(OH)(-) were formed through the coordination between VO(OH)2 and H2O2. The rearrangement of VO(O2)(OH)(-) in a nonplanar pattern and intermolecular condensation reactions result in multinuclear species. Finally, VO2 sol is prepared through the condensation reactions between the multinuclear species. After drying the obtained sol at 40°C, VO2 xerogel exhibiting monoclinic crystal structure with the space group of C2/m was prepared. The crystal structure of VO2 nanoparticles was transferred to monoclinic crystal structure with the space group of P21/c (VO2(M)) by annealing the xerogel at 550°C. Both XRD and TEM analysis indicated that the nanoparticles possess good crystallinity with crystallite size of 34.5nm as estimated by Scherrer's method. These results suggest that the VO2 sol has been prepared successfully through the proposed simple method. Copyright © 2015 Elsevier Inc. All rights reserved.

  14. 78 FR 5122 - NASA Security and Protective Services Enforcement

    Science.gov (United States)

    2013-01-24

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION 14 CFR Parts 1203a, 1203b, and 1204 [Docket No NASA-2012-0007] RIN 2700-AD89 NASA Security and Protective Services Enforcement AGENCY: National Aeronautics... nonsubstantive changes to NASA regulations to clarify the procedures for establishing controlled/ secure areas...

  15. Two Stage Secure Dynamic Load Balancing Architecture for SIP Server Clusters

    Directory of Open Access Journals (Sweden)

    G. Vennila

    2014-08-01

    Full Text Available Session Initiation Protocol (SIP is a signaling protocol emerged with an aim to enhance the IP network capabilities in terms of complex service provision. SIP server scalability with load balancing has a greater concern due to the dramatic increase in SIP service demand. Load balancing of session method (request/response and security measures optimizes the SIP server to regulate of network traffic in Voice over Internet Protocol (VoIP. Establishing a honeywall prior to the load balancer significantly reduces SIP traffic and drops inbound malicious load. In this paper, we propose Active Least Call in SIP Server (ALC_Server algorithm fulfills objectives like congestion avoidance, improved response times, throughput, resource utilization, reducing server faults, scalability and protection of SIP call from DoS attacks. From the test bed, the proposed two-tier architecture demonstrates that the ALC_Server method dynamically controls the overload and provides robust security, uniform load distribution for SIP servers.

  16. Integration von VO-Management Technologien in UNICORE

    OpenAIRE

    Faroughi, A.

    2007-01-01

    Reliable authentication and authorisation are crucial for both service providers and their customers, where the former want to protect their resources from unauthorised access and fraudulent use while their customers want to be sure that unauthorised access to their data is prevented. In Grid environments Virtual Organisations (VO) have been adopted as a means to organise and control access to resources and data based on roles that are assigned to users. Moreover, attribute based authorisatio...

  17. Constructing RBAC Based Security Model in u-Healthcare Service Platform

    Directory of Open Access Journals (Sweden)

    Moon Sun Shin

    2015-01-01

    Full Text Available In today’s era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation’s healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR, recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices.

  18. The government as a client for security support services. A commercial security contractor's perspective

    International Nuclear Information System (INIS)

    Leith, H.M.

    1984-01-01

    This paper presents a look at the challenges confronting security management personnel contracting with the U.S. government to provide security and related support services. From the corporate decision to enter the ''Big Leagues'' via proposal submission, through commitments and required expertise necessary to achieve ''outstanding'' ratings, this paper is an overview of a broad spectrum of security related topics including: the proposal process, the first step; oral review boards and ''Catch-22'' dilemmas; contractual requirements vs. court orders; personnel, the human factor; the carousel approach to fiscal accountability; and avoiding communication barriers

  19. Contemporary women's secure psychiatric services in the United Kingdom: A qualitative analysis of staff views.

    Science.gov (United States)

    Walker, T; Edge, D; Shaw, J; Wilson, H; McNair, L; Mitchell, H; Gutridge, K; Senior, J; Sutton, M; Meacock, R; Abel, K

    2017-11-01

    WHAT IS KNOWN ON THE SUBJECT?: Three pilot UK-only Women's Enhanced Medium Secure Services (WEMSS) was opened in 2007 to support women's movement from high secure care and provide a bespoke, women-only service. Evidence suggests that women's secure services are particularly challenging environments to work in and staffing issues (e.g., high turnover) can cause difficulties in establishing a therapeutic environment. Research in this area has focused on the experiences of service users. Studies which have examined staff views have focused on their feelings towards women in their care and the emotional burden of working in women's secure services. No papers have made a direct comparison between staff working in different services. WHAT DOES THIS STUDY ADD TO EXISTING KNOWLEDGE?: This is the first study to explore the views and experiences of staff in the three UK WEMSS pilot services and contrast them with staff from women's medium secure services. Drawing upon data from eighteen semi-structured interviews (nine WEMSS, nine non-WEMSS), key themes cover staff perceptions of factors important for women's recovery and their views on operational aspects of services. This study extends our understanding of the experiences of staff working with women in secure care and bears relevance for staff working internationally, as well as in UK services. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: The study reveals the importance of induction and training for bank and agency staff working in women's secure services. Further, regular clinical supervision should be mandatory for all staff so they are adequately supported. Introduction Women's Enhanced Medium Secure Services (WEMSS) is bespoke, gender-sensitive services which opened in the UK in 2007 at three pilot sites. This study is the first of its kind to explore the experiences of WEMSS staff, directly comparing them to staff in a standard medium secure service for women. The literature to date has focused on the experiences of

  20. Employment of security personnel of a security service company does not need approval by the works council

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-secion 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. (Federal Labour Court, decision dated November 28, 1989 - 1 ABR 90/88). (orig./HP) [de

  1. VoSeq: a voucher and DNA sequence web application.

    Directory of Open Access Journals (Sweden)

    Carlos Peña

    Full Text Available There is an ever growing number of molecular phylogenetic studies published, due to, in part, the advent of new techniques that allow cheap and quick DNA sequencing. Hence, the demand for relational databases with which to manage and annotate the amassing DNA sequences, genes, voucher specimens and associated biological data is increasing. In addition, a user-friendly interface is necessary for easy integration and management of the data stored in the database back-end. Available databases allow management of a wide variety of biological data. However, most database systems are not specifically constructed with the aim of being an organizational tool for researchers working in phylogenetic inference. We here report a new software facilitating easy management of voucher and sequence data, consisting of a relational database as back-end for a graphic user interface accessed via a web browser. The application, VoSeq, includes tools for creating molecular datasets of DNA or amino acid sequences ready to be used in commonly used phylogenetic software such as RAxML, TNT, MrBayes and PAUP, as well as for creating tables ready for publishing. It also has inbuilt BLAST capabilities against all DNA sequences stored in VoSeq as well as sequences in NCBI GenBank. By using mash-ups and calls to web services, VoSeq allows easy integration with public services such as Yahoo! Maps, Flickr, Encyclopedia of Life (EOL and GBIF (by generating data-dumps that can be processed with GBIF's Integrated Publishing Toolkit.

  2. Comparative optical study of thulium-doped YVO4 , GdVO4 , and LuVO4 single crystals

    Science.gov (United States)

    Lisiecki, R.; Solarz, P.; Dominiak-Dzik, G.; Ryba-Romanowski, W.; Sobczyk, M.; Černý, Pavel; Šulc, Jan; Jelínková, Helena; Urata, Yoshiharu; Higuchi, Mikio

    2006-07-01

    YVO4:Tm3+ crystals grown by the Czochralski technique and GdVO4:Tm3+ and LuVO4:Tm3+ crystals grown by the floating-zone technique were investigated using methods of optical spectroscopy. Polarized absorption and emission spectra were recorded at room temperature and at 6K . The crystal-field analysis was performed assuming the D2d site symmetry for Tm3+ ions. In this way the missing crystal-field components of the H63 ground multiplet were located. Room temperature absorption spectra were analyzed in the framework of the Judd-Ofelt theory. Evaluated radiative lifetimes of luminescent levels of Tm3+ follow a general trend diminishing in agreement with the sequence: YVO4:Tm3+→GdVO4:Tm3+→LuVO4:Tm3+ . Luminescence lifetimes measured for the systems under study are similar except for the F43 lifetime, which appears to be surprisingly short for LuVO4:Tm3+ . Anisotropy of optical spectra is particularly pronounced in LuVO4:Tm3+ . Peak absorption cross section for the band relevant for optical pumping at about 805nm is roughly three times higher for π polarization. Stimulated emission cross sections for the F43-H63 transition near 1800nm were evaluated using the reciprocity method. The diode-pumped continuous wave laser operation in GdVO4:Tm3+ with a slope efficiency of up to 40% is demonstrated. In LuVO4:Tm3+ the diode-pumped laser oscillation in a pulsed mode was observed.

  3. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  4. ESA Science Archives, VO tools and remote Scientific Data reduction in Grid Architectures

    Science.gov (United States)

    Arviset, C.; Barbarisi, I.; de La Calle, I.; Fajersztejn, N.; Freschi, M.; Gabriel, C.; Gomez, P.; Guainazzi, M.; Ibarra, A.; Laruelo, A.; Leon, I.; Micol, A.; Parrilla, E.; Ortiz, I.; Osuna, P.; Salgado, J.; Stebe, A.; Tapiador, D.

    2008-08-01

    This paper presents the latest functionalities of the ESA Science Archives located at ESAC, Spain, in particular, the following archives : the ISO Data Archive (IDA {http://iso.esac.esa.int/ida}), the XMM-Newton Science Archive (XSA {http://xmm.esac.esa.int/xsa}), the Integral SOC Science Data Archive (ISDA {http://integral.esac.esa.int/isda}) and the Planetary Science Archive (PSA {http://www.rssd.esa.int/psa}), both the classical and the map-based Mars Express interfaces. Furthermore, the ESA VOSpec {http://esavo.esac.esa.int/vospecapp} spectra analysis tool is described, which allows to access and display spectral information from VO resources (both real observational and theoretical spectra), including access to Lines database and recent analysis functionalities. In addition, we detail the first implementation of RISA (Remote Interface for Science Analysis), a web service providing remote users the ability to create fully configurable XMM-Newton data analysis workflows, and to deploy and run them on the ESAC Grid. RISA makes fully use of the inter-operability provided by the SIAP (Simple Image Access Protocol) services as data input, and at the same time its VO-compatible output can directly be used by general VO-tools.

  5. INFORMATION SECURITY RISKS OPTIMIZATION IN CLOUDY SERVICES ON THE BASIS OF LINEAR PROGRAMMING

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2013-01-01

    Full Text Available The paper discusses theoretical aspects of secure cloud services creation for information processing of various confidentiality degrees. A new approach to the reasoning of information security composition in distributed computing structures is suggested, presenting the problem of risk assessment as an extreme problem of decisionmaking. Linear programming method application is proved to minimize the risk of information security for given performance security in compliance with the economic balance for the maintenance of security facilities and cost of services. An example is given to illustrate the obtained theoretical results.

  6. Accessing the VO with Python

    Science.gov (United States)

    Plante, R.; Fitzpatrick, M.; Graham, M.; Tody, D.; Young, W.

    2014-05-01

    We introduce two products for accessing the VO from Python: PyVO and VOClient. PyVO is built on the widely-used Astropy package and is well suited for integrating automated access to astronomical data into highly customizable scripts and applications for data analysis in Python. VOClient is built on a collection of C-libraries and is well suited for integrating with multi-language analysis packages. It also provides a framework for integrating legacy software into the Python environment. In this demo, we will run through several examples demonstrate basic data discovery and retrieval of data. This includes finding archives containing data of interest (VO registry), retrieving datasets (SIA, SSA), and exploring (Cone Search, SLAP). VOClient features some extended capabilities including the ability to communicate to other desktop applications from a script using the SAMP protocol.

  7. Demokratski stil vođenja

    OpenAIRE

    Roko, Maruna

    2018-01-01

    Djelatnici u poduzeću s demokratskim stilom vođenja moraju biti zadovoljni plaćom i ostalim beneficijama, kao i uvjetima rada, te moraju biti motivirani zahvaljujući nemonotonosti posla i upravljačkim vještinama uprave. Velike prednosti demokratskog stila vođenja su veća fleksibilnost i zarada i izostanak neizvjesnosti i svakodnevnog stresa zbog rizika, dok se teški rad i upornost nagrađuju. Demokratski vođa mora konstantno ispitivati informacije na tržištu prodaje i nabave, proučavati zakons...

  8. New Methods for Processing and Quantifying VO2 Kinetics to Steady State: VO2 Onset Kinetics

    Directory of Open Access Journals (Sweden)

    Craig R. McNulty

    2017-09-01

    Full Text Available Current methods of oxygen uptake (VO2 kinetics data handling may be too simplistic for the complex physiology involved in the underlying physiological processes. Therefore, the aim of this study was to quantify the VO2 kinetics to steady state across the full range of sub-ventilatory threshold work rates, with a particular focus on the VO2 onset kinetics. Ten healthy, moderately trained males participated in five bouts of cycling. Each bout involved 10 min at a percentage of the subject's ventilation threshold (30, 45, 60, 75, 90% from unloaded cycling. The VO2 kinetics was quantified using the conventional mono-exponential time constant (tau, τ, as well as the new methods for VO2 onset kinetics. Compared to linear modeling, non-linear modeling caused a deterioration of goodness of fit (main effect, p < 0.001 across all exercise intensities. Remainder kinetics were also improved using a modified application of the mono-exponential model (main effect, p < 0.001. Interestingly, the slope from the linear regression of the onset kinetics data is similar across all subjects and absolute exercise intensities, and thereby independent of subject fitness and τ. This could indicate that there are no functional limitations between subjects during this onset phase, with limitations occurring for the latter transition to steady state. Finally, the continuing use of mono-exponential modeling could mask important underlying physiology of more instantaneous VO2 responses to steady state. Consequently, further research should be conducted on this new approach to VO2 onset kinetics.

  9. Voice over Internet Protocol (VoIP) Technology as a Global Learning Tool: Information Systems Success and Control Belief Perspectives

    Science.gov (United States)

    Chen, Charlie C.; Vannoy, Sandra

    2013-01-01

    Voice over Internet Protocol- (VoIP) enabled online learning service providers struggling with high attrition rates and low customer loyalty issues despite VoIP's high degree of system fit for online global learning applications. Effective solutions to this prevalent problem rely on the understanding of system quality, information quality, and…

  10. Service oriented architecture governance tools within information security

    OpenAIRE

    2012-01-01

    M.Tech. Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for applications. Organisations adopt Service Oriented Architecture with the aim of automating and integrating business processes. However, it has information security vulnerabilities that should be considered. For example, applications exchange information across the Internet, where it ...

  11. The value of service reliability

    OpenAIRE

    Benezech , Vincent; Coulombel , Nicolas

    2013-01-01

    International audience; This paper studies the impact of service frequency and reliability on the choice of departure time and the travel cost of transit users. When the user has (α, β, γ) scheduling preferences, we show that the optimal head start decreases with service reliability, as expected. It does not necessarily decrease with service frequency, however. We derive the value of service headway (VoSH) and the value of service reliability (VoSR), which measure the marginal effect on the e...

  12. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  13. MiniSIP as a Plug-in

    OpenAIRE

    Arumugam Mathivanan, Arun

    2012-01-01

    Internet telephony has rapidly becoming an integral part of life. Due to its low incremental cost and the wide availability of voice over IP (VoIP) based services these services being used by nearly everyone. Today there are many VoIP applications available in the market, but most of them lack basic security features. Because people use VoIP services via public hotspots and shared local area networks these VoIP applications are vulnerable to attacks, such as eavesdropping. Today, there is a g...

  14. 78 FR 6168 - Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract...

    Science.gov (United States)

    2013-01-29

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0001] Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2012 Service Contract Inventories. SUMMARY: In accordance with...

  15. 77 FR 3836 - Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract...

    Science.gov (United States)

    2012-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0105] Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2011 Service Contract Inventories. SUMMARY: In accordance with...

  16. Security measures effect over performance in service provider network

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... Abstract—network security is defined as a set of policies and actions taken by a ... These threats are linked with the following factors that are ... typically smaller than those in the service provider space. ... Service providers cannot manage to provide ... e the DB performance effect ... r the business needs [10].

  17. Security infrastructure for dynamically provisioned cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Lopez, D.R.; Morales, A.; García-Espín, J.A.; Pearson, S.; Yee, G.

    2013-01-01

    This chapter discusses conceptual issues, basic requirements and practical suggestions for designing dynamically configured security infrastructure provisioned on demand as part of the cloud-based infrastructure. This chapter describes general use cases for provisioning cloud infrastructure services

  18. n-VO{sub 2}/p-GaN based nitride–oxide heterostructure with various thickness of VO{sub 2} layer grown by MBE

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Minhuan [Key Laboratory of Materials Modification by Laser, Ion and Electron Beams (Ministry of Education), School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China); Bian, Jiming, E-mail: jmbian@dlut.edu.cn [Key Laboratory of Materials Modification by Laser, Ion and Electron Beams (Ministry of Education), School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China); Key Laboratory of Inorganic Coating Materials, Chinese Academy of Sciences, Shanghai 200050, China (China); Sun, Hongjun; Liu, Weifeng [Key Laboratory of Materials Modification by Laser, Ion and Electron Beams (Ministry of Education), School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China); Zhang, Yuzhi [Key Laboratory of Inorganic Coating Materials, Chinese Academy of Sciences, Shanghai 200050, China (China); Luo, Yingmin [Key Laboratory of Materials Modification by Laser, Ion and Electron Beams (Ministry of Education), School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China)

    2016-12-15

    Graphical abstract: The significant influences of VO{sub 2} layer thickness on the structural, electrical and contact properties of the n-VO{sub 2}/p-GaN based nitride-oxide heterostructure were investigated systemically. - Highlights: • High quality VO{sub 2} films with precisely controlled thickness were grown on p-GaN/sapphire substrates by oxide molecular beam epitaxy (O-MBE). • A distinct reversible SMT phase transition was observed for the n-VO{sub 2}/p-GaN based nitride-oxide heterostructure. • The clear rectifying transport characteristics originated from the n-VO{sub 2}/p-GaN interface were demonstrated before and after SMT of the VO{sub 2} over layer. • The XPS analyses confirmed the valence state of V in VO{sub 2} films was principally composed of V{sup 4+} with trace amount of V{sup 5+}. • The design and modulation of the n-VO{sub 2}/p-GaN based heterostructure devices will benefit significantly from these achievements. - Abstract: High quality VO{sub 2} films with precisely controlled thickness were grown on p-GaN/sapphire substrates by oxide molecular beam epitaxy (O-MBE). Results indicated that a distinct reversible semiconductor-to-metal (SMT) phase transition was observed for all the samples in the temperature dependent electrical resistance measurement, and the influence of VO{sub 2} layer thickness on the SMT properties of the as-grown n-VO{sub 2}/p-GaN based nitride-oxide heterostructure was investigated. Meanwhile, the clear rectifying transport characteristics originated from the n-VO{sub 2}/p-GaN interface were demonstrated before and after SMT of the VO{sub 2} over layer, which were attributed to the p-n junction behavior and Schottky contact character, respectively. Moreover, the X-ray photoelectron spectroscopy (XPS) analyses confirmed the valence state of vanadium (V) in VO{sub 2} films was principally composed of V{sup 4+} with trace amount of V{sup 5+}. The design and modulation of the n-VO{sub 2}/p-GaN based heterostructure

  19. Electrochemical catalytic activity of tungsten trioxide- modified graphite felt toward VO2+/VO2+ redox reaction

    International Nuclear Information System (INIS)

    Shen, Yang; Xu, Hongfeng; Xu, Pengcheng; Wu, Xiaoxin; Dong, Yiming; Lu, Lu

    2014-01-01

    A novel graphite felt electrode modified with tungsten trioxide (WO 3 ) was developed to improve the electrochemical performance of graphite felt toward the VO 2 + /VO 2+ redox pair. WO 3 was prepared using a hydrothermal method, and the morphology of WO 3 structures was investigated by scanning electron microscopy (SEM) and X-ray diffraction (XRD). The electrochemical property of WO 3 -modified graphite felt toward VO 2 + /VO 2+ was carefully characterized using cyclic voltammetry (CV) and electrochemical impedance spectroscopy (EIS) measurements. The hydrogen-vanadium redox flow battery (H-VRFB) test indicates that single cells using 1.1 mg cm −2 WO 3 -modified graphite felt exhibited excellent performance at 70 mA cm −2 , and the corresponding coulombic, voltage, and energy efficiencies were 99.1%, 88.66% and 87.86%, respectively

  20. Security Risks in IP Telephony

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2010-01-01

    Full Text Available This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against SPIT attacks. AntiSPIT represents an effective protection based on statistical blacklist and works without participation of the called party which is a significant advantage.

  1. Design of a Secure System Considering Quality of Service

    Directory of Open Access Journals (Sweden)

    Seondong Heo

    2014-11-01

    Full Text Available Improvements in networking technologies have provided users with useful information services. Such information services may bring convenience and efficiency, but might be accompanied by vulnerabilities to a variety of attacks. Therefore, a variety of research to enhance the security of the systems and get the services at the same time has been carried out. Especially, research on intrusion-tolerant systems (ITSs has been conducted in order to survive against every intrusion, rather than to detect and prevent them. In this paper, an ITS based on effective resource conversion (ERC is presented to achieve the goal of intrusion-tolerance. Instead of using the fixed number of virtual machines (VMs to process requests and recover as in conventional approaches, the ITS based on ERC can transform the assigned resources depending on the system status. This scheme is proved to maintain a certain level of quality of service (QoS and quality of security service (QoSS in threatening environments. The performance of ERC is compared with previous studies on ITS by CSIM 20, and it is verified that the proposed scheme is more effective in retaining a specific level of QoS and QoSS.

  2. Improving the electrocatalytic performance of carbon nanotubes for VO{sup 2+}/VO{sub 2}{sup +} redox reaction by KOH activation

    Energy Technology Data Exchange (ETDEWEB)

    Dai, Lei; Jiang, Yingqiao; Meng, Wei; Zhou, Huizhu [School of Chemical Engineering, North China University of Science and Technology, Tangshan 063009 (China); Wang, Ling, E-mail: tswling@126.com [School of Chemical Engineering, North China University of Science and Technology, Tangshan 063009 (China); He, Zhangxing, E-mail: zxhe@ncst.edu.cn [School of Chemical Engineering, North China University of Science and Technology, Tangshan 063009 (China); State Key Laboratory Breeding Base of Nuclear Resources and Environment, East China Institute of Technology, Nanchang 330013 (China)

    2017-04-15

    Highlights: • KOH-activated carbon nanotubes (CNTs) was investigated as superior catalyst for VO{sup 2+}/VO{sub 2}{sup +} redox reaction for vanadium redox flow battery (VRFB) for the first time. • KOH activation for CNTs can result in the chemical etching of surface and improved wettability, accelerating the mass transfer of vanadium ions. • KOH activation can introduce many oxygen-containing groups as active sites on the surface of CNTs. • KOH-activated CNTs as positive catalyst could increase the comprehensive energy storage performance of VRFB. - Abstract: In this paper, carbon nanotubes (CNTs) was activated by KOH treatment at high temperature and investigated as catalyst for VO{sup 2+}/VO{sub 2}{sup +} redox reaction for vanadium redox flow battery (VRFB). X-ray photoelectron spectroscopy results suggest that the oxygen-containing groups can be introduced on CNTs by KOH activation. The mass transfer of vanadium ions can be accelerated by chemical etching by KOH activation and improved wettability due to the introduction of hydrophilic groups. The electrochemical properties of VO{sup 2+}/VO{sub 2}{sup +} redox reaction can be enhanced by introduced oxygen-containing groups as active sites. The sample treated at 900 °C with KOH/CNTs mass ratio of 3:1 (CNTs-3) exhibits the highest electrocatalytic activity for VO{sup 2+}/VO{sub 2}{sup +} redox reaction. The cell using CNTs-3 as positive catalyst demonstrates the smallest electrochemical polarization, the highest capacity and efficiency among the samples. Using KOH-activated CNTs-3 can increase the average energy efficiency of the cell by 4.4%. This work suggests that KOH-activated CNTs is a low-cost, efficient and promising catalyst for VO{sup 2+}/VO{sub 2}{sup +} redox reaction for VRFB system.

  3. A security modeling approach for web-service-based business processes

    DEFF Research Database (Denmark)

    Jensen, Meiko; Feja, Sven

    2009-01-01

    a transformation that automatically derives WS-SecurityPolicy-conformant security policies from the process model, which in conjunction with the generated WS-BPEL processes and WSDL documents provides the ability to deploy and run the complete security-enhanced process based on Web Service technology.......The rising need for security in SOA applications requires better support for management of non-functional properties in web-based business processes. Here, the model-driven approach may provide valuable benefits in terms of maintainability and deployment. Apart from modeling the pure functionality...... of a process, the consideration of security properties at the level of a process model is a promising approach. In this work-in-progress paper we present an extension to the ARIS SOA Architect that is capable of modeling security requirements as a separate security model view. Further we provide...

  4. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  5. Service task partition and distribution in star topology computer grid subject to data security constraints

    Energy Technology Data Exchange (ETDEWEB)

    Xiang Yanping [Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China (China); Levitin, Gregory, E-mail: levitin@iec.co.il [Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China (China); Israel electric corporation, P. O. Box 10, Haifa 31000 (Israel)

    2011-11-15

    The paper considers grid computing systems in which the resource management systems (RMS) can divide service tasks into execution blocks (EBs) and send these blocks to different resources. In order to provide a desired level of service reliability the RMS can assign the same blocks to several independent resources for parallel execution. The data security is a crucial issue in distributed computing that affects the execution policy. By the optimal service task partition into the EBs and their distribution among resources, one can achieve the greatest possible service reliability and/or expected performance subject to data security constraints. The paper suggests an algorithm for solving this optimization problem. The algorithm is based on the universal generating function technique and on the evolutionary optimization approach. Illustrative examples are presented. - Highlights: > Grid service with star topology is considered. > An algorithm for evaluating service reliability and data security is presented. > A tradeoff between the service reliability and data security is analyzed. > A procedure for optimal service task partition and distribution is suggested.

  6. Service task partition and distribution in star topology computer grid subject to data security constraints

    International Nuclear Information System (INIS)

    Xiang Yanping; Levitin, Gregory

    2011-01-01

    The paper considers grid computing systems in which the resource management systems (RMS) can divide service tasks into execution blocks (EBs) and send these blocks to different resources. In order to provide a desired level of service reliability the RMS can assign the same blocks to several independent resources for parallel execution. The data security is a crucial issue in distributed computing that affects the execution policy. By the optimal service task partition into the EBs and their distribution among resources, one can achieve the greatest possible service reliability and/or expected performance subject to data security constraints. The paper suggests an algorithm for solving this optimization problem. The algorithm is based on the universal generating function technique and on the evolutionary optimization approach. Illustrative examples are presented. - Highlights: → Grid service with star topology is considered. → An algorithm for evaluating service reliability and data security is presented. → A tradeoff between the service reliability and data security is analyzed. → A procedure for optimal service task partition and distribution is suggested.

  7. A security architecture for the ALICE grid services

    CERN Document Server

    Schreiner, Steffen; Buchmann, Johannes; Betev, Latchezar; Grigoras, Alina

    2012-01-01

    Globally distributed research cyberinfrastructures, like the ALICE Grid Services, need to provide traceability and accountability of operations and internal interactions. This document presents a new security architecture for the ALICE Grid Services, allowing to establish non-repudiation with respect to creatorship and ownership of Grid files and jobs. It is based on mutually authenticated and encrypted communication using X.509 Public Key Infrastructure and the Transport Layer Security (TLS) protocol. Introducing certified Grid file entries and signed Grid jobs by implementing a model of Mediated Definite Delegation it allows to establish long-term accountability concerning Grid jobs and files. Initial submissions as well as any alteration of Grid jobs are becoming verifiable and can be traced back to the originator. The architecture has been implemented as a prototype along with the development of a new central Grid middleware, called jAliEn.

  8. Grid Enabled Geospatial Catalogue Web Service

    Science.gov (United States)

    Chen, Ai-Jun; Di, Li-Ping; Wei, Ya-Xing; Liu, Yang; Bui, Yu-Qi; Hu, Chau-Min; Mehrotra, Piyush

    2004-01-01

    Geospatial Catalogue Web Service is a vital service for sharing and interoperating volumes of distributed heterogeneous geospatial resources, such as data, services, applications, and their replicas over the web. Based on the Grid technology and the Open Geospatial Consortium (0GC) s Catalogue Service - Web Information Model, this paper proposes a new information model for Geospatial Catalogue Web Service, named as GCWS which can securely provides Grid-based publishing, managing and querying geospatial data and services, and the transparent access to the replica data and related services under the Grid environment. This information model integrates the information model of the Grid Replica Location Service (RLS)/Monitoring & Discovery Service (MDS) with the information model of OGC Catalogue Service (CSW), and refers to the geospatial data metadata standards from IS0 19115, FGDC and NASA EOS Core System and service metadata standards from IS0 191 19 to extend itself for expressing geospatial resources. Using GCWS, any valid geospatial user, who belongs to an authorized Virtual Organization (VO), can securely publish and manage geospatial resources, especially query on-demand data in the virtual community and get back it through the data-related services which provide functions such as subsetting, reformatting, reprojection etc. This work facilitates the geospatial resources sharing and interoperating under the Grid environment, and implements geospatial resources Grid enabled and Grid technologies geospatial enabled. It 2!so makes researcher to focus on science, 2nd not cn issues with computing ability, data locztic, processir,g and management. GCWS also is a key component for workflow-based virtual geospatial data producing.

  9. Klasični (ekstenzivni) voćnjaci u Hrvatskoj

    OpenAIRE

    Čmelik, Zlatko

    2011-01-01

    Hrvatska ima vrlo povoljne pomoekološke uvjete za uzgoj voćaka. Tradicija uzgoja voćaka duga je više stoljeća, a voćke su se uzgajale na gotovo svim seoskim gospodarstvima, te dijelom i u urbanim sredinama. Intenzivan uzgoj voćaka počeo se značajnije širiti polovinom prošlog stoljeća. Intenzivan uzgoj je u određenoj mjeri potisnuo interes za klasičnim, ali se postojeći voćnjaci visokostablašica uglavnom nisu krčili već su u većoj mjeri bili zapušteni. U novije vrijeme klasični voćnjaci pon...

  10. Towards Formal Validation of Trust and Security of the Internet of Services

    DEFF Research Database (Denmark)

    Carbone, Roberto; Minea, Marius; Mödersheim, Sebastian Alexander

    2011-01-01

    Service designers and developers, while striving to meet the requirements posed by application scenarios, have a hard time to assess the trust and security impact of an option, a minor change, a combination of functionalities, etc., due to the subtle and unforeseeable situations and behaviors...... techniques to efficiently tackle industrial-size problems. The formal verification of trust and security of the Internet of Services will significantly boost its development and public acceptance....

  11. Denial-of-Service Security Attack in the Continuous-Time World

    DEFF Research Database (Denmark)

    Wang, Shuling; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -of-service security attack, the expected information from the controllers is not received and as a consequence the physical systems may fail to behave as expected. This paper proposes a formal framework for expressing denial-of-service security attack in hybrid systems. As a virtue, a physical system is able to plan......Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial...... for reasonable behavior in case the ideal control fails due to unreliable communication, in such a way that the safety of the system upon denial-of-service is still guaranteed. In the context of the modeling language, we develop an inference system for verifying safety of hybrid systems, without putting any...

  12. On the Design of the Peer-Assisted UGC VoD System

    Science.gov (United States)

    Wan, Yi; Asaka, Takuya; Takahashi, Tatsuro

    User Generated Content (UGC) VoD services such as YouTube are becoming more and more popular, and their maintenance costs are growing as well. Many P2P solutions have been proposed to reduce server load in such systems, but almost all of them focus on the single-video approach, which only has limited effect on the systems serving short videos such as UGC. The purpose of this paper is to investigate the potential of an alternative approach, the multi-video approach, and we use a very simple method called collaborative caching to show that methods using the multi-video approach are generally more suitable for current UGC VoD systems. We also study the influence of the major design factors through simulations and provide guidelines for efficiently building systems with this method.

  13. MOBILTEL - Mobile Multimodal Telecommunications dialogue system based on VoIP telephony

    Directory of Open Access Journals (Sweden)

    Anton Čižmár

    2009-10-01

    Full Text Available In this paper the project MobilTel ispresented. The communication itself is becoming amultimodal interactive process. The MobilTel projectprovides research and development activities inmultimodal interfaces area. The result is a functionalarchitecture for mobile multimodal telecommunicationsystem running on handheld device. The MobilTelcommunicator is a multimodal Slovak speech andgraphical interface with integrated VoIP client. Theother possible modalities are pen – touch screeninteraction, keyboard, and display on which theinformation is more user friendly presented (icons,emoticons, etc., and provides hyperlink and scrollingmenu availability.We describe the method of interaction between mobileterminal (PDA and MobilTel multimodal PCcommunicator over a VoIP WLAN connection basedon SIP protocol. We also present the graphicalexamples of services that enable users to obtaininformation about weather or information about trainconnection between two train stations.

  14. Topotactic insertion of lithium in the layered structure Li4VO(PO4)2: The tunnel structure Li5VO(PO4)2

    International Nuclear Information System (INIS)

    Satya Kishore, M.; Pralong, V.; Caignaert, V.; Malo, S.; Hebert, S.; Varadaraju, U.V.; Raveau, B.

    2008-01-01

    A new V(III) lithium phosphate Li 5 VO(PO 4 ) 2 has been synthesized by electrochemical insertion of lithium into Li 4 VO(PO 4 ) 2 . This phase, which crystallizes in the space group I4/mcm, exhibits a tunnel structure closely related to the layered structure of Li 4 VO(PO 4 ) 2 and to the tunnel structure of VO(H 2 PO 4 ) 2 . The topotactic reactions that take place during lithium exchange and intercalation, starting from VO(H 2 PO 4 ) 2 and going to the final phase Li 5 VO(PO 4 ) 2 are explained on the basis of the flexible coordinations of V 4+ and V 3+ species. The electrochemical and magnetic properties of this new phase are also presented and explained on the basis of the structure dimensionality. - Graphical abstract: Electrochemical synthesis of a new 3D V(III) lithium phosphate, Li 5 VO(PO 4 ) 2 . Starting from the 2D Li 4 VO(PO 4 ) 2 , the topotactic reaction that take place during lithium intercalation is explained on the basis of the flexible coordinations of V 4+ and V 3+ species

  15. Value of Lost Load: An Efficient Economic Indicator for Power Supply Security? A Literature Review

    Energy Technology Data Exchange (ETDEWEB)

    Schröder, Thomas, E-mail: t.schroeder@fz-juelich.de; Kuckshinrichs, Wilhelm [Institute of Energy and Climate Research – Systems Analysis and Technology Evaluation (IEK-STE), Forschungszentrum Jülich GmbH, Jülich (Germany)

    2015-12-24

    Security of electricity supply has become a fundamental requirement for well-functioning modern societies. Because of its central position in all sections of society, the present paper considers the economic consequences of a power supply interruption. The value of lost load (VoLL) is a monetary indicator expressing the costs associated with an interruption of electricity supply. This paper reviews different methods for calculating VoLL, provides an overview of recently published studies, and presents suggestions to increase the explanatory power and international comparability of VoLL.

  16. Synthesis, characterization and formation mechanism of metastable phase VO2(A) nanorods

    International Nuclear Information System (INIS)

    Cheng, X.H.; Xu, H.F.; Wang, Z.Z.; Zhu, K.R.; Li, G.; Jin, Shaowei

    2013-01-01

    Graphical abstract: - Highlights: • Pure phases of VO 2 (B) and VO 2 (A) were prepared by a facile hydrothermal method. • Belt-like particles prepared at 180 °C was indexed as monoclinic VO 2 (B) phase. • Rod-like particles prepared at 230 °C was indexed as tetragonal VO 2 (A) phase. • VO 2 (A) nanorods resulted from VO 2 (B) nanobelts by assembly and crystal adjustment. - Abstract: Pure phase VO 2 (A) nanorods were synthesized via the reduction of V 2 O 5 by oxalic acid during the hydrothermal treatment. Two sets of samples were prepared by varying both system temperature and reaction time under a filling ratio of 0.40 for observing the formation and evolution of VO 2 (A) nanorods. Structures were characterized by X-ray diffraction, scanning and transmission electron microscopies, respectively. It was found that VO 2 (B) was firstly formed and then transformed into VO 2 (A) as the increasing system temperature or extending reaction time. An assembling and following crystal adjustment was proposed for explanation the formation process of VO 2 (A) from VO 2 (B). For VO 2 (A) nanorods, the phase transition temperature of 169.7 °C was higher than that of the VO 2 (A) bulk, it might be ascribed to the lower crystallinity or nonstoichiometry in VO 2 (A) nanorods. VO 2 nanostructures with controllable phases and properties should find their promising applications in a single VO 2 nanodevice

  17. An end-to-end security auditing approach for service oriented architectures

    NARCIS (Netherlands)

    Azarmi, M.; Bhargava, B.; Angin, P.; Ranchal, R.; Ahmed, N.; Sinclair, A.; Linderman, M.; Ben Othmane, L.

    2012-01-01

    Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new security challenges not present in the single-hop client-server architectures due to the involvement

  18. Lattice relaxation and ferromagnetic character of (LaVO3)m/SrVO3 superlattices

    KAUST Repository

    Schuster, Cosima B.; Lü ders, Ulrike; Fré sard, Raymond; Schwingenschlö gl, Udo

    2013-01-01

    The experimental observation that vanadate superlattices (LaVO 3)m/SrVO3 show ferromagnetism up to room temperature (Lüders U. et al., Phys. Rev. B, 80 (2009) 241102(R)) is investigated by means of density functional theory, and the band structure for m = 5 and 6 is calculated. A buckling of the interface VO2 layers is found in both cases, but subtle differences in bond length lead to very different properties for even and odd values of m: in the even case, the two interface VO2 layers effectively decouple from the adjacent LaO layers due to a strong bond length enhancement. This results into a local inversion of the orbital occupancy and to the confinement of the charge carriers. In the odd case, the amplitude of the bond length variation is smaller, so that the charge carriers spill into the deeper-lying VO2 layers, and spin-polarised interfaces are obtained. © Copyright EPLA, 2013.

  19. WPSS: watching people security services

    Science.gov (United States)

    Bouma, Henri; Baan, Jan; Borsboom, Sander; van Zon, Kasper; Luo, Xinghan; Loke, Ben; Stoeller, Bram; van Kuilenburg, Hans; Dijk, Judith

    2013-10-01

    To improve security, the number of surveillance cameras is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams are observed. Intelligent software services can help to find people quickly, evaluate their behavior and show the most relevant and deviant patterns. We present a software platform that contributes to the retrieval and observation of humans and to the analysis of their behavior. The platform consists of mono- and stereo-camera tracking, re-identification, behavioral feature computation, track analysis, behavior interpretation and visualization. This system is demonstrated in a busy shopping mall with multiple cameras and different lighting conditions.

  20. SECURE SERVICE DISCOVERY BASED ON PROBE PACKET MECHANISM FOR MANETS

    Directory of Open Access Journals (Sweden)

    S. Pariselvam

    2015-03-01

    Full Text Available In MANETs, Service discovery process is always considered to be crucial since they do not possess a centralized infrastructure for communication. Moreover, different services available through the network necessitate varying categories. Hence, a need arises for devising a secure probe based service discovery mechanism to reduce the complexity in providing the services to the network users. In this paper, we propose a Secure Service Discovery Based on Probe Packet Mechanism (SSDPPM for identifying the DoS attack in MANETs, which depicts a new approach for estimating the level of trust present in each and every routing path of a mobile ad hoc network by using probe packets. Probing based service discovery mechanisms mainly identifies a mobile node’s genuineness using a test packet called probe that travels the entire network for the sake of computing the degree of trust maintained between the mobile nodes and it’s attributed impact towards the network performance. The performance of SSDPPM is investigated through a wide range of network related parameters like packet delivery, throughput, Control overhead and total overhead using the version ns-2.26 network simulator. This mechanism SSDPPM, improves the performance of the network in an average by 23% and 19% in terms of packet delivery ratio and throughput than the existing service discovery mechanisms available in the literature.

  1. Comparative study of optical and scintillation properties of YVO4, (Lu0.5Y0.5)VO4, and LuVO4 single crystals

    International Nuclear Information System (INIS)

    Fujimoto, Yutaka; Yanagida, Takayuki; Yokota, Yuui; Chani, Valery; Kochurikhin, Vladimir V.; Yoshikawa, Akira

    2011-01-01

    Optical and scintillation properties of YVO 4 , (Lu 0.5 Y 0.5 )VO 4 , and LuVO 4 single crystals grown by the Czochralski (CZ) method with RF heating system are compared. All vanadate crystals show high transmittance (∼80%) in the 400-900 nm wavelength range. In both photo- and radio-luminescence spectra, intense peak around 400-500 nm, which was ascribed to the transition from triplet state of VO 4 3- , was clearly observed. The main decay time component was about 38 μs (YVO 4 ), 18 μs ((Lu 0.5 Y 0.5 )VO 4 ), and 17 μs (LuVO 4 ) under 340 nm excitation. The scintillation light yields of YVO 4 , (Lu 0.5 Y 0.5 )VO 4 , and LuVO 4 crystals (obtained from the 137 Cs excited pulse height spectra) were evaluated to be about 11,200, 10,700, and 10,300 ph/MeV, respectively.

  2. Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP

    Science.gov (United States)

    Laghi, Maria Chiara; Amoretti, Michele; Conte, Gianni

    The effective convergence of service-oriented architectures (SOA) and peer-to-peer (P2P) is an urgent task, with many important applications ranging from e-business to ambient intelligence. A considerable standardization effort is being carried out from both SOA and P2P communities, but a complete platform for the development of secure, distributed applications is still missing. In this context, the result of our research and development activity is JXTA-SOAP, an official extension for JXTA enabling Web Service sharing in peer-to-peer networks. Recently we focused on security aspects, providing JXTA-SOAP with a general security management system, and specialized policies that target both J2SE and J2ME versions of the component. Among others, we implemented a policy based on Multimedia Internet KEYing (MIKEY), which can be used to create a key pair and all the required parameters for encryption and decryption of service messages in consumer and provider peers running on resource-constrained devices.

  3. Astroinformatics as a New Research Field. UkrVO Astroinformation Resources: Tasks and Prospective

    Science.gov (United States)

    Vavilova, I. B.

    The data-oriented astronomy has allowed classifying the Astroinformatics as a new academic research field, which covers various multi-disciplinary applications of the e-Astronomy. Among them are the data modeling, data mining, metadata standards development, data access, digital astronomical databases, image archives and visualization, machine learning, statistics and other computational methods and software for work with astronomical survey and catalogues with their teta- topeta-scale astroinformation resource. In this review we describe briefly the astroinformatics applications and software/services performed for different astronomical tasks in frame of the VIrtual Roentgen and Gamma Observatory (VIRGO) and Ukrainian VirtualObservatory (UkrVO). Among them there are projects based on the archival space-born data of X-ray and gamma space observatories and on the Joint Digitized Archive (JDA) database of astroplate network collections. The UkrVO JDA DR1 deals with the star catalogues (FON, Polar zone, open clusters, GRB star fields) as well as the UkrVO JDA DR2 deals with the Solar System bodies (giant and small planets, satellites, astronomical heritage images).

  4. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  5. The extended TRIP supporting VoIP routing reservation with distributed QoS

    Science.gov (United States)

    Wang, Furong; Wu, Ye

    2004-04-01

    In this paper, an existing protocol, i.e. TRIP (Telephony Routing over IP) is developed to provide distributed QoS when making resource reservations for VoIP services such as H.323, SIP. Enhanced LSs (location servers) are deployed in ITADs (IP Telephony Administrative Domains) to take in charge of intra-domain routing policy because of small propagation price. It is an easy way to find an IP telephone route for intra-domain VoIP media association and simultaneously possess intra-domain load balancing features. For those routing reservations bridging domains, inter-domain routing policy is responsible for finding the shortest inter-domain route with enough resources. I propose the routing preference policy based on QoS price when the session traffic is shaped by a token bucket, related QoS messages, and message cooperation.

  6. Electrospinning synthesis of InVO{sub 4}/BiVO{sub 4} heterostructured nanobelts and their enhanced photocatalytic performance

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Zhendong; Lu, Qifang, E-mail: luqf0110@126.com; Guo, Enyan; Liu, Suwen [Qilu University of Technology, Shandong Provincial Key Laboratory of Processing and Testing Technology of Glass and Functional Ceramics, School of Material Science and Engineering (China)

    2016-08-15

    In the present work, one-dimensional InVO{sub 4}/BiVO{sub 4} heterostructured nanobelts with the width of about 800 nm have been successfully prepared by a simple electrospinning technique followed by the subsequent calcination process. The prepared products were characterized by thermogravimetry, fourier transform infrared spectroscopy, X-ray diffraction, X-ray photoelectron spectroscopy, scanning electron microscopy, transmission electron microscopy, UV–Vis absorbance spectroscopy, high-performance liquid chromatography, and photoluminescence spectroscopy. The obtained InVO{sub 4}/BiVO{sub 4} heterostructured nanobelts presented an admirable morphology and excellent photocatalytic properties for the degradation of methylene blue solution under visible-light irradiation.Graphical AbstractThe electrospun precursor samples (a and b) displayed a well-defined one-dimensional (1D) belt structure. After calcined at 550 °C for 2 h (c and d), the samples can retain well the 1D morphology. And an obvious porous structure can be found from the TEM images of the calcined samples (e and f).

  7. Load control services in the management of power system security costs

    International Nuclear Information System (INIS)

    Jayantilal, A.; Strbac, G.

    1999-01-01

    The new climate of deregulation in the electricity industry is creating a need for a more transparent cost structure and within this framework the cost of system security has been a subject of considerable interest. Traditionally power system security has been supplied by out-of-merit generation, in the short term, and transmission reinforcement, in the long term. This paper presents a method of analysing the role of load-demand in the management of power system security costs by utilising load control services (LCS). It also proposes a competitive market to enable bidding from various participants within the electricity industry to supply system security. (author)

  8. Leveraging Service Oriented Architecture to Enhance Information Sharing for Surface Transportation Security

    Science.gov (United States)

    2008-09-01

    Fire and Emergency Management Services, Suffolk County Sheriff’s Department, the U.S. Attorney’s Office, the Bureau of Alcohol, Tobacco and Firearms...mass transit services. These include express and regular bus service, a downtown Skyway monorail , a trolley service and the Stadium Shuttle for various...safety related incidents rather than security, including transportation disruptions due to derailments, accidents, fires , hazardous materials spills

  9. Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection

    Science.gov (United States)

    Sepúlveda, Johanna; Pires, Ricardo; Strum, Marius; Chau, Wang Jiang

    Many of the current electronic systems embedded in a SoC (System-on-Chip) are used to capture, store, manipulate and access critical data, as well as to perform other key functions. In such a scenario, security is considered as an important issue. The Network-on-chip (NoC), as the foreseen communication structure of next-generation SoC devices, can be used to efficiently incorporate security. Our work proposes the implementation of QoSS (Quality of Security Service) to overcome present SoC vulnerabilities. QoSS is a novel concept for data protection that introduces security as a dimension of QoS. In this paper, we present the implementation of two security services (access control and authentication), that may be configured to assume one from several possible levels, the implementation of a technique to avoid denial-of-service (DoS) attacks, evaluate their effectiveness and estimate their impact on NoC performance.

