WorldWideScience

Sample records for security requirements template

  1. Biometric Template Security

    Directory of Open Access Journals (Sweden)

    Abhishek Nagar

    2008-03-01

    Full Text Available Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

  2. Finger multibiometric cryptosystems: fusion strategy and template security

    Science.gov (United States)

    Peng, Jialiang; Li, Qiong; Abd El-Latif, Ahmed A.; Niu, Xiamu

    2014-03-01

    We address two critical issues in the design of a finger multibiometric system, i.e., fusion strategy and template security. First, three fusion strategies (feature-level, score-level, and decision-level fusions) with the corresponding template protection technique are proposed as the finger multibiometric cryptosystems to protect multiple finger biometric templates of fingerprint, finger vein, finger knuckle print, and finger shape modalities. Second, we theoretically analyze different fusion strategies for finger multibiometric cryptosystems with respect to their impact on security and recognition accuracy. Finally, the performance of finger multibiometric cryptosystems at different fusion levels is investigated on a merged finger multimodal biometric database. The comparative results suggest that the proposed finger multibiometric cryptosystem at feature-level fusion outperforms other approaches in terms of verification performance and template security.

  3. Implementation Support of Security Design Patterns Using Test Templates

    Directory of Open Access Journals (Sweden)

    Masatoshi Yoshizawa

    2016-06-01

    Full Text Available Security patterns are intended to support software developers as the patterns encapsulate security expert knowledge. However, these patterns may be inappropriately applied because most developers are not security experts, leading to threats and vulnerabilities. Here we propose a support method for security design patterns in the implementation phase of software development. Our method creates a test template from a security design pattern, consisting of an “aspect test template” to observe the internal processing and a “test case template”. Providing design information creates a test from the test template with a tool. Because our test template is reusable, it can easily perform a test to validate a security design pattern. In an experiment involving four students majoring in information sciences, we confirm that our method can realize an effective test, verify pattern applications, and support pattern implementation.

  4. Template security analysis of multimodal biometric frameworks based on fingerprint and hand geometry

    Directory of Open Access Journals (Sweden)

    Arvind Selwal

    2016-09-01

    Full Text Available Biometric systems are automatic tools used to provide authentication during various applications of modern computing. In this work, three different design frameworks for multimodal biometric systems based on fingerprint and hand geometry modalities are proposed. An analysis is also presented to diagnose various types of template security issues in the proposed system. Fuzzy analytic hierarchy process (FAHP is applied with five decision parameters on all the designs and framework 1 is found to be better in terms of template data security, templates fusion and computational efficiency. It is noticed that template data security before storage in database is a challenging task. An important observation is that a template may be secured at feature fusion level and an indexing technique may be used to improve the size of secured templates.

  5. Chaotic secure content-based hidden transmission of biometric templates

    International Nuclear Information System (INIS)

    Khan, Muhammad Khurram; Zhang Jiashu; Tian Lei

    2007-01-01

    The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system's resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature

  6. Chaotic secure content-based hidden transmission of biometric templates

    Energy Technology Data Exchange (ETDEWEB)

    Khan, Muhammad Khurram [Research Group for Biometrics and Security, Sichuan Province Key Lab of Signal and Information Processing, Southwest Jiaotong University, Chengdu 610031, Sichuan (China)]. E-mail: khurram.khan@scientist.com; Zhang Jiashu [Research Group for Biometrics and Security, Sichuan Province Key Lab of Signal and Information Processing, Southwest Jiaotong University, Chengdu 610031, Sichuan (China); Tian Lei [Research Group for Biometrics and Security, Sichuan Province Key Lab of Signal and Information Processing, Southwest Jiaotong University, Chengdu 610031, Sichuan (China)

    2007-06-15

    The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system's resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature.

  7. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM

    Directory of Open Access Journals (Sweden)

    Arvind Selwal

    2016-09-01

    Full Text Available Biometric is the science of human recognition based upon using their biological, chemical or behavioural traits. These systems are used in many real life applications simply from biometric based attendance system to providing security at very sophisticated level. A biometric system deals with raw data captured using a sensor and feature template extracted from raw image. One of the challenges being faced by designers of these systems is to secure template data extracted from the biometric modalities of the user and protect the raw images. To minimize spoof attacks on biometric systems by unauthorised users one of the solutions is to use multi-biometric systems. Multi-modal biometric system works by using fusion technique to merge feature templates generated from different modalities of the human. In this work a new scheme is proposed to secure template during feature fusion level. Scheme is based on union operation of fuzzy relations of templates of modalities during fusion process of multimodal biometric systems. This approach serves dual purpose of feature fusion as well as transformation of templates into a single secured non invertible template. The proposed technique is cancelable and experimentally tested on a bimodal biometric system comprising of fingerprint and hand geometry. Developed scheme removes the problem of an attacker learning the original minutia position in fingerprint and various measurements of hand geometry. Given scheme provides improved performance of the system with reduction in false accept rate and improvement in genuine accept rate.

  8. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    Science.gov (United States)

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  9. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM

    OpenAIRE

    Arvind Selwal; Sunil Kumar Gupta; Surender Kumar

    2016-01-01

    Biometric is the science of human recognition based upon using their biological, chemical or behavioural traits. These systems are used in many real life applications simply from biometric based attendance system to providing security at very sophisticated level. A biometric system deals with raw data captured using a sensor and feature template extracted from raw image. One of the challenges being faced by designers of these systems is to secure template data extracted from the biometric mod...

  10. A Hybrid Approach to Protect Palmprint Templates

    Directory of Open Access Journals (Sweden)

    Hailun Liu

    2014-01-01

    Full Text Available Biometric template protection is indispensable to protect personal privacy in large-scale deployment of biometric systems. Accuracy, changeability, and security are three critical requirements for template protection algorithms. However, existing template protection algorithms cannot satisfy all these requirements well. In this paper, we propose a hybrid approach that combines random projection and fuzzy vault to improve the performances at these three points. Heterogeneous space is designed for combining random projection and fuzzy vault properly in the hybrid scheme. New chaff point generation method is also proposed to enhance the security of the heterogeneous vault. Theoretical analyses of proposed hybrid approach in terms of accuracy, changeability, and security are given in this paper. Palmprint database based experimental results well support the theoretical analyses and demonstrate the effectiveness of proposed hybrid approach.

  11. Printable, scannable biometric templates for secure documents and materials

    Science.gov (United States)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  12. Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

    Directory of Open Access Journals (Sweden)

    Christian Schmitt

    2015-07-01

    Full Text Available This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security information and knowledge sources and relevant compliance obligations, in a structured and reusable form. The resulting repository is intended to be used by development teams during the elicitation and analysis of security requirements with the goal to understand the security problem space, incorporate all relevant requirements sources, and to avoid unnecessary effort for identifying, understanding, and correlating applicable security requirements sources on a project-wise basis. We start with an overview and categorization of important security requirements sources, followed by the description of the generic model. To demonstrate the applicability and benefits of the model, the instantiation approach and details of the resulting repository of security requirements sources are presented.

  13. Biometric template data protection in mobile device environment using XML-database

    DEFF Research Database (Denmark)

    Thirumathyam, Rubathas; Derawi, Mohammad; Fischer, Paul

    2010-01-01

    recognition or gait recognition. To gain a real understanding of how it is possible to protect the biometric data, this paper first starts out with introducing a technique for security in a biometric system and emphasizes that template protection is important by going through the vulnerabilities and threats....... Furthermore, it points out requirements for template protection, a recital of various template protection schemes and a brief overview of biometric standards....

  14. Capturing security requirements for software systems.

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  15. Capturing security requirements for software systems

    Directory of Open Access Journals (Sweden)

    Hassan El-Hadary

    2014-07-01

    Full Text Available Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  16. Capturing security requirements for software systems

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  17. Welding template

    International Nuclear Information System (INIS)

    Ben Venue, R.J. of.

    1976-01-01

    A welding template is described which is used to weld strip material into a cellular grid structure for the accommodation of fuel elements in a nuclear reactor. On a base plate the template carries a multitude of cylindrical pins whose upper half is narrower than the bottom half and only one of which is attached to the base plate. The others are arrested in a hexagonal array by oblong webs clamped together by chuck jaws which can be secured by means of screws. The parts are ground very accurately. The template according to the invention is very easy to make. (UWI) [de

  18. Security enhanced BioEncoding for protecting iris codes

    Science.gov (United States)

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  19. A novel chaotic stream cipher and its application to palmprint template protection

    International Nuclear Information System (INIS)

    Heng-Jian, Li; Jia-Shu, Zhang

    2010-01-01

    Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher. (general)

  20. A novel chaotic stream cipher and its application to palmprint template protection

    Science.gov (United States)

    Li, Heng-Jian; Zhang, Jia-Shu

    2010-04-01

    Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher.

  1. Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services

    OpenAIRE

    Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje

    2015-01-01

    - This document contains a checklist that can be used to develop or evaluate security and privacy requirements for Cloud computing services. The content has been gathered from established industry standards and best practices, supplemented with requirements from European data protection legislation, and taking into account security issues identified in recent research on Cloud security. The document is intended to be used by potential cloud customers that need to assess the security of a c...

  2. Multimodal biometric approach for cancelable face template generation

    Science.gov (United States)

    Paul, Padma Polash; Gavrilova, Marina

    2012-06-01

    Due to the rapid growth of biometric technology, template protection becomes crucial to secure integrity of the biometric security system and prevent unauthorized access. Cancelable biometrics is emerging as one of the best solutions to secure the biometric identification and verification system. We present a novel technique for robust cancelable template generation algorithm that takes advantage of the multimodal biometric using feature level fusion. Feature level fusion of different facial features is applied to generate the cancelable template. A proposed algorithm based on the multi-fold random projection and fuzzy communication scheme is used for this purpose. In cancelable template generation, one of the main difficulties is keeping interclass variance of the feature. We have found that interclass variations of the features that are lost during multi fold random projection can be recovered using fusion of different feature subsets and projecting in a new feature domain. Applying the multimodal technique in feature level, we enhance the interclass variability hence improving the performance of the system. We have tested the system for classifier fusion for different feature subset and different cancelable template fusion. Experiments have shown that cancelable template improves the performance of the biometric system compared with the original template.

  3. Smart Contract Templates: essential requirements and design options

    OpenAIRE

    Clack, Christopher D.; Bakshi, Vikram A.; Braine, Lee

    2016-01-01

    Smart Contract Templates support legally-enforceable smart contracts, using operational parameters to connect legal agreements to standardised code. In this paper, we explore the design landscape of potential formats for storage and transmission of smart legal agreements. We identify essential requirements and describe a number of key design options, from which we envisage future development of standardised formats for defining and manipulating smart legal agreements. This provides a prelimin...

  4. 42 CFR 3.106 - Security requirements.

    Science.gov (United States)

    2010-10-01

    ... ORGANIZATIONS AND PATIENT SAFETY WORK PRODUCT PSO Requirements and Agency Procedures § 3.106 Security requirements. (a) Application. A PSO must secure patient safety work product in conformance with the security... the confidentiality and security of patient safety work product. (2) Distinguishing patient safety...

  5. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  6. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2005-09-01

    selected from the list of standards identified in the identification effort. The requirements in these seven standards were then compared against the requirements given in the Framework. This comparison identified gaps (requirements not covered) in both the individual industry standards and in the Framework. In addition to the sector-specific standards reviewed, the team compared the requirements in the cross-sector Instrumentation, Systems, and Automation Society (ISA) Technical Reports (TR) 99 -1 and -2 to the Framework requirements. The Framework defines a set of security classes separated into families as functional requirements for control system security. Each standard reviewed was compared to this template of requirements to determine if the standard requirements closely or partially matched these Framework requirements. An analysis of each class of requirements pertaining to each standard reviewed can be found in the comparison results section of this report. Refer to Appendix A, ''Synopsis of Comparison Results'', for a complete graphical representation of the study's findings at a glance. Some of the requirements listed in the Framework are covered by many of the standards, while other requirements are addressed by only a few of the standards. In some cases, the scope of the requirements listed in the standard for a particular industry greatly exceeds the requirements given in the Framework. These additional families of requirements, identified by the various standards bodies, could potentially be added to the Framework. These findings are, in part, due to the maturity both of the security standards themselves and of the different industries current focus on security. In addition, there are differences in how communication and control is used in different industries and the consequences of disruptions via security breaches to each particular industry that could affect how security requirements are prioritized. The differences in the

  7. Review analysis of properties for an ideal secure biometric template scheme

    CSIR Research Space (South Africa)

    Mzila, Phiwa

    2016-02-01

    Full Text Available privacy and system security. To mitigate this problem, various biometric protection techniques have been proposed. Most of these schemes aim to satisfy diversity, revocability, security and performance properties, as requirements for ideal secured...

  8. Security Requirements Management in Software Product Line Engineering

    Science.gov (United States)

    Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.

  9. Security and trust requirements engineering

    NARCIS (Netherlands)

    Giorgini, P.; Massacci, F.; Zannone, N.; Aldini, A.; Gorrieri, R.; Martinelli, F.

    2005-01-01

    Integrating security concerns throughout the whole software development process is one of today’s challenges in software and requirements engineering research. A challenge that so far has proved difficult to meet. The major difficulty is that providing security does not only require to solve

  10. Argumentation-Based Security Requirements Elicitation: The Next Round

    NARCIS (Netherlands)

    Ionita, Dan; Bullee, Jan-Willem; Wieringa, Roelf J.

    2014-01-01

    Information Security Risk Assessment can be viewed as part of requirements engineering because it is used to translate security goals into security requirements, where security requirements are the desired system properties that mitigate threats to security goals. To improve the defensibility of

  11. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  12. 48 CFR 52.204-2 - Security Requirements.

    Science.gov (United States)

    2010-10-01

    ... Agreement (DD Form 441), including the National Industrial Security Program Operating Manual (DOD 5220.22-M... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Security Requirements. 52....204-2 Security Requirements. As prescribed in 4.404(a), insert the following clauses: Security...

  13. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  14. Security Requirements – Analysis of the Issue

    Directory of Open Access Journals (Sweden)

    Jhon Vincent

    2013-12-01

    Full Text Available Needs about security are matters little taken into account when managing requirements engineering , and when considered in the life cycle of the system , they tend to become a general list of functions, as password of protection , firewalls , virus detection tools , and other similar. But in fact, they cannot be considered as requirements of security, because they are implementation mechanisms to try to meet unspecified requirements, as an authenticated access. As a result, the security requirements for the system are ignored, which are required to protect essential services and assets, besides, when are specified, is not considered the prospect of future attacks. This paper describes the need for a systematic approach to managing security requirements engineering, in order to help avoid the problem of generic lists and take into account the future perspective. Several related approaches are described and also are provided references additional material that can help requirements engineers to ensure that their products be taken into account, effectively , the security requirements.

  15. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  16. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Science.gov (United States)

    2010-10-01

    ... requirements-national security contracts. 1352.237-72 Section 1352.237-72 Federal Acquisition Regulations... Provisions and Clauses 1352.237-72 Security processing requirements—national security contracts. As prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National...

  17. 49 CFR 236.1033 - Communications and security requirements.

    Science.gov (United States)

    2010-10-01

    ... Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... 49 Transportation 4 2010-10-01 2010-10-01 false Communications and security requirements. 236.1033... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and required...

  18. A lightweight approach for biometric template protection

    Science.gov (United States)

    Al-Assam, Hisham; Sellahewa, Harin; Jassim, Sabah

    2009-05-01

    Privacy and security are vital concerns for practical biometric systems. The concept of cancelable or revocable biometrics has been proposed as a solution for biometric template security. Revocable biometric means that biometric templates are no longer fixed over time and could be revoked in the same way as lost or stolen credit cards are. In this paper, we describe a novel and an efficient approach to biometric template protection that meets the revocability property. This scheme can be incorporated into any biometric verification scheme while maintaining, if not improving, the accuracy of the original biometric system. However, we shall demonstrate the result of applying such transforms on face biometric templates and compare the efficiency of our approach with that of the well-known random projection techniques. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transforms. These results are based on experiments conducted on a number of well-known face image databases, e.g. Yale and ORL databases.

  19. Template protection and its implementation in 3D face recognition systems

    Science.gov (United States)

    Zhou, Xuebing

    2007-04-01

    As biometric recognition systems are widely applied in various application areas, security and privacy risks have recently attracted the attention of the biometric community. Template protection techniques prevent stored reference data from revealing private biometric information and enhance the security of biometrics systems against attacks such as identity theft and cross matching. This paper concentrates on a template protection algorithm that merges methods from cryptography, error correction coding and biometrics. The key component of the algorithm is to convert biometric templates into binary vectors. It is shown that the binary vectors should be robust, uniformly distributed, statistically independent and collision-free so that authentication performance can be optimized and information leakage can be avoided. Depending on statistical character of the biometric template, different approaches for transforming biometric templates into compact binary vectors are presented. The proposed methods are integrated into a 3D face recognition system and tested on the 3D facial images of the FRGC database. It is shown that the resulting binary vectors provide an authentication performance that is similar to the original 3D face templates. A high security level is achieved with reasonable false acceptance and false rejection rates of the system, based on an efficient statistical analysis. The algorithm estimates the statistical character of biometric templates from a number of biometric samples in the enrollment database. For the FRGC 3D face database, the small distinction of robustness and discriminative power between the classification results under the assumption of uniquely distributed templates and the ones under the assumption of Gaussian distributed templates is shown in our tests.

  20. Biometric Template Security

    OpenAIRE

    Abhishek Nagar; Karthik Nandakumar; Anil K. Jain

    2008-01-01

    Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorizat...

  1. A relation between irreversibility and unlinkability for biometric template protection algorithms

    OpenAIRE

    井沼, 学

    2014-01-01

    For biometric recognition systems, privacy protection of enrolled users’ biometric information, which are called biometric templates, is a critical problem. Recently, various template protection algorithms have been proposed and many related previous works have discussed security notions to evaluate the protection performance of these protection algorithms. Irreversibility and unlinkability are important security notions discussed in many related previous works. In this paper, we prove that u...

  2. 20 CFR 209.3 - Social security number required.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Social security number required. 209.3... RAILROAD EMPLOYERS' REPORTS AND RESPONSIBILITIES § 209.3 Social security number required. Each employer shall furnish to the Board a social security number for each employee for whom any report is submitted...

  3. A STUDY ON BIOMETRIC TEMPLATE SECURITY

    Directory of Open Access Journals (Sweden)

    N. Radha

    2010-07-01

    Full Text Available The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to information by authenticating an individual’s identity. The other is to make sure the privacy and integrity of information and to secure communication. Cryptography is the science of writing in secret code. Secret-key cryptography and public-key cryptography are the two most important cryptographic architectures. The security of a cryptographic system is reliant on the secrecy of the cryptographic key. Biometric authentication or simply biometrics refers to establishing automatic personal recognition based on the physical and behavioral characteristics of an individual (e.g. face, voice, fingerprint, gait, hand geometry, iris, gene, etc.. Biometrics offers superior security and easier than traditional identity authentication systems (based on passwords and cryptographic keys.Since biometrics characteristics are naturally related with a particular individual, making them insusceptible to being stolen, forgotten, lost or attached. This paper presents a survey on various techniques proposed earlier in developing an authentication system for ensuring individual’s information security by combining biometric characteristics of that particular individual and the cryptographic techniques. In addition, it provides some fundamental idea for future research that may help in eliminating the problems associated with the present authentication systems.

  4. 49 CFR 659.21 - System security plan: general requirements.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum, complies...

  5. Security requirements engineering : the SI* modeling language and the Secure Tropos methodology

    NARCIS (Netherlands)

    Massacci, F.; Mylopoulos, J.; Zannone, N.; Ras, Z.W.; Tsay, L.-S.

    2010-01-01

    Security Requirements Engineering is an emerging field which lies at the crossroads of Security and Software Engineering. Much research has focused on this field in recent years, spurred by the realization that security must be dealt with in the earliest phases of the software development process as

  6. Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Breebaart, Jeroen; Buhan, I.R.; Veldhuis, Raymond N.J.; Vijaya Kumar, B.V.K.; Prabhakar, Salil; Ross, Arun A.

    2010-01-01

    Template protection techniques are used within biometric systems in order to protect the stored biometric template against privacy and security threats. A great portion of template protection techniques are based on extracting a key from or binding a key to a biometric sample. The achieved

  7. Security and Privacy in Video Surveillance: Requirements and Challenges

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2014-01-01

    observed by the system. Several techniques to protect the privacy of individuals have therefore been proposed, but very little research work has focused on the specific security requirements of video surveillance data (in transit or in storage) and on authorizing access to this data. In this paper, we...... present a general model of video surveillance systems that will help identify the major security and privacy requirements for a video surveillance system and we use this model to identify practical challenges in ensuring the security of video surveillance data in all stages (in transit and at rest). Our...... study shows a gap between the identified security requirements and the proposed security solutions where future research efforts may focus in this domain....

  8. 7 CFR 3550.108 - Security requirements (loans only).

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security requirements (loans only). 3550.108 Section..., DEPARTMENT OF AGRICULTURE DIRECT SINGLE FAMILY HOUSING LOANS AND GRANTS Section 504 Origination and Section 306C Water and Waste Disposal Grants § 3550.108 Security requirements (loans only). When the total...

  9. Iris Cryptography for Security Purpose

    Science.gov (United States)

    Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.

    2018-04-01

    In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.

  10. A vulnerability-centric requirements engineering framework : Analyzing security attacks, countermeasures, and requirements based on vulnerabilities

    NARCIS (Netherlands)

    Elahi, G.; Yu, E.; Zannone, N.

    2010-01-01

    Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements

  11. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Science.gov (United States)

    2010-10-01

    ... information technology (IT) system, as required by the Department of Commerce Security Manual and Department of Commerce Security Program Policy and Minimum Implementation Standards. (b) Insert clause 1352.237... as National Security Contracts that will be performed on or within a Department of Commerce facility...

  12. Information security requirements in patient-centred healthcare support systems.

    Science.gov (United States)

    Alsalamah, Shada; Gray, W Alex; Hilton, Jeremy; Alsalamah, Hessah

    2013-01-01

    Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medical information with the patient between different healthcare providers as they follow the patient's treatment plan. However, PC care threatens the stability of the balance of information security in the support systems since legacy systems fall short of attaining a security balance when sharing their information due to compromises made between its availability, integrity, and confidentiality. Results show that the main reason for this is that information security implementation in discrete legacy systems focused mainly on information confidentiality and integrity leaving availability a challenge in collaboration. Through an empirical study using domain analysis, observations, and interviews, this paper identifies a need for six information security requirements in legacy systems to cope with this situation in order to attain the security balance in systems supporting PC care implementation in modern healthcare.

  13. Security Requirements for New Threats at International Airports

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2018-03-01

    Full Text Available The paper refers to security requirements for new threats international airports, taking specifically into consideration current challenges within processing of passengers, in light of types of current major threats, in a way ensuring positive passenger experience within their journey. In addition, within the scope of this paper, presented initial outcome of study research among professional aviation stakeholder?s environment, on current threats in the area of security and protection of airport infrastructure. The airports are a very demanding environment: seasonal traffic, fluctuating passenger volumes and last minute changes mean there is a lot of flexibility required in order to meet specific needs of airport authorities and their clients or the passengers (Dolnik, 2009. Therefore, security in aviation sector has been a big issue for civil aviation authorities, as airports are susceptible targets for terrorist attacks. The list of incidents is extensive and gets longer every year despite strict security measures. Within decades, aviation has become the backbone of our global economy bringing people to business, tourists to vacation destinations and products to markets. Statistically flying remains the safest mode of travelling compared to other modes of transportation. However, simultaneously terrorists and criminals continue in their quest to explore new ways of disrupting air transportation and the challenge to secure airports and airline assets remain real. This calls for greater awareness of security concerns in the aviation sector. The key element, how to protects against terrorist modus operandi, is to stay ahead of recent threats, incidents and breaches occurring worldwide. It requires implementation of effective data sharing systems, in order to proactively monitor potential risks and vulnerabilities within different type of aviation ecosystems.

  14. SecureCore Software Architecture: Trusted Path Application (TPA) Requirements

    National Research Council Canada - National Science Library

    Clark, Paul C; Irvine, Cynthia E; Levin, Timothy E; Nguyen, Thuy D; Vidas, Timothy M

    2007-01-01

    .... The purpose of the SecureCore research project is to investigate fundamental architectural features required for the trusted operation of mobile computing devices so the security is built-in, transparent and flexible...

  15. On enabling secure applications through off-line biometric identification

    Energy Technology Data Exchange (ETDEWEB)

    Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States); Frankel, Y. [CertCo LLC, New York, NY (United States); Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States)

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

  16. On enabling secure applications through off-line biometric identification

    International Nuclear Information System (INIS)

    Davida, G.I.; Frankel, Y.; Matt, B.J.

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user's biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user's private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user's biometrics to facilitate cryptographic mechanisms

  17. Cloud computing security requirements: a systematic review

    NARCIS (Netherlands)

    Iankoulova, Iliana; Daneva, Maia; Rolland, C; Castro, J.; Pastor, O

    Many publications have dealt with various types of security requirements in cloud computing but not all types have been explored in sufficient depth. It is also hard to understand which types of requirements have been under-researched and which are most investigated. This paper's goal is to provide

  18. RiskREP: Risk-Based Security Requirements Elicitation and Prioritization (extended version)

    NARCIS (Netherlands)

    Herrmann, Andrea; Morali, A.

    2010-01-01

    Today, companies are required to be in control of the security of their IT assets. This is especially challenging in the presence of limited budgets and conflicting requirements. Here, we present Risk-Based Requirements Elicitation and Prioritization (RiskREP), a method for managing IT security

  19. 7 CFR 774.18 - Interest rate, terms and security requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Interest rate, terms and security requirements. 774.18..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS EMERGENCY LOAN FOR SEED PRODUCERS PROGRAM § 774.18 Interest rate, terms and security requirements. (a) Interest rate. (1) The interest rate on the loan will be zero...

  20. A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  1. Feeling Is Believing: A Secure Template Exchange Protocol

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Lee, Seong-Whan; Li, Stan Z.

    We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip

  2. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  3. From scores to face templates: a model-based approach.

    Science.gov (United States)

    Mohanty, Pranab; Sarkar, Sudeep; Kasturi, Rangachar

    2007-12-01

    Regeneration of templates from match scores has security and privacy implications related to any biometric authentication system. We propose a novel paradigm to reconstruct face templates from match scores using a linear approach. It proceeds by first modeling the behavior of the given face recognition algorithm by an affine transformation. The goal of the modeling is to approximate the distances computed by a face recognition algorithm between two faces by distances between points, representing these faces, in an affine space. Given this space, templates from an independent image set (break-in) are matched only once with the enrolled template of the targeted subject and match scores are recorded. These scores are then used to embed the targeted subject in the approximating affine (non-orthogonal) space. Given the coordinates of the targeted subject in the affine space, the original template of the targeted subject is reconstructed using the inverse of the affine transformation. We demonstrate our ideas using three, fundamentally different, face recognition algorithms: Principal Component Analysis (PCA) with Mahalanobis cosine distance measure, Bayesian intra-extrapersonal classifier (BIC), and a feature-based commercial algorithm. To demonstrate the independence of the break-in set with the gallery set, we select face templates from two different databases: Face Recognition Grand Challenge (FRGC) and Facial Recognition Technology (FERET) Database (FERET). With an operational point set at 1 percent False Acceptance Rate (FAR) and 99 percent True Acceptance Rate (TAR) for 1,196 enrollments (FERET gallery), we show that at most 600 attempts (score computations) are required to achieve a 73 percent chance of breaking in as a randomly chosen target subject for the commercial face recognition system. With similar operational set up, we achieve a 72 percent and 100 percent chance of breaking in for the Bayesian and PCA based face recognition systems, respectively. With

  4. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  5. Quantifying privacy and security of biometric fuzzy commitment

    NARCIS (Netherlands)

    Zhou, Xuebing; Kuijper, Arjan; Veldhuis, Raymond N.J.; Busch, Christoph

    2011-01-01

    Fuzzy commitment is an efficient template protection algorithm that can improve security and safeguard privacy of biometrics. Existing theoretical security analysis has proved that although privacy leakage is unavoidable, perfect security from information-theoretical points of view is possible when

  6. On Business-Driven IT Security Management and Mismatches between Security Requirements in Firms, Industry Standards and Research Work

    Science.gov (United States)

    Frühwirth, Christian

    Industry managers have long recognized the vital importance of information security for their businesses, but at the same time they perceived security as a technology-driven rather then a business-driven field. Today, this notion is changing and security management is shifting from technology- to business-oriented approaches. Whereas there is evidence of this shift in the literature, this paper argues that security standards and academic work have not yet taken it fully into account. We examine whether this disconnect has lead to a misalignment of IT security requirements in businesses versus industry standards and academic research. We conducted 13 interviews with practitioners from 9 different firms to investigate this question. The results present evidence for a significant gap between security requirements in industry standards and actually reported security vulnerabilities. We further find mismatches between the prioritization of security factors in businesses, standards and real-world threats. We conclude that security in companies serves the business need of protecting information availability to keep the business running at all times.

  7. 19 CFR 113.1 - Authority to require security or execution of bond.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Authority to require security or execution of bond. 113.1 Section 113.1 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS General Provisions § 113.1 Authority to require security or...

  8. 7 CFR 773.19 - Interest rate, terms, security requirements, and repayment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Interest rate, terms, security requirements, and... SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SPECIAL APPLE LOAN PROGRAM § 773.19 Interest rate, terms, security requirements, and repayment. (a) Interest rate. The interest rate will be fixed...

  9. 28 CFR 105.11 - Individuals not requiring a security risk assessment.

    Science.gov (United States)

    2010-07-01

    ... requiring a security risk assessment. (a) Citizens and nationals of the United States. A citizen or national... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY...

  10. A Novel Surgical Template Design in Staged Dental Implant Rehabilitations

    Directory of Open Access Journals (Sweden)

    Michael Patras

    2012-05-01

    Full Text Available Background: The philosophy of a gradual transition to an implant retained prosthesis in cases of full-mouth or extensive rehabilitation usually involves a staged treatment concept. In this therapeutic approach, the placement of implants may sometimes be divided into phases. During a subsequent surgical phase of treatment, the pre-existing implants can serve as anchors for the surgical template. Those modified surgical templates help in the precise transferring of restorative information into the surgical field and guide the optimal three-dimensional implant positioning. Methods: This article highlights the rationale of implant-retained surgical templates and illustrates them through the presentation of two clinical cases. The templates are duplicates of the provisional restorations and are secured to the existing implants through the utilization of implant mounts. Results: This template design in such staged procedures provided stability in the surgical field and enhanced the accuracy in implant positioning based upon the planned restoration, thus ensuring predictable treatment outcomes.Conclusions: Successful rehabilitation lies in the correct sequence of surgical and prosthetic procedures. Whenever a staged approach of implant placement is planned, the clinician can effectively use the initially placed implants as anchors for the surgical template during the second phase of implant surgery.

  11. 7 CFR 771.9 - Interest rates, terms, security requirements, and repayment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Interest rates, terms, security requirements, and... Interest rates, terms, security requirements, and repayment. (a) Interest rate. The interest rate will be fixed for the term of the loan. The rate will be established by FSA, based upon the cost of Government...

  12. Securing Iris Templates using Combined User and Soft Biometric based Password Hardened Fuzzy Vault

    OpenAIRE

    Meenakshi, V. S.; Padmavathi, G.

    2010-01-01

    Personal identification and authentication is very crucial in the current scenario. Biometrics plays an important role in this area. Biometric based authentication has proved superior compared to traditional password based authentication. Anyhow biometrics is permanent feature of a person and cannot be reissued when compromised as passwords. To over come this problem, instead of storing the original biometric templates transformed templates can be stored. Whenever the transformation function ...

  13. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  14. 78 FR 77606 - Security Requirements for Facilities Storing Spent Nuclear Fuel

    Science.gov (United States)

    2013-12-24

    ... NUCLEAR REGULATORY COMMISSION 10 CFR Parts 72 and 73 [NRC-2009-0558] RIN 3150-AI78 Security... rulemaking that would revise the security requirements for storing spent nuclear fuel (SNF) in an independent... Nuclear Security and Incident Response, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001...

  15. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  16. 12 CFR 208.35 - Qualification requirements for transactions in certain securities. [Reserved

    Science.gov (United States)

    2010-01-01

    ... requirements for transactions in certain securities. [Reserved] ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Qualification requirements for transactions in certain securities. [Reserved] 208.35 Section 208.35 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF...

  17. Assessing usefulness and researcher satisfaction with consent form templates.

    Science.gov (United States)

    Larson, Elaine L; Teller, Alan; Aguirre, Alejandra N; Jackson, Jhia; Meyer, Dodi

    2017-08-01

    We aimed to improve the research consenting process by developing and evaluating simplified consent forms. Four templates written at the eighth-tenth grade reading level were developed and trialed by a group of experts in clinical research, health literacy, national regulatory requirements, and end users. Researchers from protocols which had received expedited review were surveyed at 2 time points regarding their use and assessment of the templates. At baseline 18/86 (20.9%) responding researchers had heard of the templates and 5 (5.8%) reported that they had used them; 2 years later, 54.2% (32/59) had heard of the templates and 87.5% (28/32) had used them ( p Consent form templates may be one mechanism to improve patient comprehension of research protocols as well as efficiency of the review process, but require considerable time for development and implementation, and one key to their success is involvement and support from the IRB and technical staff.

  18. How to Compare the Security Quality Requirements Engineering (SQUARE) Method with Other Methods

    National Research Council Canada - National Science Library

    Mead, Nancy R

    2007-01-01

    The Security Quality Requirements Engineering (SQUARE) method, developed at the Carnegie Mellon Software Engineering Institute, provides a systematic way to identify security requirements in a software development project...

  19. Perl Template Toolkit

    CERN Document Server

    Chamberlain, Darren; Cross, David; Torkington, Nathan; Diaz, tatiana Apandi

    2004-01-01

    Among the many different approaches to "templating" with Perl--such as Embperl, Mason, HTML::Template, and hundreds of other lesser known systems--the Template Toolkit is widely recognized as one of the most versatile. Like other templating systems, the Template Toolkit allows programmers to embed Perl code and custom macros into HTML documents in order to create customized documents on the fly. But unlike the others, the Template Toolkit is as facile at producing HTML as it is at producing XML, PDF, or any other output format. And because it has its own simple templating language, templates

  20. 31 CFR 203.21 - Collateral security requirements.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Collateral security requirements. 203.21 Section 203.21 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... hereunder; or (iv) The depositary is closed for business by regulatory action or by proper corporate action...

  1. 21 CFR 1301.71 - Security requirements generally.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Security requirements generally. 1301.71 Section 1301.71 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION OF..., cooperative buying, etc.); (2) The type and form of controlled substances handled (e.g., bulk liquids or...

  2. Biometric templates selection and update using quality measures

    Science.gov (United States)

    Abboud, Ali J.; Jassim, Sabah A.

    2012-06-01

    To deal with severe variation in recording conditions, most biometric systems acquire multiple biometric samples, at the enrolment stage, for the same person and then extract their individual biometric feature vectors and store them in the gallery in the form of biometric template(s), labelled with the person's identity. The number of samples/templates and the choice of the most appropriate templates influence the performance of the system. The desired biometric template(s) selection technique must aim to control the run time and storage requirements while improving the recognition accuracy of the biometric system. This paper is devoted to elaborating on and discussing a new two stages approach for biometric templates selection and update. This approach uses a quality-based clustering, followed by a special criterion for the selection of an ultimate set of biometric templates from the various clusters. This approach is developed to select adaptively a specific number of templates for each individual. The number of biometric templates depends mainly on the performance of each individual (i.e. gallery size should be optimised to meet the needs of each target individual). These experiments have been conducted on two face image databases and their results will demonstrate the effectiveness of proposed quality-guided approach.

  3. Development of Total Knee Replacement Digital Templating Software

    Science.gov (United States)

    Yusof, Siti Fairuz; Sulaiman, Riza; Thian Seng, Lee; Mohd. Kassim, Abdul Yazid; Abdullah, Suhail; Yusof, Shahril; Omar, Masbah; Abdul Hamid, Hamzaini

    In this study, by taking full advantage of digital X-ray and computer technology, we have developed a semi-automated procedure to template knee implants, by making use of digital templating method. Using this approach, a software system called OrthoKneeTMhas been designed and developed. The system is to be utilities as a study in the Department of Orthopaedic and Traumatology in medical faculty, UKM (FPUKM). OrthoKneeTMtemplating process employs uses a technique similar to those used by many surgeons, using acetate templates over X-ray films. Using template technique makes it easy to template various implant from every Implant manufacturers who have with a comprehensive database of templates. The templating functionality includes, template (knee) and manufactures templates (Smith & Nephew; and Zimmer). From an image of patient x-ray OrthoKneeTMtemplates help in quickly and easily reads to the approximate template size needed. The visual templating features then allow us quickly review multiple template sizes against the X-ray and thus obtain the nearly precise view of the implant size required. The system can assist by templating on one patient image and will generate reports that can accompany patient notes. The software system was implemented in Visual basic 6.0 Pro using the object-oriented techniques to manage the graphics and objects. The approaches for image scaling will be discussed. Several of measurement in orthopedic diagnosis process have been studied and added in this software as measurement tools features using mathematic theorem and equations. The study compared the results of the semi-automated (using digital templating) method to the conventional method to demonstrate the accuracy of the system.

  4. Design of Cancelable Palmprint Templates Based on Look Up Table

    Science.gov (United States)

    Qiu, Jian; Li, Hengjian; Dong, Jiwen

    2018-03-01

    A novel cancelable palmprint templates generation scheme is proposed in this paper. Firstly, the Gabor filter and chaotic matrix are used to extract palmprint features. It is then arranged into a row vector and divided into equal size blocks. These blocks are converted to corresponding decimals and mapped to look up tables, forming final cancelable palmprint features based on the selected check bits. Finally, collaborative representation based classification with regularized least square is used for classification. Experimental results on the Hong Kong PolyU Palmprint Database verify that the proposed cancelable templates can achieve very high performance and security levels. Meanwhile, it can also satisfy the needs of real-time applications.

  5. Making Deformable Template Models Operational

    DEFF Research Database (Denmark)

    Fisker, Rune

    2000-01-01

    for estimation of the model parameters, which applies a combination of a maximum likelihood and minimum distance criterion. Another contribution is a very fast search based initialization algorithm using a filter interpretation of the likelihood model. These two methods can be applied to most deformable template......Deformable template models are a very popular and powerful tool within the field of image processing and computer vision. This thesis treats this type of models extensively with special focus on handling their common difficulties, i.e. model parameter selection, initialization and optimization....... A proper handling of the common difficulties is essential for making the models operational by a non-expert user, which is a requirement for intensifying and commercializing the use of deformable template models. The thesis is organized as a collection of the most important articles, which has been...

  6. Privacy and data security in E-health: requirements from the user's perspective.

    Science.gov (United States)

    Wilkowska, Wiktoria; Ziefle, Martina

    2012-09-01

    In this study two currently relevant aspects of using medical assistive technologies were addressed-security and privacy. In a two-step empirical approach that used focus groups (n = 19) and a survey (n = 104), users' requirements for the use of medical technologies were collected and evaluated. Specifically, we focused on the perceived importance of data security and privacy issues. Outcomes showed that both security and privacy aspects play an important role in the successful adoption of medical assistive technologies in the home environment. In particular, analysis of data with respect to gender, health-status and age (young, middle-aged and old users) revealed that females and healthy adults require, and insist on, the highest security and privacy standards compared with males and the ailing elderly.

  7. Comparison of the Force Required for Dislodgement Between Secured and Unsecured Airways.

    Science.gov (United States)

    Davenport, Curtis; Martin-Gill, Christian; Wang, Henry E; Mayrose, James; Carlson, Jestin N

    2018-05-01

    Airway device placement and maintenance are of utmost importance when managing critically ill patients. The best method to secure airway devices is currently unknown. We sought to determine the force required to dislodge 4 types of airways with and without airway securing devices. We performed a prospective study using 4 commonly used airway devices (endotracheal tube [ETT], laryngeal mask airway [LMA], King laryngeal tube [King], and iGel) performed on 5 different mannequin models. All devices were removed twice per mannequin in random order, once unsecured and once secured as per manufacturers' recommendations; Thomas Tube Holder (Laerdal, Stavanger, Norway) for ETT, LMA, and King; custom tube holder for iGel. A digital force measuring device was attached to the exposed end of the airway device and gradually pulled vertically and perpendicular to the mannequin until the tube had been dislodged, defined as at least 4 cm of movement. Dislodgement force was reported as the maximum force recorded during dislodgement. We compared the relative difference in the secured and unsecured force for each device and between devices using a random-effects regression model accounting for variability in the manikins. The median dislodgment forces (interquartile range [IQR]) in pounds for each secured device were: ETT 13.3 (11.6, 14.1), LMA 16.6 (13.9, 18.3), King 21.7 (16.9, 25.1), and iGel 8 (6.8, 8.3). The median dislodgement forces for each unsecured device were: ETT 4.5 (4.3, 5), LMA 8.4 (6.8, 10.7), King 10.6 (8.2, 11.5), and iGel 3.9 (3.2, 4.2). The relative difference in dislodgement forces (95% confidence intervals) were higher for each device when secured: ETT 8.6 (6.2 to 11), LMA 8.8 (4.6 to 13), King 12.1 (7.2 to 16.6), iGel 4 (1.1 to 6.9). When compared to secured ETT, the King required greater dislodgement force (relative difference 8.6 [4.5-12.7]). The secured iGel required less force than the secured ETT (relative difference -4.8 [-8.9 to -0.8]). Compared with a

  8. Laparotomy operative note template constructed through a modified Delphi method.

    Science.gov (United States)

    Moore, Lolonya; Churley-Strom, Ruth; Singal, Bonita; O'Leary, Sharon

    2009-05-01

    An operative note is indispensable to physician documentation and decision-making; however, there are no accepted standards for operative note content. Our aim was to use a modified Delphi consensus-building method to construct a uniform operative note template for laparotomy. Using Joint Commission on Accreditation of Healthcare Organizations requirements, literature review, and feedback from 15 medical malpractice defense attorneys, we compiled a draft operative note template of 31 elements. We surveyed 37 Association of Professor of Gynecology and Obstetrics/Solvay scholars asking for their input on inclusion of each item as essential content of the operative note. Two iterations of the survey were required to reach a predetermined 75% level of consensus. Nine elements were eliminated from the template: 6 original and 3 expert-suggested elements. We provide an operative note template that was compiled through a Delphi process.

  9. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  10. How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns

    NARCIS (Netherlands)

    Compagna, L.; El Khoury, P.; Krausová, A.; Massacci, F.; Zannone, N.

    2009-01-01

    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address

  11. Ordered Nanomaterials Thin Films via Supported Anodized Alumina Templates

    Directory of Open Access Journals (Sweden)

    Mohammed eES-SOUNI

    2014-10-01

    Full Text Available Supported anodized alumina template films with highly ordered porosity are best suited for fabricating large area ordered nanostructures with tunable dimensions and aspect ratios. In this paper we first discuss important issues for the generation of such templates, including required properties of the Al/Ti/Au/Ti thin film heterostructure on a substrate for high quality templates. We then show examples of anisotropic nanostructure films consisting of noble metals using these templates, discuss briefly their optical properties and their applications to molecular detection using surface enhanced Raman spectroscopy. Finally we briefly address the possibility to make nanocomposite films, exemplary shown on a plasmonic-thermochromic nanocomposite of VO2-capped Au-nanorods.

  12. Critical water requirements for food, methodology and policy consequences for food security

    NARCIS (Netherlands)

    Gerbens-Leenes, P.W.; Nonhebel, S.