  10. INFORMATION SECURITY AND SECURE SEARCH OVER ENCRYPTED DATA IN CLOUD STORAGE SERVICES

    OpenAIRE

    Mr. A Mustagees Shaikh *; Prof. Nitin B. Raut

    2016-01-01

    Cloud computing is most widely used as the next generation architecture of IT enterprises, that provide convenient remote access to data storage and application services. This cloud storage can potentially bring great economical savings for data owners and users, but due to wide concerns of data owners that their private data may be exposed or handled by cloud providers. Hence end-to-end encryption techniques and fuzzy fingerprint technique have been used as solutions for secure cloud data st...

  11. Quality of Security Service Costing Demonstration for the MSHN Project

    National Research Council Canada - National Science Library

    Spyropoulou, Evdoxia

    2000-01-01

    .... Each service has two costs: an initialization cost and a run-time cost. The demonstration illustrates the costs incurred as network modes and security levels are changed. High level and detailed specifications are provided.

  12. Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP

    Directory of Open Access Journals (Sweden)

    Schürmann Dominik

    2017-07-01

    Full Text Available Voice calls are still one of the most common use cases for smartphones. Often, sensitive personal information but also confidential business information is shared. End-to-end security is required to protect against wiretapping of voice calls. For such real-time communication, the ZRTP key-agreement protocol has been proposed. By verbally comparing a small number of on-screen characters or words, called Short Authentication Strings, the participants can be sure that no one is wiretapping the call. Since 2011, ZRTP is an IETF standard implemented in several VoIP clients.

  13. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security/United States Secret Service--003 Non-Criminal Investigation... Security/United States Secret Service--003 Non-Criminal Investigation Information System.'' As a result of... Secret Service, 245 Murray Lane SW., Building T-5, Washington, DC 20223. For privacy issues please...

  14. Flexible, Secure, and Reliable Data Sharing Service Based on Collaboration in Multicloud Environment

    Directory of Open Access Journals (Sweden)

    Qiang Wei

    2018-01-01

    Full Text Available Due to the abundant storage resources and high reliability data service of cloud computing, more individuals and enterprises are motivated to outsource their data to public cloud platform and enable legal data users to search and download what they need in the outsourced dataset. However, in “Paid Data Sharing” model, some valuable data should be encrypted before outsourcing for protecting owner’s economic benefits, which is an obstacle for flexible application. Specifically, if the owner does not know who (user will download which data files in advance and even does not know the attributes of user, he/she has to either remain online all the time or import a trusted third party (TTP to distribute the file decryption key to data user. Obviously, making the owner always remain online is too inflexible, and wholly depending on the security of TTP is a potential risk. In this paper, we propose a flexible, secure, and reliable data sharing scheme based on collaboration in multicloud environment. For securely and instantly providing data sharing service even if the owner is offline and without TTP, we distribute all encrypted split data/key blocks together to multiple cloud service providers (CSPs, respectively. An elaborate cryptographic protocol we designed helps the owner verify the correctness of data exchange bills, which is directly related to the owner’s economic benefits. Besides, in order to support reliable data service, the erasure-correcting code technic is exploited for tolerating multiple failures among CSPs, and we offer a secure keyword search mechanism that makes the system more close to reality. Extensive security analyses and experiments on real-world data show that our scheme is secure and efficient.

  15. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  16. Secure external access to CERN's services to replace VPN

    CERN Multimedia

    2005-01-01

    CERN has recently experienced several computer security incidents caused by people opening VPN connections and (unknown to them) allowing malicious software to enter CERN. VPN should be used to connect to CERN only in extreme and exceptional circumstances and it is formally discouraged as a general solution. If incidents continue, the availability of the service will need to be reviewed. Recommended methods of connecting to CERN from the Internet for common functionalities such as e-mail, access to CERN web or file servers and interactive sessions on CERN systems are described at http://cern.ch/security/vpn

  17. Enhancing Experiment Central Service Reliability: from delivery to security and virtualization

    CERN Document Server

    Donno, Flavia; Buzykaev, Alexey; Saiz Santos, Maria Dolores

    2011-01-01

    The four LHC experiments rely on experiment specific services running on machines mainly located at CERN. Some of these services have been rated by the experiments as very critical: any loss or degradation of performance has a major impact on the experiment's production and analysis activities. It is therefore important to provide a reliable and robust operational environment. In this work we describe the strategy based on service deployment, security and virtualization adopted to enhance the reliability of ATLAS and CMS central services.

  18. Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services.

    Science.gov (United States)

    Shi, Yang; Fan, Hongfei; Xiong, Guoyue

    2015-01-01

    With the rapid development of cloud computing techniques, it is attractive for personal health record (PHR) service providers to deploy their PHR applications and store the personal health data in the cloud. However, there could be a serious privacy leakage if the cloud-based system is intruded by attackers, which makes it necessary for the PHR service provider to encrypt all patients' health data on cloud servers. Existing techniques are insufficiently secure under circumstances where advanced threats are considered, or being inefficient when many recipients are involved. Therefore, the objectives of our solution are (1) providing a secure implementation of re-encryption in white-box attack contexts and (2) assuring the efficiency of the implementation even in multi-recipient cases. We designed the multi-recipient re-encryption functionality by randomness-reusing and protecting the implementation by obfuscation. The proposed solution is secure even in white-box attack contexts. Furthermore, a comparison with other related work shows that the computational cost of the proposed solution is lower. The proposed technique can serve as a building block for supporting secure, efficient and privacy-preserving personal health record service systems.

  19. Hydrothermal synthesis and electrochemical characterization of VO2 (B) with controlled crystal structures

    International Nuclear Information System (INIS)

    Jiang Wentao; Ni Juan; Yu Ke; Zhu Ziqiang

    2011-01-01

    Three different VO 2 (B) nanostructures, including urchin-like VO 2 (B), VO 2 (B) honeycombs and VO 2 (B) nanorods have been successfully fabricated through hydrothermal process by adjusting the concentrations of the oxalic acid. The microstructure and morphology of the VO 2 nanostructures were evaluated by using X-ray diffraction and scanning and transmission electron microscopies. Electrochemical properties measurements of urchin-like VO 2 (B) and VO 2 (B) honeycombs showed excellent cycling performance, especially the urchin-like VO 2 (B) exhibited higher discharge capacity and better capacity retention.

  20. Sense of security felt by the armed police with different service length and influential factors

    Directory of Open Access Journals (Sweden)

    Jing CHEN

    2011-02-01

    Full Text Available Objective To investigate the status of sense of security felt by the armed police and the influential factors thereof.Methods The sense of security,stress level,comprehension of social supports and the coping styles were measured and evaluated by use of Security Questionnaire(SQ,Psychological Stress Self-Evaluation Test(PSET,Perceived Social Support Scale(PSSS and Coping Style Scale(CSS in 725 armed police,and the differences were compared between the servicemen with different service length(1,2 and 3 years.The correlation between security sense(expressed as personal safety and determination of control and comprehension of social supports,coping styles and T score on stress level were analyzed.A stepwise regression analysis was done to screen the factors influencing the security sense of servicemen with the overall score of security sense as the dependent variable and the comprehension of social supports(expressed as inside-and outside-family support,coping styles(expressed as illusion,resignation,rationalization,self-condemned determinant,resort and problem-solving capacity and T score on stress level as the independent variables.Results Compared with the armed police with 1 year of military service,those with 2 or 3 years of military service got lower scores in personal safety,determination of control,inside-and outside-family support,and resort and problem-solving capacity(P 0.05.The two factors of comprehension of social supports(inside-and outside-family support,and the two factors of coping styles(resort and problem-solving capacity were positively correlated with the sense of security(personal safety and determination of control(P < 0.001;while the four factors of coping styles(illusion,resignation,rationalization and self-condemned determinant and the T score on stress level were negatively correlated with the sense of security(P < 0.001.It was proved by multivariate linear regression analysis that outside-family support

  1. ITIL Based Service Level Management if SLAs Cover Security

    Directory of Open Access Journals (Sweden)

    Tomas Feglar

    2005-08-01

    Full Text Available Current level of information technology creates new perspectives for more IT service oriented market. Quality of these services requires slightly different approach then was applied for products including software. No IT services are delivered and supported in risk free environment. Risks would be considered consistently with IT services quality gaps from Service Level Management (SLM perspective. SLM is one of ITIL modules that are widely used within the IT service industry. We identified some weaknesses in how SLM is developed in ITIL environment if service level agreement (SLA has cover Security. We argue that in such cases Architecture modeling and risk assessment approach let us effectively control analytical effort that relates to risks identification and understanding. Risk driven countermeasures designed in a next step (Risk treatment have significant impact to the SLM especially from responsibility perspective. To demonstrate SLM's importance in real practice we analyze SLA synthesize process in CCI (Cyber Critical Infrastructure environment.

  2. Graphene/VO2 hybrid material for high performance electrochemical capacitor

    International Nuclear Information System (INIS)

    Deng, Lingjuan; Zhang, Gaini; Kang, Liping; Lei, Zhibin; Liu, Chunling; Liu, Zong-Huai

    2013-01-01

    Graphical abstract: Graphene/VO 2 hybrid materials are prepared by one-step simultaneous hydrothermal reduction technology. The prepared graphene (1.0)/VO 2 hybrid material shows a specific capacitances of 225 F g −1 in 0.5 mol L −1 K 2 SO 4 solution. Furthermore, an asymmetric electrochemical capacitor with graphene (1.0)/VO 2 as a positive electrode and graphene as a negative electrode is assembled, and it can work in a cell voltage of 1.7 V and show excellent capacitive property. - Highlights: • Graphene/VO 2 hybrid material has been prepared by one-step hydrothermal reduction. • Graphene/VO 2 hybrid material exhibits high specific capacitance. • An asymmetric capacitor working at 1.7 V in aqueous solution is assembled based on graphene/VO 2 electrode. • The asymmetric capacitor exhibits high energy density. - Abstract: Vanadium oxides have attracted significant attention for electrochemical capacitor because of their extensive multifunctional properties. In the present work, graphene/VO 2 (RG/VO 2 ) hybrid materials with different RG amounts are prepared in a mixture of ammonium vanadate, formic acid and graphite oxide (GO) nanosheets by one-step simultaneous hydrothermal reduction technology. The hydrothermal treatment makes the reduction of GO into RG and the formation of VO 2 particles with starfruit morphology. The starfruit-like VO 2 particles are uniformly embedded in the hole constructed by RG nanosheets, which makes the electrode–electrolyte contact better. A high specific capacitance of 225 F g −1 has been achieved for RG(1.0)/VO 2 electrode with RG content of 26 wt% in 0.5 mol L −1 K 2 SO 4 electrolyte. An asymmetrical electrochemical capacitor is assembled by using RG(1.0)/VO 2 as positive electrode and RG as negative electrode, and it can be reversibly charged–discharged at a cell voltage of 1.7 V in 0.5 mol L −1 K 2 SO 4 electrolyte. The asymmetrical capacitor can deliver an energy density of 22.8 Wh kg −1 at a power density

  3. Electrocatalytic activity of cobalt phosphide-modified graphite felt toward VO2+/VO2+ redox reaction

    Science.gov (United States)

    Ge, Zhijun; Wang, Ling; He, Zhangxing; Li, Yuehua; Jiang, Yingqiao; Meng, Wei; Dai, Lei

    2018-04-01

    A novel strategy for improving the electro-catalytic properties of graphite felt (GF) electrode in vanadium redox flow battery (VRFB) is designed by depositing cobalt phosphide (CoP) onto GF surface. The CoP powder is synthesized by direct carbonization of Co-based zeolitic imidazolate framework (ZIF-67) followed by phosphidation. Cyclic voltammetry results confirm that the CoP-modified graphite felt (GF-CoP) electrode has excellent reversibility and electro-catalytic activity to the VO2+/VO2+ cathodic reaction compared with the pristine GF electrode. The cell using GF-CoP electrode shows apparently higher discharge capacity over that based on GF electrode. The cell using GF-CoP electrode has the capacity of 67.2 mA h at 100 mA cm-2, 32.7 mA h larger than that using GF electrode. Compared with cell using GF electrode, the voltage efficiency of the cell based on GF-CoP electrode increases by 5.9% and energy efficiency by 5.4% at a current density of 100 mA cm-2. The cell using GF-CoP electrode can reach 94.31% capacity retention after 50 cycles at a current density of 30 mA cm-2. The results show that the CoP can effectively promote the VO2+/VO2+ redox reaction, implying that metal phosphides are a new kind of potential catalytic materials for VRFB.

  4. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  5. The influence of charge transfers effects in monazite-type LaVO{sub 4} and perovskite-type LaVO{sub 3} prepared by sol-gel acrylamide polymerization

    Energy Technology Data Exchange (ETDEWEB)

    Herrera-Pérez, G., E-mail: guillermo.herrera@cimav.edu.mx [CONACYT Research Fellow. Centro de Investigación en Materiales Avanzados (CIMAV), Miguel de Cervantes 120, Chihuahua 31136, Chihuahua (Mexico); Jiménez-Mier, J. [Instituto de Ciencias Nucleares, Universidad Nacional Autónoma de México, 04510 Mexico D. F (Mexico); Yang, W.-L. [The Advanced Light Source, Lawrence Berkeley National Laboratory, Berkeley, CA 94720 (United States); Reyes-Rojas, A.; Fuentes-Cobas, L.E. [Department of Physics of Materials Department. Centro de Investigación en Materiales Avanzados (CIMAV), Miguel de Cervantes 120, Chihuahua 31136, Chihuahua (Mexico)

    2016-08-15

    Highlights: • We elucidate the electronic structure through the vanadium L{sub 2,3} edge in LaVO{sub 4} by XAS. • The interpretation of XAS spectrum was performed by the multiplet calculation. • Our results suggest that LaVO{sub 4} can be considered in the charge transfer regime. - Abstract: Core-hole spectroscopy such as X-ray absorption spectroscopy (XAS) is useful to determine the electronic structure of strongly correlated and strongly hybridized compounds such as vanadates. Monazite-type LaVO{sub 4} and perovskite-type LaVO{sub 3} are good candidates to elucidate the electronic structure through the vanadium L{sub 2,3} edge. LaVO{sub 4} was prepared by sol-gel acrylamide polymerization and solid-state reaction. LaVO{sub 3} was obtained by reduction of LaVO{sub 4} using Zr as gatherer. Monoclinic crystal phase for LaVO{sub 4} and orthorhombic crystal phase for LaVO{sub 3} were confirmed by the Rietveld refinement of X-ray diffraction patterns. XAS comparison between Vanadium L{sub 2,3} edge confirms the presence of V{sup 5+} for the monazite and V{sup 3+} for the orthorhombic perovskite. Multiplet calculations including crystal field and charge transfer effects (CTM) were performed in order to elucidate the tetragonal (D{sub 4h} symmetry) parameters Dq, Ds and Dt, the charge transfer energy Δ, and d-d Coulomb repulsion energy U parameters. CTM confirms for LaVO{sub 3} the strong V 3d–O 2p hybridization with a significant contribution of covalent character due to the delocalization of 3d electrons. For LaVO{sub 4} this work suggest the reclassification of this band insulator as charge transfer insulator that shows a significant contribution of ionic character.

  6. 20 CFR 404.1402 - When are railroad industry services by a non-vested worker covered under Social Security?

    Science.gov (United States)

    2010-04-01

    ...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...

  7. BiVO4 nanoparticles: Preparation, characterization and photocatalytic activity

    Directory of Open Access Journals (Sweden)

    Venkataraman Sivakumar

    2015-12-01

    Full Text Available Bismuth vanadate (BiVO4 nanoparticles were synthesized by a simple thermal decomposition method. The synthesized bismuth vanadate nanoparticles were characterized by X-ray diffraction analysis, it is found that the synthesized sample belongs to monoclinic BiVO4. Fourier transform infrared spectroscopy confirms the formation of Bi-O bond in the sample. Ultraviolet–Visible (DRS-UV–Visible spectroscopy and photoluminescence spectroscopy reveal the optical property of the BiVO4 nanoparticles. The morphology was identified by both scanning electron microscopy and high-resolution transmission electron microscopy. Further, the photocatalytic activity of BiVO4 nanoparticles was investigated by photodegradation of methylene blue as a model organic pollutant.

  8. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  9. Long-term energy services security: What is it and how can it be measured and valued?

    International Nuclear Information System (INIS)

    Jansen, Jaap C.; Seebregts, Ad J.

    2010-01-01

    The paper reviews some recent approaches towards measuring the extent of long-term energy security and security externality valuation. It starts out to discuss the contextual connotations of notions of 'energy security' in medium to long-term time frames and reviews some indicators that have been proposed to quantify it. Special attention is paid to two of these approaches, which the authors helped to develop, i.e. diversity-based indices and the Supply/Demand Index. The paper takes issue with conventional welfare economic approaches that neglect: (i) the scope on the demand side for raising security and (ii) negative feedback mechanisms of socio-political impacts of international rent transfers in fossil fuels exporting countries. The concept of energy services security is proposed with a demand-side focus. This enables application of an integrated approach to gauge the resilience of a society to meet the needs of its population for energy services over longer timescales ahead from various interrelated perspectives. Propositions are made on the attribution of security externalities to the use of fossil fuels, policies, and suggestions for further improvements of measures for energy services security.

  10. How to securely replicate services (preliminary version)

    Science.gov (United States)

    Reiter, Michael; Birman, Kenneth

    1992-01-01

    A method is presented for constructing replicated services that retain their availability and integrity despite several servers and clients being corrupted by an intruder, in addition to others failing benignly. More precisely, a service is replicated by 'n' servers in such a way that a correct client will accept a correct server's response if, for some prespecified parameter, k, at least k servers are correct and fewer than k servers are correct. The issue of maintaining causality among client requests is also addressed. A security breach resulting from an intruder's ability to effect a violation of causality in the sequence of requests processed by the service is illustrated. An approach to counter this problem is proposed that requires that fewer than k servers are corrupt and, to ensure liveness, that k is less than or = n - 2t, where t is the assumed maximum total number of both corruptions and benign failures suffered by servers in any system run. An important and novel feature of these schemes is that the client need not be able to identify or authenticate even a single server. Instead, the client is required only to possess at most two public keys for the service.

  11. Improving the Accuracy of Predicting Maximal Oxygen Consumption (VO2pk)

    Science.gov (United States)

    Downs, Meghan E.; Lee, Stuart M. C.; Ploutz-Snyder, Lori; Feiveson, Alan

    2016-01-01

    Maximal oxygen (VO2pk) is the maximum amount of oxygen that the body can use during intense exercise and is used for benchmarking endurance exercise capacity. The most accurate method to determineVO2pk requires continuous measurements of ventilation and gas exchange during an exercise test to maximal effort, which necessitates expensive equipment, a trained staff, and time to set-up the equipment. For astronauts, accurate VO2pk measures are important to assess mission critical task performance capabilities and to prescribe exercise intensities to optimize performance. Currently, astronauts perform submaximal exercise tests during flight to predict VO2pk; however, while submaximal VO2pk prediction equations provide reliable estimates of mean VO2pk for populations, they can be unacceptably inaccurate for a given individual. The error in current predictions and logistical limitations of measuring VO2pk, particularly during spaceflight, highlights the need for improved estimation methods.

  12. OpenID connect as a security service in Cloud-based diagnostic imaging systems

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghi, Hassan; Koff, David; Bak, Peter

    2015-03-01

    The evolution of cloud computing is driving the next generation of diagnostic imaging (DI) systems. Cloud-based DI systems are able to deliver better services to patients without constraining to their own physical facilities. However, privacy and security concerns have been consistently regarded as the major obstacle for adoption of cloud computing by healthcare domains. Furthermore, traditional computing models and interfaces employed by DI systems are not ready for accessing diagnostic images through mobile devices. RESTful is an ideal technology for provisioning both mobile services and cloud computing. OpenID Connect, combining OpenID and OAuth together, is an emerging REST-based federated identity solution. It is one of the most perspective open standards to potentially become the de-facto standard for securing cloud computing and mobile applications, which has ever been regarded as "Kerberos of Cloud". We introduce OpenID Connect as an identity and authentication service in cloud-based DI systems and propose enhancements that allow for incorporating this technology within distributed enterprise environment. The objective of this study is to offer solutions for secure radiology image sharing among DI-r (Diagnostic Imaging Repository) and heterogeneous PACS (Picture Archiving and Communication Systems) as well as mobile clients in the cloud ecosystem. Through using OpenID Connect as an open-source identity and authentication service, deploying DI-r and PACS to private or community clouds should obtain equivalent security level to traditional computing model.

  13. Mobile telephones: a comparison of radiated power between 3G VoIP calls and 3G VoCS calls.

    Science.gov (United States)

    Jovanovic, Dragan; Bragard, Guillaume; Picard, Dominique; Chauvin, Sébastien

    2015-01-01

    The purpose of this study is to assess the mean RF power radiated by mobile telephones during voice calls in 3G VoIP (Voice over Internet Protocol) using an application well known to mobile Internet users, and to compare it with the mean power radiated during voice calls in 3G VoCS (Voice over Circuit Switch) on a traditional network. Knowing that the specific absorption rate (SAR) is proportional to the mean radiated power, the user's exposure could be clearly identified at the same time. Three 3G (High Speed Packet Access) smartphones from three different manufacturers, all dual-band for GSM (900 MHz, 1800 MHz) and dual-band for UMTS (900 MHz, 1950 MHz), were used between 28 July and 04 August 2011 in Paris (France) to make 220 two-minute calls on a mobile telephone network with national coverage. The places where the calls were made were selected in such a way as to describe the whole range of usage situations of the mobile telephone. The measuring equipment, called "SYRPOM", recorded the radiation power levels and the frequency bands used during the calls with a sampling rate of 20,000 per second. In the framework of this study, the mean normalised power radiated by a telephone in 3G VoIP calls was evaluated at 0.75% maximum power of the smartphone, compared with 0.22% in 3G VoCS calls. The very low average power levels associated with use of 3G devices with VoIP or VoCS support the view that RF exposure resulting from their use is far from exceeding the basic restrictions of current exposure limits in terms of SAR.

  14. Potassium vanadium selenite, K(VO2)3(SeO3)2

    International Nuclear Information System (INIS)

    Harrison, W.T.A.; Dussack, L.L.; Jacobson, A.J.

    1995-01-01

    The hydrothermal synthesis and single-crystal structure of potassium vanadium(V) selenite, K(VO 2 ) 3 (SeO 3 ) 2 , are reported. K(VO 2 ) 3 (SeO 3 ) 2 is a layered phase based on a hexagonal tungsten-oxide-like array of corner-sharing VO 6 octahedra capped by Se atoms, and is isostructural with NH 4 (VO 2 ) 3 (SeO 3 ) 2 . (orig.)

  15. PKI-based secure mobile access to electronic health services and data.

    Science.gov (United States)

    Kambourakis, G; Maglogiannis, I; Rouskas, A

    2005-01-01

    Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.

  16. Practical Aspects of Outsourcing as a Mean of Security Service Provision

    Directory of Open Access Journals (Sweden)

    D.B. Frolov

    2012-06-01

    Full Text Available The article highlights the implementation of outsourcing as a mean of service for security provision. Analysis is performed to describe the current issues affecting the management decision in favor of outsourcing. Investigation covers the processes of physical, information and economical security. The main recommendations to use outsourcing for security provision are described in the conclusion. With the development of mobile technology protecting of user data becomes more and more important. The article is dedicated to the vulnerability of devices running on the iOS platform, potentially allowing an attacker to obtain information about the movements of their owners, and suggests ways to protect against these attacks.

  17. Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

    OpenAIRE

    Preeti Barrow; Runni Kumari; Prof. Manjula R

    2016-01-01

    Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with almost no investment in new framework, training new staff, or authorizing new software. Though today everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security assurance to its customers and therefore, businesses are h...

  18. Research progress of VO2 thin film as laser protecting material

    Science.gov (United States)

    Liu, Zhiwei; Lu, Yuan; Hou, Dianxin

    2018-03-01

    With the development of laser technology, the battlefield threat of directional laser weapons is becoming more and more serious. The blinding and destruction caused by laser weapons on the photoelectric equipment is an important part of the current photo-electronic warfare. The research on the defense technology of directional laser weapons based on the phase transition characteristics of VO2 thin films is an important subject. The researches of VO2 thin films are summarized based on review these points: the preparation methods of VO2 thin films, phase transition mechanism, phase transition temperature regulating, interaction between VO2 thin films and laser, and the application prospect of vo2 thin film as laser protecting material. This paper has some guiding significance for further research on the VO2 thin films in the field of defense directional laser weapons.

  19. A Framework for Smart Home Services with Secure and QoS-aware Communications

    Directory of Open Access Journals (Sweden)

    Markus Hager

    2013-01-01

    Full Text Available The scenario of smart home services will be discussed with regard to two important aspects: the quality of service problem for the in-house communication and the need for a security scheme for the whole system. We focus on an installation with smart computers in each flat interconnected using a switched Ethernet network. These smart devices are responsible for performing local services, user control and operate as a gateway for the different types of sensor and actor networks installed at each flat. We propose a QoS scheme to prevent congestion situation for the Ethernet network which is applicable to currently available cost-sensitive hardware. Furthermore, the whole system, all communication channels, user data and the access to the framework are secured by our proposed security architecture. Finally, we will present the latest improvements on Ethernet network standards, the ongoing work on this topics and our next steps for future work.

  20. Enforcement of Security and Privacy in a Service-Oriented Smart Grid

    DEFF Research Database (Denmark)

    Mikkelsen, Søren Aagaard

    inhabitants. With the vision, it is therefore necessity to enforce privacy and security of the data in all phases of its life cycle. The life cycle starts from acquiring the data to it is stored. Therefore, this dissertation follows a system-level and application-level approach to manage data with respect...... to privacy and security. This includes first a design of a service-oriented architecture that allows for the deployment of home-oriented and grid-oriented IASs on a Home Energy Management System (HEMS) and in the cloud, respectively. Privacy and security of electricity data are addressed by letting...... the residential consumer control data dissemination in a two-stage process: first from the HEMS to the cloud and from the cloud to the IASs. Then the dissertation focuses on the critical phases in securing the residential home as well as securing the cloud. It presents a system-level threat model of the HEMS...

  1. ) m /SrVO3 ( m = 5, 6) Superlattices

    KAUST Repository

    Dai, Qingqing; Lü ders, Ulrike; Fré sard, Raymond; Eckern, Ulrich; Schwingenschlö gl, Udo

    2018-01-01

    The (LaV3+O3)m/SrV4+O3 (m = 5, 6) superlattices are investigated by first principles calculations. While bulk LaVO3 is a C‐type antiferromagnetic semiconductor and bulk SrVO3 is a paramagnetic metal, semiconducting A‐type antiferromagnetic states

  2. 77 FR 54910 - Media Bureau Seeks Comment on TiVo's Request for Clarification and Waiver of the Commission's...

    Science.gov (United States)

    2012-09-06

    ... provides for audiovisual communications including service discovery, video transport, and remote control... TiVo's Request for Clarification and Waiver of the Commission's Audiovisual Output Requirement AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: In this document, the Media Bureau seeks...

  3. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  4. Secure Service Oriented Architectures (SOA) Supporting NEC [Architecture orientée service (SOA) gérant la NEC

    NARCIS (Netherlands)

    Meiler, P.P.; Schmeing, M.

    2009-01-01

    Combined scenario ; Data management ; Data processing ; Demonstrator ; Information systems ; Integrated systems ; Interoperability ; Joint scenario ; Network Enabled Capability (NEC) ; Operational effectiveness ; Operations research ; Scenarios ; Secure communication ; Service Oriented Architecture

  5. Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech

    Directory of Open Access Journals (Sweden)

    David Irwin

    2012-09-01

    Full Text Available The Voice over Internet Protocol (VoIP is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces in a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required.  This research investigates the analysis and recovery of digitised human, which persists in computer memory after a VoIP call.This paper proposes a proof of concept how remnants of digitised human speech from a VoIP call may be identified within a forensic memory capture based on how the human voice is detected via a microphone and encoded to a digital format using the sound card of your personal computer. This digital format is unencrypted whist processed in Random Access Memory (RAM before it is passed to the VoIP application for encryption and  transmission over the Internet. Similarly, an incoming encrypted VoIP call is decrypted by the VoIP application and passes through RAM unencrypted in order to be played via the speaker output.A series of controlled tests were undertaken whereby RAM captures were analysed for remnants of digital speech after a VoIP audio call with known conversation. The identification and analysis of digital speech from RAM attempts to construct an automatic process for the identification and subsequent reconstruction of the audio content of a VoIP call.

  6. Synthesis and modification of FeVO_4 as novel anode for lithium-ion batteries

    International Nuclear Information System (INIS)

    Liu, Xiaolin; Cao, Yuancheng; Zheng, Hao; Chen, Xiao; Feng, Chuanqi

    2017-01-01

    Graphical abstract: The FeVO_4/graphene are synthesized by combining hydrothermal and heat treatment method. It delivered an initial discharge capacity of 1302.3 mAh g"−"1 and remained capacity as 1046.5 mAh g"−"1 after 100 cycles and behaved better electrochemical properties than that of pure FeVO_4. - Highlights: • The FeVO_4 and FeVO_4/graphene are synthesized by combining hydrothermal and heat treatment method. • The FeVO_4/graphene nanocomposite exhibits outstanding electrochemical performance. • FeVO_4/graphene delivered an initial discharge capacity of 1302.3 mAh g"−"1 and remained capacity as 1046.5 mAh g"−"1 after 100 cycles. • The FeVO_4/graphene composite behaved better electrochemical properties than that of pure FeVO_4. - Abstract: FeVO_4 and FeVO_4/graphene nanorods were synthesized successfully by combining a facile hydrothermal and heat treatment method. The samples were characterized by X-ray diffraction (XRD), scanning electronic microscopy (SEM) and transmission electron microscopy (TEM) techniques. The content of graphene in FeVO_4/graphene was determined by thermogravimetric analysis (TG). The electrochemical properties of the samples were also investigated by battery testing system. The results showed that the FeVO_4 formed were taken on morphology of nanorods with the length between 0.5 and 1 μm and the diameter in range of 50 to 100 nm. Besides, the size of FeVO_4/graphene was smaller than that of pure FeVO_4. The content of graphene in composite was about 25.0% by weight. The reversible discharge capacities of FeVO_4 and FeVO_4/graphene were 405.2 mAh g"−"1 and 1046.5 mAh g"−"1 separately after 100 cycles at the current density of 100 mAh g"−"1 in the voltage range of 0.01–3 V. The reasons for the FeVO_4/graphene composite to behave outstanding electrochemical properties were also discussed. The FeVO_4/graphene composite can be a novel and promising anode material for lithium ion battery application.

  7. Lattice effects in HoVo(3) single crystal

    NARCIS (Netherlands)

    Sikora, M.; Marquina, C.; Ibarra, M. R.; Nugroho, A. A.; Palstra, T. T. M.

    We report the study of lattice effects in the Mott insulator HoVO3 performed by means of linear thermal expansion on a single crystal in the temperature range 10-290 K. The holmium orthovanadate HoVO3 reveals gradual orbital ordering (OO) below T-OO = 200K and orders antiferromagnetically at T-N =

  8. Scalable Security and Accounting Services for Content-Based Publish/Subscribe Systems

    OpenAIRE

    Himanshu Khurana; Radostina K. Koleva

    2006-01-01

    Content-based publish/subscribe systems offer an interaction scheme that is appropriate for a variety of large-scale dynamic applications. However, widespread use of these systems is hindered by a lack of suitable security services. In this paper, we present scalable solutions for confidentiality, integrity, and authentication for these systems. We also provide verifiable usage-based accounting services, which are required for e-commerce and e-business applications that use publish/subscribe ...

  9. Water Security and Services in the Caribbean

    Directory of Open Access Journals (Sweden)

    Adrian Cashman

    2014-05-01

    Full Text Available The efficient management of water resources and services continues to be a concern in many of the small island states of the Caribbean. There are growing concerns over the ability of governments in the region to ensure the good management and provision of water without jeopardizing economic growth and the maintenance of social well-being. This paper provides an overview of the major factors influencing the water security facing the Caribbean Region and how the emerging concerns are being addressed. The key challenges and vulnerabilities may be summarized as lack of data and barriers to making available what information there is. Forward planning has been largely neglected and is symptomatic of a lack of appreciation of the need for having national water policies. In this respect Jamaica’s development of a national master water plan serves as a good example of what is needed. Water service providers have to be efficient, well managed and allowed to do their job. This means that they have to be on a sound financial footing. The challenge is to find the balance between appropriate political and regulatory oversight and the autonomy of water managers and service providers.

  10. Secure positioning technique based on encrypted visible light map for smart indoor service

    Science.gov (United States)

    Lee, Yong Up; Jung, Gillyoung

    2018-03-01

    Indoor visible light (VL) positioning systems for smart indoor services are negatively affected by both cochannel interference from adjacent light sources and VL reception position irregularity in the three-dimensional (3-D) VL channel. A secure positioning methodology based on a two-dimensional (2-D) encrypted VL map is proposed, implemented in prototypes of the specific positioning system, and analyzed based on performance tests. The proposed positioning technique enhances the positioning performance by more than 21.7% compared to the conventional method in real VL positioning tests. Further, the pseudonoise code is found to be the optimal encryption key for secure VL positioning for this smart indoor service.

  11. Practical Secure Transaction for Privacy-Preserving Ride-Hailing Services

    Directory of Open Access Journals (Sweden)

    Chenglong Cao

    2018-01-01

    Full Text Available Ride-hailing service solves the issue of taking a taxi difficultly in rush hours. It is changing the way people travel and has had a rapid development in recent years. Since the service is offered over the Internet, there is a great deal of uncertainty about security and privacy. Focusing on the issue, we changed payment pattern of existing systems and designed a privacy protection ride-hailing scheme. E-cash was generated by a new partially blind signature protocol that achieves e-cash unforgeability and passenger privacy. Particularly, in the face of a service platform and a payment platform, a passenger is still anonymous. Additionally, a lightweight hash chain was constructed to keep e-cash divisible and reusable, which increases practicability of transaction systems. The analysis shows that the scheme has small communication and computation costs, and it can be effectively applied in the ride-hailing service with privacy protection.

  12. Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers.

    Science.gov (United States)

    de la Torre-Díez, Isabel; Lopez-Coronado, Miguel; Garcia-Zapirain Soto, Begonya; Mendez-Zorrilla, Amaia

    2015-07-27

    The combination of eHealth applications and/or services with cloud technology provides health care staff—with sufficient mobility and accessibility for them—to be able to transparently check any data they may need without having to worry about its physical location. The main aim of this paper is to put forward secure cloud-based solutions for a range of eHealth services such as electronic health records (EHRs), telecardiology, teleconsultation, and telediagnosis. The scenario chosen for introducing the services is a set of four rural health centers located within the same Spanish region. iCanCloud software was used to perform simulations in the proposed scenario. We chose online traffic and the cost per unit in terms of time as the parameters for choosing the secure solution on the most optimum cloud for each service. We suggest that load balancers always be fitted for all solutions in communication together with several Internet service providers and that smartcards be used to maintain identity to an appropriate extent. The solutions offered via private cloud for EHRs, teleconsultation, and telediagnosis services require a volume of online traffic calculated at being able to reach 2 Gbps per consultation. This may entail an average cost of €500/month. The security solutions put forward for each eHealth service constitute an attempt to centralize all information on the cloud, thus offering greater accessibility to medical information in the case of EHRs alongside more reliable diagnoses and treatment for telecardiology, telediagnosis, and teleconsultation services. Therefore, better health care for the rural patient can be obtained at a reasonable cost.

  13. Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers

    Science.gov (United States)

    2015-01-01

    Background The combination of eHealth applications and/or services with cloud technology provides health care staff—with sufficient mobility and accessibility for them—to be able to transparently check any data they may need without having to worry about its physical location. Objective The main aim of this paper is to put forward secure cloud-based solutions for a range of eHealth services such as electronic health records (EHRs), telecardiology, teleconsultation, and telediagnosis. Methods The scenario chosen for introducing the services is a set of four rural health centers located within the same Spanish region. iCanCloud software was used to perform simulations in the proposed scenario. We chose online traffic and the cost per unit in terms of time as the parameters for choosing the secure solution on the most optimum cloud for each service. Results We suggest that load balancers always be fitted for all solutions in communication together with several Internet service providers and that smartcards be used to maintain identity to an appropriate extent. The solutions offered via private cloud for EHRs, teleconsultation, and telediagnosis services require a volume of online traffic calculated at being able to reach 2 Gbps per consultation. This may entail an average cost of €500/month. Conclusions The security solutions put forward for each eHealth service constitute an attempt to centralize all information on the cloud, thus offering greater accessibility to medical information in the case of EHRs alongside more reliable diagnoses and treatment for telecardiology, telediagnosis, and teleconsultation services. Therefore, better health care for the rural patient can be obtained at a reasonable cost. PMID:26215155

  14. Synthesis, characterization and catalytic activity of two novel cis - dioxovanadium(V) complexes: [VO{sub 2}(L)] and [VO{sub 2}(HLox)

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Natalia M.L.; Chacon, Eluzir P.; Resende, Jackson A.L.C.; Carneiro, Jose Walkimar de M.; Lanznaster, Mauricio, E-mail: mlanz@vm.uff.b [Universidade Federal Fluminense (IQ/UFF), Niteroi, RJ (Brazil). Inst. de Quimica; Pinheiro, Carlos B. [Universidade Federal de Minas Gerais (DF/UFMG), Belo Horizonte (Brazil). Dept. de Fisica; Fernandez, Tatiana L.; Scarpellini, Marciela [Universidade Federal do Rio de Janeiro (IQ/UFRJ), RJ (Brazil). Inst. de Quimica

    2011-07-01

    Two novel complexes, [VO{sub 2}(L)] (1) and [VO{sub 2}(HLox)] (2), were synthesized and characterized by IV, UV-Vis and NMR spectroscopy, cyclic voltammetry, elemental analysis and X-ray diffraction. The synthesis of a new ligand, H{sub 2}Lox, is also described. Complexes 1 and 2 were obtained by the reaction of [VO(acac){sub 2}] with the ligands HL and H{sub 2}Lox, respectively. Alternatively, 2 was also obtained by the reaction of HL with [VO(acac)2] in the presence of hydroxylamine, and by the reaction of 1 with hydroxylamine. Crystallographic data show that complexes 1 and 2 have similar molecular structures, in which the cis-dioxovanadium(V) center is coordinated to L- or HLox{sup -}, respectively, in a distorted octahedral environment. The catalytic activity of these compounds towards cyclohexane oxidation was evaluated using H{sub 2}O{sub 2} and t-BuOOH as oxidants. Both complexes presented > 70% selectivity for cyclohexylhydroperoxide formation. B3LYP/6.31G(d) calculations were used to confirm the geometry and to help assign the electronic spectra. (author)

  15. Security Risks of Cloud Computing and Its Emergence as 5th Utility Service

    Science.gov (United States)

    Ahmad, Mushtaq

    Cloud Computing is being projected by the major cloud services provider IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients will have access for processing those applications and or software projects which need very high processing speed for compute intensive and huge data capacity for scientific, engineering research problems and also e- business and data content network applications. These services for different types of clients are provided under DASM-Direct Access Service Management based on virtualization of hardware, software and very high bandwidth Internet (Web 2.0) communication. The paper reviews these developments for Cloud Computing and Hardware/Software configuration of the cloud paradigm. The paper also examines the vital aspects of security risks projected by IT Industry experts, cloud clients. The paper also highlights the cloud provider's response to cloud security risks.

  16. Comparative study of optical and scintillation properties of YVO{sub 4}, (Lu{sub 0.5}Y{sub 0.5})VO{sub 4}, and LuVO{sub 4} single crystals

    Energy Technology Data Exchange (ETDEWEB)

    Fujimoto, Yutaka, E-mail: fuji-you@tagen.tohoku.ac.j [IMRAM, Tohoku University, 2-1-1 Katahira, Aoba-ku, Sendai 980-8577 (Japan); Yanagida, Takayuki; Yokota, Yuui; Chani, Valery [IMRAM, Tohoku University, 2-1-1 Katahira, Aoba-ku, Sendai 980-8577 (Japan); Kochurikhin, Vladimir V. [General Physics Institute, 38 Vavilov Street, 119991, Federation, Moscow (Russian Federation); Yoshikawa, Akira [IMRAM, Tohoku University, 2-1-1 Katahira, Aoba-ku, Sendai 980-8577 (Japan); NICHe, Tohoku University, 6-6-10 Aoba, Aramaki, Aoba-ku, Sendai 980-8579 (Japan)

    2011-04-11

    Optical and scintillation properties of YVO{sub 4}, (Lu{sub 0.5}Y{sub 0.5})VO{sub 4}, and LuVO{sub 4} single crystals grown by the Czochralski (CZ) method with RF heating system are compared. All vanadate crystals show high transmittance ({approx}80%) in the 400-900 nm wavelength range. In both photo- and radio-luminescence spectra, intense peak around 400-500 nm, which was ascribed to the transition from triplet state of VO{sub 4}{sup 3-}, was clearly observed. The main decay time component was about 38 {mu}s (YVO{sub 4}), 18 {mu}s ((Lu{sub 0.5}Y{sub 0.5})VO{sub 4}), and 17 {mu}s (LuVO{sub 4}) under 340 nm excitation. The scintillation light yields of YVO{sub 4}, (Lu{sub 0.5}Y{sub 0.5})VO{sub 4}, and LuVO{sub 4} crystals (obtained from the {sup 137}Cs excited pulse height spectra) were evaluated to be about 11,200, 10,700, and 10,300 ph/MeV, respectively.

  17. UKRVO Astronomical WEB Services

    Directory of Open Access Journals (Sweden)

    Mazhaev, O.E.

    2017-01-01

    Full Text Available Ukraine Virtual Observatory (UkrVO has been a member of the International Virtual Observatory Alliance (IVOA since 2011. The virtual observatory (VO is not a magic solution to all problems of data storing and processing, but it provides certain standards for building infrastructure of astronomical data center. The astronomical databases help data mining and offer to users an easy access to observation metadata, images within celestial sphere and results of image processing. The astronomical web services (AWS of UkrVO give to users handy tools for data selection from large astronomical catalogues for a relatively small region of interest in the sky. Examples of the AWS usage are showed.

  18. Mathematical Representation of VoIP Connection Delay

    Directory of Open Access Journals (Sweden)

    M. Halas

    2007-09-01

    Full Text Available The main topic of this article is to define mathematical formulation of VoIP connection delay model. It handles about all partial delay components, the mechanism of their generation, facilities and their mathematical formulation. Thereafter based on mathematical formulation of all partial delay components, the final mathematical model of whole VoIP call delay is created. In conclusion of this article the results of the designed mathematical model are compared with the experimentally gained results.

  19. A novel magneto-optical crystal Yb:TbVO4

    Science.gov (United States)

    Zhu, Xianchao; Tu, Heng; Hu, Zhanggui

    2018-04-01

    Highly transparent Yb:TbVO4 single crystal with dimensions of Ø27 × 41 mm3 alomost without scattering defects has been successfully grown by Czochralski technique. The spectra, thermal properties and laser-induced damage threshold were investigated in detailed. The Faraday rotation (FR) measurement was carried out by means of extinction method. The Verdet constant comes up to 80 rad m-1 T-1 at 1064 nm, significantly larger than TbVO4 (58 rad m-1 T-1) and TGG (40 rad m-1 T-1) reported. Meanwhile, the as-grown crystal presents lower absorption coefficient and higher magneto-optical figure of merit at measured wavelength in comparison with TGG. Moreover, the crystal exhibits a substantially improved extinction ratio (42 dB) in contrast with TbVO4 (29 dB), and exceeds the highest value of TGG (40 dB). These advantages make Yb:TbVO4 a highly promising magneto-optical material candidate for optical isolators in the visible-near infrared region.

  20. Proof of Concept Integration of a Single-Level Service-Oriented Architecture into a Multi-Domain Secure Environment

    National Research Council Canada - National Science Library

    Gilkey, Craig M

    2008-01-01

    .... Such web services operating across multiple security domains would provide additional advantages, including improved intelligence aggregation, and real-time collaboration between users in different security domains...

  1. Employment of personnel of a security service company does not require the consent of the works council

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. Federal Labour Court, decision dated May 5, 1992 - 1 ABR 78/91. (orig./HP) [de

  2. Selective Synthesis of Mesoporous and Nanorod CeVO4 without Template

    International Nuclear Information System (INIS)

    Zhu Ling; Li Qin; Li Jiayan; Liu Xiangdong; Meng Jian; Cao Xueqiang

    2007-01-01

    A simple and efficient method has been established for the selective synthesis of mesoporous and nanorod CeVO 4 with different precursors by sonochemical method. CeVO 4 nanorod can be simply synthesized by ultrasound irradiation of Ce(NO 3 ) 3 and NH 4 VO 3 in aqueous solution without any surfactant or template. While mesoporous CeVO 4 with high specific surface area can be prepared with Ce(NO 3 ) 3 , V 2 O 5 and NaOH in the same way. Mesoporous CeVO 4 has a specific surface area of 122 m 2 g -1 and an average pore size of 5.2 nm; CeVO 4 nanorods have a diameter of about 5 nm, and a length of 100-150 nm. The ultrasound irradiation and ammonia in the reactive solution are two key factors in the formation of such rod-like products. X-ray diffraction (XRD), transmission electron microscopy (TEM), X-ray photoelectron spectroscopy (XPS), thermogravimetric (TG) and differential thermal analyses (DTA), UV/vis absorption spectroscopy and Brunauer-Emmett-Teller (BET) were applied for characterization of the as-prepared products

  3. 78 FR 56266 - Consent Based Social Security Number Verification (CBSV) Service

    Science.gov (United States)

    2013-09-12

    ... developed CBSV as a user- friendly, internet-based application with safeguards that protect the public's information. In addition to the benefit of providing high volume, centralized SSN verification services to users in a secure manner, CBSV provides us with cost and workload management benefits. New Information...

  4. 17 CFR 240.15Ca2-5 - Consent to service of process to be furnished by non-resident government securities brokers or...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Consent to service of process... Government Securities Dealers § 240.15Ca2-5 Consent to service of process to be furnished by non-resident... government securities dealer by the service of process upon the Commission and the forwarding of a copy...

  5. Epitaxial growth of higher transition-temperature VO2 films on AlN/Si

    Directory of Open Access Journals (Sweden)

    Tetiana Slusar

    2016-02-01

    Full Text Available We report the epitaxial growth and the mechanism of a higher temperature insulator-to-metal-transition (IMT of vanadium dioxide (VO2 thin films synthesized on aluminum nitride (AlN/Si (111 substrates by a pulsed-laser-deposition method; the IMT temperature is TIMT ≈ 350 K. X-ray diffractometer and high resolution transmission electron microscope data show that the epitaxial relationship of VO2 and AlN is VO2 (010 ‖ AlN (0001 with VO2 [101] ‖   AlN   [ 2 1 ̄ 1 ̄ 0 ] zone axes, which results in a substrate-induced tensile strain along the in-plane a and c axes of the insulating monoclinic VO2. This strain stabilizes the insulating phase of VO2 and raises TIMT for 10 K higher than TIMT single crystal ≈ 340 K in a bulk VO2 single crystal. Near TIMT, a resistance change of about four orders is observed in a thick film of ∼130 nm. The VO2/AlN/Si heterostructures are promising for the development of integrated IMT-Si technology, including thermal switchers, transistors, and other applications.

  6. Optimization of thermochromic VO2-based structures with tunable thermal emissivity

    International Nuclear Information System (INIS)

    Li Voti, R.; Larciprete, M.C.; Leahu, G.L.; Bertolotti, M.; Sibilia, C.