    2004-01-01

    Food security and increasing water scarcity have a dominant place on the food policy agenda. Food security requires sufficient water of adequate quality because water is a prerequisite for plant growth. Nowadays, agriculture accounts for 70% of the worldwide human fresh water use. The expected

  13. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

    Science.gov (United States)

    Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay

    2015-12-01

    In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where a private key is shared between a user and a verifier. In the THRIVE system, only encrypted binary biometric templates are stored in a database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during authentication. Due to the underlying threshold homomorphic encryption scheme, a malicious database owner cannot perform full decryption on encrypted templates of the users in the database. In addition, security of the THRIVE system is enhanced using a two-factor authentication scheme involving user's private key and biometric data. Using simulation-based techniques, the proposed system is proven secure in the malicious model. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometrics. The system can be used with any biometric modality where a feature extraction method yields a fixed size binary template and a query template is verified when its Hamming distance to the database template is less than a threshold. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biometric templates on a desktop PC running with quad core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real-life applications.

  14. 75 FR 9919 - Extension of Agency Information Collection Activity Under OMB Review: Air Cargo Security...

    Science.gov (United States)

    2010-03-04

    ... operating under a security program, and all-cargo carriers. These five categories are: security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), cargo... Verification Form, Aircraft Operator or Air Carrier Reporting Template, Security Threat Assessment Application...

  15. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  16. Templating mesoporous zeolites

    DEFF Research Database (Denmark)

    Egeblad, Kresten; Christensen, Christina Hviid; Kustova, Marina

    2008-01-01

    The application of templating methods to produce zeolite materials with hierarchical bi- or trimodal pore size distributions is reviewed with emphasis on mesoporous materials. Hierarchical zeolite materials are categorized into three distinctly different types of materials: hierarchical zeolite...... crystals, nanosized zeolite crystals, and supported zeolite crystals. For the pure zeolite materials in the first two categories, the additional meso- or macroporosity can be classified as being either intracrystalline or intercrystalline, whereas for supported zeolite materials, the additional porosity...... originates almost exclusively from the support material. The methods for introducing mesopores into zeolite materials are discussed and categorized. In general, mesopores can be templated in zeolite materials by use of solid templating, supramolecular templating, or indirect templating...

  17. 75 FR 65881 - Ownership Limitations and Governance Requirements for Security-Based Swap Clearing Agencies...

    Science.gov (United States)

    2010-10-26

    ... it determines they are necessary or appropriate to improve the governance of, or to mitigate systemic... Part IV Securities and Exchange Commission 17 CFR Part 242 Ownership Limitations and Governance... Ownership Limitations and Governance Requirements for Security- Based Swap Clearing Agencies, Security-Based...

  18. Controlling macro- and mesostructures with hierarchical porosity through combined hard and soft templating.

    Science.gov (United States)

    Petkovich, Nicholas D; Stein, Andreas

    2013-05-07

    Rigid, porous objects and surfactants serve as powerful templates for the formation of mesoporous and macroporous materials. When both types of template are combined in a single synthesis, materials with intricate architectures and hierarchical porosity can be obtained. In this tutorial review, we explain how to conduct syntheses with both soft and hard templates; moreover, we describe methods to control the final structure present in the templated material. Much of the foundation for multiple templating lies in the study of materials made with only one type of template. To establish a foundation in this area, a description of hard and soft templating is given, delving into the templates available and the steps required for effective templating. This leads into an extended discussion about materials templated with both hard and soft templates. Through the use of recent examples in the literature, we aim to show the diversity of structures possible through multiple templating and the advantages these structures can provide for a wide range of applications. An emphasis is placed on how various factors-such as the type of template, type of precursor, heat-treatment temperature, confinement within a small space, and template-template interactions-impact morphology.

  19. The relation between the secrecy rate of biometric template protection and biometric recognition performance

    NARCIS (Netherlands)

    Veldhuis, Raymond N.J.

    2015-01-01

    A theoretical result relating the maximum achievable security of the family of biometric template protection systems known as key-binding systems to the recognition performance of a biometric recognition system that is optimal in Neyman-Pearson sense is derived. The relation allows for the

  20. 13 CFR 107.1505 - Liquidity requirements for Licensees issuing Participating Securities.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Liquidity requirements for... (Leverage) Participating Securities Leverage § 107.1505 Liquidity requirements for Licensees issuing... liquidity to avoid a condition of Liquidity Impairment. Such a condition will constitute noncompliance with...

  1. A Survey On Biometric Security Technologies From Cloud Computing Perspective

    Directory of Open Access Journals (Sweden)

    Shivashish Ratnam

    2015-08-01

    Full Text Available Cloud computing is one of the rising technologies that takes set of connections users to the next level. Cloud is a technology where resources are paid as per usage rather than owned. One of the major challenges in this technology is Security. Biometric systems provide the answer to ensure that the rendered services are accessed only by a legal user or an authorized user and no one else. Biometric systems recognize users based on behavioral or physiological characteristics. The advantages of such systems over traditional validation methods such as passwords and IDs are well known and hence biometric systems are progressively gaining ground in terms of usage. This paper brings about a new replica of a security system where in users have to offer multiple biometric finger prints during Enrollment for a service. These templates are stored at the cloud providers section. The users are authenticated based on these finger print designed templates which have to be provided in the order of arbitrary numbers or imaginary numbers that are generated every time continuously. Both finger prints templates and images are present and they provided every time duration are encrypted or modified for enhanced security.

  2. Ferritin-Templated Quantum-Dots for Quantum Logic Gates

    Science.gov (United States)

    Choi, Sang H.; Kim, Jae-Woo; Chu, Sang-Hyon; Park, Yeonjoon; King, Glen C.; Lillehei, Peter T.; Kim, Seon-Jeong; Elliott, James R.

    2005-01-01

    Quantum logic gates (QLGs) or other logic systems are based on quantum-dots (QD) with a stringent requirement of size uniformity. The QD are widely known building units for QLGs. The size control of QD is a critical issue in quantum-dot fabrication. The work presented here offers a new method to develop quantum-dots using a bio-template, called ferritin, that ensures QD production in uniform size of nano-scale proportion. The bio-template for uniform yield of QD is based on a ferritin protein that allows reconstitution of core material through the reduction and chelation processes. One of the biggest challenges for developing QLG is the requirement of ordered and uniform size of QD for arrays on a substrate with nanometer precision. The QD development by bio-template includes the electrochemical/chemical reconsitution of ferritins with different core materials, such as iron, cobalt, manganese, platinum, and nickel. The other bio-template method used in our laboratory is dendrimers, precisely defined chemical structures. With ferritin-templated QD, we fabricated the heptagonshaped patterned array via direct nano manipulation of the ferritin molecules with a tip of atomic force microscope (AFM). We also designed various nanofabrication methods of QD arrays using a wide range manipulation techniques. The precise control of the ferritin-templated QD for a patterned arrangement are offered by various methods, such as a site-specific immobilization of thiolated ferritins through local oxidation using the AFM tip, ferritin arrays induced by gold nanoparticle manipulation, thiolated ferritin positioning by shaving method, etc. In the signal measurements, the current-voltage curve is obtained by measuring the current through the ferritin, between the tip and the substrate for potential sweeping or at constant potential. The measured resistance near zero bias was 1.8 teraohm for single holoferritin and 5.7 teraohm for single apoferritin, respectively.

  3. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  4. General Approaches and Requirements on Safety and Security of Radioactive Materials Transport in Russian Federation

    International Nuclear Information System (INIS)

    Ershov, V.N.; Buchel'nikov, A.E.; Komarov, S.V.

    2016-01-01

    Development and implementation of safety and security requirements for transport of radioactive materials in the Russian Federation are addressed. At the outset it is worth noting that the transport safety requirements implemented are in full accordance with the IAEA's ''Regulations for the Safe Transport of Radioactive Material (2009 Edition)''. However, with respect to security requirements for radioactive material transport in some cases the Russian Federation requirements for nuclear material are more stringent compared to IAEA recommendations. The fundamental principles of safety and security of RM managements, recommended by IAEA documents (publications No. SF-1 and GOV/41/2001) are compared. Its correlation and differences concerning transport matters, the current level and the possibility of harmonization are analysed. In addition a reflection of the general approaches and concrete transport requirements is being evaluated. Problems of compliance assessment, including administrative and state control problems for safety and security provided at internal and international shipments are considered and compared. (author)

  5. AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

    Directory of Open Access Journals (Sweden)

    JAE-GU SONG

    2013-10-01

    Full Text Available Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.

  6. Content analysis of physical examination templates in electronic health records using SNOMED CT.

    Science.gov (United States)

    Gøeg, Kirstine Rosenbeck; Chen, Rong; Højen, Anne Randorff; Elberg, Pia

    2014-10-01

    Most electronic health record (EHR) systems are built on proprietary information models and terminology, which makes achieving semantic interoperability a challenge. Solving interoperability problems requires well-defined standards. In contrast, the need to support clinical work practice requires a local customization of EHR systems. Consequently, contrasting goals may be evident in EHR template design because customization means that local EHR organizations can define their own templates, whereas standardization implies consensus at some level. To explore the complexity of balancing these two goals, this study analyzes the differences and similarities between templates in use today. A similarity analysis was developed on the basis of SNOMED CT. The analysis was performed on four physical examination templates from Denmark and Sweden. The semantic relationships in SNOMED CT were used to quantify similarities and differences. Moreover, the analysis used these identified similarities to investigate the common content of a physical examination template. The analysis showed that there were both similarities and differences in physical examination templates, and the size of the templates varied from 18 to 49 fields. In the SNOMED CT analysis, exact matches and terminology similarities were represented in all template pairs. The number of exact matches ranged from 7 to 24. Moreover, the number of unrelated fields differed a lot from 1/18 to 22/35. Cross-country comparisons tended to have more unrelated content than within-country comparisons. On the basis of identified similarities, it was possible to define the common content of a physical examination. Nevertheless, a complete view on the physical examination required the inclusion of both exact matches and terminology similarities. This study revealed that a core set of items representing the physical examination templates can be generated when the analysis takes into account not only exact matches but also terminology

  7. CPU and GPU (Cuda Template Matching Comparison

    Directory of Open Access Journals (Sweden)

    Evaldas Borcovas

    2014-05-01

    Full Text Available Image processing, computer vision or other complicated opticalinformation processing algorithms require large resources. It isoften desired to execute algorithms in real time. It is hard tofulfill such requirements with single CPU processor. NVidiaproposed CUDA technology enables programmer to use theGPU resources in the computer. Current research was madewith Intel Pentium Dual-Core T4500 2.3 GHz processor with4 GB RAM DDR3 (CPU I, NVidia GeForce GT320M CUDAcompliable graphics card (GPU I and Intel Core I5-2500K3.3 GHz processor with 4 GB RAM DDR3 (CPU II, NVidiaGeForce GTX 560 CUDA compatible graphic card (GPU II.Additional libraries as OpenCV 2.1 and OpenCV 2.4.0 CUDAcompliable were used for the testing. Main test were made withstandard function MatchTemplate from the OpenCV libraries.The algorithm uses a main image and a template. An influenceof these factors was tested. Main image and template have beenresized and the algorithm computing time and performancein Gtpix/s have been measured. According to the informationobtained from the research GPU computing using the hardwarementioned earlier is till 24 times faster when it is processing abig amount of information. When the images are small the performanceof CPU and GPU are not significantly different. Thechoice of the template size makes influence on calculating withCPU. Difference in the computing time between the GPUs canbe explained by the number of cores which they have.

  8. Report Template

    DEFF Research Database (Denmark)

    Bjørn, Anders; Laurent, Alexis; Owsianiak, Mikołaj

    2018-01-01

    To ensure consistent reporting of life cycle assessment (LCA), we provide a report template. The report includes elements of an LCA study as recommended but the ILCD Handbook. Illustrative case study reported according to this template is presented in Chap. 39 ....

  9. Parallel-Bit Stream for Securing Iris Recognition

    OpenAIRE

    Elsayed Mostafa; Maher Mansour; Heba Saad

    2012-01-01

    Biometrics-based authentication schemes have usability advantages over traditional password-based authentication schemes. However, biometrics raises several privacy concerns, it has disadvantages comparing to traditional password in which it is not secured and non revocable. In this paper, we propose a fast method for securing revocable iris template using parallel-bit stream watermarking to overcome these problems. Experimental results prove that the proposed method has low computation time ...

  10. Understanding the general packing rearrangements required for successful template based modeling of protein structure from a CASP experiment.

    Science.gov (United States)

    Day, Ryan; Joo, Hyun; Chavan, Archana C; Lennox, Kristin P; Chen, Y Ann; Dahl, David B; Vannucci, Marina; Tsai, Jerry W

    2013-02-01

    As an alternative to the common template based protein structure prediction methods based on main-chain position, a novel side-chain centric approach has been developed. Together with a Bayesian loop modeling procedure and a combination scoring function, the Stone Soup algorithm was applied to the CASP9 set of template based modeling targets. Although the method did not generate as large of perturbations to the template structures as necessary, the analysis of the results gives unique insights into the differences in packing between the target structures and their templates. Considerable variation in packing is found between target and template structures even when the structures are close, and this variation is found due to 2 and 3 body packing interactions. Outside the inherent restrictions in packing representation of the PDB, the first steps in correctly defining those regions of variable packing have been mapped primarily to local interactions, as the packing at the secondary and tertiary structure are largely conserved. Of the scoring functions used, a loop scoring function based on water structure exhibited some promise for discrimination. These results present a clear structural path for further development of a side-chain centered approach to template based modeling. Copyright © 2012 Elsevier Ltd. All rights reserved.

  11. Binary gabor statistical features for palmprint template protection

    NARCIS (Netherlands)

    Mu, Meiru; Ruan, Qiuqi; Shao, X.; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.

    2012-01-01

    The biometric template protection system requires a highquality biometric channel and a well-designed error correction code (ECC). Due to the intra-class variations of biometric data, an efficient fixed-length binary feature extractor is required to provide a high-quality biometric channel so that

  12. Programmable imprint lithography template

    Science.gov (United States)

    Cardinale, Gregory F [Oakland, CA; Talin, Albert A [Livermore, CA

    2006-10-31

    A template for imprint lithography (IL) that reduces significantly template production costs by allowing the same template to be re-used for several technology generations. The template is composed of an array of spaced-apart moveable and individually addressable rods or plungers. Thus, the template can be configured to provide a desired pattern by programming the array of plungers such that certain of the plungers are in an "up" or actuated configuration. This arrangement of "up" and "down" plungers forms a pattern composed of protruding and recessed features which can then be impressed onto a polymer film coated substrate by applying a pressure to the template impressing the programmed configuration into the polymer film. The pattern impressed into the polymer film will be reproduced on the substrate by subsequent processing.

  13. Multi-template tensor-based morphometry: application to analysis of Alzheimer's disease.

    Science.gov (United States)

    Koikkalainen, Juha; Lötjönen, Jyrki; Thurfjell, Lennart; Rueckert, Daniel; Waldemar, Gunhild; Soininen, Hilkka

    2011-06-01

    In this paper methods for using multiple templates in tensor-based morphometry (TBM) are presented and compared to the conventional single-template approach. TBM analysis requires non-rigid registrations which are often subject to registration errors. When using multiple templates and, therefore, multiple registrations, it can be assumed that the registration errors are averaged and eventually compensated. Four different methods are proposed for multi-template TBM. The methods were evaluated using magnetic resonance (MR) images of healthy controls, patients with stable or progressive mild cognitive impairment (MCI), and patients with Alzheimer's disease (AD) from the ADNI database (N=772). The performance of TBM features in classifying images was evaluated both quantitatively and qualitatively. Classification results show that the multi-template methods are statistically significantly better than the single-template method. The overall classification accuracy was 86.0% for the classification of control and AD subjects, and 72.1% for the classification of stable and progressive MCI subjects. The statistical group-level difference maps produced using multi-template TBM were smoother, formed larger continuous regions, and had larger t-values than the maps obtained with single-template TBM. Copyright © 2011 Elsevier Inc. All rights reserved.

  14. Modeling IrisCode and its variants as convex polyhedral cones and its security implications.

    Science.gov (United States)

    Kong, Adams Wai-Kin

    2013-03-01

    IrisCode, developed by Daugman, in 1993, is the most influential iris recognition algorithm. A thorough understanding of IrisCode is essential, because over 100 million persons have been enrolled by this algorithm and many biometric personal identification and template protection methods have been developed based on IrisCode. This paper indicates that a template produced by IrisCode or its variants is a convex polyhedral cone in a hyperspace. Its central ray, being a rough representation of the original biometric signal, can be computed by a simple algorithm, which can often be implemented in one Matlab command line. The central ray is an expected ray and also an optimal ray of an objective function on a group of distributions. This algorithm is derived from geometric properties of a convex polyhedral cone but does not rely on any prior knowledge (e.g., iris images). The experimental results show that biometric templates, including iris and palmprint templates, produced by different recognition methods can be matched through the central rays in their convex polyhedral cones and that templates protected by a method extended from IrisCode can be broken into. These experimental results indicate that, without a thorough security analysis, convex polyhedral cone templates cannot be assumed secure. Additionally, the simplicity of the algorithm implies that even junior hackers without knowledge of advanced image processing and biometric databases can still break into protected templates and reveal relationships among templates produced by different recognition methods.

  15. METHOD FOR SECURITY SPECIFICATION SOFTWARE REQUIREMENTS AS A MEANS FOR IMPLEMENTING A SOFTWARE DEVELOPMENT PROCESS SECURE - MERSEC

    Directory of Open Access Journals (Sweden)

    Castro Mecías, L.T.

    2015-06-01

    Full Text Available Often security incidents that have the object or use the software as a means of causing serious damage and legal, economic consequences, etc. Results of a survey by Kaspersky Lab reflectvulnerabilities in software are the main cause of security incidents in enterprises, the report shows that 85% of them have reported security incidents and vulnerabilities in software are the main reason is further estimated that incidents can cause significant losses estimated from 50,000 to $ 649.000. (1 In this regard academic and industry research focuses on proposals based on reducing vulnerabilities and failures of technology, with a positive influence on how the software is developed. A development process for improved safety practices and should include activities from the initial phases of the software; so that security needs are identified, manage risk and appropriate measures are implemented. This article discusses a method of analysis, acquisition and requirements specification of the software safety analysis on the basis of various proposals and deficiencies identified from participant observation in software development teams. Experiments performed using the proposed yields positive results regarding the reduction of security vulnerabilities and compliance with the safety objectives of the software.

  16. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    Science.gov (United States)

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  17. The histone chaperone TAF-I/SET/INHAT is required for transcription in vitro of chromatin templates.

    Science.gov (United States)

    Gamble, Matthew J; Erdjument-Bromage, Hediye; Tempst, Paul; Freedman, Leonard P; Fisher, Robert P

    2005-01-01

    To uncover factors required for transcription by RNA polymerase II on chromatin, we fractionated a mammalian cell nuclear extract. We identified the histone chaperone TAF-I (also known as INHAT [inhibitor of histone acetyltransferase]), which was previously proposed to repress transcription, as a potent activator of chromatin transcription responsive to the vitamin D3 receptor or to Gal4-VP16. TAF-I associates with chromatin in vitro and can substitute for the related protein NAP-1 in assembling chromatin onto cloned DNA templates in cooperation with the remodeling enzyme ATP-dependent chromatin assembly factor (ACF). The chromatin assembly and transcriptional activation functions are distinct, however, and can be dissociated temporally. Efficient transcription of chromatin assembled with TAF-I still requires the presence of TAF-I during the polymerization reaction. Conversely, TAF-I cannot stimulate transcript elongation when added after the other factors necessary for assembly of a preinitiation complex on naked DNA. Thus, TAF-I is required to facilitate transcription at a step after chromatin assembly but before transcript elongation.

  18. An analysis of Technical Security Control Requirements For Digital I and C Systems in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Song, Jaegu; Lee, Jungwoon; Park, Geeyong; Kwon, Keechoon; Lee, Dongyoung; Lee, Cheolkwon

    2013-01-01

    Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system

  19. An analysis of Technical Security Control Requirements For Digital I and C Systems in Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Song, Jaegu; Lee, Jungwoon; Park, Geeyong; Kwon, Keechoon; Lee, Dongyoung; Lee, Cheolkwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2013-10-15

    Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.

  20. 78 FR 78470 - Registration and Financial Security Requirements for Freight Forwarders; International...

    Science.gov (United States)

    2013-12-26

    ...). See, e.g., Motor Carrier Financial Information Reporting Requirements-Request for Public Comments, 68...] Registration and Financial Security Requirements for Freight Forwarders; International Association of Movers... FURTHER INFORMATION CONTACT: Mr. Thomas Yager, Chief of Driver and Carrier Operations, (202) 366-4001 or...

  1. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  2. Requirements for Secure Logging of Decentralized Cross-Organizational Workflow Executions

    NARCIS (Netherlands)

    Wombacher, Andreas; Wieringa, Roelf J.; Jonker, Willem; Knezevic, P.; Pokraev, S.; meersman, R; Tari, Z; herrero, p; Méndez, G.; Cavedon, L.; Martin, D.; Hinze, A.; Buchanan, G.

    2005-01-01

    The control of actions performed by parties involved in a decentralized cross-organizational workflow is done by several independent workflow engines. Due to the lack of a centralized coordination control, an auditing is required which supports a reliable and secure detection of malicious actions

  3. The Design of a Templated C++ Small Vector Class for Numerical Computing

    Science.gov (United States)

    Moran, Patrick J.

    2000-01-01

    We describe the design and implementation of a templated C++ class for vectors. The vector class is templated both for vector length and vector component type; the vector length is fixed at template instantiation time. The vector implementation is such that for a vector of N components of type T, the total number of bytes required by the vector is equal to N * size of (T), where size of is the built-in C operator. The property of having a size no bigger than that required by the components themselves is key in many numerical computing applications, where one may allocate very large arrays of small, fixed-length vectors. In addition to the design trade-offs motivating our fixed-length vector design choice, we review some of the C++ template features essential to an efficient, succinct implementation. In particular, we highlight some of the standard C++ features, such as partial template specialization, that are not supported by all compilers currently. This report provides an inventory listing the relevant support currently provided by some key compilers, as well as test code one can use to verify compiler capabilities.

  4. Cloning nanocrystal morphology with soft templates

    Science.gov (United States)

    Thapa, Dev Kumar; Pandey, Anshu

    2016-08-01

    In most template directed preparative methods, while the template decides the nanostructure morphology, the structure of the template itself is a non-general outcome of its peculiar chemistry. Here we demonstrate a template mediated synthesis that overcomes this deficiency. This synthesis involves overgrowth of silica template onto a sacrificial nanocrystal. Such templates are used to copy the morphologies of gold nanorods. After template overgrowth, gold is removed and silver is regrown in the template cavity to produce a single crystal silver nanorod. This technique allows for duplicating existing nanocrystals, while also providing a quantifiable breakdown of the structure - shape interdependence.

  5. Computing layouts with deformable templates

    KAUST Repository

    Peng, Chi-Han

    2014-07-22

    In this paper, we tackle the problem of tiling a domain with a set of deformable templates. A valid solution to this problem completely covers the domain with templates such that the templates do not overlap. We generalize existing specialized solutions and formulate a general layout problem by modeling important constraints and admissible template deformations. Our main idea is to break the layout algorithm into two steps: a discrete step to lay out the approximate template positions and a continuous step to refine the template shapes. Our approach is suitable for a large class of applications, including floorplans, urban layouts, and arts and design. Copyright © ACM.

  6. Computing layouts with deformable templates

    KAUST Repository

    Peng, Chi-Han; Yang, Yongliang; Wonka, Peter

    2014-01-01

    In this paper, we tackle the problem of tiling a domain with a set of deformable templates. A valid solution to this problem completely covers the domain with templates such that the templates do not overlap. We generalize existing specialized solutions and formulate a general layout problem by modeling important constraints and admissible template deformations. Our main idea is to break the layout algorithm into two steps: a discrete step to lay out the approximate template positions and a continuous step to refine the template shapes. Our approach is suitable for a large class of applications, including floorplans, urban layouts, and arts and design. Copyright © ACM.

  7. 10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.

    Science.gov (United States)

    2010-01-01

    ... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license... 10 Energy 2 2010-01-01 2010-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF...

  8. NERSC Cyber Security Challenges That Require DOE Development andSupport

    Energy Technology Data Exchange (ETDEWEB)

    Draney, Brent; Campbell, Scott; Walter, Howard

    2007-01-16

    Traditional security approaches do not adequately addressall the requirements of open, scientific computing facilities. Many ofthe methods used for more restricted environments, including almost allcorporate/commercial systems, do not meet the needs of today's science.Use of only the available "state of the practice" commercial methods willhave adverse impact on the ability of DOE to accomplish its sciencegoals, and impacts the productivity of the DOE Science community. Inparticular, NERSC and other high performance computing (HPC) centers havespecial security challenges that are unlikely to be met unless DOE fundsdevelopment and support of reliable and effective tools designed to meetthe cyber security needs of High Performance Science. The securitychallenges facing NERSC can be collected into three basic problem sets:network performance and dynamics, application complexity and diversity,and a complex user community that can have transient affiliations withactual institutions. To address these problems, NERSC proposes thefollowing four general solutions: auditing user and system activityacross sites; firewall port configuration in real time;cross-site/virtual organization identity management and access control;and detecting security issues in application middleware. Solutions arealsoproposed for three general long term issues: data volume,application complexity, and information integration.

  9. Analysis of impact of noncompliance with physical-security requirements at nuclear facilities

    International Nuclear Information System (INIS)

    Green, J.N.

    1982-03-01

    Inspectors are required to analyze the impact of instances of noncompliance with physical security requirements at licensed nuclear facilities. A scoring procedure for components and a method for evaluating the effectiveness of the subsystems involved are proposed to reinforce an inspector's judgment about the remaining level of safeguards

  10. A Deformable Template Model, with Special Reference to Elliptical Templates

    DEFF Research Database (Denmark)

    Hobolth, Asger; Pedersen, Jan; Jensen, Eva Bjørn Vedel

    2002-01-01

    This paper suggests a high-level continuous image model for planar star-shaped objects. Under this model, a planar object is a stochastic deformation of a star-shaped template. The residual process, describing the difference between the radius-vector function of the template and the object...

  11. Use of a structured template to facilitate practice-based learning and improvement projects.

    Science.gov (United States)

    McClain, Elizabeth K; Babbott, Stewart F; Tsue, Terance T; Girod, Douglas A; Clements, Debora; Gilmer, Lisa; Persons, Diane; Unruh, Greg

    2012-06-01

    The Accreditation Council for Graduate Medical Education (ACGME) requires residency programs to meet and demonstrate outcomes across 6 competencies. Measuring residents' competency in practice-based learning and improvement (PBLI) is particularly challenging. We developed an educational tool to meet ACGME requirements for PBLI. The PBLI template helped programs document quality improvement (QI) projects and supported increased scholarly activity surrounding PBLI learning. We reviewed program requirements for 43 residency and fellowship programs and identified specific PBLI requirements for QI activities. We also examined ACGME Program Information Form responses on PBLI core competency questions surrounding QI projects for program sites visited in 2008-2009. Data were integrated by a multidisciplinary committee to develop a peer-protected PBLI template guiding programs through process, documentation, and evaluation of QI projects. All steps were reviewed and approved through our GME Committee structure. An electronic template, companion checklist, and evaluation form were developed using identified project characteristics to guide programs through the PBLI process and facilitate documentation and evaluation of the process. During a 24 month period, 27 programs have completed PBLI projects, and 15 have reviewed the template with their education committees, but have not initiated projects using the template. The development of the tool generated program leaders' support because the tool enhanced the ability to meet program-specific objectives. The peer-protected status of this document for confidentiality and from discovery has been beneficial for program usage. The document aggregates data on PBLI and QI initiatives, offers opportunities to increase scholarship in QI, and meets the ACGME goal of linking measures to outcomes important to meeting accreditation requirements at the program and institutional level.

  12. Proposing a Holistic Model for Formulating the Security Requirements of e-learning based on Stakeholders’ Point of Veiw

    Directory of Open Access Journals (Sweden)

    Abouzar Arabsorkhi Mishabi

    2016-03-01

    Full Text Available Development of e-learning applications and services in the context of information and communication networks –beside qualitative and quantitative improvement in the scope and range of services they provide – has increased veriety of threats which are emerged from these networks and telecommunications infrastructure. This kind of issue have mad the effective and accurate analysing of security issues nessesary to managers and decision makers. Accordingly, in this study, using findings of other studies in the field of e-learning security, using methasyntesis, attempted to define a holistic model for classification and organization of security requirements. A structure that defines the origin of security requirements of e-learning and rolplays as a reference for formulating security requirements for this area.

  13. Functional Programming with C++ Template Metaprograms

    Science.gov (United States)

    Porkoláb, Zoltán

    Template metaprogramming is an emerging new direction of generative programming. With the clever definitions of templates we can force the C++ compiler to execute algorithms at compilation time. Among the application areas of template metaprograms are the expression templates, static interface checking, code optimization with adaption, language embedding and active libraries. However, as template metaprogramming was not an original design goal, the C++ language is not capable of elegant expression of metaprograms. The complicated syntax leads to the creation of code that is hard to write, understand and maintain. Although template metaprogramming has a strong relationship with functional programming, this is not reflected in the language syntax and existing libraries. In this paper we give a short and incomplete introduction to C++ templates and the basics of template metaprogramming. We will enlight the role of template metaprograms, and some important and widely used idioms. We give an overview of the possible application areas as well as debugging and profiling techniques. We suggest a pure functional style programming interface for C++ template metaprograms in the form of embedded Haskell code which is transformed to standard compliant C++ source.

  14. Safety and security risk assessments--now demystified!

    Science.gov (United States)

    White, Donald E

    2011-01-01

    Safety/security risk assessments no longer need to spook nor baffle healthcare safety/security managers. This grid template provides at-at-glance quick lookup of the possible threats, the affected people and things, a priority ranking of these risks, and a workable solution for each risk. Using the standard document, spreadsheet, or graphics software already available on your computer, you can easily use a scientific method to produce professional looking risk assessments that get quickly understood by both senior managers and first responders alike!

  15. A TEMPLATE FOR ONLINE HOMEWORK: FRANKENSTEIN'S MONSTER OR ROBO TA?

    OpenAIRE

    Dahlgran, Roger A.

    2002-01-01

    This paper describes the programming procedures required to implement online homework and evaluates the application of these procedures based on use in the author's course. The description of the procedures utilizes a template showing two representative applications from the author's introductory econometrics course. In one, the students are to collect and record data and in the other, students are to perform econometric analysis on the data. The web address for the template is arec.arizona.e...

  16. Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    Directory of Open Access Journals (Sweden)

    Rohit M Thanki

    2016-08-01

    Full Text Available Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to secure vulnerable point like protection of biometric templates at the communication channel of biometric authentication systems. A compressive sensing theory procedure is used for generation of sparse information on watermark biometric data using detail wavelet coefficients. Then sparse information of watermark biometric data is embedded into DCT coefficients of host biometric data. This proposed scheme is robust to common signal processing and geometric attacks like JPEG compression, adding noise, filtering, and cropping, histogram equalization. This proposed scheme has more advantages and high quality measures compared to existing schemes in the literature.

  17. Templates, Numbers & Watercolors.

    Science.gov (United States)

    Clemesha, David J.

    1990-01-01

    Describes how a second-grade class used large templates to draw and paint five-digit numbers. The lesson integrated artistic knowledge and vocabulary with their mathematics lesson in place value. Students learned how draftspeople use templates, and they studied number paintings by Charles Demuth and Jasper Johns. (KM)

  18. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  19. Dye-sensitized PS-b-P2VP-templated nickel oxide films for photoelectrochemical applications

    OpenAIRE

    Massin, Julien; Bräutigam, Maximilian; Kaeffer, Nicolas; Queyriaux, Nicolas; Field, Martin J.; Schacher, Felix H.; Popp, Jürgen; Chavarot-Kerlidou, Murielle; Dietzek, Benjamin; Artero, Vincent

    2015-01-01

    Moving from homogeneous water-splitting photocatalytic systems to photoelectrochemical devices requires the preparation and evaluation of novel p-type transparent conductive photoelectrode substrates. We report here on the sensitization of polystyrene-block-poly-(2-vinylpyridine) (PS-b-P2VP) diblock copolymer-templated NiO films with an organic push–pull dye. The potential of these new templated NiO film preparations for photoelectrochemical applications is compared with NiO material template...

  20. 7 CFR 764.355 - Security requirements.

    Science.gov (United States)

    2010-01-01

    ... through the use of marketing contracts, hedging, options, or other revenue protection mechanisms, and includes a marketing plan or similar risk management practice; (3) The applicant has had positive net cash... applicant has pledged as security for the loan all available personal and business security, except as...

  1. Design reflowable digital book template

    Science.gov (United States)

    Prasetya, Didik Dwi; Widiyaningtyas, Triyanna; Arifin, M. Zainal; Wahyu Sakti G., I.

    2017-09-01

    Electronic books (e-books or digital books) increasingly in demand and continue to grow in the form of future books. One of the standard format electronic books that potential is EPUB (electronic publication) published by the International Digital Publishing Forum (IDPF). This digital book has major advantages are able to provide interactive and reflowable content, which are not found in another book format, such as PDF. Reflowable content allows the book can be accessed through a variety of reader device, like desktop and mobile with a fit and comfort view. However, because the generating process of an EPUB digital book is not as easy a PDF, so this format is less popular. Therefore, in order to help overcome the existing problems, this paper develops digital reflowable text book templates to support electronic learning, especially in Indonesia. This template can be used by anyone to produce a standard digital book quickly and easily without requiring additional specialized knowledge.

  2. Multi-template polymerase chain reaction.

    Science.gov (United States)

    Kalle, Elena; Kubista, Mikael; Rensing, Christopher

    2014-12-01

    PCR is a formidable and potent technology that serves as an indispensable tool in a wide range of biological disciplines. However, due to the ease of use and often lack of rigorous standards many PCR applications can lead to highly variable, inaccurate, and ultimately meaningless results. Thus, rigorous method validation must precede its broad adoption to any new application. Multi-template samples possess particular features, which make their PCR analysis prone to artifacts and biases: multiple homologous templates present in copy numbers that vary within several orders of magnitude. Such conditions are a breeding ground for chimeras and heteroduplexes. Differences in template amplification efficiencies and template competition for reaction compounds undermine correct preservation of the original template ratio. In addition, the presence of inhibitors aggravates all of the above-mentioned problems. Inhibitors might also have ambivalent effects on the different templates within the same sample. Yet, no standard approaches exist for monitoring inhibitory effects in multitemplate PCR, which is crucial for establishing compatibility between samples.

  3. Report: Fiscal Year 2010 Federal Information Security Management Act Report

    Science.gov (United States)

    Report #11-P-0017, November 16, 2010. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2010 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  4. A template-based approach for responsibility management in executable business processes

    Science.gov (United States)

    Cabanillas, Cristina; Resinas, Manuel; Ruiz-Cortés, Antonio

    2018-05-01

    Process-oriented organisations need to manage the different types of responsibilities their employees may have w.r.t. the activities involved in their business processes. Despite several approaches provide support for responsibility modelling, in current Business Process Management Systems (BPMS) the only responsibility considered at runtime is the one related to performing the work required for activity completion. Others like accountability or consultation must be implemented by manually adding activities in the executable process model, which is time-consuming and error-prone. In this paper, we address this limitation by enabling current BPMS to execute processes in which people with different responsibilities interact to complete the activities. We introduce a metamodel based on Responsibility Assignment Matrices (RAM) to model the responsibility assignment for each activity, and a flexible template-based mechanism that automatically transforms such information into BPMN elements, which can be interpreted and executed by a BPMS. Thus, our approach does not enforce any specific behaviour for the different responsibilities but new templates can be modelled to specify the interaction that best suits the activity requirements. Furthermore, libraries of templates can be created and reused in different processes. We provide a reference implementation and build a library of templates for a well-known set of responsibilities.

  5. What Isn't Working and New Requirements. The Need to Harmonize Safety and Security Requirements

    International Nuclear Information System (INIS)

    Flory, D.

    2011-01-01

    The year 2011 marks the 50th anniversary of the first IAEA regulations governing the transport of radioactive material. However transport safety at the IAEA obviously predates this, since the regulations took time to develop. In 1957, GC. 1/1 already states: 'The Agency should undertake studies with a view to the establishment of regulations relating to the international transportation of radioactive materials. ...'. And goes further: 'The transport of radioisotopes and radiation sources has brought to light many problems and involves the need for uniform packaging and shipping regulations ... facilitate the acceptance of such materials by sea and air carriers'. This conference reiterates the challenge given then through the sub-title 'The next fifty years - Creating a Safe, Secure and Sustainable Framework'. Looking back, we can see that the sustainable framework was a goal in 1957, where radioactive material could be transported should it be desired. Since these early days we have added to safety the need to ensure security. However we still see the same calls today to eradicate denial of shipment, which might suggest we have not progressed. But the picture today is very different - we have today well established requirements for safe transport of radioactive material, and the recommendations for security in transport are coming of age for all radioactive materials. The outstanding issue would seem to be harmonisation, not just between safety and security in IAEA documents, but also harmonisation between Member States.

  6. Emergency department documentation templates: variability in template selection and association with physical examination and test ordering in dizziness presentations

    Directory of Open Access Journals (Sweden)

    Meurer William J

    2011-03-01

    Full Text Available Abstract Background Clinical documentation systems, such as templates, have been associated with process utilization. The T-System emergency department (ED templates are widely used but lacking are analyses of the templates association with processes. This system is also unique because of the many different template options available, and thus the selection of the template may also be important. We aimed to describe the selection of templates in ED dizziness presentations and to investigate the association between items on templates and process utilization. Methods Dizziness visits were captured from a population-based study of EDs that use documentation templates. Two relevant process outcomes were assessed: head computerized tomography (CT scan and nystagmus examination. Multivariable logistic regression was used to estimate the probability of each outcome for patients who did or did not receive a relevant-item template. Propensity scores were also used to adjust for selection effects. Results The final cohort was 1,485 visits. Thirty-one different templates were used. Use of a template with a head CT item was associated with an increase in the adjusted probability of head CT utilization from 12.2% (95% CI, 8.9%-16.6% to 29.3% (95% CI, 26.0%-32.9%. The adjusted probability of documentation of a nystagmus assessment increased from 12.0% (95%CI, 8.8%-16.2% when a nystagmus-item template was not used to 95.0% (95% CI, 92.8%-96.6% when a nystagmus-item template was used. The associations remained significant after propensity score adjustments. Conclusions Providers use many different templates in dizziness presentations. Important differences exist in the various templates and the template that is used likely impacts process utilization, even though selection may be arbitrary. The optimal design and selection of templates may offer a feasible and effective opportunity to improve care delivery.

  7. RiskREP: Risk-Based Security Requirements Elicitation and Prioritization

    OpenAIRE

    Herrmann, Andrea; Morali, A.; Etalle, Sandro; Wieringa, Roelf J.; Niedrite, Laila; Strazdina, Renate; Wangler, Benkt

    2011-01-01

    Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security‿ but need to be able to justify their security investment plans. In this paper, we present a Risk-Based Requirements Prioritization method (RiskREP) that extends misuse case-based methods with IT architecture based risk assessment and countermeasure definition and prioritization. Countermeasure prioritizati...

  8. Theft of Virtual Property — Towards Security Requirements for Virtual Worlds

    Science.gov (United States)

    Beyer, Anja

    The article is focused to introduce the topic of information technology security for Virtual Worlds to a security experts’ audience. Virtual Worlds are Web 2.0 applications where the users cruise through the world with their individually shaped avatars to find either amusement, challenges or the next best business deal. People do invest a lot of time but beyond they invest in buying virtual assets like fantasy witcheries, wepaons, armour, houses, clothes,...etc with the power of real world money. Although it is called “virtual” (which is often put on the same level as “not existent”) there is a real value behind it. In November 2007 dutch police arrested a seventeen years old teenager who was suspicted to have stolen virtual items in a Virtual World called Habbo Hotel [Reuters07]. In order to successfully provide security mechanisms into Virtual Worlds it is necessarry to fully understand the domain for which the security mechansims are defined. As Virtual Worlds must be clasified into the domain of Social Software the article starts with an overview of how to understand Web 2.0 and gives a short introduction to Virtual Worlds. The article then provides a consideration of assets of Virtual Worlds participants, describes how these assets can be threatened and gives an overview of appopriate security requirements and completes with an outlook of possible countermeasures.

  9. Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    OpenAIRE

    Rohit M Thanki; Ved Vyas Dwivedi; Komal Borisagar

    2016-01-01

    Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to sec...

  10. What Isn’t Working and New Requirements. The Need to Harmonize Safety and Security Requirements

    International Nuclear Information System (INIS)

    Flory, D.

    2016-01-01

    This paper sets out the key issues for consideration at the transport conference. It will introduce each of the aspects of the framework for safe, secure and sustainable transport, building on the description of the existing situation presented in Session 1A. It will discuss purpose of the IAEA framework, and examine the scientific basis, the IAEA recommendations and requirements, the UN interface, the use of conventions, national implementation, industry compliance, communication and information, response and restoration. It will also look at the activities and related requirements outside of transport which could influence the transport frameworks either in a positive or negative manner. (author)

  11. Multi-template polymerase chain reaction

    Directory of Open Access Journals (Sweden)

    Elena Kalle

    2014-12-01

    Full Text Available PCR is a formidable and potent technology that serves as an indispensable tool in a wide range of biological disciplines. However, due to the ease of use and often lack of rigorous standards many PCR applications can lead to highly variable, inaccurate, and ultimately meaningless results. Thus, rigorous method validation must precede its broad adoption to any new application. Multi-template samples possess particular features, which make their PCR analysis prone to artifacts and biases: multiple homologous templates present in copy numbers that vary within several orders of magnitude. Such conditions are a breeding ground for chimeras and heteroduplexes. Differences in template amplification efficiencies and template competition for reaction compounds undermine correct preservation of the original template ratio. In addition, the presence of inhibitors aggravates all of the above-mentioned problems. Inhibitors might also have ambivalent effects on the different templates within the same sample. Yet, no standard approaches exist for monitoring inhibitory effects in multitemplate PCR, which is crucial for establishing compatibility between samples.

  12. Template Authoring Environment for the Automatic Generation of Narrative Content

    Science.gov (United States)

    Caropreso, Maria Fernanda; Inkpen, Diana; Keshtkar, Fazel; Khan, Shahzad

    2012-01-01

    Natural Language Generation (NLG) systems can make data accessible in an easily digestible textual form; but using such systems requires sophisticated linguistic and sometimes even programming knowledge. We have designed and implemented an environment for creating and modifying NLG templates that requires no programming knowledge, and can operate…

  13. Hard template synthesis of metal nanowires

    Science.gov (United States)

    Kawamura, Go; Muto, Hiroyuki; Matsuda, Atsunori

    2014-11-01

    Metal nanowires (NWs) have attracted much attention because of their high electron conductivity, optical transmittance and tunable magnetic properties. Metal NWs have been synthesized using soft templates such as surface stabilizing molecules and polymers, and hard templates such as anodic aluminum oxide, mesoporous oxide, carbon nanotubes. NWs prepared from hard templates are composites of metals and the oxide/carbon matrix. Thus, selecting appropriate elements can simplify the production of composite devices. The resulting NWs are immobilized and spatially arranged, as dictated by the ordered porous structure of the template. This avoids the NWs from aggregating, which is common for NWs prepared with soft templates in solution. Herein, the hard template synthesis of metal NWs is reviewed, and the resulting structures, properties and potential applications are discussed.