    2013-01-01

    In this paper we design and simulate VO 2 /metal multilayers to obtain a large tunability of the thermal emissivity of IR filters in the typical MWIR window of many infrared cameras. The multilayer structure is optimized to realise a low-emissivity filter at high temperatures useful for military purposes. The values of tunability found for VO 2 /metal multilayers are larger than the value for a single thick layer of VO 2 . Innovative SiO 2 /VO 2 synthetic opals are also investigated to enhance the optical tunability by combining the properties of a 3D periodic structure and the specific optical properties of vanadium dioxide.

  7. Behavioral analysis of use personal service e-balance Indonesian social security

    Science.gov (United States)

    Wang, Gunawan; Fitriani, Novi; Nurul Fajar, Ahmad

    2017-09-01

    Indonesian Social Security is the one of the government agencies that is trusted to organize social security. With help of Information technology that growing these day, Indonesian Social Security is also developing E-Balance application, where previously all activities for checking balance is done by giving their slip details through the nearest branch to be distributed to each company. So far there is no research that reviewing e-Balance. Hence, the authors is interested to do research related factors that influence the behavior of the use of E-Balance Indonesian Social Security in the Jakarta area and model that can describe those factors Authors distributing questioners to 193 respondents and perform data processing. The result of this study is to know the factors that influence the behavior of use Personal Service E-Balance Indonesian Social Security and model that can describe those factors. The result shows that UTAUT 2 model is not match with this research and need to be enhanced. After enhancement, there are 3 factors that being significant. Such as Behavioral Intention, Effort Expectancy and Social Influence while the others are not supported and need to be customize.

  8. Photocatalytic perfermance of sandwich-like BiVO_4 sheets by microwave assisted synthesis

    International Nuclear Information System (INIS)

    Liu, Suqin; Tang, Huiling; Zhou, Huan; Dai, Gaopeng; Wang, Wanqiang

    2017-01-01

    Graphical abstract: Sandwich-like BiVO_4 sheets were successfully synthesized via a facile microwave-assisted method. The as-prepared samples exhibit a high activity for the degradation of methyl orange under visible light irradiation. - Highlights: • Sandwich-like BiVO_4 sheets were synthesized by a facile microwave-assisted method. • The presence of PEG-10000 plays a critical role in the formation of BiVO_4 sheets. • Ostwald ripening is the primary driving force for the formation of sandwich-like BiVO_4. • The sandwich-like BiVO_4 sheets exhibit a high visible-light photocatalytic activity. - Abstract: Sandwich-like BiVO_4 sheets were successfully synthesized in an aqueous solution containing bismuth nitrate, ammonium metavanadate and polyethylene glycol with a molecular weight of 10,000 (PEG-10000) using a facile microwave-assisted method. The as-prepared samples were characterized by scanning electron microscopy, N_2 adsorption-desorption, X-ray diffraction, X-ray photoelectron spectroscopy (XPS), and UV–vis diffuse reflectance spectroscopy. The results show that the presence of PEG-10000 plays a critical role in the formation of BiVO_4 sheets, and Ostwald ripening is the primary driving force for the formation of sandwich-like structures. The sandwich-like BiVO_4 sheets exhibit a high activity for the degradation of methyl orange under visible light irradiation (λ ≥ 420 nm). The enhancement of photocatalytic activity of sandwich-like BiVO_4 sheets can be attributed to its large surface area over the irregular BiVO_4 particles.

  9. VoLTE在泰国TrueMove的无线优化策略和实践%VoLTE Wireless Optimization Strategy and Practice in TrueMove Thailand

    Institute of Scientific and Technical Information of China (English)

    刘海涛

    2016-01-01

    引入VoLTE在泰国竞争激烈的移动通信市场对于提高存量用户迁移、完成频率重耕、节省后续2G/3G投资具有重要的意义。通过分析VoLTE在TrueMove的无线侧基本功能、增强功能的开通策略,确立关键指标体系并进行测试优化,最后通过优化案例分析,为Vo LT E的无线优化工作提供借鉴。%The introduction of VoLTE into the fierce competition of Thailand’s mobile communication market has its signiifcance in promoting stock user migration, re-farming frequencies, and saving future 2G/3G capital expenditure. By analyzing the wireless strategy of basic and enhancement features of VoLTE in TureMove, setting up and improving the KPIs, and studying some optimization cases, the paper provided experience for VoLTE wireless optimization.

  10. VO2 /TiN Plasmonic Thermochromic Smart Coatings for Room-Temperature Applications.

    Science.gov (United States)

    Hao, Qi; Li, Wan; Xu, Huiyan; Wang, Jiawei; Yin, Yin; Wang, Huaiyu; Ma, Libo; Ma, Fei; Jiang, Xuchuan; Schmidt, Oliver G; Chu, Paul K

    2018-03-01

    Vanadium dioxide/titanium nitride (VO 2 /TiN) smart coatings are prepared by hybridizing thermochromic VO 2 with plasmonic TiN nanoparticles. The VO 2 /TiN coatings can control infrared (IR) radiation dynamically in accordance with the ambient temperature and illumination intensity. It blocks IR light under strong illumination at 28 °C but is IR transparent under weak irradiation conditions or at a low temperature of 20 °C. The VO 2 /TiN coatings exhibit a good integral visible transmittance of up to 51% and excellent IR switching efficiency of 48% at 2000 nm. These unique advantages make VO 2 /TiN promising as smart energy-saving windows. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Securing services in the cloud: an investigation of the threats and the mitigations

    Science.gov (United States)

    Farroha, Bassam S.; Farroha, Deborah L.

    2012-05-01

    The stakeholder's security concerns over data in the clouds (Voice, Video and Text) are a real concern to DoD, the IC and private sector. This is primarily due to the lack of physical isolation of data when migrating to shared infrastructure platforms. The security concerns are related to privacy and regulatory compliance required in many industries (healthcare, financial, law enforcement, DoD, etc) and the corporate knowledge databases. The new paradigm depends on the service provider to ensure that the customer's information is continuously monitored and is kept available, secure, access controlled and isolated from potential adversaries.

  12. Thin-film VO2 submillimeter-wave modulators and polarizers

    International Nuclear Information System (INIS)

    Fan, J.C.C.; Fetterman, H.R.; Bachner, F.J.; Zavracky, P.M.; Parker, C.D.

    1977-01-01

    Submillimeter-wave modulators and switchable polarizers have been fabricated from VO 2 thin films deposited on sapphire substrates. By passing electric current pulses through elements made from these films, the films can be thermally cycled through the insulator-to-metal transition that occurs in VO 2 at about 65 degreeC. In the insulating state, the films are found to have negligible effect on the transmission at submillimeter wavelengths, while above the phase transition the transmission is strongly reduced by the free-electron effects characteristic of a metal. Other possible applications of such switchable VO 2 elements include variable bandpass filters and diffraction grating beam-steering devices

  13. 76 FR 60112 - Consent Based Social Security Number Verification (CBSV) Service

    Science.gov (United States)

    2011-09-28

    ... protect the public's information. In addition to the benefit of providing high volume, centralized SSN verification services to the business community in a secure manner, CBSV provides us with cost and workload management benefits. New Information: To use CBSV, interested parties must pay a one- time non-refundable...

  14. Effects of erythrocyte infusion on VO2max at high altitude

    DEFF Research Database (Denmark)

    Young, Jette Feveile; Sawka, M N; Muza, S R

    1996-01-01

    This study investigated whether autologous erythrocyte infusion would ameliorate the decrement in maximal O2 uptake (VO2max) experienced by lowlanders when they ascend to high altitude. VO2max was measured in 16 men (treadmill running) at sea level (SL) and on the 1st (HA1) and 9th (HA9) days...... of high-altitude (4,300 m) residence. After VO2max was measured at SL, subjects were divided into two matched groups (n = 8). Twenty-four hours before ascent to high altitude, the experimental group received a 700-ml infusion of autologous erythrocytes and saline (42% hematocrit), whereas the control...... group received only saline. The VO2max of erythrocyte-infused [54 +/- 1 (SE) ml.kg-1.min-1] and control subjects (52 +/- 2 ml.kg-1.min-1) did not differ at SL before infusion. The decrement in VO2max on HA1 did not differ between groups, averaging 26% overall, despite higher (P

  15. OpenID Connect as a security service in cloud-based medical imaging systems.

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter

    2016-04-01

    The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as "Kerberos of cloud." We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model.

  16. 48 CFR 252.239-7016 - Telecommunications security equipment, devices, techniques, and services.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Telecommunications... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.239-7016 Telecommunications... clause: Telecommunications Security Equipment, Devices, Techniques, and Services (DEC 1991) (a...

  17. The influence of VO2(B nanobelts on thermal decomposition of ammonium perchlorate

    Directory of Open Access Journals (Sweden)

    Zhang Yifu

    2015-09-01

    Full Text Available The influence of vanadium dioxide VO2(B on thermal decomposition of ammonium perchlorate (AP has not been reported before. In this contribution, the effect of VO2(B nanobelts on the thermal decomposition of AP was investigated by the Thermo- Gravimetric Analysis and Differential Thermal Analysis (TG/DTA. VO2(B nanobelts were hydrothermally prepared using peroxovanadium (V complexes, ethanol and water as starting materials. The thermal decomposition temperatures of AP in the presence of I wt.%, 3 wt.% and 6 wt.% of as-obtained VO2VO2(B nanobelts had a great influence on the thermal decomposition temperature of AP Furthermore, the influence of the corresponding V2Os, which was obtained by thermal treatment of VO2(B nanobelts, on the thermal decomposition of AP was also investigated. The resufs showed that VO2(B nanobelts had a greater influence on the thermal decomposition temperature of AP than that of V2Os.

  18. Epitaxial growth and electronic structure of oxyhydride SrVO2H thin films

    Science.gov (United States)

    Katayama, Tsukasa; Chikamatsu, Akira; Yamada, Keisuke; Shigematsu, Kei; Onozuka, Tomoya; Minohara, Makoto; Kumigashira, Hiroshi; Ikenaga, Eiji; Hasegawa, Tetsuya

    2016-08-01

    Oxyhydride SrVO2H epitaxial thin films were fabricated on SrTiO3 substrates via topotactic hydridation of oxide SrVO3 films using CaH2. Structural and composition analyses suggested that the SrVO2H film possessed one-dimensionally ordered V-H--V bonds along the out-of-plane direction. The synthesis temperature could be lowered by reducing the film thickness, and the SrVO2H film was reversible to SrVO3 by oxidation through annealing in air. Photoemission and X-ray absorption spectroscopy measurements revealed the V3+ valence state in the SrVO2H film, indicating that the hydrogen existed as hydride. Furthermore, the electronic density of states was highly suppressed at the Fermi energy, consistent with the prediction that tetragonal distortion induces metal to insulation transition.

  19. 17 CFR 249.250 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form F-X, for appointment of agent for service of process by issuers registering securities on Form F-8, F-9, F-10 or F-80 (§ 239.38... F-X, for appointment of agent for service of process by issuers registering securities on Form F-8...

  20. Efficient data replication for the delivery of high-quality video content over P2P VoD advertising networks

    Science.gov (United States)

    Ho, Chien-Peng; Yu, Jen-Yu; Lee, Suh-Yin

    2011-12-01

    Recent advances in modern television systems have had profound consequences for the scalability, stability, and quality of transmitted digital data signals. This is of particular significance for peer-to-peer (P2P) video-on-demand (VoD) related platforms, faced with an immediate and growing demand for reliable service delivery. In response to demands for high-quality video, the key objectives in the construction of the proposed framework were user satisfaction with perceived video quality and the effective utilization of available resources on P2P VoD networks. This study developed a peer-based promoter to support online advertising in P2P VoD networks based on an estimation of video distortion prior to the replication of data stream chunks. The proposed technology enables the recovery of lost video using replicated stream chunks in real time. Load balance is achieved by adjusting the replication level of each candidate group according to the degree-of-distortion, thereby enabling a significant reduction in server load and increased scalability in the P2P VoD system. This approach also promotes the use of advertising as an efficient tool for commercial promotion. Results indicate that the proposed system efficiently satisfies the given fault tolerances.

  1. Synthesis and modification of FeVO{sub 4} as novel anode for lithium-ion batteries

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Xiaolin [Hubei Collaborative Innovation Center for Advanced Organic Chemical Materials, Hubei University, Wuhan 430062 (China); Cao, Yuancheng [Key Laboratory of Optoelectronic Chemical Materials and Devices, Ministry of Education, School of chemical and Environment Engineering, Jianghan University, Wuhan 430062 (China); Zheng, Hao; Chen, Xiao [Hubei Collaborative Innovation Center for Advanced Organic Chemical Materials, Hubei University, Wuhan 430062 (China); Feng, Chuanqi, E-mail: cfeng@hubu.edu.cn [Hubei Collaborative Innovation Center for Advanced Organic Chemical Materials, Hubei University, Wuhan 430062 (China)

    2017-02-01

    Graphical abstract: The FeVO{sub 4}/graphene are synthesized by combining hydrothermal and heat treatment method. It delivered an initial discharge capacity of 1302.3 mAh g{sup −1} and remained capacity as 1046.5 mAh g{sup −1} after 100 cycles and behaved better electrochemical properties than that of pure FeVO{sub 4}. - Highlights: • The FeVO{sub 4} and FeVO{sub 4}/graphene are synthesized by combining hydrothermal and heat treatment method. • The FeVO{sub 4}/graphene nanocomposite exhibits outstanding electrochemical performance. • FeVO{sub 4}/graphene delivered an initial discharge capacity of 1302.3 mAh g{sup −1} and remained capacity as 1046.5 mAh g{sup −1} after 100 cycles. • The FeVO{sub 4}/graphene composite behaved better electrochemical properties than that of pure FeVO{sub 4}. - Abstract: FeVO{sub 4} and FeVO{sub 4}/graphene nanorods were synthesized successfully by combining a facile hydrothermal and heat treatment method. The samples were characterized by X-ray diffraction (XRD), scanning electronic microscopy (SEM) and transmission electron microscopy (TEM) techniques. The content of graphene in FeVO{sub 4}/graphene was determined by thermogravimetric analysis (TG). The electrochemical properties of the samples were also investigated by battery testing system. The results showed that the FeVO{sub 4} formed were taken on morphology of nanorods with the length between 0.5 and 1 μm and the diameter in range of 50 to 100 nm. Besides, the size of FeVO{sub 4}/graphene was smaller than that of pure FeVO{sub 4}. The content of graphene in composite was about 25.0% by weight. The reversible discharge capacities of FeVO{sub 4} and FeVO{sub 4}/graphene were 405.2 mAh g{sup −1} and 1046.5 mAh g{sup −1} separately after 100 cycles at the current density of 100 mAh g{sup −1} in the voltage range of 0.01–3 V. The reasons for the FeVO{sub 4}/graphene composite to behave outstanding electrochemical properties were also discussed. The FeVO

  2. Using secure web services to visualize poison center data for nationwide biosurveillance: a case study.

    Science.gov (United States)

    Savel, Thomas G; Bronstein, Alvin; Duck, William; Rhodes, M Barry; Lee, Brian; Stinn, John; Worthen, Katherine

    2010-01-01

    Real-time surveillance systems are valuable for timely response to public health emergencies. It has been challenging to leverage existing surveillance systems in state and local communities, and, using a centralized architecture, add new data sources and analytical capacity. Because this centralized model has proven to be difficult to maintain and enhance, the US Centers for Disease Control and Prevention (CDC) has been examining the ability to use a federated model based on secure web services architecture, with data stewardship remaining with the data provider. As a case study for this approach, the American Association of Poison Control Centers and the CDC extended an existing data warehouse via a secure web service, and shared aggregate clinical effects and case counts data by geographic region and time period. To visualize these data, CDC developed a web browser-based interface, Quicksilver, which leveraged the Google Maps API and Flot, a javascript plotting library. Two iterations of the NPDS web service were completed in 12 weeks. The visualization client, Quicksilver, was developed in four months. This implementation of web services combined with a visualization client represents incremental positive progress in transitioning national data sources like BioSense and NPDS to a federated data exchange model. Quicksilver effectively demonstrates how the use of secure web services in conjunction with a lightweight, rapidly deployed visualization client can easily integrate isolated data sources for biosurveillance.

  3. Structures, physicochemical and cytoprotective properties of new oxidovanadium(IV) complexes -[VO(mIDA)(dmbipy)]·1.5H2O and [VO(IDA)(dmbipy)]·2H2O

    Science.gov (United States)

    Drzeżdżon, Joanna; Jacewicz, Dagmara; Wyrzykowski, Dariusz; Inkielewicz-Stępniak, Iwona; Sikorski, Artur; Tesmar, Aleksandra; Chmurzyński, Lech

    2017-09-01

    New oxidovanadium(IV) complexes with a modification of the ligand in the VO2+ coordination sphere were synthesized. [VO(mIDA)(dmbipy)]•1.5H2O and [VO(IDA)(dmbipy)]•2H2O were obtained as dark green crystals and grey-green powder, respectively (mIDA = N-methyliminodiacetic anion, IDA = iminodiacetic anion, dmbipy = 4,4‧-dimethoxy-2,2‧-dipyridyl). The crystal structure of [VO(mIDA)(dmbipy)]·1.5H2O has been determined by the X-ray diffraction method. The studies of structure of [VO(mIDA)(dmbipy)]•1.5H2O have shown that this compound occurs in the crystal as two rotational conformers. Furthermore, the stability constants of [VO(mIDA)(dmbipy)]•1.5H2O and [VO(IDA)(dmbipy)]•2H2O complexes in aqueous solutions were studied by using the potentiometric titration method and, consequently, determined using the Hyperquad2008 program. Moreover, the title complexes were investigated as antioxidant substances. The impact of the structure modification in the VO2+ complexes on the radical scavenging activity has been studied. The ability to scavenge the superoxide radical by two complexes - [VO(mIDA)(dmbipy)]·1.5H2O and [VO(IDA)(dmbipy)]·2H2O was studied by cyclic voltammetry (CV) and nitrobluetetrazolium (NBT) methods. The title complexes were also examined by the spectrophotometric method as scavengers of neutral organic radical - 1,1-diphenyl-2-picrylhydrazyl (DPPH•) and radical cation - 2,2'-azinobis-(3-ethylbenzothiazoline)-6-sulfonic acid (ABTS•+). Furthermore, the biological properties of two oxidovanadium(IV) complexes were investigated in relation to its cytoprotective properties by the MTT and LDH tests based on the hippocampal HT22 neuronal cell line during the oxidative damage induced by hydrogen peroxide. Finally, the results presented in this paper have shown that the both new oxidovanadium(IV) complexes with the 4,4‧-dimethoxy-2,2‧-dipyridyl ligand can be treated as the cytoprotective substances.

  4. Luminous transmittance and phase transition temperature of VO 2 ...

    African Journals Online (AJOL)

    The phase transition temperature (τc) of the films was obtained from both the transmittance and sheet resistance against temperature curves. A change in sheet resistance of 2 to 3 orders of magnitude was observed for both undoped and Ce-doped VO2 films. Comparison between undoped and doped VO2 films revealed ...

  5. Security and privacy in billing services in cloud computing

    OpenAIRE

    Μακρή, Ελένη - Λασκαρίνα

    2013-01-01

    The purpose of this master thesis is to define cloud computing and to introduce its basic principles. Firstly, the history of cloud computing will be briefly discussed, starting from the past and ending up to the current and future situation. Furthermore, the most important characteristics of cloud computing, such as security, privacy and cost, will be analyzed. Moreover the three service and three deployment models of cloud computing will be defined and analyzed with examples. Finally, the a...

  6. ) m /SrVO3 ( m = 5, 6) Superlattices

    KAUST Repository

    Dai, Qingqing

    2018-05-04

    The (LaV3+O3)m/SrV4+O3 (m = 5, 6) superlattices are investigated by first principles calculations. While bulk LaVO3 is a C‐type antiferromagnetic semiconductor and bulk SrVO3 is a paramagnetic metal, semiconducting A‐type antiferromagnetic states for both superlattices are found due to epitaxial strain. At the interfaces, however, the V spins couple antiferromagnetically for m = 5 and ferromagnetically for m = 6 (m‐dependence of the magnetization). Electronic reconstruction in form of charge ordering is predicted to occur with V3+ and V4+ states arranged in a checkerboard pattern on both sides of the SrO layer. As compared to bulk LaVO3, the presence of V4+ ions introduces in‐gap states that strongly reduce the bandgap and influence the orbital occupation and ordering.

  7. RGO/InVO4 hollowed-out nanofibers: Electrospinning synthesis and its application in photocatalysis

    International Nuclear Information System (INIS)

    Ma, Dong; Zhang, Yanxiang; Gao, Mengchun; Xin, Yanjun; Wu, Juan; Bao, Nan

    2015-01-01

    Graphical abstract: - Highlights: • RGO/InVO 4 hollow-out nanofibers were obtained by electrospinning method. • The properties of InVO 4 hollow-out nanofibers were deeply influenced by RGO. • RGO could reduce recombination of e − –h + pairs to improve photocatalytic activity. • Photo-induced h + and e − are the two main reactive species for RhB degradation. - Abstract: A composite of reduced graphene oxide (RGO) and InVO 4 nanofiber was successfully synthesized by an electrospinning technique. The as-collected fibers were calcined at 420 °C in air and then calcined at 550 °C in nitrogen gas to remove polyvinyl pyrrolidone (PVP), which could enable InVO 4 to crystallize and protect the RGO from oxidation. The InVO 4 in the composite illustrated a hollowed-out fibrous morphology and orthorhombic phase, and RGO nanosheets were nested in the InVO 4 nanofibers. The hybrid RGO could produce more hydroxyl groups and a higher oxygen vacancy density on the surface of RGO/InVO 4 composite. Compared with pure InVO 4 , the light absorption range of the as-prepared RGO/InVO 4 composite was expanded. In Rh B degradation, the RGO/InVO 4 hybrid nanofibers displayed a higher photocatalytic activity than pure InVO 4 nanofibers. The enhanced photocatalytic activity might be ascribed to the role of RGO as an electron transporter and acceptor in the composite, which could effectively inhibit the charge recombination and facilitate the charge transfer. The exported electron could attack an O 2 molecule to facilitate the generation of • O 2 − and • OH for the photodegradation process of Rh B.

  8. Synthesis, Characterization and Antibacterial Activity of BiVO4 Microstructure

    Science.gov (United States)

    Ekthammathat, Nuengruethai; Phuruangrat, Anukorn; Thongtem, Somchai; Thongtem, Titipun

    2018-05-01

    Hyperbranched BiVO4 microstructure were successfully synthesized by a hydrothermal method. Upon characterization the products by X-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM), Fourier transform infrared (FTIR) spectroscopy, Raman spectroscopy, selected area electron diffraction (SAED) and photoluminescence (PL) spectroscopy, pure monoclinic hyperbranched BiVO4 with dominant vibration peak at 810 cm-1 and strong photoemission peak at 360 nm was synthesized in the solution with pH 1. In the solution with pH 2, tetragonal BiVO4 phase was also detected. In this research, antibacterial activity against S. aureus and E. coli was investigated by counting the colony forming unit (CFU). At 37°C within 24 h, the monoclinic BiVO4 phase can play the role in inhibiting S. aureus growth (350 CFU/mL remaining bacteria) better than that against E. coli (a large number of remaining bacteria).

  9. T-Check in Technologies for Interoperability: Web Services and Security--Single Sign-On

    National Research Council Canada - National Science Library

    Wrage, Lutz; Simanta, Soumya; Lewis, Grace A; Jaspan, Saul

    2007-01-01

    .... This technical note presents the results of applying the T-Check approach in an initial investigation of two Web services standards, WS-Security and SAML, to create an SSO solution that works inside...

  10. Oral health service utilization by elderly beneficiaries of the Mexican Institute of Social Security in México city

    Directory of Open Access Journals (Sweden)

    Solórzano-Santos Fortino

    2007-12-01

    Full Text Available Abstract Background The aging population poses a challenge to Mexican health services. The aim of this study is to describe recent oral health services utilization and its association with socio-demographic characteristics and co-morbidity in Mexican Social Security beneficiaries 60 years and older. Methods A sample of 700 individuals aged 60+ years was randomly chosen from the databases of the Mexican Institute of Social Security (IMSS. These participants resided in the southwest of Mexico City and made up the final sample of a cohort study for identifying risk factors for root caries in elderly patients. Sociodemographic variables, presence of cognitive decline, depression, morbidity, medication consumption, and utilization of as well as reasons for seeking oral health services within the past 12 months were collected through a questionnaire. Clinical oral assessments were carried out to determine coronal and root caries experience. Results The sample consisted of 698 individuals aged 71.6 years on average, of whom 68.3% were women. 374 participants (53.6% had made use of oral health services within the past 12 months. 81% of those who used oral health services sought private medical care, 12.8% sought social security services, and 6.2% public health services. 99.7% had experienced coronal caries and 44.0% root caries. Female sex (OR = 2.0, 6 years' schooling or less (OR = 1.4, and caries experience in more than 22 teeth (OR = 0.6 are factors associated with the utilization of these services. Conclusion About half the elderly beneficiaries of social security have made use of oral health services within the past 12 months, and many of them have to use private services. Being a woman, having little schooling, and low caries experience are factors associated with the use of these services.

  11. BiVO4 Photoanode with Exposed (040) Facets for Enhanced Photoelectrochemical Performance

    Science.gov (United States)

    Xia, Ligang; Li, Jinhua; Bai, Jing; Li, Linsen; Chen, Shuai; Zhou, Baoxue

    2018-03-01

    A BiVO4 photoanode with exposed (040) facets was prepared to enhance its photoelectrochemical performance. The exposure of the (040) crystal planes of the BiVO4 film was induced by adding NaCl to the precursor solution. The as-prepared BiVO4 photoanode exhibits higher solar-light absorption and charge-separation efficiency compared to those of an anode prepared without adding NaCl. To our knowledge, the photocurrent density (1.26 mA cm-2 at 1.23 V vs. RHE) of as-prepared BiVO4 photoanode is the highest according to the reports for bare BiVO4 films under simulated AM1.5G solar light, and the incident photon-to-current conversion efficiency is above 35% at 400 nm. The photoelectrochemical (PEC) water-splitting performance was also dramatically improved with a hydrogen evolution rate of 9.11 μmol cm-2 h-1, which is five times compared with the BiVO4 photoanode prepared without NaCl (1.82 μmol cm-2 h-1). Intensity-modulated photocurrent spectroscopy and transient photocurrent measurements show a higher charge-carrier-transfer rate for this photoanode. These results demonstrate a promising approach for the development of high-performance BiVO4 photoanodes which can be used for efficient PEC water splitting and degradation of organic pollutants. [Figure not available: see fulltext.

  12. Raman spectroscopic studies on CeVO4 at high pressures

    International Nuclear Information System (INIS)

    Rao, Rekha; Garg, Alka B.; Wani, B.N.

    2011-01-01

    Raman scattering investigations of CeVO 4 at high pressures is reported. Polycrystalline CeVO 4 was prepared by solid state reaction of CeO 2 and V 2 O 5 . High pressure Raman spectroscopic measurements were carried out as per experimental details given

  13. The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures

    DEFF Research Database (Denmark)

    Armando, Alessandro; Arsac, Wihem; Avanesov, Tigran

    2012-01-01

    The AVANTSSAR Platform is an integrated toolset for the formal specification and automated validation of trust and security of service-oriented architectures and other applications in the Internet of Services. The platform supports application-level specification languages (such as BPMN and our...

  14. Compare the phase transition properties of VO2 films from infrared to terahertz range

    Science.gov (United States)

    Liang, Shan; Shi, Qiwu; Huang, Wanxia; Peng, Bo; Mao, Zhenya; Zhu, Hongfu

    2018-06-01

    VO2 with reversible semiconductor-metal phase transition properties is particularly available for the application in smart opto-electrical devices. However, there are rare reports on comparing its phase transition properties at different ranges. In this study, the VO2 films are designed with the similar crystalline structure and stoichiometry, but different morphologies by inorganic and organic sol-gel methods, and their phase transition characteristics are compared both at infrared and terahertz range. The results indicate that the VO2 film prepared by inorganic sol-gel method shows more compact nanostructure. It results in larger resistivity change, infrared and terahertz switching ratio in the VO2 film. Moreover, it presents that the phase transition intensity of VO2 film in terahertz range is more sensitive to its microstructure. This work is helpful for understanding the susceptibility of terahertz switching properties of VO2 to its microstructure. And it can provide insights for the applications of VO2 in terahertz smart devices.

  15. Preparation of BiVO4-Graphene Nanocomposites and Their Photocatalytic Activity

    Directory of Open Access Journals (Sweden)

    Xuan Xu

    2014-01-01

    Full Text Available We prepared BiVO4-graphene nanocomposites by using a facile single-step method and characterized the material by x-ray diffraction, scanning electron microscopy, Fourier-transform infrared spectroscopy, ultraviolet-visible diffuse-reflection spectroscopy, and three-dimensional fluorescence spectroscopy. The results show that graphene oxide in the catalyst was thoroughly reduced. The BiVO4 is densely dispersed on the graphene sheets, which facilitates the transport of electrons photogenerated in BiVO4, thereby leading to an efficient separation of photogenerated carriers in the coupled graphene-nanocomposite system. For degradation of rhodamine B dye under visible-light irradiation, the photocatalytic activity of the synthesized nanocomposites was over ∼20% faster than for pure BiVO4 catalyst. To study the contribution of electrons and holes in the degradation reaction, silver nitrate and potassium sodium tartrate were added to the BiVO4-graphene photocatalytic reaction system as electron-trapping agent and hole-trapping agent, respectively. The results show that holes play the main role in the degradation of rhodamine B.

  16. Electronic structure and insulating gap in epitaxial VO2 polymorphs

    Directory of Open Access Journals (Sweden)

    Shinbuhm Lee

    2015-12-01

    Full Text Available Determining the origin of the insulating gap in the monoclinic V O2(M1 is a long-standing issue. The difficulty of this study arises from the simultaneous occurrence of structural and electronic transitions upon thermal cycling. Here, we compare the electronic structure of the M1 phase with that of single crystalline insulating V O2(A and V O2(B thin films to better understand the insulating phase of VO2. As these A and B phases do not undergo a structural transition upon thermal cycling, we comparatively study the origin of the gap opening in the insulating VO2 phases. By x-ray absorption and optical spectroscopy, we find that the shift of unoccupied t2g orbitals away from the Fermi level is a common feature, which plays an important role for the insulating behavior in VO2 polymorphs. The distinct splitting of the half-filled t2g orbital is observed only in the M1 phase, widening the bandgap up to ∼0.6 eV. Our approach of comparing all three insulating VO2 phases provides insight into a better understanding of the electronic structure and the origin of the insulating gap in VO2.

  17. Analisis Kualitas VoIP pada SCTP Menggunakan ECN dan AQM

    Directory of Open Access Journals (Sweden)

    La Surimi

    2015-07-01

    Abstract VoIP is the real time applications that are highly dependent on the quality of  delay and jitter, which it is difficult to be met by protocol that has reliable data transfer feature and  congestion control such as TCP. On the other hand the use of UDP that has no congestion control make chance of causing congestion in the network is very large. The use of SCTP as an alternative protocol was also not able to accommodate the weaknesses of TCP and UDP. Some research shows that repairs or modifications to the SCTP congestion control mechanism is needed. The Use of ECN and AQM in some studies show that these two mechanisms can reduce delay and jitter. This study tested the quality of VoIP over SCTP with ECN and AVQ, in NS2. Simulations carried out by independent replication technique, and the results showed that ECN and AVQ can increase the value of MOS VoIP calls significantly in non ideal network scenarios. This study also did comparison of SCTP MOS that uses ECN and AVQ with MOS values VoIP using TCP and UDP. The result showed that SCTP with ECN and AVQ outperform TCP but can not surpass UDP yet.   Keywords— VoIP, SCTP, ECN, AQM,AVQ.

  18. The Market Value of Information System (IS) Security: An Event Study of E-Banking Service Providers

    Science.gov (United States)

    Brock, Linda

    2012-01-01

    Understanding the financial value resulting from IS security investments is critically important to organizations focused on protecting service confidentiality, integrity, and availability in order to preserve firm revenues and reputations. Quantifying the financial effect from IS security investments is difficult to derive. This study…

  19. FTIR spectra of the solid solutions (Na0.88K0.12)VO3, (Na0.5K0.5)VO3, and Na(V0.66P0.34)O3

    Science.gov (United States)

    de Waal, D.; Heyns, A. M.

    1992-03-01

    It is known that three different solid solutions, (Na0.88K0.12)VO3, (Na0.5K0.5)VO3 and Na(V0.66P0.34)O3, form in the (Na,K)(V,P)O3 system. These compounds all have monoclinic crystal structures similar to the pure alkali metal metavanadates containing small cations, e.g. Li+ and Na+ (Space group C2/c). Metavanadates with large cations like K+, Rb+, C+s and NH+4 form orthorhombic crystals, space group Pbcm. All those are structurally related to the silicate pyroxenes. Na(V0.66P0.34)O3 and (Na0.88K0.12)VO3 have the same modified diopside structure as (alpha) - NaVO3 while (Na0.5K0.5)VO3 adopts the true diopside structure. The infrared spectra of the three solid solutions are reported here in comparison with those of (alpha) -NaVO3 and KVO3. The results are also correlated with those obtained in two independent high pressure Raman studies of NH4VO3 and RbVO3 as the introduction of a larger cation like K+ should increase the pressure in the structure.

  20. Implementasi Server VoIP Berbasis SIP Pada LAN Nirkabel

    Directory of Open Access Journals (Sweden)

    Mohammad Shoffa Al Arofat

    2013-03-01

    Full Text Available Voice over Internet Protocol (VoIP merupakan teknologi yang memungkinkan percakapan suara jarak jauh melalui protokol internet. Dalam telekomunikasi, diperlukan teknologi pensinyalan yang berguna untuk membangun, mengawasi, dan melepas hubungan antara dua titik. Salah satu teknologi pensinyalan yang banyak digunakan untuk VoIP adalah Session Initiation Protocol, dengan implementasinya yang berupa perangkat lunak Open SIP Server. Selain pensinyalan, ada beberapa parameter yang perlu diperhatikan dalam implementasi VoIP, yaitu Mean Opinion Score (MOS, network impairment, dan bandwidth. Pengujian dilakukan terhadap enam codec, yaitu G.722, PCMA, PCMU, Speex, GSM, dan BV16. Berdasarkan hasil analisis dapat diambil kesimpulan bahwa codec yang menggunakan bandwidth paling rendah adalah Speex (27,12 kbps; Rata-rata delay yang dihasilkan oleh sipdroid lebih baik daripada jitsi.

  1. A Secured Load Mitigation and Distribution Scheme for Securing SIP Server

    Directory of Open Access Journals (Sweden)

    Vennila Ganesan

    2017-01-01

    Full Text Available Managing the performance of the Session Initiation Protocol (SIP server under heavy load conditions is a critical task in a Voice over Internet Protocol (VoIP network. In this paper, a two-tier model is proposed for the security, load mitigation, and distribution issues of the SIP server. In the first tier, the proposed handler segregates and drops the malicious traffic. The second tier provides a uniform load of distribution, using the least session termination time (LSTT algorithm. Besides, the mean session termination time is minimized by reducing the waiting time of the SIP messages. Efficiency of the LSTT algorithm is evaluated through the experimental test bed by considering with and without a handler. The experimental results establish that the proposed two-tier model improves the throughput and the CPU utilization. It also reduces the response time and error rate while preserving the quality of multimedia session delivery. This two-tier model provides robust security, dynamic load distribution, appropriate server selection, and session synchronization.

  2. Temperature-agile and structure-tunable optical properties of VO2/Ag thin films

    International Nuclear Information System (INIS)

    Zhang, X.R.; Hu, X.; Wang, W.; Zhao, Y.; Reinhardt, K.; Knize, R.J.; Lu, Yalin

    2012-01-01

    By integrating together VO 2 's unique near-room-temperature (RT) semiconductor-metal (S-M) phase transition with a thin silver (Ag) layer's plasmonic properties, VO 2 /Ag multilayers could present a much enhanced optical transmission change when increasing the temperature from RT to over VO 2 's S-M phase-transition temperature. Changing VO 2 and Ag layer thicknesses can also significantly tune their transmission and absorption properties, which could lead to a few useful designs in optoelectronic and energy-saving industries. (orig.)

  3. IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Aymen Abdullah Alsaffar

    2015-01-01

    Full Text Available These days, the advancing of smart devices (e.g. smart phones, tablets, PC, etc. capabilities and the increase of internet bandwidth enables IPTV service provider to extend their services to smart mobile devices. User can just receive their IPTV service using any smart devices by accessing the internet via wireless network from anywhere anytime in the world which is convenience for users. However, wireless network communication has well a known critical security threats and vulnerabilities to user smart devices and IPTV service such as user identity theft, reply attack, MIM attack, and so forth. A secure authentication for user devices and multimedia protection mechanism is necessary to protect both user devices and IPTV services. As result, we proposed framework of IPTV service based on secure authentication mechanism and lightweight content encryption method for screen-migration in Cloud computing. We used cryptographic nonce combined with user ID and password to authenticate user device in any mobile terminal they passes by. In addition we used Lightweight content encryption to protect and reduce the content decode overload at mobile terminals. Our proposed authentication mechanism reduces the computational processing by 30% comparing to other authentication mechanism and our lightweight content encryption reduces encryption delay to 0.259 second.

  4. Thermally tunable VO2-SiO2 nanocomposite thin-film capacitors

    Science.gov (United States)

    Sun, Yifei; Narayanachari, K. V. L. V.; Wan, Chenghao; Sun, Xing; Wang, Haiyan; Cooley, Kayla A.; Mohney, Suzanne E.; White, Doug; Duwel, Amy; Kats, Mikhail A.; Ramanathan, Shriram

    2018-03-01

    We present a study of co-sputtered VO2-SiO2 nanocomposite dielectric thin-film media possessing continuous temperature tunability of the dielectric constant. The smooth thermal tunability is a result of the insulator-metal transition in the VO2 inclusions dispersed within an insulating matrix. We present a detailed comparison of the dielectric characteristics of this nanocomposite with those of a VO2 control layer and of VO2/SiO2 laminate multilayers of comparable overall thickness. We demonstrated a nanocomposite capacitor that has a thermal capacitance tunability of ˜60% between 25 °C and 100 °C at 1 MHz, with low leakage current. Such thermally tunable capacitors could find potential use in applications such as sensing, thermal cloaks, and phase-change energy storage devices.

  5. Crystallization Mechanism and Phase Transition Properties of W-doped VO2 Synthesized by Hydrothermal Method

    Directory of Open Access Journals (Sweden)

    LI Yao

    2017-11-01

    Full Text Available VO2 sol was firstly prepared using vanadyl sulfate as a vanadium source by precipitation-peptization method. Then tungsten(W doping vanadium dioxide(W-VO2 was prepared by hydrothermal crystallization of prepared sol with the presence of ammonium metatungstate. The morphologies, crystal structure of the as-prepared samples and phase transition properties were studied by X-ray diffraction(XRD, field emission scanning electron microscope(FESEMand differential scanning calorimetry(DSC analysis. The results indicate that rod-like W-VO2(B crystal with length of 1-2μm and radius of 100-200nm is firstly formed during hydrothermal treatment for 4-48h at 280℃, then the rod-like crystal dissolves gradually and sheet-like or snowflake-like crystal is formed with the phase transition from W-VO2(B to W-VO2(M and eventually, the W-VO2(M crystals can further grow up while the W-VO2(B gradually dissolves; the phase transition temperature of VO2 decreases with the increase in W doping content, and the phase transition temperature of W-VO2(M reduces to about 28℃ when the nominal dopant concentration is 6.0%(atom fraction.The "nucleation-growth-transformation-ripening" mechanism is proposed as the formation mechanism based on the hydrothermal crystallization and morphological evolution process of W-VO2(M.

  6. Parliamentary control of security information agency in terms of security culture: State and problems

    Directory of Open Access Journals (Sweden)

    Radivojević Nenad

    2013-01-01

    Full Text Available Even though security services have the same function as before, today they have different tasks and significantly more work than before. Modern security problems of the late 20th and early 21st century require states to reorganize their security services, adapting them to the new changes. The reorganization involves, among other things, giving wider powers of the security services, in order to effectively counter the growing and sophisticated security threats, which may also lead to violations of human rights and freedoms. It is therefore necessary to define the right competence, organization, authority and control of these services. In democratic countries, there are several institutions with different levels of control of security services. Parliament is certainly one of the most important institutions in that control, both in the world and in our country. Powers, finance, the use of special measures and the nature and scope of work of the Security Information Agency are certainly object of the control of the National Assembly. What seems to be the problem is achieving a balance between the need for control of security services and security services to have effective methods for combating modern security problems. This paper presents the legal framework related to the National Assembly control of the Security Intelligence Agency, as well as the practical problems associated with this type of control. We analyzed the role of security culture as one of the factors of that control. In this regard, it provides guidance for the practical work of the members of parliament who control the Security Intelligence Agency, noting in particular the importance of and the need for continuous improvement of security culture representatives.

  7. 75 FR 13235 - IP-Enabled Services

    Science.gov (United States)

    2010-03-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 63 [WC Docket No. 04-36; FCC 09-40] IP-Enabled Services AGENCY: Federal Communications Commission ACTION: Final rule; announcement of effective date... Internet Protocol (VoIP) service the discontinuance obligations that apply to domestic non-dominant...

  8. VV and VO2 defects in silicon studied with hybrid density functional theory

    KAUST Repository

    Christopoulos, Stavros Richard G

    2014-12-07

    The formation of VO (A-center), VV and VO2 defects in irradiated Czochralski-grown silicon (Si) is of technological importance. Recent theoretical studies have examined the formation and charge states of the A-center in detail. Here we use density functional theory employing hybrid functionals to analyze the formation of VV and VO2 defects. The formation energy as a function of the Fermi energy is calculated for all possible charge states. For the VV and VO2 defects double negatively charged and neutral states dominate, respectively.

  9. Photocatalytic perfermance of sandwich-like BiVO{sub 4} sheets by microwave assisted synthesis

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Suqin, E-mail: liusuqin888@126.com [Department of Chemical engineering and Food Science, Hubei University of arts and science, Xiangyang 441053 (China); Hubei Key Laboratory of Low Dimensional Optoelectronic Materials and Devices, Xiangyang 441053 (China); Tang, Huiling; Zhou, Huan [Department of Chemical engineering and Food Science, Hubei University of arts and science, Xiangyang 441053 (China); Dai, Gaopeng, E-mail: dgp2000@126.com [Department of Chemical engineering and Food Science, Hubei University of arts and science, Xiangyang 441053 (China); Wang, Wanqiang [Department of Chemical engineering and Food Science, Hubei University of arts and science, Xiangyang 441053 (China)

    2017-01-01

    Graphical abstract: Sandwich-like BiVO{sub 4} sheets were successfully synthesized via a facile microwave-assisted method. The as-prepared samples exhibit a high activity for the degradation of methyl orange under visible light irradiation. - Highlights: • Sandwich-like BiVO{sub 4} sheets were synthesized by a facile microwave-assisted method. • The presence of PEG-10000 plays a critical role in the formation of BiVO{sub 4} sheets. • Ostwald ripening is the primary driving force for the formation of sandwich-like BiVO{sub 4}. • The sandwich-like BiVO{sub 4} sheets exhibit a high visible-light photocatalytic activity. - Abstract: Sandwich-like BiVO{sub 4} sheets were successfully synthesized in an aqueous solution containing bismuth nitrate, ammonium metavanadate and polyethylene glycol with a molecular weight of 10,000 (PEG-10000) using a facile microwave-assisted method. The as-prepared samples were characterized by scanning electron microscopy, N{sub 2} adsorption-desorption, X-ray diffraction, X-ray photoelectron spectroscopy (XPS), and UV–vis diffuse reflectance spectroscopy. The results show that the presence of PEG-10000 plays a critical role in the formation of BiVO{sub 4} sheets, and Ostwald ripening is the primary driving force for the formation of sandwich-like structures. The sandwich-like BiVO{sub 4} sheets exhibit a high activity for the degradation of methyl orange under visible light irradiation (λ ≥ 420 nm). The enhancement of photocatalytic activity of sandwich-like BiVO{sub 4} sheets can be attributed to its large surface area over the irregular BiVO{sub 4} particles.

  10. Improved photoelectrochemical performance of BiVO4/MoO3 heterostructure thin films

    Science.gov (United States)

    Kodan, Nisha; Mehta, B. R.

    2018-05-01

    Bismuth vanadate (BiVO4) and Molybdenum trioxide (MoO3) thin films have been prepared by RF sputtering technique. BiVO4 thin films were deposited on indium doped tin oxide (In: SnO2; ITO) substrates at room temperature and 80W applied rf power. The prepared BiVO4 thin films were further annealed at 450°C for 2 hours in air to obtain crystalline monoclinic phase and successively coated with MoO3 thin films deposited at 150W rf power and 400°C for 30 minutes. The effect of coupling BiVO4 and MoO3 on the structural, optical and photoelectrochemical (PEC) properties have been studied. Optical studies reveal that coupling of BiVO4 and MoO3 results in improvement of optical absorption in visible region of solar spectrum. PEC study shows approximate 3-fold and 38-fold increment in photocurrent values of BiVO4/MoO3 (0.38 mA/cm2) heterostructure thin film as compared to MoO3 (0.15 mA/cm2) and BiVO4 (10 µA/cm2) thin films at applied bias of 1 V vs Ag/AgCl in 0.5 M Na2SO4 (pH=7) electrolyte.

  11. Efficient solar-driven water splitting by nanocone BiVO4-perovskite tandem cells

    Science.gov (United States)

    Qiu, Yongcai; Liu, Wei; Chen, Wei; Chen, Wei; Zhou, Guangmin; Hsu, Po-Chun; Zhang, Rufan; Liang, Zheng; Fan, Shoushan; Zhang, Yuegang; Cui, Yi

    2016-01-01

    Bismuth vanadate (BiVO4) has been widely regarded as a promising photoanode material for photoelectrochemical (PEC) water splitting because of its low cost, its high stability against photocorrosion, and its relatively narrow band gap of 2.4 eV. However, the achieved performance of the BiVO4 photoanode remains unsatisfactory to date because its short carrier diffusion length restricts the total thickness of the BiVO4 film required for sufficient light absorption. We addressed the issue by deposition of nanoporous Mo-doped BiVO4 (Mo:BiVO4) on an engineered cone-shaped nanostructure, in which the Mo:BiVO4 layer with a larger effective thickness maintains highly efficient charge separation and high light absorption capability, which can be further enhanced by multiple light scattering in the nanocone structure. As a result, the nanocone/Mo:BiVO4/Fe(Ni)OOH photoanode exhibits a high water-splitting photocurrent of 5.82 ± 0.36 mA cm−2 at 1.23 V versus the reversible hydrogen electrode under 1-sun illumination. We also demonstrate that the PEC cell in tandem with a single perovskite solar cell exhibits unassisted water splitting with a solar-to-hydrogen conversion efficiency of up to 6.2%. PMID:27386565

  12. Active terahertz metamaterials based on the phase transition of VO{sub 2} thin films

    Energy Technology Data Exchange (ETDEWEB)

    Kim, H., E-mail: heungsoo.kim@nrl.navy.mil [Materials Science and Technology Division, Naval Research Laboratory, Washington, DC 20375 (United States); Charipar, N. [Materials Science and Technology Division, Naval Research Laboratory, Washington, DC 20375 (United States); Breckenfeld, E. [National Research Council Fellow at the Naval Research Laboratory, Washington, DC 20375 (United States); Rosenberg, A. [NOVA Research, Inc., Alexandria, VA 22308 (United States); Piqué, A. [Materials Science and Technology Division, Naval Research Laboratory, Washington, DC 20375 (United States)

    2015-12-01

    Vanadium dioxide (VO{sub 2}) thin films were prepared on single crystal sapphire substrates by pulsed laser deposition. VO{sub 2} films exhibited a significant resistivity drop (> 10{sup 4} Ω-cm) and large optical transmittance change (> 60%) in the near-infrared region across their semiconductor-to-metal transition. Hybrid metamaterial devices designed for the THz frequency regime were fabricated by combining double split-ring resonators (SRRs) with phase changing VO{sub 2} films. By changing the conductivity of VO{sub 2} via temperature, the behavior of the SRR gap was adjusted from capacitive to resistive in order to modulate the THz beam transmission at their resonance frequencies. A modulation efficiency greater than 50% was achieved at the magnetic resonance frequencies (0.3 THz and 0.7 THz) in these hybrid SRR–VO{sub 2} metamaterial devices. - Highlights: • Pulsed laser deposition of phase changing VO{sub 2} thin films • Hybrid metamaterial devices composed of split-ring resonators and phase changing VO{sub 2} • Tunable THz transmission with a modulation efficiency over 50%.