  14. Iris Template Protection Based on Local Ranking

    Directory of Open Access Journals (Sweden)

    Dongdong Zhao

    2018-01-01

    Full Text Available Biometrics have been widely studied in recent years, and they are increasingly employed in real-world applications. Meanwhile, a number of potential threats to the privacy of biometric data arise. Iris template protection demands that the privacy of iris data should be protected when performing iris recognition. According to the international standard ISO/IEC 24745, iris template protection should satisfy the irreversibility, revocability, and unlinkability. However, existing works about iris template protection demonstrate that it is difficult to satisfy the three privacy requirements simultaneously while supporting effective iris recognition. In this paper, we propose an iris template protection method based on local ranking. Specifically, the iris data are first XORed (Exclusive OR operation with an application-specific string; next, we divide the results into blocks and then partition the blocks into groups. The blocks in each group are ranked according to their decimal values, and original blocks are transformed to their rank values for storage. We also extend the basic method to support the shifting strategy and masking strategy, which are two important strategies for iris recognition. We demonstrate that the proposed method satisfies the irreversibility, revocability, and unlinkability. Experimental results on typical iris datasets (i.e., CASIA-IrisV3-Interval, CASIA-IrisV4-Lamp, UBIRIS-V1-S1, and MMU-V1 show that the proposed method could maintain the recognition performance while protecting the privacy of iris data.

  15. iTemplate: A template-based eye movement data analysis approach.

    Science.gov (United States)

    Xiao, Naiqi G; Lee, Kang

    2018-02-08

    Current eye movement data analysis methods rely on defining areas of interest (AOIs). Due to the fact that AOIs are created and modified manually, variances in their size, shape, and location are unavoidable. These variances affect not only the consistency of the AOI definitions, but also the validity of the eye movement analyses based on the AOIs. To reduce the variances in AOI creation and modification and achieve a procedure to process eye movement data with high precision and efficiency, we propose a template-based eye movement data analysis method. Using a linear transformation algorithm, this method registers the eye movement data from each individual stimulus to a template. Thus, users only need to create one set of AOIs for the template in order to analyze eye movement data, rather than creating a unique set of AOIs for all individual stimuli. This change greatly reduces the error caused by the variance from manually created AOIs and boosts the efficiency of the data analysis. Furthermore, this method can help researchers prepare eye movement data for some advanced analysis approaches, such as iMap. We have developed software (iTemplate) with a graphic user interface to make this analysis method available to researchers.

  16. 48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...

  17. A high throughput system for the preparation of single stranded templates grown in microculture.

    Science.gov (United States)

    Kolner, D E; Guilfoyle, R A; Smith, L M

    1994-01-01

    A high throughput system for the preparation of single stranded M13 sequencing templates is described. Supernatants from clones grown in 48-well plates are treated with a chaotropic agent to dissociate the phage coat protein. Using a semi-automated cell harvester, the free nucleic acid is bound to a glass fiber filter in the presence of chaotrope and then washed with ethanol by aspiration. Individual glass fiber discs are punched out on the cell harvester and dried briefly. The DNA samples are then eluted in water by centrifugation. The processing time from 96 microcultures to sequence quality templates is approximately 1 hr. Assuming the ability to sequence 400 bases per clone, a 0.5 megabase per day genome sequencing facility will require 6250 purified templates a week. Toward accomplishing this goal we have developed a procedure which is a modification of a method that uses a chaotropic agent and glass fiber filter (Kristensen et al., 1987). By exploiting the ability of a cell harvester to uniformly aspirate and wash 96 samples, a rapid system for high quality template preparation has been developed. Other semi-automated systems for template preparation have been developed using commercially available robotic workstations like the Biomek (Mardis and Roe, 1989). Although minimal human intervention is required, processing time is at least twice as long. Custom systems based on paramagnetic beads (Hawkins et al., 1992) produce DNA in insufficient quantity for direct sequencing and therefore require cycle sequencing. These systems require custom programing, have a fairly high initial cost and have not proven to be as fast as the method reported here.

  18. Hard template synthesis of metal nanowires

    Directory of Open Access Journals (Sweden)

    Go eKawamura

    2014-11-01

    Full Text Available Metal nanowires (NWs have attracted much attention because of their high electron conductivity, optical transmittance and tunable magnetic properties. Metal NWs have been synthesized using soft templates such as surface stabilizing molecules and polymers, and hard templates such as anodic aluminum oxide, mesoporous oxide, carbon nanotubes. NWs prepared from hard templates are composites of metals and the oxide/carbon matrix. Thus, selecting appropriate elements can simplify the production of composite devices. The resulting NWs are immobilized and spatially arranged, as dictated by the ordered porous structure of the template. This avoids the NWs from aggregating, which is common for NWs prepared with soft templates in solution. Herein, the hard template synthesis of metal NWs is reviewed, and the resulting structures, properties and potential applications are discussed.

  19. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...

  20. Knowledge Base for an Intelligent System in order to Identify Security Requirements for Government Agencies Software Projects

    Directory of Open Access Journals (Sweden)

    Adán Beltrán G.

    2016-01-01

    Full Text Available It has been evidenced that one of the most common causes in the failure of software security is the lack of identification and specification of requirements for information security, it is an activity with an insufficient importance in the software development or software acquisition We propose the knowledge base of CIBERREQ. CIBERREQ is an intelligent knowledge-based system used for the identification and specification of security requirements in the software development cycle or in the software acquisition. CIBERREQ receives functional software requirements written in natural language and produces non-functional security requirements through a semi-automatic process of risk management. The knowledge base built is formed by an ontology developed collaboratively by experts in information security. In this process has been identified six types of assets: electronic data, physical data, hardware, software, person and service; as well as six types of risk: competitive disadvantage, loss of credibility, economic risks, strategic risks, operational risks and legal sanctions. In addition there are defined 95 vulnerabilities, 24 threats, 230 controls, and 515 associations between concepts. Additionally, automatic expansion was used with Wikipedia for the asset types Software and Hardware, obtaining 7125 and 5894 software and hardware subtypes respectively, achieving thereby an improvement of 10% in the identification of the information assets candidates, one of the most important phases of the proposed system.

  1. Report: FY 2007 FISMA Report: Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2007-S-00003, September 25, 2007. This is the Office of Inspector General’s Fiscal Year 2007 Federal Information Security Management Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  2. Modeling the Non-functional Requirements in the Context of Usability, Performance, Safety and Security

    OpenAIRE

    Sadiq, Mazhar

    2007-01-01

    Requirement engineering is the most significant part of the software development life cycle. Until now great emphasis has been put on the maturity of the functional requirements. But with the passage of time it reveals that the success of software development does not only pertain to the functional requirements rather non-functional requirements should also be taken into consideration. Among the non-functional requirements usability, performance, safety and security are considered important. ...

  3. Analysis of the security and privacy requirements of cloud-based electronic health records systems.

    Science.gov (United States)

    Rodrigues, Joel J P C; de la Torre, Isabel; Fernández, Gonzalo; López-Coronado, Miguel

    2013-08-21

    The Cloud Computing paradigm offers eHealth systems the opportunity to enhance the features and functionality that they offer. However, moving patients' medical information to the Cloud implies several risks in terms of the security and privacy of sensitive health records. In this paper, the risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed. To protect the confidentiality of patient information and facilitate the process, some suggestions for health care providers are made. Moreover, security issues that Cloud service providers should address in their platforms are considered. To show that, before moving patient health records to the Cloud, security and privacy concerns must be considered by both health care providers and Cloud service providers. Security requirements of a generic Cloud service provider are analyzed. To study the latest in Cloud-based computing solutions, bibliographic material was obtained mainly from Medline sources. Furthermore, direct contact was made with several Cloud service providers. Some of the security issues that should be considered by both Cloud service providers and their health care customers are role-based access, network security mechanisms, data encryption, digital signatures, and access monitoring. Furthermore, to guarantee the safety of the information and comply with privacy policies, the Cloud service provider must be compliant with various certifications and third-party requirements, such as SAS70 Type II, PCI DSS Level 1, ISO 27001, and the US Federal Information Security Management Act (FISMA). Storing sensitive information such as EHRs in the Cloud means that precautions must be taken to ensure the safety and confidentiality of the data. A relationship built on trust with the Cloud service provider is essential to ensure a transparent process. Cloud service providers must make certain that all security mechanisms are in place to avoid unauthorized access

  4. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  5. Customized surgical template fabrication under biomechanical consideration by integrating CBCT image, CAD system and finite element analysis.

    Science.gov (United States)

    Yu, Jian-Hong; Wang, Yu-Tzu; Lin, Chun-Li

    2018-01-30

    This study developed a customized surgical template under mechanical consideration for molar intrusion. Two finite element (FE) models were analyzed for the primary stability under 100 gf traction forces with one mini-screw inserted at the buccal side in horizontal and another in palatal side with two optional positions at 60° (P60) or 15° (P15) angles with inclination toward the molar occlusal surface. The surgical template was generated using rapid prototyping (RP) printing for the clinical application based on improved primarily stability model. The surrounding bone strains for models P15 and P60 were far lower than the bone remodeling critical value. Model P60 presented much lower micro-motion in the screw/bone interface and the screw head displacement than those values in model P15. Using FE analysis for biomechanical evaluation and combining with CT image, image superimposed method and CAD technique can fabricate accuracy/security customized surgical template for mini-screws with better primary stability.

  6. 77 FR 61771 - Facility Security Officer Training Requirements

    Science.gov (United States)

    2012-10-11

    ... following: (1) Draft model FSO training course; (2) Computer-based training and distance learning; (3... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... Security Officer training program, with the primary focus on developing the curriculum for such a program...

  7. Design impacts of safeguards and security requirements for a US MOX fuel fabrication facility

    International Nuclear Information System (INIS)

    Erkkila, B.H.; Rinard, P.M.; Thomas, K.E.; Zack, N.R.; Jaeger, C.D.

    1998-01-01

    The disposition of plutonium that is no longer required for the nation's defense is being structured to mitigate risks associated with the material's availability. In the 1997 Record of Decision, the US Government endorsed a dual-track approach that could employ domestic commercial reactors to effect the disposition of a portion of the plutonium in the form of mixed oxide (MOX) reactor fuels. To support this decision, the Office of Materials Disposition requested preparation of a document that would review US requirements for safeguards and security and describe their impact on the design of a MOX fuel fabrication facility. The intended users are potential bidders for the construction and operation of the facility. The document emphasizes the relevant DOE Orders but also considers the Nuclear Regulatory Commission (NRC) requirements. Where they are significantly different, the authors have highlighted this difference and provided guidance on the impact to the facility design. Finally, the impacts of International Atomic Energy Agency (IAEA) safeguards on facility design are discussed. Security and materials control and accountability issues that influence facility design are emphasized in each area of discussion. This paper will discuss the prepared report and the issues associated with facility design for implementing practical, modern safeguards and security systems into a new MOX fuel fabrication facility

  8. Development of an adaptive sawmill- flow simulator template for ...

    African Journals Online (AJOL)

    Development of an adaptive sawmill- flow simulator template for predicting results ... including: raw materials, personnel, equipment, product mix, product quality, orders ... Profitable sawing of small diameter logs requires high speed processing, use of ... performance measures due to changes in mill layout, raw material and ...

  9. 17 CFR 41.21 - Requirements for underlying securities.

    Science.gov (United States)

    2010-04-01

    ... underlying security is: (i) Common stock, (ii) Such other equity security as the Commission and the SEC jointly deem appropriate, or (iii) A note, bond, debenture, or evidence of indebtedness; and (3) The... Exchange Act of 1934; (3) The securities in the index are: (i) Common stock, (ii) Such other equity...

  10. Templated Dry Printing of Conductive Metal Nanoparticles

    Science.gov (United States)

    Rolfe, David Alexander

    Printed electronics can lower the cost and increase the ubiquity of electrical components such as batteries, sensors, and telemetry systems. Unfortunately, the advance of printed electronics has been held back by the limited minimum resolution, aspect ratio, and feature fidelity of present printing techniques such as gravure, screen printing and inkjet printing. Templated dry printing offers a solution to these problems by patterning nanoparticle inks into templates before drying. This dissertation shows advancements in two varieties of templated dry nanoprinting. The first, advective micromolding in vapor-permeable templates (AMPT) is a microfluidic approach that uses evaporation-driven mold filling to create submicron features with a 1:1 aspect ratio. We will discuss submicron surface acoustic wave (SAW) resonators made through this process, and the refinement process in the template manufacturing process necessary to make these devices. We also present modeling techniques that can be applied to future AMPT templates. We conclude with a modified templated dry printing that improves throughput and isolated feature patterning by transferring dry-templated features with laser ablation. This method utilizes surface energy-defined templates to pattern features via doctor blade coating. Patterned and dried features can be transferred to a polymer substrate with an Nd:YAG MOPA fiber laser, and printed features can be smaller than the laser beam width.

  11. Biometric template revocation

    Science.gov (United States)

    Arndt, Craig M.

    2004-08-01

    Biometric are a powerful technology for identifying humans both locally and at a distance. In order to perform identification or verification biometric systems capture an image of some biometric of a user or subject. The image is then converted mathematical to representation of the person call a template. Since we know that every human in the world is different each human will have different biometric images (different fingerprints, or faces, etc.). This is what makes biometrics useful for identification. However unlike a credit card number or a password to can be given to a person and later revoked if it is compromised and biometric is with the person for life. The problem then is to develop biometric templates witch can be easily revoked and reissued which are also unique to the user and can be easily used for identification and verification. In this paper we develop and present a method to generate a set of templates which are fully unique to the individual and also revocable. By using bases set compression algorithms in an n-dimensional orthogonal space we can represent a give biometric image in an infinite number of equally valued and unique ways. The verification and biometric matching system would be presented with a given template and revocation code. The code will then representing where in the sequence of n-dimensional vectors to start the recognition.

  12. Template Assembly for Detailed Urban Reconstruction

    KAUST Repository

    Nan, Liangliang

    2015-05-04

    We propose a new framework to reconstruct building details by automatically assembling 3D templates on coarse textured building models. In a preprocessing step, we generate an initial coarse model to approximate a point cloud computed using Structure from Motion and Multi View Stereo, and we model a set of 3D templates of facade details. Next, we optimize the initial coarse model to enforce consistency between geometry and appearance (texture images). Then, building details are reconstructed by assembling templates on the textured faces of the coarse model. The 3D templates are automatically chosen and located by our optimization-based template assembly algorithm that balances image matching and structural regularity. In the results, we demonstrate how our framework can enrich the details of coarse models using various data sets.

  13. Fire Protection Engineering Design Brief Template. Hydrogen Refueling Station.

    Energy Technology Data Exchange (ETDEWEB)

    LaFleur, Angela Christine [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Muna, Alice Baca [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Groth, Katrina M. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-08-01

    Building a hydrogen infrastructure system is critical to supporting the development of alternate- fuel vehicles. This report provides a methodology for implementing a performance-based design of an outdoor hydrogen refueling station that does not meet specific prescriptive requirements in NFPA 2, The Hydrogen Technologies Code . Performance-based designs are a code-compliant alternative to meeting prescriptive requirements. Compliance is demonstrated by comparing a prescriptive-based fueling station design with a performance-based design approach using Quantitative Risk Assessment (QRA) methods and hydrogen risk assessment tools. This template utilizes the Sandia-developed QRA tool, Hydrogen Risk Analysis Models (HyRAM), which combines reduced-order deterministic models that characterize hydrogen release and flame behavior with probabilistic risk models to quantify risk values. Each project is unique and this template is not intended to account for site-specific characteristics. Instead, example content and a methodology are provided for a representative hydrogen refueling site which can be built upon for new hydrogen applications.

  14. A template-based procedure for determining white matter integrity in the internal capsule early after stroke

    Directory of Open Access Journals (Sweden)

    Matthew A. Petoe

    2014-01-01

    Full Text Available The integrity of descending white matter pathways, measured by fractional anisotropy from DW-MRI, is a key prognostic indicator of motor recovery after stroke. Barriers to translation of fractional anisotropy measures into routine clinical practice include the time required for manually delineating volumes of interest (VOIs, and inter-examiner variability in this process. This study investigated whether registering and then editing template volumes of interest ‘as required’ would improve inter-examiner reliability compared with manual delineation, without compromising validity. MRI was performed with 30 sub-acute stroke patients with motor deficits (mean NIHSS = 11, range 0–17. Four independent examiners manually delineated VOIs for the posterior limbs of the internal capsules on T1 images, or edited template VOIs that had been registered to the T1 images if they encroached on ventricles or basal ganglia. Fractional anisotropy within each VOI and interhemispheric asymmetry were then calculated. We found that 13/30 registered template VOIs required editing. Edited template VOIs were more spatially similar between examiners than the manually delineated VOIs (p = 0.005. Both methods produced similar asymmetry values that correlated with clinical scores with near perfect levels of agreement between examiners. Contralesional fractional anisotropy correlated with age when edited template VOIs were used but not when VOIs were manually delineated. Editing template VOIs as required is reliable, increases the validity of fractional anisotropy measurements in the posterior limb of the internal capsule, and is less time-consuming compared to manual delineation. This approach could support the use of FA asymmetry measures in routine clinical practice.

  15. Design and Fabrication of a Precision Template for Spine Surgery Using Selective Laser Melting (SLM).

    Science.gov (United States)

    Wang, Di; Wang, Yimeng; Wang, Jianhua; Song, Changhui; Yang, Yongqiang; Zhang, Zimian; Lin, Hui; Zhen, Yongqiang; Liao, Suixiang

    2016-07-22

    In order to meet the clinical requirements of spine surgery, this paper proposes the fabrication of the customized template for spine surgery through computer-aided design. A 3D metal printing-selective laser melting (SLM) technique was employed to directly fabricate the 316L stainless steel template, and the metal template with tiny locating holes was used as an auxiliary tool to insert spinal screws inside the patient's body. To guarantee accurate fabrication of the template for cervical vertebra operation, the contact face was placed upwards to improve the joint quality between the template and the cervical vertebra. The joint surface of the printed template had a roughness of Ra = 13 ± 2 μm. After abrasive blasting, the surface roughness was Ra = 7 ± 0.5 μm. The surgical metal template was bound with the 3D-printed Acrylonitrile Butadiene Styrene (ABS) plastic model. The micro-hardness values determined at the cross-sections of SLM-processed samples varied from HV0.3 250 to HV0.3 280, and the measured tensile strength was in the range of 450 MPa to 560 MPa, which showed that the template had requisite strength. Finally, the metal template was clinically used in the patient's surgical operation, and the screws were inserted precisely as the result of using the auxiliary template. The geometrical parameters of the template hole (e.g., diameter and wall thickness) were optimized, and measures were taken to optimize the key geometrical units (e.g., hole units) in metal 3D printing. Compared to the traditional technology of screw insertion, the use of the surgical metal template enabled the screws to be inserted more easily and accurately during spinal surgery. However, the design of the high-quality template should fully take into account the clinical demands of surgeons, as well as the advice of the designing engineers and operating technicians.

  16. 3-Dimensional printing guide template assisted percutaneous vertebroplasty: Technical note.

    Science.gov (United States)

    Li, Jian; Lin, JiSheng; Yang, Yong; Xu, JunChuan; Fei, Qi

    2018-06-01

    Percutaneous vertebroplasty (PVP) is currently considered as an effective treatment for pain caused by acute osteoporotic vertebral compression fracture. Recently, puncture-related complications are increasingly reported. It's important to find a precise technique to reduce the puncture-related complications. We report a case and discussed the novel surgical technique with step-by-step operating procedures, to introduce the precise PVP assisted by a 3-dimensional printing guide template. Based on the preoperative CT scan and infrared scan data, a well-designed individual guide template could be established in a 3-dimensional reconstruction software and printed out by a 3-dimensional printer. In real operation, by matching the guide template to patient's back skin, cement needles' insertion orientation and depth were easily established. Only 14 times C-arm fluoroscopy with HDF mode (total exposure dose was 4.5 mSv) were required during the procedure. The operation took only 17 min. Cement distribution in the vertebral body was very good without any puncture-related complications. Pain was significantly relieved after surgery. In conclusion, the novel precise 3-dimensional printing guide template system may allow (1) comprehensive visualization of the fractured vertebral body and the individual surgical planning, (2) the perfect fitting between skin and guide template to ensure the puncture stability and accuracy, and (3) increased puncture precision and decreased puncture-related complications, surgical time and radiation exposure. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. 2D vector-cyclic deformable templates

    DEFF Research Database (Denmark)

    Schultz, Nette; Conradsen, Knut

    1998-01-01

    In this paper the theory of deformable templates is a vector cycle in 2D is described. The deformable template model originated in (Grenander, 1983) and was further investigated in (Grenander et al., 1991). A template vector distribution is induced by parameter distribution from transformation...... matrices applied to the vector cycle. An approximation in the parameter distribution is introduced. The main advantage by using the deformable template model is the ability to simulate a wide range of objects trained by e.g. their biological variations, and thereby improve restoration, segmentation...... and probabillity measurement. The case study concerns estimation of meat percent in pork carcasses. Given two cross-sectional images - one at the front and one near the ham of the carcass - the areas of lean and fat and a muscle in the lean area are measured automatically by the deformable templates....

  18. A template for integrated community sustainability planning.

    Science.gov (United States)

    Ling, Christopher; Hanna, Kevin; Dale, Ann

    2009-08-01

    This article describes a template for implementing an integrated community sustainability plan. The template emphasizes community engagement and outlines the components of a basic framework for integrating ecological, social and economic dynamics into a community plan. The framework is a series of steps that support a sustainable community development process. While it reflects the Canadian experience, the tools and techniques have applied value for a range of environmental planning contexts around the world. The research is case study based and draws from a diverse range of communities representing many types of infrastructure, demographics and ecological and geographical contexts. A critical path for moving local governments to sustainable community development is the creation and implementation of integrated planning approaches. To be effective and to be implemented, a requisite shift to sustainability requires active community engagement processes, political will, and a commitment to political and administrative accountability, and measurement.

  19. Exploring Many-Core Design Templates for FPGAs and ASICs

    Directory of Open Access Journals (Sweden)

    Ilia Lebedev

    2012-01-01

    Full Text Available We present a highly productive approach to hardware design based on a many-core microarchitectural template used to implement compute-bound applications expressed in a high-level data-parallel language such as OpenCL. The template is customized on a per-application basis via a range of high-level parameters such as the interconnect topology or processing element architecture. The key benefits of this approach are that it (i allows programmers to express parallelism through an API defined in a high-level programming language, (ii supports coarse-grained multithreading and fine-grained threading while permitting bit-level resource control, and (iii reduces the effort required to repurpose the system for different algorithms or different applications. We compare template-driven design to both full-custom and programmable approaches by studying implementations of a compute-bound data-parallel Bayesian graph inference algorithm across several candidate platforms. Specifically, we examine a range of template-based implementations on both FPGA and ASIC platforms and compare each against full custom designs. Throughout this study, we use a general-purpose graphics processing unit (GPGPU implementation as a performance and area baseline. We show that our approach, similar in productivity to programmable approaches such as GPGPU applications, yields implementations with performance approaching that of full-custom designs on both FPGA and ASIC platforms.

  20. Accuracy of templating the acetabular cup size in Total Hip Replacement using conventional acetate templates on digital radiographs.

    Science.gov (United States)

    Krishnamoorthy, Vignesh P; Perumal, Rajamani; Daniel, Alfred J; Poonnoose, Pradeep M

    2015-12-01

    Templating of the acetabular cup size in Total Hip Replacement (THR) is normally done using conventional radiographs. As these are being replaced by digital radiographs, it has become essential to create a technique of templating using digital films. We describe a technique that involves templating the digital films using the universally available acetate templates for THR without the use of special software. Preoperative digital radiographs of the pelvis were taken with a 30 mm diameter spherical metal ball strapped over the greater trochanter. Using standard acetate templates provided by the implant company on magnified digital radiographs, the size of the metal ball (X mm) and acetabular cup (Y mm) were determined. The size of the acetabular cup to be implanted was estimated using the formula 30*Y/X. The estimated size was compared with the actual size of the cup used at surgery. Using this technique, it was possible to accurately predict the acetabular cup size in 28/40 (70%) of the hips. When the accuracy to within one size was considered, templating was correct in 90% (36/40). When assessed by two independent observers, there was good intra-observer and inter-observer reliability with intra-class correlation coefficient values greater than 0.8. It was possible to accurately and reliably predict the size of the acetabular cup, using acetate templates on digital films, without any digital templates.

  1. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.

    Science.gov (United States)

    Alanazi, H O; Zaidan, A A; Zaidan, B B; Kiah, M L Mat; Al-Bakri, S H

    2015-01-01

    This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.

  2. Safeguards and security requirements for weapons plutonium disposition in light water reactors

    International Nuclear Information System (INIS)

    Thomas, L.L.; Strait, R.S.

    1994-10-01

    This paper explores the issues surrounding the safeguarding of the plutonium disposition process in support of the United States nuclear weapons dismantlement program. It focuses on the disposition of the plutonium by burning mixed oxide fuel in light water reactors (LWR) and addresses physical protection, material control and accountability, personnel security and international safeguards. The S and S system needs to meet the requirements of the DOE Orders, NRC Regulations and international safeguards agreements. Experience has shown that incorporating S and S measures into early facility designs and integrating them into operations provides S and S that is more effective, more economical, and less intrusive. The plutonium disposition safeguards requirements with which the US has the least experience are the implementation of international safeguards on plutonium metal; the large scale commercialization of the mixed oxide fuel fabrication; and the transportation to and loading in the LWRs of fresh mixed oxide fuel. It is in these areas where the effort needs to be concentrated if the US is to develop safeguards and security systems that are effective and efficient

  3. Preparation of micro/nanostructure TiO2 spheres by controlling pollen as hard template and soft template.

    Science.gov (United States)

    Yang, Xiaohui; Xu, Bin; Zhang, Xuehong; Song, Xiuqin; Chen, Rufen

    2014-09-01

    In this paper, micro/nanostructure TiO2 spheres were synthesized by a sunflower pollen induced and self-assembly mineralization process, in which a titania precursor and pollen reacted in one-pot at normal pressure. In this paper, the bio-template advantage, as hard and soft template is fully demonstrated. The superiority of our synthesis is that we not only can control pollen as hard template, but also can control it as soft template only by changing reactions temperature. Under 80 degrees C of water bath, TiO2 microspheres which replicated the morphology of pollen were prepared by controlling pollen as hard template. Under 100 degrees C, hierarchical TiO2 spheres with complicated morphology, different from pollen template, were synthesized by using pollen as soft template. At the same time, judicious choice of the amount of pollen affords the synthesis of hierarchical structures spheres with adjustable morphology and crystal structure. The morphology can be tuned from microspheres constructed from TiO2 nanorods to nanospheres constructed from TiO2 nanoparticles, and the crystal structure can be tuned from rutile to anatase. More over this anatase phase can be keep better even at high temperature of 1000 degrees C. The as-prepared micro/nano structure photocatalysts not only have high photocatalytic activities, but also have good separability and reuse performance.

  4. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    Science.gov (United States)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  5. Liquid foam templating - A route to tailor-made polymer foams.

    Science.gov (United States)

    Andrieux, Sébastien; Quell, Aggeliki; Stubenrauch, Cosima; Drenckhan, Wiebke

    2018-06-01

    Solid foams with pore sizes between a few micrometres and a few millimetres are heavily exploited in a wide range of established and emerging applications. While the optimisation of foam applications requires a fine control over their structural properties (pore size distribution, pore opening, foam density, …), the great complexity of most foaming processes still defies a sound scientific understanding and therefore explicit control and prediction of these parameters. We therefore need to improve our understanding of existing processes and also develop new fabrication routes which we understand and which we can exploit to tailor-make new porous materials. One of these new routes is liquid templating in general and liquid foam templating in particular, to which this review article is dedicated. While all solid foams are generated from an initially liquid(-like) state, the particular notion of liquid foam templating implies the specific condition that the liquid foam has time to find its "equilibrium structure" before it is solidified. In other words, the characteristic time scales of the liquid foam's stability and its solidification are well separated, allowing to build on the vast know-how on liquid foams established over the last 20 years. The dispersed phase of the liquid foam determines the final pore size and pore size distribution, while the continuous phase contains the precursors of the desired porous scaffold. We review here the three key challenges which need to be addressed by this approach: (1) the control of the structure of the liquid template, (2) the matching of the time scales between the stability of the liquid template and solidification, and (3) the preservation of the structure of the template throughout the process. Focusing on the field of polymer foams, this review gives an overview of recent research on the properties of liquid foam templates and summarises a key set of studies in the emerging field of liquid foam templating. It

  6. Optimizing preventive maintenance with maintenance templates

    International Nuclear Information System (INIS)

    Dozier, I.J.

    1996-01-01

    Rising operating costs has caused maintenance professionals to rethink their strategy for preventive maintenance (PM) programs. Maintenance Templates are pre-engineered PM task recommendations for a component type based on application of the component. Development of the maintenance template considers the dominant failure cause of the component and the type of preventive maintenance that can predict or prevent the failure from occurring. Maintenance template development also attempts to replace fixed frequency tasks with condition monitoring tasks such as vibration analysis or thermography. For those components that have fixed frequency PM intervals, consideration is given to the maintenance drivers such as criticality, environment and usage. This helps to maximize the PM frequency intervals and maximize the component availability. Maintenance Templates have been used at PECO Energy's Limerick Generating Station during the Reliability Centered Maintenance (RCM) Process to optimize their PM program. This paper describes the development and uses of the maintenance templates

  7. DOE Integrated Safeguards and Security (DISS) historical document archival and retrieval analysis, requirements and recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Guyer, H.B.; McChesney, C.A.

    1994-10-07

    The overall primary Objective of HDAR is to create a repository of historical personnel security documents and provide the functionality needed for archival and retrieval use by other software modules and application users of the DISS/ET system. The software product to be produced from this specification is the Historical Document Archival and Retrieval Subsystem The product will provide the functionality to capture, retrieve and manage documents currently contained in the personnel security folders in DOE Operations Offices vaults at various locations across the United States. The long-term plan for DISS/ET includes the requirement to allow for capture and storage of arbitrary, currently undefined, clearance-related documents that fall outside the scope of the ``cradle-to-grave`` electronic processing provided by DISS/ET. However, this requirement is not within the scope of the requirements specified in this document.

  8. Specifying Information Security Needs for the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. We propose to explicitly link security requirements with the organizations' business vision, i.e. to provide business rationale for security requirements. The rationale is then

  9. [The template principle: paradigm of modern genetics].

    Science.gov (United States)

    Inge-Vechtomov, S G

    2013-01-01

    The idea of continuity in living systems, which was initially developed in mid-19th century, reached its peak in 1928 thanks to N.K. Koltsov, who proposed the template principle in chromosome reproduction. The determination of genetic functions of nucleic acids and the advent of molecular genetics led to F. Crick's statement of the central dogma of molecular biology in 1958. This dogma became a contemporary version of the template principle (templates of the first order). The discovery of "protein inheritance" underlay the notion of steric or conformational templates (second order) for reproducing conformation in a number of proteins. The template principle supplemented by this notion claims to be the main paradigm of modern genetics.

  10. Food and nutritional security requires adequate protein as well as energy, delivered from whole-year crop production

    DEFF Research Database (Denmark)

    Coles, Graeme D; Wratten, Stephen D; Porter, John Roy

    2016-01-01

    Human food security requires the production of sufficient quantities of both high-quality protein and dietary energy. In a series of case-studies from New Zealand, we show that while production of food ingredients from crops on arable land can meet human dietary energy requirements effectively...... and nutritional security will largely be an outcome of national or regional agroeconomies addressing their own food needs. We hope that our model will be used for similar analyses of food production systems in other countries, agroecological zones and economies....

  11. Hard template synthesis of metal nanowires

    OpenAIRE

    Kawamura, Go; Muto, Hiroyuki; Matsuda, Atsunori

    2014-01-01

    Metal nanowires (NWs) have attracted much attention because of their high electron conductivity, optical transmittance, and tunable magnetic properties. Metal NWs have been synthesized using soft templates such as surface stabilizing molecules and polymers, and hard templates such as anodic aluminum oxide, mesoporous oxide, carbon nanotubes. NWs prepared from hard templates are composites of metals and the oxide/carbon matrix. Thus, selecting appropriate elements can simplify the production o...

  12. WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THREATS AND ITS COUNTERMEASURES

    OpenAIRE

    Ranjit Panigrahi; Kalpana Sharma; M.K. Ghose

    2013-01-01

    Wireless Sensor Network (WSN) has a huge range of applications such as battlefield, surveillance, emergency rescue operation and smart home technology etc. Apart from its inherent constraints such as limited memory and energy resources, when deployed in hostile environmental conditions, the sensor nodes are vulnerable to physical capture and other security constraints. These constraints put security as a major challenge for the researchers in the field of computer networking. T...

  13. Learning templates for artistic portrait lighting analysis.

    Science.gov (United States)

    Chen, Xiaowu; Jin, Xin; Wu, Hongyu; Zhao, Qinping

    2015-02-01

    Lighting is a key factor in creating impressive artistic portraits. In this paper, we propose to analyze portrait lighting by learning templates of lighting styles. Inspired by the experience of artists, we first define several novel features that describe the local contrasts in various face regions. The most informative features are then selected with a stepwise feature pursuit algorithm to derive the templates of various lighting styles. After that, the matching scores that measure the similarity between a testing portrait and those templates are calculated for lighting style classification. Furthermore, we train a regression model by the subjective scores and the feature responses of a template to predict the score of a portrait lighting quality. Based on the templates, a novel face illumination descriptor is defined to measure the difference between two portrait lightings. Experimental results show that the learned templates can well describe the lighting styles, whereas the proposed approach can assess the lighting quality of artistic portraits as human being does.

  14. Template Generation and Selection Algorithms

    NARCIS (Netherlands)

    Guo, Y.; Smit, Gerardus Johannes Maria; Broersma, Haitze J.; Heysters, P.M.; Badaway, W.; Ismail, Y.

    The availability of high-level design entry tooling is crucial for the viability of any reconfigurable SoC architecture. This paper presents a template generation method to extract functional equivalent structures, i.e. templates, from a control data flow graph. By inspecting the graph the algorithm

  15. Development of DSRC device and communication system performance measures recommendations for DSRC OBE performance and security requirements.

    Science.gov (United States)

    2016-05-22

    This report presents recommendations for minimum DSRC device communication performance and security : requirements to ensure effective operation of the DSRC system. The team identified recommended DSRC : communications requirements aligned to use cas...

  16. New safety and security requirements for the transport of nuclear and other radioactive materials in Hungary

    International Nuclear Information System (INIS)

    Katona, T.; Horvath, K.; Safar, J.

    2016-01-01

    In addition to the promulgation of mode-specific regulations of international transport of dangerous goods, some Hungarian governmental and ministerial decrees impose further conditions upon the transport of nuclear and other radioactive materials. One of these ministerial decrees on the transport, carriage and packaging of radioactive materials is under revision and it will require • approval of emergency response plan (including security and safety contingency plan); • report on transport incidents and accidents for classifying them in accordance with the INES scale; • the competent authority to request experts’ support for the approval of package designs, radioactive material designs and shipments. Regarding the security of the transport of nuclear and other radioactive materials a new Hungarian governmental decree and a related guidance are about to be published which will supply additional requirements in the field of the transport security especially concerning radioactive materials, implementing - among others - IAEA recommendations of the NSS No9 and No14. The main and relevant features of the Hungarian nuclear regulatory system and the details of both new decrees regarding the safety and security issues of transport of nuclear and other radioactive materials will be discussed. (author)

  17. Design and Fabrication of a Precision Template for Spine Surgery Using Selective Laser Melting (SLM

    Directory of Open Access Journals (Sweden)

    Di Wang

    2016-07-01

    Full Text Available In order to meet the clinical requirements of spine surgery, this paper proposes the fabrication of the customized template for spine surgery through computer-aided design. A 3D metal printing-selective laser melting (SLM technique was employed to directly fabricate the 316L stainless steel template, and the metal template with tiny locating holes was used as an auxiliary tool to insert spinal screws inside the patient’s body. To guarantee accurate fabrication of the template for cervical vertebra operation, the contact face was placed upwards to improve the joint quality between the template and the cervical vertebra. The joint surface of the printed template had a roughness of Ra = 13 ± 2 μm. After abrasive blasting, the surface roughness was Ra = 7 ± 0.5 μm. The surgical metal template was bound with the 3D-printed Acrylonitrile Butadiene Styrene (ABS plastic model. The micro-hardness values determined at the cross-sections of SLM-processed samples varied from HV0.3 250 to HV0.3 280, and the measured tensile strength was in the range of 450 MPa to 560 MPa, which showed that the template had requisite strength. Finally, the metal template was clinically used in the patient’s surgical operation, and the screws were inserted precisely as the result of using the auxiliary template. The geometrical parameters of the template hole (e.g., diameter and wall thickness were optimized, and measures were taken to optimize the key geometrical units (e.g., hole units in metal 3D printing. Compared to the traditional technology of screw insertion, the use of the surgical metal template enabled the screws to be inserted more easily and accurately during spinal surgery. However, the design of the high-quality template should fully take into account the clinical demands of surgeons, as well as the advice of the designing engineers and operating technicians.

  18. images_template

    Data.gov (United States)

    National Aeronautics and Space Administration — Images for the website template go here. It will not change their names or locations, but will hopefully help to organize them. Oh, but for a directory structure...

  19. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Science.gov (United States)

    2012-10-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... comments on the development of a Facility Security Officer training program. The notice contains an inaccurate Internet link to RSVP for the public meeting. DATES: The notice of public meeting; request for...

  20. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation

    NARCIS (Netherlands)

    Massacci, F.; Prest, M.; Zannone, N.

    2005-01-01

    Extending Requirements Engineering modelling and formal analysis methodologies to cope with Security Requirements has been a major effort in the past decade. Yet, only few works describe complex case studies that show the ability of the informal and formal approaches to cope with the level

  1. C2 Link Security for UAS: Technical Literature Study and Preliminary Functional Requirements. Version 0.9 (Working Draft)

    Science.gov (United States)

    2005-01-01

    This document provides a study of the technical literature related to Command and Control (C2) link security for Unmanned Aircraft Systems (UAS) for operation in the National Airspace System (NAS). Included is a preliminary set of functional requirements for C2 link security.

  2. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  3. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  4. Competence Requirements of ISO/IEC Standards for Information Security Professionals

    Directory of Open Access Journals (Sweden)

    Natalia G. Miloslavskaya

    2017-11-01

    Full Text Available The rapid progress in the filed of information security (IS puts one in a need of periodic revision of professional competencies (formulated in the federal state educational standards –FSESs and working functions (formulated in the professional standards – PSs. Under these conditions, a timely reaction to everything new that emerges or will appear in modern regulatory documents (primarily in standards is extremely important. We make a forecast for the content of the ISO/IEC 27021 and ISO/IEC 19896 standards drafted by the International Organization for Standardization (ISO, which should contain the requirements for the competencies of IS management system professionals and the competence of IS testers and evaluators. Our forecast takes into account the requirements of the ISO/IEC 27000 standard group and the recommendations of the European e-Competence Framework e-CF 3.0.

  5. A PBOM configuration and management method based on templates

    Science.gov (United States)

    Guo, Kai; Qiao, Lihong; Qie, Yifan

    2018-03-01

    The design of Process Bill of Materials (PBOM) holds a hinge position in the process of product development. The requirements of PBOM configuration design and management for complex products are analysed in this paper, which include the reuse technique of configuration procedure and urgent management need of huge quantity of product family PBOM data. Based on the analysis, the function framework of PBOM configuration and management has been established. Configuration templates and modules are defined in the framework to support the customization and the reuse of configuration process. The configuration process of a detection sensor PBOM is shown as an illustration case in the end. The rapid and agile PBOM configuration and management can be achieved utilizing template-based method, which has a vital significance to improve the development efficiency for complex products.

  6. A facile template method to synthesize significantly improved LiNi0.5Mn1.5O4 using corn stalk as a bio-template

    International Nuclear Information System (INIS)

    Liu, Guiyang; Kong, Xin; Sun, Hongyan; Wang, Baosen; Yi, Zhongzhou; Wang, Quanbiao

    2014-01-01

    In order to simplify the template method for the synthesis of cathode materials for lithium ion batteries, a facile template method using plant stalks as bio-templates has been introduced. Based on this method, LiNi 0.5 Mn 1.5 O 4 spinel with a significantly improved electrochemical performance has been synthesized using corn stalk as a template. X-ray diffraction (XRD), Fourier transform infrared pectroscopy (FTIR) and scanning electron microscope (SEM) have been used to investigate the phase composition and micro-morphologies of the products. Charge-discharge measurements in lithium cells, cyclic voltammetry (CV) and Electrochemical impedance spectroscopy (EIS) have been used to study the electrochemical performance of the products. The results indicate that the templated product exhibits higher crystallinity than that of non-templated product. Both of the templated product and the non-templated product are combination of the ordered space group P4 3 32 and the disordered Fd-3 m. The specific BET surface area of the templated product is about twice larger than that of the non-templated product. Moreover, the electrochemical performances of the templated product including specific capacity, cycling stability and rate capability are significantly improved as compared with the non-templated product, due to its higher crystallinity, larger Li + diffusion coefficient and lower charge transfer resistance

  7. Diatom-inspired templates for 3D replication: natural diatoms versus laser written artificial diatoms

    International Nuclear Information System (INIS)

    Belegratis, M R; Schmidt, V; Nees, D; Stadlober, B; Hartmann, P

    2014-01-01

    The diatoms are ubiquitous, exist in large numbers and show a great diversity of features on their porous silica structures. Therefore, they inspire the fabrication of nanostructured templates for nanoimprint processes (NIL), where large structured areas with nanometer precision are required. In this study, two approaches regarding the respective challenges and potential exploitations are followed and discussed: the first one takes advantage of a template that is directly made of natural occurring diatoms. Here, two replication steps via soft lithography are needed to obtain a template which is subsequently used for NIL. The second approach exploits the technical capabilities of the precise 3D laser lithography (3DLL) based on two-photon polymerization of organic materials. This method enables the fabrication of arbitrary artificial diatom-inspired micro- and nanostructures and the design of an inverse structure. Therefore, only one replication step is needed to obtain a template for NIL. In both approaches, a replication technique for true 3D structures is shown. (paper)

  8. Stochastic Template Bank for Gravitational Wave Searches for Precessing Neutron Star-Black Hole Coalescence Events

    Science.gov (United States)

    Indik, Nathaniel; Haris, K.; Dal Canton, Tito; Fehrmann, Henning; Krishnan, Badri; Lundgren, Andrew; Nielsen, Alex B.; Pai, Archana

    2017-01-01

    Gravitational wave searches to date have largely focused on non-precessing systems. Including precession effects greatly increases the number of templates to be searched over. This leads to a corresponding increase in the computational cost and can increase the false alarm rate of a realistic search. On the other hand, there might be astrophysical systems that are entirely missed by non-precessing searches. In this paper we consider the problem of constructing a template bank using stochastic methods for neutron star-black hole binaries allowing for precession, but with the restrictions that the total angular momentum of the binary is pointing toward the detector and that the neutron star spin is negligible relative to that of the black hole. We quantify the number of templates required for the search, and we explicitly construct the template bank. We show that despite the large number of templates, stochastic methods can be adapted to solve the problem. We quantify the parameter space region over which the non-precessing search might miss signals.

  9. Mesoporous silicon oxide films and their uses as templates in obtaining nanostructured conductive polymers

    Science.gov (United States)

    Salgado, R.; Arteaga, G. C.; Arias, J. M.