  13. Infrared spectra of the ammonium ion in ammonium metavanadate NH 4VO 3

    Science.gov (United States)

    de Waal, D.; Heyns, A. M.; Range, K.-J.; Eglmeier, C.

    The ND stretching modes of isotopically dilute NH 3D + ions in NH 4VO 3 are in agreement with the predicted splitting into C s, C s and C1(2) components under C s site symmetry for the NH +4 ion. The three bands observed represent the three NH bonding distances in the crystal, and the position, shape and low temperature behaviour of each band confirms the existence of two types of hydrogen bonding in NH 4VO 3. The low temperature infrared modes of NH +4 and ND +4 in NH 4VO 3 and ND 4VO 3, respectively, can be assigned under space group Pbcm. Temperature dependence of these modes also reflects the presence of both normal and bifurcated hydrogen bonds in NH 4VO 3.

  14. Synthesis, crystal structure and optical properties of BiMgVO 5

    Science.gov (United States)

    Benmokhtar, S.; El Jazouli, A.; Chaminade, J. P.; Gravereau, P.; Guillen, F.; de Waal, D.

    2004-11-01

    The new vanadate BiMgVO 5 has been prepared and its structure has been determined by single crystal X-ray diffraction: space group P21/n, a=7.542(6) Å, b=11.615(5) Å, c=5.305(3) Å, β=107.38(5)°, wR2=0.0447, R=0.0255. The structure consists of [Mg 2O 10] and [Bi 2O 10] dimers sharing their corners with [VO 4] tetrahedra. The ranges of bond lengths are 2.129-2.814 Å for Bi-O; 2.035-2.167 Å for Mg-O and 1.684-1.745 Å for V-O. V-O bond lengths determined from Raman band wavenumbers are between 1.679 and 1.747 Å. An emission band overlapping the entire visible region with a maximum around 650 nm is observed.

  15. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    .... This thesis defines interoperability as the capacity to support trust through retention of security services across PKI domains at a defined level of assurance and examines the elements of PKI...

  16. Chapter 35: Describing Data and Data Collections in the VO

    Science.gov (United States)

    Kent, B. R.; Hanisch, R. J.; Williams, R. D.

    The list of numbers: 19.22, 17.23, 18.11, 16.98, and 15.11, is of little intrinsic interest without information about the context in which they appear. For instance, are these daily closing stock prices for your favorite investment, or are they hourly photometric measurements of an increasingly bright quasar? The information needed to define this context is called metadata. Metadata are data about data. Astronomers are familiar with metadata through the headers of FITS files and the names and units associated with columns in a table or database. In the VO, metadata describe the contents of tables, images, and spectra, as well as aggregate collections of data (archives, surveys) and computational services. Moreover, VO metadata are constructed according to rules that avoid ambiguity and make it clear whether, in the example above, the stock prices are in dollars or euros, or the photometry is Johnson V or Sloan g. Organization of data is important in any scientific discipline. Equally crucial are the descriptions of that data: the organization publishing the data, its creator or the person making it available, what instruments were used, units assigned to measurement, calibration status, and data quality assessment. The Virtual Observatory metadata scheme not only applies to datasets, but to resources as well, including data archive facilities, searchable web forms, and online analysis and display tools. Since the scientific output flowing from large datasets depends greatly on how well the data are described, it is important for users to understand the basics of the metadata scheme in order to locate the data that they want and use it correctly. Metadata are the key to data discovery and data and service interoperability in the Virtual Observatory.

  17. Time limit and time at VO2max' during a continuous and an intermittent run.

    Science.gov (United States)

    Demarie, S; Koralsztein, J P; Billat, V

    2000-06-01

    The purpose of this study was to verify, by track field tests, whether sub-elite runners (n=15) could (i) reach their VO2max while running at v50%delta, i.e. midway between the speed associated with lactate threshold (vLAT) and that associated with maximal aerobic power (vVO2max), and (ii) if an intermittent exercise provokes a maximal and/or supra maximal oxygen consumption longer than a continuous one. Within three days, subjects underwent a multistage incremental test during which their vVO2max and vLAT were determined; they then performed two additional testing sessions, where continuous and intermittent running exercises at v50%delta were performed up to exhaustion. Subject's gas exchange and heart rate were continuously recorded by means of a telemetric apparatus. Blood samples were taken from fingertip and analysed for blood lactate concentration. In the continuous and the intermittent tests peak VO2 exceeded VO2max values, as determined during the incremental test. However in the intermittent exercise, peak VO2, time to exhaustion and time at VO2max reached significantly higher values, while blood lactate accumulation showed significantly lower values than in the continuous one. The v50%delta is sufficient to stimulate VO2max in both intermittent and continuous running. The intermittent exercise results better than the continuous one in increasing maximal aerobic power, allowing longer time at VO2max and obtaining higher peak VO2 with lower lactate accumulation.

  18. ENTREPRENEURSHIP ECONOMIC SAFETY AND DEVELOPMENT OF SECURITY SERVICES

    Directory of Open Access Journals (Sweden)

    G. V. Goudkov

    2011-01-01

    Full Text Available Successful functioning of the industry that provides for safety of organizations and physical entities exercises strategic impacts on development of society and economics of any state including Russia. Economic safety of Russia is directly linked with economic and information safety of itsbusiness structures. Extension of the scope and use of services offered by experienced state and private security enterprises including licensed individuals is one of most important directions of business safety perfection. Further improvement of Russian legislation on non-governmentalsecurity structures and coordination of their activities with those of state law enforcement bodies is obligatory condition of attaining higherpublic and economic safety levels.

  19. In situ X-ray powder diffraction, synthesis, and magnetic properties of InVO 3

    Science.gov (United States)

    Lundgren, Rylan J.; Cranswick, Lachlan M. D.; Bieringer, Mario

    2006-12-01

    We report the first synthesis and high-temperature in situ X-ray diffraction study of InVO 3. Polycrystalline InVO 3 has been prepared via reduction of InVO 4 using a carbon monoxide/carbon dioxide buffer gas. InVO 3 crystallizes in the bixbyite structure in space group Ia-3 (206) with a=9.80636(31) Å with In 3+/V 3+ disorder on the (8 b) and (24 d) cation sites. In situ powder X-ray diffraction experiments and thermal gravimetric analysis in a CO/CO 2 buffer gas revealed the existence of the metastable phase InVO 3. Bulk samples with 98.5(2)% purity were prepared using low-temperature reduction methods. The preparative methods limited the crystallinity of this new phase to approximately 225(50) Å. Magnetic susceptibility and neutron diffraction experiments suggest a spin-glass ground state for InVO 3.

  20. Epitaxial growth and electronic structure of oxyhydride SrVO{sub 2}H thin films

    Energy Technology Data Exchange (ETDEWEB)

    Katayama, Tsukasa; Chikamatsu, Akira, E-mail: chikamatsu@chem.s.u-tokyo.ac.jp; Yamada, Keisuke; Onozuka, Tomoya [Department of Chemistry, The University of Tokyo, Bunkyo-ku, Tokyo 113-0033 (Japan); Shigematsu, Kei [Kanagawa Academy of Science and Technology, Kawasaki, Kanagawa 213-0012 (Japan); Minohara, Makoto; Kumigashira, Hiroshi [Institute of Materials Structure Science, High Energy Accelerator Research Organization (KEK), Tsukuba, Ibaraki 305-0801 (Japan); Ikenaga, Eiji [Japan Synchrotron Radiation Research Institute (JASRI)/SPring-8, Mikazuki-cho, Hyogo 679-5198 (Japan); Hasegawa, Tetsuya [Department of Chemistry, The University of Tokyo, Bunkyo-ku, Tokyo 113-0033 (Japan); Kanagawa Academy of Science and Technology, Kawasaki, Kanagawa 213-0012 (Japan)

    2016-08-28

    Oxyhydride SrVO{sub 2}H epitaxial thin films were fabricated on SrTiO{sub 3} substrates via topotactic hydridation of oxide SrVO{sub 3} films using CaH{sub 2}. Structural and composition analyses suggested that the SrVO{sub 2}H film possessed one-dimensionally ordered V-H{sup −}-V bonds along the out-of-plane direction. The synthesis temperature could be lowered by reducing the film thickness, and the SrVO{sub 2}H film was reversible to SrVO{sub 3} by oxidation through annealing in air. Photoemission and X-ray absorption spectroscopy measurements revealed the V{sup 3+} valence state in the SrVO{sub 2}H film, indicating that the hydrogen existed as hydride. Furthermore, the electronic density of states was highly suppressed at the Fermi energy, consistent with the prediction that tetragonal distortion induces metal to insulation transition.

  1. Phase coexistence in the metal-insulator transition of a VO2 thin film

    International Nuclear Information System (INIS)

    Chang, Y.J.; Koo, C.H.; Yang, J.S.; Kim, Y.S.; Kim, D.H.; Lee, J.S.; Noh, T.W.; Kim, Hyun-Tak; Chae, B.G.

    2005-01-01

    Vanadium dioxide (VO 2 ) shows a metal-insulator transition (MIT) near room temperature, accompanied by an abrupt resistivity change. Since the MIT of VO 2 is known to be a first order phase transition, it is valuable to check metallic and insulating phase segregation during the MIT process. We deposited (100)-oriented epitaxial VO 2 thin films on R-cut sapphire substrates. From the scanning tunneling spectroscopy (STS) spectra, we could distinguish metallic and insulating regions by probing the band gap. Optical spectroscopic analysis also supported the view that the MIT in VO 2 occurs through metal and insulator phase coexistence

  2. Internet of people, things and services - the convergence of security, trust and privacy

    CSIR Research Space (South Africa)

    Eloff, JHP

    2009-12-01

    Full Text Available The Future Internet will consist of billions of people, things and services having the potential to interact with each other and their environment. This highly interconnected global network structure presents new types of challenges from a security...

  3. Progressive recruitment of muscle fibers is not necessary for the slow component of VO2 kinetics.

    Science.gov (United States)

    Zoladz, Jerzy A; Gladden, L Bruce; Hogan, Michael C; Nieckarz, Zenon; Grassi, Bruno

    2008-08-01

    The "slow component" of O2 uptake (VO2) kinetics during constant-load heavy-intensity exercise is traditionally thought to derive from a progressive recruitment of muscle fibers. In this study, which represents a reanalysis of data taken from a previous study by our group (Grassi B, Hogan MC, Greenhaff PL, Hamann JJ, Kelley KM, Aschenbach WG, Constantin-Teodosiu D, Gladden LB. J Physiol 538: 195-207, 2002) we evaluated the presence of a slow component-like response in the isolated dog gastrocnemius in situ (n=6) during 4 min of contractions at approximately 60-70% of peak VO2. In this preparation all muscle fibers are maximally activated by electrical stimulation from the beginning of the contraction period, and no progressive recruitment of fibers is possible. Muscle VO2 was calculated as blood flow multiplied by arteriovenous O2 content difference. The muscle fatigued (force decreased by approximately 20-25%) during contractions. Kinetics of adjustment were evaluated for 1) VO2, uncorrected for force development; 2) VO2 normalized for peak force; 3) VO2 normalized for force-time integral. A slow component-like response, described in only one muscle out of six when uncorrected VO2 was considered, was observed in all muscles when VO2/peak force and VO2/force-time were considered. The amplitude of the slow component-like response, expressed as a fraction of the total response, was higher for VO2/peak force (0.18+/-0.06, means+/-SE) and for VO2/force-time (0.22+/-0.05) compared with uncorrected VO2 (0.04+/-0.04). A progressive recruitment of muscle fibers may not be necessary for the development of the slow component of VO2 kinetics, which may be caused by the metabolic factors that induce muscle fatigue and, as a consequence, reduce the efficiency of muscle contractions.

  4. o-Iminobenzosemiquinonate and o-imino-p-methylbenzosemiquinonate anion radicals coupled VO2+ stabilization.

    Science.gov (United States)

    Roy, Amit Saha; Saha, Pinaki; Adhikary, Nirmal Das; Ghosh, Prasanta

    2011-03-21

    The diamagnetic VO(2+)-iminobenzosemiquinonate anion radical (L(R)(IS)(•-), R = H, Me) complexes, (L(-))(VO(2+))(L(R)(IS)(•-)): (L(1)(-))(VO(2+))(L(H)(IS)(•-))•3/2MeOH (1•3/2MeOH), (L(2)(-))(VO(2+))(L(H)(IS)(•-)) (2), and (L(2)(-))(VO(2+))(L(Me)(IS)(•-))•1/2 L(Me)(AP) (3•1/2 L(Me)(AP)), incorporating tridentate monoanionic NNO-donor ligands {L = L(1)(-) or L(2)(-), L(1)H = (2-[(phenylpyridin-2-yl-methylene)amino]phenol; L(2)H = 1-(2-pyridylazo)-2-naphthol; L(H)(IS)(•-) = o-iminobenzosemiquinonate anion radical; L(Me)(IS)(•-) = o-imino-p-methylbenzosemiquinonate anion radical; and L(Me)(AP) = o-amino-p-methylphenol} have been isolated and characterized by elemental analyses, IR, mass, NMR, and UV-vis spectra, including the single-crystal X-ray structure determinations of 1•3/2MeOH and 3•1/2 L(Me)(AP). Complexes 1•3/2MeOH, 2, and 3•1/2 L(Me)(AP) absorb strongly in the visible region because of intraligand (IL) and ligand-to-metal charge transfers (LMCT). 1•3/2MeOH is luminescent (λ(ext), 333 nm; λ(em), 522, 553 nm) in frozen dichloromethane-toluene glass at 77 K due to π(diimine→)π(diimine)* transition. The V-O(phenolato) (cis to the V═O) lengths, 1.940(2) and 1.984(2) Å, respectively, in 1•3/2MeOH and 3•1/2 L(Me)(AP) are consistent with the VO(2+) description. The V-O(iminosemiquinonate) (trans to the V═O) lengths, 2.1324(19) in 1•3/2MeOH and 2.083(2) Å in 3•1/2 L(Me)(AP), are expectedly ∼0.20 Å longer due to the trans influence of the V═O bond. Because of the stronger affinity of the paramagnetic VO(2+) ion to the L(H)(IS)(•-) or L(Me)(IS)(•-), the V-N(iminosemiquinonate) lengths, 1.908(2) and 1.921(2) Å, respectively, in 1•3/2MeOH and 3•1/2 L(Me)(AP), are unexpectedly shorter. Density functional theory (DFT) calculations using B3LYP, B3PW91, and PBE1PBE functionals on 1 and 2 have established that the closed shell singlet (CSS) solutions (VO(3+)-amidophenolato (L(R)(AP)(2-)) coordination) of these

  5. Enhancement in Photoelectrochemical Efficiency by Fabrication of BiVO4@MWCNT Nanocomposites

    Directory of Open Access Journals (Sweden)

    Yan Zhang

    2011-01-01

    Full Text Available An enormous enhancement in the photo-to-current conversion efficiency over the nanocomposite material composed by BiVO4 on the surface of MWCNTs, with respect to electrode of pure BiVO4, was observed. The heterojunction formed between MWCNTs and nano-BiVO4 is beneficial for the separation of photogenerated electrons and holes, resulting in more electrons that are able to transport efficiently to the surface and therefore enhance the photoefficiency.

  6. Lattice effects in HoVo3 single crystal

    International Nuclear Information System (INIS)

    Sikora, M.; Marquina, C.; Ibarra, M.R.; Nugroho, A.A.; Palstra, T.T.M.

    2007-01-01

    We report the study of lattice effects in the Mott insulator HoVO 3 performed by means of linear thermal expansion on a single crystal in the temperature range 10-290 K. The holmium orthovanadate HoVO 3 reveals gradual orbital ordering (OO) below T OO =200 K and orders antiferromagnetically at T N =113 K. A first-order structural phase transition takes place at T S ∼38 K, which is probably accompanied by change of the OO type and hence the type of antiferromagnetic spin ordering

  7. RGO/InVO{sub 4} hollowed-out nanofibers: Electrospinning synthesis and its application in photocatalysis

    Energy Technology Data Exchange (ETDEWEB)

    Ma, Dong [Key Lab of Marine Environment and Ecology, Ministry of Education, Ocean University of China, Qingdao 266100 (China); College of Resource and Environment, Qingdao Agricultural University, Qingdao 266109 (China); Zhang, Yanxiang [College of Environmental Science and Engineering, Shandong University, Jinan 250100 (China); Gao, Mengchun, E-mail: mengchungao@outlook.com [Key Lab of Marine Environment and Ecology, Ministry of Education, Ocean University of China, Qingdao 266100 (China); Xin, Yanjun; Wu, Juan [College of Resource and Environment, Qingdao Agricultural University, Qingdao 266109 (China); Bao, Nan [College of Environmental Science and Engineering, Shandong University, Jinan 250100 (China)

    2015-10-30

    Graphical abstract: - Highlights: • RGO/InVO{sub 4} hollow-out nanofibers were obtained by electrospinning method. • The properties of InVO{sub 4} hollow-out nanofibers were deeply influenced by RGO. • RGO could reduce recombination of e{sup −}–h{sup +} pairs to improve photocatalytic activity. • Photo-induced h{sup +} and e{sup −} are the two main reactive species for RhB degradation. - Abstract: A composite of reduced graphene oxide (RGO) and InVO{sub 4} nanofiber was successfully synthesized by an electrospinning technique. The as-collected fibers were calcined at 420 °C in air and then calcined at 550 °C in nitrogen gas to remove polyvinyl pyrrolidone (PVP), which could enable InVO{sub 4} to crystallize and protect the RGO from oxidation. The InVO{sub 4} in the composite illustrated a hollowed-out fibrous morphology and orthorhombic phase, and RGO nanosheets were nested in the InVO{sub 4} nanofibers. The hybrid RGO could produce more hydroxyl groups and a higher oxygen vacancy density on the surface of RGO/InVO{sub 4} composite. Compared with pure InVO{sub 4}, the light absorption range of the as-prepared RGO/InVO{sub 4} composite was expanded. In Rh B degradation, the RGO/InVO{sub 4} hybrid nanofibers displayed a higher photocatalytic activity than pure InVO{sub 4} nanofibers. The enhanced photocatalytic activity might be ascribed to the role of RGO as an electron transporter and acceptor in the composite, which could effectively inhibit the charge recombination and facilitate the charge transfer. The exported electron could attack an O{sub 2} molecule to facilitate the generation of • O{sub 2}{sup −} and • OH for the photodegradation process of Rh B.

  8. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  9. Selective synthesis and visible-light photocatalytic activities of BiVO4 with different crystalline phases

    International Nuclear Information System (INIS)

    Zhang Xi; Ai Zhihui; Jia Falong; Zhang Lizhi; Fan Xiaoxing; Zou Zhigang

    2007-01-01

    Tetragonal and monoclinic bismuth vanadate (BiVO 4 ) powders were selectively synthesized by aqueous processes. The characterizations of the as-prepared BiVO 4 powders were carried out by X-ray diffraction, nitrogen adsorption, scanning electron microscopy and UV-vis diffuse reflectance spectroscopy. The photocatalytic activities of different BiVO 4 samples were determined by degradation of methylene blue solution under visible-light irradiation (λ > 420 nm) and compared with that of TiO 2 (Degussa P25). The band gaps of the as-prepared BiVO 4 were determined from UV-vis diffuse reflectance spectra. It was found that monoclinic BiVO 4 with a band gap of 2.34 eV showed higher photocatalytic activity than that of tetragonal BiVO 4 with a band gap of 3.11 eV

  10. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  11. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  12. Efek minuman kombinasi maltodekstrin dan vitamin C terhadap VO2maks atlet sepak bola

    Directory of Open Access Journals (Sweden)

    Desty Ervira Puspaningtyas

    2015-07-01

    Full Text Available Background: VO2max is one of win determiner in a game. Athletes receive training to improve technical skills, tactical skills, and physiology functions that can support the improvement of VO2max, so they can improve their achievement. Maltodextrin and vitamin C can be used as an ingredient for beverage products which can improve VO2max. Objective: To assess the effect of maltodextrin and vitamin C combination drink on VO2max in soccer athletes. Method: Type of this study was experimental design with the same subject design. The study was conducted from January 2014 until June 2014 at Culinary Laboratory Universitas Gadjah Mada (UGM and Stadium of Universitas Negeri Yogyakarta (UNY. Subjects of this study were 14 soccer players coming from Universitas Negeri Yogyakarta (UNY. Every subject had to fulfill the inclusion and exclusion criteria, and the subjects were chosen by purposive sampling. In the first treatment, subjects received the combination drink―a drink with a composition 15% of maltodextrin and 250 mg of vitamin C in 300 mL. After 6 days washout period, subjects received 300 mL plain water. Drinks were given 30 minutes before VO2max test. VO2max test method used in this study was yo-yo intermittent recovery test level 2 (IR-2. Results: VO2max when subjects consumed maltodextrin and vitamin C combination drink was significantly lower than VO2max when athletes consumed plain water (p=0,0000. Conclusion: Maltodextrin and vitamin C combination drink was less effective than plain water to enhance VO2max.

  13. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    Public key infrastructure (PKI) technology is at a primitive stage characterized by deployment of PKIs that are engineered to support the provision of security services within individual enterprises, and are not able to support...

  14. Analyzing Comprehensive QoS with Security Constraints for Services Composition Applications in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Naixue Xiong

    2014-12-01

    Full Text Available Services composition is fundamental to software development in multi-service wireless sensor networks (WSNs. The quality of service (QoS of services composition applications (SCAs are confronted with severe challenges due to the open, dynamic, and complex natures of WSNs. Most previous research separated various QoS indices into different fields and studied them individually due to the computational complexity. This approach ignores the mutual influence between these QoS indices, and leads to a non-comprehensive and inaccurate analysis result. The universal generating function (UGF shows the speediness and precision in QoS analysis. However, only one QoS index at a time can be analyzed by the classic UGF. In order to efficiently analyze the comprehensive QoS of SCAs, this paper proposes an improved UGF technique—vector universal generating function (VUGF—which considers the relationship between multiple QoS indices, including security, and can simultaneously analyze multiple QoS indices. The numerical examples demonstrate that it can be used for the evaluation of the comprehensive QoS of SCAs subjected to the security constraint in WSNs. Therefore, it can be effectively applied to the optimal design of multi-service WSNs.

  15. Analyzing comprehensive QoS with security constraints for services composition applications in wireless sensor networks.

    Science.gov (United States)

    Xiong, Naixue; Wu, Zhao; Huang, Yannong; Xu, Degang

    2014-12-01

    Services composition is fundamental to software development in multi-service wireless sensor networks (WSNs). The quality of service (QoS) of services composition applications (SCAs) are confronted with severe challenges due to the open, dynamic, and complex natures of WSNs. Most previous research separated various QoS indices into different fields and studied them individually due to the computational complexity. This approach ignores the mutual influence between these QoS indices, and leads to a non-comprehensive and inaccurate analysis result. The universal generating function (UGF) shows the speediness and precision in QoS analysis. However, only one QoS index at a time can be analyzed by the classic UGF. In order to efficiently analyze the comprehensive QoS of SCAs, this paper proposes an improved UGF technique-vector universal generating function (VUGF)-which considers the relationship between multiple QoS indices, including security, and can simultaneously analyze multiple QoS indices. The numerical examples demonstrate that it can be used for the evaluation of the comprehensive QoS of SCAs subjected to the security constraint in WSNs. Therefore, it can be effectively applied to the optimal design of multi-service WSNs.

  16. CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY

    OpenAIRE

    Kalaiprasath, R.; Elankavi, R.; Udayakumar, R.

    2017-01-01

    The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish-mash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether thes...

  17. Control of room-temperature defect-mediated ferromagnetism in VO{sub 2} films

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Tsung-Han, E-mail: tyang3@ncsu.edu [NSF Center for Advanced Materials and Smart Structures, Department of Materials Science and Engineering, North Carolina State University, Raleigh, NC 27695-7907 (United States); Nori, Sudhakar; Mal, Siddhartha; Narayan, Jagdish [NSF Center for Advanced Materials and Smart Structures, Department of Materials Science and Engineering, North Carolina State University, Raleigh, NC 27695-7907 (United States)

    2011-09-15

    We report interesting ferromagnetic properties and their control in a vanadium-based oxide system driven by stoichiometric defects. Vanadium oxide (VO{sub 2}) thin films were grown on c-plane sapphire substrates by a pulsed laser deposition technique under different ambient conditions. The ferromagnetism of the epitaxial VO{sub 2} films can be switched on and off by altering the cooling ambient parameters. In addition, the saturated magnetic moments and coercivity of the VO{sub 2} films were found to be a function of the oxygen partial pressure during the growth process. The room-temperature ferromagnetic properties of VO{sub 2} films were correlated with the nature of the microstructure and the growth parameters. The origin of the induced magnetic properties are qualitatively understood to stem from intrinsic structural and stoichiometric defects.

  18. Preparation, characterization and enhanced visible-light photocatalytic activities of BiPO4/BiVO4 composites

    International Nuclear Information System (INIS)

    Wu, Siyuan; Zheng, Hong; Lian, Youwei; Wu, Yiying

    2013-01-01

    Graphical abstract: - Highlights: • BiPO 4 /BiVO 4 composites were successfully prepared by the hydrothermal method. • BiPO 4 /BiVO 4 composites exhibited broad absorption in the visible region. • Visible-light photocatalytic activities of BiPO 4 /BiVO 4 composites were enhanced. • P/V molar ratio and pH value of the reaction affect photocatalytic activity. • The mechanism of enhanced visible-light photocatalytic activities was discussed. - Abstract: BiPO 4 /BiVO 4 composites with different P/V molar ratios were prepared by the hydrothermal method and the effect of pH values of hydrothermal reaction on photocatalytic activity of BiPO 4 /BiVO 4 composite was investigated. The photocatalysts were characterized by X-ray diffraction, field emission scanning electron microscopy, energy-dispersive spectroscopy, X-ray photoelectron spectroscopy and UV–vis diffuse reflectance spectroscopy. The photocatalytic property of BiPO 4 /BiVO 4 was evaluated by photocatalytic degradation of Methylene blue under visible light irradiation. The results showed that the photocatalytic activity of the composites was much higher than that of pure BiPO 4 and BiVO 4 . The rate constant of Methylene blue degradation over BiPO 4 /BiVO 4 (P/V molar ratio of 5:1 and hydrothermal reaction pH value of 1.5) is 1.7 times that of pure BiVO 4 . The photocatalytic activity enhancement of BiPO 4 /BiVO 4 composite is closely related to the BiVO 4 functioning as a sensitizer to adsorb visible light and the heterojunction of BiPO 4 /BiVO 4 acting as an active center for hindering the rapid recombination of electron–hole pairs during the photocatalytic reaction

  19. Multiple variables explain the variability in the decrement in VO2max during acute hypobaric hypoxia.

    Science.gov (United States)

    Robergs, R A; Quintana, R; Parker, D L; Frankel, C C

    1998-06-01

    We used multiple regression analyses to determine the relationships between the decrement in sea level (SL, 760 Torr) VO2max during hypobaric hypoxia (HH) and variables that could alter or be related to the decrement in VO2max. HH conditions consisted of 682 Torr, 632 Torr, and 566 Torr, and the measured independent variables were SL-VO2max, SL lactate threshold (SL-LT), the change in hemoglobin saturation at VO2max between 760 and 566 Torr (delta SaO2max), lean body mass (LBM), and gender. Male (N = 14) and female (N = 14) subjects of varied fitness, training status, and residential altitude (1,640-2,460 m) completed cycle ergometry tests of VO2max at each HH condition under randomized and single-blinded conditions. VO2max decreased significantly from 760 Torr after 682 Torr (approximately 915 m) (3.5 +/- 0.9 to 3.4 +/- 0.8 L.min-1, P = 0.0003). Across all HH conditions, the slope of the relative decrement in VO2max (%VO2max) during HH was -9.2%/100 mm Hg (-8.1%/1000 m) with an initial decrease from 100% estimated to occur below 705 Torr (610 m). Step-wise multiple regression revealed that SL-VO2max, SL-LT, delta SaO2max, LBM, and gender each significantly combined to account for 89.03% of the variance in the decrement in VO2max (760-566 Torr) (P decrement in VO2max during HH. The unique variance explanation afforded by SL-LT, LBM, and gender suggests that issues pertaining to oxygen diffusion within skeletal muscle may add to the explanation of between subjects variability in the decrement in VO2max during HH.

  20. Vastly Enhanced BiVO4 Photocatalytic OER Performance by NiCoO2 as Cocatalyst

    KAUST Repository

    Palaniselvam, Thangavelu

    2017-08-07

    Here, a simple and efficient preparation of NiCoO nanoparticle modified nanoporous bismuth vanadate (BiVO) thin film and its application in photoelectrocatalytic (PEC) oxygen evolution reaction (OER) is demonstrated. The role of NiCoO in the composite electrode (BiVO/NiCoO) is twofold: OER cocatalyst and band structure modifier. It improves surface reaction kinetics for PEC OER and enhances charge separation efficiency simultaneously, which is believed to be a determining factor for the unprecedentedly high PEC OER performance of this BiVO/NiCoO nanocomposite. The photocurrent density of 3.6 mA cm at 1.23 V versus RHE in 0.1 m potassium phosphate buffered (pH = 7) electrolyte by BiVO/NiCoO is three times that of BiVO and significantly higher than most literature values. The BiVO/NiCoO nanocomposite shows/possess a high charge separation efficiency (η) of ≈72% as compared to only 23% for pure nanoporous BiVO at 1.23 V versus RHE, which demonstrates convincing role of NiCoO in the composite electrode. Both the excellent photocurrent density and great operational stability of this BiVO/NiCoO nanocomposite makes it a promising photocatalytic material for practical applications.

  1. BiVO4–graphene catalyst and its high photocatalytic performance under visible light irradiation

    International Nuclear Information System (INIS)

    Fu Yongsheng; Sun Xiaoqiang; Wang Xin

    2011-01-01

    Highlights: ► A facile strategy is designed to deposit leaf-like BiVO 4 lamellas on graphene sheet. ► Graphene oxide is reduced to graphene in the hydrothermal reaction process. ► BiVO 4 –graphene system shows high catalytic effects under visible light irradiation. - Abstract: A BiVO 4 –graphene photocatalyst was prepared by a facile one-step hydrothermal method and characterized by X-ray diffraction (XRD), Fourier transform infrared spectroscopy (FTIR), Raman spectroscopy, X-ray photoelectron spectra (XPS), and transmission electron microscopy (TEM) techniques. The results show that the graphene sheets in this catalyst are exfoliated and decorated by leaf-like BiVO 4 lamellas. In comparison with the pure BiVO 4 catalyst, the BiVO 4 –graphene system reveals much higher photocatalytic activity for degradation of methyl orange (MO), methylene blue (MB), Rhodamine B (RhB) and active black BL-G in water under visible light irradiation due to the concerted effects of BiVO 4 and graphene sheets or their integrated properties.

  2. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  3. Insulator-metal transition in substrate-independent VO2 thin film for phase-change devices.

    Science.gov (United States)

    Taha, Mohammad; Walia, Sumeet; Ahmed, Taimur; Headland, Daniel; Withayachumnankul, Withawat; Sriram, Sharath; Bhaskaran, Madhu

    2017-12-20

    Vanadium has 11 oxide phases, with the binary VO 2 presenting stimuli-dependent phase transitions that manifest as switchable electronic and optical features. An elevated temperature induces an insulator-to-metal transition (IMT) as the crystal reorients from a monoclinic state (insulator) to a tetragonal arrangement (metallic). This transition is accompanied by a simultaneous change in optical properties making VO 2 a versatile optoelectronic material. However, its deployment in scalable devices suffers because of the requirement of specialised substrates to retain the functionality of the material. Sensitivity to oxygen concentration and larger-scale VO 2 synthesis have also been standing issues in VO 2 fabrication. Here, we address these major challenges in harnessing the functionality in VO 2 by demonstrating an approach that enables crystalline, switchable VO 2 on any substrate. Glass, silicon, and quartz are used as model platforms to show the effectiveness of the process. Temperature-dependent electrical and optical characterisation is used demonstrating three to four orders of magnitude in resistive switching, >60% chromic discrimination at infrared wavelengths, and terahertz property extraction. This capability will significantly broaden the horizon of applications that have been envisioned but remained unrealised due to the lack of ability to realise VO 2 on any substrate, thereby exploiting its untapped potential.

  4. C=C bond cleavage on neutral VO3(V2O5)n clusters.

    Science.gov (United States)

    Dong, Feng; Heinbuch, Scott; Xie, Yan; Bernstein, Elliot R; Rocca, Jorge J; Wang, Zhe-Chen; Ding, Xun-Lei; He, Sheng-Gui

    2009-01-28

    The reactions of neutral vanadium oxide clusters with alkenes (ethylene, propylene, 1-butene, and 1,3-butadiene) are investigated by experiments and density function theory (DFT) calculations. Single photon ionization through extreme ultraviolet radiation (EUV, 46.9 nm, 26.5 eV) is used to detect neutral cluster distributions and reaction products. In the experiments, we observe products (V(2)O(5))(n)VO(2)CH(2), (V(2)O(5))(n)VO(2)C(2)H(4), (V(2)O(5))(n)VO(2)C(3)H(4), and (V(2)O(5))(n)VO(2)C(3)H(6), for neural V(m)O(n) clusters in reactions with C(2)H(4), C(3)H(6), C(4)H(6), and C(4)H(8), respectively. The observation of these products indicates that the C=C bonds of alkenes can be broken on neutral oxygen rich vanadium oxide clusters with the general structure VO(3)(V(2)O(5))(n=0,1,2...). DFT calculations demonstrate that the reaction VO(3) + C(3)H(6) --> VO(2)C(2)H(4) + H(2)CO is thermodynamically favorable and overall barrierless at room temperature. They also provide a mechanistic explanation for the general reaction in which the C=C double bond of alkenes is broken on VO(3)(V(2)O(5))(n=0,1,2...) clusters. A catalytic cycle for alkene oxidation on vanadium oxide is suggested based on our experimental and theoretical investigations. The reactions of V(m)O(n) with C(6)H(6) and C(2)F(4) are also investigated by experiments. The products VO(2)(V(2)O(5))(n)C(6)H(4) are observed for dehydration reactions between V(m)O(n) clusters and C(6)H(6). No product is detected for V(m)O(n) clusters reacting with C(2)F(4). The mechanisms of the reactions between VO(3) and C(2)F(4)/C(6)H(6) are also investigated by calculations at the B3LYP/TZVP level.

  5. Enhanced visible-light-response photocatalytic degradation of methylene blue on Fe-loaded BiVO4 photocatalyst

    International Nuclear Information System (INIS)

    Chala, Sinaporn; Wetchakun, Khatcharin; Phanichphant, Sukon; Inceesungvorn, Burapat; Wetchakun, Natda

    2014-01-01

    Highlights: • Fe-loaded BiVO 4 particles were prepared by hydrothermal method. • Physicochemical properties played a significant role in photocatalytic process. • All Fe-loaded BiVO 4 samples showed higher photocatalytic activity than pure BiVO 4 . • The Fe 3+ ions may improve the separation of photogenerated electrons and holes. - Abstract: Pure BiVO 4 and nominal 0.5–5.0 mol% Fe-loaded BiVO 4 samples were synthesized by hydrothermal method. All samples were characterized in order to obtain the correlation between structure and photocatalytic properties by X-ray diffraction, Brunauer, Emmett and Teller, UV–vis diffuse reflectance spectrophotometry, photoluminescence spectroscopy, transmission electron microscopy, X-ray photoelectron spectroscopy and inductively coupled plasma-optical emission spectroscopy. The structure of all samples was single-phase monoclinic scheelite. The absorption spectrum of 5.0 mol% Fe-loaded BiVO 4 shifted to the visible region, suggesting the potential application of this material as a superior visible-light driven photocatalyst in comparison with pure BiVO 4 . Photocatalytic activities of all photocatalyst samples were examined by studying the degradation of methylene blue under visible light irradiation. The results clearly showed that Fe-loaded BiVO 4 sample exhibited remarkably higher activity than pure BiVO 4

  6. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  7. HEART RATE VARIABILITY AND BODY COMPOSITION AS VO2MAX DETERMINANTS

    Directory of Open Access Journals (Sweden)

    Henry Humberto León-Ariza

    Full Text Available ABSTRACT Introduction: The maximum oxygen consumption (VO2max is the gold standard in the cardiorespiratory endurance assessment. Objective: This study aimed to develop a mathematical model that contains variables to determine the VO2max of sedentary people. Methods: Twenty participants (10 men and 10 women with a mean age of 19.8±1.77 years were included. For each participant, body composition (percentage of fat and muscle, heart rate variability (HRV at rest (supine and standing, and VO2max were evaluated through an indirect test on a cycloergometer. A multivariate linear regression model was developed from the data obtained, and the model assumptions were verified. Results: Using the data obtained, including percentage of fat (F, percentage of muscle (M, percentage of power at very low frequency (VLF, α-value of the detrended fluctuation analysis (DFAα1, heart rate (HR in the resting standing position, and age of the participants, a model was established for men, which was expressed as VO2max = 4.216 + (Age*0.153 + (F*0.110 - (M*0.053 - (VLF*0.649 - (DFAα1*2.441 - (HR*0.014, with R2 = 0.965 and standard error = 0.146 L/min. For women, the model was expressed as VO2max = 1.947 - (Age*0.047 + (F*0.024 + (M*0.054 + (VLF*1.949 - (DFAα1*0.424 - (HR*0.019, with R2 = 0.987 and standard error = 0.077 L/min. Conclusion: The obtained model demonstrated the influence exerted by body composition, the autonomic nervous system, and age in the prediction of VO2max.

  8. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  9. Transmission of reactive pulsed laser deposited VO{sub 2} films in the THz domain

    Energy Technology Data Exchange (ETDEWEB)

    Émond, Nicolas; Hendaoui, Ali; Ibrahim, Akram; Al-Naib, Ibraheem; Ozaki, Tsuneyuki; Chaker, Mohamed, E-mail: chaker@emt.inrs.ca

    2016-08-30

    Highlights: • Synthesis of vanadium dioxide (VO{sub 2}) thin films as a function of oxygen pressure (2–25 mTorr) using Reactive Pulsed Laser Deposition (RPLD). • Characterization of RPLD-grown VO{sub 2} thin films in the THz frequency range. • THz switches and/or sensors require VO{sub 2} films deposited at low oxygen pressure (i.e. low transition temperature, large amplitude contrast of THz transmission, narrow hysteresis width). • THz optical memory applications require VO{sub 2} films deposited at high oxygen pressure (broad hysteresis width). - Abstract: This work reports on the characteristics of the insulator-to-metal transition (IMT) of reactive pulsed laser deposited vanadium dioxide (VO{sub 2}) films in the terahertz (THz) frequency range, namely the transition temperature T{sub IMT}, the amplitude contrast of the THz transmission over the IMT ΔA, the transition sharpness ΔT and the hysteresis width ΔH. XRD analysis shows the sole formation of VO{sub 2} monoclinic structure with an enhancement of (011) preferential orientation when varying the O{sub 2} pressure (P{sub O2}) during the deposition process from 2 to 25 mTorr. THz transmission measurements as a function of temperature reveal that VO{sub 2} films obtained at low P{sub O2} exhibit low T{sub IMT}, large ΔA, and narrow ΔH. Increasing P{sub O2} results in VO{sub 2} films with higher T{sub IMT}, smaller ΔA, broader ΔH and asymmetric hysteresis loop. The good control of the VO{sub 2} IMT features in the THz domain could be further exploited for the development of advanced smart devices, such as ultrafast switches, modulators, memories and sensors.

  10. A cost-effective method to fabricate VO{sub 2} (M) nanoparticles and films with excellent thermochromic properties

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Hua [CAS Key Laboratory of Renewable Energy, Guangzhou Institute of Energy Conversion, Chinese Academy of Sciences, Guangzhou 510640 (China); University of Chinese Academy of Sciences, Beijing 100049 (China); Xiao, Xiudi, E-mail: xiaoxd@ms.giec.ac.cn [CAS Key Laboratory of Renewable Energy, Guangzhou Institute of Energy Conversion, Chinese Academy of Sciences, Guangzhou 510640 (China); Lu, Xuanming [CAS Key Laboratory of Renewable Energy, Guangzhou Institute of Energy Conversion, Chinese Academy of Sciences, Guangzhou 510640 (China); University of Chinese Academy of Sciences, Beijing 100049 (China); Chai, Guanqi; Sun, Yaoming; Zhan, Yongjun; Xu, Gang [CAS Key Laboratory of Renewable Energy, Guangzhou Institute of Energy Conversion, Chinese Academy of Sciences, Guangzhou 510640 (China)

    2015-07-05

    Highlights: • Via solvent–thermal and pyrolysis method, VO{sub 2} (M) powder was synthesized in air. • Aiding by grinding, VO{sub 2} (M) nanoparticles with the size of 22 nm were obtained. • The VO{sub 2} films show great thermochromic properties with T{sub lum} = 62.1% and ΔT{sub sol} = 12.4%. • The haze is down to 1.9%, which is superior with films prepared by other methods. - Abstract: In this paper, high crystallinity and pure phase VO{sub 2} (M) powder is synthesized by a novel and facile method. Aiding by additional manual grinding and etching process, 22 nm high-quality VO{sub 2} (M) nanoparticles can be obtained. The structure and properties of the VO{sub 2} (M) particles were characterized by X-ray diffraction analysis, transmission electron microscopy, differential scanning calorimetry and UV–vis–NIR spectrophotometer. After mixing VO{sub 2} (M) nanoparticles with transparent polymer, thin films prepared by grinded VO{sub 2} nanoparticles show excellent thermochromic properties. The solar modulation ability is up to 12.4% with luminous transmittance of 62.7%. Moreover, The haze of films prepared by grinded VO{sub 2} (M) nanoparticles is down to 1.9%, which is far less than that of films prepared by original VO{sub 2} (Haze = 8.5%) and etched VO{sub 2} particles (Haze = 4.6%). Dramatical improvement of thermochromic property and definition indicate that it is a promising method to prepare large-scale VO{sub 2} nanoparticles and cost-effective smart window.

  11. Escala de VO2pico em adolescentes obesos e não-Obesos por diferentes métodos Escala de VO2pico en adolescentes obesos y no obesos por diferentes métodos Scale of VO2peak in obese and non-obese adolescents by different methods

    Directory of Open Access Journals (Sweden)

    Gerusa Eisfeld Milano

    2009-12-01

    Full Text Available FUNDAMENTO: O consumo de oxigênio de pico (VO2pico pode ser definido como a maior taxa de consumo de oxigênio durante exercício exaustivo ou máximo. A avaliação da aptidão aeróbica pode ser expressa como relativa à massa corporal, mas esse procedimento pode não remover completamente as diferenças quando indivíduos pesados são avaliados. Assim, o procedimento com escala alométrica é uma estratégia atraente para comparar indivíduos com grandes diferenças em massa corporal. OBJETIVO: Investigar o VO2pico em indivíduos obesos e não-obesos usando o método de correção de massa corporal (convencional e escala alométrica (método alométrico e, como esses métodos são aplicados quando indivíduos de ambos os sexos se exercitam em uma esteira ergométrica. MÉTODOS: O VO2pico relativo ao peso corporal e pelo método alométrico foi comparado em 54 adolescentes obesos e 33 não-obesos (10 a 16 anos. Calorimetria indireta foi usada para avaliar o VO2pico durante um teste máximo. O expoente alométrico foi calculado levando-se em consideração a massa corporal individual. Então o VO2pico foi corrigido pelo expoente alométrico. As comparações foram realizadas usando-se two-way ANOVA para medidas repetidas (p0,05. Entretanto, o VO2pico calculado pelo método convencional foi maior (p0,05 entre os grupos. CONCLUSÃO: Indivíduos obesos apresentaram VO2pico mais baixo do que os não-obesos, quando avaliados pelo método convencional. Entretanto, quando o método da escala alométrica foi aplicado, as diferenças desapareceram.FUNDAMENTO: El consumo pico de oxígeno (VO2pico puede ser definido como la mayor tasa de consumo de oxígeno durante ejercicio exhaustivo o máximo. La evaluación de aptitud aeróbica puede expresarse como relativa a la masa corporal, pero ese procedimiento puede no resolver completamente las diferencias cuando se evalúan individuos pesados. Por ello, el procedimiento con escala alométrica es una

  12. Low-level laser therapy improves the VO2 kinetics in competitive cyclists.

    Science.gov (United States)

    Lanferdini, Fábio J; Krüger, Renata L; Baroni, Bruno M; Lazzari, Caetano; Figueiredo, Pedro; Reischak-Oliveira, Alvaro; Vaz, Marco A

    2018-04-01

    Some evidence supports that low-level laser therapy (LLLT) reduces neuromuscular fatigue, so incrementing sports performance. A previous randomized controlled trial of our group showed increased exercise tolerance in male competitive cyclists treated with three different LLLT doses (3, 6, and 9 J/diode; or 135, 270, and 405 J/thigh) before time-to-exhaustion cycling tests. Now, the present study was designed to evaluate the effects of these LLLT doses on the VO 2 kinetics of athletes during cycling tests. Twenty male competitive cyclists (29 years) participated in a crossover, randomized, double-blind, and placebo-controlled trial. On the first day, the participants performed an incremental cycling test to exhaustion to determine maximal oxygen uptake (VO 2MAX ) and maximal power output (PO MAX ), as well as a familiarization with the time-to-exhaustion test. In the following days (2 to 5), all participants performed time-to-exhaustion tests at PO MAX . Before the exhaustion test, different doses of LLLT (3, 6, and 9 J/diode; or 135, 270, and 405 J/thigh, respectively) or placebo were applied bilaterally to the quadriceps muscle. All exhaustion tests were monitored online by an open-circuit spirometry system in order to analyze the VO 2 amplitude, VO 2 delay time, time constant (tau), and O 2 deficit. Tau and O 2 deficit were decreased with LLLT applications compared to the placebo condition (p  0.05) were found between the experimental conditions for VO 2 amplitude and VO 2 delay time. In conclusion, LLLT decreases tau and O 2 deficit during time-to-exhaustion tests in competitive cyclists, and these changes in VO 2 kinetics response can be one of the possible mechanisms to explain the ergogenic effect induced by LLLT.

  13. The performance model of dynamic virtual organization (VO) formations within grid computing context

    International Nuclear Information System (INIS)

    Han Liangxiu

    2009-01-01

    Grid computing aims to enable 'resource sharing and coordinated problem solving in dynamic, multi-institutional virtual organizations (VOs)'. Within the grid computing context, successful dynamic VO formations mean a number of individuals and institutions associated with certain resources join together and form new VOs in order to effectively execute tasks within given time steps. To date, while the concept of VOs has been accepted, few research has been done on the impact of effective dynamic virtual organization formations. In this paper, we develop a performance model of dynamic VOs formation and analyze the effect of different complex organizational structures and their various statistic parameter properties on dynamic VO formations from three aspects: (1) the probability of a successful VO formation under different organizational structures and statistic parameters change, e.g. average degree; (2) the effect of task complexity on dynamic VO formations; (3) the impact of network scales on dynamic VO formations. The experimental results show that the proposed model can be used to understand the dynamic VO formation performance of the simulated organizations. The work provides a good path to understand how to effectively schedule and utilize resources based on the complex grid network and therefore improve the overall performance within grid environment.