    2018-04-01

    Obtaining conductive polymers (CPs) for the manufacture of OLEDs, solar cells, electrochromic devices, sensors, etc., has been possible through the use of electrochemical techniques that allow obtaining films of controlled thickness with positive results in different applications. Current trends point towards the manufacture of nanomaterials, and therefore it is necessary to develop methods that allow obtaining CPs with nanostructured morphology. This is possible by using a porous template to allow the growth of the polymeric materials. However, prior and subsequent treatments are required to separate the material from the template so that it can be evaluated in the applications mentioned above. This is why mesoporous silicon oxide films (template) are essential for the synthesis of nanostructured polymers since both the template and the polymer are obtained on the electrode surface, and therefore it is not necessary to separate the material from the template. Thus, the material can be evaluated directly in the applications mentioned above. The dimensions of the resulting nanostructures will depend on the power, time and technique used for electropolymerization as well as the monomer and the surfactant of the mesoporous film.

  10. 75 FR 10973 - Hazardous Materials: Risk-Based Adjustment of Transportation Security Plan Requirements

    Science.gov (United States)

    2010-03-09

    ... (explosive) material; (3) More than 1 L (1.06 qt.) per package of a material poisonous by inhalation in... controlled; and 6.1 materials poisonous by inhalation. We also proposed to require security plans for any... happens very rapidly, and in the process, the propane combines readily with air to form fuel air mixtures...

  11. Microporous silica prepared by organic templating: relationship between the molecular template and pore structure

    International Nuclear Information System (INIS)

    Brinker, C. Jeffrey; Cao, Guozhong; Kale, Rahul P.; Lopez, Gabriel P.; Lu, Yunfeng; Prabakar, S.

    1999-01-01

    Microporous silica materials with a controlled pore size and a narrow pore size distribution have been prepared by sol-gel processing using an organic-templating approach. Microporous networks were formed by pyrolytic removal of organic ligands (methacryloxypropyl groups) from organic/inorganic hybrid materials synthesized by copolymerization of 3-methacryloxypropylsilane (MPS) and tetraethoxysilane (TEOS). Molecular simulations and experimental measurements were conducted to examine the relationship between the microstructural characteristics of the porous silica (e.g., pore size, total pore volume, and pore connectivity) and the size and amount of organic template ligands added. Adsorption measurements suggest that the final porosity of the microporous silica is due to both primary pores (those present in the hybrid materials prior to pyrolysis) and secondary pores (those created by pyrolytic removal of organic templates). Primary pores were inaccessible to N(sub 2) at 77 K but accessible to CO(sub 2) at 195 K; secondary pores were accessible to both N(sub 2) (at 77 K) and CO(sub 2) (at 195 K) in adsorption measurements. Primary porosity decreases with the amount of organic ligands added because of the enhanced densification of MPS/TEOS hybrid materials as the mole fraction of trifunctional MPS moieties increases. pore volumes measured by nitrogen adsorption experiments at 77 K suggest that the secondary (template-derived) porosity exhibits a percolation behavior as the template concentration is increased. Gas permeation experiments indicate that the secondary pores are approximately 5(angstrom) in diameter, consistent with predictions based on molecular simulations

  12. 76 FR 10205 - Department of Homeland Security Implementation of OMB Guidance on Drug-Free Workplace Requirements

    Science.gov (United States)

    2011-02-24

    ... Flexibility Act, 5 U.S.C. 605(b), as amended by the Small Business Regulatory Enforcement and Fairness Act of... Guidance on Drug-Free Workplace Requirements AGENCY: Department of Homeland Security (DHS). ACTION: Final... consolidate all Federal regulations on drug-free workplace requirements for financial assistance into one...

  13. A light meson translatable template

    International Nuclear Information System (INIS)

    Allgower, C.E.; Peaslee, D.C.

    2002-01-01

    Recently surveyed (mass)2 values for I = 0, JPC = 2++ light mesons can be assembled into repeating patterns of 4 states, dubbed 'templates'. Within error, both internal and external template spacings approximate simple multiples of Δm2 ≅ 0.35 GeV2. Hopefully, this feature will be useful in predicting the positions of higher isoscalar 2++ states

  14. 76 FR 15874 - Beneficial Ownership Reporting Requirements and Security-Based Swaps

    Science.gov (United States)

    2011-03-22

    ... conversion of any derivative security, whether or not presently exercisable.'' \\40\\ ``Derivative securities... ``any equity security or derivative security relating to an issuer, whether or not issued by that issuer... securities, except that the acquisition or disposition of any derivative security must be separately reported...

  15. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  16. 76 FR 12645 - Ownership Limitations and Governance Requirements for Security-Based Swap Clearing Agencies...

    Science.gov (United States)

    2011-03-08

    ... 3235-AK74 Ownership Limitations and Governance Requirements for Security- Based Swap Clearing Agencies... the Dodd-Frank Act, the Commission shall adopt such rules if it determines that they are necessary or appropriate to improve the governance of, or to mitigate systemic risk, promote competition or mitigate...

  17. 77 FR 70213 - Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security...

    Science.gov (United States)

    2012-11-23

    ...-market value of the proprietary positions (e.g., securities, money market instruments, and commodities... the deductions for securities and money market positions as compared with the standardized haircuts... and Markets, Securities and Exchange Commission, 100 F Street, NE., Washington, DC 20549-7010...

  18. Review of Research on Template Methods in Preparation of Nanomaterials

    Directory of Open Access Journals (Sweden)

    Yadian Xie

    2016-01-01

    Full Text Available The nanomaterials have been widely used in various fields, such as photonics, catalysis, and adsorption, because of their unique physical and chemical properties. Therefore, their production methods are of utmost importance. Compared with traditional synthetic methods, the template method can effectively control the morphology, particle size, and structure during the preparation of nanomaterials, which is an effective method for their synthesis. The key for the template method is to choose different templates, which are divided into hard template and soft template according to their different structures. In this paper, the effects of different types of templates on the morphology of nanomaterials during their preparation are investigated from two aspects: hard template and soft template, combined with the mechanism of action.

  19. 76 FR 34579 - Beneficial Ownership Reporting Requirements and Security-Based Swaps

    Science.gov (United States)

    2011-06-14

    ... beneficial ownership of the equity securities underlying derivative securities exercisable or convertible... exercise or conversion of any derivative security, whether or not presently exercisable.'' \\40\\ ``Derivative securities'' are ``any option, warrant, convertible security, stock appreciation right, or similar...

  20. EPICS: Channel Access security design

    International Nuclear Information System (INIS)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer's interface is given. Security protocol is described and finally aids for reading the access security code are provided

  1. The INIA19 template and NeuroMaps atlas for primate brain image parcellation and spatial normalization

    Directory of Open Access Journals (Sweden)

    Torsten eRohlfing

    2012-12-01

    Full Text Available The INIA19 is a new, high-quality template for imaging-based studies of non-human primate brains created from high-resolution T1-weighted magnetic resonance (MR images of 19 rhesus macaque (Macaca mulatta animals. Combined with the comprehensive cortical and subcortical label map of the NeuroMaps atlas, the INIA19 is equally suitable for studies requiring both spatial normalization and atlas label propagation. Population-averaged template images are provided for both the brain and the whole head, to allow alignment of the atlas with both skull-stripped and unstripped data, and thus to facilitate its use for skull stripping of new images. This article describes the construction of the template using freely-available software tools, as well as the template itself, which is being made available to the scientific community (http://nitrc.org/projects/inia19/.

  2. TiO2 nanowire-templated hierarchical nanowire network as water-repelling coating

    Science.gov (United States)

    Hang, Tian; Chen, Hui-Jiuan; Xiao, Shuai; Yang, Chengduan; Chen, Meiwan; Tao, Jun; Shieh, Han-ping; Yang, Bo-ru; Liu, Chuan; Xie, Xi

    2017-12-01

    Extraordinary water-repelling properties of superhydrophobic surfaces make them novel candidates for a great variety of potential applications. A general approach to achieve superhydrophobicity requires low-energy coating on the surface and roughness on nano- and micrometre scale. However, typical construction of superhydrophobic surfaces with micro-nano structure through top-down fabrication is restricted by sophisticated fabrication techniques and limited choices of substrate materials. Micro-nanoscale topographies templated by conventional microparticles through surface coating may produce large variations in roughness and uncontrollable defects, resulting in poorly controlled surface morphology and wettability. In this work, micro-nanoscale hierarchical nanowire network was fabricated to construct self-cleaning coating using one-dimensional TiO2 nanowires as microscale templates. Hierarchical structure with homogeneous morphology was achieved by branching ZnO nanowires on the TiO2 nanowire backbones through hydrothermal reaction. The hierarchical nanowire network displayed homogeneous micro/nano-topography, in contrast to hierarchical structure templated by traditional microparticles. This hierarchical nanowire network film exhibited high repellency to both water and cell culture medium after functionalization with fluorinated organic molecules. The hierarchical structure templated by TiO2 nanowire coating significantly increased the surface superhydrophobicity compared to vertical ZnO nanowires with nanotopography alone. Our results demonstrated a promising strategy of using nanowires as microscale templates for the rational design of hierarchical coatings with desired superhydrophobicity that can also be applied to various substrate materials.

  3. Template for safety reports with descriptive example

    International Nuclear Information System (INIS)

    1995-12-01

    This report provides a template for future safety reports on long-term safety in support of important decisions and permit applications in connection with the construction of a deep repository system. The template aims at providing a uniform structure for describing long-term safety, after the repository has been closed and sealed. The availability of such a structure will simplify both preparation and review of the safety reports, and make it possible to follow how safety assessments are influenced by the progressively more detailed body of data that emerges. A separate section containing 'descriptive examples' has been appended to the template. This section illustrates what the different chapters of the template should contain. 279 refs

  4. Template for safety reports with descriptive example

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-01

    This report provides a template for future safety reports on long-term safety in support of important decisions and permit applications in connection with the construction of a deep repository system. The template aims at providing a uniform structure for describing long-term safety, after the repository has been closed and sealed. The availability of such a structure will simplify both preparation and review of the safety reports, and make it possible to follow how safety assessments are influenced by the progressively more detailed body of data that emerges. A separate section containing `descriptive examples` has been appended to the template. This section illustrates what the different chapters of the template should contain. 279 refs.

  5. Removable polytetrafluoroethylene template based epitaxy of ferroelectric copolymer thin films

    Science.gov (United States)

    Xia, Wei; Chen, Qiusong; Zhang, Jian; Wang, Hui; Cheng, Qian; Jiang, Yulong; Zhu, Guodong

    2018-04-01

    In recent years ferroelectric polymers have shown their great potentials in organic and flexible electronics. To meet the requirements of high-performance and low energy consumption of novel electronic devices and systems, structural and electrical properties of ferroelectric polymer thin films are expected to be further optimized. One possible way is to realize epitaxial growth of ferroelectric thin films via removable high-ordered polytetrafluoroethylene (PTFE) templates. Here two key parameters in epitaxy process, annealing temperature and applied pressure, are systematically studied and thus optimized through structural and electrical measurements of ferroelectric copolymer thin films. Experimental results indicate that controlled epitaxial growth is realized via suitable combination of both parameters. Annealing temperature above the melting point of ferroelectric copolymer films is required, and simultaneously moderate pressure (around 2.0 MPa here) should be applied. Over-low pressure (around 1.0 MPa here) usually results in the failure of epitaxy process, while over-high pressure (around 3.0 MPa here) often results in residual of PTFE templates on ferroelectric thin films.

  6. Screening for templates that promote crystallization

    NARCIS (Netherlands)

    Urbanus, J.; Roelands, C.P.M.; Horst, J.H. ter; Verdoes, D.; Jansens, P.J.

    2008-01-01

    In Situ Product Recovery (ISPR) applied in fermentation processes leads to improved yield and productivity of these processes. In principle, ISPR can be achieved using Template Induced Crystallization (TIC), which is one possible ISPR technique. With TIC, templates are added to the solution as a

  7. Rate in template-directed polymer synthesis.

    Science.gov (United States)

    Saito, Takuya

    2014-06-01

    We discuss the temporal efficiency of template-directed polymer synthesis, such as DNA replication and transcription, under a given template string. To weigh the synthesis speed and accuracy on the same scale, we propose a template-directed synthesis (TDS) rate, which contains an expression analogous to that for the Shannon entropy. Increasing the synthesis speed accelerates the TDS rate, but the TDS rate is lowered if the produced sequences are diversified. We apply the TDS rate to some production system models and investigate how the balance between the speed and the accuracy is affected by changes in the system conditions.

  8. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in

  9. Effective Electronic Security: Process for the Development and Validation from Requirements to Testing

    Science.gov (United States)

    2013-06-01

    ABBREVIATIONS ANSI American National Standards Institute ASIS American Society of Industrial Security CCTV Closed Circuit Television CONOPS...is globally recognized for the development and maintenance of standards. ASTM defines a specification as an explicit set of requirements...www.rkb.us/saver/. One of the SAVER reports titled CCTV Technology Handbook has a chapter on system design. The report uses terms like functional

  10. Readability of patient discharge instructions with and without the use of electronically available disease-specific templates.

    Science.gov (United States)

    Mueller, Stephanie K; Giannelli, Kyla; Boxer, Robert; Schnipper, Jeffrey L

    2015-07-01

    Low health literacy is common, leading to patient vulnerability during hospital discharge, when patients rely on written health instructions. We aimed to examine the impact of the use of electronic, patient-friendly, templated discharge instructions on the readability of discharge instructions provided to patients at discharge. We performed a retrospective cohort study of 233 patients discharged from a large tertiary care hospital to their homes following the implementation of a web-based "discharge module," which included the optional use of diagnosis-specific templated discharge instructions. We compared the readability of discharge instructions, as measured by the Flesch Reading Ease Level test (FREL, on a 0-100 scale, with higher scores indicating greater readability) and the Flesch-Kincaid Grade Level test (FKGL, measured in grade levels), between discharges that used templated instructions (with or without modification) versus discharges that used clinician-generated instructions (with or without available templated instructions for the specific discharge diagnosis). Templated discharge instructions were provided to patients in 45% of discharges. Of the 55% of patients that received clinician-generated discharge instructions, the majority (78.1%) had no available templated instruction for the specific discharge diagnosis. Templated discharge instructions had higher FREL scores (71 vs. 57, P readability (a higher FREL score and a lower FKGL score) than the use of clinician-generated discharge instructions. The main reason for clinicians to create discharge instructions was the lack of available templates for the patient's specific discharge diagnosis. Use of electronically available templated discharge instructions may be a viable option to improve the readability of written material provided to patients at discharge, although the library of available templates requires expansion. © The Author 2015. Published by Oxford University Press on behalf of the

  11. Improving your target-template alignment with MODalign

    OpenAIRE

    Barbato, Alessandro; Benkert, Pascal; Schwede, Torsten; Tramontano, Anna; Kosinski, Jan

    2012-01-01

    Summary: MODalign is an interactive web-based tool aimed at helping protein structure modelers to inspect and manually modify the alignment between the sequences of a target protein and of its template(s). It interactively computes, displays and, upon modification of the target-template alignment, updates the multiple sequence alignments of the two protein families, their conservation score, secondary structure and solvent accessibility values, and local quality scores of the implied three-di...

  12. Teaching Case: IS Security Requirements Identification from Conceptual Models in Systems Analysis and Design: The Fun & Fitness, Inc. Case

    Science.gov (United States)

    Spears, Janine L.; Parrish, James L., Jr.

    2013-01-01

    This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…

  13. 77 FR 52692 - NIST Federal Information Processing Standard (FIPS) 140-3 (Second Draft), Security Requirements...

    Science.gov (United States)

    2012-08-30

    ...-03] NIST Federal Information Processing Standard (FIPS) 140-3 (Second Draft), Security Requirements....'' Authority: Federal Information Processing Standards (FIPS) are issued by the National Institute of Standards... Standards and Technology (NIST) seeks additional comments on specific sections of Federal Information...

  14. Security Measures in Data Mining

    OpenAIRE

    Anish Gupta; Vimal Bibhu; Rashid Hussain

    2012-01-01

    Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determin...

  15. Solid-Phase Synthesis of Molecularly Imprinted Polymer Nanoparticles with a Reusable Template - "Plastic Antibodies".

    Science.gov (United States)

    Poma, Alessandro; Guerreiro, Antonio; Whitcombe, Michael J; Piletska, Elena V; Turner, Anthony P F; Piletsky, Sergey A

    2013-06-13

    Molecularly Imprinted Polymers (MIPs) are generic alternatives to antibodies in sensors, diagnostics and separations. To displace biomolecules without radical changes in infrastructure in device manufacture, MIPs should share their characteristics (solubility, size, specificity and affinity, localized binding domain) whilst maintaining the advantages of MIPs (low-cost, short development time and high stability) hence the interest in MIP nanoparticles. Herein we report a reusable solid-phase template approach (fully compatible with automation) for the synthesis of MIP nanoparticles and their precise manufacture using a prototype automated UV photochemical reactor. Batches of nanoparticles (30-400 nm) with narrow size distributions imprinted with: melamine (d = 60 nm, K d = 6.3 × 10 -8 m), vancomycin (d = 250 nm, K d = 3.4 × 10 -9 m), a peptide (d = 350 nm, K d = 4.8 × 10 -8 m) and proteins have been produced. Our instrument uses a column packed with glass beads, bearing the template. Process parameters are under computer control, requiring minimal manual intervention. For the first time we demonstrate the reliable re-use of molecular templates in the synthesis of MIPs (≥ 30 batches of nanoMIPs without loss of performance). NanoMIPs are produced template-free and the solid-phase acts both as template and affinity separation medium.

  16. Template analysis for the MAGIC telescopes

    Energy Technology Data Exchange (ETDEWEB)

    Menzel, Uta [Max-Planck-Institut fuer Physik, Muenchen (Germany); Collaboration: MAGIC-Collaboration

    2016-07-01

    The MAGIC telescopes are two 17-m-diameter Imaging Air Cherenkov Telescopes located on the Canary island of La Palma. They record the Cherenkov light from air showers induced by very high energy photons. The current data analysis uses a parametrization of the two shower images (including Hillas parameters) to determine the characteristics of the primary particle. I am implementing an advanced analysis method that compares shower images on a pixel basis with template images based on Monte Carlo simulations. To reduce the simulation effort the templates contain only pure shower images that are convolved with the telescope response later in the analysis. The primary particle parameters are reconstructed by maximizing the likelihood of the template. By using all the information available in the shower images, the performance of MAGIC is expected to improve. In this presentation I will explain the general idea of a template-based analysis and show the first results of the implementation.

  17. Graphene Emerges as a Versatile Template for Materials Preparation.

    Science.gov (United States)

    Li, Zhengjie; Wu, Sida; Lv, Wei; Shao, Jiao-Jing; Kang, Feiyu; Yang, Quan-Hong

    2016-05-01

    Graphene and its derivatives are emerging as a class of novel but versatile templates for the controlled preparation and functionalization of materials. In this paper a conceptual review on graphene-based templates is given, highlighting their versatile roles in materials preparation. Graphene is capable of acting as a low-dimensional hard template, where its two-dimensional morphology directs the formation of novel nanostructures. Graphene oxide and other functionalized graphenes are amphiphilic and may be seen as soft templates for formatting the growth or inducing the controlled assembly of nanostructures. In addition, nanospaces in restacked graphene can be used for confining the growth of sheet-like nanostructures, and assemblies of interlinked graphenes can behave either as skeletons for the formation of composite materials or as sacrificial templates for novel materials with a controlled network structure. In summary, flexible graphene and its derivatives together with an increasing number of assembled structures show great potentials as templates for materials production. Many challenges remain, for example precise structural control of such novel templates and the removal of the non-functional remaining templates. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Speed-up Template Matching through Integral Image based Weak Classifiers

    NARCIS (Netherlands)

    Wu, t.; Toet, A.

    2014-01-01

    Template matching is a widely used pattern recognition method, especially in industrial inspection. However, the computational costs of traditional template matching increase dramatically with both template-and scene imagesize. This makes traditional template matching less useful for many (e.g.

  19. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  20. Core security requirements of DRM systems

    NARCIS (Netherlands)

    Jonker, H.L.; Mauw, S.; Satish, D.

    2008-01-01

    The use of Digital Rights Management (DRM) systems involves several stakeholders, such as the content provider, the license provider and the user, each having their own incentives to use the system. Proper use of the system implies that these incentives can only be met if certain security

  1. Object-based target templates guide attention during visual search.

    Science.gov (United States)

    Berggren, Nick; Eimer, Martin

    2018-05-03

    During visual search, attention is believed to be controlled in a strictly feature-based fashion, without any guidance by object-based target representations. To challenge this received view, we measured electrophysiological markers of attentional selection (N2pc component) and working memory (sustained posterior contralateral negativity; SPCN) in search tasks where two possible targets were defined by feature conjunctions (e.g., blue circles and green squares). Critically, some search displays also contained nontargets with two target features (incorrect conjunction objects, e.g., blue squares). Because feature-based guidance cannot distinguish these objects from targets, any selective bias for targets will reflect object-based attentional control. In Experiment 1, where search displays always contained only one object with target-matching features, targets and incorrect conjunction objects elicited identical N2pc and SPCN components, demonstrating that attentional guidance was entirely feature-based. In Experiment 2, where targets and incorrect conjunction objects could appear in the same display, clear evidence for object-based attentional control was found. The target N2pc became larger than the N2pc to incorrect conjunction objects from 250 ms poststimulus, and only targets elicited SPCN components. This demonstrates that after an initial feature-based guidance phase, object-based templates are activated when they are required to distinguish target and nontarget objects. These templates modulate visual processing and control access to working memory, and their activation may coincide with the start of feature integration processes. Results also suggest that while multiple feature templates can be activated concurrently, only a single object-based target template can guide attention at any given time. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  2. Computer templates in chronic disease management: ethnographic case study in general practice.

    Science.gov (United States)

    Swinglehurst, Deborah; Greenhalgh, Trisha; Roberts, Celia

    2012-01-01

    To investigate how electronic templates shape, enable and constrain consultations about chronic diseases. Ethnographic case study, combining field notes, video-recording, screen capture with a microanalysis of talk, body language and data entry-an approach called linguistic ethnography. Two general practices in England. Ethnographic observation of administrative areas and 36 nurse-led consultations was done. Twenty-four consultations were directly observed and 12 consultations were video-recorded alongside computer screen capture. Consultations were transcribed using conversation analysis conventions, with notes on body language and the electronic record. The analysis involved repeated rounds of viewing video, annotating field notes, transcription and microanalysis to identify themes. The data was interpreted using discourse analysis, with attention to the sociotechnical theory. Consultations centred explicitly or implicitly on evidence-based protocols inscribed in templates. Templates did not simply identify tasks for completion, but contributed to defining what chronic diseases were, how care was being delivered and what it meant to be a patient or professional in this context. Patients' stories morphed into data bytes; the particular became generalised; the complex was made discrete, simple and manageable; and uncertainty became categorised and contained. Many consultations resembled bureaucratic encounters, primarily oriented to completing data fields. We identified a tension, sharpened by the template, between different framings of the patient-as 'individual' or as 'one of a population'. Some clinicians overcame this tension, responding creatively to prompts within a dialogue constructed around the patient's narrative. Despite their widespread implementation, little previous research has examined how templates are actually used in practice. Templates do not simply document the tasks of chronic disease management but profoundly change the nature of this work

  3. Identity based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing

    DEFF Research Database (Denmark)

    Cheng, Hongbing; Rong, Chunming; Tan, Zheng-Hua

    2012-01-01

    Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data...... access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key...... distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing....

  4. Synthesis of Hybrid Conducting Nanowire Using AAO Template

    Science.gov (United States)

    2006-09-28

    oxide and alujminum oxide in anodized aluminum oxide ( AAO ) template with various aspect ratio and...than 3 nm. 2. Experimentals Anodized aluminum oxide ( AAO ) template was prepared from 99.999% purity aluminum foil by performing the following...to prepare uniform dimension of nanomaterials is to use anodized alumina membrane as template. The work emphasized self-organized arrangement of

  5. PCI DSS: Security Standard and Security in Fact

    OpenAIRE

    M. V. Kuzin

    2011-01-01

    The article focuses on Payment Card Industry Data Security Standard (PCI DSS) requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  6. Nucleic Acid Templated Reactions for Chemical Biology.

    Science.gov (United States)

    Di Pisa, Margherita; Seitz, Oliver

    2017-06-21

    Nucleic acid directed bioorthogonal reactions offer the fascinating opportunity to unveil and redirect a plethora of intracellular mechanisms. Nano- to picomolar amounts of specific RNA molecules serve as templates and catalyze the selective formation of molecules that 1) exert biological effects, or 2) provide measurable signals for RNA detection. Turnover of reactants on the template is a valuable asset when concentrations of RNA templates are low. The idea is to use RNA-templated reactions to fully control the biodistribution of drugs and to push the detection limits of DNA or RNA analytes to extraordinary sensitivities. Herein we review recent and instructive examples of conditional synthesis or release of compounds for in cellulo protein interference and intracellular nucleic acid imaging. © 2017 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA.

  7. Dye-sensitized PS-b-P2VP-templated nickel oxide films for photoelectrochemical applications.

    Science.gov (United States)

    Massin, Julien; Bräutigam, Maximilian; Kaeffer, Nicolas; Queyriaux, Nicolas; Field, Martin J; Schacher, Felix H; Popp, Jürgen; Chavarot-Kerlidou, Murielle; Dietzek, Benjamin; Artero, Vincent

    2015-06-06

    Moving from homogeneous water-splitting photocatalytic systems to photoelectrochemical devices requires the preparation and evaluation of novel p-type transparent conductive photoelectrode substrates. We report here on the sensitization of polystyrene-block-poly-(2-vinylpyridine) (PS-b-P2VP) diblock copolymer-templated NiO films with an organic push-pull dye. The potential of these new templated NiO film preparations for photoelectrochemical applications is compared with NiO material templated by F108 triblock copolymers. We conclude that NiO films are promising materials for the construction of dye-sensitized photocathodes to be inserted into photoelectrochemical (PEC) cells. However, a combined effort at the interface between materials science and molecular chemistry, ideally funded within a Global Artificial Photosynthesis Project, is still needed to improve the overall performance of the photoelectrodes and progress towards economically viable PEC devices.

  8. Gravitational waves from inspiralling compact binaries: Hexagonal template placement and its efficiency in detecting physical signals

    International Nuclear Information System (INIS)

    Cokelaer, T.

    2007-01-01

    Matched filtering is used to search for gravitational waves emitted by inspiralling compact binaries in data from the ground-based interferometers. One of the key aspects of the detection process is the design of a template bank that covers the astrophysically pertinent parameter space. In an earlier paper, we described a template bank that is based on a square lattice. Although robust, we showed that the square placement is overefficient, with the implication that it is computationally more demanding than required. In this paper, we present a template bank based on an hexagonal lattice, which size is reduced by 40% with respect to the proposed square placement. We describe the practical aspects of the hexagonal template bank implementation, its size, and computational cost. We have also performed exhaustive simulations to characterize its efficiency and safeness. We show that the bank is adequate to search for a wide variety of binary systems (primordial black holes, neutron stars, and stellar-mass black holes) and in data from both current detectors (initial LIGO, Virgo and GEO600) as well as future detectors (advanced LIGO and EGO). Remarkably, although our template bank placement uses a metric arising from a particular template family, namely, stationary phase approximation, we show that it can be used successfully with other template families (e.g., Pade resummation and effective one-body approximation). This quality of being effective for different template families makes the proposed bank suitable for a search that would use several of them in parallel (e.g., in a binary black hole search). The hexagonal template bank described in this paper is currently used to search for nonspinning inspiralling compact binaries in data from the Laser Interferometer Gravitational-Wave Observatory (LIGO)

  9. Templated electrodeposition of functional nanostructures: nanowires, nanotubes and nanocubes

    NARCIS (Netherlands)

    Maijenburg, A.W.

    2014-01-01

    This thesis is entitled “Templated electrodeposition of functional nanostructures: nanowires, nanotubes and nanocubes”. Templated electrodeposition is the synthesis technique that was used throughout this thesis, and it comprises the use of a template with specific shape and dimensions for the

  10. Metric-Aware Secure Service Orchestration

    Directory of Open Access Journals (Sweden)

    Gabriele Costa

    2012-12-01

    Full Text Available Secure orchestration is an important concern in the internet of service. Next to providing the required functionality the composite services must also provide a reasonable level of security in order to protect sensitive data. Thus, the orchestrator has a need to check whether the complex service is able to satisfy certain properties. Some properties are expressed with metrics for precise definition of requirements. Thus, the problem is to analyse the values of metrics for a complex business process. In this paper we extend our previous work on analysis of secure orchestration with quantifiable properties. We show how to define, verify and enforce quantitative security requirements in one framework with other security properties. The proposed approach should help to select the most suitable service architecture and guarantee fulfilment of the declared security requirements.

  11. Nanowires and nanostructures fabrication using template methods

    DEFF Research Database (Denmark)

    Mátéfi-Tempfli, Stefan; Mátéfi-Tempfli, M.; Vlad, A.

    2009-01-01

    One of the great challenges of today is to find reliable techniques for the fabrication of nanomaterials and nanostructures. Methods based on template synthesis and on self organization are the most promising due to their easiness and low cost. This paper focuses on the electrochemical synthesis ...... of nanowires and nanostructures using nanoporous host materials such as supported anodic aluminum considering it as a key template for nanowires based devices. New ways are opened for applications by combining such template synthesis methods with nanolithographic techniques....

  12. PCI DSS: Security Standard and Security in Fact

    Directory of Open Access Journals (Sweden)

    M. V. Kuzin

    2011-12-01

    Full Text Available The article focuses on Payment Card Industry Data Security Standard (PCI DSS requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  13. 20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Application for security deposit determination; information to be submitted; other requirements. 703.203 Section 703.203 Employees' Benefits... each insurance rating service designated by the Branch and posted on the Internet at http://www.dol.gov...

  14. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Science.gov (United States)

    2010-07-01

    ... evacuation routes and assembly stations; and (viii) Existing security and safety equipment for protection of... protection systems; (iv) Procedural policies; (v) Radio and telecommunication systems, including computer... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Security Assessment (FSA...

  15. Systematic Heuristic Evaluation of Computerized Consultation Order Templates: Clinicians' and Human Factors Engineers' Perspectives.

    Science.gov (United States)

    Savoy, April; Patel, Himalaya; Flanagan, Mindy E; Weiner, Michael; Russ, Alissa L

    2017-08-01

    We assessed the usability of consultation order templates and identified problems to prioritize in design efforts for improving referral communication. With a sample of 26 consultation order templates, three evaluators performed a usability heuristic evaluation. The evaluation used 14 domain-independent heuristics and the following three supplemental references: 1 new domain-specific heuristic, 6 usability goals, and coded clinicians' statements regarding ease of use for 10 sampled templates. Evaluators found 201 violations, a mean of 7.7 violations per template. Minor violations outnumbered major violations almost twofold, 115 (57%) to 62 (31%). Approximately 68% of violations were linked to 5 heuristics: aesthetic and minimalist design (17%), error prevention (16%), consistency and standards (14%), recognition rather than recall (11%), and meet referrers' information needs (10%). Severe violations were attributed mostly to meet referrers' information needs and recognition rather than recall. Recorded violations yielded potential negative consequences for efficiency, effectiveness, safety, learnability, and utility. Evaluators and clinicians demonstrated 80% agreement in usability assessment. Based on frequency and severity of usability heuristic violations, the consultation order templates reviewed may impede clinical efficiency and risk patient safety. Results support the following design considerations: communicate consultants' requirements, facilitate information seeking, and support communication. While the most frequent heuristic violations involved interaction design and presentation, the most severe violations lacked information desired by referring clinicians. Violations related to templates' inability to support referring clinicians' information needs had the greatest potential negative impact on efficiency and safety usability goals. Heuristics should be prioritized in future design efforts.

  16. Exemplary design of a DICOM structured report template for CBIR integration into radiological routine

    Science.gov (United States)

    Welter, Petra; Deserno, Thomas M.; Gülpers, Ralph; Wein, Berthold B.; Grouls, Christoph; Günther, Rolf W.

    2010-03-01

    The large and continuously growing amount of medical image data demands access methods with regards to content rather than simple text-based queries. The potential benefits of content-based image retrieval (CBIR) systems for computer-aided diagnosis (CAD) are evident and have been approved. Still, CBIR is not a well-established part of daily routine of radiologists. We have already presented a concept of CBIR integration for the radiology workflow in accordance with the Integrating the Healthcare Enterprise (IHE) framework. The retrieval result is composed as a Digital Imaging and Communication in Medicine (DICOM) Structured Reporting (SR) document. The use of DICOM SR provides interchange with PACS archive and image viewer. It offers the possibility of further data mining and automatic interpretation of CBIR results. However, existing standard templates do not address the domain of CBIR. We present a design of a SR template customized for CBIR. Our approach is based on the DICOM standard templates and makes use of the mammography and chest CAD SR templates. Reuse of approved SR sub-trees promises a reliable design which is further adopted to the CBIR domain. We analyze the special CBIR requirements and integrate the new concept of similar images into our template. Our approach also includes the new concept of a set of selected images for defining the processed images for CBIR. A commonly accepted pre-defined template for the presentation and exchange of results in a standardized format promotes the widespread application of CBIR in radiological routine.

  17. Three-dimensional metallic opals fabricated by double templating

    International Nuclear Information System (INIS)

    Yan Qingfeng; Nukala, Pavan; Chiang, Yet-Ming; Wong, C.C.

    2009-01-01

    We report a simple and cost-effective double templating method for fabricating large-area three-dimensional metallic photonic crystals of controlled thickness. A self-assembled polystyrene opal was used as the first template to fabricate a silica inverse opal on a gold-coated glass substrate via sol-gel processing. Gold was subsequently infiltrated to the pores of the silica inverse opal using electrochemical deposition. A high-quality three-dimensional gold photonic crystal was obtained after removal of the secondary template (silica inverse opal). The effects of template sphere size and deposition current density on the gold growth rate, and the resulting morphology and growth mechanism of the gold opal, were investigated.

  18. Light Weight Biomorphous Cellular Ceramics from Cellulose Templates

    Science.gov (United States)

    Singh, Mrityunjay; Yee, Bo-Moon; Gray, Hugh R. (Technical Monitor)

    2003-01-01

    Bimorphous ceramics are a new class of materials that can be fabricated from the cellulose templates derived from natural biopolymers. These biopolymers are abundantly available in nature and are produced by the photosynthesis process. The wood cellulose derived carbon templates have three- dimensional interconnectivity. A wide variety of non-oxide and oxide based ceramics have been fabricated by template conversion using infiltration and reaction-based processes. The cellular anatomy of the cellulose templates plays a key role in determining the processing parameters (pyrolysis, infiltration conditions, etc.) and resulting ceramic materials. The processing approach, microstructure, and mechanical properties of the biomorphous cellular ceramics (silicon carbide and oxide based) have been discussed.

  19. Maritime supply chain security: navigating through a sea of compliance requirements

    CSIR Research Space (South Africa)

    Maspero, EL

    2008-11-01

    Full Text Available MTSA Maritime Transportation Security Act RFID Radio Frequency Identification SAFE Security and Accountability For Every port SOLAS Safety Of Life At Sea SST Smart and Secure Tradelane UNCTAD United Nations Conference on Trade and Development... for increased security within maritime shipping and so the SOLAS (the Safety of Lives at Sea) Convention Chapter 11 was amended to provide for the inclusion of the International Ships and Port Facilities Security Code (ISPS Code), which was internationally...

  20. Improving your target-template alignment with MODalign.

    KAUST Repository

    Barbato, Alessandro

    2012-02-04

    SUMMARY: MODalign is an interactive web-based tool aimed at helping protein structure modelers to inspect and manually modify the alignment between the sequences of a target protein and of its template(s). It interactively computes, displays and, upon modification of the target-template alignment, updates the multiple sequence alignments of the two protein families, their conservation score, secondary structure and solvent accessibility values, and local quality scores of the implied three-dimensional model(s). Although it has been designed to simplify the target-template alignment step in modeling, it is suitable for all cases where a sequence alignment needs to be inspected in the context of other biological information. AVAILABILITY AND IMPLEMENTATION: Freely available on the web at http://modorama.biocomputing.it/modalign. Website implemented in HTML and JavaScript with all major browsers supported. CONTACT: jan.kosinski@uniroma1.it.

  1. Durable diamond-like carbon templates for UV nanoimprint lithography

    International Nuclear Information System (INIS)

    Tao, L; Ramachandran, S; Nelson, C T; Overzet, L J; Goeckner, M; Lee, G; Hu, W; Lin, M; Willson, C G; Wu, W

    2008-01-01

    The interaction between resist and template during the separation process after nanoimprint lithography (NIL) can cause the formation of defects and damage to the templates and resist patterns. To alleviate these problems, fluorinated self-assembled monolayers (F-SAMs, i.e. tridecafluoro-1,1,2,2,tetrahydrooctyl trichlorosilane or FDTS) have been employed as template release coatings. However, we find that the FDTS coating undergoes irreversible degradation after only 10 cycles of UV nanoimprint processes with SU-8 resist. The degradation includes a 28% reduction in surface F atoms and significant increases in the surface roughness. In this paper, diamond-like carbon (DLC) films were investigated as an alternative material not only for coating but also for direct fabrication of nanoimprint templates. DLC films deposited on quartz templates in a plasma enhanced chemical vapor deposition system are shown to have better chemical and physical stability than FDTS. After the same 10 cycles of UV nanoimprints, the surface composition as well as the roughness of DLC films were found to be unchanged. The adhesion energy between the DLC surface and SU-8 is found to be smaller than that of FDTS despite the slightly higher total surface energy of DLC. DLC templates with 40 nm features were fabricated using e-beam lithography followed by Cr lift-off and reactive ion etching. UV nanoimprinting using the directly patterned DLC templates in SU-8 resist demonstrates good pattern transfer fidelity and easy template-resist separation. These results indicate that DLC is a promising material for fabricating durable templates for UV nanoimprint lithography

  2. Matched filtering of numerical relativity templates of spinning binary black holes

    International Nuclear Information System (INIS)

    Vaishnav, Birjoo; Hinder, Ian; Herrmann, Frank; Shoemaker, Deirdre

    2007-01-01

    Tremendous progress has been made towards the solution of the binary-black-hole problem in numerical relativity. The waveforms produced by numerical relativity will play a role in gravitational wave detection as either test beds for analytic template banks or as template banks themselves. As the parameter space explored by numerical relativity expands, the importance of quantifying the effect that each parameter has on first the detection of gravitational waves and then the parameter estimation of their sources increases. In light of this, we present a study of equal-mass, spinning binary-black-hole evolutions through matched filtering techniques commonly used in data analysis. We study how the match between two numerical waveforms varies with numerical resolution, initial angular momentum of the black holes, and the inclination angle between the source and the detector. This study is limited by the fact that the spinning black-hole binaries are oriented axially and the waveforms only contain approximately two and a half orbits before merger. We find that for detection purposes, spinning black holes require the inclusion of the higher harmonics in addition to the dominant mode, a condition that becomes more important as the black-hole spins increase. In addition, we conduct a preliminary investigation of how well a template of fixed spin and inclination angle can detect target templates of arbitrary but nonprecessing spin and inclination for the axial case considered here

  3. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  4. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  5. Business Process Variability : A Tool for Declarative Template Design

    NARCIS (Netherlands)

    Bulanov, P.; Groefsema, H.; Aiello, M.

    2012-01-01

    To lower both implementation time and cost, many Business Process Management tools use process templates to implement highly recurring processes. However, in order for such templates to be used, a process has to adhere substantially to the template. Therefore, current practice for processes which

  6. MOCVD epitaxy of InAlN on different templates

    International Nuclear Information System (INIS)

    Yun Lijun; Wei Tongbo; Yan Jianchang; Liu Zhe; Wang Junxi; Li Jinmin

    2011-01-01

    InAlN epilayers were grown on high quality GaN and AlN templates with the same growth parameters. Measurement results showed that two samples had the same In content of ∼ 16%, while the crystal quality and surface topography of the InAlN epilayer grown on the AlN template, with 282.3 (002) full width at half maximum (FWHM) of rocking curve, 313.5 (102) FWHM, surface roughness of 0.39 nm and V-pit density of 2.8 x 10 8 cm -2 , were better than that of the InAlN epilayer grown on the GaN template, 309.3, 339.1, 0.593 nm and 4.2 x 10 8 cm -2 . A primary conclusion was proposed that both the crystal quality and the surface topography of the InAlN epilayer grown on the AlN template were better than that of the InAlN epilayer grown on the GaN template. Therefore, the AlN template was a better choice than the GaN template for getting high quality InAlN epilayers. (semiconductor materials)

  7. Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models

    National Research Council Canada - National Science Library

    Mead, Nancy R; Viswanathan, Venkatesh; Padmanabhan, Deepa; Raveendran, Anusha

    2008-01-01

    ...). This report is for information technology managers and security professionals, management personnel with technical and information security knowledge, and any personnel who manage security-critical...

  8. Joomla! 3 template essentials

    CERN Document Server

    Frankowski, Pawel

    2013-01-01

    Using this hands-on, step-by step tutorial filled with practical examples, the readers will be able to create beautiful templates and themes for your websites that will make them stand out from others.This book is written for all of you who wish to create your own unique templates for Joomla! 3.x. This book can be used by Joomla! administrators or visual designers (with no programming experience) or those of you who are used to working with common web developer tools like HTML/CSS editors for coding purposes. You would need basic knowledge of Joomla! and some knowledge of CSS and HTML.

  9. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  10. Grid-texture mechanisms in human vision: Contrast detection of regular sparse micro-patterns requires specialist templates.

    Science.gov (United States)

    Baker, Daniel H; Meese, Tim S

    2016-07-27

    Previous work has shown that human vision performs spatial integration of luminance contrast energy, where signals are squared and summed (with internal noise) over area at detection threshold. We tested that model here in an experiment using arrays of micro-pattern textures that varied in overall stimulus area and sparseness of their target elements, where the contrast of each element was normalised for sensitivity across the visual field. We found a power-law improvement in performance with stimulus area, and a decrease in sensitivity with sparseness. While the contrast integrator model performed well when target elements constituted 50-100% of the target area (replicating previous results), observers outperformed the model when texture elements were sparser than this. This result required the inclusion of further templates in our model, selective for grids of various regular texture densities. By assuming a MAX operation across these noisy mechanisms the model also accounted for the increase in the slope of the psychometric function that occurred as texture density decreased. Thus, for the first time, mechanisms that are selective for texture density have been revealed at contrast detection threshold. We suggest that these mechanisms have a role to play in the perception of visual textures.

  11. SEGMENTATION OF MICROSCOPIC IMAGES OF BACTERIA IN BULGARIAN YOGHURT BY TEMPLATE MATCHING

    Directory of Open Access Journals (Sweden)

    Zlatin Zlatev

    2016-12-01

    Full Text Available The diagnosis of deviations in quality of yogurt is performed by approved methods set out in the Bulgarian national standard (BNS and its adjacent regulations. The basic method of evaluation of the microbiological quality of the product is the microscopic. The method is subjective and requires significant processing time of the samples. The precision of diagnosis is not high and depends on the qualifications of the expert. The systems for pattern recognition in the most natural way interpret this specific expert activity. The aim of this report is to assess the possibility of application of a method of processing and image analysis for determination of the microbiological quality of yogurt. Selected method is template matching. A comparative analysis is made of the methods for template matching. The comparative analysis of available algorithms showed that the known ones have certain disadvantages associated with their rapid-action, the use of simplified procedures, they are sensitive to rotation of the object in the template. It is developed algorithm that complement these known and overcome some of their disadvantages.

  12. Structure of Hepatitis C Virus Polymerase in Complex with Primer-Template RNA

    Energy Technology Data Exchange (ETDEWEB)

    Mosley, Ralph T.; Edwards, Thomas E.; Murakami, Eisuke; Lam, Angela M.; Grice, Rena L.; Du, Jinfa; Sofia, Michael J.; Furman, Philip A.; Otto, Michael J. (Pharmasset); (Emerald)

    2012-08-01

    The replication of the hepatitis C viral (HCV) genome is accomplished by the NS5B RNA-dependent RNA polymerase (RdRp), for which mechanistic understanding and structure-guided drug design efforts have been hampered by its propensity to crystallize in a closed, polymerization-incompetent state. The removal of an autoinhibitory {beta}-hairpin loop from genotype 2a HCV NS5B increases de novo RNA synthesis by >100-fold, promotes RNA binding, and facilitated the determination of the first crystallographic structures of HCV polymerase in complex with RNA primer-template pairs. These crystal structures demonstrate the structural realignment required for primer-template recognition and elongation, provide new insights into HCV RNA synthesis at the molecular level, and may prove useful in the structure-based design of novel antiviral compounds. Additionally, our approach for obtaining the RNA primer-template-bound structure of HCV polymerase may be generally applicable to solving RNA-bound complexes for other viral RdRps that contain similar regulatory {beta}-hairpin loops, including bovine viral diarrhea virus, dengue virus, and West Nile virus.

  13. PDS Label Assistant for Interactive Design (PLAID): Simplifying PDS4 Label Template Building

    Science.gov (United States)

    Algermissen, S. S.; Padams, J. H.; Radulescu, C.

    2017-06-01

    The PDS Label Assistant for Interactive Design (PLAID) tool seeks to simplify and expedite the process of building a PDS4 label template with a simple step-by-step interface that does not require experience with XML or PDS4 Schemas and Schematrons.

  14. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  15. Silver nanowires-templated metal oxide for broadband Schottky photodetector

    Energy Technology Data Exchange (ETDEWEB)

    Patel, Malkeshkumar; Kim, Hong-Sik; Kim, Joondong, E-mail: joonkim@inu.ac.kr [Photoelectric and Energy Device Application Lab (PEDAL) and Department of Electrical Engineering, Incheon National University, 119 Academy Rd. Yeonsu, Incheon 406772 (Korea, Republic of); Park, Hyeong-Ho [Applied Device and Material Lab., Device Technology Division, Korea Advanced Nano Fab Center (KANC), Suwon 443270 (Korea, Republic of)

    2016-04-04

    Silver nanowires (AgNWs)-templated transparent metal oxide layer was applied for Si Schottky junction device, which remarked the record fastest photoresponse of 3.4 μs. Self-operating AgNWs-templated Schottky photodetector showed broad wavelength photodetection with high responsivity (42.4 A W{sup −1}) and detectivity (2.75 × 10{sup 15} Jones). AgNWs-templated indium-tin-oxide (ITO) showed band-to-band excitation due to the internal photoemission, resulting in significant carrier collection performances. Functional metal oxide layer was formed by AgNWs-templated from ITO structure. The grown ITO above AgNWs has a cylindrical shape and acts as a thermal protector of AgNWs for high temperature environment without any deformation. We developed thermal stable AgNWs-templated transparent oxide devices and demonstrated the working mechanism of AgNWs-templated Schottky devices. We may propose the high potential of hybrid transparent layer design for various photoelectric applications, including solar cells.

  16. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@visite.es [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Barbato, P. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Taliercio, C. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy)

    2011-10-15

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  17. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    International Nuclear Information System (INIS)

    Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.

    2011-01-01

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  18. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  19. Influence of template/functional monomer/cross‐linking monomer ratio on particle size and binding properties of molecularly imprinted nanoparticles

    DEFF Research Database (Denmark)

    Yoshimatsu, Keiichi; Yamazaki, Tomohiko; Chronakis, Ioannis S.

    2012-01-01

    A series of molecularly imprinted polymer nanoparticles have been synthesized employing various template/functional monomer/crosslinking monomer ratio and characterized in detail to elucidate the correlation between the synthetic conditions used and the properties (e.g., particle size and templat...... tuning of particle size and binding properties are required to fit practical applications. © 2011 Wiley Periodicals, Inc. J Appl Polym Sci, 2012...

  20. View-Invariant Gait Recognition Through Genetic Template Segmentation

    Science.gov (United States)

    Isaac, Ebenezer R. H. P.; Elias, Susan; Rajagopalan, Srinivasan; Easwarakumar, K. S.

    2017-08-01

    Template-based model-free approach provides by far the most successful solution to the gait recognition problem in literature. Recent work discusses how isolating the head and leg portion of the template increase the performance of a gait recognition system making it robust against covariates like clothing and carrying conditions. However, most involve a manual definition of the boundaries. The method we propose, the genetic template segmentation (GTS), employs the genetic algorithm to automate the boundary selection process. This method was tested on the GEI, GEnI and AEI templates. GEI seems to exhibit the best result when segmented with our approach. Experimental results depict that our approach significantly outperforms the existing implementations of view-invariant gait recognition.

  1. Animated pose templates for modeling and detecting human actions.

    Science.gov (United States)

    Yao, Benjamin Z; Nie, Bruce X; Liu, Zicheng; Zhu, Song-Chun

    2014-03-01

    This paper presents animated pose templates (APTs) for detecting short-term, long-term, and contextual actions from cluttered scenes in videos. Each pose template consists of two components: 1) a shape template with deformable parts represented in an And-node whose appearances are represented by the Histogram of Oriented Gradient (HOG) features, and 2) a motion template specifying the motion of the parts by the Histogram of Optical-Flows (HOF) features. A shape template may have more than one motion template represented by an Or-node. Therefore, each action is defined as a mixture (Or-node) of pose templates in an And-Or tree structure. While this pose template is suitable for detecting short-term action snippets in two to five frames, we extend it in two ways: 1) For long-term actions, we animate the pose templates by adding temporal constraints in a Hidden Markov Model (HMM), and 2) for contextual actions, we treat contextual objects as additional parts of the pose templates and add constraints that encode spatial correlations between parts. To train the model, we manually annotate part locations on several keyframes of each video and cluster them into pose templates using EM. This leaves the unknown parameters for our learning algorithm in two groups: 1) latent variables for the unannotated frames including pose-IDs and part locations, 2) model parameters shared by all training samples such as weights for HOG and HOF features, canonical part locations of each pose, coefficients penalizing pose-transition and part-deformation. To learn these parameters, we introduce a semi-supervised structural SVM algorithm that iterates between two steps: 1) learning (updating) model parameters using labeled data by solving a structural SVM optimization, and 2) imputing missing variables (i.e., detecting actions on unlabeled frames) with parameters learned from the previous step and progressively accepting high-score frames as newly labeled examples. This algorithm belongs to a

  2. Re-usable templates for documenting the elaboration and architectural design of the CMS software

    International Nuclear Information System (INIS)

    Wellisch, J.P.; Tuura, L.

    2001-01-01

    Modern standards and definitions of deliverables for software development are provided by various standards like PSS-05, CMMI, ECSS, Volere, Rational Unified process or SPICE (ISO 15504). Modern document templates and the corresponding documents are based on atomic shells that cross-link, and can be subsequently assembled into a set of complete documents; views of the information in the shells. This makes the information easy to maintain, and enables selective views of the documentation. The authors will present a catalogue of document templates that has been developed in the context of the CMS CAFE forum, as well as their cross-linkage, using UML as the modelling language. The templates allow for documenting the elaboration and architectural design phases of software development. They can be used as the basis for establishing and documenting architecture, while establishing trace-ability to use-cases, requirements, constraints, and important technological choices in a maintainable manner

  3. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  4. RiskREP : risk-based security requirements elicitation and prioritization

    NARCIS (Netherlands)

    Herrmann, A.; Morali, A.; Etalle, S.; Wieringa, R.J.

    2011-01-01

    Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement "good-enough security" but need to be able to justify their security investment plans. In this paper, we present a Risk-Based

  5. Enhancing implementation security of QKD

    Science.gov (United States)

    Tamaki, Kiyoshi

    2017-10-01

    Quantum key distribution (QKD) can achieve information-theoretic security, which is a provable security against any eavesdropping, given that all the devices the sender and the receiver employ operate exactly as the theory of security requires. Unfortunately, however, it is difficult for practical devices to meet all such requirements, and therefore more works have to be done toward guaranteeing information-theoretic security in practice, i.e., implementation security. In this paper, we review our recent efforts to enhance implementation security. We also have a brief look at a flaw in security proofs and present how to fix it.

  6. The Grid[Way] Job Template Manager, a tool for parameter sweeping

    Science.gov (United States)

    Lorca, Alejandro; Huedo, Eduardo; Llorente, Ignacio M.

    2011-04-01

    Parameter sweeping is a widely used algorithmic technique in computational science. It is specially suited for high-throughput computing since the jobs evaluating the parameter space are loosely coupled or independent. A tool that integrates the modeling of a parameter study with the control of jobs in a distributed architecture is presented. The main task is to facilitate the creation and deletion of job templates, which are the elements describing the jobs to be run. Extra functionality relies upon the GridWay Metascheduler, acting as the middleware layer for job submission and control. It supports interesting features like multi-dimensional sweeping space, wildcarding of parameters, functional evaluation of ranges, value-skipping and job template automatic indexation. The use of this tool increases the reliability of the parameter sweep study thanks to the systematic bookkeeping of job templates and respective job statuses. Furthermore, it simplifies the porting of the target application to the grid reducing the required amount of time and effort. Program summaryProgram title: Grid[Way] Job Template Manager (version 1.0) Catalogue identifier: AEIE_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEIE_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Apache license 2.0 No. of lines in distributed program, including test data, etc.: 3545 No. of bytes in distributed program, including test data, etc.: 126 879 Distribution format: tar.gz Programming language: Perl 5.8.5 and above Computer: Any (tested on PC x86 and x86_64) Operating system: Unix, GNU/Linux (tested on Ubuntu 9.04, Scientific Linux 4.7, centOS 5.4), Mac OS X (tested on Snow Leopard 10.6) RAM: 10 MB Classification: 6.5 External routines: The GridWay Metascheduler [1]. Nature of problem: To parameterize and manage an application running on a grid or cluster. Solution method: Generation of job templates as a cross product of

  7. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  8. I - Template Metaprogramming for Massively Parallel Scientific Computing - Expression Templates

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Large scale scientific computing raises questions on different levels ranging from the fomulation of the problems to the choice of the best algorithms and their implementation for a specific platform. There are similarities in these different topics that can be exploited by modern-style C++ template metaprogramming techniques to produce readable, maintainable and generic code. Traditional low-level code tend to be fast but platform-dependent, and it obfuscates the meaning of the algorithm. On the other hand, object-oriented approach is nice to read, but may come with an inherent performance penalty. These lectures aim to present he basics of the Expression Template (ET) idiom which allows us to keep the object-oriented approach without sacrificing performance. We will in particular show to to enhance ET to include SIMD vectorization. We will then introduce techniques for abstracting iteration, and introduce thread-level parallelism for use in heavy data-centric loads. We will show to to apply these methods i...

  9. Photon signature analysis using template matching

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, D.A., E-mail: d.a.bradley@surrey.ac.uk [Department of Physics, University of Surrey, Guildford GU2 7XH (United Kingdom); Hashim, S., E-mail: suhairul@utm.my [Department of Physics, Universiti Teknologi Malaysia, 81310 Skudai, Johor (Malaysia); Saripan, M.I. [Faculty of Engineering, Universiti Putra Malaysia, 43400 Serdang, Selangor (Malaysia); Wells, K. [Centre for Vision, Speech and Signal Processing, University of Surrey, Guildford GU2 7XH (United Kingdom); Dunn, W.L. [Department of Mechanical and Nuclear Engineering, Kansas State University, 3002 Rathbone Hall, Manhattan, KS 66506 (United States)

    2011-10-01

    We describe an approach to detect improvised explosive devices (IEDs) by using a template matching procedure. This approach relies on the signature due to backstreaming {gamma} photons from various targets. In this work we have simulated cylindrical targets of aluminum, iron, copper, water and ammonium nitrate (nitrogen-rich fertilizer). We simulate 3.5 MeV source photons distributed on a plane inside a shielded area using Monte Carlo N-Particle (MCNP{sup TM}) code version 5 (V5). The 3.5 MeV source gamma rays yield 511 keV peaks due to pair production and scattered gamma rays. In this work, we simulate capture of those photons that backstream, after impinging on the target element, toward a NaI detector. The captured backstreamed photons are expected to produce a unique spectrum that will become part of a simple signal processing recognition system based on the template matching method. Different elements were simulated using different sets of random numbers in the Monte Carlo simulation. To date, the sum of absolute differences (SAD) method has been used to match the template. In the examples investigated, template matching was found to detect all elements correctly.

  10. Acoustic transient classification with a template correlation processor.

    Science.gov (United States)

    Edwards, R T

    1999-10-01

    I present an architecture for acoustic pattern classification using trinary-trinary template correlation. In spite of its computational simplicity, the algorithm and architecture represent a method which greatly reduces bandwidth of the input, storage requirements of the classifier memory, and power consumption of the system without compromising classification accuracy. The linear system should be amenable to training using recently-developed methods such as Independent Component Analysis (ICA), and we predict that behavior will be qualitatively similar to that of structures in the auditory cortex.

  11. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2006-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  12. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2007-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  13. Network Security Validation Using Game Theory

    Science.gov (United States)

    Papadopoulou, Vicky; Gregoriades, Andreas

    Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.

  14. Random template placement and prior information

    International Nuclear Information System (INIS)

    Roever, Christian

    2010-01-01

    In signal detection problems, one is usually faced with the task of searching a parameter space for peaks in the likelihood function which indicate the presence of a signal. Random searches have proven to be very efficient as well as easy to implement, compared e.g. to searches along regular grids in parameter space. Knowledge of the parameterised shape of the signal searched for adds structure to the parameter space, i.e., there are usually regions requiring to be densely searched while in other regions a coarser search is sufficient. On the other hand, prior information identifies the regions in which a search will actually be promising or may likely be in vain. Defining specific figures of merit allows one to combine both template metric and prior distribution and devise optimal sampling schemes over the parameter space. We show an example related to the gravitational wave signal from a binary inspiral event. Here the template metric and prior information are particularly contradictory, since signals from low-mass systems tolerate the least mismatch in parameter space while high-mass systems are far more likely, as they imply a greater signal-to-noise ratio (SNR) and hence are detectable to greater distances. The derived sampling strategy is implemented in a Markov chain Monte Carlo (MCMC) algorithm where it improves convergence.

  15. Synthesis of Porous Carbon Monoliths Using Hard Templates.

    Science.gov (United States)

    Klepel, Olaf; Danneberg, Nina; Dräger, Matti; Erlitz, Marcel; Taubert, Michael

    2016-03-21

    The preparation of porous carbon monoliths with a defined shape via template-assisted routes is reported. Monoliths made from porous concrete and zeolite were each used as the template. The porous concrete-derived carbon monoliths exhibited high gravimetric specific surface areas up to 2000 m²·g -1 . The pore system comprised macro-, meso-, and micropores. These pores were hierarchically arranged. The pore system was created by the complex interplay of the actions of both the template and the activating agent as well. On the other hand, zeolite-made template shapes allowed for the preparation of microporous carbon monoliths with a high volumetric specific surface area. This feature could be beneficial if carbon monoliths must be integrated into technical systems under space-limited conditions.

  16. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  17. Computer templates in chronic disease management: ethnographic case study in general practice

    Science.gov (United States)

    Swinglehurst, Deborah; Greenhalgh, Trisha; Roberts, Celia

    2012-01-01

    Objective To investigate how electronic templates shape, enable and constrain consultations about chronic diseases. Design Ethnographic case study, combining field notes, video-recording, screen capture with a microanalysis of talk, body language and data entry—an approach called linguistic ethnography. Setting Two general practices in England. Participants and methods Ethnographic observation of administrative areas and 36 nurse-led consultations was done. Twenty-four consultations were directly observed and 12 consultations were video-recorded alongside computer screen capture. Consultations were transcribed using conversation analysis conventions, with notes on body language and the electronic record. The analysis involved repeated rounds of viewing video, annotating field notes, transcription and microanalysis to identify themes. The data was interpreted using discourse analysis, with attention to the sociotechnical theory. Results Consultations centred explicitly or implicitly on evidence-based protocols inscribed in templates. Templates did not simply identify tasks for completion, but contributed to defining what chronic diseases were, how care was being delivered and what it meant to be a patient or professional in this context. Patients’ stories morphed into data bytes; the particular became generalised; the complex was made discrete, simple and manageable; and uncertainty became categorised and contained. Many consultations resembled bureaucratic encounters, primarily oriented to completing data fields. We identified a tension, sharpened by the template, between different framings of the patient—as ‘individual’ or as ‘one of a population’. Some clinicians overcame this tension, responding creatively to prompts within a dialogue constructed around the patient's narrative. Conclusions Despite their widespread implementation, little previous research has examined how templates are actually used in practice. Templates do not simply document the

  18. Adaptive template generation for amyloid PET using a deep learning approach.

    Science.gov (United States)

    Kang, Seung Kwan; Seo, Seongho; Shin, Seong A; Byun, Min Soo; Lee, Dong Young; Kim, Yu Kyeong; Lee, Dong Soo; Lee, Jae Sung

    2018-05-11

    Accurate spatial normalization (SN) of amyloid positron emission tomography (PET) images for Alzheimer's disease assessment without coregistered anatomical magnetic resonance imaging (MRI) of the same individual is technically challenging. In this study, we applied deep neural networks to generate individually adaptive PET templates for robust and accurate SN of amyloid PET without using matched 3D MR images. Using 681 pairs of simultaneously acquired 11 C-PIB PET and T1-weighted 3D MRI scans of AD, MCI, and cognitively normal subjects, we trained and tested two deep neural networks [convolutional auto-encoder (CAE) and generative adversarial network (GAN)] that produce adaptive best PET templates. More specifically, the networks were trained using 685,100 pieces of augmented data generated by rotating 527 randomly selected datasets and validated using 154 datasets. The input to the supervised neural networks was the 3D PET volume in native space and the label was the spatially normalized 3D PET image using the transformation parameters obtained from MRI-based SN. The proposed deep learning approach significantly enhanced the quantitative accuracy of MRI-less amyloid PET assessment by reducing the SN error observed when an average amyloid PET template is used. Given an input image, the trained deep neural networks rapidly provide individually adaptive 3D PET templates without any discontinuity between the slices (in 0.02 s). As the proposed method does not require 3D MRI for the SN of PET images, it has great potential for use in routine analysis of amyloid PET images in clinical practice and research. © 2018 Wiley Periodicals, Inc.

  19. Solid-Phase Synthesis of Molecularly Imprinted Polymer Nanoparticles with a Reusable Template – “Plastic Antibodies”

    Science.gov (United States)

    Poma, Alessandro; Guerreiro, Antonio; Whitcombe, Michael J.; Piletska, Elena V.; Turner, Anthony P.F.; Piletsky, Sergey A.

    2016-01-01

    Molecularly Imprinted Polymers (MIPs) are generic alternatives to antibodies in sensors, diagnostics and separations. To displace biomolecules without radical changes in infrastructure in device manufacture, MIPs should share their characteristics (solubility, size, specificity and affinity, localized binding domain) whilst maintaining the advantages of MIPs (low-cost, short development time and high stability) hence the interest in MIP nanoparticles. Herein we report a reusable solid-phase template approach (fully compatible with automation) for the synthesis of MIP nanoparticles and their precise manufacture using a prototype automated UV photochemical reactor. Batches of nanoparticles (30-400 nm) with narrow size distributions imprinted with: melamine (d = 60 nm, Kd = 6.3 × 10−8 m), vancomycin (d = 250 nm, Kd = 3.4 × 10−9 m), a peptide (d = 350 nm, Kd = 4.8 × 10−8 m) and proteins have been produced. Our instrument uses a column packed with glass beads, bearing the template. Process parameters are under computer control, requiring minimal manual intervention. For the first time we demonstrate the reliable re-use of molecular templates in the synthesis of MIPs (≥ 30 batches of nanoMIPs without loss of performance). NanoMIPs are produced template-free and the solid-phase acts both as template and affinity separation medium. PMID:26869870

  20. gel template method

    Indian Academy of Sciences (India)

    TiO2 nanotubes have been synthesized by sol–gel template method using alumina membrane. Scanning electron microscopy (SEM), transmission electron microscopy (TEM), Raman spectroscopy, UV absorption spectrum and X-ray diffraction techniques have been used to investigate the structure, morphology and optical ...

  1. Preparation and crystallization of hollow α-Fe2O3 microspheres following the gas-bubble template method

    International Nuclear Information System (INIS)

    Valladares, L. de los Santos; León Félix, L.; Espinoza Suarez, S.M.; Bustamante Dominguez, A.G.; Mitrelias, T.; Holmes, S.; Moreno, N.O.; Albino Aguiar, J.; Barnes, C.H.W.

    2016-01-01

    In this work we report the formation of hollow α-Fe 2 O 3 (hematite) microspheres by the gas-bubble template method. This technique is simple and it does not require hard templates, surfactants, special conditions of atmosphere or complex steps. After reacting Fe(NO 3 ) 3 .9H 2 O and citric acid in water by sol–gel, the precursor was annealed in air at different temperatures between 180 and 600 °C. Annealing at 550 and 600 °C generates bubbles on the melt which crystallize and oxidizes to form hematite hollow spheres after quenching. The morphology and crystal evolution are studied by means of X-ray diffraction and scanning electron microscopy. We found that after annealing at 250–400 °C, the sample consist of a mixture of magnetite, maghemite and hematite. Single hematite phase in the form of hollow microspheres is obtained after annealing at 550 and 600 °C. The crystallization and crystal size of the hematite shells increase with annealing temperature. A possible mechanism for hollow sphere formation is presented. - Highlights: • Formation of hollow hematite microspheres by the gas-bubble template method. • This technique does not require hard templates or special conditions of atmosphere. • Annealing promotes the transition magnetite to maghemite to hematite. • Crystallization of the hematite shells increase with annealing temperature.

  2. Using Semantic Web technologies for the generation of domain-specific templates to support clinical study metadata standards.

    Science.gov (United States)

    Jiang, Guoqian; Evans, Julie; Endle, Cory M; Solbrig, Harold R; Chute, Christopher G

    2016-01-01

    The Biomedical Research Integrated Domain Group (BRIDG) model is a formal domain analysis model for protocol-driven biomedical research, and serves as a semantic foundation for application and message development in the standards developing organizations (SDOs). The increasing sophistication and complexity of the BRIDG model requires new approaches to the management and utilization of the underlying semantics to harmonize domain-specific standards. The objective of this study is to develop and evaluate a Semantic Web-based approach that integrates the BRIDG model with ISO 21090 data types to generate domain-specific templates to support clinical study metadata standards development. We developed a template generation and visualization system based on an open source Resource Description Framework (RDF) store backend, a SmartGWT-based web user interface, and a "mind map" based tool for the visualization of generated domain-specific templates. We also developed a RESTful Web Service informed by the Clinical Information Modeling Initiative (CIMI) reference model for access to the generated domain-specific templates. A preliminary usability study is performed and all reviewers (n = 3) had very positive responses for the evaluation questions in terms of the usability and the capability of meeting the system requirements (with the average score of 4.6). Semantic Web technologies provide a scalable infrastructure and have great potential to enable computable semantic interoperability of models in the intersection of health care and clinical research.

  3. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  4. Generating XML schemas for DICOM structured reporting templates.

    Science.gov (United States)

    Zhao, Luyin; Lee, Kwok Pun; Hu, Jingkun

    2005-01-01

    In this paper, the authors describe a methodology to transform programmatically structured reporting (SR) templates defined by the Digital Imaging and Communications for Medicine (DICOM) standard into an XML schema representation. Such schemas can be used in the creation and validation of XML-encoded SR documents that use templates. Templates are a means to put additional constraints on an SR document to promote common formats for specific reporting applications or domains. As the use of templates becomes more widespread in the production of SR documents, it is important to ensure validity of such documents. The work described in this paper is an extension of the authors' previous work on XML schema representation for DICOM SR. Therefore, this paper inherits and partially modifies the structure defined in the earlier work.

  5. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  6. The Arctic Region: A Requirement for New Security Architecture?

    Science.gov (United States)

    2013-03-01

    cooperation and mutually beneficial partnerships . Denmark’s security policy states that existing international law and established forums of cooperation...increase leadership in multinational forum and, develop comprehensive partnerships without the need to create a new security organization. Figure 3...Arctic region. Endnotes 1 Government of Canada, “Canada’s Arctic foreign policy” (Ottawa, Canada, 2007), 2. 2 WWF Global, “Arctic oil and gas”, http

  7. Double displacement: An improved bioorthogonal reaction strategy for templated nucleic acid detection.

    Science.gov (United States)

    Kleinbaum, Daniel J; Miller, Gregory P; Kool, Eric T

    2010-06-16

    Quenched autoligation probes have been employed previously in a target-templated nonenzymatic ligation strategy for detecting nucleic acids in cells by fluorescence. A common source of background signal in such probes is the undesired reaction with water and other cellular nucleophiles. Here, we describe a new class of self-ligating probes, double displacement (DD) probes, that rely on two displacement reactions to fully unquench a nearby fluorophore. Three potential double displacement architectures, all possessing two fluorescence quencher/leaving groups (dabsylate groups), were synthesized and evaluated for templated reaction with nucleophile (phosphorothioate) probes both in vitro and in intact bacterial cells. All three DD probe designs provided substantially better initial quenching than a single-Dabsyl control. In isothermal templated reactions in vitro, double displacement probes yielded considerably lower background signal than previous single displacement probes; investigation into the mechanism revealed that one dabsylate acts as a sacrificial leaving group, reacting nonspecifically with water, but yielding little signal because another quencher group remains. Templated reaction with the specific nucleophile probe is required to activate a signal. The double displacement probes provided a ca. 80-fold turn-on signal and yielded a 2-4-fold improvement in signal/background over single Dabsyl probes. The best-performing probe architecture was demonstrated in a two-color, FRET-based two-allele discrimination system in vitro and was shown to be capable of discriminating between two closely related species of bacteria differing by a single nucleotide at an rRNA target site.

  8. Guidelines for computer security in general practice.

    Science.gov (United States)

    Schattner, Peter; Pleteshner, Catherine; Bhend, Heinz; Brouns, Johan

    2007-01-01

    As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice. To develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews. While the guideline was produced in the context of Australian general practice, we have developed a template that is also relevant for other countries. Current data on computer security measures was sought from Australian divisions of general practice. Semi-structured interviews were conducted with general practitioners (GPs), the medical software industry, senior managers within government responsible for health IT (information technology) initiatives, technical IT experts, divisions of general practice and a member of a health information consumer group. The respondents were asked to assess both the likelihood and the consequences of potential risks in computer security being breached. The study suggested that the most important computer security issues in general practice were: the need for a nominated IT security coordinator; having written IT policies, including a practice disaster recovery plan; controlling access to different levels of electronic data; doing and testing backups; protecting against viruses and other malicious codes; installing firewalls; undertaking routine maintenance of hardware and software; and securing electronic communication, for example via encryption. This information led to the production of computer security guidelines, including a one-page summary checklist, which were subsequently distributed to all GPs in Australia. This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making

  9. The need of appropriate brain SPECT templates for SPM comparisons

    International Nuclear Information System (INIS)

    Morbelli, S.; Altrinetti, V.; Piccardo, A.; Rodriguez, G.; Brugnolo, A.; Nobili, F.; Mignone, A.; Pupi, A.; Koulibaly, P.M.

    2008-01-01

    Statistical parametric mapping (SPM) is used worldwide to compare brain perfusion single photon emission computed tomography (SPECT) data. The default template within the SPM package used for SPECT image normalization includes images of a group of healthy subjects studied with 99m TcHMPAO. Since [ 99m Tc] HMPAO and [ 99m Tc] ECD have shown to distribute differently in SPECT studies, we formulated the hypothesis that comparing set of [ 99m Tc]ECD data normalized by means of a [ 99m Tc]HMPAO template may lead to incorrect results. A customized [ 99m Tc]ECD template was built with SPECT and magnetic resonance imaging (MRI) images of 22 neurologically healthy women. Then, two sets of subjects, i.e. a group of patients with very early Alzheimer's disease (eAD) and a matched control group, studied by means of [ 99m Tc]ECD SPECT, were chosen for comparisons. The same statistical approach (t-test between eAD patients and controls and correlation analysis between brain SPECT and a cognitive score) was applied twice, i.e. after normalization with either the default [ 99m Tc]HMPAO template or the customized [ 99m Tc]ECD template. In the comparison between eAD and controls, a cluster of difference in the posterior-cingulate gyrus of both hemispheres was only highlighted when using the customized [ 99m Tc]ECD template, but was missed when using the default [ 99m Tc]HMPAO template. In the correlation between brain perfusion and a cognitive score, the significant cluster was more significant and far more extended, also including the right superior temporal gyrus, using the customized [ 99m Tc]ECD template than using the default [ 99m Tc]HMPAO template. These data suggest the need of customized, radiopharmaceutical-matched SPECT templates to be used within the SPM package. The present customized [ 99m Tc]ECD template is now freely available on the web. (authors)

  10. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  11. POROUS MEMBRANE TEMPLATED SYNTHESIS OF POLYMER PILLARED LAYER

    Institute of Scientific and Technical Information of China (English)

    Zhong-wei Niu; Dan Li; Zhen-zhong Yang

    2003-01-01

    The anodic porous alumina membranes with a definite pore diameter and aspect ratio were used as templates to synthesize polymer pillared layer structures. The pillared polymer was produced in the template membrane pores, and the layer on the template surfaces. Rigid cured epoxy resin, polystyrene and soft hydrogel were chosen to confirm the methodology. The pillars were in the form of either tubes or fibers, which were controlled by the alumina membrane pore surface wettability. The structural features were confirmed by scanning electron microscopy results.

  12. The Affordance Template ROS Package for Robot Task Programming

    Science.gov (United States)

    Hart, Stephen; Dinh, Paul; Hambuchen, Kimberly

    2015-01-01

    This paper introduces the Affordance Template ROS package for quickly programming, adjusting, and executing robot applications in the ROS RViz environment. This package extends the capabilities of RViz interactive markers by allowing an operator to specify multiple end-effector waypoint locations and grasp poses in object-centric coordinate frames and to adjust these waypoints in order to meet the run-time demands of the task (specifically, object scale and location). The Affordance Template package stores task specifications in a robot-agnostic XML description format such that it is trivial to apply a template to a new robot. As such, the Affordance Template package provides a robot-generic ROS tool appropriate for building semi-autonomous, manipulation-based applications. Affordance Templates were developed by the NASA-JSC DARPA Robotics Challenge (DRC) team and have since successfully been deployed on multiple platforms including the NASA Valkyrie and Robonaut 2 humanoids, the University of Texas Dreamer robot and the Willow Garage PR2. In this paper, the specification and implementation of the affordance template package is introduced and demonstrated through examples for wheel (valve) turning, pick-and-place, and drill grasping, evincing its utility and flexibility for a wide variety of robot applications.

  13. Pengenalan Angka Pada Sistem Operasi Android Dengan Menggunakan Metode Template Matching

    Directory of Open Access Journals (Sweden)

    Abdi Pandu Kusuma

    2016-07-01

    Full Text Available AbstrakUsia dini merupakan usia yang efektif untuk mengembangkan berbagai potensi yang dimiliki oleh anak. Upaya pengembangan potensi dapat dilakukan melalui berbagai cara termasuk dengan cara bermain. Bermain bagi anak merupakan cara yang tepat untuk belajar. Berdasarkan fenomena tersebut, maka perlu dibuat sebuah aplikasi pengenalan angka yang interaktif dengan unsur edukasi. Aplikasi tersebut diharapkan dapat mengambil keputusan secara otomatis apa yang ditulis anak itu bernilai benar atau salah dan juga dapat membangkitkan semangat belajar anak dalam mengenal pola angka. Solusi yang sesuai agar aplikasi tersebut dapat memberikan jawaban salah atau benar digunakan satu metode yaitu template matching. Pengenalan angka dengan menggunakan metode template matching dilakukan dengan cara membandingkan citra masukan dengan citra template. Hasil template matching dihitung dari banyaknya titik pada citra masukan yang sesuai dengan citra template. Template disediakan pada database untuk memberikan contoh cara penulisan pola angka. Uji coba dilakukan pada aplikasi sebanyak 40 kali dengan pola yang berbeda. Dari hasil uji coba didapat prosentase keberhasilan aplikasi ini mencapai 75,75%.Kata kunci: Belajar, bermain, Template Matching, dan pola. AbstractEarly childhood is an effective age to develop the potential of the child. Potential development efforts can be done through various ways, including by playing. Playing for children is a great way to learn. Based on this phenomenon, it should be made an introduction to the numbers interactive application with elements of education. The application is expected to take decisions automatically what the child is written is true or false, and also can encourage a child's learning in recognizing number patterns. Appropriate solutions so that the app can give an answer right or wrong to use the methods that template matching. The introduction of the numbers by using template matching is done by comparing the

  14. Organic or organometallic template mediated clay synthesis

    Science.gov (United States)

    Gregar, Kathleen C.; Winans, Randall E.; Botto, Robert E.

    1994-01-01

    A method for incorporating diverse Varieties of intercalants or templates directly during hydrothermal synthesis of clays such as hectorite or montmorillonite-type layer-silicate clays. For a hectorite layer-silicate clay, refluxing a gel of silica sol, magnesium hydroxide sol and lithium fluoride for two days in the presence of an organic or organometallic intercalant or template results in crystalline products containing either (a) organic dye molecules such as ethyl violet and methyl green, (b) dye molecules such as alcian blue that are based on a Cu(II)-phthalocyannine complex, or (c) transition metal complexes such as Ru(II)phenanthroline and Co(III)sepulchrate or (d) water-soluble porphyrins and metalloporphyrins. Montmorillonite-type clays are made by the method taught by U.S. Pat. No. 3,887,454 issued to Hickson, Jun. 13, 1975; however, a variety of intercalants or templates may be introduced. The intercalants or templates should have (i) water-solubility, (ii) positive charge, and (iii) thermal stability under moderately basic (pH 9-10) aqueous reflux conditions or hydrothermal pressurized conditions for the montmorillonite-type clays.

  15. Security and privacy of EHR systems--ethical, social and legal requirements.

    Science.gov (United States)

    Kluge, Eike-Henner W

    2003-01-01

    This paper addresses social, ethical and legal concerns about security and privacy that arise in the development of international interoperable health information systems. The paper deals with these concerns under four rubrics: the ethical status of electronic health records, the social and legal embedding of interoperable health information systems, the overall information-requirements healthcare as such, and the role of health information professionals as facilitators. It argues that the concerns that arise can be met if the development of interoperability protocols is guided by the seven basic principles of information ethics that have been enunciated in the IMIA Code of Ethics for Health Information Professionals and that are central to the ethical treatment of electronic health records.

  16. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  17. Biometric security and privacy opportunities & challenges in the big data era

    CERN Document Server

    Al-maadeed, Somaya; Bouridane, Ahmed; Crookes, Prof; Beghdadi, Azeddine

    2017-01-01

    This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as quality issue, biometric template protection, and anti-spoofing. The book also focuses on several emerging topics such as big data issues, mobile biometrics and multispectral biometrics, and includes a number of new biometrics such as vein pattern, acoustic biometrics, eye-blinking EOG, ECG, gait and handwriting. Authors also show how to use biometrics in cyber security applications and its relevant legal matters under EU legislation. The contributors cover the topics, their methods, and their applications in depth.

  18. User-Generated Free-Form Gestures for Authentication: Security and Memorability

    OpenAIRE

    Sherman, Michael; Clark, Gradeigh; Yang, Yulong; Sugrim, Shridatt; Modig, Arttu; Lindqvist, Janne; Oulasvirta, Antti; Roos, Teemu

    2014-01-01

    This paper studies the security and memorability of free-form multitouch gestures for mobile authentication. Towards this end, we collected a dataset with a generate-test-retest paradigm where participants (N=63) generated free-form gestures, repeated them, and were later retested for memory. Half of the participants decided to generate one-finger gestures, and the other half generated multi-finger gestures. Although there has been recent work on template-based gestures, there are yet no metr...

  19. Synthetic opal as a template for nanostructured materials

    Science.gov (United States)

    White, Paul A.; Heales, Lindsey; Barber, Richard L.; Turney, Terence W.

    2001-04-01

    Synthetic opal has been used as a template for making 3D inverse opals of silica, titania and silicone rubber. The materials are mesoporous with connected pores and channels and have better opalescence than the opal templates they replace. Thin films of synthetic opal have been grown onto glass substrates by spin coating and these have also been used as templates for making thin films of inverse opal and as masks for depositing metal nanodots. This method produced hexagonally patterned 50 nm gold dots on a flat graphite substrate.

  20. 21 CFR 1309.71 - General security requirements.

    Science.gov (United States)

    2010-04-01

    ... I chemicals handled; (2) The location of the premises and the relationship such location bears on... employees having access to List I chemicals; (7) The procedures for handling business guests, visitors... materials and plans regarding the proposed security controls and procedures either to the Special Agent in...

  1. Proline-catalysed asymmetric ketol cyclizations: The template ...

    Indian Academy of Sciences (India)

    Unknown

    Abstract. A modified template mechanism based on modelling studies of energy minimised complexes is presented for the asymmetric proline-catalysed cyclization of triketones 1, 2 and 3 to the 2S,3S-ketols. 1a, 2a and 3a respectively. The template model involves a three-point contact as favoured in enzyme– substrate ...

  2. An audit of nursing reports for First-Tier Tribunals in a secure inpatient service.

    Science.gov (United States)

    Haw, C

    2015-08-01

    Very little research has been conducted into the role of nurses in relation to patients' mental health tribunals (known in some countries as review panels). In England nurses are playing an increasingly important role in giving evidence at tribunals and, since October 2013, are required to provide much more detailed written reports than previously. This is the first published study to examine the content of nursing tribunal reports. Overall, the quality of nursing reports was patchy and not as good as those of psychiatrists or social workers, but there was improvement when the audit was repeated. Writing reports for tribunals is a comparatively new and perhaps unfamiliar requirement for nursing staff. Nurses need training in report writing and protected time and a quiet area to write reports. Providing these things is a real challenge on busy inpatient wards. In October 2013, the Tribunals Judiciary of England issued a new practice direction stipulating how tribunal reports should be completed. This paper aimed to study the quality of nursing tribunal reports in a secure inpatient service before and after the introduction of the latest practice direction and the issuing of a local template to aid report writing. A total of 160 reports (80 written in 2013 and 80 in 2014) were scored on the presence of 24 key items derived from the latest practice direction. The quality of nursing reports improved in the re-audit from an average of 36.3% of key items present to 51.3% but still lagged behind that of medical and social circumstances reports. Even in the second audit, few reports were signed or commented on why the patient should remain detained. Report length increased from a mean of 2.9 to 4.0 pages but only 27.5% of reports used the template despite widespread publicity. Use of the template resulted in better quality reports. Among other interventions, a training programme in report writing is now underway to assist nurses with meeting the new practice direction

  3. Templated electrodeposition of functional nanostructures: nanowires, nanotubes and nanocubes

    OpenAIRE

    Maijenburg, A.W.

    2014-01-01

    This thesis is entitled “Templated electrodeposition of functional nanostructures: nanowires, nanotubes and nanocubes”. Templated electrodeposition is the synthesis technique that was used throughout this thesis, and it comprises the use of a template with specific shape and dimensions for the formation of different types of nanostructures. Throughout this thesis, three different nanostructures were made: nanowires (Chapters 2 to 6), nanotubes (Chapters 2 and 5) and nanocubes (Chapters 7 and ...

  4. Efficiency of template banks for binary black-hole detection

    International Nuclear Information System (INIS)

    Cokelaer, Thomas; Babak, Stas; Sathyaprakash, B S

    2004-01-01

    In the framework of matched filtering theory, which is the most promising method for the detection of gravitational waves emitted by coalescing binaries, we report on the ability of a template bank to catch a simulated binary black-hole gravitational wave signal. If we suppose that the incoming signal waveform is known a priori, then both the (simulated) signal and the templates can be based on the same physical model and therefore the template bank can be optimal in the sense of Wiener filtering. This turns out to be true for the case of neutron star binaries but not necessarily for the black-hole case. When the templates and the signal are based on different physical models the detection bank may still remain efficient. Nonetheless, it might be a judicious choice to use a phenomenological template family such as the so-called BCV templates to catch all the different physical models. In the first part of that report, we illustrate in a non-exhaustive study, by using Monte Carlo simulations, the efficiency of a template bank based on the stationary phase approximation and show how it catches simulated signals based on the same physical model but fails to catch signals built using other models (Pade, EOB, ...) especially in the case of high mass binaries. In the second part, we construct a BCV-template bank and test its validity by injecting simulated signals based on different physical models such as the PN-approximants, Pade-approximant and the effective one-body method. We show that it is suitable for a search pipeline since it gives a match higher than 95% for all the different physical models. The range of individual mass which has been used is [3-20]M o-dot

  5. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  6. Integrated security system definition

    International Nuclear Information System (INIS)

    Campbell, G.K.; Hall, J.R. II

    1985-01-01

    The objectives of an integrated security system are to detect intruders and unauthorized activities with a high degree of reliability and the to deter and delay them until effective response/engagement can be accomplished. Definition of an effective integrated security system requires proper application of a system engineering methodology. This paper summarizes a methodology and describes its application to the problem of integrated security system definition. This process includes requirements identification and analysis, allocation of identified system requirements to the subsystem level and provides a basis for identification of synergistic subsystem elements and for synthesis into an integrated system. The paper discusses how this is accomplished, emphasizing at each step how system integration and subsystem synergism is considered. The paper concludes with the product of the process: implementation of an integrated security system

  7. Computer-aided support for Secure Tropos

    NARCIS (Netherlands)

    Massacci, F.; Mylopoulos, J.; Zannone, N.