  14. Human mitochondrial haplogroup H: the highest VO2max consumer--is it a paradox?

    Science.gov (United States)

    Martínez-Redondo, Diana; Marcuello, Ana; Casajús, José A; Ara, Ignacio; Dahmani, Yahya; Montoya, Julio; Ruiz-Pesini, Eduardo; López-Pérez, Manuel J; Díez-Sánchez, Carmen

    2010-03-01

    Mitochondrial background has been demonstrated to influence maximal oxygen uptake (VO(2max), in mLkg(-1)min(-1)), but this genetic influence can be compensated for by regular exercise. A positive correlation among electron transport chain (ETC) coupling, ATP and reactive oxygen species (ROS) production has been established, and mitochondrial variants have been reported to show differences in their ETC performance. In this study, we examined in detail the VO(2max) differences found among mitochondrial haplogroups. We recruited 81 healthy male Spanish Caucasian individuals and determined their mitochondrial haplogroup. Their VO(2max) was determined using incremental cycling exercise (ICE). VO(2max) was lower in J than in non-J haplogroup individuals (P=0.04). The H haplogroup was responsible for this difference (VO(2max); J vs. H; P=0.008) and this group also had significantly higher mitochondrial oxidative damage (mtOD) than the J haplogroup (P=0.04). In agreement with these results, VO(2max) and mtOD were positively correlated (P=0.01). Given that ROS production is the major contributor to mtOD and consumes four times more oxygen per electron than the ETC, our results strongly suggest that ROS production is responsible for the higher VO(2max) found in the H variant. These findings not only contribute to a better understanding of the mechanisms underneath VO(2max), but also help to explain some reported associations between mitochondrial haplogroups and mtOD with longevity, sperm motility, premature aging and susceptibility to different pathologies.

  15. Selective scanning tunneling microscope light emission from rutile phase of VO2.

    Science.gov (United States)

    Sakai, Joe; Kuwahara, Masashi; Hotsuki, Masaki; Katano, Satoshi; Uehara, Yoichi

    2016-09-28

    We observed scanning tunneling microscope light emission (STM-LE) induced by a tunneling current at the gap between an Ag tip and a VO2 thin film, in parallel to scanning tunneling spectroscopy (STS) profiles. The 34 nm thick VO2 film grown on a rutile TiO2 (0 0 1) substrate consisted of both rutile (R)- and monoclinic (M)-structure phases of a few 10 nm-sized domains at room temperature. We found that STM-LE with a certain photon energy of 2.0 eV occurs selectively from R-phase domains of VO2, while no STM-LE was observed from M-phase. The mechanism of STM-LE from R-phase VO2 was determined to be an interband transition process rather than inverse photoemission or inelastic tunneling processes.

  16. Prognostic impact of peakVO2-changes in stable CHF on chronic beta-blocker treatment.

    Science.gov (United States)

    Frankenstein, L; Nelles, M; Hallerbach, M; Dukic, D; Fluegel, A; Schellberg, D; Katus, H A; Remppis, A; Zugck, C

    2007-11-15

    Peak oxygen uptake (pVO2) is used for risk stratification in chronic heart failure (CHF), but little is known about the prognostic impact of pVO2-changes in patients on chronic beta-blocker (BBL) therapy. We therefore prospectively evaluated individual pVO2-changes at a 6-month interval in patients all receiving BBL. 194 patients with stable CHF on stable medication were included (V1) and underwent clinical evaluation and exercise testing. Testing was repeated (V2) at 5.7+/-1.5 months after V1 and patients were followed >12 months after V2. Death or hospitalisation due to cardiac reasons was the predefined EP (EPP, end-point positive; n=62; EPN, end-point negative; n=113). Initial characteristics did not differ between EPP and EPN. Multivariate cox regression analysis revealed that change of pVO2 (EPP: -0.6+/-2.6 ml/kg min; EPN: +2.5+/-3.3 ml/kg min; p<0.001) was independent to pVO2, LVEF, NTproBNP and NYHA at V2 for prediction of the combined end-point during follow-up. An increase of pVO2 by 10% was identified as an adequate cut-off value for risk stratification and ROC-analysis showed the significant incremental prognostic value of the determination of pVO2 changes in combination with pVO2. Serial measurements of pVO2 yield additional information for risk stratification in clinically homogenous CHF patients receiving BBL. This is the first study demonstrating this fact within a narrow predefined interval with all patients on BBL.

  17. Enhanced photocatalytic performance of BiVO_4 in aqueous AgNO_3 solution under visible light irradiation

    International Nuclear Information System (INIS)

    Huang, Chien-Kai; Wu, Tsunghsueh; Huang, Chang-Wei; Lai, Chi-Yung; Wu, Mei-Yao; Lin, Yang-Wei

    2017-01-01

    Graphical abstract: Ag"+ ions enhanced photocatalytic activity of BiVO_4 under visible light irradiation. - Highlights: • The presence of Ag"+ ions enhanced the photodegradation activity of BiVO_4. • Photoreduction of Ag deposited on the BiVO_4 surface was obtained. • Luminescence and electrochemical results elucidated the photocatalytic mechanism. • Holes and oxygen radicals were the main reactive species generated by BiVO_4/Ag"+. • Used BiVO_4/Ag"+ exhibited photocatalytic antibacterial activity toward E. coli. - Abstract: Monoclinic-phase bismuth vanadate (BiVO_4) with a 2.468 eV band gap exhibited enhanced synergic photodegradation activity toward methylene blue (MB) when combined with silver ions (Ag"+) in an aqueous solution under visible light irradiation. The mass ratio of AgNO_3 to BiVO_4 and the calcination temperature were discovered to considerably affect the degradation activity of BiVO_4/Ag"+. Superior photocatalytic performance was obtained when BiVO_4 was mixed with 0.01%(w/v) AgNO_3 solution, and complete degradation of MB was achieved after 25 min visible light irradiation, outperforming BiVO_4 or AgNO_3 solution alone. The enhanced photodegradation was investigated using systematic luminescence measurements, electrochemical impedance spectroscopy, and scavenger addition, after which a photocatalytic mechanism for MB degradation under visible light irradiation was identified that involved oxygen radicals and holes. This study also discovered the two dominating processes involved in enhancing the electron–hole separation efficiency and reducing their recombination rate, namely photoreduction of Ag"+ and the formation of a BiVO_4/Ag heterojunction. The synergic effect between BiVO_4 and Ag"+ was discovered to be unique. BiVO_4/Ag"+ was successfully used to degrade two other dyes and disinfect Escherichia Coli. A unique fluorescent technique using BiVO_4 and a R6G solution to detect Ag"+ ions in water was discovered.

  18. MAXIMAL OXIGEN UPTAKE (VO2 MAX AS THE INDICATOR OF PHYSICAL WORKING CAPACITY IN SPORTSMEN

    Directory of Open Access Journals (Sweden)

    Zvezdana Rajkovaca

    2005-12-01

    Full Text Available The term “aerobic capacity” represents the sum of aerobic metabolic processes in human organism. It is the basis of the physical working capacity. Value of the maximal oxygen uptake (VO2max is the best indicator for the aerobic capacity evaluation.The purpose of this study was to check the possibility of using VO2max as the indicator of aerobic capacity in sportsmen and to check differences in VO2max values in regard to non-sportsmen.The goals were: 1.Analyses of the VO2max values in sportsmen of various sports 2. Comparison of values of sportsmen with the values of non-sportsmen.This study included 67 sportsmen (rowers, football players and judoists and 28 nonsportsmen. VO2max was measured by using a direct method.The results obtained show statistically higher VO2max values in rowers (4,52 L/min - 55,8 mL/kg/min in regard to football players (4,2 L/min – 53,6 mL/kg/min, judoists (3,58 L/min - 47,2 mL/ kg/min and non-sportsmen (3,28 L/min – 42,3 mL/kg/min. Successful rowing requires high anaerobic capacity and, therefore, high VO2max.These results show higher values of VO2max in sportsmen in regard to non-sportsmen, which is the result of training only.

  19. VO2 nanostructures based chemiresistors for low power energy consumption hydrogen sensing

    CSIR Research Space (South Africa)

    Simo, A

    2014-05-01

    Full Text Available Mott-type VO(sub2) oxide nanobelts are demonstrated to be effective hydrogen gas sensors at room temperature. These nanobelts, synthesized by hydrothermal process and exhibiting the VO(sub2) (A) crystallographic phase, display room temperature H...

  20. Increases in .VO2max with "live high-train low" altitude training: role of ventilatory acclimatization.

    Science.gov (United States)

    Wilhite, Daniel P; Mickleborough, Timothy D; Laymon, Abigail S; Chapman, Robert F

    2013-02-01

    The purpose of this study was to estimate the percentage of the increase in whole body maximal oxygen consumption (.VO(2max)) that is accounted for by increased respiratory muscle oxygen uptake after altitude training. Six elite male distance runners (.VO(2max) = 70.6 ± 4.5 ml kg(-1) min(-1)) and one elite female distance runner (.VO(2max)) = 64.7 ml kg(-1) min(-1)) completed a 28-day "live high-train low" training intervention (living elevation, 2,150 m). Before and after altitude training, subjects ran at three submaximal speeds, and during a separate session, performed a graded exercise test to exhaustion. A regression equation derived from published data was used to estimate respiratory muscle .VO(2) (.VO(2RM)) using our ventilation (.VE) values. .VO(2RM) was also estimated retrospectively from a larger group of distance runners (n = 22). .VO(2max) significantly (p altitude (196 ± 59 ml min(-1)), while (.VE) at .VO(2max) also significantly (p altitude (201 ± 36 ml min(-1)), along with a 10.8 ± 2.1 l min(-1) increase in (.VE), thus requiring an estimated 27 % of Δ .VO(2max) Our data suggest that a substantial portion of the improvement in .VO(2max) with chronic altitude training goes to fuel the respiratory muscles as opposed to the musculature which directly contributes to locomotion. Consequently, the time-course of decay in ventilatory acclimatization following return to sea-level may have an impact on competitive performance.

  1. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  2. Predictors of VO2Peak in children age 6- to 7-years-old

    DEFF Research Database (Denmark)

    Dencker, Magnus; Hermansen, Bianca; Bugge, Anna

    2011-01-01

    This study investigated the predictors of aerobic fitness (VO2PEAK) in young children on a population-base. Participants were 436 children (229 boys and 207 girls) aged 6.7 ± 0.4 yrs. VO2PEAK was measured during a maximal treadmill exercise test. Physical activity was assessed by accelerometers....... Total body fat and total fat free mass were estimated from skinfold measurements. Regression analyses indicated that significant predictors for VO2PEAK per kilogram body mass were total body fat, maximal heart rate, sex, and age. Physical activity explained an additional 4-7%. Further analyses showed...... the main contributing factors for absolute values of VO2PEAK were fat free mass, maximal heart rate, sex, and age. Physical activity explained an additional 3-6%....

  3. Reformatio in peius administratīvo pārkāpumu procesā

    OpenAIRE

    Berķis, Kaspars

    2009-01-01

    Maģistra darbā ir pētīta reformatio in peius aizlieguma principa piemērošanas problemātika administratīvo pārkāpumu procesā. Darba gaitā ir analizētas Latvijas Administratīvo pārkāpumu kodeksa, Administratīvā procesa likuma un kriminālprocesuālās tiesību normas, kas satur reformatio in peius aizlieguma principu. Darba ietvaros īpaša uzmanība pievērsta administratīvo tiesu prakses izpētei attiecībā uz reformatio in peius aizlieguma principa piemērošanu administratīvo pārkāpumu lietu izsk...

  4. Service Oriented Architecture in Network Security - a novel Organisation in Security Systems

    OpenAIRE

    Hilker, Michael; Schommer, Christoph

    2008-01-01

    Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is disting...

  5. Evaluation and Investigation of the Delay in VoIP Networks

    Directory of Open Access Journals (Sweden)

    V. Janata

    2011-06-01

    Full Text Available The paper is focused mainly on the delay problems, which considerably influence the final quality of connections in VoIP (Voice over IP networks. The paper provides a detailed exploration of the nature and mechanisms of the delay. The main purpose of the investigation was an attempt to formulate a mathematical model of delay in the VoIP network and its subsequent analysis by laboratory data.

  6. 77 FR 8257 - Sunshine Act Open Commission Meeting

    Science.gov (United States)

    2012-02-14

    ... Safety and Title: The Proposed Extension of Part 4 Homeland Security. of the Commission's Rules Regarding Outage Reporting to Interconnected Voice Over Internet Protocol Service Providers and Broadband Internet... outage reporting under Part IV of the rules to interconnected Voice over Internet Protocol (VoIP) service...

  7. Specifying Information Security Needs for the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. We propose to explicitly link security requirements with the organizations' business vision, i.e. to provide business rationale for security requirements. The rationale is then

  8. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in

  9. Legal and regulatory aspects of optimization comprehensive support service and combat activity of the Security service of Ukraine and the National guard of Ukraine emergency social situation

    Directory of Open Access Journals (Sweden)

    В. В. Мацюк

    2015-05-01

    Full Text Available Problem setting. The status of comprehensive support of military units in the world’s leading powers is considered to be one of the key factors which defines the success of the social emergency settling operations. The experience of service and military application of the National Guard of Ukraine in the anti-terrorist operation zone on the South-East of Ukraine shows that emergency response tasks are generally carried out in cooperation with other Ukrainian security sector authorities, mostly with the Security Service of Ukraine. However, the forces joint managing authority chiefs usually do not cover the matter of such activities’ comprehensive support, which forces the commanders of the military units to rely on themselves in this question. Recent research and publications analysis. The analysis of research of status and development prospects of the comprehensive support of the Armed Forces of Ukraine, other security authorities, armies of the world’s leading powers, peculiarities of creation and functioning of such systems, application of their means and powers, scientific thought on the problems of service and military application of the National Guard units has shown the problematic tasks of the joint unit comprehensive support system optimization. Therefore, the question of regulatory and legal support of this process is of current importance. Paper objective. The objective of this paper is to define regulatory and legal aspects of comprehensive support optimization of the Security Service of Ukraine and the National Guard of Ukraine service and combat activities during social emergencies. Paper main body. According to the current legislation, comprehensive support comprises of the following types of support: operative (also called military, moral and psychological, materiel (logistical. All other types of support are parts of these three basic ones. Their examination is necessary due to the fact, that there is confusion in the

  10. 17 CFR 269.5 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form F-X, for appointment of agent for service of process by issuers registering securities on Form F-8, F-9, F-10 or F-80 (§§ 239... INDENTURE ACT OF 1939 § 269.5 Form F-X, for appointment of agent for service of process by issuers...

  11. Enhanced red emission of LaVO4:Eu3+ phosphors by Li-doping

    International Nuclear Information System (INIS)

    Park, Sung Wook; Yang, Hyun Kyoung; Chung, Jong Won; Moon, Byung Kee; Choi, Byung Chun; Jeong, Jung Hyun; Jang, Ki Wan; Lee, Ho Sueb; Yi, Soung Soo

    2010-01-01

    LaVO 4 phosphors were synthesized by using a solid state reaction, and were characterized by using X-ray diffraction (XRD), scanning electron microscopy (SEM) and photoluminescence (PL). The XRD patterns of the Li-doped LaVO 4 :Eu 3+ powder phosphors revealed a mixture of tetragonal and monoclinic phases. The tetragonal phase of the LaVO 4 :Eu 3+ phosphor showed a higher PL intensity than the monoclinic one, despite the presence of both monoclinic and tetragonal structures. The Li-doped LaVO 4 :Eu 3+ powder phosphors absorbed strongly at 396 nm and exhibited strong red emission at approximately 619.5 nm due to the 5 D 0 → 7 F 2 transition. The incorporation of Li + ions into the LaVO 4 :Eu 3+ powder can lead to a remarkable increase in photoluminescence. The enhanced luminescence is attributed to the incorporation of Li + ions that may act as a sensitizers for effective energy transfer. This phosphor has promising applications in near-UV light-emitting diodes(LEDs).

  12. VO2 microcrystals as an advanced smart window material at semiconductor to metal transition

    Science.gov (United States)

    Basu, Raktima; Magudapathy, P.; Sardar, Manas; Pandian, Ramanathaswamy; Dhara, Sandip

    2017-11-01

    Textured VO2(0 1 1) microcrystals are grown in the monoclinic, M1 phase which undergoes a reversible first order semiconductor to metal transition (SMT) accompanied by a structural phase transition to rutile tetragonal, R phase. Around the phase transition, VO2 also experiences noticeable change in its optical and electrical properties. A change in color of the VO2 micro crystals from white to cyan around the transition temperature is observed, which is further understood by absorption of red light using temperature dependent ultraviolet-visible spectroscopic analysis and photoluminescence studies. The absorption of light in the red region is explained by the optical transition between Hubbard states, confirming the electronic correlation as the driving force for SMT in VO2. The thermochromism in VO2 has been studied for smart window applications so far in the IR region, which supports the opening of the band gap in semiconducting phase; whereas there is hardly any report in the management of visible light. The filtering of blue light along with reflection of infrared above the semiconductor to metal transition temperature make VO2 applicable as advanced smart windows for overall heat management of a closure.

  13. VO2 microcrystals as an advanced smart window material at semiconductor to metal transition

    International Nuclear Information System (INIS)

    Basu, Raktima; Pandian, Ramanathaswamy; Dhara, Sandip; Magudapathy, P; Sardar, Manas

    2017-01-01

    Textured VO 2 (0 1 1) microcrystals are grown in the monoclinic, M1 phase which undergoes a reversible first order semiconductor to metal transition (SMT) accompanied by a structural phase transition to rutile tetragonal, R phase. Around the phase transition, VO 2 also experiences noticeable change in its optical and electrical properties. A change in color of the VO 2 micro crystals from white to cyan around the transition temperature is observed, which is further understood by absorption of red light using temperature dependent ultraviolet–visible spectroscopic analysis and photoluminescence studies. The absorption of light in the red region is explained by the optical transition between Hubbard states, confirming the electronic correlation as the driving force for SMT in VO 2 . The thermochromism in VO 2 has been studied for smart window applications so far in the IR region, which supports the opening of the band gap in semiconducting phase; whereas there is hardly any report in the management of visible light. The filtering of blue light along with reflection of infrared above the semiconductor to metal transition temperature make VO 2 applicable as advanced smart windows for overall heat management of a closure. (paper)

  14. Virtualization of open-source secure web services to support data exchange in a pediatric critical care research network.

    Science.gov (United States)

    Frey, Lewis J; Sward, Katherine A; Newth, Christopher J L; Khemani, Robinder G; Cryer, Martin E; Thelen, Julie L; Enriquez, Rene; Shaoyu, Su; Pollack, Murray M; Harrison, Rick E; Meert, Kathleen L; Berg, Robert A; Wessel, David L; Shanley, Thomas P; Dalton, Heidi; Carcillo, Joseph; Jenkins, Tammara L; Dean, J Michael

    2015-11-01

    To examine the feasibility of deploying a virtual web service for sharing data within a research network, and to evaluate the impact on data consistency and quality. Virtual machines (VMs) encapsulated an open-source, semantically and syntactically interoperable secure web service infrastructure along with a shadow database. The VMs were deployed to 8 Collaborative Pediatric Critical Care Research Network Clinical Centers. Virtual web services could be deployed in hours. The interoperability of the web services reduced format misalignment from 56% to 1% and demonstrated that 99% of the data consistently transferred using the data dictionary and 1% needed human curation. Use of virtualized open-source secure web service technology could enable direct electronic abstraction of data from hospital databases for research purposes. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  15. Managing Dynamic User Communities in a Grid of Autonomous Resources

    CERN Document Server

    Alfieri, R; Gianoli, A; Spataro, F; Ciaschini, Vincenzo; dell'Agnello, L; Bonnassieux, F; Broadfoot, P; Lowe, G; Cornwall, L; Jensen, J; Kelsey, D; Frohner, A; Groep, DL; Som de Cerff, W; Steenbakkers, M; Venekamp, G; Kouril, D; McNab, A; Mulmo, O; Silander, M; Hahkala, J; Lhorentey, K

    2003-01-01

    One of the fundamental concepts in Grid computing is the creation of Virtual Organizations (VO's): a set of resource consumers and providers that join forces to solve a common problem. Typical examples of Virtual Organizations include collaborations formed around the Large Hadron Collider (LHC) experiments. To date, Grid computing has been applied on a relatively small scale, linking dozens of users to a dozen resources, and management of these VO's was a largely manual operation. With the advance of large collaboration, linking more than 10000 users with a 1000 sites in 150 counties, a comprehensive, automated management system is required. It should be simple enough not to deter users, while at the same time ensuring local site autonomy. The VO Management Service (VOMS), developed by the EU DataGrid and DataTAG projects[1, 2], is a secured system for managing authorization for users and resources in virtual organizations. It extends the existing Grid Security Infrastructure[3] architecture with embedded VO ...

  16. VO2/TiO2 Nanosponges as Binder-Free Electrodes for High-Performance Supercapacitors

    Science.gov (United States)

    Hu, Chenchen; Xu, Henghui; Liu, Xiaoxiao; Zou, Feng; Qie, Long; Huang, Yunhui; Hu, Xianluo

    2015-11-01

    VO2/TiO2 nanosponges with easily tailored nanoarchitectures and composition were synthesized by electrostatic spray deposition as binder-free electrodes for supercapacitors. Benefiting from the unique interconnected pore network of the VO2/TiO2 electrodes and the synergistic effect of high-capacity VO2 and stable TiO2, the as-formed binder-free VO2/TiO2 electrode exhibits a high capacity of 86.2 mF cm-2 (~548 F g-1) and satisfactory cyclability with 84.3% retention after 1000 cycles. This work offers an effective and facile strategy for fabricating additive-free composites as high-performance electrodes for supercapacitors.

  17. VO2/TiO2 Nanosponges as Binder-Free Electrodes for High-Performance Supercapacitors.

    Science.gov (United States)

    Hu, Chenchen; Xu, Henghui; Liu, Xiaoxiao; Zou, Feng; Qie, Long; Huang, Yunhui; Hu, Xianluo

    2015-11-04

    VO2/TiO2 nanosponges with easily tailored nanoarchitectures and composition were synthesized by electrostatic spray deposition as binder-free electrodes for supercapacitors. Benefiting from the unique interconnected pore network of the VO2/TiO2 electrodes and the synergistic effect of high-capacity VO2 and stable TiO2, the as-formed binder-free VO2/TiO2 electrode exhibits a high capacity of 86.2 mF cm(-2) (~548 F g(-1)) and satisfactory cyclability with 84.3% retention after 1000 cycles. This work offers an effective and facile strategy for fabricating additive-free composites as high-performance electrodes for supercapacitors.

  18. Integrating Ecosystem Services and Eco-Security to Assess Sustainable Development in Liuqiu Island

    Directory of Open Access Journals (Sweden)

    Han-Shen Chen

    2017-06-01

    Full Text Available Developing sustainable island tourism must be thoroughly evaluated in consideration of ecological, economic, and social factors on account of the fragility of island ecosystems. This study evaluated the ecological footprint (EF and ecological capacity of Liuqiu Island from 2010 to 2015 using the EF model, establishing an indicator to estimate the value of ecosystem service and eco-security. The empirical results include: (1 the overall value of ecosystem service on Liuqiu Island increased from US$3.75 million in 2010 to US$5.11 million in 2015; (2 the total per capita EF considerably increased from 0.5640 gha/person in 2010 to 4.0845 gha/person in 2015; and (3 the ecological footprint index increased from 0.30 in 2010 to 2.28 in 2015. These findings indicate that island tourism recreational zones gradually increased the pressure on its ecosystem, reduced the eco-security level, and severely damaged the environment, thereby threatening the function and structure of the entire ecosystem. The innovations and contributions of this study is integrating ecological footprint and ecosystem services valuation provide insights into sustainability of an island. The theoretical and practical implications identified in this study should contribute to reducing the gap between research and practice.

  19. Gate-tunable gigantic lattice deformation in VO2

    International Nuclear Information System (INIS)

    Okuyama, D.; Hatano, T.; Nakano, M.; Takeshita, S.; Ohsumi, H.; Tardif, S.; Shibuya, K.; Yumoto, H.; Koyama, T.; Ohashi, H.; Takata, M.; Kawasaki, M.; Tokura, Y.; Iwasa, Y.; Arima, T.

    2014-01-01

    We examined the impact of electric field on crystal lattice of vanadium dioxide (VO 2 ) in a field-effect transistor geometry by in-situ synchrotron x-ray diffraction measurements. Whereas the c-axis lattice parameter of VO 2 decreases through the thermally induced insulator-to-metal phase transition, the gate-induced metallization was found to result in a significant increase of the c-axis length by almost 1% from that of the thermally stabilized insulating state. We also found that this gate-induced gigantic lattice deformation occurs even at the thermally stabilized metallic state, enabling dynamic control of c-axis lattice parameter by more than 1% at room temperature

  20. TRANSPORTE DE VOZ (VoIP SOBRE REDES IPv4 e IPv6

    Directory of Open Access Journals (Sweden)

    Fausto Alexander Gamboa

    2012-05-01

    Full Text Available El presente artículo tiene como finalidad evaluar el comportamiento de la VoIP en redes IPv6 y compararlo con IPv4, de igual manera presentar las arquitecturas que la soportan. Con el fin de que los resultados sean los más cercanos a la realidad, el artículo no solo se soporta en simulaciones si no en implementaciones reales. Dentro de las conclusiones más sobresalientes se encontró que la VoIP6 presenta mejor rendimiento ante el Jitter y el retardo que VoIPv4.

  1. Preparation of a Leaf-Like BiVO4-Reduced Graphene Oxide Composite and Its Photocatalytic Activity

    Directory of Open Access Journals (Sweden)

    Shimin Xiong

    2017-01-01

    Full Text Available We prepared a unique leaf-like BiVO4-reduced graphene oxide (BiVO4-rGO composite with prominent adsorption performance and photocatalytic ability by a single-step method. Multiple characterization results showed that the leaf-like BiVO4 with average diameter of about 5 um was well dispersed on the reduced graphene oxide sheet, which enhanced the transportation of photogenerated electrons into BiVO4, thereby leading to efficient separation of photogenerated carriers in the coupled graphene-nanocomposite system. The characterization and experiment results also indicated that the outstanding adsorption ability of such composite was closely associated with the rough surface of the leaf-like BiVO4 and doped rGO. The surface photocurrent spectroscopy and transient photocurrent density measurement results demonstrated that the doped rGO enhanced separation efficiency and transfer rate of photogenerated charges. As a result, the BiVO4-rGO exhibited higher photocatalytic capacity toward the degradation of rhodamine B dye under visible-light irradiation compared with pure BiVO4 and P25.

  2. BOF4WSS : a business-oriented framework for enhancing web services security for e-business

    OpenAIRE

    Nurse, Jason R. C.; Sinclair, Jane

    2009-01-01

    When considering Web services' (WS) use for online business-to-business (B2B) collaboration between companies, security is a complicated and very topical issue. This is especially true with regard to reaching a level of security beyond the technological layer, that is supported and trusted by all businesses involved. With appreciation of this fact, our research draws from established development methodologies to develop a new, business-oriented framework (BOF4WSS) to guide e-businesses in def...

  3. Designing and implementing the logical security framework for e-commerce based on service oriented architecture

    OpenAIRE

    Luhach, Ashish Kr.; Dwivedi, Sanjay K; Jha, C K

    2014-01-01

    Rapid evolution of information technology has contributed to the evolution of more sophisticated E- commerce system with the better transaction time and protection. The currently used E-commerce models lack in quality properties such as logical security because of their poor designing and to face the highly equipped and trained intruders. This editorial proposed a security framework for small and medium sized E-commerce, based on service oriented architecture and gives an analysis of the emin...

  4. VO{sub x} effectively doping CVD-graphene for transparent conductive films

    Energy Technology Data Exchange (ETDEWEB)

    Ji, Qinghua; Shi, Liangjing [State Key Laboratory of High Performance Ceramics and Superfine Microstructure, Shanghai Institute of Ceramics, Chinese Academy of Sciences, 1295 Dingxi Road, Shanghai 200050 (China); Zhang, Qinghong [State Key Laboratory of Modification of Chemical Fibers and Polymer Materials, College of Material Science and Engineering, Donghua University, 2999 North Renmin Road, Shanghai 201620 (China); Wang, Weiqi; Zheng, Huifeng [State Key Laboratory of High Performance Ceramics and Superfine Microstructure, Shanghai Institute of Ceramics, Chinese Academy of Sciences, 1295 Dingxi Road, Shanghai 200050 (China); Zhang, Yuzhi [The Key Laboratory of Inorganic Coating Materials, Shanghai Institute of Ceramics, Chinese Academy of Sciences,1295 Dingxi Road, Shanghai 200050 (China); Liu, Yangqiao, E-mail: yqliu@mail.sic.ac.cn [State Key Laboratory of High Performance Ceramics and Superfine Microstructure, Shanghai Institute of Ceramics, Chinese Academy of Sciences, 1295 Dingxi Road, Shanghai 200050 (China); Sun, Jing, E-mail: jingsun@mail.sic.ac.cn [State Key Laboratory of High Performance Ceramics and Superfine Microstructure, Shanghai Institute of Ceramics, Chinese Academy of Sciences, 1295 Dingxi Road, Shanghai 200050 (China)

    2016-11-30

    Highlights: • Doping process operated easily. • Sheet resistance decreased efficiently after doping. • Sheet resistance of doped graphene is stable after exposed in the air. • Mechanism of doping process is studied. - Abstract: Chemical vapor deposition(CVD)-synthesized graphene is potentially an alternative for tin-doped indium oxide (ITO) transparent conductive films (TCFs), however its sheet resistance is still too high to meet many demands. Vanadium oxide has been widely applied as smart window materials, however, no study has been reported to use it as dopant to improve the conductivity of graphene TCFs. In this study, we firstly reported that VO{sub x} doping can effectively lower the sheet resistance of CVD-graphene films while keeping its good optical properties, whose transmittance is as high as 86–90%. The optimized VO{sub x}-doped graphene exhibits a sheet resistance as low as 176 Ω/□, which decreases by 56% compared to the undoped graphene films. The doping process is convenient, stable, economical and easy to operate. What is more, VO{sub x} can effectively increase the work function(WF) of the film, making it more appropriate for use in solar cells. The evolution of the VO{sub x} species annealed at different temperatures below 400 °C has been detailed studied for the first time, based on which the doping mechanism is proposed. The prepared VO{sub x} doped graphene is expected to be a promising candidate for transparent conductive film purposes.

  5. LiVO/sub 3/-Li/sub 2/Mo(W)O/sub 4/ and NaVO/sub 3/-Na/sub 2/Cr(Mo)O/sub 4/ systems

    Energy Technology Data Exchange (ETDEWEB)

    Belyaev, I N; Lupeiko, T G; Vyalikova, V I [Rostovskij-na-Donu Gosudarstvennyj Univ. (USSR)

    1975-09-01

    The systems LiVO/sub 3/-Li/sub 2/MoO/sub 4/, LiVO/sub 3/-Li/sub 2/WO/sub 4/, NaNO/sub 3/-Na/sub 2/CrO/sub 4/, NaNO/sub 3/-Na/sub 2/MoO/sub 4/ were studied with thermographic and partially visual polythermal methods of physical and chemical analyses. Except NaVO/sub 3/-Na/sub 2/MoO/sub 4/ all investigated systems are eutectic ones with limited solid solutions on the basis of some component; the eutectics melt at 542, 544, 550/sup 0/C and contain 25, 20 and 26% of Li/sub 2/MoO/sub 4/, Li/sub 2/WO/sub 4/ and Na/sub 2/CrO/sub 4/ respectively. The system NaNO/sub 3/-Na/sub 2/MoO/sub 4/ contains compound 18 NaVO/sub 3/.11Na/sub 2/MoO/sub 4/ congruently melting at 570/sup 0/C. Two eutectics of the system have melting points at 542 and 548/sup 0/C and contain 47 and 67% of Na/sub 2/MoO/sub 4/.

  6. A Secure, Scalable and Elastic Autonomic Computing Systems Paradigm: Supporting Dynamic Adaptation of Self-* Services from an Autonomic Cloud

    Directory of Open Access Journals (Sweden)

    Abdul Jaleel

    2018-05-01

    Full Text Available Autonomic computing embeds self-management features in software systems using external feedback control loops, i.e., autonomic managers. In existing models of autonomic computing, adaptive behaviors are defined at the design time, autonomic managers are statically configured, and the running system has a fixed set of self-* capabilities. An autonomic computing design should accommodate autonomic capability growth by allowing the dynamic configuration of self-* services, but this causes security and integrity issues. A secure, scalable and elastic autonomic computing system (SSE-ACS paradigm is proposed to address the runtime inclusion of autonomic managers, ensuring secure communication between autonomic managers and managed resources. Applying the SSE-ACS concept, a layered approach for the dynamic adaptation of self-* services is presented with an online ‘Autonomic_Cloud’ working as the middleware between Autonomic Managers (offering the self-* services and Autonomic Computing System (requiring the self-* services. A stock trading and forecasting system is used for simulation purposes. The security impact of the SSE-ACS paradigm is verified by testing possible attack cases over the autonomic computing system with single and multiple autonomic managers running on the same and different machines. The common vulnerability scoring system (CVSS metric shows a decrease in the vulnerability severity score from high (8.8 for existing ACS to low (3.9 for SSE-ACS. Autonomic managers are introduced into the system at runtime from the Autonomic_Cloud to test the scalability and elasticity. With elastic AMs, the system optimizes the Central Processing Unit (CPU share resulting in an improved execution time for business logic. For computing systems requiring the continuous support of self-management services, the proposed system achieves a significant improvement in security, scalability, elasticity, autonomic efficiency, and issue resolving time

  7. A Secure and Stable Multicast Overlay Network with Load Balancing for Scalable IPTV Services

    Directory of Open Access Journals (Sweden)

    Tsao-Ta Wei

    2012-01-01

    Full Text Available The emerging multimedia Internet application IPTV over P2P network preserves significant advantages in scalability. IPTV media content delivered in P2P networks over public Internet still preserves the issues of privacy and intellectual property rights. In this paper, we use SIP protocol to construct a secure application-layer multicast overlay network for IPTV, called SIPTVMON. SIPTVMON can secure all the IPTV media delivery paths against eavesdroppers via elliptic-curve Diffie-Hellman (ECDH key exchange on SIP signaling and AES encryption. Its load-balancing overlay tree is also optimized from peer heterogeneity and churn of peer joining and leaving to minimize both service degradation and latency. The performance results from large-scale simulations and experiments on different optimization criteria demonstrate SIPTVMON's cost effectiveness in quality of privacy protection, stability from user churn, and good perceptual quality of objective PSNR values for scalable IPTV services over Internet.

  8. Observation of reduced phase transition temperature in N-doped thermochromic film of monoclinic VO_2

    International Nuclear Information System (INIS)

    Wan, Meinan; Xiong, Mo; Li, Neng; Liu, Baoshun; Wang, Shuo; Ching, Wai-Yim; Zhao, Xiujian

    2017-01-01

    Highlights: • N-doped VO_2(M1) thin films have been synthesized by annealing in NH_3 atmosphere. • The phase purity, microstructure and optical property of VO_2 thin film can be regulated by NH_3 concentration. • First-principles calculations have been carried out to study the mechanism of N-doping on energy band structures of VO_2(M1). • The energy band gaps of VO_2(M1) are tuned by substitution N-doping or interstitial N-doping. - Abstract: Research on monoclinic (M1) phase of VO_2 has attracted a great of interest for smart coating applications due to its exceptional thermochromic property. Herein, we report the results using a novel approach to synthesize N-doped VO_2(M1) thin films with high purity by heat treatment in NH_3 atmosphere. The N dopant in the film can be regulated by varying NH_3 concentration during the annealing process. We find that the N atoms are located at the interstitial sites or substitute oxygen atoms, and the V-N bonds in the VO_2 thin films increase with NH_3 concentration. The metal to insulator transition (MIT) temperature (τ_c_,_h) of the VO_2 thin film is effectively reduced from 80.0 to 62.9 °C, while the solar modulation efficiency (ΔT_s_o_l) and the modulation efficiency at 2000 nm (ΔT_2_0_0_0_n_m) are 7.36% and 55.6% respectively. The band gap of N-doped VO_2 thin films related to MIT (E_g_1) is estimated to be as low as 0.18–0.25 eV whereas the band gap associated with the visible transparency (E_g_2) is about 1.50–1.58 eV. Based on the highly accurate first-principles calculations, the E_g_1 of VO_2 (M1) is reduced after substituted or interstitial N-doping, while the E_g_2 alters with the mode of N-doping, which is excellent agreement with experimental measurement.

  9. Cloud Infrastructure Security

    OpenAIRE

    Velev , Dimiter; Zlateva , Plamena

    2010-01-01

    Part 4: Security for Clouds; International audience; Cloud computing can help companies accomplish more by eliminating the physical bonds between an IT infrastructure and its users. Users can purchase services from a cloud environment that could allow them to save money and focus on their core business. At the same time certain concerns have emerged as potential barriers to rapid adoption of cloud services such as security, privacy and reliability. Usually the information security professiona...

  10. A comprehensive investigation of tetragonal Gd-doped BiVO{sub 4} with enhanced photocatalytic performance under sun-light

    Energy Technology Data Exchange (ETDEWEB)

    Luo, Yangyang; Tan, Guoqiang, E-mail: tan3114@163.com; Dong, Guohua; Ren, Huijun; Xia, Ao

    2016-02-28

    Graphical abstract: - Highlights: • Tetragonal Gd-BiVO{sub 4} with enhanced photocatalytic activity was synthesized. • Gd doping can induce the phase transition from monoclinic to tetragonal BiVO{sub 4}. • GdVO{sub 4} seeds as crystal nucleus dominate the formation of tetragonal Gd-BiVO{sub 4}. • Tetragonal Gd-BiVO{sub 4} exhibits the excellent separation of electrons and holes. • The contribution of high photocatalytic activity under sun-light is from UV-light. - Abstract: Tetragonal Gd-doped BiVO{sub 4} having enhanced photocatalytic activity have been synthesized by a facile microwave hydrothermal method. The structural analysis indicates that Gd doping can induce the phase transition from monoclinic to tetragonal BiVO{sub 4}. The reaction results in precursor solutions imply that tetragonal GdVO{sub 4} seeds as crystal nucleus are the original and determined incentives to force the formation of tetragonal Gd-BiVO{sub 4}. The influences of the surface defect, band structure, and BET surface area on the improved photocatalytic activities of tetragonal Gd-doped BiVO{sub 4} are investigated systematically. The results demonstrate that the more surface oxygen deficiencies as active sites and the excellent mobility and separation of photogenerated electrons and holes are beneficial to the enhancement of the photocatalytic performance of tetragonal Gd-BiVO{sub 4}. The RhB photodegradation experiments indicate that the contribution of high photocatalytic activities under simulated sun-light is mainly from UV-light region due to the tetragonal structure feature. The best photocatalytic performance is obtained for tetragonal 10 at% Gd-BiVO{sub 4}, of which the RhB degradation rate can reach to 96% after 120 min simulated sun-light irradiation. The stable tetragonal Gd-BiVO{sub 4} with efficient mineralization will be a promising photocatalytic material applied in water purification.

  11. Supercapacitors based on two dimensional VO2 nanosheet electrodes in organic gel electrolyte

    KAUST Repository

    Baby, Rakhi Raghavan; Nagaraju, Doddahalli H.; Beaujuge, Pierre; Alshareef, Husam N.

    2016-01-01

    VO2 is a low band-gap semiconductor with relatively high conductivity among transition metal oxides, which makes it an interesting material for supercapacitor electrode applications. The performance of VO2 as supercapacitor electrode in organic

  12. 7 CFR 1951.866 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Security. 1951.866 Section 1951.866 Agriculture... REGULATIONS (CONTINUED) SERVICING AND COLLECTIONS Rural Development Loan Servicing § 1951.866 Security. (a) Loans from RDLF intermediaries to ultimate recipients. Security requirements for loans from...

  13. Supercritical temperature synthesis of fluorine-doped VO2(M) nanoparticle with improved thermochromic property

    Science.gov (United States)

    Riapanitra, Anung; Asakura, Yusuke; Cao, Wenbin; Noda, Yasuto; Yin, Shu

    2018-06-01

    Fluorine-doped VO2(M) nanoparticles have been successfully synthesized using the hydrothermal method at a supercritical temperature of 490 °C. The pristine VO2(M) has the critical phase transformation temperature of 64 °C. The morphology and homogeneity of the monoclinic structure VO2(M) were adopted by the fluorine-doped system. The obtained particle size of the samples is smaller at the higher concentration of anion doping. The best reduction of critical temperature was achieved by fluorine doping of 0.13% up to 48 °C. The thin films of the fluorine-doped VO2(M) showed pronounced thermochromic property and therefore are suitable for smart window applications.

  14. Ecological Security and Ecosystem Services in Response to Land Use Change in the Coastal Area of Jiangsu, China

    Directory of Open Access Journals (Sweden)

    Caiyao Xu

    2016-08-01

    Full Text Available Urbanization, and the resulting land use/cover change, is a primary cause of the degradation of coastal wetland ecosystems. Reclamation projects are seen as a way to strike a balance between socioeconomic development and maintenance of coastal ecosystems. Our aim was to understand the ecological changes to Jiangsu’s coastal wetland resulting from land use change since 1977 by using remote sensing and spatial analyses. The results indicate that: (1 The area of artificial land use expanded while natural land use was reduced, which emphasized an increase in production-orientated land uses at the expense of ecologically important wetlands; (2 It took 34 years for landscape ecological security and 39 years for ecosystem services to regain equilibrium. The coastal reclamation area would recover ecological equilibrium only after a minimum of 30 years; (3 The total ecosystem service value decreased significantly from $2.98 billion per year to $2.31 billion per year from 1977 to 2014. Food production was the only one ecosystem service function that consistently increased, mainly because of government policy; (4 The relationship between landscape ecological security and ecosystem services is complicated, mainly because of the scale effect of landscape ecology. Spatial analysis of changing gravity centers showed that landscape ecological security and ecosystem service quality became better in the north than the south over the study period.

  15. Security bingo for administrators

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Have you ever thought about the security of your service(s) or system(s)? Show us and win one of three marvellous books on computer security! Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us at Computer.Security@cern.ch or P.O. Box G19710, by November 14th 2011.   Winners[1] must show us that they follow at least five good practices in a continuous horizontal row, vertical column or diagonal. For details on CERN Computer Security, please consult http://cern.ch/security. My service or system…   …is following a software development life-cycle. …is patched in an automatic and timely fashion. …runs a tightened local ingress/egress firewall. …uses CERN Single-Sign-On (SSO). …has physical access protections in place. …runs all processes / services / applications with least privileges. …has ...

  16. Analisis Data Digital Evidence pada Layanan Voice Over Internet Protocol (VoIP

    Directory of Open Access Journals (Sweden)

    Muhamad Arsad Adam

    2016-11-01

    Full Text Available Teknologi  VoIP  (Voice  Over  Internet  Protocol merupakan  teknologi  yang  mampu  melewatkan  panggilan  suara, video  dan  data  dalam  jaringan  IP.  Voice  over  Internet  Protocol (VoIP  dalam  teknologi  komunikasi  cukup  signifikan  sehingga tidak  terlepas  dari  kejahatan  cybercrime,  Teknologi  VoIP  dapat disalahgunakan  untuk  melakukan  tindakan  kejahatan  jarak  jauh sehingga  diperlukan  langkah-langkah  investigasi  jika  terjadi masalah.  Menemukan  artefact  pada  Infrastruktur  VoIP merupakan tantangan tersendiri. WireSharks salah satu tool yang digunakan  dalam  investigasi  ini.  Metode  yang  digunakan  adalah DFIF  yang  terdiri  tahapan  adalah  Collection,  Examination, Analysis, dan Report and Documentation. Investigasi pada layanan VoIP  dapat  berhasil  dilakukan  dengan  menemukan  data  digital evidence  di  layer  5.  Tujuan  Penelitian  ini  yaitu  Mengetahui Karakteristik Data Digital berupa suara pada layanan Voice Over IP  dan  Menganalisis  Data  Digital  berupa  suara  pada  layanan Voice Over IP. Hasil dari penelitian ini barang bukti digital yang berupa  percakapan  yang  dapat  dipertanggungjawabkan  dalam pengadilan..Kata kunci— Data, Evidence, Forensik,Network, VoIP

  17. The Auroral Planetary Imaging and Spectroscopy (APIS) service

    Science.gov (United States)

    Lamy, L.; Prangé, R.; Henry, F.; Le Sidaner, P.

    2015-06-01

    The Auroral Planetary Imaging and Spectroscopy (APIS) service, accessible online, provides an open and interactive access to processed auroral observations of the outer planets and their satellites. Such observations are of interest for a wide community at the interface between planetology, magnetospheric and heliospheric physics. APIS consists of (i) a high level database, built from planetary auroral observations acquired by the Hubble Space Telescope (HST) since 1997 with its mostly used Far-Ultraviolet spectro-imagers, (ii) a dedicated search interface aimed at browsing efficiently this database through relevant conditional search criteria and (iii) the ability to interactively work with the data online through plotting tools developed by the Virtual Observatory (VO) community, such as Aladin and Specview. This service is VO compliant and can therefore also been queried by external search tools of the VO community. The diversity of available data and the capability to sort them out by relevant physical criteria shall in particular facilitate statistical studies, on long-term scales and/or multi-instrumental multi-spectral combined analysis.

  18. Enhanced visible-light-response photocatalytic degradation of methylene blue on Fe-loaded BiVO{sub 4} photocatalyst

    Energy Technology Data Exchange (ETDEWEB)

    Chala, Sinaporn [Department of Physics and Materials Science, Faculty of Science, Chiang Mai University, Chiang Mai 50200 (Thailand); Wetchakun, Khatcharin [Program of Physics, Faculty of Science, Ubon Ratchathani Rajabhat University, Ubon Ratchathani 34000 (Thailand); Phanichphant, Sukon [Materials Science Research Centre, Faculty of Science, Chiang Mai University, Chiang Mai 50200 (Thailand); Inceesungvorn, Burapat [Department of Chemistry, Faculty of Science, Chiang Mai University, Chiang Mai 50200 (Thailand); Wetchakun, Natda, E-mail: natda_we@yahoo.com [Department of Physics and Materials Science, Faculty of Science, Chiang Mai University, Chiang Mai 50200 (Thailand)

    2014-06-01

    Highlights: • Fe-loaded BiVO{sub 4} particles were prepared by hydrothermal method. • Physicochemical properties played a significant role in photocatalytic process. • All Fe-loaded BiVO{sub 4} samples showed higher photocatalytic activity than pure BiVO{sub 4}. • The Fe{sup 3+} ions may improve the separation of photogenerated electrons and holes. - Abstract: Pure BiVO{sub 4} and nominal 0.5–5.0 mol% Fe-loaded BiVO{sub 4} samples were synthesized by hydrothermal method. All samples were characterized in order to obtain the correlation between structure and photocatalytic properties by X-ray diffraction, Brunauer, Emmett and Teller, UV–vis diffuse reflectance spectrophotometry, photoluminescence spectroscopy, transmission electron microscopy, X-ray photoelectron spectroscopy and inductively coupled plasma-optical emission spectroscopy. The structure of all samples was single-phase monoclinic scheelite. The absorption spectrum of 5.0 mol% Fe-loaded BiVO{sub 4} shifted to the visible region, suggesting the potential application of this material as a superior visible-light driven photocatalyst in comparison with pure BiVO{sub 4}. Photocatalytic activities of all photocatalyst samples were examined by studying the degradation of methylene blue under visible light irradiation. The results clearly showed that Fe-loaded BiVO{sub 4} sample exhibited remarkably higher activity than pure BiVO{sub 4}.