    2007-01-01

    In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of security requirements. This paper briefly recaps the concepts proposed for capturing security aspects, and presents an

  8. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  9. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  10. TH-CD-207A-09: Stay On Target: Dynamic, Patient-Specific Templates of Fiducial Marker Clusters for IGRT

    International Nuclear Information System (INIS)

    Campbell, W; Miften, M; Jones, B

    2016-01-01

    Purpose: Pancreatic SBRT relies on extremely accurate delivery of ablative radiation doses to the target, and intra-fractional tracking of fiducial markers can facilitate improvements in dose delivery. However, this requires algorithms that are able to find fiducial markers with high speed and accuracy. The purpose of this study was to develop a novel marker tracking algorithm that is robust against many of the common errors seen with traditional template matching techniques. Methods: Using CBCT projection images, a method was developed to create detailed template images of fiducial marker clusters without prior knowledge of the number of markers, their positions, or their orientations. Briefly, the method (i) enhances markers in projection images, (ii) stabilizes the cluster’s position, (iii) reconstructs the cluster in 3D, and (iv) precomputes a set of static template images dependent on gantry angle. Furthermore, breathing data were used to produce 4D reconstructions of clusters, yielding dynamic template images dependent on gantry angle and breathing amplitude. To test these two approaches, static and dynamic templates were used to track the motion of marker clusters in more than 66,000 projection images from 75 CBCT scans of 15 pancreatic SBRT patients. Results: For both static and dynamic templates, the new technique was able to locate marker clusters present in projection images 100% of the time. The algorithm was also able to correctly locate markers in several instances where only some of the markers were visible due to insufficient field-of-view. In cases where clusters exhibited deformation and/or rotation during breathing, dynamic templates resulted in cross-correlation scores up to 70% higher than static templates. Conclusion: Patient-specific templates provided complete tracking of fiducial marker clusters in CBCT scans, and dynamic templates helped to provide higher cross-correlation scores for deforming/rotating clusters. This novel algorithm

  11. TH-CD-207A-09: Stay On Target: Dynamic, Patient-Specific Templates of Fiducial Marker Clusters for IGRT

    Energy Technology Data Exchange (ETDEWEB)

    Campbell, W; Miften, M; Jones, B [Department of Radiation Oncology, University of Colorado School of Medicine, Aurora, CO (United States)

    2016-06-15

    Purpose: Pancreatic SBRT relies on extremely accurate delivery of ablative radiation doses to the target, and intra-fractional tracking of fiducial markers can facilitate improvements in dose delivery. However, this requires algorithms that are able to find fiducial markers with high speed and accuracy. The purpose of this study was to develop a novel marker tracking algorithm that is robust against many of the common errors seen with traditional template matching techniques. Methods: Using CBCT projection images, a method was developed to create detailed template images of fiducial marker clusters without prior knowledge of the number of markers, their positions, or their orientations. Briefly, the method (i) enhances markers in projection images, (ii) stabilizes the cluster’s position, (iii) reconstructs the cluster in 3D, and (iv) precomputes a set of static template images dependent on gantry angle. Furthermore, breathing data were used to produce 4D reconstructions of clusters, yielding dynamic template images dependent on gantry angle and breathing amplitude. To test these two approaches, static and dynamic templates were used to track the motion of marker clusters in more than 66,000 projection images from 75 CBCT scans of 15 pancreatic SBRT patients. Results: For both static and dynamic templates, the new technique was able to locate marker clusters present in projection images 100% of the time. The algorithm was also able to correctly locate markers in several instances where only some of the markers were visible due to insufficient field-of-view. In cases where clusters exhibited deformation and/or rotation during breathing, dynamic templates resulted in cross-correlation scores up to 70% higher than static templates. Conclusion: Patient-specific templates provided complete tracking of fiducial marker clusters in CBCT scans, and dynamic templates helped to provide higher cross-correlation scores for deforming/rotating clusters. This novel algorithm

  12. Template-mediated, Hierarchical Engineering of Ordered Mesoporous Films and Powders

    Science.gov (United States)

    Tian, Zheng

    Hierarchical control over pore size, pore topology, and meso/mictrostructure as well as material morphology (e.g., powders, monoliths, thin films) is crucial for meeting diverse materials needs among applications spanning next generation catalysts, sensors, batteries, sorbents, etc. The overarching goal of this thesis is to establish fundamental mechanistic insight enabling new strategies for realizing such hierarchical textural control for carbon materials that is not currently achievable with sacrificial pore formation by 'one-pot' surfactant-based 'soft'-templating or multi-step inorganic 'hard-templating. While 'hard'-templating is often tacitly discounted based upon its perceived complexity, it offers potential for overcoming key 'soft'-templating challenges, including bolstering pore stability, accommodating a more versatile palette of replica precursors, realizing ordered/spanning porosity in the case of porous thin films, simplifying formation of bi-continuous pore topologies, and inducing microstructure control within porous replica materials. In this thesis, we establish strategies for hard-templating of hierarchically porous and structured carbon powders and tunable thin films by both multi-step hard-templating and a new 'one-pot' template-replica precursor co-assembly process. We first develop a nominal hard-templating technique to successfully prepare three-dimensionally ordered mesoporous (3DOm) and 3DOm-supported microporous carbon thin films by exploiting our ability to synthesize and assemble size-tunable silica nanoparticles into scalable, colloidal crystalline thin film templates of tunable mono- to multi-layer thickness. This robust thin film template accommodates liquid and/or vapor-phase infiltration, polymerization, and pyrolysis of various carbon sources without pore contraction and/or collapse upon template sacrifice. The result is robust, flexible 3DOm or 3DOm-supported ultra-thin microporous films that can be transferred by stamp

  13. Computational resources to filter gravitational wave data with P-approximant templates

    International Nuclear Information System (INIS)

    Porter, Edward K

    2002-01-01

    The prior knowledge of the gravitational waveform from compact binary systems makes matched filtering an attractive detection strategy. This detection method involves the filtering of the detector output with a set of theoretical waveforms or templates. One of the most important factors in this strategy is knowing how many templates are needed in order to reduce the loss of possible signals. In this study, we calculate the number of templates and computational power needed for a one-step search for gravitational waves from inspiralling binary systems. We build on previous works by first expanding the post-Newtonian waveforms to 2.5-PN order and second, for the first time, calculating the number of templates needed when using P-approximant waveforms. The analysis is carried out for the four main first-generation interferometers, LIGO, GEO600, VIRGO and TAMA. As well as template number, we also calculate the computational cost of generating banks of templates for filtering GW data. We carry out the calculations for two initial conditions. In the first case we assume a minimum individual mass of 1 M o-dot and in the second, we assume a minimum individual mass of 5 M o-dot . We find that, in general, we need more P-approximant templates to carry out a search than if we use standard PN templates. This increase varies according to the order of PN-approximation, but can be as high as a factor of 3 and is explained by the smaller span of the P-approximant templates as we go to higher masses. The promising outcome is that for 2-PN templates, the increase is small and is outweighed by the known robustness of the 2-PN P-approximant templates

  14. Fast Template-based Shape Analysis using Diffeomorphic Iterative Centroid

    OpenAIRE

    Cury , Claire; Glaunès , Joan Alexis; Chupin , Marie; Colliot , Olivier

    2014-01-01

    International audience; A common approach for the analysis of anatomical variability relies on the estimation of a representative template of the population, followed by the study of this population based on the parameters of the deformations going from the template to the population. The Large Deformation Diffeomorphic Metric Mapping framework is widely used for shape analysis of anatomical structures, but computing a template with such framework is computationally expensive. In this paper w...

  15. Titanium template for scaphoid reconstruction.

    Science.gov (United States)

    Haefeli, M; Schaefer, D J; Schumacher, R; Müller-Gerbl, M; Honigmann, P

    2015-06-01

    Reconstruction of a non-united scaphoid with a humpback deformity involves resection of the non-union followed by bone grafting and fixation of the fragments. Intraoperative control of the reconstruction is difficult owing to the complex three-dimensional shape of the scaphoid and the other carpal bones overlying the scaphoid on lateral radiographs. We developed a titanium template that fits exactly to the surfaces of the proximal and distal scaphoid poles to define their position relative to each other after resection of the non-union. The templates were designed on three-dimensional computed tomography reconstructions and manufactured using selective laser melting technology. Ten conserved human wrists were used to simulate the reconstruction. The achieved precision measured as the deviation of the surface of the reconstructed scaphoid from its virtual counterpart was good in five cases (maximal difference 1.5 mm), moderate in one case (maximal difference 3 mm) and inadequate in four cases (difference more than 3 mm). The main problems were attributed to the template design and can be avoided by improved pre-operative planning, as shown in a clinical case. © The Author(s) 2014.

  16. 7 CFR 1942.114 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 13 2010-01-01 2009-01-01 true Security. 1942.114 Section 1942.114 Agriculture... Security. Specific requirements for security for each loan will be included in the letter of conditions. Loans must be secured by the best security position practicable, in a manner which will adequately...

  17. Creating Shape Templates for Patient Specific Biventricular Modeling in Congenital Heart Disease

    Science.gov (United States)

    Gilbert, Kathleen; Farrar, Genevieve; Cowan, Brett R.; Suinesiaputra, Avan; Occleshaw, Christopher; Pontré, Beau; Perry, James; Hegde, Sanjeet; Marsden, Alison; Omens, Jeff; McCulloch, Andrew; Young, Alistair A.

    2018-01-01

    Survival rates for infants with congenital heart disease (CHD) are improving, resulting in a growing population of adults with CHD. However, the analysis of left and right ventricular function is very time-consuming owing to the variety of congenital morphologies. Efficient customization of patient geometry and function depends on high quality shape templates specifically designed for the application. In this paper, we combine a method for creating finite element shape templates with an interactive template customization to patient MRI examinations. This enables different templates to be chosen depending on patient morphology. To demonstrate this pipeline, a new biventricular template with 162 elements was created and tested in place of an existing 82-element template. The method was able to provide fast interactive biventricular analysis with 0.31 sec per edit response time. The new template was customized to 13 CHD patients with similar biventricular topology, showing improved performance over the previous template and good agreement with clinical indices. PMID:26736353

  18. A non-parametric 2D deformable template classifier

    DEFF Research Database (Denmark)

    Schultz, Nette; Nielsen, Allan Aasbjerg; Conradsen, Knut

    2005-01-01

    feature space the ship-master will be able to interactively define a segmentation map, which is refined and optimized by the deformable template algorithms. The deformable templates are defined as two-dimensional vector-cycles. Local random transformations are applied to the vector-cycles, and stochastic...

  19. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  20. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  1. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    Science.gov (United States)

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  2. Accuracy evaluation of a 3D-printed individual template for needle guidance in head and neck brachytherapy

    International Nuclear Information System (INIS)

    Huang, Ming-Wei; Zhang, Jian-Guo; Zheng, Lei; Liu, Shu-Ming; Yu, Guang-Yan

    2016-01-01

    To transfer the preplan for the head and neck brachytherapy to the clinical implantation procedure, a preplan-based 3D-printed individual template for needle insertion guidance had previously been designed and used. The accuracy of needle insertion using this kind template was assessed in vivo. In the study, 25 patients with head and neck tumors were implanted with 125 I radioactive seeds under the guidance of the 3D-printed individual template. Patients were divided into four groups based on the site of needle insertion: the parotid and masseter region group (nine patients); the maxillary and paranasal region group (eight patients); the submandibular and upper neck area group (five patients); and the retromandibular region group (six patients). The distance and angular deviations between the preplanned and placed needles were compared, and the complications and time required for needle insertion were assessed. The mean entrance point distance deviation for all 619 needles was 1.18 ± 0.81 mm, varying from 0.857 ± 0.545 to 1.930 ± 0.843 mm at different sites. The mean angular deviation was 2.08 ± 1.07 degrees, varying from 1.85 ± 0.93 to 2.73 ± 1.18 degrees at different sites. All needles were manually inserted to their preplanned positions in a single attempt, and the mean time to insert one needle was 7.5 s. No anatomical complications related to inaccurately placed implants were observed. Using the 3D-printed individual template for the implantation of 125 I radioactive seeds in the head and neck region can accurately transfer a CT-based preplan to the brachytherapy needle insertion procedure. Moreover, the addition of individual template guidance can reduce the time required for implantation and minimize the damage to normal tissues.

  3. A new template matching method based on contour information

    Science.gov (United States)

    Cai, Huiying; Zhu, Feng; Wu, Qingxiao; Li, Sicong

    2014-11-01

    Template matching is a significant approach in machine vision due to its effectiveness and robustness. However, most of the template matching methods are so time consuming that they can't be used to many real time applications. The closed contour matching method is a popular kind of template matching methods. This paper presents a new closed contour template matching method which is suitable for two dimensional objects. Coarse-to-fine searching strategy is used to improve the matching efficiency and a partial computation elimination scheme is proposed to further speed up the searching process. The method consists of offline model construction and online matching. In the process of model construction, triples and distance image are obtained from the template image. A certain number of triples which are composed by three points are created from the contour information that is extracted from the template image. The rule to select the three points is that the template contour is divided equally into three parts by these points. The distance image is obtained here by distance transform. Each point on the distance image represents the nearest distance between current point and the points on the template contour. During the process of matching, triples of the searching image are created with the same rule as the triples of the model. Through the similarity that is invariant to rotation, translation and scaling between triangles, the triples corresponding to the triples of the model are found. Then we can obtain the initial RST (rotation, translation and scaling) parameters mapping the searching contour to the template contour. In order to speed up the searching process, the points on the searching contour are sampled to reduce the number of the triples. To verify the RST parameters, the searching contour is projected into the distance image, and the mean distance can be computed rapidly by simple operations of addition and multiplication. In the fine searching process

  4. Risk and business goal based security requirement and countermeasure prioritization

    NARCIS (Netherlands)

    Herrmann, A.; Morali, A.; Etalle, S.; Wieringa, R.J.; Niedrite, L.; Strazdina, R.; Wangler, B.

    2012-01-01

    Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement "good-enough security" but need to be able to justify their security investment plans. Currently companies achieve this by means of

  5. Detecting conflicts between functional and security requirements with Secure Tropos: John Rusnak and the Allied Irish Bank (Chapter 9)

    NARCIS (Netherlands)

    Massacci, F.; Zannone, N.; Giorgini, P.; Maiden, N.; Mylopoulos, J.; Yu, E.

    2011-01-01

    The last years have seen a growing concern on the security of information systems and, consequently, a call to arms for including security aspects during the entire development process. Unfortunately, most proposals treat security in system-oriented terms and model information systems through the

  6. Elliptical tiling method to generate a 2-dimensional set of templates for gravitational wave search

    International Nuclear Information System (INIS)

    Arnaud, Nicolas; Barsuglia, Matteo; Bizouard, Marie-Anne; Brisson, Violette; Cavalier, Fabien; Davier, Michel; Hello, Patrice; Kreckelbergh, Stephane; Porter, Edward K.

    2003-01-01

    Searching for a signal depending on unknown parameters in a noisy background with matched filtering techniques always requires an analysis of the data with several templates in parallel in order to ensure a proper match between the filter and the real waveform. The key feature of such an implementation is the design of the filter bank which must be small to limit the computational cost while keeping the detection efficiency as high as possible. This paper presents a geometrical method that allows one to cover the corresponding physical parameter space by a set of ellipses, each of them being associated with a given template. After the description of the main characteristics of the algorithm, the method is applied in the field of gravitational wave (GW) data analysis, for the search of damped sine signals. Such waveforms are expected to be produced during the deexcitation phase of black holes - the so-called 'ringdown' signals - and are also encountered in some numerically computed supernova signals. First, the number of templates N computed by the method is similar to its analytical estimation, despite the overlaps between neighbor templates and the border effects. Moreover, N is small enough to test for the first time the performances of the set of templates for different choices of the minimal match MM, the parameter used to define the maximal allowed loss of signal-to-noise ratio (SNR) due to the mismatch between real signals and templates. The main result of this analysis is that the fraction of SNR recovered is on average much higher than MM, which dramatically decreases the mean percentage of false dismissals. Indeed, it goes well below its estimated value of 1-MM 3 used as input of the algorithm. Thus, as this feature should be common to any tiling algorithm, it seems possible to reduce the constraint on the value of MM - and indeed the number of templates and the computing power - without losing as many events as expected on average. This should be of great

  7. The Utility of Template Analysis in Qualitative Psychology Research.

    Science.gov (United States)

    Brooks, Joanna; McCluskey, Serena; Turley, Emma; King, Nigel

    2015-04-03

    Thematic analysis is widely used in qualitative psychology research, and in this article, we present a particular style of thematic analysis known as Template Analysis. We outline the technique and consider its epistemological position, then describe three case studies of research projects which employed Template Analysis to illustrate the diverse ways it can be used. Our first case study illustrates how the technique was employed in data analysis undertaken by a team of researchers in a large-scale qualitative research project. Our second example demonstrates how a qualitative study that set out to build on mainstream theory made use of the a priori themes (themes determined in advance of coding) permitted in Template Analysis. Our final case study shows how Template Analysis can be used from an interpretative phenomenological stance. We highlight the distinctive features of this style of thematic analysis, discuss the kind of research where it may be particularly appropriate, and consider possible limitations of the technique. We conclude that Template Analysis is a flexible form of thematic analysis with real utility in qualitative psychology research.

  8. Fabrication of high quality ordered porous anodic aluminum oxide templates

    International Nuclear Information System (INIS)

    Liu Kai; Du Kai; Chen Jing; Zhou Lan; Zhang Lin; Fang Yu

    2010-01-01

    The preparation of porous anodic aluminum oxide (AAO) templates has been studied with oxalic acid as electrolyte. The morphology of the as-prepared templates has been characterized by field-emission scanning electron microscope (FE-SEM). The pores distributed orderly and uniformly with the diameter ranging from 40 nm to 70 nm. The experimental results indicate that electrolyte concentration, oxidation voltage, oxidation temperature and oxidation time affect the structure of AAO templates. Ordered porous AAO templates can be derived without annealing and finishing. X-ray diffraction (XRD) analysis indicates that the aluminum oxide film is mainly composed of amorphous Al 2 O 3 . (authors)

  9. Polymeric Bicontinuous Microemulsions as Templates for Nanostructured Materials

    Science.gov (United States)

    Jones, Brad Howard

    Ternary blends of two homopolymers and a diblock copolymer can self-assemble into interpenetrating, three dimensionally-continuous networks with a characteristic length scale of ˜ 100 nm. In this thesis, it is shown that these liquid phases, known as polymeric bicontinuous microemulsions (BμE), can be designed as versatile precursors to nanoporous materials having pores with uniform sizes of ˜ 100 nm. The model blends from which the porous materials are derived are composed of polyethylene (PE) and a sacrificial polyolefin. The liquid BμE structure is captured by crystallization of the PE, and a three-dimensionally continuous pore network with a narrow pore size distribution is generated by selective extraction of the sacrificial component. The original BμE structure is retained in the resultant nanoporous PE. This monolithic material is then used as a template in the synthesis of other nanoporous materials for which structural control at the nm scale has traditionally been difficult to achieve. These materials, which include a high-temperature ceramic, polymeric thermosets, and a conducting polymer, are produced by a simple nanocasting process, providing an inverse replica of the PE template. On account of the BμE structure of the template, the product materials also possess three-dimensionally continuous pore networks with narrow size distributions centered at ˜ 100 nm. The PE template is further used as a template for the production of hierarchically structured inorganic and polymeric materials by infiltration of mesostructured compounds into its pore network. In the former case, a hierarchically porous SiO2 material is demonstrated, simultaneously possessing two discrete, bicontinuous pore networks with sizes differing by over an order of magnitude. Finally, the templating procedures are extended to thin films supported on substrates and novel conductive polymer films are synthesized. The work described herein represents an unprecedented suite of

  10. Local intelligent electronic device (IED) rendering templates over limited bandwidth communication link to manage remote IED

    Science.gov (United States)

    Bradetich, Ryan; Dearien, Jason A; Grussling, Barry Jakob; Remaley, Gavin

    2013-11-05

    The present disclosure provides systems and methods for remote device management. According to various embodiments, a local intelligent electronic device (IED) may be in communication with a remote IED via a limited bandwidth communication link, such as a serial link. The limited bandwidth communication link may not support traditional remote management interfaces. According to one embodiment, a local IED may present an operator with a management interface for a remote IED by rendering locally stored templates. The local IED may render the locally stored templates using sparse data obtained from the remote IED. According to various embodiments, the management interface may be a web client interface and/or an HTML interface. The bandwidth required to present a remote management interface may be significantly reduced by rendering locally stored templates rather than requesting an entire management interface from the remote IED. According to various embodiments, an IED may comprise an encryption transceiver.

  11. Template polymerization of N-vinylimidazole along poly(methacrylic acid) in water

    NARCIS (Netherlands)

    Grampel, Hendrik Theodorus van de

    1990-01-01

    Template polymerisaties zijn polymerisaties waarbij radicalen gedurende het grootste gedeelte van hun bestaan langs het template polymeer groeien. In het algemeen kan de template invloed hebben op de polymerisatiesnelheid, als ook op het molecuulgewicht en de tacticiteit van het bijgevormde

  12. MQTT Security: A Novel Fuzzing Approach

    Directory of Open Access Journals (Sweden)

    Santiago Hernández Ramos

    2018-01-01

    Full Text Available The Internet of Things is a concept that is increasingly present in our lives. The emergence of intelligent devices has led to a paradigm shift in the way technology interacts with the environment, leading society to a smarter planet. Consequently, new advanced telemetry approaches appear to connect all kinds of devices with each other, with companies, or with other networks, such as the Internet. On the road to an increasingly interconnected world, where critical devices rely on communication networks to provide an essential service, there arises the need to ensure the security and reliability of these protocols and applications. In this paper, we discuss a security-based approach for MQTT (Message Queue Telemetry Transport, which stands out as a very lightweight and widely used messaging and information exchange protocol for IoT (Internet of Things devices throughout the world. To that end, we propose the creation of a framework that allows for performing a novel, template-based fuzzing technique on the MQTT protocol. The first experimental results showed that performance of the fuzzing technique presented here makes it a good candidate for use in network architectures with low processing power sensors, such as Smart Cities. In addition, the use of this fuzzer in widely used applications that implement MQTT has led to the discovery of several new security flaws not hitherto reported, demonstrating its usefulness as a tool for finding security vulnerabilities.

  13. Uranyl Sulfate Nanotubules Templated by N-phenylglycine

    Directory of Open Access Journals (Sweden)

    Oleg I. Siidra

    2018-04-01

    Full Text Available The synthesis, structure, and infrared spectroscopy properties of the new organically templated uranyl sulfate Na(phgH+7[(UO26(SO410](H2O3.5 (1, obtained at room temperature by evaporation from aqueous solution, are reported. Its structure contains unique uranyl sulfate [(UO26(SO410]8− nanotubules templated by protonated N-phenylglycine (C6H5NH2CH2COOH+. Their internal diameter is 1.4 nm. Each of the nanotubules is built from uranyl sulfate rings sharing common SO4 tetrahedra. The template plays an important role in the formation of the complex structure of 1. The aromatic rings are stacked parallel to each other due to the effect of π–π interaction with their side chains extending into the gaps between the nanotubules.

  14. Information security management with ITIL V3

    CERN Document Server

    Cazemier, Jacques A; Peters, Louk

    2010-01-01

    This groundbreaking new title looks at Information Security from defining what security measures positively support the business, to implementation to maintaining the required level and anticipating required changes. It covers:Fundamentals of information security ? providing readers insight and give background about what is going to be managed. Topics covered include: types of security controls, business benefits and the perspectives of business, customers, partners, service providers, and auditors.Fundamentals of management of information security - explains what information security manageme

  15. Nuclear security. Improving correction of security deficiencies at DOE's weapons facilities

    International Nuclear Information System (INIS)

    Wells, James E.; Cannon, Doris E.; Fenzel, William F.; Lightner, Kenneth E. Jr.; Curtis, Lois J.; DuBois, Julia A.; Brown, Gail W.; Trujillo, Charles S.; Tumler, Pamela K.

    1992-11-01

    The US nuclear weapons research, development, and production are conducted at 10 DOE nuclear weapons facilities by contractors under the guidance and oversight of 9 DOE field offices. Because these facilities house special nuclear materials used in making nuclear weapons and nuclear weapons components, DOE administers a security program to protect (1) against theft, sabotage, espionage, terrorism, or other risks to national security and (2) the safety and health of DOE employees and the public. DOE spends almost $1 billion a year on this security program. DOE administers the security program through periodic inspections that evaluate and monitor the effectiveness of facilities' safeguards and security. Security inspections identify deficiencies, instances of noncompliance with safeguards and security requirements or poor performance of the systems being evaluated, that must be corrected to maintain adequate security. The contractors and DOE share responsibility for correcting deficiencies. Contractors, in correcting deficiencies, must comply with several DOE orders. The contractors' performances were not adequate in conducting four of the eight procedures considered necessary in meeting DOE's deficiency correction requirements. For 19 of the 20 deficiency cases we reviewed, contractors could not demonstrate that they had conducted three critical deficiency analyses (root cause, risk assessment, and cost-benefit) required by DOE. Additionally, the contractors did not always adequately verify that corrective actions taken were appropriate, effective, and complete. The contractors performed the remaining four procedures (reviewing deficiencies for duplication, entering deficiencies into a data base, tracking the status of deficiencies, and preparing and implementing a corrective action plan) adequately in all 20 cases. DOE's oversight of the corrective action process could be improved in three areas. The computerized systems used to track the status of security

  16. N7 logic via patterning using templated DSA: implementation aspects

    Science.gov (United States)

    Bekaert, J.; Doise, J.; Gronheid, R.; Ryckaert, J.; Vandenberghe, G.; Fenger, G.; Her, Y. J.; Cao, Y.

    2015-07-01

    In recent years, major advancements have been made in the directed self-assembly (DSA) of block copolymers (BCP). Insertion of DSA for IC fabrication is seriously considered for the 7 nm node. At this node the DSA technology could alleviate costs for multiple patterning and limit the number of masks that would be required per layer. At imec, multiple approaches for inserting DSA into the 7 nm node are considered. One of the most straightforward approaches for implementation would be for via patterning through templated DSA; a grapho-epitaxy flow using cylindrical phase BCP material resulting in contact hole multiplication within a litho-defined pre-pattern. To be implemented for 7 nm node via patterning, not only the appropriate process flow needs to be available, but also DSA-aware mask decomposition is required. In this paper, several aspects of the imec approach for implementing templated DSA will be discussed, including experimental demonstration of density effect mitigation, DSA hole pattern transfer and double DSA patterning, creation of a compact DSA model. Using an actual 7 nm node logic layout, we derive DSA-friendly design rules in a logical way from a lithographer's view point. A concrete assessment is provided on how DSA-friendly design could potentially reduce the number of Via masks for a place-and-routed N7 logic pattern.

  17. An Approach to Detect and Study DNA Double-Strand Break Repair by Transcript RNA Using a Spliced-Antisense RNA Template.

    Science.gov (United States)

    Keskin, Havva; Storici, Francesca

    2018-01-01

    A double-strand break (DSB) is one of the most dangerous DNA lesion, and its repair is crucial for genome stability. Homologous recombination is considered the safest way to repair a DNA DSB and requires an identical or nearly identical DNA template, such as a sister chromatid or a homologous chromosome for accurate repair. Can transcript RNA serve as donor template for DSB repair? Here, we describe an approach that we developed to detect and study DNA repair by transcript RNA. Key features of the method are: (i) use of antisense (noncoding) RNA as template for DSB repair by RNA, (ii) use of intron splicing to distinguish the sequence of the RNA template from that of the DNA that generates the RNA template, and (iii) use of a trans and cis system to study how RNA repairs a DSB in homologous but distant DNA or in its own DNA, respectively. This chapter provides details on how to use a spliced-antisense RNA template to detect and study DSB repair by RNA in trans or cis in yeast cells. Our approach for detection of DSB repair by RNA in cells can be applied to cell types other than yeast, such as bacteria, mammalian cells, or other eukaryotic cells. © 2018 Elsevier Inc. All rights reserved.

  18. Security for 5G Mobile Wireless Networks

    OpenAIRE

    Fang, Dongfeng; Qian, Yi; Qingyang Hu, Rose

    2017-01-01

    The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use ca...

  19. II - Template Metaprogramming for Massively Parallel Scientific Computing - Vectorization with Expression Templates

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Large scale scientific computing raises questions on different levels ranging from the fomulation of the problems to the choice of the best algorithms and their implementation for a specific platform. There are similarities in these different topics that can be exploited by modern-style C++ template metaprogramming techniques to produce readable, maintainable and generic code. Traditional low-level code tend to be fast but platform-dependent, and it obfuscates the meaning of the algorithm. On the other hand, object-oriented approach is nice to read, but may come with an inherent performance penalty. These lectures aim to present he basics of the Expression Template (ET) idiom which allows us to keep the object-oriented approach without sacrificing performance. We will in particular show to to enhance ET to include SIMD vectorization. We will then introduce techniques for abstracting iteration, and introduce thread-level parallelism for use in heavy data-centric loads. We will show to to apply these methods i...

  20. Templates for Cross-Cultural and Culturally Specific Usability Testing

    DEFF Research Database (Denmark)

    Clemmensen, Torkil

    2011-01-01

    The cultural diversity of users of technology challenges our methods for usability testing. This article suggests templates for cross-culturally and culturally specific usability testing, based on studies of usability testing in companies in Mumbai, Beijing, and Copenhagen. Study 1 was a cross...... tests. The result was the construction of templates for usability testing. The culturally specific templates were in Mumbai “user-centered evaluation,” Copenhagen “client-centered evaluation,” and Beijing “evaluator-centered evaluation.” The findings are compared with related research...

  1. Draft secure medical database standard.

    Science.gov (United States)

    Pangalos, George

    2002-01-01

    Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.

  2. Model-based security testing

    OpenAIRE

    Schieferdecker, Ina; Großmann, Jürgen; Schneider, Martin

    2012-01-01

    Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security...

  3. Using archetypes for defining CDA templates.

    Science.gov (United States)

    Moner, David; Moreno, Alberto; Maldonado, José A; Robles, Montserrat; Parra, Carlos

    2012-01-01

    While HL7 CDA is a widely adopted standard for the documentation of clinical information, the archetype approach proposed by CEN/ISO 13606 and openEHR is gaining recognition as a means of describing domain models and medical knowledge. This paper describes our efforts in combining both standards. Using archetypes as an alternative for defining CDA templates permit new possibilities all based on the formal nature of archetypes and their ability to merge into the same artifact medical knowledge and technical requirements for semantic interoperability of electronic health records. We describe the process followed for the normalization of existing legacy data in a hospital environment, from the importation of the HL7 CDA model into an archetype editor, the definition of CDA archetypes and the application of those archetypes to obtain normalized CDA data instances.

  4. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  5. 76 FR 46603 - Security Ratings

    Science.gov (United States)

    2011-08-03

    ... settled derivative securities). See Simplification of Registration of Reporting Requirements for Foreign... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 200, 229, 230, 232, 239, 240, and 249 [Release No. 33-9245; 34-64975; File No. S7-18-08] RIN 3235-AK18 Security Ratings AGENCY: Securities and Exchange...

  6. Food and nutritional security requires adequate protein as well as energy, delivered from whole-year crop production.

    Science.gov (United States)

    Coles, Graeme D; Wratten, Stephen D; Porter, John R

    2016-01-01

    Human food security requires the production of sufficient quantities of both high-quality protein and dietary energy. In a series of case-studies from New Zealand, we show that while production of food ingredients from crops on arable land can meet human dietary energy requirements effectively, requirements for high-quality protein are met more efficiently by animal production from such land. We present a model that can be used to assess dietary energy and quality-corrected protein production from various crop and crop/animal production systems, and demonstrate its utility. We extend our analysis with an accompanying economic analysis of commercially-available, pre-prepared or simply-cooked foods that can be produced from our case-study crop and animal products. We calculate the per-person, per-day cost of both quality-corrected protein and dietary energy as provided in the processed foods. We conclude that mixed dairy/cropping systems provide the greatest quantity of high-quality protein per unit price to the consumer, have the highest food energy production and can support the dietary requirements of the highest number of people, when assessed as all-year-round production systems. Global food and nutritional security will largely be an outcome of national or regional agroeconomies addressing their own food needs. We hope that our model will be used for similar analyses of food production systems in other countries, agroecological zones and economies.

  7. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2015-09-01

    Full Text Available Network security is one of the most important issues in mobile sensor networks (MSNs. Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  8. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    Science.gov (United States)

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  9. Electrochemical impedance spectroscopy of nanoporous anodic alumina template

    International Nuclear Information System (INIS)

    Shahzad, K.

    2010-01-01

    Room temperature EIS characterization of nanoporous anodic alumina prepared at 40 V and 60 V has been done in 0.3 M oxalic acid solution. Rapid decrease in impedance was observed for the template prepared at 40 V. EIS study of porous anodic alumina template prepared in 0.3 M oxalic acid has been done in different electrolytes. Templates prepared in 0.3 M sulfuric acid solution were also characterized for comparison. Rapid decrease in the thickness of nonporous anodic film was observed with an increase of aggressiveness of electrolyte. Temperature based systematic study of EIS measurement has been done for porous anodic alumina template at different temperatures. Formation of micropores was observed in the nanoporous anodic alumina film formed on aluminum in 0.3 M oxalic acid solution which accelerates the dissolution rate with increase of measurement temperature. In addition to these, electropolishing behavior of pure aluminum has also been studied in different electrolytes and it was observed that electropolishing conditions prior to anodization are extremely important. (author)

  10. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  11. Securities and Exchange Commission Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-12-20

    ... Flexibility Analysis Required: Yes Agency Contact: Alicia Goldin, Division of Trading and Markets, Securities...: Alicia Goldin, Division of Trading and Markets, Securities and Exchange Commission, 100 F Street NE... Flexibility Analysis Required: Yes Agency Contact: Alicia Goldin, Division of Trading and Markets, Securities...

  12. 7 CFR 1780.14 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...

  13. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  14. Design and implementation of an algorithm for creating templates for the purpose of iris biometric authentication through the analysis of textures implemented on a FPGA

    International Nuclear Information System (INIS)

    Giacometto, F J; Vilardy, J M; Torres, C O; Mattos, L

    2011-01-01

    Currently addressing problems related to security in access control, as a consequence, have been developed applications that work under unique characteristics in individuals, such as biometric features. In the world becomes important working with biometric images such as the liveliness of the iris which are for both the pattern of retinal images as your blood vessels. This paper presents an implementation of an algorithm for creating templates for biometric authentication with ocular features for FPGA, in which the object of study is that the texture pattern of iris is unique to each individual. The authentication will be based in processes such as edge extraction methods, segmentation principle of John Daugman and Libor Masek's, and standardization to obtain necessary templates for the search of matches in a database and then get the expected results of authentication.

  15. Hydrogen-Bonding Capability of a Templating Difluorotoluene Nucleotide Residue in an RB69 DNA Polymerase Ternary Complex

    Energy Technology Data Exchange (ETDEWEB)

    Xia, Shuangluo; Konigsberg, William H.; Wang, Jimin (Yale)

    2011-08-29

    Results obtained using 2,4-difluorotoluene nucleobase (dF) as a nonpolar thymine isostere by Kool and colleagues challenged the Watson-Crick dogma that hydrogen bonds between complementary bases are an absolute requirement for accurate DNA replication. Here, we report crystal structure of an RB69 DNA polymerase L561A/S565G/Y567A triple mutant ternary complex with a templating dF opposite dTTP at 1.8 {angstrom}-resolution. In this structure, direct hydrogen bonds were observed between: (i) dF and the incoming dTTP, (ii) dF and residue G568 of the polymerase, and (iii) dF and ordered water molecules surrounding the nascent base pair. Therefore, this structure provides evidence that a templating dF can form novel hydrogen bonds with the incoming dTTP and with the enzyme that differ from those formed with a templating dT.

  16. Formation of novel morphologies of aragonite induced by inorganic template

    International Nuclear Information System (INIS)

    Wang, Xiaoming; Nan, Zhaodong

    2011-01-01

    Graphical abstract: Glass-slices were used as a template to induce formation and assembly of aragonite. Different morphologies, such as hemisphere, twinborn hemisphere and flower-shaped particles, were produced by direction of the glass-slices. Highlights: → Glass-slices were used as a template to induce formation and assembly of aragonite. → Hemisphere, twinborn hemisphere and flower-shaped particles were produced by direction of the glass-slices. → Planes were always appeared in these as-synthesized samples. → Thermodynamic theory was applied to explain the production of the aragonite. -- Abstract: A glass-slice was used as a template to induce formation and assembly of aragonite. Thermodynamic theory was applied to explain the production of the aragonite. Transformation of three-dimensional nucleation to template-based two-dimensional surface nucleation caused the production of aragonite. Hemisphere, twinborn hemisphere and flower-shaped particles were produced by direction of the glass-slices. Planes were always appeared in these as-synthesized samples because the nucleation and the growth of these samples were adsorbed at the surfaces of the glass-slices. The formation mechanism of the as-formed sample was proposed. Compared with organic template, the present study provides a facile method to apply inorganic template to prepare functional materials.

  17. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  18. Performance Portability Strategies for Grid C++ Expression Templates

    Directory of Open Access Journals (Sweden)

    Boyle Peter A.

    2018-01-01

    Full Text Available One of the key requirements for the Lattice QCD Application Development as part of the US Exascale Computing Project is performance portability across multiple architectures. Using the Grid C++ expression template as a starting point, we report on the progress made with regards to the Grid GPU offloading strategies. We present both the successes and issues encountered in using CUDA, OpenACC and Just-In-Time compilation. Experimentation and performance on GPUs with a SU(3×SU(3 streaming test will be reported. We will also report on the challenges of using current OpenMP 4.x for GPU offloading in the same code.

  19. Performance Portability Strategies for Grid C++ Expression Templates

    Science.gov (United States)

    Boyle, Peter A.; Clark, M. A.; DeTar, Carleton; Lin, Meifeng; Rana, Verinder; Vaquero Avilés-Casco, Alejandro

    2018-03-01

    One of the key requirements for the Lattice QCD Application Development as part of the US Exascale Computing Project is performance portability across multiple architectures. Using the Grid C++ expression template as a starting point, we report on the progress made with regards to the Grid GPU offloading strategies. We present both the successes and issues encountered in using CUDA, OpenACC and Just-In-Time compilation. Experimentation and performance on GPUs with a SU(3)×SU(3) streaming test will be reported. We will also report on the challenges of using current OpenMP 4.x for GPU offloading in the same code.

  20. 9 CFR 121.11 - Security.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  1. Conventional QT Variability Measurement vs. Template Matching Techniques: Comparison of Performance Using Simulated and Real ECG

    Science.gov (United States)

    Baumert, Mathias; Starc, Vito; Porta, Alberto

    2012-01-01

    Increased beat-to-beat variability in the QT interval (QTV) of ECG has been associated with increased risk for sudden cardiac death, but its measurement is technically challenging and currently not standardized. The aim of this study was to investigate the performance of commonly used beat-to-beat QT interval measurement algorithms. Three different methods (conventional, template stretching and template time shifting) were subjected to simulated data featuring typical ECG recording issues (broadband noise, baseline wander, amplitude modulation) and real short-term ECG of patients before and after infusion of sotalol, a QT interval prolonging drug. Among the three algorithms, the conventional algorithm was most susceptible to noise whereas the template time shifting algorithm showed superior overall performance on simulated and real ECG. None of the algorithms was able to detect increased beat-to-beat QT interval variability after sotalol infusion despite marked prolongation of the average QT interval. The QTV estimates of all three algorithms were inversely correlated with the amplitude of the T wave. In conclusion, template matching algorithms, in particular the time shifting algorithm, are recommended for beat-to-beat variability measurement of QT interval in body surface ECG. Recording noise, T wave amplitude and the beat-rejection strategy are important factors of QTV measurement and require further investigation. PMID:22860030

  2. Conventional QT variability measurement vs. template matching techniques: comparison of performance using simulated and real ECG.

    Directory of Open Access Journals (Sweden)

    Mathias Baumert

    Full Text Available Increased beat-to-beat variability in the QT interval (QTV of ECG has been associated with increased risk for sudden cardiac death, but its measurement is technically challenging and currently not standardized. The aim of this study was to investigate the performance of commonly used beat-to-beat QT interval measurement algorithms. Three different methods (conventional, template stretching and template time shifting were subjected to simulated data featuring typical ECG recording issues (broadband noise, baseline wander, amplitude modulation and real short-term ECG of patients before and after infusion of sotalol, a QT interval prolonging drug. Among the three algorithms, the conventional algorithm was most susceptible to noise whereas the template time shifting algorithm showed superior overall performance on simulated and real ECG. None of the algorithms was able to detect increased beat-to-beat QT interval variability after sotalol infusion despite marked prolongation of the average QT interval. The QTV estimates of all three algorithms were inversely correlated with the amplitude of the T wave. In conclusion, template matching algorithms, in particular the time shifting algorithm, are recommended for beat-to-beat variability measurement of QT interval in body surface ECG. Recording noise, T wave amplitude and the beat-rejection strategy are important factors of QTV measurement and require further investigation.

  3. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  4. Tailoring the porosity of hierarchical zeolites by carbon-templating

    DEFF Research Database (Denmark)

    Zhu, Kake; Egeblad, Kresten; Christensen, Claus H.

    2008-01-01

    We report the synthesis and characterization of a series of hierarchical porous zeolite single crystal materials with a range of porosities made available by carbon-templating using differently-sized carbon particles as templates for the additional non-micropore porosity. The materials were...

  5. Developing a secured social networking site using information security awareness techniques

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2014-11-01

    Full Text Available Background: Ever since social network sites (SNS became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has confirmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it.

  6. Template matching techniques in computer vision theory and practice

    CERN Document Server

    Brunelli, Roberto

    2009-01-01

    The detection and recognition of objects in images is a key research topic in the computer vision community.  Within this area, face recognition and interpretation has attracted increasing attention owing to the possibility of unveiling human perception mechanisms, and for the development of practical biometric systems. This book and the accompanying website, focus on template matching, a subset of object recognition techniques of wide applicability, which has proved to be particularly effective for face recognition applications. Using examples from face processing tasks throughout the book to illustrate more general object recognition approaches, Roberto Brunelli: examines the basics of digital image formation, highlighting points critical to the task of template matching;presents basic and  advanced template matching techniques, targeting grey-level images, shapes and point sets;discusses recent pattern classification paradigms from a template matching perspective;illustrates the development of a real fac...

  7. Photoelectron spectroscopic study on electronic structure of butterfly-templated ZnO

    Energy Technology Data Exchange (ETDEWEB)

    Kamada, Masao; Sugiyama, Harue; Takahashi, Kazutoshi; Guo, Qixin [Synchrotron Light Application Center, Saga University, Honjo 1, Saga 840-8502 (Japan); Gu, Jiajun; Zhang, Wang; Fan, Tongxiang; Zhang, Di [State Key Laboratory of Metal Matrix Composites, Shanghai Jiaotong University, Shanghai 200030 (China)

    2010-06-15

    Biological systems have complicated hierarchical architecture involving nano-structures inside, and are expected as another candidate for new nano-templates. The present work reports the photoelectron spectroscopic study on electronic structure of the butterfly-templated ZnO that were successfully produced from butterfly wings. Ultraviolet Photoelectron Spectrum (UPS) of the butterfly-templated ZnO shows clearly the valence band and a Zn-3d peak, indicating that the butterfly-templated ZnO has the same electronic structure as bulk ZnO. However, the details show that the energy positions of the Zn-3d level and the valence-band structure are different between them. The present results indicate that the bonding interaction between Zn-4sp and O-2p orbitals is stronger in the butterfly-templated ZnO, probably due to the nano-structures inside. Important parameters such as band bending and electron affinity are also obtained. The larger band bending and the lower electron affinity are found in the butterfly-templated ZnO (copyright 2010 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim) (orig.)

  8. Colloidal micro- and nano-particles as templates for polyelectrolyte multilayer capsules.

    Science.gov (United States)

    Parakhonskiy, Bogdan V; Yashchenok, Alexey M; Konrad, Manfred; Skirtach, Andre G

    2014-05-01

    Colloidal particles play an important role in various areas of material and pharmaceutical sciences, biotechnology, and biomedicine. In this overview we describe micro- and nano-particles used for the preparation of polyelectrolyte multilayer capsules and as drug delivery vehicles. An essential feature of polyelectrolyte multilayer capsule preparations is the ability to adsorb polymeric layers onto colloidal particles or templates followed by dissolution of these templates. The choice of the template is determined by various physico-chemical conditions: solvent needed for dissolution, porosity, aggregation tendency, as well as release of materials from capsules. Historically, the first templates were based on melamine formaldehyde, later evolving towards more elaborate materials such as silica and calcium carbonate. Their advantages and disadvantages are discussed here in comparison to non-particulate templates such as red blood cells. Further steps in this area include development of anisotropic particles, which themselves can serve as delivery carriers. We provide insights into application of particles as drug delivery carriers in comparison to microcapsules templated on them. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. Webulous and the Webulous Google Add-On--a web service and application for ontology building from templates.

    Science.gov (United States)

    Jupp, Simon; Burdett, Tony; Welter, Danielle; Sarntivijai, Sirarat; Parkinson, Helen; Malone, James

    2016-01-01

    Authoring bio-ontologies is a task that has traditionally been undertaken by skilled experts trained in understanding complex languages such as the Web Ontology Language (OWL), in tools designed for such experts. As requests for new terms are made, the need for expert ontologists represents a bottleneck in the development process. Furthermore, the ability to rigorously enforce ontology design patterns in large, collaboratively developed ontologies is difficult with existing ontology authoring software. We present Webulous, an application suite for supporting ontology creation by design patterns. Webulous provides infrastructure to specify templates for populating ontology design patterns that get transformed into OWL assertions in a target ontology. Webulous provides programmatic access to the template server and a client application has been developed for Google Sheets that allows templates to be loaded, populated and resubmitted to the Webulous server for processing. The development and delivery of ontologies to the community requires software support that goes beyond the ontology editor. Building ontologies by design patterns and providing simple mechanisms for the addition of new content helps reduce the overall cost and effort required to develop an ontology. The Webulous system provides support for this process and is used as part of the development of several ontologies at the European Bioinformatics Institute.