  19. Slow VO2 off-kinetics in skeletal muscle is associated with fast PCr off-kinetics--and inversely.

    Science.gov (United States)

    Korzeniewski, Bernard; Zoladz, Jerzy A

    2013-09-01

    The computer model of the bioenergetic system in skeletal muscle, developed previously, was used to study the effect of the characteristic decay time of the parallel activation of oxidative phosphorylation [τ(OFF)] during muscle recovery on the muscle oxygen consumption rate (Vo2) and phosphocreatine (PCr) work-to-rest transition (off)-kinetics and on the relationship between the Vo2 and PCr rest-to-work transition (on)- and off-kinetics in moderate and heavy exercise. An increase in τ(OFF) slows down the initial phase of the muscle Vo2 off-kinetics and accelerates the PCr off-kinetics. As a result, the relationship between the initial phase of the Vo2 off-kinetics (lasting approximately 3-60 s in computer simulations) and the PCr off-kinetics is inverse: the slower the former, the faster the latter. A faster initial phase of the Vo2 off-kinetics is associated with a slower late phase of the Vo2 off-kinetics, and as a result, the integral of Vo2 above baseline during recovery, representing the oxygen debt, is identical in all cases [values of τ(OFF)] for a given PCr decrease. Depending on τ(OFF), the muscle Vo2 on-kinetics was either equally fast or slower than the Vo2 off-kinetics in moderate exercise and always slower in heavy exercise. PCr on-kinetics was always faster than PCr off-kinetics. This study clearly demonstrates that τ(OFF) has a pronounced impact on the mutual relations between the muscle Vo2 and PCr on- and off-kinetics.

  20. Supercapacitors based on two dimensional VO2 nanosheet electrodes in organic gel electrolyte

    KAUST Repository

    Rakhi, R.B.

    2016-10-16

    VO2 is a low band-gap semiconductor with relatively high conductivity among transition metal oxides, which makes it an interesting material for supercapacitor electrode applications. The performance of VO2 as supercapacitor electrode in organic electrolytes has never been reported before. Herein, two-dimensional nanosheets of VO2 are prepared by the simultaneous solution reduction and exfoliation from bulk V2O5 powder by hydrothermal method. A specific capacitance of 405 Fg−1 is achieved for VO2 based supercapacitor in an organic electrolyte, in three electrode configuration. The symmetric capacitor based on VO2 nanosheet electrodes and the liquid organic electrolyte exhibits an energy density of 46 Wh kg−1 at a power density of 1.4 kW kg−1 at a constant current density of 1 Ag−1. Furthermore, flexible solid-state supercapacitors are fabricated using same electrode material and Alumina-silica based gel electrolyte. The solid-state device delivers a specific capacitance of 145 Fg−1 and a device capacitance of 36 Fg−1 at a discharge current density of 1 Ag−1. Series combination of three solid state capacitors is capable of lighting up a red LED for more than 1 minute.

  1. Optical switching properties of VO2 films driven by using WDM-aligned lasers

    International Nuclear Information System (INIS)

    Tsai, K.Y.; Wu, F.-H.; Shieh, H.-P.D.; Chin, T.-S.

    2006-01-01

    Vanadium dioxide (VO 2 ) film had been demonstrated a high speed IR shutter driven by total optical modulation. However, it usually required a higher power heating laser of high power and precise optical systems to cover the probe beam on the sample with a heating beam of larger area. A new optical system, simply composed of wavelength division multiplexing (WDM), fiber lens or convex lens system, and a glass sheet with VO 2 thin film on it, was easily assembled to utilize VO 2 film as an IR shutter, implying the possibility to highly miniaturize the VO 2 -based optical shutter. A permanent low-transmittance (PLT) region forms on the film within the probe beam, resulting in a decrease in average power of the probe beam. Another ring-type switching area (switching ring) forms around the PLT region, resulting in the transmittance switching of the probe beam synchronously with the heating signal. VO 2 films can be switched with the highest rate of a continuous square heating signal of 3 mW at 120 kHz. A heating pulse of 0.7 ns and 13 mW can be used to stimulate an IR pulse with fiber lens

  2. Relationship between running kinematic changes and time limit at vVO2max

    Directory of Open Access Journals (Sweden)

    Leonardo De Lucca

    2012-06-01

    Exhaustive running at maximal oxygen uptake velocity (vVO2max can alter running kinematic parameters and increase energy cost along the time. The aims of the present study were to compare characteristics of ankle and knee kinematics during running at vVO2max and to verify the relationship between changes in kinematic variables and time limit (Tlim. Eleven male volunteers, recreational players of team sports, performed an incremental running test until volitional exhaustion to determine vVO2max and a constant velocity test at vVO2max. Subjects were filmed continuously from the left sagittal plane at 210 Hz for further kinematic analysis. The maximal plantar flexion during swing (p<0.01 was the only variable that increased significantly from beginning to end of the run. Increase in ankle angle at contact was the only variable related to Tlim (r=0.64; p=0.035 and explained 34% of the performance in the test. These findings suggest that the individuals under study maintained a stable running style at vVO2max and that increase in plantar flexion explained the performance in this test when it was applied in non-runners.

  3. RFID Platform as a Service, Containerized Ecosystem, Feasibility and Security Impact Analysis

    Directory of Open Access Journals (Sweden)

    Lukas Kypus

    2015-01-01

    Full Text Available This paper presents a new concept as a special type of virtualization of particular event based communication components in RFID ecosystems. The new approach is containers based virtualization, and it is applied and tested on the container of Object name service. The results of the experiment allowed us to do the preliminary analysis of security consequences on the isolated containerized DNS-based RFID sub-service. We confirmed feasibility with this sandboxing technology represented by the special container. They bring the benefits in terms of efficient software component life-cycle management and integrity improvements. Experiments results of the containerization are discussed to show the possible isolation ways of other components like EPCis and middleware. There is present evaluation towards external threats and vulnerabilities. The result is a higher level of integrity, availability of whole ecosystem and resiliency against external threats. This gives a new opportunity to build robust RFID as Platform as a service, and it proves the ability to achieve a positive impact on the end to end service Quality of service.

  4. VO2-based radiative thermal transistor with a semi-transparent base

    Science.gov (United States)

    Prod'homme, Hugo; Ordonez-Miranda, Jose; Ezzahri, Younès; Drévillon, Jérémie; Joulain, Karl

    2018-05-01

    We study a radiative thermal transistor analogous to an electronic one made of a VO2 base placed between two silica semi-infinite plates playing the roles of the transistor collector and emitter. The fact that VO2 exhibits an insulator to metal transition is exploited to modulate and/or amplify heat fluxes between the emitter and the collector, by applying a thermal current on the VO2 base. We extend the work of precedent studies considering the case where the base can be semi-transparent so that heat can be exchanged directly between the collector and the emitter. Both near and far field cases are considered leading to 4 typical regimes resulting from the fact that the emitter-base and base-collector separation distances can be larger or smaller than the thermal wavelength for a VO2 layer opaque or semi-transparent. Thermal currents variations with the base temperatures are calculated and analyzed. It is found that the transistor can operate in an amplification mode as already stated in [1] or in a switching mode as seen in [2]. An optimum configuration for the base thickness and separation distance maximizing the thermal transistor modulation factor is found.

  5. UkrVO Joint Digitized Archive and Scientific Prospects

    Directory of Open Access Journals (Sweden)

    Vavilova I. B.

    2012-09-01

    Full Text Available The UkrVO (Ukrainian Virtual Observatory database consists of about 200 000 astronomical photographic plates and 500 000 CCD frames containing unique astronomical information for formulating important scientific tasks. This database is compiled from observations conducted in 1898-2011 at the observing sites of 8 Ukrainian observatories, with about 60 instruments. This paper deals with some principal scientific projects where the UkrVO databases are used, namely, the creation of the Joint Digitized Archive (JDA; compilation of new stellar catalogues; search for optical counterparts of gamma-ray bursts; spectroscopic study of solar flares and solar active formations; development of software for searches for new small bodies of the solar system.

  6. Annealing Effect on the Photoelectrochemical Properties of BiVO_4 Thin Film Electrodes

    International Nuclear Information System (INIS)

    Siti Nur Farhana Mohd Nasir; Mohd Asri Mat Teridi; Mehdi Ebadi; Sagu, J.S.

    2015-01-01

    Monoclinic bismuth vanadate (BiVO_4) thin film electrodes were fabricated on fluorine-doped tin oxide via aerosol-assisted chemical vapour deposition (AACVD). Annealing and without annealing effect of thin films were analysed by X-ray diffraction (XRD), field emission scanning electron microscopy (FESEM), ultraviolet-visible spectrophotometry (UV-Vis) and current voltage measurement. All BiVO_4 thin films showed an anodic photocurrent. The sample of BiVO_4 annealed at 400 degree Celsius exhibited the highest photocurrent density of 0.44 mAcm"-"2 vs. Ag/ AgCl at 1.23 V. (author)

  7. Broadband terahertz generation using the semiconductor-metal transition in VO2

    Directory of Open Access Journals (Sweden)

    Nicholas A. Charipar

    2016-01-01

    Full Text Available We report the design, fabrication, and characterization of broadband terahertz emitters based on the semiconductor-metal transition in thin film VO2 (vanadium dioxide. With the appropriate geometry, picosecond electrical pulses are generated by illuminating 120 nm thick VO2 with 280 fs pulses from a femtosecond laser. These ultrafast electrical pulses are used to drive a simple dipole antenna, generating broadband terahertz radiation.

  8. VV and VO2 defects in silicon studied with hybrid density functional theory

    KAUST Repository

    Christopoulos, Stavros Richard G; Wang, Hao; Chroneos, Alexander I.; Londos, Charalampos A.; Sgourou, Efstratia N.; Schwingenschlö gl, Udo

    2014-01-01

    The formation of VO (A-center), VV and VO2 defects in irradiated Czochralski-grown silicon (Si) is of technological importance. Recent theoretical studies have examined the formation and charge states of the A-center in detail. Here we use density

  9. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  10. Lithiation-driven structural transition of VO2F into disordered rock-salt LixVO2F

    Czech Academy of Sciences Publication Activity Database

    Chen, R.; Maawad, E.; Knapp, M.; Ren, S.; Beran, Přemysl; Witter, R.; Hempelmann, R.

    2016-01-01

    Roč. 6, č. 69 (2016), s. 65112-65118 ISSN 2046-2069 R&D Projects: GA MŠk(CZ) LM2011019 EU Projects: European Commission(XE) 283883 - NMI3-II Institutional support: RVO:61389005 Keywords : Li- Ion batteries * rechargeble lithium batteries * VO2F Subject RIV: BM - Solid Matter Physics ; Magnetism Impact factor: 3.108, year: 2016

  11. Validation of a ramp running protocol for determination of the true VO2max in mice

    Directory of Open Access Journals (Sweden)

    Mohamed Ayachi

    2016-08-01

    Full Text Available In the field of comparative physiology, it remains to be established whether the concept of VO2max is valid in the mouse and, if so, how this value can be accurately determined. In humans, VO2max is generally considered to correspond to the plateau observed when VO2 no longer rises with an increase in workload. In contrast, the concept of VO2peak tends to be used in murine studies. The objectives of the present study were to determine whether (i a continuous ramp protocol yielded a higher VO2peak than a stepwise, incremental protocol, and (ii the VO2peak measured in the ramp protocol corresponded to VO2max. The three protocols (based on intensity-controlled treadmill running until exhaustion with eight female FVB/N mice were performed in random order: (a an incremental protocol that begins at 10 m.min-1 speed and increases by 3 m.min-1 every 3 min. (b a ramp protocol with slow acceleration (3 m.min-2, and (c a ramp protocol with fast acceleration (12 m.min-2. Each protocol was performed with two slopes (0° and 25°. Hence, each mouse performed six exercise tests. We found that the value of VO2peak was protocol-dependent (p 8 mmol.l-1 and a respiratory exchange ratio >1. The total duration of the 3 m.min-2 0° ramp protocol was shorter than that of the incremental protocol. Taken as a whole, our results suggest that VO2max in the mouse is best determined by applying a ramp exercise protocol with slow acceleration and no treadmill slope.

  12. Influence of lattice distortion on phase transition properties of polycrystalline VO{sub 2} thin film

    Energy Technology Data Exchange (ETDEWEB)

    Lin, Tiegui [State Key Laboratory of Advanced Welding and Joining, Harbin Institute of Technology, Harbin 150001 (China); Wang, Langping, E-mail: aplpwang@hit.edu.cn [State Key Laboratory of Advanced Welding and Joining, Harbin Institute of Technology, Harbin 150001 (China); Wang, Xiaofeng; Zhang, Yufen [State Key Laboratory of Advanced Welding and Joining, Harbin Institute of Technology, Harbin 150001 (China); Yu, Yonghao, E-mail: yhyu@hit.edu.cn [Academy of Fundamental and Interdisciplinary Science, Harbin Institute of Technology, Harbin 150001 (China)

    2016-08-30

    Highlights: • Polycrystalline VO{sub 2} thin films were fabricated by high power impulse magnetron sputtering. • The reported lowest phase transition temperature for undoped polycrystalline VO{sub 2} thin film was reduced to 32 °C by this research. • XRD patterns at varied temperatures revealed that the main structual change was a gradual shift in interplanar spacing with temperature. - Abstract: In this work, high power impulse magnetron sputtering was used to control the lattice distortion in polycrystalline VO{sub 2} thin film. SEM images revealed that all the VO{sub 2} thin films had crystallite sizes of below 20 nm, and similar configurations. UV–vis-near IR transmittance spectra measured at different temperatures showed that most of the as-deposited films had a typical metal–insulator transition. Four-point probe resistivity results showed that the transition temperature of the films varied from 54.5 to 32 °C. The X-ray diffraction (XRD) patterns of the as-deposited films revealed that most were polycrystalline monoclinic VO{sub 2}. The XRD results also confirmed that the lattice distortions in the as-deposited films were different, and the transition temperature decreased with the difference between the interplanar spacing of the as-deposited thin film and standard rutile VO{sub 2}. Furthermore, a room temperature rutile VO{sub 2} thin film was successfully synthesized when this difference was small enough. Additionally, XRD patterns measured at varied temperatures revealed that the phase transition process of the polycrystalline VO{sub 2} thin film was a coordinative deformation between grains with different orientations. The main structural change during the phase transition was a gradual shift in interplanar spacing with temperature.

  13. Fine hierarchy of the V-O bonds by advanced solid state NMR: novel Pb4(VO2)(PO4)3 structure as a textbook case.

    Science.gov (United States)

    Tricot, Grégory; Mentré, Olivier; Cristol, Sylvain; Delevoye, Laurent

    2012-12-17

    We report here a complete structural characterization of a new lead Pb(4)(VO(2))(PO(4))(3) vanadophosphate compound by single crystal X-ray diffraction and (51)V and (31)P solid-state NMR spectroscopy. Although structural data are commonly used for the estimation of bond lengths and further delimitation of the true coordination number (e.g., octahedral: 6 versus 5 + 1 versus 4 + 2), we show here for the first time by solid-state NMR a more accurate appreciation of the V-O bonding scheme in this complex oxide which appears well adapted to the full series of vanado-phosphate materials. The direct characterization of V-O-P bridges through the J-mediated correlation (51)V{(31)P} heteronuclear multiple quantum coherence (J-HMQC) technique allows a contrasted hierarchy of the V-O electronic delocalization and indirectly supports the presence or not of the V-O bond. In the reported lead vanado-phosphate structure, the two vanadium polyhedra that have been assigned to octahedra from a bond length point of view have been finally reclassified as tetra- and penta-coordinated units on the basis of the solid-state NMR results. More generally, we believe that the improved characterization of interatomic bonds in various vanado-phosphate structures by solid-state NMR will contribute to a better understanding of the structure/property relationships in this important class of materials.

  14. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  15. Variação diurna e resposta da cinética do VO2 de ciclistas durante exercício muito intenso Diurnal variation and Vo2 kinetic response of cyclists during heavy exercis e

    Directory of Open Access Journals (Sweden)

    Marcos G. Santana

    2008-06-01

    Full Text Available O objetivo do presente estudo foi avaliar a influência da hora do dia nos parâmetros da cinética do consumo de oxigênio de ciclistas durante exercício muito intenso. Nove voluntários do sexo masculino realizaram exercícios de carga constante às 08:00, 13:00 e 18:00 h, em dias diferentes. Estes exercícios foram realizados duas vezes em cada visita, com um intervalo de 1 h entre eles. A intensidade usada foi de 75%Δ (75% da diferença entre o VO2 no limiar de lactato e o VO2max. A amplitude do componente primário do VO2 (2597 ± 273 ml.min-1, 2513 ± 268 ml.min-1 e 2609 ± 370 ml.min-1, a constante de tempo do componente primário do VO2 (19.3 ± 2.5 s, 18.4 ± 3.0 s e 19.7 ± 3.9 s, o componente lento do VO2 (735 ± 81 ml.min-1, 764 ± 99 ml.min-1 e 680 ± 121 ml.min-1 e o tempo de resposta média (51.8 ± 4.2 s, 51.2 ± 4.2 s e 51.4 ± 3.4 s não apresentaram diferenças significativas entre os diferentes horários do dia (08:00, 13:00 e 18:00 h, assim como os demais parâmetros da cinética do VO2. Estes resultados sugerem que a resposta da cinética do VO2 de ciclistas durante exercício muito intenso (75%Δ não é influenciada pela hora do dia.The objective of the present study was to evaluate the influence of the time of day on the parameters of oxygen uptake kinetics of trained cyclists during high intensity exercise. Nine male volunteers repeated bouts at constant loads at 08:00, 13:00 and 18:00 h on different days. These exercise bouts were performed twice on each occasion, with an interval of 1 h between them. The load intensity used was 75%Δ (75% of the difference between the VO2 at the lactate threshold and the VO2max. The primary VO2 amplitude (2597 ± 273 ml.min-1, 2513 ± 268 ml.min-1 and 2609 ± 370 ml.min-1, the primary VO2 time constant (19.3 ± 2.5 s, 18.4 ± 3.0 s and 19.7 ± 3.9 s, the VO2 slow component (735 ± 81 ml.min-1, 764 ± 99 ml.min-1 and 680 ± 121 ml.min-1 and the mean response time (51.8 ± 4.2 s, 51

  16. A cost-effective process to prepare VO2 (M) powder and films with superior thermochromic properties

    International Nuclear Information System (INIS)

    Xiao, Xiudi; Zhang, Hua; Chai, Guanqi; Sun, Yaoming; Yang, Tao; Cheng, Haoliang; Chen, Lihua; Miao, Lei; Xu, Gang

    2014-01-01

    Graphical abstract: Combining codeposition and short time post annealing, VO 2 (M) with high quality and excellent phase transition performance is obtained. After mixing the VO 2 powder with acrylic resin, the composite films deposited on glass show superior visible transmission and solar modulation, which can be used as an excellent candidate of low cost smart window in energy saving field. - Highlights: • The VO 2 powder obtained by short time thermolysis method is high purity and crystallinity with superior phase transition performance. • The maximum decreasing efficiency of phase transition temperature is about −30 K/at% with w = 0.4 at%. • After mixing VO 2 powder with acrylic resin, the maximal visible transmission of the composite films is 48% and the transmission modulation at 2000 nm is 37.3% with phase transition temperature of 66.2 °C. • Though the phase transition performance is weakened by tungsten doping, the film prepared by 1.3 at% tungsten doped VO 2 still show superior transmission modulation about 26.4%, which means that it is a potential candidate as smart windows. - Abstract: VO 2 powder with superior phase transition performance was prepared by convenient thermolysis method. The results illustrated that VO 2 powder show high purity and crystallinity. VO 2 particles are transformed from cluster to quasi-sphere with the increase of annealing temperature. The DSC analysis proves that VO 2 show superior phase transition performance around 68 °C. The phase transition temperature can be reduced to 33.5 °C by 1.8 at% tungsten doping. The maximum decreasing efficiency of phase transition temperature is about −30 K/at% with w = 0.4 at%. After mixing VO 2 powder with acrylic resin, the maximal visible transmission of the composite thin films on glass is 48% and the transmission modulation at 2000 nm is 37.3% with phase transition temperature of 66.2 °C. Though the phase transition performance is weakened by tungsten doping, the film

  17. Phase transition study in strongly correlated VO{sub 2} based sensing systems

    Energy Technology Data Exchange (ETDEWEB)

    Simo, A., E-mail: alinesimo.aline@gmail.com [UNESCO-UNISA Africa Chair in Nanoscience’s/Nanotechnology, College of Graduate Studies, University of South Africa, Muckleneuk ridge, P.O. Box 392, Pretoria (South Africa); Nanosciences African Network (NANOAFNET), iThemba LABS-National Research Foundation, 1 Old Faure road, Somerset West 7129, P.O. Box 722, Somerset West, Western Cape Province (South Africa); Kaviyarasu, K. [UNESCO-UNISA Africa Chair in Nanoscience’s/Nanotechnology, College of Graduate Studies, University of South Africa, Muckleneuk ridge, P.O. Box 392, Pretoria (South Africa); Nanosciences African Network (NANOAFNET), iThemba LABS-National Research Foundation, 1 Old Faure road, Somerset West 7129, P.O. Box 722, Somerset West, Western Cape Province (South Africa); Mwakikunga, B. [Council for Scientific and Industrial Research, P.O. Box 395, Pretoria 0001 (South Africa); Madjoe, R. [Physics Department, University of Western Cape, 7535 Belville Cape Town (South Africa); Gibaud, A. [Laboratoire de Physique de l’Etat Condensé, Université du Maine Faculte des sciences, UPRESA 6087, 72085, Le Mans Cedex 9 (France); Maaza, M. [UNESCO-UNISA Africa Chair in Nanoscience’s/Nanotechnology, College of Graduate Studies, University of South Africa, Muckleneuk ridge, P.O. Box 392, Pretoria (South Africa); Nanosciences African Network (NANOAFNET), iThemba LABS-National Research Foundation, 1 Old Faure road, Somerset West 7129, P.O. Box 722, Somerset West, Western Cape Province (South Africa)

    2017-04-15

    Highlights: • At 230 °C for about 48 h to prepare successfully VO{sub 2} nanobelts. • 1D shows good sensing performance due to the large active surface of the material. • The good selectivity of methanol compared to acetone and isopropanol. • VOC compounds was observed at room temperature. - Abstract: Intermediate phase monoclinic M2 was observed by inducing in situ X-ray thermo diffraction on VO{sub 2} (M) nanoplatelets. The solid-solid phase transition occurs at around 65 °C assisted with the percolative transition metal-insulator. The existence of an intermediate crystalline phase with room temperature insulator phase and high temperature metallic phase across MIT in VO{sub 2} could be of relevance to understand structural contributions to the phase transition dynamics. In addition, pellet of VO{sub 2} nanostructures have shown to present good sensing properties to various alcohols vapors at room temperature and good selectivity of methanol with 5.54% sensitivity and limit detection below 5 ppm, compared to isopropanol 3.2% and acetone 2.4% respectively.

  18. Broadband modulation of terahertz waves through electrically driven hybrid bowtie antenna-VO2 devices.

    Science.gov (United States)

    Han, Chunrui; Parrott, Edward P J; Humbert, Georges; Crunteanu, Aurelian; Pickwell-MacPherson, Emma

    2017-10-05

    Broadband modulation of terahertz (THz) light is experimentally realized through the electrically driven metal-insulator phase transition of vanadium dioxide (VO 2 ) in hybrid metal antenna-VO 2 devices. The devices consist of VO 2 active layers and bowtie antenna arrays, such that the electrically driven phase transition can be realized by applying an external voltage between adjacent metal wires extended to a large area array. The modulation depth of the terahertz light can be initially enhanced by the metal wires on top of VO 2 and then improved through the addition of specific bowties in between the wires. As a result, a terahertz wave with a large beam size (~10 mm) can be modulated within the measurable spectral range (0.3-2.5 THz) with a frequency independent modulation depth as high as 0.9, and the minimum amplitude transmission down to 0.06. Moreover, the electrical switch on/off phase transition depends very much on the size of the VO 2 area, indicating that smaller VO 2 regions lead to higher modulation speeds and lower phase transition voltages. With the capabilities in actively tuning the beam size, modulation depth, modulation bandwidth as well as the modulation speed of THz waves, our study paves the way in implementing multifunctional components for terahertz applications.

  19. Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment

    Science.gov (United States)

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved. PMID:24078906

  20. Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Weizhe Zhang

    2013-01-01

    Full Text Available Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  1. Secure encapsulation and publication of biological services in the cloud computing environment.

    Science.gov (United States)

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  2. Influence of point defects on the performance of InVO4 photoanodes

    NARCIS (Netherlands)

    Van de Krol, R.; Ségalini, J.; Enache, C.S.

    2011-01-01

    The properties of thin film InVO4 photoanodes for water splitting have been studied. Compact films of InVO4 were prepared by spray pyrolysis and are found to be stable between pH 3 and 11. Although the indirect bandgap is 3.2 eV, a modest amount of visible light absorption is observed. The origin of

  3. Enhanced photocatalytic performance of BiVO{sub 4} in aqueous AgNO{sub 3} solution under visible light irradiation

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Chien-Kai [Department of Chemistry, National Changhua University of Education, Changhua City, Taiwan (China); Wu, Tsunghsueh [Department of Chemistry, University of Wisconsin-Platteville, Platteville (United States); Huang, Chang-Wei [Department of Chemistry, National Changhua University of Education, Changhua City, Taiwan (China); Lai, Chi-Yung [Department of Biology, National Changhua University of Education, Changhua, Taiwan (China); Wu, Mei-Yao, E-mail: meiyaowu0919@gmail.com [Research Centre for Traditional Chinese Medicine, Department of Medical Research, China Medical University Hospital, Taichung City, Taiwan (China); Lin, Yang-Wei, E-mail: linywjerry@cc.ncue.edu.tw [Department of Chemistry, National Changhua University of Education, Changhua City, Taiwan (China)

    2017-03-31

    Graphical abstract: Ag{sup +} ions enhanced photocatalytic activity of BiVO{sub 4} under visible light irradiation. - Highlights: • The presence of Ag{sup +} ions enhanced the photodegradation activity of BiVO{sub 4}. • Photoreduction of Ag deposited on the BiVO{sub 4} surface was obtained. • Luminescence and electrochemical results elucidated the photocatalytic mechanism. • Holes and oxygen radicals were the main reactive species generated by BiVO{sub 4}/Ag{sup +}. • Used BiVO{sub 4}/Ag{sup +} exhibited photocatalytic antibacterial activity toward E. coli. - Abstract: Monoclinic-phase bismuth vanadate (BiVO{sub 4}) with a 2.468 eV band gap exhibited enhanced synergic photodegradation activity toward methylene blue (MB) when combined with silver ions (Ag{sup +}) in an aqueous solution under visible light irradiation. The mass ratio of AgNO{sub 3} to BiVO{sub 4} and the calcination temperature were discovered to considerably affect the degradation activity of BiVO{sub 4}/Ag{sup +}. Superior photocatalytic performance was obtained when BiVO{sub 4} was mixed with 0.01%(w/v) AgNO{sub 3} solution, and complete degradation of MB was achieved after 25 min visible light irradiation, outperforming BiVO{sub 4} or AgNO{sub 3} solution alone. The enhanced photodegradation was investigated using systematic luminescence measurements, electrochemical impedance spectroscopy, and scavenger addition, after which a photocatalytic mechanism for MB degradation under visible light irradiation was identified that involved oxygen radicals and holes. This study also discovered the two dominating processes involved in enhancing the electron–hole separation efficiency and reducing their recombination rate, namely photoreduction of Ag{sup +} and the formation of a BiVO{sub 4}/Ag heterojunction. The synergic effect between BiVO{sub 4} and Ag{sup +} was discovered to be unique. BiVO{sub 4}/Ag{sup +} was successfully used to degrade two other dyes and disinfect Escherichia Coli. A

  4. Supporting reputation based trust management enhancing security layer for cloud service models

    Science.gov (United States)

    Karthiga, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    In the existing system trust between cloud providers and consumers is inadequate to establish the service level agreement though the consumer’s response is good cause to assess the overall reliability of cloud services. Investigators recognized the significance of trust can be managed and security can be provided based on feedback collected from participant. In this work a face recognition system that helps to identify the user effectively. So we use an image comparison algorithm where the user face is captured during registration time and get stored in database. With that original image we compare it with the sample image that is already stored in database. If both the image get matched then the users are identified effectively. When the confidential data are subcontracted to the cloud, data holders will become worried about the confidentiality of their data in the cloud. Encrypting the data before subcontracting has been regarded as the important resources of keeping user data privacy beside the cloud server. So in order to keep the data secure we use an AES algorithm. Symmetric-key algorithms practice a shared key concept, keeping data secret requires keeping this key secret. So only the user with private key can decrypt data.

  5. Atomic layer deposition of VO{sub 2} films with Tetrakis-dimethyl-amino vanadium (IV) as vanadium precursor

    Energy Technology Data Exchange (ETDEWEB)

    Lv, Xinrui [Key Laboratory of Inorganic Coating Materials CAS, Shanghai Institute of Ceramics, Chinese Academy of Sciences, Shanghai 201800 (China); University of Chinese Academy of Sciences, Beijing 100049 (China); Cao, Yunzhen, E-mail: yzhcao@mail.sic.ac.cn [Key Laboratory of Inorganic Coating Materials CAS, Shanghai Institute of Ceramics, Chinese Academy of Sciences, Shanghai 201800 (China); Yan, Lu; Li, Ying; Song, Lixin [Key Laboratory of Inorganic Coating Materials CAS, Shanghai Institute of Ceramics, Chinese Academy of Sciences, Shanghai 201800 (China)

    2017-02-28

    Highlights: • VO{sub 2} film was easily deposited by ALD using novel vanadium precursor V(NMe{sub 2}){sub 4}. • Deposition and annealing condition were systematically investigated. • Comparable transition properties of VO{sub 2} film on resistance and spectral transmittance were studied. - Abstract: VO{sub 2} thin films have been grown on Si(100) (VO{sub 2}/Si) and fused silica substrates (VO{sub 2}/SiO{sub 2}) by atomic layer deposition (ALD) using tetrakis-dimethyl-amino vanadium (IV) (TDMAV) as a novel vanadium precursor and water as reactant gas. The quartz crystal microbalance (QCM) measurement was performed to study the ALD process of VO{sub 2} thin film deposition, and a constant growth rate of about 0.95 Å/cycle was obtained at the temperature range of 150–200 °C. XRD measurement was performed to study the influence of deposition temperature and post-annealing condition on the crystallization of VO{sub 2} films, which indicated that the films deposited between 150 and 200 °C showed well crystallinity after annealing at 475 °C for 100 min in Ar atmosphere. XPS measurement verified that the vanadium oxidation state was 4+ for both as-deposited film and post-annealed VO{sub 2}/Si film. AFM was applied to study the surface morphology of VO{sub 2}/Si films, which showed a dense polycrystalline film with roughness of about 1 nm. The resistance of VO{sub 2}/Si films deposited between 150 °C and 200 °C as a function of temperature showed similar semiconductor-to-metal transition (SMT) characters with the transition temperature for heating branch (T{sub c,h}) of about 72 °C, a hysteresis width of about 10 °C and the resistance change of two orders of magnitude. The increase of T{sub c,h} compared with the bulk VO{sub 2} (68 °C) may be attributed to the tensile stress along the c-axis in the film. Transmittance measurement of VO{sub 2}/SiO{sub 2} films showed typical thermochromic property with a NIR switching efficiency of above 50% at 2 μm across

  6. Offices of Industrial Security International: A Review

    National Research Council Canada - National Science Library

    Sands, W

    1998-01-01

    The Defense Security Service (DSS), formerly the Defense Investigative Service (DIS), handles many of its overseas industrial security issues through its Offices of Industrial Security International...

  7. Hydrothermal route to VO2 (B) nanorods: controlled synthesis and characterization

    Science.gov (United States)

    Song, Shaokun; Huang, Qiwei; Zhu, Wanting

    2017-10-01

    One-dimensional vanadium dioxides have attracted intensive attention owing to their distinctive structure and novel applications in catalysis, high energy lithium-ion batteries, chemical sensors/actuators and electrochemical devices etc. In this paper, large-scale VO2 (B) nanorods have been successfully synthesized via a versatile and environment friendly hydrothermal strategy using V2O5 as vanadium source and carbohydrates/alcohols as reductant. The obtained samples are characterized by XRD, FT-IR, TEM, and XPS techniques to investigate the effects of chemical parameters such as reductants, temperature, and time of synthesis on the structure and morphology of products. Results show that pure B phase VO2 with homogeneous nanorod-like morphology can be prepared easily at 180 °C for 3 days with glycerol as reluctant. Typically, the nanorod-like products are 0.5-1 μm long and 50 nm width. Furthermore, it is also confirmed that the products are consisted of VO2, corresponding to the B phase. More importantly, this novel approach is efficient, free of any harmful solvents and surfactants. Therefore, this efficient, green, and cost-saving route will have great potential in the large-scale fabrication of 1D VO2 (B) nanorods from the economic and environmental point of view.

  8. Metal-Insulator Phase Transition in Quasi-One-Dimensional VO2 Structures

    Directory of Open Access Journals (Sweden)

    Woong-Ki Hong

    2015-01-01

    Full Text Available The metal-insulator transition (MIT in strongly correlated oxides has attracted considerable attention from both theoretical and experimental researchers. Among the strongly correlated oxides, vanadium dioxide (VO2 has been extensively studied in the last decade because of a sharp, reversible change in its optical, electrical, and magnetic properties at approximately 341 K, which would be possible and promising to develop functional devices with advanced technology by utilizing MITs. However, taking the step towards successful commercialization requires the comprehensive understanding of MIT mechanisms, enabling us to manipulate the nature of transitions. In this regard, recently, quasi-one-dimensional (quasi-1D VO2 structures have been intensively investigated due to their attractive geometry and unique physical properties to observe new aspects of transitions compared with their bulk counterparts. Thus, in this review, we will address recent research progress in the development of various approaches for the modification of MITs in quasi-1D VO2 structures. Furthermore, we will review recent studies on realizing novel functional devices based on quasi-1D VO2 structures for a wide range of applications, such as a gas sensor, a flexible strain sensor, an electrical switch, a thermal memory, and a nonvolatile electrical memory with multiple resistance.

  9. Tuning the work function of VO_2(1 0 0) surface by Ag adsorption and incorporation: Insights from first-principles calculations

    International Nuclear Information System (INIS)

    Chen, Lanli; Wang, Xiaofang; Shi, Siqi; Cui, Yuanyuan; Luo, Hongjie; Gao, Yanfeng

    2016-01-01

    Graphical abstract: - Highlights: • After adsorption, there is a charge transfer from Ag to VO_2(1 0 0) surface, which thus increases the electron concentration in VO_2 thin film. • Ag adsorption on VO_2(1 0 0) surface process is an exothermic chemical process, and the adsorption system is stable. • The work function can be tuned by Ag adsorption on and incorporation into the VO_2(1 0 0) surface, which in turn regulates the phase transition temperature of VO_2. - Abstract: VO_2 is an attractive material for application to thermochromic optoelectronic devices such as smart windows, and Ag/VO_2 double-layered structure can effectively decrease the phase transition temperature (T_c) of VO_2 thin film, which is very important for practical application of VO_2. Previous works has shown that the decrease in phase transition temperature (T_c) seems to be relevant with the work function of VO_2 in Ag/VO_2 double-layered thin film, although the underlying mechanism of tuning its T_c by Ag incorporation and adsorption on the VO_2(1 0 0) surface has been rarely investigated. Our first-principles calculations reveal that the adsorption of Ag atoms on the VO_2(1 0 0) surface rather than incorporation of Ag exhibits a lower work function, which is ascribed to an integrated effect of charge transfer from Ag to VO_2(1 0 0) surface and enhanced surface dipole moment. The results suggest that the decrease in work function of VO_2 with Ag adsorption favors the reduction in T_c. The current findings are helpful to understand the fundamental mechanism for yielding high-efficiency VO_2-based optoelectronic devices.

  10. The specific tasks of RF TSO - FSUE VO 'Safety', related with Implementation of obligations under the Convention on Nuclear Safety

    International Nuclear Information System (INIS)

    Potapov, V.; Kuznetsov, M.; Kapralov, E.

    2010-01-01

    It was more than 20 years ago that IAEA discussed the issue pertaining to the need in scientific and engineering support to the regulatory body. The Convention on Nuclear Safety being the keystone in assurance of the global nuclear safety and security regime was adopted in 1994. It is pointed out that two independent organizations supervised by Rostechnadzor have been established within the Russian TSO system, FSUE VO 'Safety' being one of them. The tasks of the organization comprise obligatory certification of equipment as well as acceptance of equipment before its delivery to the NPP both in Russia and in the countries constructing the power units based on the Russian designs. The acceptance procedure has been set forth in the new Russian document at the level of the federal rules and regulations for nuclear safety assurance. As far as its implementation decision is concerned, a task for selection and training of personnel has been set and allocated on the Training and Methodological Center of Nuclear and Radiation Safety established with the support of FSUE VO 'Safety', which provides training programmes and specific lecture courses in the wide range of the relevant topics. (author)

  11. ANALISIS PENGARUH RSVP TERHADAP QUALITY OF SERVICE VOIP PADA JARINGAN UMTS

    Directory of Open Access Journals (Sweden)

    I Made Suwartama

    2014-10-01

    Full Text Available Voice Over Internet Protocol (VoIP merupakan layanan komunikasi yang memungkinkan suara ditransmisikan pada infrastruktur packet switched. Untuk meningkatkan kualitas layanan VoIP dapat dilakukan dengan penggunaan Resouce Reservation Protocol (RSVP. Pada penelitian ini dilakukan simulasi untuk mengetahui pengaruh penggunaan RSVP terhadap Quality of Service VoIP yang diujikan menggunakan codec G.711 pada jaringan UMTS. Simulasi I menggunakan 4 user tanpa RSVP, simulasi II menggunakan 4 user dengan RSVP, simulasi III menggunakan 8 user tanpa RSVP, dan simulasi IV menggunakan 8 user dengan RSVP. Diperoleh hasil untuk end-to-end delay, packet loss dan jitter simulasi dengan RSVP lebih kecil daripada simulasi tanpa RSVP.

  12. 75 FR 17584 - Schools and Libraries Universal Service Support Mechanism

    Science.gov (United States)

    2010-04-07

    ..., wireless LAN controllers, VoIP-related services, and virtualization software. We also find that telephone... been designated as an eligible service, and the E-rate program pays for the software for a server-based... messaging is an ``add- on to voice mail'' service and not software for voice mail itself. Therefore, we find...

  13. Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks

    Directory of Open Access Journals (Sweden)

    M. Mazhar U. Rathore

    2015-07-01

    Full Text Available VoIP usage is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN. In some countries, like Pakistan, the commercial usage of VoIP is prohibited. Internet service providers (ISPs and telecommunication authorities are interested in detecting VoIP calls to either block or prioritize them. So detection of VoIP calls is important for both types of authorities. Signature-based, port-based, and pattern-based VoIP detection techniques are inefficient due to complex and confidential security and tunneling mechanisms used by VoIP. In this paper, we propose a generic, robust, efficient, and practically implementable statistical analysis-based solution to identify encrypted, non-encrypted, or tunneled VoIP media (voice flows using threshold values of flow statistical parameters. We have made a comparison with existing techniques and evaluated our system with respect to accuracy and efficiency. Our system has 97.54% direct rate and .00015% false positive rate.

  14. Efeito da intensidade do exercício de corrida intermitente 30s:15s no tempo de manutenção no ou próximo do VO2max Effect of intensity of intermittent running exercise 30s:15s at the time maintenance at or near VO2max

    Directory of Open Access Journals (Sweden)

    Rafael Alves de Aguiar

    2013-03-01

    Full Text Available O presente estudo comparou o tempo mantido acima de 90% (t90VO2max e de 95% VO2max (t95VO2max em três diferentes intensidades de exercício. Após a realização de um teste incremental para determinar o VO2max, oito estudantes de educação física ativos (23 ± 3 anos executaram três sessões de exercícios intermitentes (100, 110 e 120% da velocidade do VO2max (vVO2max com razão esforço:recuperação de 30s:15s. O t95VO2max foi significantemente maior em 110%vVO2max (EI110% (218,1 ± 81,6 s quando comparado a 100%vVO2max (EI100% (91,9 ± 75,2s e a 120%vVO2max (EI120% (126,3 ± 29,4 s, porém sem diferença entre EI100% e EI120%. O t90VO2max somente apresentou diferença significante entre EI110% e EI120%. Portanto, conclui-se que durante exercício intermitente com razão 30s:15s, a intensidade de 110%vVO2max apresenta-se mais adequada para manter o VO2 próximo ou no VO2max por um tempo maior.The present study compared the time maintained above 90% (t90VO2max or 95% VO2max (t95VO2max in three different exercise intensities. After performing an incremental test to determine VO2max, eight physical education active students (23 ± 3 years performed three intermittent exercise sessions (100, 110 e 120% velocity of VO2max (vVO2max with ratio effort:recovery of 30s:15s. The t95%VO2max was significantly higher at 110%vVO2max (EI110% (218.1 ± 81.6s compared to 100% vVO2max (EI100% (91.9 ± 75.2s and 120%vVO2max (EI120% (126.3 ± 29.4s, but without differences between EI100% and EI120%. The t90%vVO2max was significantly different only between EI110% and 120%. Therefore, we conclude that during intermittent exercise with ratio 30s:15s, the intensity of 110%vVO2max appears more appropriate to maintain VO2max for a longer time.

  15. Gate-tunable gigantic lattice deformation in VO{sub 2}

    Energy Technology Data Exchange (ETDEWEB)

    Okuyama, D., E-mail: okuyama@riken.jp, E-mail: nakano@imr.tohoku.ac.jp, E-mail: iwasa@ap.t.u-tokyo.ac.jp; Hatano, T. [RIKEN Center for Emergent Matter Science (CEMS), Wako 351-0198 (Japan); Nakano, M., E-mail: okuyama@riken.jp, E-mail: nakano@imr.tohoku.ac.jp, E-mail: iwasa@ap.t.u-tokyo.ac.jp [RIKEN Center for Emergent Matter Science (CEMS), Wako 351-0198 (Japan); Institute for Materials Research, Tohoku University, Sendai 980-8577 (Japan); Takeshita, S.; Ohsumi, H.; Tardif, S. [RIKEN SPring-8 Center, Hyogo 679-5148 (Japan); Shibuya, K. [National Institute of Advanced Industrial Science and Technology, Tsukuba 305-8562 (Japan); Yumoto, H.; Koyama, T.; Ohashi, H. [Japan Synchrotron Radiation Research Institute, SPring-8, Hyogo 679-5198 (Japan); Takata, M. [RIKEN SPring-8 Center, Hyogo 679-5148 (Japan); Japan Synchrotron Radiation Research Institute, SPring-8, Hyogo 679-5198 (Japan); Kawasaki, M.; Tokura, Y.; Iwasa, Y., E-mail: okuyama@riken.jp, E-mail: nakano@imr.tohoku.ac.jp, E-mail: iwasa@ap.t.u-tokyo.ac.jp [RIKEN Center for Emergent Matter Science (CEMS), Wako 351-0198 (Japan); Quantum-Phase Electronics Center and Department of Applied Physics, University of Tokyo, Tokyo 113-8656 (Japan); Arima, T. [RIKEN Center for Emergent Matter Science (CEMS), Wako 351-0198 (Japan); RIKEN SPring-8 Center, Hyogo 679-5148 (Japan); Department of Advanced Materials Science, University of Tokyo, Kashiwa 277-8561 (Japan)

    2014-01-13

    We examined the impact of electric field on crystal lattice of vanadium dioxide (VO{sub 2}) in a field-effect transistor geometry by in-situ synchrotron x-ray diffraction measurements. Whereas the c-axis lattice parameter of VO{sub 2} decreases through the thermally induced insulator-to-metal phase transition, the gate-induced metallization was found to result in a significant increase of the c-axis length by almost 1% from that of the thermally stabilized insulating state. We also found that this gate-induced gigantic lattice deformation occurs even at the thermally stabilized metallic state, enabling dynamic control of c-axis lattice parameter by more than 1% at room temperature.

  16. Associations between VO2max and vitality in older workers: a cross-sectional study

    Directory of Open Access Journals (Sweden)

    van der Beek Allard J

    2010-11-01

    Full Text Available Abstract Background To prevent early exit from work, it is important to study which factors contribute to healthy ageing. One concept that is assumed to be closely related to, and therefore may influence healthy ageing, is vitality. Vitality consists of both a mental and a physical component, and is characterised by a perceived high energy level, decreased feelings of fatigue, and feeling fit. Since VO2max gives an indication of one's aerobic fitness, which can be improved by increased levels of physical activity, and because feeling fit is one of the main characteristics of vitality, it is hypothesised that VO2max is related to vitality. Therefore, the aim of this study was to investigate the associations between VO2max and vitality. Methods In 427 older workers (aged 45 + years participating in the Vital@Work study, VO2max was estimated at baseline using the 2-km UKK walk test. Vitality was measured by both the UWES Vitality Scale and the RAND-36 Vitality Scale. Associations were analysed using linear regression analyses. Results The linear regression models, adjusted for age, showed a significant association between VO2max and vitality measured with the RAND-36 Vitality Scale (β = 0.446; 95% CI: 0.220-0.673. There was no significant association between VO2max and vitality measured with the UWES (β = -0.006; 95% CI:-0.017 - 0.006, after adjusting for age, gender and chronic disease status. Conclusions VO2max was associated with a general measure of vitality (measured with the RAND-36 Vitality Scale, but not with occupational health related vitality (measured with the UWES Vitality Scale. The idea that physical exercise can be used as an effective tool for improving vitality was supported in this study. Trial registration NTR1240

  17. Associations between VO2max and vitality in older workers: a cross-sectional study.

    Science.gov (United States)

    Strijk, Jorien E; Proper, Karin I; Klaver, Linda; van der Beek, Allard J; van Mechelen, Willem

    2010-11-09

    To prevent early exit from work, it is important to study which factors contribute to healthy ageing. One concept that is assumed to be closely related to, and therefore may influence healthy ageing, is vitality. Vitality consists of both a mental and a physical component, and is characterised by a perceived high energy level, decreased feelings of fatigue, and feeling fit. Since VO2max gives an indication of one's aerobic fitness, which can be improved by increased levels of physical activity, and because feeling fit is one of the main characteristics of vitality, it is hypothesised that VO2max is related to vitality. Therefore, the aim of this study was to investigate the associations between VO2max and vitality. In 427 older workers (aged 45 + years) participating in the Vital@Work study, VO2max was estimated at baseline using the 2-km UKK walk test. Vitality was measured by both the UWES Vitality Scale and the RAND-36 Vitality Scale. Associations were analysed using linear regression analyses. The linear regression models, adjusted for age, showed a significant association between VO2max and vitality measured with the RAND-36 Vitality Scale (β = 0.446; 95% CI: 0.220-0.673). There was no significant association between VO2max and vitality measured with the UWES (β = -0.006; 95% CI:-0.017 - 0.006), after adjusting for age, gender and chronic disease status. VO2max was associated with a general measure of vitality (measured with the RAND-36 Vitality Scale), but not with occupational health related vitality (measured with the UWES Vitality Scale). The idea that physical exercise can be used as an effective tool for improving vitality was supported in this study. NTR1240.

  18. Estimated VO2max and its corresponding velocity predict performance of amateur runners

    Directory of Open Access Journals (Sweden)

    Bruno Ribeiro Ramalho Oliveira

    2012-03-01

    Full Text Available In recent years, there has been a substantial increase in the number of runners, with a proportional increase in their involvement in amateur street competition. Identification of the determinants of performance in this population appears necessary for optimization of time devoted to training. The objective of this study was to ascertain the association between estimated maximal oxygen uptake (VO2max, critical velocity (CV and VO2max velocity (VVO2max and athletic performance in the 3.6 km (uphill and 10 and 21.1 km (flatland events. Twelve amateur runners (nine male, mean age 36 ± 5 years underwent five tests: 1 and 5 km race on level ground, 3.6 km race with slope (≈8%, and indirect VO2max measurement. CV was determined from the linear relationship between distance and run time on the first two tests. The subjects then took part in two official 10 km and 21.1 km (half marathon races. VVO2max was calculated from the VO2max through a metabolic equation. VO2max showed the best association with running performance in the 10 and 21.1 km events. For the uphill race, VVO2max showed a better association. Overall, the variable with the highest average association was VO2max (0.91±0.07, followed by VVO2max (0.90±0.04 and VC (0.87±0.06. This study showed strong associations between physiological variables established by low-cost, user-friendly indirect methods and running performance in the 10 and 21.1 km (flatland and 3.6 km (uphill running events.

  19. Enhanced photoelectrochemical performance of inorganic–organic hybrid consisting of BiVO{sub 4} and PEDOT:PSS

    Energy Technology Data Exchange (ETDEWEB)

    Trzciński, K. [Faculty of Chemistry, Gdańsk University of Technology, Narutowicza 11/12, 80-233 Gdańsk (Poland); Szkoda, M., E-mail: mariusz-szkoda@wp.pl [Faculty of Chemistry, Gdańsk University of Technology, Narutowicza 11/12, 80-233 Gdańsk (Poland); Siuzdak, K.; Sawczak, M. [Centre for Plasma and Laser Engineering, The Szewalski Institute of Fluid Flow Machinery, Fiszera 14, 80-231 Gdańsk (Poland); Lisowska-Oleksiak, A., E-mail: alo@pg.gda.pl [Faculty of Chemistry, Gdańsk University of Technology, Narutowicza 11/12, 80-233 Gdańsk (Poland)

    2016-12-01

    Highlights: • Bismuth vanadate layers were prepared using pulsed laser deposition technique. • The modification method of BiVO{sub 4} by PEDOT:PSS was developed. • Modified layers exhibited higher photoactivity than bare BiVO{sub 4}. • Prepared material can act as semiconducting layer in photoelectrochemical cells. - Abstract: The PEDOT:PSS (poly(3,4-ethylenedioxythiophene):poly(styrenesulfonate)) was electrodeposited on a thin layer of bismuth vanadate (BiVO{sub 4}) prepared using the pulsed laser deposition technique onto FTO. The inorganic–organic junction was characterized by Raman spectroscopy, UV–vis spectroscopy and scanning electron microscopy. Chronoamperometry curves, recorded under simulated solar light illumination, were performed to determine generated photocurrent during water and hydroquinone oxidation at the electrode surface. Experiments were performed for three types of electrode materials: (i) FTO/BiVO{sub 4}, (ii) FTO/PEDOT:PSS and (iii) FTO/BiVO{sub 4}/PEDOT:PSS in aqueous electrolyte. Almost 5 times higher photocurrent in electrolyte containing hole scavenger was generated after modification of BiVO{sub 4} photoanode with electrodeposited polymer. It is noteworthy that anodic photocurrent was stable even after 4 h of illumination. Cyclic voltammetry curves of FTO/BiVO{sub 4}/PEDOT:PSS recorded before and after experiments performed under electrode illumination indicated that the organic part in tested junction is photo-corrosion resistant.

  20. Securing cloud services a pragmatic approach to security architecture in the cloud

    CERN Document Server

    Newcombe, Lee

    2012-01-01

    This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud.

  1. F-doped VO2 nanoparticles for thermochromic energy-saving foils with modified color and enhanced solar-heat shielding ability.

    Science.gov (United States)

    Dai, Lei; Chen, Shi; Liu, Jianjun; Gao, Yanfeng; Zhou, Jiadong; Chen, Zhang; Cao, Chuanxiang; Luo, Hongjie; Kanehira, Minoru

    2013-07-28

    F-doped VO2 (M1) nanoparticles were prepared via one-pot hydrothermal synthesis. The F-doping can minimise the size of the VO2 (M1) nanoparticles, induce a homogeneous size distribution and effectively decrease the phase transition temperature to 35 °C at 2.93% F in VO2. VO2 smart glass foils obtained by casting these nanoparticles exhibit excellent thermochromism in the near-infrared region, which suggests that these foils can be used for energy-efficient glass. Compared to a pure VO2 foil, the 2.93% F-doped VO2 foil exhibits an increased solar-heat shielding ability (35.1%) and a modified comfortable colour, while still retaining an excellent solar modulation ability (10.7%) and an appropriate visible transmittance (48.7%). The F-doped VO2 foils are the first to simultaneously meet the requirements of a reduced phase transition temperature, diluted colour and excellent thermochromic properties, and these properties make the further improved F-doped VO2 foils suitable for commercial applications in energy efficient glass.

  2. Data Security Measures in the IT Service Industry: A Balance between Knowledge & Action

    Directory of Open Access Journals (Sweden)

    N. Mlitwa

    2008-12-01

    Full Text Available That knowledge is power is fast becoming a cliche within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www, it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even theft of confidential information, leading to financial losses in information dependant competitive institutions is therefore high. Improving efficiencies through ICT therefore, comes with security responsibilities. The problem however is that most organizations tend to focus on task-enhancing efficiencies and neglect security. Possibly due to limited awareness about security, underestimating the problem, concerns about security costs, or through plain negligence. The activity theory of Engestrm and the activity analysis development framework of Mursu et al are used as analytical lenses to the cybercrime challenge in this paper. A practical case study of Company X, an IT service provider in Malawi is then used to understand the extent to which organisations that offer electronic data solutions prioritise security in their operations. It is found that even better informed organisations fall short in taking adequate data security measures. A recommendation for all organisations is that they should not only have a clear policy, but also ensure that it is routinely and consistently implemented throughout the operations if information capital is to be secured. A framework towards a holistic approach to thinking about, and in addressing cybercrime is suggested, and recommended in the paper.

  3. Downregulation of MDM2 expression by RNAi inhibits LoVo human colorectal adenocarcinoma cells growth and the treatment of LoVo cells with mdm2siRNA3 enhances the sensitivity to cisplatin

    International Nuclear Information System (INIS)

    Yu Yan; Sun Ping; Sun Lichun; Liu Guoyi; Chen Guohua; Shang Lihua; Wu Hongbo; Hu Jing; Li Yue; Mao Yinling; Sui Guangjie; Sun Xiwen

    2006-01-01

    To investigate the biological effect of mdm2 in human colorectal adenocarcinoma LoVo cells, three mdm2siRNA constructions were recombinated and transient transfected into human colorectal adenocarcinoma LoVo cells with low differentiation character in vitro. The results showed that mdm2siRNA3 reduced mRNA level of mdm2 and protein level of mdm2, leading to proliferation inhibition on LoVo cells, and reduced tumor growth in nude mice. It was found that depletion of MDM2 in this pattern promoted apoptosis of LoVo cells and Cisplatin (DDP) treated in the mdm2siRNA3 transfected cell population would result in a substantial decrease by MTT colorimetry. Decreasing the MDM2 protein level in LoVo cells by RNAi could significantly inhibit tumor growth both in vitro and in vivo, which indicated that mdm2 gene played a definite role in the development and aggressiveness of human colon carcinoma. It also could be a therapeutic target in colorectal carcinoma. The synergistic activation of RNAi and cell toxicity agents indicated that the combination of chemotherapy and gene therapy will be a promising approach in the future

  4. An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service

    Institute of Scientific and Technical Information of China (English)

    Nyamsuren Vaanchig; Wei Chen; Zhi-Guang Qin

    2017-01-01

    Nowadays, there is the tendency to outsource data to cloud storage servers for data sharing purposes. In fact, this makes access control for the outsourced data a challenging issue. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution for this challenge. It gives the data owner (DO) direct control on access policy and enforces the access policy cryptographically. However, the practical application of CP-ABE in the data sharing service also has its own inherent challenge with regard to attribute revocation. To address this challenge, we proposed an attribute-revocable CP-ABE scheme by taking advantages of the over-encryption mechanism and CP-ABE scheme and by considering the semi-trusted cloud service provider (CSP) that participates in decryption processes to issue decryption tokens for authorized users. We further presented the security and performance analysis in order to assess the effectiveness of the scheme. As compared with the existing attribute-revocable CP-ABE schemes, our attribute-revocable scheme is reasonably efficient and more secure to enable attribute-based access control over the outsourced data in the cloud data sharing service.

  5. Observation of reduced phase transition temperature in N-doped thermochromic film of monoclinic VO{sub 2}

    Energy Technology Data Exchange (ETDEWEB)

    Wan, Meinan; Xiong, Mo [State Key Laboratory of Silicate Materials for Architectures, Wuhan University of Technology, Wuhan 430070 (China); Li, Neng, E-mail: lineng@whut.edu.cn [State Key Laboratory of Silicate Materials for Architectures, Wuhan University of Technology, Wuhan 430070 (China); Liu, Baoshun; Wang, Shuo [State Key Laboratory of Silicate Materials for Architectures, Wuhan University of Technology, Wuhan 430070 (China); Ching, Wai-Yim [Department of Physics and Astronomy, University of Missouri-Kansas City, Kansas City, MO 64110 (United States); Zhao, Xiujian, E-mail: opluse@whut.edu.cn [State Key Laboratory of Silicate Materials for Architectures, Wuhan University of Technology, Wuhan 430070 (China)

    2017-07-15

    Highlights: • N-doped VO{sub 2}(M1) thin films have been synthesized by annealing in NH{sub 3} atmosphere. • The phase purity, microstructure and optical property of VO{sub 2} thin film can be regulated by NH{sub 3} concentration. • First-principles calculations have been carried out to study the mechanism of N-doping on energy band structures of VO{sub 2}(M1). • The energy band gaps of VO{sub 2}(M1) are tuned by substitution N-doping or interstitial N-doping. - Abstract: Research on monoclinic (M1) phase of VO{sub 2} has attracted a great of interest for smart coating applications due to its exceptional thermochromic property. Herein, we report the results using a novel approach to synthesize N-doped VO{sub 2}(M1) thin films with high purity by heat treatment in NH{sub 3} atmosphere. The N dopant in the film can be regulated by varying NH{sub 3} concentration during the annealing process. We find that the N atoms are located at the interstitial sites or substitute oxygen atoms, and the V-N bonds in the VO{sub 2} thin films increase with NH{sub 3} concentration. The metal to insulator transition (MIT) temperature (τ{sub c,h}) of the VO{sub 2} thin film is effectively reduced from 80.0 to 62.9 °C, while the solar modulation efficiency (ΔT{sub sol}) and the modulation efficiency at 2000 nm (ΔT{sub 2000nm}) are 7.36% and 55.6% respectively. The band gap of N-doped VO{sub 2} thin films related to MIT (E{sub g1}) is estimated to be as low as 0.18–0.25 eV whereas the band gap associated with the visible transparency (E{sub g2}) is about 1.50–1.58 eV. Based on the highly accurate first-principles calculations, the E{sub g1} of VO{sub 2} (M1) is reduced after substituted or interstitial N-doping, while the E{sub g2} alters with the mode of N-doping, which is excellent agreement with experimental measurement.

  6. Analyzátor kvality hovorů VoIP

    OpenAIRE

    Basel, Martin

    2014-01-01

    Tato bakalářská práce se zabývá metodami pro hodnocení kvality hovorů VoIP. Je zde vysvětlen rozbor protokolu RTP/RTCP a následné počítání statistik potřebných pro určení kvality hovorů. V této práci je také popsána metoda, která byla implementována do pluginů pro sondu FlowMon. Budete zde seznámeni s výsledky a s porovnáním s ostatními programy. This bachelor's thesis focuses on methods for evaluating quality of VoIP calls. You can read about analysis of RTP/RTCP packets and use this know...

  7. Metal-semiconductor phase transition of order arrays of VO2 nanocrystals

    Science.gov (United States)

    Lopez, Rene; Suh, Jae; Feldman, Leonard; Haglund, Richard

    2004-03-01

    The study of solid-state phase transitions at nanometer length scales provides new insights into the effects of material size on the mechanisms of structural transformations. Such research also opens the door to new applications, either because materials properties are modified as a function of particle size, or because the nanoparticles interact with a surrounding matrix material, or with each other. In this paper, we describe the formation of vanadium dioxide nanoparticles in silicon substrates by pulsed laser deposition of ion beam lithographically selected sites and thermal processing. We observe the collective behavior of 50 nm diameter VO2 oblate nanoparticles, 10 nm high, and ordered in square arrays with arbitrary lattice constant. The metal-semiconductor-transition of the VO2 precipitates shows different features in each lattice spacing substrate. The materials are characterized by electron microscopy, x-ray diffraction, Rutherford backscattering. The features of the phase transition are studied via infrared optical spectroscopy. Of particular interest are the enhanced scattering and the surface plasmon resonance when the particles reach the metallic state. This resonance amplifies the optical contrast in the range of near-infrared optical communication wavelengths and it is altered by the particle-particle coupling as in the case of noble metals. In addition the VO2 nanoparticles exhibit sharp transitions with up to 50 K of hysteresis, one of the largest values ever reported for this transition. The optical properties of the VO2 nanoarrays are correlated with the size of the precipitates and their inter-particle distance. Nonlinear and ultra fast optical measurements have shown that the transition is the fastest known solid-solid transformation. The VO2 nanoparticles show the same bulk property, transforming in times shorter than 150 fs. This makes them remarkable candidates for ultrafast optical and electronic switching applications.

  8. Securing the Global Airspace System Via Identity-Based Security

    Science.gov (United States)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  9. Familial aggregation of VO(2max) response to exercise training: results from the HERITAGE Family Study.

    Science.gov (United States)

    Bouchard, C; An, P; Rice, T; Skinner, J S; Wilmore, J H; Gagnon, J; Pérusse, L; Leon, A S; Rao, D C

    1999-09-01

    The aim of this study was to test the hypothesis that individual differences in the response of maximal O(2) uptake (VO(2max)) to a standardized training program are characterized by familial aggregation. A total of 481 sedentary adult Caucasians from 98 two-generation families was exercise trained for 20 wk and was tested for VO(2max) on a cycle ergometer twice before and twice after the training program. The mean increase in VO(2max) reached approximately 400 ml/min, but there was considerable heterogeneity in responsiveness, with some individuals experiencing little or no gain, whereas others gained >1.0 l/min. An ANOVA revealed that there was 2.5 times more variance between families than within families in the VO(2max) response variance. With the use of a model-fitting procedure, the most parsimonious models yielded a maximal heritability estimate of 47% for the VO(2max) response, which was adjusted for age and sex with a maternal transmission of 28% in one of the models. We conclude that the trainability of VO(2max) is highly familial and includes a significant genetic component.

  10. Changepoint detection techniques for VoIP traffic

    NARCIS (Netherlands)

    Mandjes, M.; Zuraniewski, P.W.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  11. Changepoint Detection Techniques for VoIP Traffic

    NARCIS (Netherlands)

    Mandjes, M.; Żuraniewski, P.; Biersack, E.; Callegari, C.; Matijasevic, M.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  12. One–step preparation of CNTs/InVO_4 hollow nanofibers by electrospinning and its photocatalytic performance under visible light

    International Nuclear Information System (INIS)

    , Jinan 250100 (China))" data-affiliation=" (College of Environmental Science and Engineering, Shandong University, No. 27 Shanda South Road, Jinan 250100 (China))" >Zhang, Yanxiang; Ma, Dong; Wu, Juan; , Jinan 250100 (China))" data-affiliation=" (College of Environmental Science and Engineering, Shandong University, No. 27 Shanda South Road, Jinan 250100 (China))" >Zhang, Qingzhe; Xin, Yanjun; , Jinan 250100 (China))" data-affiliation=" (College of Environmental Science and Engineering, Shandong University, No. 27 Shanda South Road, Jinan 250100 (China))" >Bao, Nan

    2015-01-01

    Graphical abstract: - Highlights: • CNTs/InVO_4 hollow nanofibers were obtained by electrospinning method. • The properties of InVO_4 hollow nanofibers were deeply influenced by CNTs. • CNTs could reduce recombination of e"−–h"+ pairs to improve photocatalytic activity. - Abstract: A series of InVO_4 incorporated with multi-wall carbon nanotubes (CNTs) composite nanofibers were successfully synthesized by an electrospinning technique. The as-collected nanofibers were calcined at 550 °C in air to remove polyvinyl pyrrolidone (PVP), which could enable InVO_4 to crystallize. InVO_4 in the composite illustrated a hollow fibrous morphology and orthorhombic phase, and CNTs were embedded or coated on the InVO_4 hollow nanofibers. High-resolution transmission emission microscopy (HRTEM), Fourier transform infrared spectroscopy (FTIR) spectra and X-ray photoelectron spectroscopy (XPS) spectra illustrated that CNTs were existed in the composites. The optical properties measured using UV–Vis diffuse reflectance spectroscopy (DRS) confirmed that the absorbance of InVO_4 nanofibers increased in the visible light region with the incorporation of CNTs. The photocatalytic performance of the samples was investigated by the degradation rhodamine B (Rh B) under visible light irradiation. The CNTs/InVO_4 nanofibers in Rh B degradation displayed a higher photocatalytic activity than pure InVO_4 nanofibers and 10%CNTs/InVO_4 nanoparticles. The degradation showed an optimized photocatalytic oxidation for InVO_4 nanofibers incorporated with 10wt% CNTs. The enhanced photocatalytic activity might be ascribed to the role of CNTs as an electron transporter and acceptor in the composites, which could effectively inhibit the charge recombination and facilitate the charge transfer.

  13. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  14. Secure provision of reactive power ancillary services in competitive electricity markets

    Science.gov (United States)

    El-Samahy, Ismael

    The research work presented in this thesis discusses various complex issues associated with reactive power management and pricing in the context of new operating paradigms in deregulated power systems, proposing appropriate policy solutions. An integrated two-level framework for reactive power management is set forth, which is both suitable for a competitive market and ensures a secure and reliable operation of the associated power system. The framework is generic in nature and can be adopted for any electricity market structure. The proposed hierarchical reactive power market structure comprises two stages: procurement of reactive power resources on a seasonal basis, and real-time reactive power dispatch. The main objective of the proposed framework is to provide appropriate reactive power support from service providers at least cost, while ensuring a secure operation of the power system. The proposed procurement procedure is based on a two-step optimization model. First, the marginal benefits of reactive power supply from each provider, with respect to system security, are obtained by solving a loadability-maximization problem subject to transmission security constraints imposed by voltage and thermal limits. Second, the selected set of generators is determined by solving an optimal power flow (OPF)-based auction. This auction maximizes a societal advantage function comprising generators' offers and their corresponding marginal benefits with respect to system security, and considering all transmission system constraints. The proposed procedure yields the selected set of generators and zonal price components, which would form the basis for seasonal contracts between the system operator and the selected reactive power service providers. The main objective of the proposed reactive power dispatch model is to minimize the total payment burden on the Independent System Operator (ISO), which is associated with reactive power dispatch. The real power generation is

  15. Childhood Sexual Abuse, Adult Psychiatric Morbidity, and Criminal Outcomes in Women Assessed by Medium Secure Forensic Service

    Science.gov (United States)

    Dolan, Mairead; Whitworth, Helen

    2013-01-01

    There is little literature on childhood sexual abuse in women seen by forensic services. A cohort of 225 cases of women seen by forensic services in a medium secure unit in the UK were examined, and childhood sexual abuse and non-childhood sexual abuse cases were compared. Over half the sample had a history of childhood sexual abuse, and 5.6% of…

  16. Surface charge sensing by altering the phase transition in VO2

    Science.gov (United States)

    Kumar, S.; Esfandyarpour, R.; Davis, R.; Nishi, Y.

    2014-08-01

    Detection of surface charges has various applications in medicine, electronics, biotechnology, etc. The source of surface charge induction may range from simple charge-polarized molecules like water to complicated proteins. It was recently discovered that surface charge accumulation can alter the temperature at which VO2 undergoes a Mott transition. Here, we deposited polar molecules onto the surface of two-terminal thin-film VO2 lateral devices and monitored the joule-heating-driven Mott transition, or conductance switching. We observed that the power required to induce the conductance switching reduced upon treatment with polar molecules and, using in-situ blackbody-emission direct measurement of local temperature, we show that this reduction in power was accompanied by reduction in the Mott transition temperature. Further evidence suggested that this effect has specificity to the nature of the species used to induce surface charges. Using x-ray absorption spectroscopy, we also show that there is no detectable change in oxidation state of vanadium or structural phase in the bulk of the 40 nm VO2 thin-film even as the phase transition temperature is reduced by up to 20 K by the polar molecules. The ability to alter the phase transition parameters by depositing polar molecules suggests a potential application in sensing surface charges of different origins and this set of results also highlights interesting aspects of the phase transition in VO2.

  17. A study of artificial speech quality assessors of VoIP calls subject to limited bursty packet losses

    Directory of Open Access Journals (Sweden)

    Jelassi Sofiene

    2011-01-01

    Full Text Available Abstract A revolutionary feature of emerging media services over the Internet is their ability to account for human perception during service delivery processes, which surely increases their popularity and incomes. In such a situation, it is necessary to understand the users' perception, what should obviously be done using standardized subjective experiences. However, it is also important to develop artificial quality assessors that enable to automatically quantify the perceived quality. This efficiently helps performing optimal network and service management at the core and edges of the delivery systems. In our article, we explore the behavior rating of new emerging artificial speech quality assessors of VoIP calls subject to moderately bursty packet loss processes. The examined Speech Quality Assessment (SQA algorithms are able to estimate speech quality of live VoIP calls at run-time using control information extracted from header content of received packets. They are especially designed to be sensitive to packet loss burstiness. The performance evaluation study is performed using a dedicated set-up software-based SQA framework. It offers a specialized packet killer and includes the implementation of four SQA algorithms. A speech quality database, which covers a wide range of bursty packet loss conditions, has been created and then thoroughly analyzed. Our main findings are the following: (1 all examined automatic bursty-loss aware speech quality assessors achieve a satisfactory correlation under upper (> 20% and lower (< 10% ranges of packet loss processes; (2 they exhibit a clear weakness to assess speech quality under a moderated packet loss process; (3 the accuracy of sequence-by-sequence basis of examined SQA algorithms should be addressed in detail for further precision.

  18. Mechanisms of Attenuation of Pulmonary V'O2 Slow Component in Humans after Prolonged Endurance Training.

    Directory of Open Access Journals (Sweden)

    Jerzy A Zoladz

    Full Text Available In this study we have examined the effect of prolonged endurance training program on the pulmonary oxygen uptake (V'O2 kinetics during heavy-intensity cycling-exercise and its impact on maximal cycling and running performance. Twelve healthy, physically active men (mean±SD: age 22.33±1.44 years, V'O2peak 3198±458 mL ∙ min-1 performed an endurance training composed mainly of moderate-intensity cycling, lasting 20 weeks. Training resulted in a decrease (by ~5%, P = 0.027 in V'O2 during prior low-intensity exercise (20 W and in shortening of τp of the V'O2 on-kinetics (30.1±5.9 s vs. 25.4±1.5 s, P = 0.007 during subsequent heavy-intensity cycling. This was accompanied by a decrease of the slow component of V'O2 on-kinetics by 49% (P = 0.001 and a decrease in the end-exercise V'O2 by ~5% (P = 0.005. An increase (P = 0.02 in the vascular endothelial growth factor receptor 2 mRNA level and a tendency (P = 0.06 to higher capillary-to-fiber ratio in the vastus lateralis muscle were found after training (n = 11. No significant effect of training on the V'O2peak was found (P = 0.12. However, the power output reached at the lactate threshold increased by 19% (P = 0.01. The power output obtained at the V'O2peak increased by 14% (P = 0.003 and the time of 1,500-m performance decreased by 5% (P = 0.001. Computer modeling of the skeletal muscle bioenergetic system suggests that the training-induced decrease in the slow component of V'O2 on-kinetics found in the present study is mainly caused by two factors: an intensification of the each-step activation (ESA of oxidative phosphorylation (OXPHOS complexes after training and decrease in the ''additional" ATP usage rising gradually during heavy-intensity exercise.

  19. Mechanisms of Attenuation of Pulmonary V'O2 Slow Component in Humans after Prolonged Endurance Training.

    Science.gov (United States)

    Zoladz, Jerzy A; Majerczak, Joanna; Grassi, Bruno; Szkutnik, Zbigniew; Korostyński, Michał; Gołda, Sławomir; Grandys, Marcin; Jarmuszkiewicz, Wiesława; Kilarski, Wincenty; Karasinski, Janusz; Korzeniewski, Bernard

    2016-01-01

    In this study we have examined the effect of prolonged endurance training program on the pulmonary oxygen uptake (V'O2) kinetics during heavy-intensity cycling-exercise and its impact on maximal cycling and running performance. Twelve healthy, physically active men (mean±SD: age 22.33±1.44 years, V'O2peak 3198±458 mL ∙ min-1) performed an endurance training composed mainly of moderate-intensity cycling, lasting 20 weeks. Training resulted in a decrease (by ~5%, P = 0.027) in V'O2 during prior low-intensity exercise (20 W) and in shortening of τp of the V'O2 on-kinetics (30.1±5.9 s vs. 25.4±1.5 s, P = 0.007) during subsequent heavy-intensity cycling. This was accompanied by a decrease of the slow component of V'O2 on-kinetics by 49% (P = 0.001) and a decrease in the end-exercise V'O2 by ~5% (P = 0.005). An increase (P = 0.02) in the vascular endothelial growth factor receptor 2 mRNA level and a tendency (P = 0.06) to higher capillary-to-fiber ratio in the vastus lateralis muscle were found after training (n = 11). No significant effect of training on the V'O2peak was found (P = 0.12). However, the power output reached at the lactate threshold increased by 19% (P = 0.01). The power output obtained at the V'O2peak increased by 14% (P = 0.003) and the time of 1,500-m performance decreased by 5% (P = 0.001). Computer modeling of the skeletal muscle bioenergetic system suggests that the training-induced decrease in the slow component of V'O2 on-kinetics found in the present study is mainly caused by two factors: an intensification of the each-step activation (ESA) of oxidative phosphorylation (OXPHOS) complexes after training and decrease in the ''additional" ATP usage rising gradually during heavy-intensity exercise.

  20. EVALUATION AND DEVELOPMENT OF THE VO2 OF ATHLETES THAT ATTEND A SOCCER SCHOOL

    Directory of Open Access Journals (Sweden)

    Felipe Bittencourt Oliveira

    2012-11-01

    Full Text Available The goal of this study was to identify the effects from technical and physical activities on the VO2, of male athletes aged 14 to 15, participants of a soccer school, in the municipality of Rio Pardo - RS. The semi-experimental research involved 10 male adolescents. For the VO2 evaluation the 12 minute Cooper test was used. Interval-training work was applied, at which the athletes exercised 75% of their maximum speed, in 60-meter runs. After training for two months (at least two sessions a week the Cooper post-test was applied to check the improvement of the VO2. As results of this study, we can draw the conclusion that all adolescents involved in this training showed considerable improvement in their maximum VO2, especially the 15-year-old teens, who managed to obtain a much higher percentage level.

  1. Enhanced photoelectrochemical response of plasmonic Au embedded BiVO4/Fe2O3 heterojunction.

    Science.gov (United States)

    Verma, Anuradha; Srivastav, Anupam; Khan, Saif A; Rani Satsangi, Vibha; Shrivastav, Rohit; Kumar Avasthi, Devesh; Dass, Sahab

    2017-06-14

    The effect of embedding Au nanoparticles (NPs) in a BiVO 4 /Fe 2 O 3 heterojunction for photoelectrochemical water splitting is studied here for the first time. The present nanostructured heterojunction offers three major advantages over pristine BiVO 4 and Fe 2 O 3 : (i) the formation of a heterojunction between BiVO 4 and Fe 2 O 3 enhances the charge carrier separation and transfer, (ii) the layer of Fe 2 O 3 provides protection to BiVO 4 from photocorrosion and, (iii) the Au NPs possessing surface plasmon resonance (SPR) enhance the photoelectrochemical response by transferring energy to metal oxides by hot electron transfer (HET) and plasmon resonant energy transfer (PRET). The present study reveals that the heterojunction ITO/BiVO 4 /Fe 2 O 3 (with 32% v/v Au solution in both layers) gives the best performance and mitigates the limitations of both pristine Fe 2 O 3 and BiVO 4 . A thirteen-fold increment in applied bias photon-to-current conversion efficiency (ABPE) was observed at 1.24 V vs. RHE under the condition of 1 Sun illumination. Monochromatic incident photon-to-current conversion efficiency (IPCE) measurements indicated that an Au embedded heterojunction is more effective in harvesting visible light in comparison to a heterojunction without Au NPs.

  2. Tuning the work function of VO{sub 2}(1 0 0) surface by Ag adsorption and incorporation: Insights from first-principles calculations

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Lanli; Wang, Xiaofang [School of Materials Science and Engineering, Shanghai University, Shanghai 200444 (China); Shi, Siqi, E-mail: sqshi@shu.edu.cn [School of Materials Science and Engineering, Shanghai University, Shanghai 200444 (China); Materials Genome Institute, Shanghai University, Shanghai 200444 (China); Cui, Yuanyuan [School of Materials Science and Engineering, Shanghai University, Shanghai 200444 (China); Luo, Hongjie [School of Materials Science and Engineering, Shanghai University, Shanghai 200444 (China); Materials Genome Institute, Shanghai University, Shanghai 200444 (China); Gao, Yanfeng, E-mail: yfgao@shu.edu.cn [School of Materials Science and Engineering, Shanghai University, Shanghai 200444 (China)

    2016-03-30

    Graphical abstract: - Highlights: • After adsorption, there is a charge transfer from Ag to VO{sub 2}(1 0 0) surface, which thus increases the electron concentration in VO{sub 2} thin film. • Ag adsorption on VO{sub 2}(1 0 0) surface process is an exothermic chemical process, and the adsorption system is stable. • The work function can be tuned by Ag adsorption on and incorporation into the VO{sub 2}(1 0 0) surface, which in turn regulates the phase transition temperature of VO{sub 2}. - Abstract: VO{sub 2} is an attractive material for application to thermochromic optoelectronic devices such as smart windows, and Ag/VO{sub 2} double-layered structure can effectively decrease the phase transition temperature (T{sub c}) of VO{sub 2} thin film, which is very important for practical application of VO{sub 2}. Previous works has shown that the decrease in phase transition temperature (T{sub c}) seems to be relevant with the work function of VO{sub 2} in Ag/VO{sub 2} double-layered thin film, although the underlying mechanism of tuning its T{sub c} by Ag incorporation and adsorption on the VO{sub 2}(1 0 0) surface has been rarely investigated. Our first-principles calculations reveal that the adsorption of Ag atoms on the VO{sub 2}(1 0 0) surface rather than incorporation of Ag exhibits a lower work function, which is ascribed to an integrated effect of charge transfer from Ag to VO{sub 2}(1 0 0) surface and enhanced surface dipole moment. The results suggest that the decrease in work function of VO{sub 2} with Ag adsorption favors the reduction in T{sub c}. The current findings are helpful to understand the fundamental mechanism for yielding high-efficiency VO{sub 2}-based optoelectronic devices.

  3. Instantaneous band gap collapse in VO{sub 2} caused by photocarrier doping

    Energy Technology Data Exchange (ETDEWEB)

    Herzog, Marc; Wegkamp, Daniel; Wolf, Martin; Staehler, Julia [Fritz-Haber-Institut der MPG, Berlin (Germany); Xian, Lede; Cudazzo, Pierluigi [Univ. del Pais Vasco, San Sebastian (Spain); European Theoretical Spectroscopy Facility (ETSF) (France); Gatti, Matteo [European Theoretical Spectroscopy Facility (ETSF) (France); Ecole Polytechnique, Palaiseau (France); McGahan, Christina L.; Marvel, Robert E.; Haglund, Richard F. [Vanderbilt Univ., Nashville, Tennessee (United States); Rubio, Angel [Fritz-Haber-Institut der MPG, Berlin (Germany); Univ. del Pais Vasco, San Sebastian (Spain); European Theoretical Spectroscopy Facility (ETSF) (France); MPI for the Structure and Dynamics of Matter, Hamburg (Germany)

    2015-07-01

    We have investigated the controversially discussed mechanism of the insulator-to-metal transition (IMT) in VO{sub 2} by means of femtosecond time-resolved photoelectron spectroscopy (trPES). Our data show that photoexcitation transforms insulating monoclinic VO{sub 2} quasi-instantaneously into a metal without an 80 fs structural bottleneck for the photoinduced electronic phase transition. First-principles many-body perturbation theory calculations reveal an ultrahigh sensitivity of the VO{sub 2} band gap to variations of the dynamically screened Coulomb interaction thus supporting the fully electronically driven isostructural IMT indicated by our trPES results. We conclude that the ultrafast band structure renormalization is caused by photoexcitation of carriers from localized V 3d valence states, strongly changing the screening before significant hot-carrier relaxation or ionic motion has occurred.

  4. VO2 thin films synthesis for collaborators and various applications.

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Raegan Lynn [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Clem, Paul G. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2016-11-01

    Vanadium dioxide (VO2) is an attractive material for a variety of applications due to its metal-to-insulator transition (MIT) observed at modest temperatures. This transition takes VO2 from its low temperature insulating monoclinic phase to a high temperature (above 68°C) metallic rutile phase. This transition gives rise to a change in resistivity up to 5 orders of magnitude and a change in complex refractive index (especially at IR wavelengths), which is of interest for radar circuit protection and tunable control of infrared signature. Recently, collaborations have been initiated between CINT scientists and external university programs. The Enhanced Surveillance funds help fund this work which enabled synthesis of VO2 films for several collaborations with internal and external researchers.

  5. The Volcanism Ontology (VO): a model of the volcanic system

    Science.gov (United States)

    Myer, J.; Babaie, H. A.

    2017-12-01

    We have modeled a part of the complex material and process entities and properties of the volcanic system in the Volcanism Ontology (VO) applying several top-level ontologies such as Basic Formal Ontology (BFO), SWEET, and Ontology of Physics for Biology (OPB) within a single framework. The continuant concepts in BFO describe features with instances that persist as wholes through time and have qualities (attributes) that may change (e.g., state, composition, and location). In VO, the continuants include lava, volcanic rock, and volcano. The occurrent concepts in BFO include processes, their temporal boundaries, and the spatio-temporal regions within which they occur. In VO, these include eruption (process), the onset of pyroclastic flow (temporal boundary), and the space and time span of the crystallization of lava in a lava tube (spatio-temporal region). These processes can be of physical (e.g., debris flow, crystallization, injection), atmospheric (e.g., vapor emission, ash particles blocking solar radiation), hydrological (e.g., diffusion of water vapor, hot spring), thermal (e.g., cooling of lava) and other types. The properties (predicates) relate continuants to other continuants, occurrents to continuants, and occurrents to occurrents. The ontology also models other concepts such as laboratory and field procedures by volcanologists, sampling by sensors, and the type of instruments applied in monitoring volcanic activity. When deployed on the web, VO will be used to explicitly and formally annotate data and information collected by volcanologists based on domain knowledge. This will enable the integration of global volcanic data and improve the interoperability of software that deal with such data.

  6. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  7. 76 FR 18490 - Contributions to the Telecommunications Relay Service Fund

    Science.gov (United States)

    2011-04-04

    ... Internet-based customer services or video games that generate revenue, or can the revenues associated with..., application of it to non- interconnected VoIP services will not have any significant negative economic impact... Century Communications and Video Accessibility Act of 2010'' (CVAA) which requires each interconnected...

  8. Hollow-Cuboid Li3VO4/C as High-Performance Anodes for Lithium-Ion Batteries.

    Science.gov (United States)

    Zhang, Changkun; Liu, Chaofeng; Nan, Xihui; Song, Huanqiao; Liu, Yaguang; Zhang, Cuiping; Cao, Guozhong

    2016-01-13

    Li3VO4 has been demonstrated to be a promising anode material for lithium-ion batteries with a low, safe voltage and large capacity. However, its poor electronic conductivity hinders its practical application particularly at a high rate. This work reports that Li3VO4 coated with carbon was synthesized by a one-pot, two-step method with F127 ((PEO)100-(PPO)65-(PEO)100) as both template and carbon source, yielding a microcuboid structure. The resulting Li3VO4/C cuboid shows a stable capacity of 415 mAh g(-1) at 0.5 C and excellent capacity stability at high rates (e.g., 92% capacity retention after 1000 cycles at 10 C = 4 A g(-1)). The lithiation/delithiation process of Li3VO4/C was studied by ex situ X-ray diffraction and Raman spectroscopy, which confirmed that Li3VO4/C underwent a reversible intercalation reaction during discharge/charge processes. The excellent electrochemical performance is attributed largely to the unique microhollow structure. The voids inside hollow structure can not only provide more space to accommodate volume change during discharge/charge processes but also allow the lithium ions insertion and extraction from both outside and inside the hollow structure with a much larger surface area or more reaction sites and shorten the lithium ions diffusion distance, which leads to smaller overpotential and faster reaction kinetics. Carbon derived from F127 through pyrolysis coats Li3VO4 conformably and thus offers good electrical conduction. The results in this work provide convincing evidence that the significant potential of hollow-cuboid Li3VO4/C for high-power batteries.

  9. Visible-light-induced Ag/BiVO4 semiconductor with enhanced photocatalytic and antibacterial performance

    Science.gov (United States)

    Regmi, Chhabilal; Dhakal, Dipesh; Wohn Lee, Soo

    2018-02-01

    An Ag-loaded BiVO4 visible-light-driven photocatalyst was synthesized by the microwave hydrothermal method followed by photodeposition. The photocatalytic performance of the synthesized samples was evaluated on a mixed dye (methylene blue and rhodamine B), as well as bisphenol A in aqueous solution. Similarly, the disinfection activities of synthesized samples towards the Gram-negative Escherichia coli (E. coli) in a model cell were investigated under irradiation with visible light (λ ≥ 420 nm). The synthesized samples have monoclinic scheelite structure. Photocatalytic results showed that all Ag-loaded BiVO4 samples exhibited greater degradation and a higher mineralization rate than the pure BiVO4, probably due to the presence of surface plasmon absorption that arises due to the loading of Ag on the BiVO4 surface. The optimum Ag loading of 5 wt% has the highest photocatalytic performance and greatest stability with pseudo-first-order rate constants of 0.031 min-1 and 0.023 min-1 for the degradation of methylene blue and rhodamine B respectively in a mixture with an equal volume and concentration of each dye. The photocatalytic degradation of bisphenol A reaches 76.2% with 5 wt% Ag-doped BiVO4 within 180 min irradiation time. Similarly, the Ag-loaded BiVO4 could completely inactivate E. coli cells within 30 min under visible light irradiation. The disruption of the cell membrane as well as degradation of protein and DNA exhibited constituted evidence for antibacterial activity towards E. coli. Moreover, the bactericidal mechanisms involved in the photocatalytic disinfection process were systematically investigated.

  10. Gate-tunable gigantic changes in lattice parameters and optical properties in VO2

    Science.gov (United States)

    Nakano, Masaki; Okuyama, Daisuke; Shibuya, Keisuke; Ogawa, Naoki; Hatano, Takafumi; Kawasaki, Masashi; Arima, Taka-Hisa; Iwasa, Yoshihiro; Tokura, Yoshinori

    2014-03-01

    The field-effect transistor provides an electrical switching function of current flowing through a channel surface by external gate voltage (VG). We recently reported that an electric-double-layer transistor (EDLT) based on vanadium dioxide (VO2) enables electrical switching of the metal-insulator phase transition, where the low-temperature insulating state can be completely switched to the metallic state by application of VG. Here we demonstrate that VO2-EDLT enables electrical switching of lattice parameters and optical properties as well as electrical current. We performed in-situ x-ray diffraction and optical transmission spectroscopy measurements, and found that the c-axis length and the infrared transmittance of VO2 can be significantly modulated by more than 1% and 40%, respectively, by application of VG. We emphasize that these distinguished features originate from the electric-field induced bulk phase transition available with VO2-EDLT. This work was supported by the Japan Society for the Promotion of Science (JSPS) through its ``Funding Program for World-Leading Innovative R&D on Science and Technology (FIRST Program).''

  11. Deposition of GdVO4:Eu3+ nanoparticles on silica nanospheres by a simple sol gel method

    Science.gov (United States)

    Liu, Guixia; Hong, Guangyan; Wang, Jinxian; Dong, Xiangting

    2006-07-01

    The deposition and coating of GdVO4:Eu3+ nanoparticles on spherical silica was carried out using a simple sol-gel method at low temperature. The GdVO4:Eu3+-coated silica composites obtained were characterized by differential thermal analysis (DTA), thermogravimetric (TG) analysis, x-ray diffraction (XRD), Fourier-transform IR spectroscopy (FT-IR), transmission electron microscopy (TEM), x-ray photoelectron spectroscopy (XPS), photoluminescence spectra, and kinetic decay. It is found that the ~5 nm GdVO4:Eu3+ nanoparticles coating the silica spheres are crystal in the as-prepared samples and the crystallinity increases with increasing annealing temperature. The composites obtained are spherical in shape with an average size of 100 nm. The GdVO4:Eu3+ nanoparticles are linked with silica cores by a chemical bond. The photoluminescence spectra of the obtained GdVO4:Eu3+-coated silica composites are similar to those of the bulk GdVO4:Eu3+ phosphors. The strongest peak is near 617 nm, which indicates that Eu3+ is located in the low symmetry site with non-inversion centre.

  12. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  13. Mg-doped VO2 nanoparticles: hydrothermal synthesis, enhanced visible transmittance and decreased metal-insulator transition temperature.

    Science.gov (United States)

    Zhou, Jiadong; Gao, Yanfeng; Liu, Xinling; Chen, Zhang; Dai, Lei; Cao, Chuanxiang; Luo, Hongjie; Kanahira, Minoru; Sun, Chao; Yan, Liuming

    2013-05-28

    This paper reports the successful preparation of Mg-doped VO2 nanoparticles via hydrothermal synthesis. The metal-insulator transition temperature (T(c)) decreased by approximately 2 K per at% Mg. The Tc decreased to 54 °C with 7.0 at% dopant. The composite foils made from Mg-doped VO2 particles displayed excellent visible transmittance (up to 54.2%) and solar modulation ability (up to 10.6%). In addition, the absorption edge blue-shifted from 490 nm to 440 nm at a Mg content of 3.8 at%, representing a widened optical band gap from 2.0 eV for pure VO2 to 2.4 eV at 3.8 at% doping. As a result, the colour of the Mg-doped films was modified to increase their brightness and lighten the yellow colour over that of the undoped-VO2 film. A first principle calculation was conducted to understand how dopants affect the optical, Mott phase transition and structural properties of VO2.

  14. Hydrothermal Synthesis of VO2 Polymorphs: Advantages, Challenges and Prospects for the Application of Energy Efficient Smart Windows.

    Science.gov (United States)

    Li, Ming; Magdassi, Shlomo; Gao, Yanfeng; Long, Yi

    2017-09-01

    Vanadium dioxide (VO 2 ) is a widely studied inorganic phase change material, which has a reversible phase transition from semiconducting monoclinic to metallic rutile phase at a critical temperature of τ c ≈ 68 °C. The abrupt decrease of infrared transmittance in the metallic phase makes VO 2 a potential candidate for thermochromic energy efficient windows to cut down building energy consumption. However, there are three long-standing issues that hindered its application in energy efficient windows: high τ c , low luminous transmittance (T lum ), and undesirable solar modulation ability (ΔT sol ). Many approaches, including nano-thermochromism, porous films, biomimetic surface reconstruction, gridded structures, antireflective overcoatings, etc, have been proposed to tackle these issues. The first approach-nano-thermochromism-which is to integrate VO 2 nanoparticles in a transparent matrix, outperforms the rest; while the thermochromic performance is determined by particle size, stoichiometry, and crystallinity. A hydrothermal method is the most common method to fabricate high-quality VO 2 nanoparticles, and has its own advantages of large-scale synthesis and precise phase control of VO 2 . This Review focuses on hydrothermal synthesis, physical properties of VO 2 polymorphs, and their transformation to thermochromic VO 2 (M), and discusses the advantages, challenges, and prospects of VO 2 (M) in energy-efficient smart windows application. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. Effective visible light-active nitrogen and samarium co-doped BiVO4 for the degradation of organic pollutants

    International Nuclear Information System (INIS)

    Wang, Min; Niu, Chao; Liu, Jun; Wang, Qianwu; Yang, Changxiu; Zheng, Haoyan

    2015-01-01

    Nitrogen and samarium co-doped BiVO 4 (N–xSm–BiVO 4 ) nanoparticles were synthesized using a sol–gel method with a corn stem template. The physicochemical properties of the resultant N–xSm–BiVO 4 particles were characterized using various methods: XPS, XRD, SEM, BET, and UV–Vis DRS analyses. The visible-light photocatalytic activity was successfully demonstrated by degrading a model dye, namely, methyl orange. The dopant content was optimized, and the nitrogen and samarium co-doped BiVO 4 extended the light absorption spectrum toward the visible region, significantly enhancing the photodegradation of the model dye. The Sm and N co-doped BiVO 4 exhibited the highest photocatalytic activity compared to materials with a single dopant or no dopant. The significantly enhanced photocatalytic activity of the N–Sm co-doped BiVO 4 under visible-light irradiation can be attributed to the synergistic effects of the nitrogen and samarium. - Highlights: • The N–Sm codoped BiVO 4 were synthesized using a sol–gel method with a corn stem template. • The N and Sm codoped BiVO 4 has excellent photocatalytic activity of methyl orange degradation. • The maximum activity was observed when the molar ratio of Sm/Bi was 1.0. • The high photocatalytic activity was caused by the synergistic effects between N doping and Sm doping

  16. Socio-Economic Correlates of Information Security Threats and Controls in Global Financial Services Industry: An Analysis

    OpenAIRE

    Princely Ifinedo

    2015-01-01

    Threats to data and information assets of Global Financial Services Industry (GFSI) are ever-present; such problems, if not well understood, could lead to huge negative impact. To some extent, the environment where a business operates does matter for its success. This study presents information about the relationships between selected socio-economic factors and information security threats and controls in the financial services industry. Essentially, it seeks to enrich the information provide...