  10. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  11. 42 CFR 73.11 - Security.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  12. Modified Small Business Network Security

    OpenAIRE

    Md. Belayet Ali; Oveget Das; Md. Shamim Hossain

    2012-01-01

    This paper covers some likely threats and effectivesteps for a secure small business. It also involves a flowchart tocomprehend the overall small business network security easilyand we identify a set of security issues and applyappropriate techniques to satisfy the correspondingsecurity requirements. In respect of all, this document isstrong enough for any small business network security.

  13. Computer-Aided Template for Model Reuse, Development and Maintenance

    DEFF Research Database (Denmark)

    Fedorova, Marina; Sin, Gürkan; Gani, Rafiqul

    2014-01-01

    A template-based approach for model development is presented in this work. Based on a model decomposition technique, the computer-aided template concept has been developed. This concept is implemented as a software tool , which provides a user-friendly interface for following the workflow steps...

  14. Patterned FePt nanostructures using ultrathin self-organized templates

    Science.gov (United States)

    Deng, Chen Hua; Zhang, Min; Wang, Fang; Xu, Xiao Hong

    2018-02-01

    Patterned magnetic thin films are both scientifically interesting and technologically useful. Ultrathin self-organized anodic aluminum oxide (AAO) template can be used to fabricate large area nanodot and antidot arrays. The magnetic properties of these nanostructures may be tuned by the morphology of the AAO template, which in turn can be controlled by synthetic parameters. In this work, ultrathin AAO templates were used as etching masks for the fabrication of both FePt nanodot and antidot arrays with high areal density. The perpendicular magnetic anisotropy of L10 FePt thin films are preserved in the nanostructures.

  15. Anodic Aluminum Oxide Templates for Nano wires Array Fabrication

    International Nuclear Information System (INIS)

    Nur Ubaidah Saidin; Kok, K.Y.; Ng, I.K.

    2011-01-01

    This paper reports on the process developed to fabricate anodic aluminium oxide (AAO) templates suitable for the fabrication of nano wire arrays. Anodization process has been used to fabricate the AAO templates with pore diameters ranging from 15 nm to 30 nm. Electrodeposition of parallel arrays of high aspect ratio nickel nano wires were demonstrated using these fabricated AAO templates. The nano wires produced were characterized using X-ray diffraction (XRD) and scanning electron microscopy (SEM). It was found that the orientations of the electrodeposited nickel nano wires were governed by the deposition current and electrolyte conditions. (author)

  16. Creation of structured documentation templates using Natural Language Processing techniques.

    Science.gov (United States)

    Kashyap, Vipul; Turchin, Alexander; Morin, Laura; Chang, Frank; Li, Qi; Hongsermeier, Tonya

    2006-01-01

    Structured Clinical Documentation is a fundamental component of the healthcare enterprise, linking both clinical (e.g., electronic health record, clinical decision support) and administrative functions (e.g., evaluation and management coding, billing). One of the challenges in creating good quality documentation templates has been the inability to address specialized clinical disciplines and adapt to local clinical practices. A one-size-fits-all approach leads to poor adoption and inefficiencies in the documentation process. On the other hand, the cost associated with manual generation of documentation templates is significant. Consequently there is a need for at least partial automation of the template generation process. We propose an approach and methodology for the creation of structured documentation templates for diabetes using Natural Language Processing (NLP).

  17. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  18. Template synthesis of indium nanowires using anodic aluminum oxide membranes.

    Science.gov (United States)

    Chen, Feng; Kitai, Adrian H

    2008-09-01

    Indium nanowires with diameters approximately 300 nm have been synthesized by a hydraulic pressure technique using anodic aluminum oxide (AAO) templates. The indium melt is injected into the AAO template and solidified to form nanostructures. The nanowires are dense, continuous and uniformly run through the entire approximately 60 microm thickness of the AAO template. X-ray diffraction (XRD) reveals that the nanowires are polycrystalline with a preferred orientation. SEM is performed to characterize the morphology of the nanowires.

  19. 41 CFR 102-72.95 - What are the requirements for obtaining a security delegation of authority from GSA?

    Science.gov (United States)

    2010-07-01

    ... the requirements for obtaining a security delegation of authority from GSA? An Executive agency may... PBS. The delegation may be granted where the requesting agency demonstrates a compelling need for the delegated authority and the delegation is not inconsistent with the authorities of any other law enforcement...

  20. Template Composite Dark Matter

    DEFF Research Database (Denmark)

    Drach, Vincent; Hietanen, Ari; Pica, Claudio

    2015-01-01

    We present a non perturbative study of SU(2) gauge theory with two fundamental Dirac flavours. We discuss how the model can be used as a template for composite Dark Matter (DM). We estimate one particular interaction of the DM candidate with the Standard Model : the interaction through photon...

  1. Preparation and crystallization of hollow α-Fe{sub 2}O{sub 3} microspheres following the gas-bubble template method

    Energy Technology Data Exchange (ETDEWEB)

    Valladares, L. de los Santos, E-mail: ld301@cam.ac.uk [Cavendish Laboratory, Department of Physics, University of Cambridge, J.J Thomson Av., Cambridge, CB3 0HE (United Kingdom); León Félix, L. [Laboratorio de Cerámicos y Nanomateriales, Facultad de Ciencias Físicas, Universidad Nacional Mayor de San Marcos, Ap. Postal 14-0149, Lima (Peru); Laboratory of Magnetic Characterization, Instituto de Física, Universidade de Brasília, DF 70910-900, Brasilia (Brazil); Espinoza Suarez, S.M.; Bustamante Dominguez, A.G. [Laboratorio de Cerámicos y Nanomateriales, Facultad de Ciencias Físicas, Universidad Nacional Mayor de San Marcos, Ap. Postal 14-0149, Lima (Peru); Mitrelias, T.; Holmes, S. [Cavendish Laboratory, Department of Physics, University of Cambridge, J.J Thomson Av., Cambridge, CB3 0HE (United Kingdom); Moreno, N.O. [Departamento de Física, Universidade Federal de Sergipe, 49100-000, Sao Cristóvao, Sergipe (Brazil); Albino Aguiar, J. [Laboratório de Supercondutividade e Materiais Avançados, Departamento de Física, Universidade Federal de Pernambuco, 50670-901, Recife (Brazil); Barnes, C.H.W. [Cavendish Laboratory, Department of Physics, University of Cambridge, J.J Thomson Av., Cambridge, CB3 0HE (United Kingdom)

    2016-02-01

    In this work we report the formation of hollow α-Fe{sub 2}O{sub 3} (hematite) microspheres by the gas-bubble template method. This technique is simple and it does not require hard templates, surfactants, special conditions of atmosphere or complex steps. After reacting Fe(NO{sub 3}){sub 3}.9H{sub 2}O and citric acid in water by sol–gel, the precursor was annealed in air at different temperatures between 180 and 600 °C. Annealing at 550 and 600 °C generates bubbles on the melt which crystallize and oxidizes to form hematite hollow spheres after quenching. The morphology and crystal evolution are studied by means of X-ray diffraction and scanning electron microscopy. We found that after annealing at 250–400 °C, the sample consist of a mixture of magnetite, maghemite and hematite. Single hematite phase in the form of hollow microspheres is obtained after annealing at 550 and 600 °C. The crystallization and crystal size of the hematite shells increase with annealing temperature. A possible mechanism for hollow sphere formation is presented. - Highlights: • Formation of hollow hematite microspheres by the gas-bubble template method. • This technique does not require hard templates or special conditions of atmosphere. • Annealing promotes the transition magnetite to maghemite to hematite. • Crystallization of the hematite shells increase with annealing temperature.

  2. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... transportation operators, flight students, and others, where appropriate, for services related to security threat.... Enforce safety- and security-related regulations and requirements; 3. Assess and distribute intelligence...

  3. BPFlexTemplate: A Business Process template generation tool based on similarity and flexibility

    Directory of Open Access Journals (Sweden)

    Latifa Ilahi

    2017-01-01

    Full Text Available In large organizations with multiple organizational units, process variants emerge due to many aspects, including local management policies, resources or socio-technical limitations. Organizations then struggle to improve a business process which has no longer a single process model to redesign, implement and adjust. In this paper, we propose an approach to tackle these two challenges: decrease the proliferation of process variants in these organizations, and foresee, at the same time, the need of having flexible business processes that allow for a certain degree of adjustment. To validate our approach, we first conducted case studies where we collected six real-world business process variants from two organizational units of the same healthcare organization. We then proposed an algorithm to derive a template process model from all the variants, which includes common and flexible process elements. We implemented our approach in a software tool called BPFlexTemplate, and tested it with the elicited variants.

  4. 7 CFR 1951.866 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Security. 1951.866 Section 1951.866 Agriculture... REGULATIONS (CONTINUED) SERVICING AND COLLECTIONS Rural Development Loan Servicing § 1951.866 Security. (a) Loans from RDLF intermediaries to ultimate recipients. Security requirements for loans from...

  5. 14 CFR 460.53 - Security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Security. 460.53 Section 460.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....53 Security. An operator must implement security requirements to prevent any space flight participant...

  6. 7 CFR 273.6 - Social security numbers.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Social security numbers. 273.6 Section 273.6... normally uses the Receipt of Application for a Social Security Number, Form SSA-5028, as evidence that an... security numbers. (a) Requirements for participation. The State agency shall require that a household...

  7. The government as a client for security support services. A commercial security contractor's perspective

    International Nuclear Information System (INIS)

    Leith, H.M.

    1984-01-01

    This paper presents a look at the challenges confronting security management personnel contracting with the U.S. government to provide security and related support services. From the corporate decision to enter the ''Big Leagues'' via proposal submission, through commitments and required expertise necessary to achieve ''outstanding'' ratings, this paper is an overview of a broad spectrum of security related topics including: the proposal process, the first step; oral review boards and ''Catch-22'' dilemmas; contractual requirements vs. court orders; personnel, the human factor; the carousel approach to fiscal accountability; and avoiding communication barriers

  8. Sacrificial template method of fabricating a nanotube

    Science.gov (United States)

    Yang, Peidong [Berkeley, CA; He, Rongrui [Berkeley, CA; Goldberger, Joshua [Berkeley, CA; Fan, Rong [El Cerrito, CA; Wu, Yi-Ying [Albany, CA; Li, Deyu [Albany, CA; Majumdar, Arun [Orinda, CA

    2007-05-01

    Methods of fabricating uniform nanotubes are described in which nanotubes were synthesized as sheaths over nanowire templates, such as using a chemical vapor deposition process. For example, single-crystalline zinc oxide (ZnO) nanowires are utilized as templates over which gallium nitride (GaN) is epitaxially grown. The ZnO templates are then removed, such as by thermal reduction and evaporation. The completed single-crystalline GaN nanotubes preferably have inner diameters ranging from 30 nm to 200 nm, and wall thicknesses between 5 and 50 nm. Transmission electron microscopy studies show that the resultant nanotubes are single-crystalline with a wurtzite structure, and are oriented along the direction. The present invention exemplifies single-crystalline nanotubes of materials with a non-layered crystal structure. Similar "epitaxial-casting" approaches could be used to produce arrays and single-crystalline nanotubes of other solid materials and semiconductors. Furthermore, the fabrication of multi-sheath nanotubes are described as well as nanotubes having multiple longitudinal segments.

  9. Future consumer mobile phone security: A case study using the data-centric security model

    NARCIS (Netherlands)

    van Cleeff, A.

    Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

  10. MODEL-BASED SECURITY ENGINEERING OF SOA SYSTEM USING SECURITY INTENT DSL

    OpenAIRE

    Muhammad Qaiser Saleem; Jafreezal Jaafar; Mohd Fadzil Hassan

    2011-01-01

    Currently most of the enterprises are using SOA and web services technologies to build their web information system. They are using MDA principles for design and development of WIS and using UML as a modelling language for business process modelling. Along with the increased connectivity in SOA environment, security risks rise exponentially. Security is not defined during the early phases of development and left onto developer. Properly configuring security requirements in SOA applications is...

  11. A template bank to search for gravitational waves from inspiralling compact binaries: II. Phenomenological model

    International Nuclear Information System (INIS)

    Cokelaer, T

    2007-01-01

    Matched filtering is used to search for gravitational waves emitted by inspiralling compact binaries in data from ground-based interferometers. One of the key aspects of the detection process is the deployment of a set of templates, also called a template bank, to cover the astrophysically interesting region of the parameter space. In a companion paper, we described the template bank algorithm used in the analysis of Laser Interferometer Gravitational-Wave Observatory (LIGO) data to search for signals from non-spinning binaries made of neutron star and/or stellar-mass black holes; this template bank is based upon physical template families. In this paper, we describe the phenomenological template bank that was used to search for gravitational waves from non-spinning black hole binaries (from stellar mass formation) in the second, third and fourth LIGO science runs. We briefly explain the design of the bank, whose templates are based on a phenomenological detection template family. We show that this template bank gives matches greater than 95% with the physical template families that are expected to be captured by the phenomenological templates

  12. Growth control of carbon nanotubes using by anodic aluminum oxide nano templates.

    Science.gov (United States)

    Park, Yong Seob; Choi, Won Seek; Yi, Junsin; Lee, Jaehyeong

    2014-05-01

    Anodic Aluminum Oxide (AAO) template prepared in acid electrolyte possess regular and highly anisotropic porous structure with pore diameter range from five to several hundred nanometers, and with a density of pores ranging from 10(9) to 10(11) cm(-2). AAO can be used as microfilters and templates for the growth of CNTs and metal or semiconductor nanowires. Varying anodizing conditions such as temperature, electrolyte, applied voltage, anodizing and widening time, one can control the diameter, the length, and the density of pores. In this work, we deposited Al thin film by radio frequency magnetron sputtering method to fabricate AAO nano template and synthesized multi-well carbon nanotubes on a glass substrate by microwave plasma-enhanced chemical vapor deposition (MPECVD). AAO nano-porous templates with various pore sizes and depths were introduced to control the dimension and density of CNT arrays. The AAO nano template was synthesize on glass by two-step anodization technique. The average diameter and interpore distance of AAO nano template are about 65 nm and 82 nm. The pore density and AAO nano template thickness are about 2.1 x 10(10) pores/cm2 and 1 microm, respectively. Aligned CNTs on the AAO nano template were synthesized by MPECVD at 650 degrees C with the Ni catalyst layer. The length and diameter of CNTs were grown 2 microm and 50 nm, respectively.

  13. Improving Timeliness in Real-Time Secure Database Systems

    National Research Council Canada - National Science Library

    Son, Sang H; David, Rasikan; Thuraisingham, Bhavani

    2006-01-01

    .... In addition to real-time requirements, security is usually required in many applications. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems...

  14. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  15. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  16. Information security management handbook, v.7

    CERN Document Server

    O'Hanley, Richard

    2013-01-01

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2(R) CISSP Common Body of Knowledge (CBK(R)), this volume features 27 new chapters on topics

  17. A methodology for performing computer security reviews

    International Nuclear Information System (INIS)

    Hunteman, W.J.

    1991-01-01

    DOE Order 5637.1, ''Classified Computer Security,'' requires regular reviews of the computer security activities for an ADP system and for a site. Based on experiences gained in the Los Alamos computer security program through interactions with DOE facilities, we have developed a methodology to aid a site or security officer in performing a comprehensive computer security review. The methodology is designed to aid a reviewer in defining goals of the review (e.g., preparation for inspection), determining security requirements based on DOE policies, determining threats/vulnerabilities based on DOE and local threat guidance, and identifying critical system components to be reviewed. Application of the methodology will result in review procedures and checklists oriented to the review goals, the target system, and DOE policy requirements. The review methodology can be used to prepare for an audit or inspection and as a periodic self-check tool to determine the status of the computer security program for a site or specific ADP system. 1 tab

  18. A methodology for performing computer security reviews

    International Nuclear Information System (INIS)

    Hunteman, W.J.

    1991-01-01

    This paper reports on DIE Order 5637.1, Classified Computer Security, which requires regular reviews of the computer security activities for an ADP system and for a site. Based on experiences gained in the Los Alamos computer security program through interactions with DOE facilities, the authors have developed a methodology to aid a site or security officer in performing a comprehensive computer security review. The methodology is designed to aid a reviewer in defining goals of the review (e.g., preparation for inspection), determining security requirements based on DOE policies, determining threats/vulnerabilities based on DOE and local threat guidance, and identifying critical system components to be reviewed. Application of the methodology will result in review procedures and checklists oriented to the review goals, the target system, and DOE policy requirements. The review methodology can be used to prepare for an audit or inspection and as a periodic self-check tool to determine the status of the computer security program for a site or specific ADP system

  19. Template for success: using a resident-designed sign-out template in the handover of patient care.

    Science.gov (United States)

    Clark, Clancy J; Sindell, Sarah L; Koehler, Richard P

    2011-01-01

    Report our implementation of a standardized handover process in a general surgery residency program. The standardized handover process, sign-out template, method of implementation, and continuous quality improvement process were designed by general surgery residents with support of faculty and senior hospital administration using standard work principles and business models of the Virginia Mason Production System and the Toyota Production System. Nonprofit, tertiary referral teaching hospital. General surgery residents, residency faculty, patient care providers, and hospital administration. After instruction in quality improvement initiatives, a team of general surgery residents designed a sign-out process using an electronic template and standard procedures. The initial implementation phase resulted in 73% compliance. Using resident-driven continuous quality improvement processes, real-time feedback enabled residents to modify and improve this process, eventually attaining 100% compliance and acceptance by residents. The creation of a standardized template and protocol for patient handovers might eliminate communication failures. Encouraging residents to participate in this process can establish the groundwork for successful implementation of a standardized handover process. Integrating a continuous quality-improvement process into such an initiative can promote active participation of busy general surgery residents and lead to successful implementation of standard procedures. Copyright © 2011 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.

  20. Template Directed Oligomer Ligation in Eutectic Phases in Water-Ice

    DEFF Research Database (Denmark)

    Dörr, Mark; Löffler, Philipp M. G.; Wieczorek, Rafal

    2011-01-01

    achieved, if small, activated, oligonucleotides are ligated on a template. A template directed ligation can lead to autocatalytic or cross- catalytic replication and thus maintain a certain pool of catalyitc species. Important for these processes is a destabilization of the formed douplex....../multiplex to overcome product inhibition. The latest results of our template directed ligation experiments in the eutectic ice phase are presented. Different activation strategies are compared and an outlook towards applications in molecular evolution and artifical cell systems (« protocells ») will be given. Figure 1....... (a) Reaction scheme of the condensation reaction of two oligoribonucleotides : The leaving group in this example is imidazole. (b) Illustration of a possible spatial arrangement of a template (15nt) directed ligation. The 7-mer is activated with imidazole at the 5' phosphate (apical moiety...

  1. Template assisted solid state electrochemical growth of silver micro- and nanowires

    International Nuclear Information System (INIS)

    Peppler, Klaus; Janek, Juergen

    2007-01-01

    We report on a template based solid state electrochemical method for fabricating silver nanowires with predefined diameter, depending only on the pore diameter of the template. As templates we used porous silicon with pore diameters in the μm range and porous alumina with pore diameters in the nm range. The template pores were filled with silver sulfide (a mixed silver cation and electronic conductor) by direct chemical reaction of silver and sulfur. The filled template was then placed between a silver foil as anode (bottom side) and a microelectrode (top side) as cathode. An array of small cylindrical transference cells with diameters in the range of either micro- or nanometers was thus obtained. By applying a cathodic voltage to the microelectrode silver in the form of either micro- or nanowires was deposited at about 150 deg. C. The growth rate is controllable by the electric current

  2. Maritime supply chain security: Navigating through a sea of compliance requirements

    Directory of Open Access Journals (Sweden)

    Emma Maspero

    2008-11-01

    Full Text Available As a direct result of the 9-11 New York attack all modes of freight and passengertransportation were scrutinised for vulnerabilities. Over 90% of international trade takes place via sea transport for at least some part of the supply chain and as a result there has been a drive to better secure maritime transportation. This paper outlines the background to and the rationale behind the most important of the new security measures for maritime transportation and provides an overview of the likely implications for supply chain role-players. In addition the paper endeavours to create awareness of the importance of maritime supply chain security.

  3. Computer-aided modelling template: Concept and application

    DEFF Research Database (Denmark)

    Fedorova, Marina; Sin, Gürkan; Gani, Rafiqul

    2015-01-01

    decomposition technique which identifies generic steps and workflow involved, the computer-aided template concept has been developed. This concept is implemented as a software tool, which provides a user-friendly interface for following the workflow steps and guidance through the steps providing additional......Modelling is an important enabling technology in modern chemical engineering applications. A template-based approach is presented in this work to facilitate the construction and documentation of the models and enable their maintenance for reuse in a wider application range. Based on a model...

  4. Tailoring silver nanoparticle construction using dendrimer templated silica networks

    International Nuclear Information System (INIS)

    Liu Xiaojun; Kakkar, Ashok

    2008-01-01

    We have examined the role of the internal environment of dendrimer templated silica networks in tailoring the construction of silver nanoparticle assemblies. Silica networks from which 3,5-dihydroxybenzyl alcohol based dendrimer templates have been completely removed, slowly wet with an aqueous solution of silver acetate. The latter then reacts with internal silica silanol groups, leading to chemisorption of silver ions, followed by the growth of silver oxide nanoparticles. Silica network constructed using generation 4 dendrimer contains residual dendrimer template, and mixes with aqueous silver acetate solution easily. Upon chemisorption, silver ions get photolytically reduced to silver metal under a stabilizing dendrimer environment, leading to the formation of silver metal nanoparticles

  5. Risk and Business Goal Based Security Requirement and Countermeasure Prioritization

    OpenAIRE

    Herrmann, Andrea; Morali, A.; Etalle, Sandro; Wieringa, Roelf J.; Niedrite, Laila; Strazdina, Renate; Wangler, Benkt

    2012-01-01

    Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security‿ but need to be able to justify their security investment plans. Currently companies achieve this by means of checklist-based security assessments, but these methods are a way to achieve consensus without being able to provide justifications of countermeasures in terms of business goals. But such justificat...

  6. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, Johan; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the

  7. Data security in Intelligent Transport Systems

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2012-10-01

    Full Text Available Intelligent Transport Services expect availability of the secure seamless communications solutions typically covering widely spread areas. Different ITS solutions require different portfolio of telecommunications service quality. These parameters have to correspond with ITS service performance parameters required by specific service. Even though quite extensive range of public wireless data services with reasonable coverage are provided, most of them are provided with no guaranteed quality and security. ITS requirements can be in most parameters easier reached if multi-path communications systems are applied core solution is combined with both public as well as private ones where and when it is needed. Such solution requires implementation of relevant flexible system architecture supported by the efficient decision processes. This paper is concentrated the telecommunications security issues relevant to the ITS wide area networking. Expected level of security varies in dependence on relevant ITS service requirements. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure (C2I or other vehicles (C2C progressively grow. Such trend upsurges the fatal problems appearance probability in case security of the wide area networks is not relevantly treated. That is reason why relevant communications security treatment becomes crucial part of the ITS solution. Besides of available "off shelf" security tools we present solution based on non-public universal identifier with dynamical extension (time and position dependency as an autonomous variables and data selection according to actor role or category. Presented results were obtained within projects e-Ident1, DOTEK2 and SRATVU3.

  8. Priming and the guidance by visual and categorical templates in visual search

    NARCIS (Netherlands)

    Wilschut, A.M.; Theeuwes, J.; Olivers, C.N.L.

    2014-01-01

    Visual search is thought to be guided by top-down templates that are held in visual working memory. Previous studies have shown that a search-guiding template can be rapidly and strongly implemented from a visual cue, whereas templates are less effective when based on categorical cues. Direct visual

  9. Supply-Chain Optimization Template

    Science.gov (United States)

    Quiett, William F.; Sealing, Scott L.

    2009-01-01

    The Supply-Chain Optimization Template (SCOT) is an instructional guide for identifying, evaluating, and optimizing (including re-engineering) aerospace- oriented supply chains. The SCOT was derived from the Supply Chain Council s Supply-Chain Operations Reference (SCC SCOR) Model, which is more generic and more oriented toward achieving a competitive advantage in business.

  10. Design and implementation of an algorithm for creating templates for the purpose of iris biometric authentication through the analysis of textures implemented on a FPGA

    Energy Technology Data Exchange (ETDEWEB)

    Giacometto, F J; Vilardy, J M; Torres, C O; Mattos, L, E-mail: franciscogiacometto@unicesar.edu.co [Laboratorio de Optica e Informatica, Universidad Popular del Cesar, Sede balneario Hurtado, Valledupar, Cesar (Colombia)

    2011-01-01

    Currently addressing problems related to security in access control, as a consequence, have been developed applications that work under unique characteristics in individuals, such as biometric features. In the world becomes important working with biometric images such as the liveliness of the iris which are for both the pattern of retinal images as your blood vessels. This paper presents an implementation of an algorithm for creating templates for biometric authentication with ocular features for FPGA, in which the object of study is that the texture pattern of iris is unique to each individual. The authentication will be based in processes such as edge extraction methods, segmentation principle of John Daugman and Libor Masek's, and standardization to obtain necessary templates for the search of matches in a database and then get the expected results of authentication.

  11. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  12. The Requirement of a Positive Definite Covariance Matrix of Security Returns for Mean-Variance Portfolio Analysis: A Pedagogic Illustration

    Directory of Open Access Journals (Sweden)

    Clarence C. Y. Kwan

    2010-07-01

    Full Text Available This study considers, from a pedagogic perspective, a crucial requirement for the covariance matrix of security returns in mean-variance portfolio analysis. Although the requirement that the covariance matrix be positive definite is fundamental in modern finance, it has not received any attention in standard investment textbooks. Being unaware of the requirement could cause confusion for students over some strange portfolio results that are based on seemingly reasonable input parameters. This study considers the requirement both informally and analytically. Electronic spreadsheet tools for constrained optimization and basic matrix operations are utilized to illustrate the various concepts involved.

  13. Novel simple templates for reproducible positioning of skin applicators in brachytherapy

    Directory of Open Access Journals (Sweden)

    Silvia Rodríguez Villalba

    2016-08-01

    Full Text Available Purpose : Esteya and Valencia surface applicators are designed to treat skin tumors using brachytherapy. In clinical practice, in order to avoid errors that may affect the treatment outcome, there are two issues that need to be carefully addressed. First, the selected applicator for the treatment should provide adequate margin for the target, and second, the applicator has to be precisely positioned before each treatment fraction. In this work, we describe the development and use of a new acrylic templates named Template La Fe-ITIC. They have been designed specifically to help the clinical user in the selection of the correct applicator, and to assist the medical staff in reproducing the positioning of the applicator. These templates are freely available upon request. Material and methods: Templates that were developed by University and Polytechnic Hospital La Fe (La Fe and Hospital Clínica Benidorm (ITIC in cooperation with Elekta, consist of a thin sheet made of transparent acrylic. For each applicator, a crosshair and two different circles are drawn on these templates: the inner one corresponds to the useful beam, while the outer one represents the external perimeter of the applicator. The outer circle contains slits that facilitate to draw a circle on the skin of the patient for exact positioning of the applicator. In addition, there are two perpendicular rulers to define the adequate margin. For each applicator size, a specific template was developed. Results: The templates have been used successfully in our institutions for more than 50 patients’ brachytherapy treatments. They are currently being used for Esteya and Valencia applicators. Conclusions : The template La Fe-ITIC is simple and practical. It improves both the set-up time and reproducibility. It helps to establish the adequate margins, an essential point in the clinical outcome.

  14. 10 CFR 39.71 - Security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  15. 40 CFR 265.14 - Security.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...

  16. [Use of diagnostic templates at stages of prosthetics treatment with implant-retained restorations].

    Science.gov (United States)

    Gvetadze, R Sh; Abramyan, S V; Ivanov, A A; Nubaryan, A P

    The comparative analysis of efficiency of various types of diagnostic templates for planning orthopedic treatment of 50 patients with partial or complete absence of teeth was performed. The patients were divided in 3 groups according to template manufacturing technique. All diagnostic templates made in accordance with clinical conditions allowed transfering digital data of the scheduled prosthetic construction for virtual implantation planning. Advantages and pitfalls of each template type are discussed.

  17. Synthesis and characterizations of Pt nanorods on electrospun polyamide-6 nanofibers templates

    International Nuclear Information System (INIS)

    Nirmala, R.; Navamathavan, R.; Won, Jeong Jin; Jeon, Kyung Soo; Yousef, Ayman; Kim, Hak Yong

    2012-01-01

    Highlights: ► Electrospun polyamide-6 nanofibers were used as the templates for synthesis Pt nanorods. ► Polyamide-6 nanofibers surfaces were plasma treated to coat Pt. ► High quality Pt nanorods were obtained by calcinations process. ► Pt nanorods with a diameter of few hundred nanometers were obtained. ► Polyamide-6 nanofibers template based Pt nanorods synthesis are a feasible method. - Abstract: We report on the synthesis of platinum (Pt) nanorods by using ultrafine polyamide-6 nanofibers templates produced via electrospinning technique. These ultrafine polyamide-6 nanofibers can be utilized as the templates for growing Pt nanorods after modifying them optimally by plasma passivations. The morphological, structural, optical and electrical properties of the template assisted Pt nanorods were studied by field-emission scanning electron microscopy (FE-SEM), high-resolution transmission electron microscopy (HR-TEM), X-ray diffraction (XRD), photoluminescence (PL) and current–voltage (I–V) characteristics. The ability to fabricate the ultrafine size controlled Pt nanorods on polyamide-6 templates with optimized growth parameters in real time can be utilized for the variety of technological applications. Therefore, it is possible to obtain high quality with size control Pt nanorods. Once obtaining the high quality metal nanorods on polymer templates, the same can be adapted for the electronic device fabrication.

  18. BioAssay templates for the semantic web

    Directory of Open Access Journals (Sweden)

    Alex M. Clark

    2016-05-01

    Full Text Available Annotation of bioassay protocols using semantic web vocabulary is a way to make experiment descriptions machine-readable. Protocols are communicated using concise scientific English, which precludes most kinds of analysis by software algorithms. Given the availability of a sufficiently expressive ontology, some or all of the pertinent information can be captured by asserting a series of facts, expressed as semantic web triples (subject, predicate, object. With appropriate annotation, assays can be searched, clustered, tagged and evaluated in a multitude of ways, analogous to other segments of drug discovery informatics. The BioAssay Ontology (BAO has been previously designed for this express purpose, and provides a layered hierarchy of meaningful terms which can be linked to. Currently the biggest challenge is the issue of content creation: scientists cannot be expected to use the BAO effectively without having access to software tools that make it straightforward to use the vocabulary in a canonical way. We have sought to remove this barrier by: (1 defining a BioAssay Template (BAT data model; (2 creating a software tool for experts to create or modify templates to suit their needs; and (3 designing a common assay template (CAT to leverage the most value from the BAO terms. The CAT was carefully assembled by biologists in order to find a balance between the maximum amount of information captured vs. low degrees of freedom in order to keep the user experience as simple as possible. The data format that we use for describing templates and corresponding annotations is the native format of the semantic web (RDF triples, and we demonstrate some of the ways that generated content can be meaningfully queried using the SPARQL language. We have made all of these materials available as open source (http://github.com/cdd/bioassay-template, in order to encourage community input and use within diverse projects, including but not limited to our own

  19. The optical properties of ZnO films grown on porous Si templates

    International Nuclear Information System (INIS)

    Liu, Y L; Liu, Y C; Yang, H; Wang, W B; Ma, J G; Zhang, J Y; Lu, Y M; Shen, D Z; Fan, X W

    2003-01-01

    ZnO films were electrodeposited on porous silicon templates with different porosities. The photoluminescence (PL) spectra of the samples before and after deposition of ZnO were measured to study the effect of template porosity on the luminescence properties of ZnO/porous Si composites. As-prepared porous Si (PS) templates emit strong red light. The red PL peak of porous Si after deposition of ZnO shows an obvious blueshift, and the trend of blueshift increases with an increase in template porosity. A green emission at about 550 nm was also observed when the porosity of template increases, which is ascribed to the deep-level emission band of ZnO. A model-based band diagram of the ZnO/porous Si composite is suggested to interpret the properties of the composite

  20. Aluminum Templates of Different Sizes with Micro-, Nano- and Micro/Nano-Structures for Cell Culture

    Directory of Open Access Journals (Sweden)

    Ming-Liang Yen

    2017-10-01

    Full Text Available This study investigates the results of cell cultures on aluminum (Al templates with flat-structures, micro-structures, nano-structures and micro/nano-structures. An Al template with flat-structure was obtained by electrolytic polishing; an Al template with micro-structure was obtained by micro-powder blasting; an Al template with nano-structure was obtained by aluminum anodization; and an Al template with micro/nano-structure was obtained by micro-powder blasting and then anodization. Osteoblast-like cells were cultured on aluminum templates with various structures. The microculture tetrazolium test assay was utilized to assess the adhesion, elongation, and proliferation behaviors of cultured osteoblast-like cells on aluminum templates with flat-structures, micro-structures, nano-structures, and micro/nano-structures. The results showed that the surface characterization of micro/nano-structure of aluminum templates had superhydrophilic property, and these also revealed that an aluminum template with micro/nano-structure could provide the most suitable growth situation for cell culture.

  1. 40 CFR 264.14 - Security.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Security. 264.14 Section 264.14... Standards § 264.14 Security. (a) The owner or operator must prevent the unknowing entry, and minimize the...) for discussion of security requirements at disposal facilities during the post-closure care period...

  2. Comparison of five-axis milling and rapid prototyping for implant surgical templates.

    Science.gov (United States)

    Park, Ji-Man; Yi, Tae-Kyoung; Koak, Jai-Young; Kim, Seong-Kyoon; Park, Eun-Jin; Heo, Seong-Joo

    2014-01-01

    This study aims to compare and evaluate the accuracy of surgical templates fabricated using coordinate synchronization processing with five-axis milling and design-related processing with rapid prototyping (RP). Master phantoms with 10 embedded gutta-percha cylinders hidden under artificial gingiva were fabricated and imaged using cone beam computed tomography. Vectors of the hidden cylinders were extracted and transferred to those of the planned implants through reverse engineering using virtual planning software. An RP-produced template was fabricated by stereolithography in photopolymer at the RP center according to planned data. Metal sleeves were bonded after holes were bored (group RP). For the milled template, milling coordinates were synchronized using the conversion process for the coordinate synchronization platform located on the model's bottom. Metal bushings were set on holes milled on the five-axis milling machine, on which the model was fixed through the coordinate synchronization plate, and the framework was constructed on the model using orthodontic resin (group CS). A computed tomography image was taken with templates firmly fixed on models using anchor pins (RP) or anchor screws (CS). The accuracy was analyzed via reverse engineering. Differences between the two groups were compared by repeated measures two-factor analysis. From the reverse-engineered image of the template on the experimental model, RP-produced templates showed significantly larger deviations than did milled surgical guides. Maximum deviations of the group RP were 1.58 mm (horizontal), 1.68 mm (vertical), and 8.51 degrees (angular); those of the group CS were 0.68 mm (horizontal), 0.41 mm (vertical), and 3.23 degrees (angular). A comparison of milling and RP template production methods showed that a vector-milled surgical guide had significantly smaller deviations than did an RP-produced template. The accuracy of computer-guided milled surgical templates was within the safety

  3. Controlling the anodizing conditions in preparation of an nanoporous anodic aluminium oxide template

    Science.gov (United States)

    Nazemi, Azadeh; Abolfazl, Seyed; Sadjadi, Seyed

    2014-12-01

    Porous anodic aluminium oxide (AAO) template is commonly used in the synthesis of one-dimensional nanostructures, such as nanowires and nanorods, due to its simple fabrication process. Controlling the anodizing conditions is important because of their direct influence on the size of AAO template pores; it affects the size of nanostructures that are fabricated in AAO template. In present study, several alumina templates were fabricated by a two-step electrochemical anodization in different conditions, such as the time of first process, its voltage, and electrolyte concentration. The effect of these factors on pore diameters of AAO templates was investigated using scanning electron microscopy (SEM).

  4. Effect of migration in a diffusion model for template coexistence in protocells.

    Science.gov (United States)

    Fontanari, José F; Serva, Maurizio

    2014-03-01

    The compartmentalization of distinct templates in protocells and the exchange of templates between them (migration) are key elements of a modern scenario for prebiotic evolution. Here we use the diffusion approximation of population genetics to study analytically the steady-state properties of such a prebiotic scenario. The coexistence of distinct template types inside a protocell is achieved by a selective pressure at the protocell level (group selection) favoring protocells with a mixed template composition. In the degenerate case, where the templates have the same replication rate, we find that a vanishingly small migration rate suffices to eliminate the segregation effect of random drift and so to promote coexistence. In the nondegenerate case, a small migration rate greatly boosts coexistence as compared with the situation where there is no migration. However, increase of the migration rate beyond a critical value leads to the complete dominance of the more efficient template type (homogeneous regime). In this case, we find a continuous phase transition separating the homogeneous and the coexistence regimes, with the order parameter vanishing linearly with the distance to the transition point.

  5. XMSS : a practical forward secure signature scheme based on minimal security assumptions

    NARCIS (Netherlands)

    Buchmann, Johannes; Dahmen, Erik; Hülsing, Andreas; Yang, B.-Y.

    2011-01-01

    We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and practical signature scheme with minimal security requirements: a pseudorandom and a second preimage resistant (hash) function family. Its signature size is reduced to less than 25% compared to the best

  6. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  7. Action video game play facilitates the development of better perceptual templates

    Science.gov (United States)

    Bejjanki, Vikranth R.; Zhang, Ruyuan; Li, Renjie; Pouget, Alexandre; Green, C. Shawn; Lu, Zhong-Lin; Bavelier, Daphne

    2014-01-01

    The field of perceptual learning has identified changes in perceptual templates as a powerful mechanism mediating the learning of statistical regularities in our environment. By measuring threshold-vs.-contrast curves using an orientation identification task under varying levels of external noise, the perceptual template model (PTM) allows one to disentangle various sources of signal-to-noise changes that can alter performance. We use the PTM approach to elucidate the mechanism that underlies the wide range of improvements noted after action video game play. We show that action video game players make use of improved perceptual templates compared with nonvideo game players, and we confirm a causal role for action video game play in inducing such improvements through a 50-h training study. Then, by adapting a recent neural model to this task, we demonstrate how such improved perceptual templates can arise from reweighting the connectivity between visual areas. Finally, we establish that action gamers do not enter the perceptual task with improved perceptual templates. Instead, although performance in action gamers is initially indistinguishable from that of nongamers, action gamers more rapidly learn the proper template as they experience the task. Taken together, our results establish for the first time to our knowledge the development of enhanced perceptual templates following action game play. Because such an improvement can facilitate the inference of the proper generative model for the task at hand, unlike perceptual learning that is quite specific, it thus elucidates a general learning mechanism that can account for the various behavioral benefits noted after action game play. PMID:25385590

  8. Action video game play facilitates the development of better perceptual templates.

    Science.gov (United States)

    Bejjanki, Vikranth R; Zhang, Ruyuan; Li, Renjie; Pouget, Alexandre; Green, C Shawn; Lu, Zhong-Lin; Bavelier, Daphne

    2014-11-25

    The field of perceptual learning has identified changes in perceptual templates as a powerful mechanism mediating the learning of statistical regularities in our environment. By measuring threshold-vs.-contrast curves using an orientation identification task under varying levels of external noise, the perceptual template model (PTM) allows one to disentangle various sources of signal-to-noise changes that can alter performance. We use the PTM approach to elucidate the mechanism that underlies the wide range of improvements noted after action video game play. We show that action video game players make use of improved perceptual templates compared with nonvideo game players, and we confirm a causal role for action video game play in inducing such improvements through a 50-h training study. Then, by adapting a recent neural model to this task, we demonstrate how such improved perceptual templates can arise from reweighting the connectivity between visual areas. Finally, we establish that action gamers do not enter the perceptual task with improved perceptual templates. Instead, although performance in action gamers is initially indistinguishable from that of nongamers, action gamers more rapidly learn the proper template as they experience the task. Taken together, our results establish for the first time to our knowledge the development of enhanced perceptual templates following action game play. Because such an improvement can facilitate the inference of the proper generative model for the task at hand, unlike perceptual learning that is quite specific, it thus elucidates a general learning mechanism that can account for the various behavioral benefits noted after action game play.

  9. Reducing Individual Variation for fMRI Studies in Children by Minimizing Template Related Errors.

    Directory of Open Access Journals (Sweden)

    Jian Weng

    Full Text Available Spatial normalization is an essential process for group comparisons in functional MRI studies. In practice, there is a risk of normalization errors particularly in studies involving children, seniors or diseased populations and in regions with high individual variation. One way to minimize normalization errors is to create a study-specific template based on a large sample size. However, studies with a large sample size are not always feasible, particularly for children studies. The performance of templates with a small sample size has not been evaluated in fMRI studies in children. In the current study, this issue was encountered in a working memory task with 29 children in two groups. We compared the performance of different templates: a study-specific template created by the experimental population, a Chinese children template and the widely used adult MNI template. We observed distinct differences in the right orbitofrontal region among the three templates in between-group comparisons. The study-specific template and the Chinese children template were more sensitive for the detection of between-group differences in the orbitofrontal cortex than the MNI template. Proper templates could effectively reduce individual variation. Further analysis revealed a correlation between the BOLD contrast size and the norm index of the affine transformation matrix, i.e., the SFN, which characterizes the difference between a template and a native image and differs significantly across subjects. Thereby, we proposed and tested another method to reduce individual variation that included the SFN as a covariate in group-wise statistics. This correction exhibits outstanding performance in enhancing detection power in group-level tests. A training effect of abacus-based mental calculation was also demonstrated, with significantly elevated activation in the right orbitofrontal region that correlated with behavioral response time across subjects in the trained group.

  10. Dosimetry study of three-dimensional print template-guided precision 125I seed implantation

    Directory of Open Access Journals (Sweden)

    Zhang Hongtao

    2016-01-01

    Conclusions: The postplan and preplan dose parameters of 3D print template-guided seed implantation were nearly consistent. The dose parameters of template group superior to the traditional group. The seeds can be implanted accurately with 3D print template.

  11. Template-based protein-protein docking exploiting pairwise interfacial residue restraints

    NARCIS (Netherlands)

    Xue, Li C; Garcia Lopes Maia Rodrigues, João; Dobbs, Drena; Honavar, Vasant; Bonvin, Alexandre M J J

    2016-01-01

    Although many advanced and sophisticatedab initioapproaches for modeling protein-protein complexes have been proposed in past decades, template-based modeling (TBM) remains the most accurate and widely used approach, given a reliable template is available. However, there are many different ways to

  12. New immobilisation protocol for the template used in solid-phase synthesis of MIP nanoparticles

    Science.gov (United States)

    Chen, Lu; Muhammad, Turghun; Yakup, Burabiye; Piletsky, Sergey A.

    2017-06-01

    As a novel imprinting method, solid-phase synthesis has proven to be a promising approach to prepare polymer nanoparticles with specific recognition sites for a template molecule. In this method, imprinted polymer nanoparticles were synthesized using template immobilized on a solid support. Herein, preparation of immobilized templates on quartz chips through homogeneous route was reported as an efficient alternative strategy to heterogeneous one. The template molecule indole-3-butyric acid (IBA) was reacted with 3-aminopropyltriethoxysilane (APTES) to produce silylated template (IBA-APTES), and it was characterized by IR, 1H NMR and GC-MS. Then, the silylated template molecule was grafted onto the activated surfaces of quartz chip to prepare immobilized template (SiO2@IBA-APTES). The immobilization was confirmed by contact angle, XPS, UV and fluorescence measurement. Immobilization protocol has shown good reproducibility and stability of the immobilized template. MIP nanoparticles were prepared with high selectivity toward the molecule immobilized onto the solid surface. This provides a new approach for the development of molecularly imprinted nanoparticles.