  17. Electronic transport in VO2—Experimentally calibrated Boltzmann transport modeling

    International Nuclear Information System (INIS)

    Kinaci, Alper; Rosenmann, Daniel; Chan, Maria K. Y.; Kado, Motohisa; Ling, Chen; Zhu, Gaohua; Banerjee, Debasish

    2015-01-01

    Materials that undergo metal-insulator transitions (MITs) are under intense study, because the transition is scientifically fascinating and technologically promising for various applications. Among these materials, VO 2 has served as a prototype due to its favorable transition temperature. While the physical underpinnings of the transition have been heavily investigated experimentally and computationally, quantitative modeling of electronic transport in the two phases has yet to be undertaken. In this work, we establish a density-functional-theory (DFT)-based approach with Hubbard U correction (DFT + U) to model electronic transport properties in VO 2 in the semiconducting and metallic regimes, focusing on band transport using the Boltzmann transport equations. We synthesized high quality VO 2 films and measured the transport quantities across the transition, in order to calibrate the free parameters in the model. We find that the experimental calibration of the Hubbard correction term can efficiently and adequately model the metallic and semiconducting phases, allowing for further computational design of MIT materials for desirable transport properties

  18. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    Pennsylvania Emergency Management Agency QHSR Quadrennial Homeland Security Review Report RCP Regional Catastrophic Preparedness SAA State...service has evolved from a single-purpose service focused on controlling fires to a multidimensional response element responsible for pre- hospital ... hospital preparedness program Preparedness Training for all personnel; training and network activities during prior year assist in preparedness

  19. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  20. Comprehensive picture of VO2 from band theory

    KAUST Repository

    Zhu, Zhiyong; Schwingenschlö gl, Udo

    2012-01-01

    The structural, electronic, and magnetic features of the metal-insulator transition from the tetragonal rutile (R) to the monoclinic (M1) phase of VO2 are well reproduced by band theory using the modified Becke-Johnson exchange potential. Based

  1. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  2. 20 CFR 410.686b - Fee for services performed for an individual before the Social Security Administration.

    Science.gov (United States)

    2010-04-01

    ... Representation of Parties § 410.686b Fee for services performed for an individual before the Social Security... person or in writing; (ii) There was a death or serious illness in the individual's family; (iii...

  3. Legitimizing Security in the Ivory Tower: Canadian University Corporate Security Services' Public Quest for Legitimacy.

    Science.gov (United States)

    Wilkinson, Blair

    2016-05-01

    This article examines how university corporate security (UCS) services engage in legitimation work in their attempts to make their university communities (i.e., faculty, staff, students) and political masters (i.e., university administrators, boards of governors, senators) believe that they are honest, trustworthy, and caring and have authority that should be deferred to. This is accomplished through the analysis of interview and observational data collected as part of a research project exploring UCS services at five Canadian universities and an examination of how UCS services at 14 Canadian universities communicate using the social media service Twitter. These UCS services were found to primarily use Twitter for the purposes of soliciting or requesting information and for networking. In communicating through Twitter, UCS services engage in public legitimation work in which they make claims about and attempt to demonstrate their expertise, authority, and accountability. This article argues that both UCS services' particular legitimacy problem (i.e., their possession of both private and public attributes) and the interactive nature of public legitimation work create tensions that may serve to disrupt UCS services' ability to attain legitimacy. Cet article examine la manière dont les services de sécurité d'entreprise à l'université (SEU) s'engagent à légitimer leurs tentatives de persuader leurs communautés universitaires (c'est-à-dire le corps professoral, le personnel et les étudiants) ainsi que la haute administration (c'est-à-dire les administrateurs de l'université, le conseil des gouverneurs et les sénateurs) qu'ils sont honnêtes, attentifs, dignes de confiance, et qu'ils possèdent un niveau d'autorité auquel quiconque devrait se référer. Ceci sera accompli en analysant un corpus d'entrevues et d'observations dans le cadre d'un projet de recherche examinant les services de type SEU dans cinq universités canadiennes, ainsi qu'une étude sur

  4. The acidic transformed nano-VO2 causes macrophage cell death by the induction of lysosomal membrane permeabilization and Ca2+ efflux

    Directory of Open Access Journals (Sweden)

    Shaohai Xu

    2015-01-01

    Full Text Available Because of its outstanding thermochromic characteristics and metal-insulator transition (MIT property, nano-vanadium dioxide (abbreviated as nano-VO2 or nVO2 has been applied widely in electrical/optical devices and design of intelligent window. However, the biological effect of nVO2 is not well understood, especially when affected by environmental factors or living organisms. For VO2 is an amphoteric oxide, we simulated pH's influence to nVO2’s physicochemical properties by exposure nVO2 in water of different pH values. We found that nVO2 transformed to a new product after exposure in acidic water for two weeks, as revealed by physicochemical characterization such as SEM, TEM, XRD, and DLS. This transformation product formed in acidic water was referred as (acidic transformed nVO2. Both pristine/untransformed and transformed nVO2 displayed no obvious toxicity to common epithelial cells; however, the acidic transformed nVO2 rapidly induced macrophage cell death. Further investigation demonstrated that transformed nVO2 caused macrophage apoptosis by the induction of Ca2+ efflux and the following mitochondrial membrane permeabilization (MMP process. And a more detailed time course study indicated that transformed nVO2 caused lysosomal membrane permeabilization (LMP at the earlier stage, indicating LMP could be chosen as an earlier and sensitive end point for nanotoxicological study. We conclude that although nVO2 displays no acute toxicity, its acidic transformation product induces macrophage apoptosis by the induction of LMP and Ca2+ efflux. This report suggests that the interplay with environmental factors or living organisms can results in physicochemical transformation of nanomaterials and the ensuing distinctive biological effects.

  5. Monoclinic BiVO4 micro-/nanostructures: Microwave and ultrasonic wave combined synthesis and their visible-light photocatalytic activities

    International Nuclear Information System (INIS)

    Zhang, Yafang; Li, Guangfang; Yang, Xiaohui; Yang, Hao; Lu, Zhong; Chen, Rong

    2013-01-01

    Graphical abstract: Monoclinic BiVO 4 with different sizes and morphologies were synthesized by a facile microwave and ultrasonic wave combined technique for the first time and exhibited different optical properties and visible-light-driven photocatalytic efficiency. Highlights: ► BiVO 4 nanostructures were prepared by microwave and ultrasonic wave combined method. ► BiVO 4 nanostructures could be modulated by varying the solvent and pH value. ► Different BiVO 4 nanostructures exhibited different photocatalytic activities. ► The photocatalytic performance was influenced by the band gap, phase and size. - Abstract: Monoclinic bismuth vanadate (m-BiVO 4 ) micro-/nanostructures with different sizes and morphologies were successfully prepared via a facile and rapid microwave and ultrasonic wave combined technique. The obtained BiVO 4 products were characterized by powder X-ray diffraction (XRD), scanning electron microscopy (SEM), energy dispersive X-ray spectroscopy (EDX), transmission electron microscopy (TEM) and UV–vis diffuse reflection spectroscopy (DRS). It was found that the solvent and pH value had a significant influence on morphology, size and crystalline structure of the product. Nut-like, potato-like and broccoli-like monoclinic BiVO 4 were fabricated in different solvents. The crystal phase could be modulated by varying the pH value of reaction system. The photocatalytic activities of the products were also evaluated by the degradation of Rhodamine B (RhB) under visible light irradiation. The result revealed that the photocatalytic activities of BiVO 4 nanostructures were closely related to the crystalline phase, band gap and particle size. Monoclinic BiVO 4 nanoparticles with small crystal size and large band gap exhibited remarkable photocatalytic performance.

  6. Enhanced red emission of LaVO{sub 4}:Eu{sup 3+} phosphors by Li-doping

    Energy Technology Data Exchange (ETDEWEB)

    Park, Sung Wook; Yang, Hyun Kyoung; Chung, Jong Won; Moon, Byung Kee; Choi, Byung Chun; Jeong, Jung Hyun [Pukyoung National University, Busan (Korea, Republic of); Jang, Ki Wan; Lee, Ho Sueb [Changwon National University, Changwon (Korea, Republic of); Yi, Soung Soo [Silla University, Busan (Korea, Republic of)

    2010-12-15

    LaVO{sub 4} phosphors were synthesized by using a solid state reaction, and were characterized by using X-ray diffraction (XRD), scanning electron microscopy (SEM) and photoluminescence (PL). The XRD patterns of the Li-doped LaVO{sub 4}:Eu{sup 3+} powder phosphors revealed a mixture of tetragonal and monoclinic phases. The tetragonal phase of the LaVO{sub 4}:Eu{sup 3+} phosphor showed a higher PL intensity than the monoclinic one, despite the presence of both monoclinic and tetragonal structures. The Li-doped LaVO{sub 4}:Eu{sup 3+} powder phosphors absorbed strongly at 396 nm and exhibited strong red emission at approximately 619.5 nm due to the {sup 5}D{sub 0} {yields} {sup 7}F{sub 2} transition. The incorporation of Li{sup +} ions into the LaVO{sub 4}:Eu{sup 3+} powder can lead to a remarkable increase in photoluminescence. The enhanced luminescence is attributed to the incorporation of Li{sup +} ions that may act as a sensitizers for effective energy transfer. This phosphor has promising applications in near-UV light-emitting diodes(LEDs).

  7. Enhanced photoelectrochemical and photocatalytic activity in visible-light-driven Ag/BiVO_4 inverse opals

    International Nuclear Information System (INIS)

    Fang, Liang; Nan, Feng; Yang, Ying; Cao, Dawei

    2016-01-01

    BiVO_4 photonic crystal inverse opals (io-BiVO_4) with highly dispersed Ag nanoparticles (NPs) were prepared by the nanosphere lithography method combining the pulsed current deposition method. The incorporation of the Ag NPs can significantly improve the photoelectrochemical and photocatalytic activity of BiVO_4 inverse opals in the visible light region. The photocurrent density of the Ag/io-BiVO_4 sample is 4.7 times higher than that of the disordered sample without the Ag NPs, while the enhancement factor of the corresponding kinetic constant in photocatalytic experiment is approximately 3. The improved photoelectrochemical and photocatalytic activity is benefited from two reasons: one is the enhanced light harvesting owing to the coupling between the slow light and localized surface plasmon resonance effect; the other is the efficient separation of charge carriers due to the Schottky barriers.

  8. Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT

    Directory of Open Access Journals (Sweden)

    Zahid Mahmood

    2017-10-01

    Full Text Available Internet-of-Things (IoT include a large number of devices that can communicate across different networks. Cyber-Physical Systems (CPS also includes a number of devices connected to the internet where wearable devices are also included. Both systems enable researchers to develop healthcare systems with additional intelligence as well as prediction capabilities both for lifestyle and in hospitals. It offers as much persistence as a platform to ubiquitous healthcare by using wearable sensors to transfer the information over servers, smartphones, and other smart devices in the Telecare Medical Information System (TMIS. Security is a challenging issue in TMIS, and resourceful access to health care services requires user verification and confidentiality. Existing schemes lack in ensuring reliable prescription safety along with authentication. This research presents a Secure Authentication and Prescription Safety (SAPS protocol to ensure secure communication between the patient, doctor/nurse, and the trusted server. The proposed procedure relies upon the efficient elliptic curve cryptosystem which can generate a symmetric secure key to ensure secure data exchange between patients and physicians after successful authentication of participants individually. A trusted server is involved for mutual authentication between parties and then generates a common key after completing the validation process. Moreover, the scheme is verified by doing formal modeling using Rubin Logic and validated using simulations in NS-2.35. We have analyzed the SAPS against security attacks, and then performance analysis is elucidated. Results prove the dominance of SAPS over preliminaries regarding mutual authentication, message integrity, freshness, and session key management and attack prevention.

  9. Efficient photocatalytic degradation of ibuprofen in aqueous solution using novel visible-light responsive graphene quantum dot/AgVO{sub 3} nanoribbons

    Energy Technology Data Exchange (ETDEWEB)

    Lei, Zhen-dong [Department of Physics, Tsinghua University, Beijing 100084 (China); Wang, Jia-jun [Shanghai Institute of Applied Radiation, Shanghai University, Shanghai 200444 (China); Wang, Liang, E-mail: wangl@shu.edu.cn [Institute of Nanochemistry and Nanobiology, Shanghai University, Shanghai 200444 (China); Yang, Xiong-yu; Xu, Gang [Shanghai Institute of Applied Radiation, Shanghai University, Shanghai 200444 (China); Tang, Liang, E-mail: tang1liang@shu.edu.cn [Shanghai Institute of Applied Radiation, Shanghai University, Shanghai 200444 (China)

    2016-07-15

    Highlights: • A novel heterojunction photocatalyst, GQD/AgVO{sub 3} was prepared. • The morphology of GQD/AgVO{sub 3} was well characterized. • Ibuprofen was easily decomposed using GQD/AgVO{sub 3} under visible-light irradiation. • The degradation pathway of ibuprofen was also suggested. - Abstract: Single crystalline, non-toxicity, and long-term stability graphene quantum dots (GQDs) were modified onto the AgVO{sub 3} nanoribbons by a facile hydrothermal and sintering technique which constructs a unique heterojunction photocatalyst. Characterization results indicate that GQDs are well dispersed on the surface of AgVO{sub 3} nanoribbons and GQD/AgVO{sub 3} heterojunctions are formed, which can greatly promote the separation efficiency of photogenerated electron-hole pairs under visible light irradiation. By taking advantage of this feature, the GQD/AgVO{sub 3} heterojunctions exhibit considerable improvement on the photocatalytic activities for the degradation of ibuprofen (IBP) under visible light irradiation as compared to pure AgVO{sub 3}. The photocatalytic activity of GQD/AgVO{sub 3} heterojunctions is relevant with GQD ratio and the optimal activity is obtained at 3 wt% with the highest separation efficiency of photogenerated electron-hole pairs. Integrating the physicochemical and photocatalytic properties, the factors controlling the photocatalytic activity of GQD/AgVO{sub 3} heterojunctions are discussed in detail. Moreover, potential photocatalytic degradation mechanisms of IBP via GQD/AgVO{sub 3} heterojunctions under visible light are proposed.

  10. Economic foundation and importance of non-state security sector within the national security system

    Directory of Open Access Journals (Sweden)

    Anđelković Slobodan

    2016-01-01

    Full Text Available The main purpose of this paper was to present the causes (for, role (played by and the growing importance of the non-state actors within the national security sector, while analyzing the economic interest of individuals, organizations and the state itself that were favoring such a development. In the course of our research we established how, as the state narrowed its activities down to more vital and more dangerous fields of work, this opened up space for independent contractors to enter those fields which carried less systemic risk. Such change was made possible in the post-Cold War context, when many of the former service members were hired by private companies. The economic motive had a role to play as well, given the need for additional security going beyond what state offered to its citizens, as many doubted the ability (efficiency of state to provide it in the first place; and private sector's willingness to provide it for a price. In Serbia, position of non-state security sector is still very much limited by the traditional notion of security as well as the division of competences, both left-overs from socialist times. This goes against positive tendencies within the sector itself (improvement of types and specialization of the security as service; strengthening of legal regulation; flexibility of services being offered. By conducting its basic service and improving the security of its clients, representatives of non-state security sector are - indirectly - improving the security of society as a whole, ensuring economic stability, which presents one of key national interests.

  11. Metal-insulator transition in nanocomposite VO{sub x} films formed by anodic electrodeposition

    Energy Technology Data Exchange (ETDEWEB)

    Tsui, Lok-kun; Lu, Jiwei; Zangari, Giovanni, E-mail: gz3e@virginia.edu [Department of Materials Science and Engineering, University of Virginia, 395 McCormick Rd., Charlottesville, Virginia 22904 (United States); Hildebrand, Helga; Schmuki, Patrik [Department for Materials Science LKO, University of Erlangen-Nuremberg, Martensstr. 7, D-91058 Erlangen (Germany)

    2013-11-11

    The ability to grow VO{sub 2} films by electrochemical methods would open a low-cost, easily scalable production route to a number of electronic devices. We have synthesized VO{sub x} films by anodic electrodeposition of V{sub 2}O{sub 5}, followed by partial reduction by annealing in Ar. The resulting films are heterogeneous, consisting of various metallic/oxide phases and including regions with VO{sub 2} stoichiometry. A gradual metal insulator transition with a nearly two order of magnitude change in film resistance is observed between room temperature and 140 °C. In addition, the films exhibit a temperature coefficient of resistance of ∼ −2.4%/ °C from 20 to 140 °C.

  12. Relation of oxygen uptake to work rate in prepubertal healthy children - reference for VO2/W-slope and effect on cardiorespiratory fitness assessment.

    Science.gov (United States)

    Tompuri, Tuomo; Lintu, Niina; Laitinen, Tomi; Lakka, Timo A

    2017-08-09

    Exercise testing by cycle ergometer allows to observe the interaction between oxygen uptake (VO 2 ) and workload (W), and VO 2 /W-slope can be used as a diagnostic tool. Respectively, peak oxygen uptake (VO 2 PEAK ) can be estimated by maximal workload. We aim to determine reference for VO 2 /W-slope among prepubertal children and define agreement between estimated and measured VO 2 PEAK . A total of 38 prepubertal children (20 girls) performed a maximal cycle ergometer test with respiratory gas analysis. VO 2 /W-slopes were computed using linear regression. Agreement analysis by Bland and Altman for estimated and measured VO 2 PEAK was carried out including limits of agreement (LA). Determinants for VO 2 /W-slopes and estimation bias were defined. VO2/W-slope was in both girls and boys ≥9·4 and did not change with exercise level, but the oxygen cost of exercise was higher among physically more active children. Estimated VO 2 PEAK had 6·4% coefficient of variation, and LA varied from 13% underestimation to 13% overestimation. Bias had a trend towards underestimation along lean mass proportional VO 2 PEAK . The primary determinant for estimation bias was VO2/W-slope (β = -0·65; PW-slope among healthy prepubertal children were similar to those published for adults and among adolescents. Estimated and measured VO 2 PEAK should not be considered to be interchangeable because of the variation in the relationship between VO 2 and W. On other hand, variation in the relationship between VO 2 and W enables that VO 2 /W-slope can be used as a diagnostic tool. © 2017 Scandinavian Society of Clinical Physiology and Nuclear Medicine. Published by John Wiley & Sons Ltd.

  13. To the Question of Information Security and Providing State and Municipal Services by Means of the Internet

    Directory of Open Access Journals (Sweden)

    Alexander A. Galushkin

    2015-09-01

    Full Text Available In the present article author investigates interconnected questions of information security and providing state and municipal services by means of the global information Internet. Author analyzes opinions of the number of leading Russian and foreign experts and scientists. In the summary author draws a conclusion that implementation of rules of law answering to modern realities and also fruitful work of law enforcement and supervisory authorities regarding law application practice improvement is necessary for information security and human rights protection.

  14. PENGEMBANGAN PERSAMAAN VO2 MAX DAN EVALUASI HR MAX (STUDI AWAL PADA PEKERJA PRIA

    Directory of Open Access Journals (Sweden)

    Purnawan Adi Wicaksono

    2012-10-01

    Full Text Available Kapasitas fisik maksimum seseorang direpresentasikan dengan nilai konsumsi oksigen maksimum (VO2 Max dan denyut nadi maksimum (HR Max yang memberikan suatu informasi batasan kemampuan fisik maksimum seseorang dalam melakukan pekerjaan. Penelitian kali ini mempunyai tujuan untuk mencari nilai VO2 Max pekerja pria Indonesia untuk nantinya akan dikembangkan suatu persamaan prediksi VO2 Max yang didekati dengan hubungan linier antara denyut nadi (Heart Rate seperti yang dilakukan Astrand (2003, tinggi badan (Chatterjee et al, 2006, berat badan (Akalan et al, 2008, usia (Magrani et al, 2009 dan mengevaluasi persamaan HR Max manakah yang dapat diaplikasikan untuk mendekati nilai denyut nadi maksimum pekerja Indonesia. Responden dalam penelitian kali ini adalah 12  pekerja industri pria yang diambil dari beberapa industri di Depok dan sekitarnya. Kriteria responden yang berpartisipasi dalam penelitian kali ini adalah: berusia 20-40 tahun, bukan perokok baik aktif maupun pasif, sehat , tidak mengkonsumsi makanan, kafein, alkohol minimal 2 jam sebelum eksperimen (Balderrama et. al, 2007.Eksperimen yang dilakukan menggunakan metode maximal test dengan protokol treadmill. Adapun peralatan yang digunakan adalah seperangkat alat pengukur kondisi fisiologi Fitmate MED (COSMED srl-Italy terdiri dari Heart Rate Transmitter, Heart Rate Receiver, V mask (Hans Rudolph Inc,dan treadmill SportArt@60.  Eksperimen dilakukan menjadi dua bagian, yaitu istirahat dan tahap bekerja.Aktivitas istirahat terdiri dari tidur selama 20 menit, duduk selama 20 menit dan berdiri selama 10 menit. Eksperimen tahap kedua yaitu tahap kerja yang terdiri dari latihan selama 5 menit. Responden dipersilakan beristirahat selama 15 menit, setelah itu responden melaksanakan maximal test detik hingga responden merasa tidak sanggup lagi melanjutkan eksperimen. Hasil penelitian model prediksi VO2 max untuk pekerja industri pria mempunyai nilai 2,78 ± 0,5 liter/menit dan dengan regresi linier

  15. Investigation of the physical, optical, and photocatalytic properties of CeO2/Fe-doped InVO4 composite

    Science.gov (United States)

    Chaison, Jindaporn; Wetchakun, Khatcharin; Wetchakun, Natda

    2017-12-01

    The CeO2/Fe-doped InVO4 composites with various Fe concentrations (0.5, 1.0, 2.0, 5.0 and 6.0 mol%) was synthesized by homogeneous precipitation and hydrothermal methods. The as-synthesized samples were characterized by powder X-ray diffraction (XRD), Brunauer Emmett and Teller (BET)-specific surface area, field emission scanning electron microscopy (FE-SEM), transmission electron microscopy (TEM), energy-dispersive X-ray spectroscopy (EDS), X-ray photoelectron spectroscopy (XPS), and UV-visible diffuse reflectance spectroscopy (DRS). Fe-doping into InVO4 crystal induces the distortion of the crystalline structure, the transformation of InVO4 morphology, and the new energy subband level generation of Fe between the CB and VB edge of InVO4. The electron excitation from the VB to Fe orbitals results in the decreased band gap and the extended absorption of visible-light, and thus enhances its photocatalytic performance. Visible-light-driven photocatalytic degradation of Rhodamine B (RhB) dye in water was used to evaluate the photocatalytic performance of CeO2/Fe-doped InVO4 composites. The results revealed that there is an optimum Fe (5.0 mol %) doping level. The composite with the optimum doping level obtains high photocatalytic activity of CeO2/Fe-doped InVO4 composite compared to pure CeO2 and pure InVO4 host. The increase of photocatalytic activity of CeO2/Fe-doped InVO4 composite was ascribed to the surface area, crystal defect, and band gap energy. Moreover, the photocatalytic enhancement is also because iron ions act as a trapping site, which results in the higher separation efficiency of photogenerated electrons and holes pairs in the CeO2/InVO4 composite. The evaluation of radical scavengers confirmed that hydroxyl radical was the main active species during the photodegradation of RhB. These synergistic effects are responsible for the enhanced photocatalytic activity of CeO2/Fe-doped InVO4 composite. Furthermore, the possible enhanced photocatalytic mechanism

  16. The CAMI Project - Weather and Climate Services for Caribbean Food Security

    Science.gov (United States)

    Trotman, Adrian; Van Meerbeeck, Cedric

    2013-04-01

    Food security is major focus of Caribbean governments, with production being of particular concern. For the past three decades, Caribbean agriculture has been declining in relative importance, both in terms of its contribution to GDP and its share of the labour force. One of the problems Caribbean agriculture faces is the destructive impacts from weather and climate extremes. These include flood, drought, extreme temperatures, and strong winds from tropical cyclones. Other potential disasters, such as from pests and diseases attacks, are also weather and climate driven. These make weather and climate information critically important to decision-making in agriculture in the Caribbean region. In an effort to help reduce weather and climate related risks to the food security sector, The Caribbean Institute for Meteorology and Hydrology, along with its partners the Caribbean Agricultural Research and Development Institute, the World Meteorological Organization (WMO) and ten National Meteorological Services from within the Caribbean Community launched and implemented the Caribbean Agrometeorological Initiative (CAMI). From 2010 to 2013, CAMI set out to provide relevant information to farmers, and the industry in general, for decision and policy making. The project is funded by the European Union through the Science and Technology Programme of the African, Caribbean and Pacific Group of Countries' (ACP). The overarching objective of CAMI was to increase and sustain agricultural productivity at the farm level in the Caribbean region through improved applications of weather and climate information, using an integrated and coordinated approach. Currently, this is done through (i) provision of relevant climate information appropriately disseminated, (ii) predictions on seasonal rainfall and temperature, (iii) support for improved irrigation management, (iv) the development of strategically selected weather-driven pest and disease models, (v) use of crop simulation models

  17. SnO2@C@VO2 Composite Hollow Nanospheres as an Anode Material for Lithium-Ion Batteries.

    Science.gov (United States)

    Guo, Wenbin; Wang, Yong; Li, Qingyuan; Wang, Dongxia; Zhang, Fanchao; Yang, Yiqing; Yu, Yang

    2018-05-02

    Porous SnO 2 @C@VO 2 composite hollow nanospheres were ingeniously constructed through the combination of layer-by-layer deposition and redox reaction. Moreover, to optimize the electrochemical properties, SnO 2 @C@VO 2 composite hollow nanospheres with different contents of the external VO 2 were also studied. On the one hand, the elastic and conductive carbon as interlayer in the SnO 2 @C@VO 2 composite can not only buffer the huge volume variation during repetitive cycling but also effectively improve electronic conductivity and enhance the utilizing rate of SnO 2 and VO 2 with high theoretical capacity. On the other hand, hollow nanostructures of the composite can be consolidated by the multilayered nanocomponents, resulting in outstanding cyclic stability. In virtue of the above synergetic contribution from individual components, SnO 2 @C@VO 2 composite hollow nanospheres exhibit a large initial discharge capacity (1305.6 mAhg -1 ) and outstanding cyclic stability (765.1 mAhg -1 after 100 cycles). This design of composite hollow nanospheres may be extended to the synthesis of other nanomaterials for electrochemical energy storage.

  18. Morphological effect of BiVO4 catalysts on degradation of aqueous paracetamol under visible light irradiation.

    Science.gov (United States)

    Hu, Changying; Xu, Jie; Zhu, Yaqi; Chen, Acong; Bian, Zhaoyong; Wang, Hui

    2016-09-01

    Morphological effect of bismuth vanadate (BiVO4) on visible light-driven catalytic degradation of aqueous paracetamol was carefully investigated using four monoclinic BiVO4 catalysts. The catalysts with different morphologies were controllably prepared by a hydrothermal method without any additions. The prepared catalysts were fully characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), and UV-Vis diffuse reflectance spectroscopy (DRS). Under the visible light irradiation, these catalysts with different morphology were investigated to degrade aqueous paracetamol contaminant. The degradation effects were evaluated based on the catalyst morphology, solution pH, initial paracetamol concentration, and catalyst dosage. Cube-like BiVO4 powders exhibited excellent photocatalytic performance. The optimal photocatalytic performance of the cube-like BiVO4 in degrading paracetamol was achieved.

  19. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-06-01

    Full Text Available Substantial changes have occurred in the Information Technology (IT sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  20. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  1. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  2. Gate voltage controlled humidity sensing using MOSFET of VO2 particles

    CSIR Research Space (South Africa)

    Akande, Amos A

    2017-01-01

    Full Text Available (A), VO2 (AH) [4], [5] and M2 the intermediate phase between M1 and R phase. These phases have been generally useful in technologies such as thermal switch (thermochromic window), thermal/infrared sensors, A.A Akande holds PhD studentship...) is 272.1, A1 and A2 are respectively 0.118 and 12096 with a correlation coefficient, R2, of 0.925. These results suggest that the VO2 sensor is very resilient to humidity such that it does not saturate even when humidity approaches 100%. This sensor...

  3. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, Johan; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the

  4. VO-compliant libraries of high resolution spectra of cool stars

    Science.gov (United States)

    Montes, D.

    2008-10-01

    In this contribution we describe a Virtual Observatory (VO) compliant version of the libraries of high resolution spectra of cool stars described by Montes et al. (1997; 1998; and 1999). Since their publication the fully reduced spectra in FITS format have been available via ftp and in the World Wide Web. However, in the VO all the spectra will be accessible using a common web interface following the standards of the International Virtual Observatory Alliance (IVOA). These libraries include F, G, K and M field stars, from dwarfs to giants. The spectral coverage is from 3800 to 10000 Å, with spectral resolution ranging from 0.09 to 3.0 Å.

  5. Pengaruh metode latihan dan daya tahan otot tungkai terhadap hasil peningkatan kapasitas VO2Max pemain bola basket

    Directory of Open Access Journals (Sweden)

    Gregorius Pito Wahyu Prakoso

    2017-09-01

    Abstract This study aims to determine: (1 differences in the influence of methods of circuit training and interval method of training on the increase in capacity VO2Max basketball (2 the difference of increase in capacity VO2Max basketball resilient tall limb muscle and muscular endurance leg lower the increase in capacity VO2Max basketball, and (3 the interaction between exercise and limb muscle endurance against the increase in capacity VO2Max basketball. This research method used experiments with 2 x 2 factorial design study. The research sample of 20 children trained were taken with purposive sampling technique. Data were analyzed using analysis of variants (ANOVA. The results of this study indicate that: (1 there is no significant difference between exercise training method circuit training and training methods interval training against the increase in capacity VO2Max basketball, (2 There are no significant differences in increase in capacity VO2Max basketball among students who have the endurance of leg muscle and durability of  low leg muscle, (3 there is no interaction between the method of training (circuit training and interval training and leg muscle endurance against the increase in capacity VO2Max basketball.

  6. Synthesis and supercapacitor electrode of VO{sub 2}(B)/C core–shell composites with a pseudocapacitance in aqueous solution

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Yifu, E-mail: yfzhang@dlut.edu.cn; Zheng, Jiqi; Hu, Tao; Tian, Fuping; Meng, Changgong

    2016-05-15

    Highlights: • A facile one-pot hydrothermal method was used to synthesize VO{sub 2}(B)/C core–shell composites. • VO{sub 2}(B)/C composites consisted of the crystal VO{sub 2}(B) phase and the amorphous carbon phase. • The supercapacitor property of VO{sub 2}(B)/C composites was improved by this novel structure. - Abstract: VO{sub 2}(B)/C core–shell composites were successfully prepared using commercial V{sub 2}O{sub 5}, glucose and water as the starting materials by a facile one-pot hydrothermal method. The composition of the products was characterized by the techniques including X-ray powder diffraction, infrared spectroscopy, Raman, energy-dispersive X-ray spectrometer and elemental analysis. The morphology of the products was observed by scanning electron microscopy and transmission electron microscopy tests. The results showed the products consisted of the crystal VO{sub 2}(B) phase and the amorphous carbon phase. The amorphous carbon contained lots of organic groups, such as −OH, C−H, C=O and C=C, etc., which suggested that the carbon here was organic carbon. The morphology of the as-obtained VO{sub 2}(B)/C composites was well-defined nanobelts, and each VO{sub 2}(B) core was encapsulated into carbon. Furthermore, the electrochemical properties of VO{sub 2}(B)/C core–shell composites were investigated by cyclic voltammetry and galvanostatic charge–discharge. The results showed the measured capacitance of VO{sub 2}(B)/C composites was mainly based on the pseudocapacitance. VO{sub 2}(B)/C composites displayed the specific capacitance of 203, 190, 182, 173, 164, and 147 F g{sup −1} at the current density of 0.2, 0.5, 1, 5, 10 and 20 A g{sup −1}, respectively. They also showed an excellent energy density of 198.9 W h kg{sup −1} at a power density of 504.5 W kg{sup −1} and a rapidly reversible redox Faraday response.

  7. Physiological background of the change point in VO2 and the slow component of oxygen uptake kinetics.

    Science.gov (United States)

    Zoładź, J A; Korzeniewski, B

    2001-06-01

    It is generally believed that oxygen uptake during incremental exercise--until VO2max, increases linearly with power output (see eg. Astrand & Rodahl, 1986). On the other hand, it is well established that the oxygen uptake reaches a steady state only during a low power output exercise, but during a high power output exercise, performed above the lactate threshold (LT), the oxygen uptake shows a continuous increase until the end of the exercise. This effect has been called the slow component of VO2 kinetics (Whipp & Wasserman, 1972). The presence of a slow component in VO2 kinetics implies that during an incremental exercise test, after the LT has been exceeded, the VO2 to power output relationship has to become curvilinear. Indeed, it has recently been shown that during the incremental exercise, the exceeding of the power output, at which blood lactate begins to accumulate (LT), causes a non-proportional increase in VO2 (Zoladz et al. 1995) which indicates a drop in muscle mechanical efficiency. The power output at which VO2 starts to rise non-proportionally to the power output has been called "the change point in VO2" (Zoladz et al. 1998). In this paper, the significance of the factors most likely involved in the physiological mechanism responsible for the change point in oxygen uptake (CP-VO2) and for the slow component of VO2 kinetics, including: increase of activation of additional muscle groups, intensification of the respiratory muscle activity, recruitment of type II muscle fibres, increase of muscle temperature, increase of the basal metabolic rate, lactate and hydrogen ion accumulation, proton leak through the inner mitochondrial membrane, slipping of the ATP synthase and a decrease in the cytosolic phosphorylation potential, are discussed. Finally, an original own model describing the sequence of events leading to the non-proportional increase of oxygen cost of work at a high exercise intensity is presented.

  8. Social climate along the pathway of care in women's secure mental health service: variation with level of security, patient motivation, therapeutic alliance and level of disturbance.

    Science.gov (United States)

    Long, C G; Anagnostakis, K; Fox, E; Silaule, P; Somers, J; West, R; Webster, A

    2011-07-01

    Social climate has been measured in a variety of therapeutic settings, but there is little information about it in secure mental health services, or how it may vary along a gender specific care pathway. To assess social climate in women's secure wards and its variation by level of security and ward type, therapeutic alliance, patient motivation, treatment engagement and disturbed behaviour. Three-quarters (80, 76%) of staff and nearly all (65, 92%) of patients in the two medium-security wards and two low-security wards that comprised the unit completed the Essen Climate Evaluation Schema (EssenCES) and the California Psychotherapy Alliance Scale (CALPAS); patients also completed the Patient Motivation Inventory (PMI). Pre-assessment levels of disturbed behaviour and treatment engagement were recorded. Social climate varied according to ward type and level of security. EssenCES ratings indicative of positive social climate were associated with lower levels of security; such ratings were also associated with lower behavioural disturbance and with higher levels of motivation, treatment engagement and therapeutic alliance. This serial cross-sectional survey indicated that use of the EssenCES alone might be a good practical measure of treatment progress/responsivity. A longitudinal study would be an important next step in establishing the extent to which it would be useful in this regard. Copyright © 2010 John Wiley & Sons, Ltd.

  9. Academic Training Lecture Regular Programme: Computer Security - Introduction to information and computer security (1/4)

    CERN Multimedia

    2012-01-01

    Computer Security: Introduction to information and computer security (1/4), by Sebastian Lopienski (CERN).   Monday, 21 May, 2012 from 11:00 to 12:00 (Europe/Zurich) at CERN ( 31-3-004 - IT Auditorium ) Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Ai...

  10. Non-Exercise Estimation of VO[subscript 2]max Using the International Physical Activity Questionnaire

    Science.gov (United States)

    Schembre, Susan M.; Riebe, Deborah A.

    2011-01-01

    Non-exercise equations developed from self-reported physical activity can estimate maximal oxygen uptake (VO[subscript 2]max) as well as sub-maximal exercise testing. The International Physical Activity Questionnaire is the most widely used and validated self-report measure of physical activity. This study aimed to develop and test a VO[subscript…

  11. Effects of training status and exercise intensity on phase II VO2 kinetics.

    Science.gov (United States)

    Koppo, Katrien; Bouckaert, Jacques; Jones, Andrew M

    2004-02-01

    To test the hypotheses that: 1) the time constant for the fast component of .VO2 kinetics (tau1) at exercise onset would be faster in trained than in untrained subjects for both moderate and heavy exercise, and that 2) tau1 would become progressively slower in untrained subjects at higher power outputs but be invariant in trained subjects. Eight untrained subjects (.VO2peak: 42.9 +/- 5.1 mL.kg-1.min-1) and seven trained cyclists (.VO2peak: 66.6 +/- 2.5 mL.kg-1.min-1) completed square-wave transitions to power outputs requiring 60% and 80% of gas exchange threshold (GET), and 50% of the difference between GET and .VO2 peak (50%Delta) from a baseline of "unloaded" cycling. .VO2 was measured breath-by-breath and individual responses were modeled using nonlinear regression techniques. A repeated measures ANOVA revealed that the tau1 was significantly smaller (i.e., the kinetics were faster) in the trained compared with the untrained subjects and that tau1 became significantly greater (i.e., the kinetics were slowed) at higher power outputs both in the untrained (60%GET: 17.8 +/- 3.8 s, 80%GET: 21.5 +/- 6.6 s, and 50%Delta: 23.5 +/- 2.8 s) and the trained (60%GET: 8.9 +/- 1.3 s, 80%GET: 11.7 +/- 2.5 s, and 50%Delta: 15.2 +/- 2.0 s) subjects (P exercise intensity domain (recruitment of higher threshold motor units.

  12. Data security in Intelligent Transport Systems

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2012-10-01

    Full Text Available Intelligent Transport Services expect availability of the secure seamless communications solutions typically covering widely spread areas. Different ITS solutions require different portfolio of telecommunications service quality. These parameters have to correspond with ITS service performance parameters required by specific service. Even though quite extensive range of public wireless data services with reasonable coverage are provided, most of them are provided with no guaranteed quality and security. ITS requirements can be in most parameters easier reached if multi-path communications systems are applied core solution is combined with both public as well as private ones where and when it is needed. Such solution requires implementation of relevant flexible system architecture supported by the efficient decision processes. This paper is concentrated the telecommunications security issues relevant to the ITS wide area networking. Expected level of security varies in dependence on relevant ITS service requirements. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure (C2I or other vehicles (C2C progressively grow. Such trend upsurges the fatal problems appearance probability in case security of the wide area networks is not relevantly treated. That is reason why relevant communications security treatment becomes crucial part of the ITS solution. Besides of available "off shelf" security tools we present solution based on non-public universal identifier with dynamical extension (time and position dependency as an autonomous variables and data selection according to actor role or category. Presented results were obtained within projects e-Ident1, DOTEK2 and SRATVU3.

  13. Size and composition-controlled fabrication of VO2 nanocrystals by terminated cluster growth

    Energy Technology Data Exchange (ETDEWEB)

    Anders, Andre; Slack, Jonathan

    2013-05-14

    A physical vapor deposition-based route for the fabrication of VO2 nanoparticles is demonstrated, consisting of reactive sputtering and vapor condensation at elevated pressures. The oxidation of vanadium atoms is an efficient heterogeneous nucleation method, leading to high nanoparticle throughtput. Fine control of the nanoparticle size and composition is obtained. Post growth annealing leads to crystalline VO2 nanoparticles with optimum thermocromic and plasmonic properties.

  14. High performance of solvothermally prepared VO2(B as anode for aqueous rechargeable lithium batteries

    Directory of Open Access Journals (Sweden)

    Milošević Sanja

    2015-01-01

    Full Text Available The VO2 (B was synthesized via a simple solvothermal route at 160oC in ethanol. The initial discharge capacity of VO2 (B anode, in saturated aqueous solution of LiNO3, was 177 mAh g-1 at a current rate of 50 mA g-1. After 50 cycles capacity fade was 4%, but from 20th-50th cycle no capacity drop was observed. The VO2 (B has shown very good cyclability at current rate of even 1000 mA g-1 with initial discharge capacity of 92 mAh g-1. The excellent electrochemical performance of VO2 (B was attributed to the stability of micro-nano structures to repeated intercalation /deintercalation process, very good electronic conductivity as well as the very low charge transfer resistance in the aqueous electrolyte. [Projekat Ministarstva nauke Republike Srbije, br. III45014

  15. Pressure-induced amorphization of NaVO/sub 3 at room temperature and its re-crystallization

    International Nuclear Information System (INIS)

    Shen, Z.X.; Ong, C.W.; Tang, S.H.; Kuok, M.H.

    1994-01-01

    Pressure-induced amorphization is the subject of intense study for the past few years because of its importance in material science and in solid state physics. We reported a crystalline-amorphous phase transition at ca 60kbar in NaVO1/3, which is the lowest pressure for such transitions in ionic crystals. The transition is marked by the sudden appearance of very broad bands at the 800 and 350 cm/sup -1 regions. The amorphization includes the complete breaking up of the infinite chains of corner-linked tetrahedral VO/sub 4, most likely into VO/sup -/sub 3. On decompression, the amorphous phase transforms to another phase, probably also amorphous at ca 40 kbar. It reverts to the stable ambient condition α-phase upon heating. Here we report on the details of the transtitional region and the re-linking of the VO/sub 4 chains upon heating. (authors)

  16. Highly efficient photocatalytic conversion of solar energy to hydrogen by WO3/BiVO4 core-shell heterojunction nanorods

    Science.gov (United States)

    Kosar, Sonya; Pihosh, Yuriy; Bekarevich, Raman; Mitsuishi, Kazutaka; Mawatari, Kazuma; Kazoe, Yutaka; Kitamori, Takehiko; Tosa, Masahiro; Tarasov, Alexey B.; Goodilin, Eugene A.; Struk, Yaroslav M.; Kondo, Michio; Turkevych, Ivan

    2018-04-01

    Photocatalytic splitting of water under solar light has proved itself to be a promising approach toward the utilization of solar energy and the generation of environmentally friendly fuel in a form of hydrogen. In this work, we demonstrate highly efficient solar-to-hydrogen conversion efficiency of 7.7% by photovoltaic-photoelectrochemical (PV-PEC) device based on hybrid MAPbI3 perovskite PV cell and WO3/BiVO4 core-shell nanorods PEC cell tandem that utilizes spectral splitting approach. Although BiVO4 is characterized by intrinsically high recombination rate of photogenerated carriers, this is not an issue for WO3/BiVO4 core-shell nanorods, where highly conductive WO3 cores are combined with extremely thin absorber BiVO4 shell layer. Since the BiVO4 layer is thinner than the characteristic carrier diffusion length, the photogenerated charge carriers are separated at the WO3/BiVO4 heterojunction before their recombination. Also, such architecture provides sufficient optical thickness even for extremely thin BiVO4 layer due to efficient light trapping in the core-shell WO3/BiVO4 nanorods with high aspect ratio. We also demonstrate that the concept of fill factor can be used to compare I-V characteristics of different photoanodes regarding their optimization for PV/PEC tandem devices.

  17. Freshwater Ecosystem Service Flow Model To Evaluate Regional Water Security: A Case Study In Beijing-Tianjin-Hebei Region, China

    Science.gov (United States)

    Li, D.; Li, S.

    2016-12-01

    Freshwater service, as the most important support ecosystem service, is essential to human survival and development. Many studies have evidenced the spatial differences in the supply and demand of ecosystem services and raised the concept of ecosystem service flow. However, rather few studies quantitatively characterize the freshwater service flow. This paper aims to quantify the effect of freshwater ecosystem service flow on downstream areas in Beijing-Tianjin-Hebei (BTH) region, China over 2000, 2005 and 2010. We computed the freshwater ecosystem service provision with InVEST model. We calculated freshwater ecosystem service consumption with water quota method. We simulated the freshwater ecosystem service flow using our simplified flow model and assessed the regional water security with the improved freshwater security index. The freshwater provision service mainly depends on climatic factors that cannot be influenced by management, while the freshwater consumption service is constrained by human activities. Furthermore, the decrease of water quota for agricultural, domestic and industrial water counteracts the impact of increasing freshwater demand. The analysis of freshwater ecosystem service flow reveals that the majority area of the BTH (69.2%) is affected by upstream freshwater. If freshwater ecosystem service flow is considered, the water safety areas of the whole BTH account for 66.9%, 66.1%, 71.3%, which increase 6.4%, 6.8% and 5.7% in 2000, 2005 and 2010, respectively. These results highlight the need to understand the teleconnections between distant freshwater ecosystem service provision and local freshwater ecosystem service use. This approach therefore helps managers choose specific management and investment strategies for critical upstream freshwater provisions across different regions.

  18. An audit of a specialist old age psychiatry liaison service to a medium and a high secure forensic psychiatry unit.

    Science.gov (United States)

    Shah, Ajit

    2006-04-01

    The elderly prison population is increasing and there is a significant amount of unidentified psychiatric morbidity among elderly prisoners. A sizeable number of elderly subjects are referred to regional forensic units. These units are able to provide advice but are reluctant to admit frail, physically ill and vulnerable elderly into their unit because the ward environment is considered inappropriate for them. A sizeable number of inpatients in medium and high secure units are elderly. This paper is an exploratory audit of referrals from a medium and high secure forensic psychiatry unit to a specialist consultation-only liaison old age psychiatry service, which was specifically developed to service the forensic unit. The demographic and clinical characteristics of the patients seen by this specialist service were similar to elderly inpatients in medium and high secure units. All referrals were judged to be appropriate and new management advice was provided in all cases. Main reasons for referral included diagnostic advice, placement advice and treatment advice. Establishing a diagnosis of dementia was considered important because Alzheimer's disease and Lewy body dementia can be treated with cholinesterase inhibitors. Placement advice was the most difficult to provide because of paucity of residential and nursing homes able and willing to accept patients with a forensic history. There is a need for a comprehensive model of specialist forensic old age psychiatry service at a regional or supraregional level. A consensus needs to be reached on the exact configuration of such a service.

  19. Luminescence study of Eu3+ doped GdVO4 nanoparticles: Concentration, particle size, and core/shell effects

    Science.gov (United States)

    Singh, N. Shanta; Ningthoujam, R. S.; Devi, L. Romila; Yaiphaba, N.; Sudarsan, V.; Singh, S. Dorendrajit; Vatsa, R. K.; Tewari, R.

    2008-11-01

    Nanoparticles of GdVO4 doped with Eu3+ and core/shell of GdVO4:Eu3+/GdVO4 are prepared by urea hydrolysis method using ethylene glycol as capping agent as well as reaction medium at 130 °C. Unit cell volume increases when GdVO4 is doped with Eu3+ indicating the substitution of Gd3+ lattice sites by Eu3+. From luminescence study, it is confirmed that there is no particle size effect on emission positions of Eu3+. Optimum luminescence intensity is found to be in 5-10 at. % Eu3+. Above these concentrations, luminescence intensity decreases due to concentration quenching effect. There is an enhancement in luminescence intensity of core/shell nanoparticles. This has been attributed to the reduction in surface inhomogenities of Eu3+ surroundings by bonding to GdVO4 shell. The lifetime for D50 level increases with annealing and core/shell formation.

  20. Improving Security in the ATLAS PanDA System

    International Nuclear Information System (INIS)

    Caballero, J; Maeno, T; Potekhin, M; Wenaus, T; Nilsson, P; Stewart, G

    2011-01-01

    The security challenges faced by users of the grid are considerably different to those faced in previous environments. The adoption of pilot jobs systems by LHC experiments has mitigated many of the problems associated with the inhomogeneities found on the grid and has greatly improved job reliability; however, pilot jobs systems themselves must then address many security issues, including the execution of multiple users' code under a common 'grid' identity. In this paper we describe the improvements and evolution of the security model in the ATLAS PanDA (Production and Distributed Analysis) system. We describe the security in the PanDA server which is in place to ensure that only authorized members of the VO are allowed to submit work into the system and that jobs are properly audited and monitored. We discuss the security in place between the pilot code itself and the PanDA server, ensuring that only properly authenticated workload is delivered to the pilot for execution. When the code to be executed is from a 'normal' ATLAS user, as opposed to the production system or other privileged actor, then the pilot may use an EGEE developed identity switching tool called gLExec. This changes the grid proxy available to the job and also switches the UNIX user identity to protect the privileges of the pilot code proxy. We describe the problems in using this system and how they are overcome. Finally, we discuss security drills which have been run using PanDA and show how these improved our operational security procedures.