  13. III - Template Metaprogramming for massively parallel scientific computing - Templates for Iteration; Thread-level Parallelism

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Large scale scientific computing raises questions on different levels ranging from the fomulation of the problems to the choice of the best algorithms and their implementation for a specific platform. There are similarities in these different topics that can be exploited by modern-style C++ template metaprogramming techniques to produce readable, maintainable and generic code. Traditional low-level code tend to be fast but platform-dependent, and it obfuscates the meaning of the algorithm. On the other hand, object-oriented approach is nice to read, but may come with an inherent performance penalty. These lectures aim to present he basics of the Expression Template (ET) idiom which allows us to keep the object-oriented approach without sacrificing performance. We will in particular show to to enhance ET to include SIMD vectorization. We will then introduce techniques for abstracting iteration, and introduce thread-level parallelism for use in heavy data-centric loads. We will show to to apply these methods i...

  14. 7 CFR 331.11 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan...

  15. Fabricating superhydrophobic polymer surfaces with excellent abrasion resistance by a simple lamination templating method.

    Science.gov (United States)

    Xu, Qian Feng; Mondal, Bikash; Lyons, Alan M

    2011-09-01

    Fabricating robust superhydrophobic surfaces for commercial applications is challenging as the fine-scale surface features, necessary to achieve superhydrophobicity, are susceptible to mechanical damage. Herein, we report a simple and inexpensive lamination templating method to create superhydrophobic polymer surfaces with excellent abrasion resistance and water pressure stability. To fabricate the surfaces, polyethylene films were laminated against woven wire mesh templates. After cooling, the mesh was peeled from the polymer creating a 3D array of ordered polymer microposts on the polymer surface. The resulting texture is monolithic with the polymer film and requires no chemical modification to exhibit superhydrophobicity. By controlling lamination parameters and mesh dimensions, polyethylene surfaces were fabricated that exhibit static contact angles of 160° and slip angles of 5°. Chemical and mechanical stability was evaluated using an array of manual tests as well as a standard reciprocating abraser test. Surfaces remained superhydrophobic after more than 5500 abrasion cycles at a pressure of 32.0 kPa. In addition, the surface remains dry after immersing into water for 5 h at 55 kPa. This method is environmental friendly, as it employs no solvents or harsh chemicals and may provide an economically viable path to manufacture large areas of mechanically robust superhydrophobic surfaces from inexpensive polymers and reusable templates.

  16. Replisome-mediated Translesion Synthesis and Leading Strand Template Lesion Skipping Are Competing Bypass Mechanisms*

    Science.gov (United States)

    Gabbai, Carolina B.; Yeeles, Joseph T. P.; Marians, Kenneth J.

    2014-01-01

    A number of different enzymatic pathways have evolved to ensure that DNA replication can proceed past template base damage. These pathways include lesion skipping by the replisome, replication fork regression followed by either correction of the damage and origin-independent replication restart or homologous recombination-mediated restart of replication downstream of the lesion, and bypass of the damage by a translesion synthesis DNA polymerase. We report here that of two translesion synthesis polymerases tested, only DNA polymerase IV, not DNA polymerase II, could engage productively with the Escherichia coli replisome to bypass leading strand template damage, despite the fact that both enzymes are shown to be interacting with the replicase. Inactivation of the 3′ → 5′ proofreading exonuclease of DNA polymerase II did not enable bypass. Bypass by DNA polymerase IV required its ability to interact with the β clamp and act as a translesion polymerase but did not require its “little finger” domain, a secondary region of interaction with the β clamp. Bypass by DNA polymerase IV came at the expense of the inherent leading strand lesion skipping activity of the replisome, indicating that they are competing reactions. PMID:25301949

  17. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION... approval and safeguarding of National Security Information and Restricted Data. The requirements for...

  18. A Dynamic Combinatorial Approach for Identifying Side Groups that Stabilize DNA-Templated Supramolecular Self-Assemblies

    Directory of Open Access Journals (Sweden)

    Delphine Paolantoni

    2015-02-01

    Full Text Available DNA-templated self-assembly is an emerging strategy for generating functional supramolecular systems, which requires the identification of potent multi-point binding ligands. In this line, we recently showed that bis-functionalized guanidinium compounds can interact with ssDNA and generate a supramolecular complex through the recognition of the phosphodiester backbone of DNA. In order to probe the importance of secondary interactions and to identify side groups that stabilize these DNA-templated self-assemblies, we report herein the implementation of a dynamic combinatorial approach. We used an in situ fragment assembly process based on reductive amination and tested various side groups, including amino acids. The results reveal that aromatic and cationic side groups participate in secondary supramolecular interactions that stabilize the complexes formed with ssDNA.

  19. Preformed template fluctuations promote fibril formation: Insights from lattice and all-atom models

    Energy Technology Data Exchange (ETDEWEB)

    Kouza, Maksim, E-mail: mkouza@chem.uw.edu.pl; Kolinski, Andrzej [Faculty of Chemistry, University of Warsaw, ul. Pasteura 1, 02-093 Warszaw (Poland); Co, Nguyen Truong [Department of Physics, Institute of Technology, National University of HCM City, 268 Ly Thuong Kiet Street, District 10, Ho Chi Minh City (Viet Nam); Institute for Computational Science and Technology, Quang Trung Software City, Tan Chanh Hiep Ward, District 12, Ho Chi Minh City (Viet Nam); Nguyen, Phuong H. [Laboratoire de Biochimie Theorique, UPR 9080 CNRS, IBPC, Universite Paris 7, 13 rue Pierre et Marie Curie, 75005 Paris (France); Li, Mai Suan, E-mail: masli@ifpan.edu.pl [Institute of Physics, Polish Academy of Sciences, Al. Lotnikow 32/46, 02-668 Warsaw (Poland)

    2015-04-14

    Fibril formation resulting from protein misfolding and aggregation is a hallmark of several neurodegenerative diseases such as Alzheimer’s and Parkinson’s diseases. Despite the fact that the fibril formation process is very slow and thus poses a significant challenge for theoretical and experimental studies, a number of alternative pictures of molecular mechanisms of amyloid fibril formation have been recently proposed. What seems to be common for the majority of the proposed models is that fibril elongation involves the formation of pre-nucleus seeds prior to the creation of a critical nucleus. Once the size of the pre-nucleus seed reaches the critical nucleus size, its thermal fluctuations are expected to be small and the resulting nucleus provides a template for sequential (one-by-one) accommodation of added monomers. The effect of template fluctuations on fibril formation rates has not been explored either experimentally or theoretically so far. In this paper, we make the first attempt at solving this problem by two sets of simulations. To mimic small template fluctuations, in one set, monomers of the preformed template are kept fixed, while in the other set they are allowed to fluctuate. The kinetics of addition of a new peptide onto the template is explored using all-atom simulations with explicit water and the GROMOS96 43a1 force field and simple lattice models. Our result demonstrates that preformed template fluctuations can modulate protein aggregation rates and pathways. The association of a nascent monomer with the template obeys the kinetics partitioning mechanism where the intermediate state occurs in a fraction of routes to the protofibril. It was shown that template immobility greatly increases the time of incorporating a new peptide into the preformed template compared to the fluctuating template case. This observation has also been confirmed by simulation using lattice models and may be invoked to understand the role of template fluctuations in

  20. Looking sharp: Becoming a search template boosts precision and stability in visual working memory.

    Science.gov (United States)

    Rajsic, Jason; Ouslis, Natasha E; Wilson, Daryl E; Pratt, Jay

    2017-08-01

    Visual working memory (VWM) plays a central role in visual cognition, and current work suggests that there is a special state in VWM for items that are the goal of visual searches. However, whether the quality of memory for target templates differs from memory for other items in VWM is currently unknown. In this study, we measured the precision and stability of memory for search templates and accessory items to determine whether search templates receive representational priority in VWM. Memory for search templates exhibited increased precision and probability of recall, whereas accessory items were remembered less often. Additionally, while memory for Templates showed benefits when instances of the Template appeared in search, this benefit was not consistently observed for Accessory items when they appeared in search. Our results show that becoming a search template can substantially affect the quality of a representation in VWM.

  1. Improved dielectric functions in metallic films obtained via template stripping

    Science.gov (United States)

    Hyuk Park, Jong; Nagpal, Prashant; Oh, Sang-Hyun; Norris, David J.

    2012-02-01

    We compare the dielectric functions of silver interfaces obtained via thermal evaporation with those obtained with template stripping. Ellipsometry measurements show that the smoother template-stripped surfaces exhibit effective dielectric functions with a more negative real component and a smaller imaginary component, implying higher conductivity and less energy loss, respectively. These results agree with the relation between dielectric function and surface roughness derived from combining the effective-medium model and the Drude-Lorentz model. The improvement in the effective dielectric properties shows that metallic films prepared via template stripping can be favorable for applications in electronics, nanophotonics, and plasmonics.

  2. External and semi-internal controls for PCR amplification of homologous sequences in mixed templates.

    Science.gov (United States)

    Kalle, Elena; Gulevich, Alexander; Rensing, Christopher

    2013-11-01

    In a mixed template, the presence of homologous target DNA sequences creates environments that almost inevitably give rise to artifacts and biases during PCR. Heteroduplexes, chimeras, and skewed template-to-product ratios are the exclusive attributes of mixed template PCR and never occur in a single template assay. Yet, multi-template PCR has been used without appropriate attention to quality control and assay validation, in spite of the fact that such practice diminishes the reliability of results. External and internal amplification controls became obligatory elements of good laboratory practice in different PCR assays. We propose the inclusion of an analogous approach as a quality control system for multi-template PCR applications. The amplification controls must take into account the characteristics of multi-template PCR and be able to effectively monitor particular assay performance. This study demonstrated the efficiency of a model mixed template as an adequate external amplification control for a particular PCR application. The conditions of multi-template PCR do not allow implementation of a classic internal control; therefore we developed a convenient semi-internal control as an acceptable alternative. In order to evaluate the effects of inhibitors, a model multi-template mix was amplified in a mixture with DNAse-treated sample. Semi-internal control allowed establishment of intervals for robust PCR performance for different samples, thus enabling correct comparison of the samples. The complexity of the external and semi-internal amplification controls must be comparable with the assumed complexity of the samples. We also emphasize that amplification controls should be applied in multi-template PCR regardless of the post-assay method used to analyze products. © 2013 Elsevier B.V. All rights reserved.

  3. Preparation of Biomorphic TiO2 Ceramics from Rattan Templates

    Directory of Open Access Journals (Sweden)

    Liangcun Qian

    2015-05-01

    Full Text Available In this work, biomorphic ceramics were produced from various rattan templates, and sol infiltration was used with vacuum/positive pressure technology. Finally, the samples were sintered to form TiO2 ceramics with a rattan microstructure. Through X-ray diffraction (XRD, thermogravimetric (TG data, dimensional variation analysis, and scanning electron microscopy (SEM images of biomorphic ceramics, the results of this experiment showed that the times of sol-gel infiltration were decreased due to use of the vacuum/positive pressure technology. In order to further supply the TiO2 content and fill the pyrolysis gaps in the charcoal/TiO2 composites sintered at 800 °C, it was necessary to repeat the sol-gel process. In the transverse section, ceramics for the rattan templates without the rattan edge, more perfect biomorphic features were achieved. Conversely, deformations occurred along the transverse section of the ceramics for the templates made with the rattan edge. Meanwhile, the fracture phenomenon took place along the ceramic axial section. The main reason for deformation and fracture was that the anisotropic structure of the template was stressed during the sintering process. Furthermore, the micrometer-sized pores were found in the ceramics along the axial section because of the removal of the charcoal templates.

  4. A novel ethanol templating synthesis of ordered lamellar superstructured crystalline zirconia

    International Nuclear Information System (INIS)

    Liu Chao; Wang Bin; Ji Xiujie; Zhao Shanshan; Wu Jie; Jia Jianlong; Ma Dongxia

    2012-01-01

    Soft template technique has attracted great interest, because it is a facile, inexpensive and efficient synthesis strategy for ordered superstructural systems. Here, a novel ethanol template was used to synthesize the ordered lamellar superstructured crystalline zirconia (Lα-ZrO 2 ) without post-treatments and surfactants. ZrOCl 2 and NaOH were served as Zr source and precipitant, respectively. XRD analysis showed that Lα-ZrO 2 is crystalline. XPS spectra indicated the physical adsorption of ethanol molecules in Lα-ZrO 2 . TEM further observed and proved the 1.36-nm period of superstructure detected and calculated by SAXRD (1.35 nm), which is composed of 0.68-nm thick ZrO 2 and pore alternatively. In contrast, the template-free ZrO 2 (TF-ZrO 2 ) presents no superstructure and is poorly crystallized. As a soft template, ethanol presents the roles of (i) inducing the growth of zirconia layers, (ii) directing the self-assembly of ordered lamellar superstructure, and (iii) decreasing the crystallization temperature. The possible mechanism of ethanol serving as a soft template was proposed and discussed in thermodynamics.

  5. Multi-template synthesis of hierarchically porous carbon spheres with potential application in supercapacitors

    NARCIS (Netherlands)

    Zhou, Weizheng; Lin, Zhixing; Tong, Gangsheng; Stoyanov, Simeon D.; Yan, Deyue; Mai, Yiyong; Zhu, Xinyuan

    2016-01-01

    A new and simple multi-template approach towards hierarchical porous carbon (HPC) materials was reported. HPC spheres were prepared by using hierarchical silica capsules (HSCs) as the hard template and triblock copolymer Pluronic P123 as the soft template. Three types of pores were tunably

  6. 78 FR 64925 - Request for Comments on Proposed Elimination of Patents Search Templates

    Science.gov (United States)

    2013-10-30

    ...] Request for Comments on Proposed Elimination of Patents Search Templates AGENCY: United States Patent and... Patents Search Templates from the USPTO Web site. In 2006, the United States Patent and Trademark Office (USPTO) implemented Patents Search Templates, which are United States Patent Classification (USPC...

  7. Finding Security Patterns to Countermeasure Software Vulnerabilities

    OpenAIRE

    Borstad, Ole Gunnar

    2008-01-01

    Software security is an increasingly important part of software development as the risk from attackers is constantly evolving through increased exposure, threats and economic impact of security breaches. Emerging security literature describes expert knowledge such as secure development best practices. This knowledge is often not applied by software developers because they lack security awareness, security training and secure development methods and tools. Existing methods and tools require to...

  8. Protective force legal issues: the security perspective

    International Nuclear Information System (INIS)

    Rich, B.L.

    1984-01-01

    There has been much discussion and some controversy on the legal issues faced by the Department of Energy's (DOE) protective forces in the performance of their security duties. These include the observance of legal proprieties in the arrest of non-violent demonstrators, the use of lethal weapons, and the extent of protective forces' authority to carry weapons and protect DOE's security interests offsite. In brief, the need to protect DOE's security interests may be in nominal conflict with other requirements. When faced with a potential conflict in requirements, we in the DOE security community must place first attention to the security mission -- to deter and prevent hostile acts

  9. Effect of template in MCM-41 on the adsorption of aniline from aqueous solution.

    Science.gov (United States)

    Yang, Xinxin; Guan, Qingxin; Li, Wei

    2011-11-01

    The effect of the surfactant template cetyltrimethylammonium bromide (CTAB) in MCM-41 on the adsorption of aniline was investigated. Various MCM-41 samples were prepared by controlling template removal using an extraction method. The samples were then used as adsorbents for the removal of aniline from aqueous solution. The results showed that the MCM-41 samples with the template partially removed (denoted as C-MCM-41) exhibited better adsorption performance than MCM-41 with the template completely removed (denoted as MCM-41). The reason for this difference may be that the C-MCM-41 samples had stronger hydrophobic properties and selectivity for aniline because of the presence of the template. The porosity and cationic sites generated by the template play an important role in the adsorption process. The optimal adsorbent with moderate template was achieved by changing the ratio of extractant; it has the potential for promising applications in the field of water pollution control. Copyright © 2011 Elsevier Ltd. All rights reserved.

  10. A Survey On Various Web Template Detection And Extraction Methods

    Directory of Open Access Journals (Sweden)

    Neethu Mary Varghese

    2015-03-01

    Full Text Available Abstract In todays digital world reliance on the World Wide Web as a source of information is extensive. Users increasingly rely on web based search engines to provide accurate search results on a wide range of topics that interest them. The search engines in turn parse the vast repository of web pages searching for relevant information. However majority of web portals are designed using web templates which are designed to provide consistent look and feel to end users. The presence of these templates however can influence search results leading to inaccurate results being delivered to the users. Therefore to improve the accuracy and reliability of search results identification and removal of web templates from the actual content is essential. A wide range of approaches are commonly employed to achieve this and this paper focuses on the study of the various approaches of template detection and extraction that can be applied across homogenous as well as heterogeneous web pages.

  11. Template-assisted growth of nano structured functional materials

    International Nuclear Information System (INIS)

    Ying, K.K.; Nur Ubaidah Saidin; Khuan, N.I.; Suhaila Hani Ilias; Foo, C.T.

    2012-01-01

    Template-assisted growth is an important nano electrochemical deposition technique for synthesizing one-dimensional (1-D) nano structures with uniformly well-controlled shapes and sizes. A good template with well-defined dimensions is imperative for realizing this task. Porous anodic alumina (PAA) has been a favorable candidate for this purpose as it can be tailor-made with precise pore geometries, such as pore length and diameter as well as inter-pore distances, via the anodization of pure aluminium. This paper reports the fabrication of PAA templates and electrochemical synthesis of functional nano structures in the form of nano wires using PAA templates as scaffolds. Axial heterostructure and homogeneous nano wires formed by engineering materials configuration via composition and/ or layer thickness variations were fabricated for different functionalities. X-ray diffraction and imaging techniques were used to alucidate the microstructures, morphologies and chemical compositions of the nano wires produced. Due to their large surface area-to-volume ratios, and therefore high sensitivities, these functional nano structures have useful applications as critical components in nano sensor devices and various areas of nano technology. Potential applications include as hydrogen gas sensors in nuclear power plant for monitoring structural integrity of reactor components and containment building, as well as environmental monitoring of air pollution and leakages of toxic gases and chemicals. (Author)

  12. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  13. LDH nanocages synthesized with MOF templates and their high performance as supercapacitors

    Science.gov (United States)

    Jiang, Zhen; Li, Zhengping; Qin, Zhenhua; Sun, Haiyan; Jiao, Xiuling; Chen, Dairong

    2013-11-01

    Layered double hydroxides (LDHs) are currently attracting intense research interest for their various applications. Three LDH hollow nano-polyhedra are synthesized with zeolitic imidazolate framework-67 (ZIF-67) nanocrystals as the templates. The nanocages well inherit the rhombic dodecahedral shape of the ZIF-67 templates, and the shell is composed of nanosheets assembled with an edge-to-face stacking. This is the first synthesis of the LDH non-spherical structures. And the mechanism of utilizing metal-organic framework (MOF) nanocrystals as templates is explored. Control of the simultaneous reactions, the precipitation of the shells and the template etching, is extremely crucial to the preparation of the perfect nanocages. And the Ni-Co LDH nanocages exhibit superior pseudocapacitance property due to their novel hierarchical and submicroscopic structures.Layered double hydroxides (LDHs) are currently attracting intense research interest for their various applications. Three LDH hollow nano-polyhedra are synthesized with zeolitic imidazolate framework-67 (ZIF-67) nanocrystals as the templates. The nanocages well inherit the rhombic dodecahedral shape of the ZIF-67 templates, and the shell is composed of nanosheets assembled with an edge-to-face stacking. This is the first synthesis of the LDH non-spherical structures. And the mechanism of utilizing metal-organic framework (MOF) nanocrystals as templates is explored. Control of the simultaneous reactions, the precipitation of the shells and the template etching, is extremely crucial to the preparation of the perfect nanocages. And the Ni-Co LDH nanocages exhibit superior pseudocapacitance property due to their novel hierarchical and submicroscopic structures. Electronic supplementary information (ESI) available: Experimental details, XRD, TEM, SEM, and XPS images. See DOI: 10.1039/c3nr03829g

  14. Secure Java For Web Application Development

    CERN Document Server

    Bhargav, Abhay

    2010-01-01

    As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security

  15. Julius – a template based supplementary electronic health record system

    Directory of Open Access Journals (Sweden)

    Klein Gunnar O

    2007-05-01

    Full Text Available Abstract Background EHR systems are widely used in hospitals and primary care centres but it is usually difficult to share information and to collect patient data for clinical research. This is partly due to the different proprietary information models and inconsistent data quality. Our objective was to provide a more flexible solution enabling the clinicians to define which data to be recorded and shared for both routine documentation and clinical studies. The data should be possible to reuse through a common set of variable definitions providing a consistent nomenclature and validation of data. Another objective was that the templates used for the data entry and presentation should be possible to use in combination with the existing EHR systems. Methods We have designed and developed a template based system (called Julius that was integrated with existing EHR systems. The system is driven by the medical domain knowledge defined by clinicians in the form of templates and variable definitions stored in a common data repository. The system architecture consists of three layers. The presentation layer is purely web-based, which facilitates integration with existing EHR products. The domain layer consists of the template design system, a variable/clinical concept definition system, the transformation and validation logic all implemented in Java. The data source layer utilizes an object relational mapping tool and a relational database. Results The Julius system has been implemented, tested and deployed to three health care units in Stockholm, Sweden. The initial responses from the pilot users were positive. The template system facilitates patient data collection in many ways. The experience of using the template system suggests that enabling the clinicians to be in control of the system, is a good way to add supplementary functionality to the present EHR systems. Conclusion The approach of the template system in combination with various local EHR

  16. Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level

    Directory of Open Access Journals (Sweden)

    Raymond N. J. Veldhuis

    2012-04-01

    Full Text Available In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. Each compared pair of pseudonymous identifiers results in a decision testing whether both identifiers are derived from the same biometric characteristic. Compared to an unprotected system, most existing biometric template protection methods cause to a certain extent degradation in biometric performance. Fusion is therefore a promising way to enhance the biometric performance in template-protected biometric systems. Compared to feature level fusion and score level fusion, decision level fusion has not only the least fusion complexity, but also the maximum interoperability across different biometric features, template protection and recognition algorithms, templates formats, and comparison score rules. However, performance improvement via decision level fusion is not obvious. It is influenced by both the dependency and the performance gap among the conducted tests for fusion. We investigate in this paper several fusion scenarios (multi-sample, multi-instance, multi-sensor, multi-algorithm, and their combinations on the binary decision level, and evaluate their biometric performance and fusion efficiency on a multi-sensor fingerprint database with 71,994 samples.

  17. Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level

    Science.gov (United States)

    Yang, Bian; Busch, Christoph; de Groot, Koen; Xu, Haiyun; Veldhuis, Raymond N. J.

    2012-01-01

    In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. Each compared pair of pseudonymous identifiers results in a decision testing whether both identifiers are derived from the same biometric characteristic. Compared to an unprotected system, most existing biometric template protection methods cause to a certain extent degradation in biometric performance. Fusion is therefore a promising way to enhance the biometric performance in template-protected biometric systems. Compared to feature level fusion and score level fusion, decision level fusion has not only the least fusion complexity, but also the maximum interoperability across different biometric features, template protection and recognition algorithms, templates formats, and comparison score rules. However, performance improvement via decision level fusion is not obvious. It is influenced by both the dependency and the performance gap among the conducted tests for fusion. We investigate in this paper several fusion scenarios (multi-sample, multi-instance, multi-sensor, multi-algorithm, and their combinations) on the binary decision level, and evaluate their biometric performance and fusion efficiency on a multi-sensor fingerprint database with 71,994 samples. PMID:22778583

  18. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  19. Securing the Global Airspace System Via Identity-Based Security

    Science.gov (United States)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  20. Synthesis of boron nitride nanotubes with SiC nanowire as template

    International Nuclear Information System (INIS)

    Zhong, B.; Song, L.; Huang, X.X.; Wen, G.W.; Xia, L.

    2011-01-01

    Highlights: → Boron nitride nanotubes (BNNTs) have been fabricated using SiC nanowires as template. → SiC nanowires could be effectively etched out by the vapors decomposed from ammonia borane, leading to the formation of BNNTs. → A template self-sacrificing mechanism is responsible for the formation of BNNTs. -- Abstract: A novel template method for the preparation of boron nitride nanotubes (BNNTs) using SiC nanowire as template and ammonia borane as precursor is reported. We find out that the SiC nanowires could be effectively etched out by the vapors decomposed from ammonia borane, leading to the formation of BNNTs. The as-prepared products are well characterized by means of complementary analytical techniques. A possible formation mechanism is disclosed. The method developed here paves the way for large scale production of BNNTs.

  1. Enrollment Time as a Requirement for Biometric Hand Recognition Systems

    OpenAIRE

    Carvalho, João; Sá, Vítor; Tenreiro de Magalhães, Sérgio; Santos, Henrique

    2015-01-01

    Biometric systems are increasingly being used as a means for authentication to provide system security in modern technologies. The performance of a biometric system depends on the accuracy, the processing speed, the template size, and the time necessary for enrollment. While much research has focused on the first three factors, enrollment time has not received as much attention. In this work, we present the findings of our research focused upon studying user’s behavior when enrolling in...

  2. Fabrication of porous zirconia using filter paper template

    International Nuclear Information System (INIS)

    Deng Yuhua; Wei Pan

    2005-01-01

    In this work, porous zirconia ceramic was synthesized using filter papers as a template. Special attention is paid to whether the structural of the filter paper can be transferred to the zirconia structure. Microstructure of so synthesized porous zirconia was observed with SEM and the phase was determined by XRD. The surface area and the pore were investigated with an automatic volumetric sorption analyzer. It has been found that the morphology of the template transmit to the porous zirconia quite well. (orig.)

  3. The Role of Morphology in Word Recognition of Hebrew as a Templatic Language

    Science.gov (United States)

    Oganyan, Marina

    2017-01-01

    Research on recognition of complex words has primarily focused on affixational complexity in concatenative languages. This dissertation investigates both templatic and affixational complexity in Hebrew, a templatic language, with particular focus on the role of the root and template morphemes in recognition. It also explores the role of morphology…

  4. Strand displacement by DNA polymerase III occurs through a tau-psi-chi link to single-stranded DNA-binding protein coating the lagging strand template.

    Science.gov (United States)

    Yuan, Quan; McHenry, Charles S

    2009-11-13

    In addition to the well characterized processive replication reaction catalyzed by the DNA polymerase III holoenzyme on single-stranded DNA templates, the enzyme possesses an intrinsic strand displacement activity on flapped templates. The strand displacement activity is distinguished from the single-stranded DNA-templated reaction by a high dependence upon single-stranded DNA binding protein and an inability of gamma-complex to support the reaction in the absence of tau. However, if gamma-complex is present to load beta(2), a truncated tau protein containing only domains III-V will suffice. This truncated protein is sufficient to bind both the alpha subunit of DNA polymerase (Pol) III and chipsi. This is reminiscent of the minimal requirements for Pol III to replicate short single-stranded DNA-binding protein (SSB)-coated templates where tau is only required to serve as a scaffold to hold Pol III and chi in the same complex (Glover, B., and McHenry, C. (1998) J. Biol. Chem. 273, 23476-23484). We propose a model in which strand displacement by DNA polymerase III holoenzyme depends upon a Pol III-tau-psi-chi-SSB binding network, where SSB is bound to the displaced strand, stabilizing the Pol III-template interaction. The same interaction network is probably important for stabilizing the leading strand polymerase interactions with authentic replication forks. The specificity constant (k(cat)/K(m)) for the strand displacement reaction is approximately 300-fold less favorable than reactions on single-stranded templates and proceeds with a slower rate (150 nucleotides/s) and only moderate processivity (approximately 300 nucleotides). PriA, the initiator of replication restart on collapsed or misassembled replication forks, blocks the strand displacement reaction, even if added to an ongoing reaction.

  5. External and semi-internal controls for PCR amplification of homologous sequences in mixed templates

    DEFF Research Database (Denmark)

    Kalle, Elena; Gulevich, Alexander; Rensing, Christopher Günther T

    2013-01-01

    as an acceptable alternative. In order to evaluate the effects of inhibitors, a model multi-template mix was amplified in a mixture with DNAse-treated sample. Semi-internal control allowed establishment of intervals for robust PCR performance for different samples, thus enabling correct comparison of the samples......In a mixed template, the presence of homologous target DNA sequences creates environments that almost inevitably give rise to artifacts and biases during PCR. Heteroduplexes, chimeras, and skewed template-to-product ratios are the exclusive attributes of mixed template PCR and never occur....... This study demonstrated the efficiency of a model mixed template as an adequate external amplification control for a particular PCR application. The conditions of multi-template PCR do not allow implementation of a classic internal control; therefore we developed a convenient semi-internal control...

  6. International developments in openEHR archetypes and templates.

    Science.gov (United States)

    Leslie, Heather

    Electronic Health Records (EHRs) are a complex knowledge domain. The ability to design EHRs to cope with the changing nature of health knowledge, and to be shareable, has been elusive. A recent pilot study1 tested the applicability of the CEN 13606 as an electronic health record standard. Using openEHR archetypes and tools2, 650 clinical content specifi cations (archetypes) were created (e.g. for blood pressure) and re-used across all clinical specialties and contexts. Groups of archetypes were aggregated in templates to support clinical information gathering or viewing (e.g. 80 separate archetypes make up the routine antenatal visit record). Over 60 templates were created for use in the emergency department, antenatal care and delivery of an infant, and paediatric hearing loss assessment. The primary goal is to define a logical clinical record architecture for the NHS but potentially, with archetypes as the keystone, shareable EHRs will also be attainable. Archetype and template development work is ongoing, with associated evaluation occurring in parallel.

  7. Text Character Extraction Implementation from Captured Handwritten Image to Text Conversionusing Template Matching Technique

    Directory of Open Access Journals (Sweden)

    Barate Seema

    2016-01-01

    Full Text Available Images contain various types of useful information that should be extracted whenever required. A various algorithms and methods are proposed to extract text from the given image, and by using that user will be able to access the text from any image. Variations in text may occur because of differences in size, style,orientation, alignment of text, and low image contrast, composite backgrounds make the problem during extraction of text. If we develop an application that extracts and recognizes those texts accurately in real time, then it can be applied to many important applications like document analysis, vehicle license plate extraction, text- based image indexing, etc and many applications have become realities in recent years. To overcome the above problems we develop such application that will convert the image into text by using algorithms, such as bounding box, HSV model, blob analysis,template matching, template generation.

  8. Caprine Butchery and Bone Modification Templates: A step towards standardisation

    Directory of Open Access Journals (Sweden)

    Peter Popkin

    2005-03-01

    Full Text Available Widely accepted zooarchaeological procedure for recording butchery marks and other types of bone modification involves two processes: Drawing the bone showing the exact location and orientation of the modification and recording all of the information about the bone and its modification into an electronic database. No recording templates have ever been published, however, resulting in individual zooarchaeologists repeating the effort of developing their own templates or drawings for each bone in an assemblage showing a modification. Both of these tasks are time consuming and lead to inconsistencies in recording and quantification methods. To help alleviate this problem a series of caprine (sheep and goat bone templates have been created. These templates show every bone in a goat skeleton, apart from the skull, from six views at life-size when printed on A4 paper. They have intentionally been produced with a minimum of detail (without shading or stippling etc. so that the recorded butchery marks and bone modifications will be clearly visible. Because the skeletal morphology of sheep and goats is so similar these templates may be used interchangeably for either species. They may also be used for many other artiodactyl species such as cattle and deer as no scale has been indicated. The study of butchery marks and bone modification has the potential to provide zooarchaeologists with information about taphonomy, site formation processes, burial/ritual practices, human behaviour, ancient technologies and possibly ethnicity amongst other things, but only if the recording of these bone modifications is undertaken in a standardised fashion across the field. While much effort has been directed towards standardising the recognition and classification of various bone modifications, the recording of these modifications regularly occurs in various ways. Using standardised recording templates will save valuable time and help to alleviate problems of data

  9. Educational Programme in Nuclear Security (Chinese Version)

    International Nuclear Information System (INIS)

    2012-01-01

    Higher education plays an essential role in nuclear security capacity building. It ensures the availability of experts able to provide the necessary competencies for the effective national nuclear security oversight of nuclear and other radioactive material and to establish and maintain an appropriate nuclear regime in a State. This guide provides both the theoretical knowledge and the practical skills necessary to meet the requirements described in the international framework for nuclear security. Emphasis is placed on the implementation of these requirements and recommendations in States. On the basis of this guide, each university should be able to develop its own academic programme tailored to suit the State's educational needs in the area of nuclear security and to meet national requirements.

  10. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  11. Automated analysis of security requirements through risk-based argumentation

    NARCIS (Netherlands)

    Yu, Yijun; Nunes Leal Franqueira, V.; Tun, Thein Tan; Wieringa, Roelf J.; Nuseibeh, Bashar

    2015-01-01

    Computer-based systems are increasingly being exposed to evolving security threats, which often reveal new vulnerabilities. A formal analysis of the evolving threats is difficult due to a number of practical considerations such as incomplete knowledge about the design, limited information about

  12. A flexible, bolaamphiphilic template for mesoporous silicas.

    Science.gov (United States)

    Yuen, Alexander K L; Heinroth, Falk; Ward, Antony J; Masters, Anthony F; Maschmeyer, Thomas

    2013-08-28

    A novel symmetrical bolaamphiphile, containing two N-methylimidazolium head-groups bridged by a 32-methylene linker, was synthesized and characterized. A variety of mesoporous silicas was prepared using the bolaamphiphile as a "soft template". The effects of absolute surfactant concentration and synthesis conditions upon the morphologies of these silicas were investigated. For a given surfactant concentration, particle morphology; pore size; and pore ordering were modified through control of the template to silica-precursor ratio and synthesis conditions. Observed morphologies included: lenticular core-shell nanoparticles and decorticated globules, truncated hexagonal plates, and sheets. In all cases the mesopores are aligned along the shortest axis of the nanomaterial. Decorticated materials displayed surface areas of up to 1200 m(2) g(-1) and pore diameters (D(BJH)) of 24-28 Å. Small-angle X-ray diffraction and transmission electron microscopy measurements revealed that the majority of the materials has elliptical pores arranged in rectangular lattices (c2mm). Adoption of this symmetry group is a result of the template aggregate deformation from a regular hexagonal phase of cylindrical rods to a ribbon phase under the synthetic conditions.

  13. Web Services Security - Implementation and Evaluation Issues

    Science.gov (United States)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  14. Rational design of mesoporous metals and related nanomaterials by a soft-template approach.

    Science.gov (United States)

    Yamauchi, Yusuke; Kuroda, Kazuyuki

    2008-04-07

    We review recent developments in the preparation of mesoporous metals and related metal-based nanomaterials. Among the many types of mesoporous materials, mesoporous metals hold promise for a wide range of potential applications, such as in electronic devices, magnetic recording media, and metal catalysts, owing to their metallic frameworks. Mesoporous metals with highly ordered networks and narrow pore-size distributions have traditionally been produced by using mesoporous silica as a hard template. This method involves the formation of an original template followed by deposition of metals within the mesopores and subsequent removal of the template. Another synthetic method is the direct-template approach from lyotropic liquid crystals (LLCs) made of nonionic surfactants at high concentrations. Direct-template synthesis creates a novel avenue for the production of mesoporous metals as well as related metal-based nanomaterials. Many mesoporous metals have been prepared by the chemical or electrochemical reduction of metal salts dissolved in aqueous LLC domains. As a soft template, LLCs are more versatile and therefore more advantageous than hard templates. It is possible to produce various nanostructures (e.g., lamellar, 2D hexagonal (p6mm), and 3D cubic (Ia\\3d)), nanoparticles, and nanotubes simply by controlling the composition of the reaction bath.

  15. Fabricating hydroxyapatite nanorods using a biomacromolecule template

    Energy Technology Data Exchange (ETDEWEB)

    Zhu Aiping, E-mail: apzhu@yzu.edu.cn [College of Chemistry and Chemical Engineering, Yangzhou University, Yangzhou 225002 (China); Lu Yan; Si Yunfeng [College of Chemistry and Chemical Engineering, Yangzhou University, Yangzhou 225002 (China); Dai Sheng [School of Chemical Engineering, University of Adelaide, Adelaide, SA 5005 (Australia)

    2011-02-01

    Rod-like hydroxyapatite (HAp) nanoparticles with various aspect ratios are synthesized by means of low-temperature hydrothermal method in the presence of a N-[(2-hydroxy-3-trimethylammonium) propyl]chitosan chloride (HTCC) template. The synthesized HAps were examined by X-ray diffraction (XRD), Fourier transform infrared spectrophotometer (FTIR) and transmission electron microscopy (TEM) techniques. The results reveal that HAps are rod-like monocrystals, where the size and morphology can be tailored by varying synthesis conditions, such as pH, hydrothermal synthesis temperature and the ratio of PO{sub 4}{sup 3-} to the quaternary ammonium in HTCC. The mechanism of HTCC template on HAp nanorod preparation is analyzed.

  16. Fabricating hydroxyapatite nanorods using a biomacromolecule template

    International Nuclear Information System (INIS)

    Zhu Aiping; Lu Yan; Si Yunfeng; Dai Sheng

    2011-01-01

    Rod-like hydroxyapatite (HAp) nanoparticles with various aspect ratios are synthesized by means of low-temperature hydrothermal method in the presence of a N-[(2-hydroxy-3-trimethylammonium) propyl]chitosan chloride (HTCC) template. The synthesized HAps were examined by X-ray diffraction (XRD), Fourier transform infrared spectrophotometer (FTIR) and transmission electron microscopy (TEM) techniques. The results reveal that HAps are rod-like monocrystals, where the size and morphology can be tailored by varying synthesis conditions, such as pH, hydrothermal synthesis temperature and the ratio of PO 4 3- to the quaternary ammonium in HTCC. The mechanism of HTCC template on HAp nanorod preparation is analyzed.

  17. Frabicating hydroxyapatite nanorods using a biomacromolecule template

    Science.gov (United States)

    Zhu, Aiping; Lu, Yan; Si, Yunfeng; Dai, Sheng

    2011-02-01

    Rod-like hydroxyapatite (HAp) nanoparticles with various aspect ratios are synthesized by means of low-temperature hydrothermal method in the presence of a N-[(2-hydroxy-3-trimethylammonium) propyl]chitosan chloride (HTCC) template. The synthesized HAps were examined by X-ray diffraction (XRD), Fourier transform infrared spectrophotometer (FTIR) and transmission electron microscopy (TEM) techniques. The results reveal that HAps are rod-like monocrystals, where the size and morphology can be tailored by varying synthesis conditions, such as pH, hydrothermal synthesis temperature and the ratio of PO43- to the quaternary ammonium in HTCC. The mechanism of HTCC template on HAp nanorod preparation is analyzed.

  18. Crosslinked Aspartic Acids as Helix-Nucleating Templates.

    Science.gov (United States)

    Zhao, Hui; Liu, Qi-Song; Geng, Hao; Tian, Yuan; Cheng, Min; Jiang, Yan-Hong; Xie, Ming-Sheng; Niu, Xiao-Gang; Jiang, Fan; Zhang, Ya-Ou; Lao, Yuan-Zhi; Wu, Yun-Dong; Xu, Nai-Han; Li, Zi-Gang

    2016-09-19

    Described is a facile helix-nucleating template based on a tethered aspartic acid at the N-terminus [terminal aspartic acid (TD)]. The nucleating effect of the template is subtly influenced by the substituent at the end of the side-chain-end tether as indicated by circular dichroism, nuclear magnetic resonance, and molecular dynamics simulations. Unlike most nucleating strategies, the N-terminal amine is preserved, thus enabling further modification. Peptidomimetic estrogen receptor modulators (PERMs) constructed using this strategy show improved therapeutic properties. The current strategy can be regarded as a good complement to existing helix-stabilizing methods. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. Nanostructured electrocatalyst for fuel cells : silica templated synthesis of Pt/C composites.

    Energy Technology Data Exchange (ETDEWEB)

    Stechel, Ellen Beth; Switzer, Elise E.; Fujimoto, Cy H.; Atanassov, Plamen Borissov; Cornelius, Christopher James; Hibbs, Michael R.

    2007-09-01

    Platinum-based electrocatalysts are currently required for state-of-the-art fuel cells and represent a significant portion of the overall fuel cell cost. If fuel cell technology is to become competitive with other energy conversion technologies, improve the utilization of precious metal catalysts is essential. A primary focus of this work is on creating enhanced nanostructured materials which improve precious-metal utilization. The goal is to engineer superior electrocatalytic materials through the synthesis, development and investigation of novel templated open frame structures synthesized in an aerosol-based approach. Bulk templating methods for both Pt/C and Pt-Ru composites are evaluated in this study and are found to be limited due to the fact that the nanostructure is not maintained throughout the entire sample. Therefore, an accurate examination of structural effects was previously impossible. An aerosol-based templating method of synthesizing nanostructured Pt-Ru electrocatalysts has been developed wherein the effects of structure can be related to electrocatalytic performance. The aerosol-based templating method developed in this work is extremely versatile as it can be conveniently modified to synthesize alternative materials for other systems. The synthesis method was able to be extended to nanostructured Pt-Sn for ethanol oxidation in alkaline media. Nanostructured Pt-Sn electrocatalysts were evaluated in a unique approach tailored to electrocatalytic studies in alkaline media. At low temperatures, nanostructured Pt-Sn electrocatalysts were found to have significantly higher ethanol oxidation activity than a comparable nanostructured Pt catalyst. At higher temperatures, the oxygen-containing species contribution likely provided by Sn is insignificant due to a more oxidized Pt surface. The importance of the surface coverage of oxygen-containing species in the reaction mechanism is established in these studies. The investigations in this work present

  20. Computational study of textured ferroelectric polycrystals: Dielectric and piezoelectric properties of template-matrix composites

    Science.gov (United States)

    Zhou, Jie E.; Yan, Yongke; Priya, Shashank; Wang, Yu U.

    2017-01-01

    Quantitative relationships between processing, microstructure, and properties in textured ferroelectric polycrystals and the underlying responsible mechanisms are investigated by phase field modeling and computer simulation. This study focuses on three important aspects of textured ferroelectric ceramics: (i) grain microstructure evolution during templated grain growth processing, (ii) crystallographic texture development as a function of volume fraction and seed size of the templates, and (iii) dielectric and piezoelectric properties of the obtained template-matrix composites of textured polycrystals. Findings on the third aspect are presented here, while an accompanying paper of this work reports findings on the first two aspects. In this paper, the competing effects of crystallographic texture and template seed volume fraction on the dielectric and piezoelectric properties of ferroelectric polycrystals are investigated. The phase field model of ferroelectric composites consisting of template seeds embedded in matrix grains is developed to simulate domain evolution, polarization-electric field (P-E), and strain-electric field (ɛ-E) hysteresis loops. The coercive field, remnant polarization, dielectric permittivity, piezoelectric coefficient, and dissipation factor are studied as a function of grain texture and template seed volume fraction. It is found that, while crystallographic texture significantly improves the polycrystal properties towards those of single crystals, a higher volume fraction of template seeds tends to decrease the electromechanical properties, thus canceling the advantage of ferroelectric polycrystals textured by templated grain growth processing. This competing detrimental effect is shown to arise from the composite effect, where the template phase possesses material properties inferior to the matrix phase, causing mechanical clamping and charge accumulation at inter-phase interfaces between matrix and template inclusions. The computational